Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights

Most laptops and personal computers have webcams with LED indicators to notify users when they are recording. Because hackers use surreptitiously captured webcam recordings to extort users, we explored the effectiveness of these indicators under varying circumstances and how they could be improved. We observed that, on average, fewer than half of our participants (45%) noticed the existing indicator during computer-based tasks. When seated in front of the computer performing a paper-based task, only 5% noticed the indicator. We performed a followup experiment to evaluate a new indicator and observed that adding onscreen glyphs had a significant impact on both computer-based and non-computer-based tasks (93% and 59% noticed the new indicator, respectively). We discuss how our results can be integrated into current systems, as well as future ubiquitous computing systems.

[1]  Stephen Checkoway,et al.  iSeeYou: Disabling the MacBook Webcam Indicator LED , 2014, USENIX Security Symposium.

[2]  Abigail Sellen,et al.  Now let me see where i was: understanding how lifelogs mediate memory , 2010, CHI.

[3]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[4]  Alex Pentland,et al.  The memory glasses: subliminal vs. overt memory support with imperfect information , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[5]  Ronald Azuma,et al.  Recent Advances in Augmented Reality , 2001, IEEE Computer Graphics and Applications.

[6]  Ronald Azuma,et al.  A Survey of Augmented Reality , 1997, Presence: Teleoperators & Virtual Environments.

[7]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[8]  Paul Lukowicz,et al.  The WearARM: modular, high performance, low power computing platform designed for integration into everyday clothing , 2001, Proceedings Fifth International Symposium on Wearable Computers.

[9]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[10]  J. Patton,et al.  Factor structure of the Barratt impulsiveness scale. , 1995, Journal of clinical psychology.

[11]  Jo-Mae B. Maris,et al.  Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects , 2006, J. Inf. Syst..

[12]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[13]  Helen Nissenbaum,et al.  Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.

[14]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[15]  Kori Inkpen Quinn,et al.  Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.

[16]  Lorrie Faith Cranor,et al.  Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.

[17]  W. Keith Edwards,et al.  At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.

[18]  Roberto Tamassia,et al.  Secure Visualization of Authentication Information: A Case Study , 2004, 2004 IEEE Symposium on Visual Languages - Human Centric Computing.

[19]  Eric Campo,et al.  A review of smart homes - Present state and future challenges , 2008, Comput. Methods Programs Biomed..

[20]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[21]  S. Frederick Journal of Economic Perspectives—Volume 19, Number 4—Fall 2005—Pages 25–42 Cognitive Reflection and Decision Making , 2022 .

[22]  M. Chan,et al.  Smart homes - current features and future perspectives. , 2009, Maturitas.

[23]  Ingrid M. Martin,et al.  Intended and Unintended Consequences of Warning Messages: A Review and Synthesis of Empirical Research , 1994 .

[24]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[25]  Pattie Maes,et al.  eye-q: eyeglass peripheral display for subtle intimate notifications , 2006, Mobile HCI.

[26]  Jeffrey S. Shell,et al.  Augmenting and sharing memory with eyeBlog , 2004, CARPE'04.

[27]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[28]  Lorrie Faith Cranor,et al.  What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.

[29]  Gareth J. F. Jones,et al.  Augmenting human memory using personal lifelogs , 2010, AH.

[30]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.