Harriton High School
Used Apple Laptop Webcams
To SPY On Students At Home
Cite the Educational CyberPlayGround, Inc ® APA Style of Citation
Use MLA cite format: "Educational CyberPlayGround" Internet.
Database available online.
https://edu-cyberpg.com
.
Date accessed Month ___ day____, year_____.
2016
Schools spying on students' use of Chromebooks at home
Software Flags 'Suicidal' Students
,
Presenting
Privacy
Dilemma
-- ostensibly for good reasons, but the abuse potential of such surveillance is enormous.
How To Hack a
Webcam
This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be
responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under
cyber crime.
Lower Merion School District
301 East Montgomery Ave.
Ardmore, PA 19003
610.645.1800
The school district's insurance provider paid all the fines and fees NOT the tax payer.
12/7/11 Paige Robbins vs. Lower Merion School Distric t and The Board of Directors of the Lower Merion School District and Christopher McGinley Superintendent
August 23, 2011The Lower Merion School District has agreed to pay $10,000 to a teen secretly recorded by his school-issued laptop, the fourth settlement with a student since the webcam scandal broke last year. The school board approved the payout at its meeting Monday night, spokesman Doug Young said. Lower Merion paid more than $1.6 million last year to litigate and settle allegations that it spied on students through webcams on the laptops it gave to each of its nearly 2,300 high school students.
1/2012 The Lower Merion School District is $19,500 away from being done with the webcam spying cases.The Board of School Directors approved the final settlement Monday, to be paid to former Harriton High student Josh Levin.Levin filed his suit last year, claiming the district-issued laptop he took home snapped photos of him with a webcam. Main Line Times reports the district will pay $10,000 of the settlement and its insurance company will pay the rest. The district denies any wrongdoing.
June 8, 2011
Former Harriton High graduate Joshua Levin has filed a new webcam suit
against Lower Merion.
http://mainlinemedianews.com/articles/2011/06/08/main_line_times/news/doc4def4060da1af777252860.txt?viewmode=fullstory
According to the suit, Levin was a student at Harriton High School when he was issued a laptop computer by
the district. The family in this latest suit says they only learned about the monitoring when they got a
letter from the district's attorney, Hank Hockeimer, that was dated June 8, 2010. The district was
required to send out letters to all students who had the security feature activated on their computers.
Hockeimer's letter told Levin that 4,404 webcam photos and 3,978 screenshots were recovered between
Sept.
22, 2008, and March 12, 2009. Students and their parents were given the option to viewing the recovered
images.
“Unbeknownst to Plaintiff, and without his authorization, Defendants had been spying on the activities of
Plaintiff by Defendants' indiscriminate use of and ability to remotely activate the webcams incorporated
into each laptop issued to students by the school district,” the complaint reads in part.
“Plaintiff's younger brother noticed that the light in the camera would go off and on at odd times,
wondering if the family was being 'spied on,'” the complaint reads. “Plaintiff's mother
dismissed
this idea as absurd, as the notion that the school district was secretly monitoring and taking pictures of
students was simply incomprehensible and beyond all rational belief. Plaintiff's father was told and
believed that the light meant that the laptop was charging.”
Levin says his parents subsequently received a letter from the district around June 2010, advising them that
"4,404 webcam photographs and 3,978 screenshots" were remotely captured by the district from the
laptop he was issued. The letter then instructed Levin that if he wanted to view the fruits of the
district's surveillance, he'd have a one-hour window on a specific day in June to do so at a federal
courthouse, according to the suit. Levin says he accepted the offer, "and was shocked, humiliated and
severely emotionally distressed at what he saw."
Norman Perlberger, of Bala Cynwyd, Pa is the attorney for Levin claims that many images captured by the
laptops may have depicted minors and their parents "in compromising or embarrassing positions,"
including in "various stages of dress or undress."
Bottom Line 10/11/10
Lower Merion School District pays $610,000 to settle the lawsuit. Student Blake Robbins will get $175,000 placedin trust and his lawyer, Mark Haltzman, gets $425,000 for his work. The second student Jalil Hassan will get $10,000. The district's insurer Graphic Arts Mutual Insurance Company has agreed to pay $1.2 million toward legal and settlement costs. The FBI investigated but declined to bring a criminal wiretap case.
The school district acknowledged
it took nearly 60,000 snapshots from student computers,
without their knowledge, from September 2008 to February 2010. The district has admitted that the LANrev
system it used had a program called TheftTrack that could snap webcam photos, take screenshots and record IP
addresses every 15 minutes.
John Steinbach Chief Information Officer Vestige Ltd. www.vestigeltd.com/ Medina, OH owned by
Lawyer Don Wochna
was hired to conduct his own forensic investigation into
district-owned computers as a follow-up to one done by Level-3 Communications for the district. That
investigation culminated in the report that was made public in May detailing an estimated 60,000 LANrev
images
found on district computers. He reviewed a mirror image of the hard drive that was on the computer used by
Michael Perbix, one of two district employees who had access to the program that was able to remotely
activate
the student-issued computers.The computer used by Perbix is being checked since he was the employee who
activated the monitoring system on the computer issued to Blake Robbins. Steinbach will run his own program
to
look for all images on the computer. The reason is that if a photo from the LANrev system was saved using
another software program such as Photoshop, it will no longer have a LANrev digital signature. If the
district's forensics team, L-3, was only looking for images created by the LANrev system, it might not
have been able to recover photos copied and saved from LANrev to other software programs, Haltzman said.
Law
Suit:
Legal fees cost approx. 1% of the district's $200,000 million budget for the 2010-11 school
year.
School District Spokes Person Doug Young said the district's insurance
policies will cover a “significant portion of the bills.”
Ballard Spahr was hired by the district
in
February.
Ballard Spahr has billed the district about $953,000 in legal fees
since it began
representing until May 2010. Ballard Spahr agreed to limit its attorneys' fees to $250 per hour. Another
$270,000 has been paid to two consultants in the webcam case. Level-3 Communications billed the district
$240,121 for forensically analyzing the district's computers. SunGard billed the district $31,971. to
help
it revise its policies on the school-issued laptops. In April an attorney for one of the district's
insurance companies, Graphic Arts Mutual Insurance Company, sued the district so that it would not have to
continue paying the district's legal bills in the webcam case. That case is also being defended for the
district by attorneys from Ballard Spahr. July 2010 Mark Haltzman, the attorney representing the two
students
in the webcam cases, filed court documents asking that his legal and consultant fees of nearly $420,000 be
paid for by LMSD.
http://mainlinemedianews.com/articles/2010/08/11/main_line_times/news/doc4c62bd6f7bdac151351309.txt
Aug. 30th Lower Merion School District was ordered by Senior U.S. District Judge Jan E. DuBois to pay attorney Mark Haltzman $260,000 fees and costs. Haltzman is seeking over $420,000.
THE CHUTZPA
Dick and Jane Primer for School Administrator Dummies
and the Apple Classrooms of Tomorrow Nightmare
Teaching Moment -- Hey Principal / Teacher Leave them Kids Alone!!
IANAL. (I am not a lawyer.) TINLA. (This is not legal advice.) ~ ECP
There was NEVER a reason the TheftTrack technology should have been used on students.
Information-systems director, George Frazier, [the good guy] was the only one who asked the
principals at Lower Merion and Harriton high schools to stop
remotely turning on the webcams on
the
computers the schools issued to each pupil to take home, and they all refused. Frazier suggested that the
district stop using the TheftTrack system “because of a lack of policies and procedures.” ~ Cafiero
[administrator on leave]
Court documents go on to say Lower Merion's and Harriton's head principals, Sean Hughes and Steven
Kline, and Lower Merion assistant principal Wagner Marseille said no. Cafiero also cites the Ballard Spahr
investigative report that suggests someone deleted computer files from the district's LANrev system
between Feb. 18 and Feb. 19, shortly after the Robbinses filed suit. In her deposition, Cafiero said she
wanted it on the record that she did not delete the files.
8/17/2010 Feds say school that "accidentally" took 56,000 remote photos
of
students committed no crime.
Someone should have gone to jail.
Fifty-six thousand images. How is that an accident? The
"we didn't mean to" argument shouldn't have protected them. The student and his parents
filed a civil suit against the district, its board of directors and the Superintendent. It alleges
violations
of the electronic Communications Privacy Act, The Computer Fraud Abuse Act and the Stored Communications
Act,
among others.
In the Beginning
2/16/10 The School district snapped secret webcam pictures of a high school student when he was partially undressed or sleeping in his bed, and captured instant messages he exchanged with friends, the student charged in court papers. The LANrev software program took screen shots and webcam photos every 15 seconds when activated. The district thereby captured over 400 screen shots and webcam images of Harriton High School sophomore Blake Robbins, according to court filings this week in his lawsuit. Federal court judge is ordering the Lower Merion School District and the Robbins family to try to settle non-monetary issues. Haltzman is also trying to recover more than $400,000 in legal fees from the Lower Merion School District that he billed to the Robbins family. According to the most recent estimates, the webcam controversy has resulted in $1.2 million in legal bills and related costs. Henry E. Hockeimer Jr., represents Lower Merion School District. May 2010 , a Second Student Files Suit against Lower Merion School District.
Were they the spys at Harriton High or used as shields?
LEARN HOW THE MIKE TURNED ON THE
WEBCAM
ADMINISTRATORS MUST BE HELD ACCOUNTABLE
THEY SET POLICY
THEY INSTRUCT THEIR EMPLOYEES
THEY ARE EXAMPLES TO THE COMMUNITY
CAROL CAFIERO the Information Systems Coordinator AND MIKE PERBIX Network Technician PUT ON LEAVE
Ethics: Individual Privacy is a Basic Human Right . Officials can activate webcams remotely without students' knowledge.
This is about the intersection of Legal, Social and Ethical Issues that are at the heart of Information Technology.
What Happened Here?
FAIL! A TOTAL BREAKDOWN OF ETHICAL BEHAVIOR EXCUSED BY THE FEDS
4/29/10 Technology Coordinator Carol Cafiero Takes The Fifth and refused to answer questions at a deposition, citing her Fifth Amendment right against self-incrimination. Cafiero and technician Michael Perbix were the only employees authorized to activate the webcams. Perbix did not fight the deposition. AP
Mongomery County PA District Attorney Risa Vetri Ferman decided to see if a criminal investigation is warranted. U.S. Attorney Michael Levy, who previously headed the office's computer crimes unit is looking to find out if any wiretap or computer intrusion laws were broken. The wiretap law applies to audio, not video or still images. The intrusion law bars unauthorized access to a computer with the intent to defraud, cause harm, or invade privacy.
- FAIL!!! - THE FEDS EXCUSE CHEATERS! -
WORST OF THE WORST - THE VERY PEOPLE WHO STAND AT THE CENTER OF ETHICAL BEHAVIOR GET OFF
WHICH SHOWS THEIR ARE NO RULES FOR THE RICH, POWERFUL AND CONNECTED.
McGinley said the parents and students were not explicitly told about this built-in security feature .
Doug Young, spokesman for the Lower Merion School District, said IF the laptop was stolen the district would first have to request access from its technology and security department and receive authorization, he said.
FEDS DIDN'T FIND THIS PROBLEMATIC:
The Robbins family has stated the laptop "was neither reported lost or stolen" suggesting the
school
was monitoring.
ethics
Technology Staff chain of command
Only 2 employees in the technology department were authorized to activate the cameras — and only to
locate missing laptops.
Technicians are Not Police Officers.
Spiderman:
"With great power comes great responsibility"
Mike and Ike Candy:
Harriton High School spied on the Robbins's son Blake and remotely took a picture of him eating
"Mike
and Ike" candy. They spied and caught him thnking these "pills" were drugs. They thought they
would notify the parents that their child was doing drugs!!!
The suit accuses the school of turning on Blake's webcam while the computer was inside his Penn Valley
home, allegedly violating wiretap laws and his right to privacy.
Blake
Robbins
told KYW-TV on Friday that a school official described him in his room and mistook a piece of candy for a
pill. "She described what I was doing," he said. "She said she thought I had pills and said
she
thought that I was selling drugs."Robbins said he was holding a Mike and Ike candy, not pills. Holly
Robbins said a school official told her that she had a picture of Blake holding up what she thought were
pills. "It was an invasion of privacy; it was like we had a Peeping Tom in our house," Holly
Robbins
told WPVI-TV.
"I send my son to school to learn, not to be spied on. "Irrespective of whether the machine was
allegedly reported "missing" or not, it appears clear that the technology was used for a purpose
beyond the recovery of said machine.
That's a problem even if there was prior disclosure, and
it
appears that the school is admitting that there was not. Families were not informed of the possibility the
webcams might be activated in their homes without their permission in the paperwork students sign when they
get the computers, district spokesman Doug Young said.
Attorney Mark S. Haltzman with Lamm Rubenstone of Trevose, Pa ., filed the suit alleging claims under the Electronic Communications Privacy Act , the Computer Fraud and Abuse Act and the Stored Communications Act, as well as violations of the Fourth Amendment, federal civil rights laws and Pennsylvania's wiretap statute. The case has been assigned to Senior U.S. District Judge Jan E. DuBois. This is a Federal class action lawsuit, asking for monetary damages of $100/day for every day the student's privacy was violated.
Blake J Robbins v Lower Merion School District PDF
The lawsuit alleges the cameras captured images of Harriton High School students and their families as they
undressed and in other compromising situations. Families learned of the alleged webcam images when an
assistant principal spoke to a student about inappropriate behavior at home.
Neither the school nor the district had told parents about this capability. As a result, the Robbins have
filed a class-action lawsuit against the district, charging it with interception of electronic
communications
under the ECPA, theft of intellectual property under the CFAA, violations of the Stored Communications Act,
violations of the Civil Rights Act, invasions of privacy, and violations of the Pennsylvania wiretapping and
electronic surveillance act.
The suit claims a violation of the privacy and civil rights of the students and their families and accuses
officials of violating electronic communications laws by spying on them through "indiscriminate use of
an
ability to remotely activate the webcams incorporated into each laptop".
It claims that since the laptops were used by the students, friends and family members at home, the captured
webcam images consist of the teens and their parents in "compromising or embarrassing positions,
including ... in various states of undress".
School district spokesman Douglas Young said "We're taking it very seriously". Yes, serious
privacy violations are at hand. The district's actions could amount to illegal wiretapping. The school
may
have the right to retain admin control over its own laptops, but spying on kids at home without their
knowledge is likely not one of them.
Witold J Walczak, the legal director of the
American Civil Liberties Union of Pennsylvania
, told the Associated Press that like police, state
school
officials are barred from entering the home electronically or physically without a warrant.
- FAIL!!! - THE FEDS EXCUSE CHEATERS! -
WORST
OF
THE WORST - THE VERY PEOPLE WHO STAND AT THE CENTER OF ETHICAL BEHAVIOR GET OFF WHICH SHOWS THEIR ARE NO
RULES FOR THE RICH, POWERFUL AND CONNECTED.
Don't you think the "improper behavior" that [we the citizens] need to investigate is how the school district IT department can break the law, and allow administrators to break the law? Afterall, ignorance doesn't let administrators off the hook. Teachers have to follow rules, and students have to follow the rules. Administrators need to know and respect the laws governing technology use in a public school!!
The Superintendent should be fired.
The principal should be fired.
The vice-principal should be fired.
The school's IT staff should be fired.
The school board should be fired.
The Administrators claim that their intent excuses their behavior. But if the Assistant Principal DID in fact confront Blake Robbins with "evidence" gleaned from the webcam, then they can no longer argue, what their intent was; the FACT will be that they used an image surreptitiously obtained of a student in his private home for a purpose other than locating the computer.
WE NOW KNOW
How many thefts there have been.
How many times the system was used.
Number of computers needed to be recovered.
* During the 2009-10 school year, 42 laptops were reported lost, stolen or missing and the tracking software was activated by the technology department in each instance. A total of 18 laptops were found or recovered. This number (18) is an updated number given the information we have compiled today.
Ethics: Right-To-Know/Public Access to School District Records
2/25/10 Judge DuBois tells the
school to stop spying:
He ordered that if the school district wishes to provide an update on the pending action, a copy of any
statement it issues must be provided with six hours advance notice to plaintiff's counsel, and shall be
disseminated only with consent.
The school district is free to provide "new software, software updates, or other such releases for the
students' laptops ... but only after receiving written consent ... from plaintiffs' counsel, to
ensure
that such new software, software updates or releases will not alter or destroy evidence that may be needed
as
part of the litigation."
Both parties must assess whether any software updates have that capability; if it is established that no
harm
can be done, then prior consent will not be needed. Most of the courtroom wrangling on Monday was to address
that issue.
The school district wanted to retain the ability to update district software and computers without
restraint,
citing concerns about viruses and other dangers. The class counsel was concerned that updates or other
measures could result in spoliation of evidence.
APPLE CLASSROOMS
OF TOMORROW
What a nightmare!
Apple's educational division, SchoolVision Inc., has joined in partnerships to create affordable ways for schools to procure technology since at least 1997.
Of Course Apple Shipped these computers with the software but why did the Technology staff enable it?
Apple
sold
these computers
to the School District. Apple makes a lot of money when
it promotes the
Understanding of 21st Century Skills and Outcomes Curriculum
.
Can Apple prove they informed the School District that the webcams should not be used to spy on
children?
Apple should be held accountable for telling the School District what to include in the
AUP. Apple needs to be investigated and possibly prosecuted for negligence if they did not take
responsibility
for giving the school district an AUP for the parents.
This school
document
identifies the hardware and software in use as Macbook laptops running OSX.
Apple
Remote Desktop 3
: Administrators have access to the laptop of every kid in the school through
this
program, and can switch from one to another and watch what the kids are doing on their computers in real
time.
Remote observation and control of target computers is plainly listed in the
Apple Remote Desktop 3 Feature
List
.
Webcameras are enabled by the IT department to allow Administrators to see their screens, and faces and
communicate with th student and take a picture of them (admins can control their laptops remotely) in Photo
Booth, or interrupt their IM conversation with their own message. No one informed the kids that they were
being monitored. Even if the laptops don't belong to the student, so should have be able to expect
privacy. The potential for abuse is nearly limitless, especially since many teens keep their computers in
their bedrooms.
Even when a non-IT employee clearly is to blame for a security breach, IT is still responsible.
Dan Morill ~ "We need to remind ourselves again and again that information security is not a technology issue - it's a people issue. We are reliant on people, their awareness, ethics and behaviour, and we must understand what they want to achieve if we are to accomplish the goals of business. This includes the employees that deliver our services and the customers that take advantage of them, as well as the senior executives and board room directors that grant us our budgets."
BEFORE IT'S Too Late
All 2,300 students at the district's two high schools have been given notebooks.
PARENTS SHOULD KNOW COST OF FREE COMPUTERS, LEGISLATORS SAY : "If parents do not want their children to be objects of market research firms while in school, they should have the right to say 'no,'" said Rep. George Miller (D-CA). He, along with Senator Christopher Dodd (D-CT) and Senator Richard Shelby (R-AL), want to see some regulation concerning schools accepting free computer equipment and Internet services from companies. The problem, they say, is that in exchange the schools allow the companies to gather valuable marketing data from students. The legislators want to give parents a role in determining whether schools can let Internet firms gather information from their children for commercial benefit. The legislation would require schools to get parental permission before a company can collect personal information from students and use it for commercial purposes. Schools that do not comply could lose their eligibility for federal funding. "It will basically inhibit the innovative ways schools have reached out to businesses," said Daniel Fuller, federal programs director for the National School Boards Association. "We're looking at significant costs at the local level," he added, saying the loss of business support and the cost of denying Internet access to students would be impossible to quantify. [ SOURCE: CyberTimes , AUTHOR: Rebecca Weiner (rweiner@nytimes.com)]
Questions & Answers Updated February 19, 2010
Dr. McGinley regarding high school student laptop security - 2/19/10
he
has hired Henry E. Hockeimer, Jr., Esq hockeimerh@ballardspahr.com 215.864.8204 a white collar crime
attorney
and former federal prosecutor, to assist in our comprehensive review of relevant policies and past
practices,
as well as assist us in implementing appropriate improvements.
" 02/20/2010 3 NOTICE of Appearance by ARTHUR MAKADON on behalf of LOWER MERION SCHOOL DISTRICT, CHRISTOPHER W. MCGINLEY, THE BOARD OF DIRECTORS OF THE LOWER MERION SCHOOL DISTRICT with Certificate of Service (MAKADON, ARTHUR) (Entered: 02/20/2010)02/20/2010 4 NOTICE of Appearance by HENRY E. HOCKEIMER, JR on behalf of LOWER MERION SCHOOL DISTRICT, CHRISTOPHER W. MCGINLEY, THE BOARD OF DIRECTORS OF THE LOWER MERION SCHOOL DISTRICT with Certificate of Service (HOCKEIMER, HENRY) (Entered: 02/20/2010)02/20/2010 5 NOTICE of Appearance by PAUL LANTIERI, III on behalf of LOWER MERION SCHOOL DISTRICT, CHRISTOPHER W. MCGINLEY, THE BOARD OF DIRECTORS OF THE LOWER MERION SCHOOL DISTRICT with Certificate of Service(LANTIERI, PAUL) (Entered: 02/20/2010)02/20/2010 6 NOTICE of Appearance by WILLIAM B. IGOE on behalf of LOWER MERION SCHOOL DISTRICT, CHRISTOPHER W. MCGINLEY, THE BOARD OF DIRECTORS OF THE LOWER MERION SCHOOL DISTRICT with Certificate of Servicece (IGOE, WILLIAM) (Entered: 02/20/2010) "
STEAL THIS LAPTOP
And oh yeah, what about the security now, since Dr. McGinley announced that it's turned off - really he turned it off, and he won't turn it back on until they actually send notification out to tell the parents. Now you can trust him right? So . . .I guess it's a good time to steal the laptop. What will they do about security now???
Is Lindy Matsko the whistle blower who needs protection?
"At no time did any high school administrator have the ability or actually access the security-
tracking
software. We believe that the administrator at Harriton has been unfairly portrayed and unjustly attacked in
connection with her attempts to be supportive of a student and his family. The district never did and never
would use such tactics as a basis for disciplinary action.
LMSD initial response to invasion of privacy allegation 2/18/10 5:26 PM
Dear LMSD Community,
Last year, our district became one of the first school systems in the United States to provide laptop computers to all high school students. This initiative has been well received and has provided educational benefits to our students.
The District is dedicated to protecting and promoting student privacy. The laptops do contain a security feature intended to track lost, stolen and missing laptops. This feature has been deactivated effective today.
The following questions and answers help explain the background behind the initial decision to install the tracking-security feature, its limited use, and next steps.
• Why are webcams installed on student laptops?
The Apple computers that the District provides to students come equipped with webcams and students are free to utilize this feature for educational purposes.
• Why was the remote tracking-security feature installed?
Laptops are a frequent target for theft in schools and off school property. The security feature was installed to help locate a laptop in the event it was reported lost, missing or stolen so that the laptop could be returned to the student.
• How did the security feature work?
Upon a report of a suspected lost, stolen or missing laptop, the feature was activated by the
District's
security and technology departments. The tracking-security feature was limited to taking a still image of
the
operator and the operator's screen. This feature has only been used for the limited purpose of locating
a
lost, stolen or missing laptop. The District has not used the tracking feature or web cam for any other
purpose or in any other manner whatsoever.
• Do you anticipate reactivating the tracking-security feature?
Not without express written notification to all students and families.
We regret if this situation has caused any concern or inconvenience among our students and families. We are reviewing the matter and will provide an additional update as soon as information becomes available.
Sincerely,
Dr. Christopher McGinley
Superintendent
LEGAL ISSUES
The school covertly photographed students at home using spyware they installed on all students'
mandatory
laptops. The ACLU has filed an amicus brief in support of the boy's family, and EFF attorney Kevin
Bankston explains the law as it pertains to video wiretapping:
"There is no federal statute that criminalizes or creates civil liability for such secret videotaping
unless it involves sound, because then it is an intercept of a verbal communication. So no one can plant a
bug
in your house without violating wiretapping law, but they can still plant a camera without violating federal
wiretapping laws," he said. "That's something that congress should address particularly now
that
everyone potentially has a surreptitious video device staring them in the face when they're at their
laptop."
Students' Fourth Amendment rights against schools Supreme Court case an intrusive search without the threat of a clear danger to other students violated the Constitution's protections against unreasonable search or seizure. Justice David H. Souter, writing perhaps his final opinion for the court.
K12 School Rights vs. Students Online privacy rights.
It is a felony of the third degree to intentionally intercept, endeavor to intercept, or get any other person to intercept any wire, electronic, or oral communication without the consent of all the parties. 18 Pa. Cons. Stat. § 5703(1).
Student rights to privacy and K12 School Rights vs. Students Online privacy rights.
Further Reading
K-12 COPYRIGHT LAW PRIMER for ADMINS IMPORTANT DO'S AND DON'TS - Where are the ethics? 12 Ethical Commandments for Educational Leaders. Violation of school rules, or behavior that causes school strife, can result in all parents called, and some kids suspended and administrators fired!!
TECHnology RESOURCES
The E-Rate and Lower Merion School District is Buying Apple Computers
IT - SECURITY Everyone wants 3 things
Security experts will tell you that you can only get two of these. You get to pick which two you want.
- Strong security. Everyone wants the highest level of security
- Low cost. It can't cost a lot to build or maintain
- Ease of use. It can't be complicated or people won't use it
LEGAL Be Ready, You Need to Know . . . Does you District Internet Use Policy have provisions addressing disclosure of student personal information on sites? It should.
Web Privacy Online and what they know about you. Learn how to protect your privacy when you are online. Define Cultural Literacy and Technological Literacy. The Problems with Web 2.0 and Social NetworksParents: Teach Your Children Well! Bristol Palin, Levi Johnson, Govenor Sarah Palin
Approved Information Technology certification programs in Pennsylvania colleges and universities. What are they teaching?
Technology Tools For the Online Classroom
How About a Real Video Production Curriculum for Administrators.
What are the 5 required elements of a technology plan?
Although Certified Tech Plan Approvers may establish additional criteria, the FCC has stipulated the
following
five elements must be contained in an entity's technology plan:
- Clear goals and a realistic strategy for using telecommunications and information technology to improve education or library services;
- Professional development strategy to ensure that staff know how to use these new technologies to improve education or library services;
- Assessment of the telecommunication services, hardware, software, and other services that will be needed to improve education or library services;
- Sufficient budget to acquire and support the non-discounted elements of the plan: the hardware, software, professional development and other services that will be needed to implement the strategy; and
- Evaluation process that enables the school or library to monitor progress toward the specified goals and make mid-course corrections in response to new developments and opportunities and they arise.
New
Element
Discovered
called
Administratium
A major research institution has recently announced the discovery of the heaviest element yet known to
science. This new element has been tentatively named "Administratium." Administratium has 1
neutron,
12 assistant neutrons, 75 deputy neutrons, and 111 assistant deputy neutrons, giving it an atomic mass of
312.
These 312 particles are held together by a force called morons, which are surrounded by vast quantities of
lepton-like particles called peons.
Since Administratium has no electrons, it is inert. However, it can be detected as it impedes every reaction
with which it comes into contact. A minute amount of Administratium causes one reaction to take over 4 days
to
complete when it would normally take less than a second. Administratium has a normal half-life of 3 years;
it
does not decay but instead undergoes a reorganization in which a portion of the assistant neutrons and
deputy
neutrons exchange places. In fact, Administratium's mass will actually increase over time, since each
reorganization causes some morons to become neutrons, forming isodopes.
This characteristic of moron-promotion leads some scientists to speculate that Administratium is formed
whenever morons reach a certain quantity in concentration. This hypothetical quantity is referred to as
"Critical Morass." You will know it when you see it.
Source
FYI: Harriton is a public school whose students rank among the highest-scoring students on the SATs in Pennsylvania. This is the sister school of Lower Merion High, which used to educate Kobe Bryant. Harriton High School is in Rosemont, the town that purportedly served as the inspiration for Pine Valley, Pa., in "All My Children."
Education anyone? What is going on here? Something in the Water?
FYI Only a few miles away another local private school named
Episcopal Academy
actually educated and graduated the torture memo author
John Yoo
.
YOUR ARE ON PAGE 1
PAGE 2
HOW TO FIND A STOLEN COMPUTER - NETWORK TECHNICIANS
PAGE 3
NO PUNISHMENTS COMPLETE ETHICAL FAILURE
School Webcam Spy: Ethics and Technical Analysis
ethics of Harriton High public School administration who Used Apple Laptop Webcams To SPY On Students At Home
ethics of Harriton High public School administration who
Used Apple Laptop Webcams To SPY On Students At Home
Cite the Educational CyberPlayGround, Inc. ® APA Style of Citation
Use MLA cite format: "Educational CyberPlayGround" Internet.
Database available online.
https://edu-cyberpg.com
.
Date accessed Month ___ day____, year_____.
Shock and Awe
surveillance
Peeping Tom
in your own home!
ETHICS:
Individual Privacy is a Basic Human Right.
This is about the intersection of Legal, Social and Ethical Issues that are at the heart of Information Technology.
What Happened Here?
The Lower Merion School District provided 2,300 Apple laptops to the students in two high schools. See 1:1 Program Below . The School District ADMITS THAT IS NEVER NOTIFIED PARENTS that they were able to activate the webcam and use it to watch AND take pictures of children in their own homes. The AUP says the Children have no choice. They have to use the school computers. They are not allowed to change anything on the computers. They can't use their own computers in school. If they break the rules they are expelled.
Once upon a time, schools "belonged" to the local parents, then to local school boards, but the
disconnect started, that is when the states started supervising. Now control has been given away for
"free federal money" and now most parents experience interacting with schools, is "you
don't understand what it is like to teach" (translation, go away and don't trouble us" PS
send more money)
So parents did and do.
In 2001, the U.S. Supreme Court reaffirmed the privacy of the home in a case that said police could
not permeate a home with infrared lights to see if a suspect was using heat lamps to grow marijuana.
Technology or no, Supreme Court precedents "draw a firm line at the entrance to the house,"
Justice Antonin Scalia wrote.
"This isn't just them spying on the kids, this is them intruding on the parents' home. Who
knows what they are seeing?" Walczak said. "The courts for 80 years have said there's no
greater sanctuary than a person's own home."
Don't you think the "improper behavior" that [we the citizens] need to investigate is how the school district IT department can break the law, and allow administrators to break the law? Afterall, ignorance doesn't let administrators off the hook. Teachers have to follow rules, and students have to follow the rules. Administrators need to know and respect the laws governing technology use in a public school!!
The school may have the right to retain admin control over its own laptops, but spying on kids at home
without their knowledge is likely not one of them.
Witold J Walczak, the legal director of the
American Civil Liberties Union of Pennsylvania
, told the Associated Press that like police, state
school
officials are barred from entering the home electronically or physically without a warrant.
HOW a professional will CATCH A THIEF WHO STEALS A COMPUTER.
THIS IS NOT WHAT THE HILLBILLY AMATURES IN THE LOWER MERION SCHOOL DISTRICT
ADMINISTRATION DID NOR WHAT THE POLICE DID, BECAUSE NEITHER ONE HAS THE BRAINS OR TRAINING TO DO PULL THIS
OFF.
aup
ACCEPTABLE USE POLICY
And even if an AUP had been written to allow the school district into your house and be able to activate the webcam whenever they wanted, and forced all school students to use the computer or get expelled should citizens of the United States of America allow the TECHNOLOGY STAFF OF A SCHOOL DISTRICT, OR COUNTY, OR STATE THE RIGHT TO DO THIS? NO!
Guidelines for Use of Student Laptops
1
The laptop computers that will be issued to all high school students
are the property of Lower
Merion
School District
. Students are responsible for the appropriate use of these laptops both at school
and at home. The laptops are for the use of students for educational purposes. All commercial, illegal,
unethical and inappropriate use of these laptops is expressly prohibited.
Students are to comply with copyright laws. Downloading games or software is expressly prohibited. Only
District licensed software is to be installed on the laptops.
The maintenance of laptops is the student's responsibility. If laptops need repair or maintenance
students are to report to the Technology Center in their building. Vandalism to any laptop or accessory is
strictly prohibited. Students must present school issued picture ID when they bring their laptop in or pick
up
from repair.
Students should refer to the Student Acceptable Use Policy and their Guidelines. Any violation will be
subject to discipline as outlined in the Harriton and Lower Merion Student Guide.
High school teachers will distribute laptops during Advisory period on September 8, 2009. Laptops will have
a
label containing the student's name and other information specific to the laptop for identification.
