Irate parents in Pa. say schools use 'Peeping Tom technology'
FBI investigates, federal prosecutors subpoena documents in MacBook spying case, say reports
Computerworld - The parents of a Pennsylvania high school student have asked a federal judge to bar school district personnel from switching on cameras in school-issued MacBook laptops, calling the security feature "Peeping Tom technology."
Federal officials have also stepped up their investigation of Lower Merion School District of Ardmore, Pa., according to reports published Saturday. The Associated Press said that the FBI was exploring whether district officials broke federal wiretapping and electronic surveillance laws, while the Philadelphia Inquirer cited sources who said federal prosecutors have subpoenaed documents from school officials.
In their motion Friday, Michael and Holly Robbins of Penn Valley, Pa., asked U.S. District Court Judge Jan DuBois to issue a restraining order preventing the district from remotely activating the webcams on student notebooks. They also requested that the judge block the district from recalling the laptops from students, saying that they believe school officials will then wipe the MacBooks' hard drives to delete evidence of any camera activation.
Last week, the Robbins family sued the district, accusing it of spying on students and students' families using the MacBooks' cameras.
Two days after the lawsuit was filed, district officials said they had disabled the camera functionality of a feature designed to locate lost, missing or stolen laptops. However, that wasn't enough for the Robbins, who submitted their Friday motion on behalf of their 16-year-old son, Harriton High School student Blake Robbins.
"There can be no assurances that the School District will disable the use of the remote webcam or, once deactivated, make an internal decision to reactive the webcam," the motion argued.
Elsewhere in the motion, the Robbins labeled the camera functionality "Peeping Tom technology" and disputed the district's assertion that cameras had been activated only when a notebook was reported lost or stolen. "[Blake Robbins] was at home using a school issued laptop that was neither reported lost nor stolen when his image was captured by Defendants without his or his parents' permission and while he was at home," the motion said.
According to the original complaint, Robbins was accused by a Harriton High School assistant principal of "improper behavior in his home" and shown a photograph taken by his laptop as evidence. In an appearance on CBS's Early Show Saturday Edition Robbins said he was accused by the assistant principal of selling drugs and taking pills, but he claimed the pictures taken by his MacBook's camera showed him eating candy.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts