• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

US School Remotely Spying On Kids With Webcams

February 25, 2010

Views: 7,511

[ad]

The big news that has been blowing up in the past week or so is about a relatively unknown school district in Pennsylvania, US that has been spying on its students using Macbook webcams.

It has actually turned into a class action lawsuit and there is a lot of debate surrounding the story, the school claims they were using the software and ‘spycam’ functionality simply to recover lost laptops rather than actually spying on their students remotely.

The lawsuit deals with the issue of unauthorised access to the webcams and the actions could also possibly violate wiretapping laws. The lawsuit itself can be found here [PDF].

A suburban Philadelphia school district accused of secretly switching on laptop computer webcams inside students’ homes says it never used webcam images to monitor or discipline students and believes one of its administrators has been “unfairly portrayed and unjustly attacked.”

The Lower Merion School District, in response to a suit filed by a student, has acknowledged that webcams were remotely activated 42 times in the past 14 months, but only to find missing, lost or stolen laptops — which the district noted would include “a loaner computer that, against regulations, might be taken off campus.”

“Despite some reports to the contrary, be assured that the security-tracking software has been completely disabled,” Superintendent Christopher W. McGinley said in a statement on the district’s Web site late Friday. Officials vowed a comprehensive review that McGinley said should result in stronger privacy policies.

Harriton High School student Blake Robbins and his parents, Michael and Holly Robbins, filed a federal civil rights lawsuit Tuesday against the district, its board of directors and McGinley. They accused the school of turning on the webcam in his computer while it was inside their Penn Valley home, which they allege violated wiretap laws and his right to privacy.

It’s turning into a massive case and is generating press all over the globe, someone powerful technology was used by a perhaps over-zealous network admin named Mike Perbix.

You can also check out this very well-written and researched post on the technologies and methods used here: The Spy at Harriton High

There are people on all sides of the fence in this case, I personally think it was an interesting and effective use of technology but definitely should not have been implemented without disclosure. If you want to officially spy on people for theft prevention or asset tracking you should forewarn them.

The suit, which seeks class-action status, alleges that Harriton vice principal Lindy Matsko on Nov. 11 cited a laptop photo in telling Blake that the school thought he was engaging in improper behavior. He and his family have told reporters that an official mistook a piece of candy for a pill and thought he was selling drugs.

Neither the family nor their attorney, Mark Haltzman, returned calls this week seeking comment. A listed number for Matsko could not be found.

“We believe that the administrator at Harriton has been unfairly portrayed and unjustly attacked in connection with her attempts to be supportive of a student and his family,” the statement on the Lower Merion School District site said. “The district never did and never would use such tactics as a basis for disciplinary action.”

A district spokesman declined further comment on the statement Saturday.

Lower Merion, an affluent district in Philadelphia’s suburbs, issues Apple laptops to all 2,300 students at its two high schools. Only two employees in the technology department, not administrators, were authorized to activate the cameras, which captured still images but not sound, officials said.

“While certain rules for laptop use were spelled out … there was no explicit notification that the laptop contained the security software,” McGinley said. “This notice should have been given, and we regret that was not done.”

There is a plethora of information about this online including testimonies from current students, previous students and parents of both.

Many students suspected they were being spied on and taped up the cameras, wisely so it seems. But for the average computer using teenager if the school network admin tells them the green light next to the camera blinking now and then is a glitch they are going to believe it.

That right there is lying and makes the whole thing horribly suspicious, surely you only have the right to spy on kids if you have their parents consent..and even then it’s still a bit shady.

Either way this is a morally, legally and technically interesting case and I’m sure it’ll be heating up even more before it blows over.

Source: Yahoo! News

Share
Tweet2
Share
Buffer
WhatsApp
Email
2 Shares

Filed Under: Hardware Hacking, Privacy Tagged With: Privacy, spying, wiretapping



Reader Interactions

Comments

  1. Morgan Storey says

    February 25, 2010 at 1:50 pm

    They could have disabled the little green light. I had a friend who was a Blackberry admin who setup a lost/stolen blackberry script that would then message the phone to turn on the camera and email pictures, gps location, and audio recordings till he told it to stop. The staff where aware of this feature though and so where managment, the person who lost the phone would have to call before he would activate it, he only ever used it to find lost or stolen phones, and managed to nab a few crooks in the process.
    Maybe they needed to secure it from their admins if they were un trustworthy, something like having to put in a result of a password the owner could give them that was hashed against a management known passphrase.

  2. cbrp1r8 says

    February 25, 2010 at 3:56 pm

    This is a huge privacy issue, and nothing noted in writing or in warning on the laptops from what i’ve read. Even though its school property there’s still the “assumption of privacy” inside one’s home and this violates privacy law.

    I personally, have a nephew in Ohio that they do something similiar to this with, they issue laptops to computer science students at the beginning of their year in the class and the student/parents pay a percentage of use fee and then keep the laptop at the end of the course which i think is like 2-3 years. This offsets schools costs, gets the kid a laptop and helps school not have to deal with old equipment removal at the end of courses. These are monitored and there’s a warning on there screen that pops up (this is to make sure there not virus infected etc as well as to protect the schools network). This is assumed and makes sense for all parties in this case to protect them and the school from malware.

    Now take this case, and twist it in the worst way possible…if this was your 14-17 yr old son/daughter and he/she was getting undressed into pajamas at night when this camera pops on..well that’s now child porn..they should all go to jail IMHO…This is rediculous that a school would do this…i say prosecute to the full extent of the law. It’ll probably be some peon IT guy that goes down for it, but still he was directed by someone …yes?

  3. jim says

    February 26, 2010 at 1:27 am

    What would happen if the picture came back with a younger sibling that did not even go to that school in a state of undress.What would the school do then.

  4. geohac says

    February 27, 2010 at 4:37 am

    A very bizarre story indeed!

  5. Glenn says

    February 28, 2010 at 6:40 pm

    Educators on a power trip without any understanding of technology and law. Duct tape fixes all problems.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 296

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 590

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 555

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 592

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 451

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 676

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,297,515)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,637)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,691)
  • Password List Download Best Word List – Most Common Passwords (933,521)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,170)
  • Hack Tools/Exploits (673,298)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,182)

Search

Recent Posts

  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy