28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

their lawyyer, maintained all along that the boyy was simplyy eating Mike and

Ike candyy while doing his homework.

Whyy was this even an issue?

The school district maintains it activated the theft-tracking software onlyy

after one of its laptops was stolen. Theft-tracking software works like this:

when someone using the software reports that his or her laptop has been

stolen, the school can log on to a website and see images from the stolen

laptop’s webcam as well as hear sounds from the microphone. A school

administrator could then monitor the laptop and take pictures as needed.

This wayy the device can be located and returned and the guiltyy partyy can be

identified. However, in this case it was alleged that school officials were

turning on this feature to spyy on the students while theyy were at home.

The webcam on Robbins’s school-issued Mac laptop recorded hundreds

of photos, including some of the boyy asleep in his bed. For other students it

was worse. According to court testimonyy, the school had even more pictures

of some students, a few of whom were “partiallyy undressed.” This might

have continued unnoticed byy the students had Robbins not been

reprimanded for something he allegedlyy did at home.

Robbins, along with a former student, Jalil Hasan—who had nearlyy five

hundred images taken of him and four hundred images of his computer

screen captured, revealing his online activityy and the sites he visited—sued

the school district. Robbins received $175,000 and Hasan $10,000. 11 The

district also paid almost half a million dollars to cover the boyys’ legal

expenses. In total the school district had to payy out, through its insurer,

around $1.4 million.

It’s easyy for malicious software to activate the webcam and microphone

on a traditional PC without the user knowing it. And this is true on a mobile

device as well. In this case it was a deliberate action. But all too often it is

not. One quick fix is to put tape over the webcam on yyour laptop until yyou

intend to use it again.

In the fall of 2014, Sophie Curtis, a reporter for the London-based

Telegraph, received a LinkedIn connection request in an e-mail that

appeared to come from someone who worked at her newspaper. It was the

kind of e-mail that Sophie received all the time, and as a professional

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!