Can People Really Spy on Your Webcam?

In December of 2013, many news outlets were reporting that the FBI has had the technology to spy on people’s webcams without turning on the camera’s indicator lights, and even worse, they’ve had this technology for years. The webcam is a source of intimacy to many people who browse the Internet on a daily basis. Some have made makeshift solutions that involve sticking little pieces of paper on the lens when the camera is not in use. But is there really much to be afraid of? How far can organizations (and hackers) go into your computer without your permission?

How The FBI Did It

The question we must ask ourselves before assessing the level of danger in this situation is: How did the FBI manage to get into people’s webcams?

Here’s the answer: The FBI used Remote Administration Tools (RATs) to access the cameras in some computers belonging to high-profile individuals it was investigating. This is the same way that hackers gain access to certain hardware in your computer and exploit it to their advantage.

Remote administration tools are pieces of software installed on your computer that allow any number of interactions with it from a place that doesn’t necessarily have to exist on the same network as you do (hence the term “remote”). If you rely on a web panel to control your computer or router from work or while you’re out of the house for whatever reason, you’re using a remote administration tool to do these things. The amount of “administration” allowed by the tool depends entirely on what it was designed to do and how much permission it has from the operating system to perform these tasks.

Assessing The Threat Level


Now that we know the way in which RATs work, we need to find out whether they present a high level of danger. Well, the FBI can’t just open the administrative tool on its own system and expect it to somehow magically “hack” your webcam. It has to be installed and executed onĀ your system in order to capture your webcam’s output.

RATs have two components: a client and a server. The server is installed on the hacker’s computer and does not harm him. The client will have to be installed on your computer for the server to have access to your system. Once those two criteria are met, the two components will communicate with each other, giving the server a backstage pass to all your hardware and files.

RATs aren’t a new thing. They’ve been around since the mid-90s and peaked around the turn of the 21st century. Because the person on the other end needs to “infect” you in order to have access to your webcam, this means that you actually have to install it on your computer (voluntarily, but without proper knowledge of the file) to give away access.

Seeing as you still fit into the equation somewhere, it all has to do with your own prudence. As long as you avoid opening files in emails from strange people and downloading singular EXE files from the web directly, you’re probably not going to experience this issue.

If You’re Still Afraid

There’s reason to still be concerned of the threat regardless of the fact that hackers are powerless unless you install their client software. What if, by mistake, you actually execute one of their viruses? If you feel that protecting your camera is important, put something in front of it when you’re not using it or unplug it (if you have a USB camera, like I do). Of course, if you’re feeling a little more sophisticated, you can always go with Nope, a magnetic camera cover.

Would you like to add to the conversation? It’s your turn, and the comments section below is your canvas! Post a comment if you have something to say!

Miguel Leiva-Gomez Miguel Leiva-Gomez

Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.


  1. While there might be ways for people to access your PC whilst you browse the web and perform other activities, the bottom line is NONE of that is possible UNLESS you give them “permission” to do it. And just like the article states, you have to either install something or click on some link or shortcut to a link. Being a computer technisicn for over 15 years, I have seen the gamut of infections, viruses, trojans, SQL injections, rougue code, and scripts. The number ONE thing that will keep you safe in regards ot your computing life?:

    Get a Solid and reputable anti-virus / malware / adware program. – These range from the “cute and bubbly’ to the “enterprise serious” models and you can never have too much! While ONE suite might work well, you can always bolster it with other programs that are designed to do just ONE thing, but that do that ONE thing EXTREMELY well!

    DON’T TRUST ANYBODY! – Even if that email came from your Uncle in Idaho, when was the last time he sent you some email with NOTHING in it but a blue link with a lot of letters, numbers, and special symbols? (question marks, equals signs, the “at” symbol from emails etc…) Most likely this is a spammed mesage with a link in it that is designed to “take” you to somew web site, ALSO unbeknownst to most, while you may think it’s JUST taking you to a new website….this same innocent looking link could be depositing “trace” bits of code that will grant the sender access to your machine (provided your PC stays on for extended periods of time… won’t do this person much good if you’re only online from 12 to 3 every Saturday and then only during the “odd” months of the calendar year!)

    And finally and this might actually insulr or offend some people but take it as its given: READ!…….make it a habit to read those articles that spark a bit of interest in your mind. Visit techie web sites and try to grasp a concept ofsome software or application or operating system that you might think would be benficial for you to know. Instead of just watching YouTube videos, maybe visit sites like the site….or even going to the sites you wouldn’t normally visit, maybeone of the open source channels…Unix…..Linux…..Apple’s Mac OS…….Windows……if you try to keep abreast with these tehnologies, you won’t find yourself being fooled by spam….malware….viruses…and trojans. Granted there are SOME javascripts, and terminal coding that doens’t have anything to do with your intervention….all it would take is for them to find their way “into” an update of your system and you could findyourself completely ruined technologically speaking, but for the most part, by arming yourself with knowledge you can make better choices regarding your OS….your programs…..your file systems etc.

    1. Great comment!

      I particularly agree with the last part – reading and learning about technology is incredibly important. No one’s saying you have to be an “expert” at anything, but a certain level of knowledge is required to be able to take care of your computer and your data.

      And the mindset that computers are “just machines” and that the Internet is somehow separate from or opposed to “real life” is seriously flawed. Both computers and the Internet are very much an integral part of your everyday life, and to be a responsible user you need to have at least a basic understanding of technology. True, it’s easier to just pay someone to repair and maintain your PC, but it’s not always the safest choice.

  2. Thats disgusting things to do that. No wonder the people like that is the scum of the Earth. Human being can be disgusting creature ever created on Earth. Sometimes I am ashamed to be Human Being but I am glad that I am humble, decent, and respectful not like those people. Sighing. Sorry about my English.

Comments are closed.