Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382
{"id":141,"date":"2014-11-12T13:48:46","date_gmt":"2014-11-12T13:48:46","guid":{"rendered":"http:\/\/tedstechshack.com\/?p=141"},"modified":"2014-11-15T21:41:39","modified_gmt":"2014-11-15T21:41:39","slug":"we-are-watching-you","status":"publish","type":"post","link":"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/","title":{"rendered":"We Are Watching You"},"content":{"rendered":"

Recently there has been a lot of media hoopla over a website that displays IP cameras from all over the world. \u00a0The site looks to be based in Russia and purports to exist in order to demonstrate the importance of changing your device's default credentials.<\/p>\n

\"This site has been designed in order to show the importance of the security settings. To remove your public camera from this site and make it private the only thing you need to do is to change your camera password.\"<\/p><\/blockquote>\n

Which I suppose is a reason to create a site like this. \u00a0After all, it is getting the media's attention. \u00a0However, I suspect that the reason might have more to do with the ad revenue being generated on the site as opposed to education. \u00a0I am sure the operator would say that the ads are to cover the costs of running the site.<\/p>\n

I have worked on some pretty high-profile IP cams over the past few years and I have observed that my systems were being constantly probed. \u00a0The bulk of the probes have been coming from China, Taiwan, and Eastern Europe. \u00a0These are areas of the world that seem to have more than their fair share of probes and attacks. \u00a0I have done my best to ensure that my systems are not breached, and to my knowledge they never have been.<\/p>\n<\/div><\/div><\/div>

<\/div><\/div><\/div><\/div>

The insecam.com site comes as no surprise to me as I have been watching IP cameras from all over the world for years now. \u00a0There are plenty of databases where folks can register any \"open\"<\/em> devices that they discover. \u00a0There exists plenty of software and web applications that are designed specifically to scan and probe IP cams, and just about any other connected device. \u00a0There is even malware or perhaps more appropriately spyware<\/em> \ud83d\ude42 that is designed to infect your computer and gain control of your webcam. \u00a0Last year there was a high-profile case in which Miss Teen USA 2013 was the victim of extortion after her laptop webcam was taken over. \u00a0The cracker took video of her, in her room, without her knowledge, and then threatened to release the pictures if she didn't perform online sex acts for him.<\/p>\n

I personally don't like cameras in my house. \u00a0I have been poked fun of, because I will usually tape over the webcams and mics on my laptops. \u00a0I understand that when we are in public we are constantly being watched, but I do not care to invite prying eyes into my own home. \u00a0As Cassidy Wolf discovered, just because the camera's light is not on, does not mean it is not active. \u00a0I suggest that you put a little piece of electrical tape over your camera. \u00a0It is a low tech solution for a high tech problem. \u00a0If you want to use your camera, simply take the tape off. \u00a0So far I haven't had any problems with glue residue, but I can't vouch for your tape so you might want to test it on an\u00a0inconspicuous area before putting it over your lens.<\/p>\n

In Miss Wolf's case her attacker infected her laptop with a $40 piece of malware that not only allowed him control of her webcam, but also enables the controller to deny access to files and to record keystrokes. \u00a0The FBI reports<\/a> that more than 500,000 computers world-wide are infected with this one piece of malware.<\/p>\n

The massive data breaches this year have received some media attention, but none of the sensationalism of the photo and camera hijackings. \u00a0Take a look at this wonderful infographic<\/a> to get an idea of how big the data breaches this past year stack up historically. \u00a0Still, the camera hijackings are much more\u00a0personal<\/em>. \u00a0 \u00a0Jared James Abrahams was sentenced to 18 months<\/a> in federal prison for his\u00a0sextortion<\/em> case. \u00a0Although Miss Wolf did not submit to Jared's demands at least two other teens did.<\/p>\n

The idea that children can be exploited in this manner is abhorrent and shows that our ubiquitous technology can be very dangerous. \u00a0Technology is a tool. \u00a0As such, it can be used for moral, amoral, or immoral purposes. \u00a0As our civilization becomes ever increasingly dependent on our technology these issues will continue to grow more hazardous.<\/p>\n

It is important that we have at least a basic understanding of what is dangerous behavior. \u00a0Just like us\u00a0country folk<\/em> can be obvious marks in the city, most people on the Net are marks to\u00a0hackers<\/em>. \u00a0Even other hackers can be marks, just like criminals target other criminals.<\/p>\n

