• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • February 22nd, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Surveillance » FBI can secretly turn on laptop cameras without the indicator light

FBI can secretly turn on laptop cameras without the indicator light

December 11th, 2013 Waqas Surveillance 1 comments
FBI can secretly turn on laptop cameras without the indicator light
Share on FacebookShare on Twitter

FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners.

fbi-can-secretly-turn-on-laptop-cameras-without-the-indicator-lightAccording to a recent publication of the Washington Post, G-men have developed the ability to remotely access cameras which capture real images and transmit them to the investigators. The cameras are accessed without their lights turned on so that the suspect would presume that the camera is not active.

The FBI can also hack into the computer of the suspect and can gather photographs, emails and downloaded files.

These new abilities of FBI came to be known in their investigation of some mysterious guy with the name “Mo”. This guy has threatened to blow down a building which had thousands of innocent civilians unless the authorities release the suspect (James Holmes) of the shooting at Colorado movie theatre.

This guy has also given the threat to blow up a hotel, three colleges and a jail. However no explosives material was found at those targets. The contact between MO and the FBI first happened in July 2012. The duration of the interaction between FBI and Mo is not yet known.

The post mentions that Mo contacted through an encrypted phone and a non-traceable email. After being frustrated by failure to catch Mo, FBI used a specially made software that would automatically install itself on the computer of Mo as he opens his email. The software was though designed to track down Mo and check on his movements, but it did not work out in the manner intended. Mo is still to be caught. The Feds got the permission to install the above mentioned software from a judge in Denver.

The agency also tried to use the software on one more probe but the permission was turned out by a Houston judge on grounds that is both unconstitutional and extremely intrusive. A former employee of FBI has also told the Washington Post that the agency has the capabilities to break into the web cams of computers. The technology is quite controversial and it is not known that how many times the agency has tried to use it.

Follow @HackRead

  • Tags
  • Cam
  • Cams
  • Cybercrime
  • FBI
  • Laptop
  • NSA
  • Spying
  • Surveillance
  • Webcam
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Official United Nation Ethiopia Website Hacked by Turkish Ayyıldız Tim
Next article Hacker in US hacks consumer drones for personal use [Video added]
Waqas

Waqas

Waqas Amir is a UK-based cybersecurity journalist with a passion for covering latest happenings in cyber security and tech world. In addition to being the founder of this website, Waqas is also into gaming, reading and investigative journalism.

Related Posts
Taking Care of Your Personal Online Security (For Paranoids)

Taking Care of Your Personal Online Security (For Paranoids)

Understanding VPN through open systems interconnection model

Understanding VPN through open systems interconnection model

Chinese facial recognition database tracking Muslims left exposed

Chinese facial recognition database tracking Muslims left exposed

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
Android banking malware distributed with fake Google reCAPTCHA
Android

Android banking malware distributed with fake Google reCAPTCHA

Feb 22nd, 2019 53
Taking Care of Your Personal Online Security (For Paranoids)
Surveillance

Taking Care of Your Personal Online Security (For Paranoids)

Feb 22nd, 2019 188
Understanding VPN through open systems interconnection model
Leaks

Understanding VPN through open systems interconnection model

Feb 21st, 2019 425
Major Android ad fraud scam campaign drains battery & eats data
Cyber Crime

Major Android ad fraud scam campaign drains battery & eats data

Feb 21st, 2019 328

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in Milan, Italy.

Follow us