Children’s Webcams Are Being Targeted by Online Predators

a young girl laying on her bed using a laptop under the eye of a webcam
Children’s webcams are a safety risk. Peter Dazeley/The Image Bank via Getty Images

There has been a tenfold increase in sexual abuse imagery created with webcams and other recording devices worldwide since 2019, according to the the Internet Watch Foundation.

Social media sites and chatrooms are the most common methods used to facilitate contact with kids, and abuse occurs both online and offline. Increasingly, predators are using advances in technology to engage in technology-facilitated sexual abuse.

Once having gained access to a child’s webcam, a predator can use it to record, produce and distribute child pornography.

We are criminologists who study cybercrime and cybersecurity. Our current research examines the methods online predators use to compromise children’s webcams. To do this, we posed online as children to observe active online predators in action.


We began by creating several automated chatbots disguised as 13-year-old girls. We deployed these chatbots as bait for online predators in various chatrooms frequently used by children to socialize. The bots never initiated conversations and were programmed to respond only to users who identified as over 18 years of age.

We programmed the bots to begin each conversation by stating their age, sex and location. This is common practice in chatroom culture and ensured the conversations logged were with adults over the age of 18 who were knowingly and willingly chatting with a minor. Though it’s possible some subjects were underage and posing as adults, previous research shows online predators usually represent themselves as younger than they actually are, not older.

dialogue between a self-identified adult and the researchers’ chatbot posing as a 13-year-old.
A section of dialogue between a self-identified adult and the researchers’ chatbot posing as a 13-year-old.
Eden Kamar, CC BY-ND

Most prior studies of child sexual abuse rely on historical data from police reports, which provides an outdated depiction of the tactics currently used to abuse children. In contrast, the automated chatbots we used gathered data about active offenders and the current methods they use to facilitate sexual abuse.

Methods of attack

In total, our chatbots logged 953 conversations with self-identified adults who were told they were talking with a 13-year-old girl. Nearly all the conversations were sexual in nature with an emphasis on webcams. Some predators were explicit in their desires and immediately offered payment for videos of the child performing sexual acts. Others attempted to solicit videos with promises of love and future relationships. In addition to these commonly used tactics, we found that 39% of conversations included an unsolicited link.

 Get The Latest By Email

Weekly Magazine Daily Inspiration

We conducted a forensics investigation of the links and found that 19% (71 links) were embedded with malware, 5% (18 links) led to phishing websites, and 41% (154 links) were associated with Whereby, a video conferencing platform operated by a company in Norway.

Editor’s note: The Conversation reviewed the author’s unpublished data and confirmed that 41% of the links in the chatbot dialogues were to Whereby video meetings, and that a sample of the dialogues with the Whereby links showed subjects attempting to entice what they were told were 13-year-old girls to engage in inappropriate behavior.

It was immediately obvious to us how some of these links could help a predator victimize a child. Online predators use malware to compromise a child’s computer system and gain remote access to their webcam. Phishing sites are used to harvest personal information, which can aid the predator in victimizing their target. For example, phishing attacks can give a predator access to the password to a child’s computer, which could be used to access and remotely control the child’s camera.

Whereby video meetings

At first, it was unclear why Whereby was favored among online predators or whether the platform was being used to facilitate online sexual abuse.

After further investigation, we found that online predators could exploit known functions in the Whereby platform to watch and record children without their active or informed consent.

This method of attack can simplify online sexual abuse. The offender does not need to be technically savvy or socially manipulative to gain access to a child’s webcam. Instead, someone who can persuade a victim to visit a seemingly innocuous site could gain control of the child’s camera.

Having gained access to the camera, a predator can violate the child by watching and recording them without actual – as opposed to technical – consent. This level of access and disregard for privacy facilitates online sexual abuse.

Based on our analysis, it is possible that predators could use Whereby to control a child’s webcam by embedding a livestream of the video on a website of their choosing. We had a software developer run a test with an embedded Whereby account, which showed that the account host can embed code that allows him to turn on the visitor’s camera. The test confirmed that it is possible to turn on a visitor’s camera without their knowledge.

We have found no evidence suggesting that other major videoconferencing platforms, such as Zoom, BlueJeans, WebEx, GoogleMeet, GoTo Meeting and Microsoft Teams, can be exploited in this manner.

Control of the visitor’s camera and mic is limited to within the Whereby platform, and there are icons that indicate when the camera and mic are on. However, children might not be aware of the camera and mic indicators and would be at risk if they switched browser tabs without exiting the Whereby platform or closing that tab. In this scenario, a child would be unaware that the host was controlling their camera and mic.

Editor’s note: The Conversation reached out to Whereby, and a spokesperson there disputed that the feature could be exploited. “Whereby and our users cannot access a user’s camera or microphone without receiving clear permission from the user to do so via their browser permissions,” wrote Victor Alexandru Truică, Information Security Lead for Whereby. He also said that users can see when the camera is on and can “close, revoke, or ‘turn off’ that permission at any time.”

A lawyer for the company also wrote that Whereby disputes the researchers’ claims. “Whereby takes the privacy and safety of its customers seriously. This commitment is core to how we do business, and it is central to our products and services.”

Revoking access to the webcam following initial permission requires knowledge of browser caches. A recent study reported that although children are considered fluent new media users, they lack digital literacy in the area of safety and privacy. Since caches are a more advanced safety and privacy feature, children should not be expected to know to clear browser caches or how to do so.

Keeping your kids safe online

Awareness is the first step toward a safe and trustworthy cyberspace. We are reporting these attack methods so parents and policymakers can protect and educate an otherwise vulnerable population. Now that videoconferencing companies are aware of these exploits, they can reconfigure their platforms to avoid such exploitation. Moving forward, an increased prioritization of privacy could prevent designs that can be exploited for nefarious intent.

There are several ways people can spy on you through your webcam.

Here are some recommendations to help keep your kid safe while online. For starters, always cover your child’s webcam. While this does not prevent sexual abuse, it does prevent predators from spying via a webcam.

You should also monitor your child’s internet activity. The anonymity provided by social media sites and chatrooms facilitates the initial contact that can lead to online sexual abuse. Online strangers are still strangers, so teach your child about stranger danger. More information about online safety is available on our labs’ websites: Evidence-Based Cybersecurity Research Group and Sarasota Cybersecurity.

The Conversation

About The Authors

Eden Kamar, Postdoctoral research fellow, Hebrew University of Jerusalem and Christian Jordan Howell, Assistant Professor in Cybercrime, University of South Florida

This article is republished from The Conversation under a Creative Commons license. Read the original article.


Related Books:

Here are 5 non-fiction books on parenting that are currently Best Sellers on

The Whole-Brain Child: 12 Revolutionary Strategies to Nurture Your Child's Developing Mind

by Daniel J. Siegel and Tina Payne Bryson

This book provides practical strategies for parents to help their children develop emotional intelligence, self-regulation, and resilience using insights from neuroscience.

Click for more info or to order

No-Drama Discipline: The Whole-Brain Way to Calm the Chaos and Nurture Your Child's Developing Mind

by Daniel J. Siegel and Tina Payne Bryson

The authors of The Whole-Brain Child offer guidance for parents to discipline their children in a way that promotes emotional regulation, problem-solving, and empathy.

Click for more info or to order

How to Talk So Kids Will Listen & Listen So Kids Will Talk

by Adele Faber and Elaine Mazlish

This classic book provides practical communication techniques for parents to connect with their children and foster cooperation and respect.

Click for more info or to order

The Montessori Toddler: A Parent's Guide to Raising a Curious and Responsible Human Being

by Simone Davies

This guide offers insights and strategies for parents to implement Montessori principles at home and foster their toddler's natural curiosity, independence, and love of learning.

Click for more info or to order

Peaceful Parent, Happy Kids: How to Stop Yelling and Start Connecting

by Dr. Laura Markham

This book offers practical guidance for parents to shift their mindset and communication style to foster connection, empathy, and cooperation with their children.

Click for more info or to order

You May Also Like

follow InnerSelf on

facebook icontwitter iconyoutube iconinstagram iconpintrest iconrss icon

 Get The Latest By Email

Weekly Magazine Daily Inspiration




eating yourself to death 5 21
So You Insist on Eating Yourself Sick and to Early Death?
by Robert Jennings,
Explore Chris van Tulleken's journey into the world of ultra-processed foods & their impacts on…
trump rally 5 17
Is There a Tipping Point for Trump Supporters to Stop Backing Him? Here’s What the Science Says
by Geoff Beattie
Explore the psychology behind the unwavering loyalty of Trump supporters, examining the power of…
protestors holding up a big globe of Planet Earth
Breaking the Chains: A Radical Vision for a Sustainable and Just Society
by Mark Diesendorf
Explore a radical approach to building a sustainable and just society by challenging state capture…
A Guide to Transforming Our Mindset for Ecological Solutions
by Jane Goodall, Western Sydney University
“We have a sense that we are about to face immense upheavals,” Maja Göpel writes, and we need to…
a group of gen-Z and their fashion choices
The Rise of Gen Z Fashion: Embracing Y2K Trends and Defying Fashion Norms
by Steven Wright and Gwyneth Moore
Have you seen that cargo pants are back? Young people are once again swishing down hallways and…
el nino la nina 5 18
Solving the Climate Change Puzzle: Impact on El Niño and La Niña Revealed
by Wenju Cai and Agus Santoso
New research uncovers the connection between human-caused climate change and the intensification of…
a young girl studying and eating an apple
Mastering Study Habits: The Essential Guide to Daily Learning
by Deborah Reed
Unlock the secrets to making studying a daily habit for enhanced learning and academic success.…
hands pointing to the words "The Others"
4 Ways To Know You’re in Victim Mode
by Friedemann Schaub, M.D., Ph.D.
The inner victim is not only a fundamental aspect of our psyche but also one of the most powerful.

New Attitudes - New Possibilities | | | InnerSelf Market
Copyright ©1985 - 2021 InnerSelf Publications. All Rights Reserved.