Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

privacy protection

How is Surveillance Capitalism Affecting You? 

Most of us love to have free online platforms available to us for information and entertainment. But have you ever noticed that each person’s online “feed” differs? Learn how your online behaviors are tracked, monitored, studied, and sold in today’s GKIS article. If you worry your family hasn’t covered all the bases in regard to online safety, check out our Screen Safety Essentials Course to learn how to be internet safe for you and your family.

Your Digital Footprint 

Let’s cover some basic tech vocabulary to start.  

A digital footprint is a data map that is left behind anytime you use the internet. You may be notified that your data is being tracked or it may be happening without your explicit consent.  

When you aren’t aware of the data that is being collected, you have a passive digital footprint.[2] This information usually includes your IP address and where and when it came from.   

An active digital footprint is created when you upload information about yourself on a website, usually under a profile.[3]  

The term cookies refers to a third-party system that collects statistics about your current browsing to tailor your future browsing experience. Cookies remain even after you leave a website.[4] There is usually a pop-up service announcement informing you about the use of cookies when entering a website because of the EU General Data Protection Regulation (GDPR). This legislation was passed in Europe in 2018 to protect personal data and privacy for companies that intend to sell consumer data information to a third party.[6] This legislation requires any website to have a “cookie pop-up” for websites based in Europe or for those that target European citizens. Legislation similar to this is California’s Consumer Privacy Act (CCPA). CCPA is the first legislation in the United States to also protect users from having their data stored by a third party without their consent.[7] To learn more about protective legislation for online content, check out our GKIS article California’s Newest Online Privacy Protections for Kids.

What is surveillance capitalism? 

Surveillance capitalism refers to the process of online data collection from cookies that can then be used to create an algorithm for personalized advertising. An algorithm is a specific sequence of content tailored for you that is automatically offered when you use a browser, app, social media, or shopping platform. Creating algorithms is profitable because it allows online businesses to tailor ads for you and offer products they think you’re most likely to buy.  

Surveillance capitalism is practiced by companies that profit from knowing your interests and habitual online behaviors. Some corporations don’t sell to you directly. Instead, they collect your data and then sell it to third parties.[4] In this situation, YOU are the product. Companies like Google, Amazon, and Microsoft are required to release statements about their direct data collection. Many of them have also admitted to using third-party data companies.[5]   

Dr. Bennett writes about this very phenomenon in her book Screen Time in the Mean Time.[8] She writes:  

Websites often have many of these ad trackers surveilling your online activity. The data generated from online tracking has been referred to as digital exhaust because clusters of trackers can follow you from site to site. In addition to information collected from tracking, Facebook buys personal information about its users from one of many services like Experian and Equifax … Not only are adults targeted for ads, but the digital age has ushered in an increasing commercialization of childhood as well. Because of a dramatic increase in personal screen privatization (child Internet use without supervision) and unregulated corporate marketing, an enormous growth in advertising targets children.  

Companies are so good at anticipating your interests, many speculate if they are recording your conversations. Find out if this is legal in our GKIS article, “Is Facebook Spying by Hijacking Your Smartphone Mic? 

What can you do to protect your privacy?  

  • Review terms of service for every website. 
  • Check privacy settings on browsers.[1] 
  • Clear your data and search history frequently.  
  • Filter and block for safe browsing. 
  • Opt out of cookies for specific websites. 

To learn more about cyber safety, Dr. B created the Cybersecurity & Red Flags Supplement to help parents learn about exposure to online risks and how to protect their privacy. Also, if you are a parent concerned about your child accessing the internet, check out the Screen Safety Toolkit. This toolkit guides you to learn how to filter your family’s browsing and offers information about our own favorite third-party party safety system.  

Thanks to CSUCI intern Sarah Hernandez for researching Surveillance Capitalism. 

I’m the mom psychologist who will help you GetKidsInternetSafe. 

Onward to More Awesome Parenting, 

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com 

Work Cited 

[1] How to search and find your digital footprint: TDS Home. TDS Home | Home, Internet, Phone, TV & DVR Services. (2019, September 12). Retrieved October 26, 2022, from https://blog.tdstelecom.com/security/how-to-search-and-find-your-digital-footprint/ 

[2] Digital footprints. Family Lives. (n.d.). Retrieved October 26, 2022, from https://www.familylives.org.uk/advice/your-family/online-safety/digital-footprints#:~:text=A%20passive%20footprint%20is%20made,sites%20or%20by%20using%20websites. 

[3] Kaspersky. (2022, March 9). What is a digital footprint? and how to protect it from hackers. www.kaspersky.com. Retrieved October 26, 2022, from https://www.kaspersky.com/resource-center/definitions/what-is-a-digital-footprint 

[4] Guide to third-party-data: Third-party-data services. Mobilewalla. (n.d.). Retrieved October 26, 2022, from https://www.mobilewalla.com/third-party-data#what-is-third-party-data 

[5] Lee, R. (2022, August 10). Can your phone hear your conversations? (yes, but here’s how). Spiralytics. Retrieved October 26, 2022, from https://www.spiralytics.com/blog/mobile-ads-can-phone-hear-conversations-infographic/ 

[6] What is GDPR, the EU’s new Data Protection Law? GDPR.eu. (2022, May 26). Retrieved November 11, 2022, from https://gdpr.eu/what-is-gdpr/ 

[7] Daniela. (n.d.). CCPA compliance with Cookiebot CMP. Cookiebot. Retrieved November 11, 2022, from https://www.cookiebot.com/en/ccpa/?utm_source=google&utm_medium=cpc&utm_campaign=usa-generic&utm_device=c&utm_term=do%2Bi%2Bneed%2Ba%2Bcookie%2Bpolicy%2Bon%2Bmy%2Bwebsite%2Busa&utm_content=usa-eng-cookie-policy&gclid=Cj0KCQiA37KbBhDgARIsAIzce15QgUuLTccBBOR_gea1lFedi3w7Id85Ubz06ejheiLsMeEFvnrZgVoaAsUMEALw_wcB 

[8] Bennett, T. (2019). Screen time in the meantime: A parenting guide to get kids and teens internet safe. GetKidsInternetSafe Books. https://getkidsinternetsafe.com/parenting-guide/ 

Photo Credits  

Chris Yang: https://unsplash.com/photos/1tnS_BVy9Jk 

Maxim Hopman https://unsplash.com/photos/IayKLkmz6g0 

Gerd Altmann https://pixabay.com/images/id-1054708/ 

Hackers Can Access Your Computer’s Webcam Without Your Knowledge

Imagine finding out that a cybercriminal has been recording you in your bedroom for months and can do anything with that footage. Or what if you turn on your computer to find that you can’t access anything unless you pay a ransom to a hacker. What if a predator could view and speak to your child through a camera in their bedroom? You can help protect your family from becoming victims of cyber-attacks and ensure peace of mind by referring to our Screen Safety Toolkit, a resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems. This article will detail the risks and worst-case scenarios of webcam hacking as well as provide tips to help ensure your cybersecurity and safety.

How do cybercriminals hack webcams?

Hacking requires a specialized skillset that is increasingly accessible for the average tech user. In the sub-world of black hat computer hacking (hacking tech with bad intent), accessing private webcams is considered fairly easy. Further, there are several different methods utilized by black hat hackers to gain access to and take control over a computer’s web camera.

Spyware

One of the prominent methods employed by hackers to gain access to private computer webcams is through the use of spy software and remote administration tools (RATs). Webcam spyware is a type of computer application or program that allows the user to remotely take control over another user’s webcam. This enables the hacker to see whatever or whoever is in front of the computer’s web camera.

An alarming feature of this software is that it often allows the user to remotely turn the hacked computer on. Turning a computer off when it’s not being used is not enough to protect users from being spied on.

Spyware can be installed in webcam attachments and hard-wired webcams. The hacker can control audio and microphones, camera angles, zoom features, and focus. They can also record the footage so they can blackmail the victim later. Surprisingly, webcam spyware is freely available for download on the internet and can be installed on most operating systems.[1]

Internet Connection

Another common method of webcam hacking involves the use of web cameras that rely on remote access through WiFi. A common example of this type of web camera includes wireless security devices such as the popular Ring video doorbell.

Unfortunately, while these devices are intended to provide security for the user, they can also provide black hat hackers access to your home. If a camera is connected to a home WiFi router, it is vulnerable to hacking, especially if proper precautions aren’t taken to secure it. To avoid this, it is important to set secure network passwords for home WiFi routers. The default factory setting login information for routers can be accessed by anyone who is willing to look up the manufacturer’s startup support webpage. Failing to change your default router login can leave your wireless security cameras open to malicious hackers.[1]

Trojan Viruses

Perhaps the easiest way for cybercriminals to hack into your computer’s webcam is through the use of a Trojan computer virus. A Trojan virus is a type of malware deliberately designed to cause damage by infecting and subsequently taking control over your device. It is aptly named after the famous ancient Greek war story of the Trojan Horse because it is an attack disguised as a gift.

Trojan viruses are so effective because people mistakenly infect their own devices with them by downloading software that they believe is safe. This typically occurs when visiting a website that invites you to download a seemingly innocent file that actually contains malware instead of Adobe flash reader. The malware then infects the device, allowing the creator of the virus to gain complete control and access to your webcam and private files without your knowledge.[1,2]

Worst-Case Scenarios

Cassidy Wolf, Miss Teen USA

One of the most famous cases detailing the devastation caused by webcam hacking involves former Miss Teen USA, Cassidy Wolf. In 2012, Cassidy Wolf opened an email that she had received from someone whom she did not know. She was horrified to discover an attachment within the email containing several nude photos of her that were taken in the privacy of her bedroom. The photos were taken via the webcam installed on her computer.

The hacker attempted to blackmail Wolf into engaging in sexual acts with him through her webcam. If she refused, he threatened to share the nude photos with her friends and family.

The hacker turned out to be one of Wolf’s former classmates, Jared James Abrahams, who had installed Blackshades malware onto her laptop. The FBI was able to identify Abrahams who had victimized up to 150 women in his sextortion scheme and was subsequently sentenced to 18 months in federal prison.[3]

This event coincided with an FBI crackdown that led to the arrests of over 100 cybercriminals who created and used Blackshades, an inexpensive and easily utilized remote access tool primarily designed to hack webcams to facilitate sextortion crime. Blackshades was available for a mere $40 and sadly, countless people were victimized by the cybercriminals who maliciously employed it. [3,4]

Ring Cameras

In 2019, a mother installed a Ring security camera in the bedroom of her 8-year-old daughter for extra security. In a disturbing exchange caught on video, the 8-year-old girl walked into her room hearing strange music playing from an unknown source. The music abruptly stopped, and a man’s voice was heard saying “hello there.” This strange man had live video access of the young girl and was able to verbally communicate with her, a feature deliberately programmed into the Ring security camera. The man repeatedly used racial slurs when speaking to the girl and over several minutes, tried to get her to do various things. There have been similar Ring camera hacking incidents in recent years.[5]

Steps to Protect Your Privacy and Boost Cybersecurity

Technology is a powerful tool and with the advent of virtual learning and Zoom conferences as a result of the COVID-19 pandemic, web cameras have become an essential part of our academic and professional lives. Cases of webcam hacking are obviously terrifying, but there are simple steps that you can take to protect yourself and your family from attacks by cybercriminals.

Use Software Updates

Keep up with computer and software update alerts. They often contain patches For Weak Spots (points of entry easily exploited by hackers).

Secure Your WiFi with Password Protection

Once you have installed your router, create a new secure password to deter cybercriminals from being able to easily hack your devices.

