Professional Documents
Culture Documents
19, 2010
contained in a student's personal laptop . . . at any time it chose and to view and capture whatever images
were in front of the webcam" without the knowledge or approval of the laptop's users, the suit says.
It does not say what improper activity Robbins was accused of or what, if any, discipline resulted.
Reached at home yesterday, his mother, Holly, said she could not comment on advice of the family's
lawyers.
Blake Robbins, answering the door at his home, said he, too, could not comment. With a mop of brown
hair and clad in a black T-shirt and jeans, he smiled when told the suit had earned him a Wikipedia page
and other Internet notoriety.
Mark Haltzman, a lawyer with the Trevose firm of Lamm Rubenstone, which represents the Robbins
family, did not return calls seeking comment. Matsko's husband said the assistant principal could not
comment.
Fueled with state grants, the Lower Merion district issued laptops to all 2,300 high school students,
starting last school year at Harriton and later at Lower Merion High, to promote more "engaged and
active learning and enhanced student achievement," Superintendent Christopher W. McGinley said in a
statement.
McGinley and Lower Merion School Board President David Ebby did not respond to requests for
comment.
Families in the 6,900-student district reacted with shock. Parent Candace Chacona said she was
"flabbergasted" by the allegations.
"My first thought was that my daughter has her computer open almost around the clock in her bedroom.
Has she been spied on?"
Victoria Zuzelo, a senior at Harriton, said she and other students had been told about the security feature,
and knew the district had the right to search computer hard drives at school.
Some students had taken to covering webcams in school with paper because they thought they might be
watched, she said. "But . . . they would never think the school would be watching them at home. I'm not
sure who to believe, but I'm hoping it is not true because if it was, it would really be outrageous."
Lillie Coney, associate director of the Electronic Privacy Information Center, a privacy watchdog group
in Washington, said she had not heard of any other case in which school officials were accused of
monitoring student behavior at home via a computer. If the allegations are true, she said, "this is an
outrageous invasion of individual privacy."
Witold J. Walczak, legal director of the American Civil Liberties Union of Pennsylvania, told the
Associated Press: "School officials cannot, any more than police, enter into the home either electronically
or physically without an invitation or a warrant."
Virginia DiMedio, who as the Lower Merion district's technology director until she retired last summer
helped launch the laptop initiative, said yesterday: "If there was a report that a computer was stolen, the
next time a person opened it up, it would take their picture and give us their IP [Internet protocol] address
- the location of where it was coming from."
She said that the feature had been used several times to trace stolen laptops, but that there had been no
discussion of using it to monitor students' behavior. "I can't imagine anyone in the district did anything
other than track stolen computers," she said.
DiMedio said the district did not widely publicize the feature "for obvious reasons. It involved computer
security, and that is all it was being used for."
She added: "People ask you all the time, 'Can you do this? Can you do this?' . . . But you have to be
conscious of students' rights. I would not have walked into that swamp. . . . You want kids to use the
technology. You want them to feel safe, to feel trusted."
The laptop initiative, she said, is "a wonderful program. There were kids in some of the poorer areas that
had none of the resources that the other students had. That was what the initiative was for - to give kids a
chance."
In a published policy statement, the district warns that laptop users "should not expect that files stored on
district resources will be private," and says the network administrator "may review files and
communication to . . . ensure that students are using the system responsibly."
Southworth, director of a safe-technology project called Safety Net, said the earliest cases
typically involved abusive husbands who used tools developed for parents to keep a remote eye
on children.
One victim told Southworth that her ex-husband had wired her entire house with cameras when
they separated in 1994. Another reported that her husband had hidden a camera in a kitchenbased computer behind a fan vent.
"He knew when she had company over and knew when she was alone, and when she was alone
he would call and threaten her," Southworth said.
Things took a disturbing turn as Web cams became common and remote-control software more
sophisticated, several experts said.
Now, the same software that allows help-desk personnel to take over your computer to diagnose
a malfunction can be used, at least in theory, to activate and control your Web cam. And
software to turn a Web cam into a spy camera is available online.
Lauren Weinstein, a California computer consultant and founder of an online privacy forum, said
the Lower Merion controversy reflected just a small corner of concerns about Web cams and
privacy invasion.
In a lawsuit, a Lower Merion family says an administrator confronted the Harriton High School
student with a photo allegedly taken by the laptop camera. District officials have acknowledged
that the Apple laptops the school distributed came with a security feature that could snap pictures
if the computers were reported lost or stolen.
If the family's claims are true, Weinstein said, "by not disclosing that the capability was there,
the school made an enormous mistake." But he said a bigger issue was how such technology
could be used by outsiders.
"With any security software that has this kind of capability, you don't have to worry so much
about legitimate users," such as a help desk. "The problem is that you open it up to manipulation
by untrusted third parties."
It is not clear how well smaller businesses and organizations limit the use of remote-control
software. But large companies are aware of the risks of illegitimate use.
Dell, for instance, strictly limits staffers' capacity to take control of customers' computers
through its Dell Connect service, which spokeswoman Jennifer Davis likened to having a
technician "sitting next to you working on the computer."
Davis said customers must sign up online and agree to the service's terms. Then they are issued a
temporary code to initiate the help session. If the session has not begun within 15 minutes, the
authorization expires, she said. Every session requires a new code - even if a session ends
because a connection is momentarily lost.
Even with all that, there are special restrictions for access to customers' Web cams. "The agent
may not activate the Web camera during a Dell Connect help session unless they are
troubleshooting the Web camera," she said. "The customer must agree, and it has to be
documented in that session," either by a voice or text acknowledgment.
Sophisticated remote-control software is a double-edged sword, spyware experts say.
"The same technology that's used by help desks is used by hackers," said Ari Schwartz, associate
director of the Center for Democracy and Technology. "Basically, once they have control of your
computer, they can do whatever they want with it."
That means a hacker could execute any sort of command or software manipulation on your
computer - including disabling the light that signals your Web cam is on, unless it is hard-wired.
Even if such software is rarely used to activate Web cams, computer experts are well aware of
the risks. And the old Silicon Graphics solution, which bypasses the software, is a favored
approach.
"You go to security conferences," Schwartz said, "and people have a piece of paper taped over
the camera."