You may notice that I don't use the term \"hackers\" very often when I am talking about \"attackers\" and \"crackers\". \u00a0I come from a time when you could not bestow yourself the title of\u00a0hacker<\/em>, it was something that was earned and bestowed by your peers. \u00a0A title that was held in high esteem. \u00a0I am sorry to say that at this point in history we have lost the original meaning of hacker to the media and popular culture. \u00a0Some have taken to labeling hackers as\u00a0white, grey, <\/em>and black hats. \u00a0<\/em>Trying to distinguish between good, neutral, and evil. \u00a0But I always understood hacker<\/em> to be a title of skill and not morality. \u00a0And then there are\u00a0gurus<\/em>, but I will leave that for another post. \u00a0\ud83d\ude42<\/p>\n

The Net is no longer the playground of the few, it has become a world of its own, a world capable of affecting the\u00a0real<\/em> world. \u00a0The philosopher in me longs to drone on about what is the \"real world\" but I won't. \u00a0The point is to not go blindly into the cyber reality thinking that it has no effect on your reality. \u00a0The cyber world is enmeshed onto our reality. \u00a0You should no more venture on to the Net naively, than you would walk with your family down the streets of NYC wearing \"I \u2665\u00a0NY\" t-shirts. \u00a0No dis on NYC, just something I think most people can relate to. \u00a0If you have never seen this gem<\/a>, maybe it will help illustrate my metaphor.<\/p>\n

Educate yourself, be careful, behave responsibly, and most of all, have a good time.<\/p>\n

 <\/p>\n

 <\/p>\n

 <\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"

Recently there has been a lot of media hoopla over a website that displays IP cameras from all over the world. \u00a0The site looks to be based in Russia and purports to exist in order to demonstrate the importance of changing your device’s default credentials. “This site has been designed in order to show the […]<\/p>\n","protected":false},"author":1,"featured_media":142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":""},"categories":[4],"tags":[],"jetpack_featured_media_url":"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/IAO-logo.png","jetpack_publicize_connections":[],"yoast_head":"\nWe Are Watching You - Ted's Tech Shack<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We Are Watching You - Ted's Tech Shack\" \/>\n<meta property=\"og:description\" content=\"Recently there has been a lot of media hoopla over a website that displays IP cameras from all over the world. \u00a0The site looks to be based in Russia and purports to exist in order to demonstrate the importance of changing your device's default credentials. "This site has been designed in order to show the […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/\" \/>\n<meta property=\"og:site_name\" content=\"Ted's Tech Shack\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-12T13:48:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-15T21:41:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/IAO-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"658\" \/>\n\t<meta property=\"og:image:height\" content=\"669\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tedstechshack.com\/#website\",\"url\":\"https:\/\/tedstechshack.com\/\",\"name\":\"Ted's Tech Shack\",\"description\":\"Solving your technology needs!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/tedstechshack.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/IAO-logo.png\",\"width\":658,\"height\":669},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/#webpage\",\"url\":\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/\",\"name\":\"We Are Watching You - Ted's Tech Shack\",\"isPartOf\":{\"@id\":\"https:\/\/tedstechshack.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/#primaryimage\"},\"datePublished\":\"2014-11-12T13:48:46+00:00\",\"dateModified\":\"2014-11-15T21:41:39+00:00\",\"author\":{\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tedstechshack.com\/2014\/11\/12\/we-are-watching-you\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\",\"name\":\"Ted Parvu\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04344bf248172739a95607c68db267dc?s=96&d=retro&r=pg\",\"caption\":\"Ted Parvu\"},\"description\":\"My hacking career began at age 12, when my father brought home a Sinclair ZX-81 computer kit and a lifelong fascination with computing was born. I became a privacy and security advocate after learning of the US Government's criminal investigation against Phil Zimmermann. Years later I found myself in Silicon Valley being paid to hack Phil's PGP code. I soon tired of the rat race and moved to the Northwoods of Minnesota where I have over 2 million acres of protected wilderness to roam. Here I indulge in my passions for wilderness and technology and as an advocate for computer security and privacy.\",\"sameAs\":[\"https:\/\/www.facebook.com\/tedstechshack\",\"https:\/\/www.linkedin.com\/pub\/ted-parvu\/41\/b22\/25\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5bhup-2h","_links":{"self":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/141"}],"collection":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/141\/revisions\/235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}