Avoid Suspicious Downloads

Hackers can access your devices by getting you to unknowingly install malware, like Trojan viruses, through random links and downloads. Never click on links from websites that require you to download a file or program in order to access their site. Also, avoid downloading attachments and opening links sent via email from people you do not know and trust.

Invest in Security Software

While there are free security software services available, investing in subscription software will provide better cybersecurity. Approach your cybersecurity with the same regard as you do for your home security. Good security software will help protect you by blocking malware that would potentially give hackers access to your devices.

Use Legitimate Tech Support

Be careful of who you allow access to your devices. When IT support is needed, only use trusted and reputable services. Avoid using freelance computer technicians. There have been instances where freelance technicians who were hired to fix devices have instead installed malware onto the client’s computers for nefarious purposes.

Install a Physical Webcam Cover

The most surefire way to ensure that cybercriminals are not spying on you through your device’s camera is to install a physical covering over the lens. When most web cameras are on, a light next to the lens turns on signaling that the camera is in use. However, hackers can disable this light, so relying on that alone is not enough to ensure your privacy. There are products available specifically designed as device camera coverings that attach to your devices right over the camera lens. The covering can be slid open when you want to use your camera and closed when you do not. You can also just simply cover your web camera lens with a post-it note or a piece of opaque tape.

GKIS Screen Safety Toolkit

Our Screen Safety Toolkit is an invaluable resource for providing you and your family with enhanced cybersecurity. Researching digital safety tools can be an overwhelming process. But thankfully, we’ve done the work for you! If you have screen-loving kids or teens, sound parenting strategies are not enough for fostering online safety. You also need smart tech tools for filtering, monitoring, and management. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems.

GKIS Cyber Security Supplement

Our Cybersecurity & Red Flags Supplement is comprised of three helpful tools in one service. You can protect your family from hacking, scamming, malware, and phishing with our cybersecurity and best practices checklist. Our GKIS online safety red flags for kids & teens provides parents with Dr. Bennett’s clinical teaching list that will help parents educate their kids about red flags to be aware of and alert them to the tricks that are often employed by online predators and other cybercriminals. Additionally, our GKIS online safety red flags for parents will provide parents with Dr. Bennett’s clinical expertise, which she’s developed over 25+ years as a clinical psychologist, in identifying behavioral red flags that may signal your child is suffering from digital injury.

Other helpful GKIS resources

You can find more valuable information regarding screen safety in Dr. Bennett’s parenting guide, Screen Time in the Mean Time. Additionally, you can check out this article How Cybercriminals Steal Sensitive Data to learn more about the potential risks to your cybersecurity so that you can be better equipped to protect yourself and your family.

Thanks to CSUCI intern, Mackenzie Morrow for researching the dangers of webcam hacking as well as cybersecurity measures to prevent it and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Batt, S. (2020). How easy is it for someone to hack your webcam? Make Use Of. https://www.makeuseof.com/tag/how-easy-is-it-for-someone-to-hack-your-webcam/

[2] Johansen, A. (2020). What is a Trojan? Is it a virus or is it malware? Norton. https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html

[3] Daily Mail. (2014). More than 90 people arrested in ‘creepware’ hacker sting as victim Miss Teen USA describes ‘terror’ at being watched through her webcam for a year. Daily Mail. https://www.dailymail.co.uk/news/article-2638874/More-90-people-nabbed-creepware-hacker-sting-victim-Miss-Teen-USA-describes-terror-watched-webcam-YEAR.html

[4] Cooper, A. (2014). CNN Anderson 360 Cassidy Wolf Miss Teen USA. CNN. https://www.youtube.com/watch?v=sc3nG87OYW8

[5] Chiu, A. (2019). She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter. The Washington Post. https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/

Photos Credited

Photo by Nikita Belokhonav (https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/)

Photo by cottonbro (https://www.pexels.com/photo/people-woman-coffee-laptop-6964510/)

Photo by cottonbro (https://www.pexels.com/photo/laptop-with-cyber-security-text-on-the-screen-5483240/)