Pa. school district snapped 'thousands' of student images, claims lawyer
District staffers called the photos taken by laptop software a 'little soap opera'
Computerworld - The suburban Philadelphia school district accused of spying on students using school-issued laptops snapped thousands of images of teenagers in their homes, including shots of a boy asleep in his bed, documents filed in a lawsuit claimed Thursday.
In a motion filed April 15 by Michael and Holly Robbins, and their teenage son Blake, the family's attorney said Lower Merion School District personnel remotely activated Blake's MacBook over 400 times in a 15-day stretch last fall, taking photos using the notebook's camera and snapping images of the computer's screen.
"There were numerous webcam pictures of Blake and other members of his family, including pictures of Blake partially undressed and of Blake sleeping," alleged the motion. Screenshots of Blake's conversations with friends using instant messaging were also taken, said his lawyer.
The motion claimed that the LANRev software Lower Merion used to track stolen, lost or missing MacBooks took "thousands of webcam and screen shots ... of numerous other students in their homes, many of which never reported their laptops lost or missing." Among the photographs were some of a student who had a name similar to another student's who had reported a missing notebook.
Lower Merion, of Ardmore, Pa., was first sued by the Robbins family in mid-February, when they alleged that the district spied on Blake Robbins using his laptop. Later, Robbins said, a Harriton High School assistant principal accused him of selling drugs and taking pills, and used a snapshot taken by the computer as evidence. Robbins claimed the pictures showed him eating candy.
The motion filed on Thursday asked U.S. District Court Judge Jan DuBois to grant the Robbins' attorney access to the home of Carol Cafiero, information systems coordinator for the district, to seize any computers found in her home. Cafiero is one of two district employees who were put on paid administrative leave by Lower Merion in late February pending the ongoing investigation. According to her attorney, Cafiero only triggered the remote monitoring feature on school officials' orders.
Cafiero's computers' hard drives will be imaged, and the machines returned to her within 48 hours, the motion said. "There is reason to believe that evidence may be found on her personal home computer of the downloading of the pictures obtained from the LANRev 'peeping tom' technology," the Robbins' attorney argued.
The motion noted that Cafiero cited her right under the Fifth Amendment to not answer questions during a recent deposition, which she had earlier contested. "Unlike any of the witnesses asked to testify, [Cafiero] invokes the Fifth Amendment to every question asked of her, including a question asked as to whether she had ever downloading [sic] pictures to her personal computer, including pictures of students who were naked while in their home."
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!