- Logan Paul is the worst YouTuber of the year 5 Years Ago
- All the things Trump boasted about in 2018 that didn’t actually happen 5 Years Ago
- How to watch Freeform online for free Today 6:00 AM
- Amazon Fire TV Cube: What You Need to Know Today 5:30 AM
- Stephen Miller’s fake hair is almost as bad as his policies Sunday 8:00 PM
- California no longer plans to tax your text messages Sunday 6:45 PM
- Insurance company to ‘reevaluate’ relationship with Tucker Carlson after racist comment Sunday 3:59 PM
- Netflix’s instant rewind button is not popular with users Sunday 2:20 PM
- Offset interrupted Cardi B’s set at Rolling Loud Festival, and fans are pissed Sunday 1:18 PM
- ‘Ms. Marvel’ gets a new, award-winning writer in Saladin Ahmed Sunday 11:32 AM
- ‘SNL’ gives us the daddy pageant we’ve been dying for Sunday 10:28 AM
- How pranksters fooled the internet in 2018 Sunday 8:00 AM
- 2018 belonged to trans people Sunday 6:30 AM
- How to watch local channels on Roku Sunday 6:30 AM
- How to watch Levante vs. Barcelona online for free Sunday 6:19 AM
the FBI supposedly has the ability to disable your webcam’s indicator light.
Not only can the FBI activate cameras on civilian computers, but the agency has been doing so for several years. That’s according to Marcus Thomas, a former assistant director with the bureau, who spoke to the Washington Post about the controversial computer hacking technique used by law enforcement in the United States.
Most webcams come equipped with an indicator light, which alerts users when they’re being recorded. However, the FBI supposedly has the ability to disable this feature.
The tactic has been utilized “mainly” against suspected terrorists but is also used in non-terrorism related investigations, Thomas said. One issue highlighted by the Post is the difficulty law enforcement agencies face in determining jurisdiction while intercepting online communication. For instance, state or local law enforcement officers may only have the authority to perform surveillance on an individual within their state or municipal boundaries.
In April, a federal magistrate judge in Texas refused to sign a warrant because the location of an individual, who was suspected of bank fraud, could not be determined, the Post reported. While the FBI may not face the same jurisdictional limitations, it has implored Congress in the past to allow for the sharing of technical expertise with state and local law enforcement officials.
Side by side: article about how the FBI watches people via their webcams and section of ‘1984’ about telescreens pic.twitter.com/BBlFBgD3wA
— Jon Schwarz (@tinyrevolution) December 7, 2013
Legal limitations placed on online surveillance have long been considered a hindrance to the FBI. Compared to the National Security Agency, the FBI has been extraordinarily vocal about its intentions. The agency’s primary goal in 2013, as stated by Andrew Weissman at the American Bar Association, was to expand wiretapping capabilities to include all forms of real-time online communication, such as conversations that take place over Google chat.
Valerie Caproni, a former FBI general counsel, previously outlined the agency’s concerns before the House Subcommittee on Crime, Terrorism, and Homeland Security. “The challenge facing our state and local counterparts is exacerbated by the fact that there is currently no systematic way to make existing federally developed electronic intercept solutions widely available across the law enforcement community,” she told members of Congress.
Caproni’s testimony included descriptions of two criminal investigations, which she said illustrated the need for increased surveillance powers. The first case cited involved a narcotics investigation; the second, the distribution of child pornography. Both of these crimes, while serious violations of the law, do not constitute a threat to national security.
In 2012, the FBI was allocated $54 million by the U.S. Senate to establish the Domestic Communications Assistance Center (DCAC or NDCAC), a secretive unit charged with enhancing the U.S. government’s Internet-based wiretapping capabilities. While the exact nature of NDCAC’s operations are hidden from the public record, what is known is that customized wiretapping hardware is developed at their Quantico, Va., headquarters.
New wiretap technologies developed by NDCAC are implemented through the Communications Assistance for Law Enforcement Act (CALEA), a law that requires telecommunications carriers—including Internet service providers—to accommodate government surveillance by retrofitting their equipment. In coordination with other agencies, the FBI has continuously sought to expand the authority granted to it by CALEA.
In response to questions about NDCAC, an FBI official told reporters, “The NDCAC will have the functionality to leverage the research and development efforts of federal, state, and local law enforcement with respect to electronic surveillance capabilities and facilitate the sharing of technology among law enforcement agencies.“
Law enforcement techniques generally advance to remain proportional to methods of criminals, who may be aided by new technologies while committing crimes or evading capture. However, since disclosing capabilities could weaken operations targeting dangerous criminals, critics warn that the state’s authority is subject to abuse. That’s only heightened by the digital nature of these tactics, which could prevent citizens from knowing of rights violations.
If police were to inadvertently perform a search on the wrong house, for example, the owner could take legal action against the department responsible. In contrast, if that same individual’s rights are infringed when police hack the wrong webcam, the violation is far less likely to be exposed.
The debate over state surveillance powers isn’t likely to end anytime soon. If you’d prefer to not get shy while standing in front of your appliances, you can always slap duct tape over your webcam.
Illustration by Dell Cameron
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.