Discovered a live public webcam feed of a child’s room, reached out to Rogers ISP but received indifference—what steps should I take next?

Taking Action Against Public Webcam Vulnerabilities: A Community Approach

Recently, I came across a concerning situation that reflects the potential risks associated with Internet of Things (IoT) devices. While exploring Shodan, a search engine focused on detecting security vulnerabilities, I discovered a public webcam streaming live from a child’s bedroom. Upon realizing the gravity of this discovery, I felt compelled to act, not only as an IT professional but also as a concerned parent.

Initial Contact With the ISP

The webcam’s IP address indicated that it belonged to a Rogers customer in Canada. With a sense of responsibility, I reached out to Rogers’ customer support to report the potential privacy breach. Unfortunately, my experience was less than satisfactory. First-level support directed me to a supervisor, where I spent a considerable amount of time explaining the situation, only to be told that I should contact either the authorities in Austria (my home country) or the Canadian authorities directly.

This roundabout handling of a serious issue felt frustrating, and it left me feeling as though my efforts would lead nowhere. It’s alarming to think that a situation involving a child’s privacy could be dismissed so readily.

Taking Further Steps

After my disappointing conversation with Rogers’ support, I decided to reach out to several organizations that might assist in addressing this issue, including:

  • Rogers Abuse Department: [email protected]
  • Canadian Office of the Privacy Commissioner
  • Canadian Centre for Cyber Security

I attempted to contact the Canadian authorities at the number provided by Rogers but encountered difficulties in reaching someone. It appears that navigating these channels effectively is not always straightforward, particularly when the issue at hand is serious but does not qualify as an immediate emergency.

Community Support and Updates

I greatly appreciate the outpouring of support from individuals who offered assistance and shared their thoughts on how to handle this situation. Much to my relief, I received a response from Rogers stating that they have escalated the matter and would be contacting the webcam owner directly. Additionally, as of January 26, the webcam feed has since been secured with a password, indicating that action has been taken.

Continuing the Conversation

This incident has highlighted the importance of community awareness and vigilance when it comes to online privacy, especially regarding the safety of children. It’s crucial for all of us to stay informed about potential vulnerabilities in devices that connect to the internet. If you

Share this content:

One Comment

  1. If you’ve discovered a public webcam feed that poses a privacy or security risk, it’s important to act promptly and responsibly. Since you’ve already contacted the ISP and reached out to relevant authorities with limited success, here are some additional steps you can take:

    • Document Everything: Keep detailed records of your findings, correspondences, and any responses received. This documentation can be valuable if authorities or cybersecurity organizations need to investigate.
    • Report to Cybersecurity Organizations: Contact organizations like the Canadian Centre for Cyber Security or CERT (Computer Emergency Response Team) in your region to report the vulnerability. They can provide guidance or escalate the issue appropriately.
    • Notify the Device Owner (if possible): If you can identify or contact the owner or administrator of the device privately and securely, consider informing them of the vulnerability to encourage remediation without causing unnecessary panic.
    • Enhance Public Awareness: Sharing your experience on cybersecurity forums or platforms (while respecting privacy) can raise awareness and potentially prompt others to check their devices.
    • Follow Up with Authorities and Organizations: Persistence is key. Regular follow-ups with privacy regulators or cybersecurity agencies can help ensure the issue is being addressed.
    • Legal Considerations: Be cautious not to access or interfere with the

Leave a Reply

Your email address will not be published. Required fields are marked *