In December of 2013, many news outlets were reporting that the FBI has had the technology to spy on people’s webcams without turning on the camera’s indicator lights, and even worse, they’ve had this technology for years. The webcam is a source of intimacy to many people who browse the Internet on a daily basis. Some have made makeshift solutions that involve sticking little pieces of paper on the lens when the camera is not in use. But is there really much to be afraid of? How far can organizations (and hackers) go into your computer without your permission?

How The FBI Did It

The question we must ask ourselves before assessing the level of danger in this situation is: How did the FBI manage to get into people’s webcams?

Here’s the answer: The FBI used Remote Administration Tools (RATs) to access the cameras in some computers belonging to high-profile individuals it was investigating. This is the same way that hackers gain access to certain hardware in your computer and exploit it to their advantage.

Remote administration tools are pieces of software installed on your computer that allow any number of interactions with it from a place that doesn’t necessarily have to exist on the same network as you do (hence the term “remote”). If you rely on a web panel to control your computer or router from work or while you’re out of the house for whatever reason, you’re using a remote administration tool to do these things. The amount of “administration” allowed by the tool depends entirely on what it was designed to do and how much permission it has from the operating system to perform these tasks.

Assessing The Threat Level

spycam-facescreen

Now that we know the way in which RATs work, we need to find out whether they present a high level of danger. Well, the FBI can’t just open the administrative tool on its own system and expect it to somehow magically “hack” your webcam. It has to be installed and executed on your system in order to capture your webcam’s output.

RATs have two components: a client and a server. The server is installed on the hacker’s computer and does not harm him. The client will have to be installed on your computer for the server to have access to your system. Once those two criteria are met, the two components will communicate with each other, giving the server a backstage pass to all your hardware and files.

RATs aren’t a new thing. They’ve been around since the mid-90s and peaked around the turn of the 21st century. Because the person on the other end needs to “infect” you in order to have access to your webcam, this means that you actually have to install it on your computer (voluntarily, but without proper knowledge of the file) to give away access.

Seeing as you still fit into the equation somewhere, it all has to do with your own prudence. As long as you avoid opening files in emails from strange people and downloading singular EXE files from the web directly, you’re probably not going to experience this issue.

If You’re Still Afraid

There’s reason to still be concerned of the threat regardless of the fact that hackers are powerless unless you install their client software. What if, by mistake, you actually execute one of their viruses? If you feel that protecting your camera is important, put something in front of it when you’re not using it or unplug it (if you have a USB camera, like I do). Of course, if you’re feeling a little more sophisticated, you can always go with Nope, a magnetic camera cover.

Would you like to add to the conversation? It’s your turn, and the comments section below is your canvas! Post a comment if you have something to say!

How to Sync Bookmarks Between Firefox and Chrome

If you work with both Firefox and Chrome, and need your bookmarks to be available on both of them, here is how you can sync bookmarks between Firefox and Chrome.

Follow YouTube Channels Easily With YouTube Video Deck

There are approximately two bajillion videos on YouTube and staying up-to-date on a couple of channels could be difficult. YouTube Video Deck makes it easier and faster to follow YouTube channels.

How BitTorrent DHT Peer Discovery Works

Peer discovery is an essential part of the BitTorrent protocol. It’s how its downloads happen so quickly: You connect to multiple people, and each of them upload a little piece of the file to you. This article explains how the whole BitTorrent DHT peer discovery process works.

How to Encrypt Your Gmail Message and Protect Your Privacy

If you are really concern about the privacy of your email, you should really consider encrypt your Gmail message so even Google can’t view it.

The Easiest Way to Automatically Open Websites in Incognito Mode [Chrome]

Are there websites that you only want to view in Incognito Mode? The Incognito-Filter Chrome extension will let you do that in a snap.

Surfly Lets You Browse the Web with Friends Without Installing Software

Surfly is a free web app that lets you browse the web with friends in just a few quick steps; enter a website, share a short URL & start surfing.

8 Things You Should Do When Seeking Technical Support

Getting technical support is supposed to be easy, but sometimes we just make it more complicated. Here are things you should do to avoid getting stuck in support limbo.

Still Need a 2014 Calendar? Make One Using Pically

Are you still looking for the perfect 2014 calendar. Pically is a free program that you can grab and use to create beautiful calendars using your own photos.

Internet Censorship: How Countries Block Their Citizens from Entering Websites

Some countries carry out Internet censorship and block their citizens from entering websites. How do they do this? Here’s the answer.

How to Organize History By Tags in Google Chrome

The History tool in Google Chrome can be in a mess sometimes. Better History provides a more structured way of searching and viewing recently visited sites.

Hands-on with Github’s Atom Text Editor

The developers of Github decided to come out with its own text editor – atom. Let’s check out Atom text editor and see how it fares with other text editors.

Stop Facebook from Selling Out Your Browsing Data

Facebook stated that it is going to share the data it has collected with advertisers so they can show you more relevant ads. Here is how you can prevent it.