Whistle Blower
Teacher Training in K-12 Education and Teaching To
Standards
SOCIAL, ETHICAL, LEGAL, AND HUMAN ISSUES.
Teachers understand the social,ethical,legal,and human issues surrounding the use of technology in PK-12
schools and apply those principles in practice. Teachers:
1. model and teach legal and ethical practice related to technology use.
2. apply technology resources to enable and empower learners with diverse backgrounds, characteristics, and
abilities.
3. identify and use technology resources that affirm diversity
4. promote safe and healthy use of technology resources.
5. facilitate equitable access to technology resources for all students.
The Robbins family says an assistant principal at Harriton High School named Lindy Matsko, confirmed that the school district "in fact has the ability to remotely activate the Webcam contained in a student's personal laptop computer issued by the school district at any time it chose, and to view and capture whatever images were in front of the Webcam."
"At no time did any high school administrator have the ability or actually access the security-tracking software."
~ Christopher McGinley, Lower Merion School District Superintendent
'The issue came to light on November 11, 2009 when Penn Valley residents Michael and Holly Robbins' son Blake was disciplined by the Harriton High School Assistant Vice Principal Lindy Matsko. She spied aka "caught" Blake [ facebook page ] engaging in "improper behavior" in his home which was captured in an image using the Apple Computer's built in webcam and microphone software and used as evidence. Matsko confirmed to Michael Robbins that the school had the ability to activate the webcams remotely, according to the suit, which was filed Tuesday and which seeks class-action status.
3/5/2010 The Admin story changes. Now The district says it turned on the camera in Robbins' computer because, since he had not paid a $55 insurance fee, he should not have been taking it home. But this is NOT theft!
Computing and Information Technology espionage techniques uSED to invade the privacy of citizens of the United States.
NOTE: This is not about any public school student but the ethical, moral and legal behavior of the any public school district who sanctions the use of Computing and Information Technology espionage techniques, to invade the privacy of citizens of the United States. According to James H. Moore, who is believed to have first coined the phrase "computer ethics", computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. It is a study, an analysis of the values of human actions influenced by computer technology. Reporting Computer, Internet-Related, or Intellectual Property Crime also see Legal Resources
McGinley said the parents and students were not explicitly told about this built-in security feature.
Doug Young, spokesman for the Lower Merion School District, said IF the laptop was stolen the district would first have to request access from its technology and security department and receive authorization, he said. Then it would use the built-in security feature to take over the laptop and see whatever was in the webcam's field of vision, potentially allowing them to track down the missing computer. During the 2009-2010 school year, 42 laptops were reported lost, stolen or missing, and the tracking software was activated by the technology department in each instance, according to McGinley's statement. A total of 18 laptops were found or recovered. Laptop Capabilities at home.
Right-To-Know/Public Access to School District Records
Click here
for information on
Policies, Procedures, Forms & Fees|
Contact Information: LMSD Open Records Officer
Fran Keaveney, Board Secretary
Lower Merion School District
301 E. Montgomery Ave.
Ardmore, PA 19003
The Superintendent should be fired.
The principal should be fired.
The vice-principal should be fired.
The school's IT staff should be fired.
The school board should be fired.
The Administrators claim that their intent excuses their behavior. But if the Assistant Principal DID in fact confront Blake Robbins with "evidence" gleaned from the webcam, then they can no longer argue, what their intent was; the FACT will be that they used an image surreptitiously obtained of a student in his private home for a purpose other than locating the computer.
PENNSYLVANIA INFORMATION TECHNOLOGY CHAIN OF COMMAND
Administrators knew what
they
were doing
. Cutting off the hydra from top down would be a big help.
-
Sean McDonough Acting Director PA Certified Technology Plan Approver
ra-edtech@state.pa.us
333 Market Street, 11th Floor Harrisburg, PA 17126
(717) 705-4486 and (717) 787-3148 - Jim Beeghley , State Educational Technology Director 717-705-8884
-
MONTGOMERY COUNTY
CIO Jack D.
Pond
Norristown, PA Montgomery County, PA 19404 [p] (610) 278-5200 / 610-278-3582
twitter
-
Purchasing
-
wiki
The Law Enforcement Justice Information Sharing Project ( LEJIS ) is a project of the Southeastern Pennsylvania Regional Counter-Terrorism Task force (SEPAR-CTTF).
Information and Technology Solutions (ITS)
610 - 278-5200 Fax 610-270-0229 One Montgomery Plaza 8th Floor - Lower Merion Township Police Superintendent Michael J. McGrath knows about these devices On at least two occasions, the district turned over pictures and other information to Lower Merion police so they could help track stolen laptops. The district even set up a secure Web site so the police could have access to pictures and other information, according to attorneys in the case.
-
Lower Merion School Board - Douglas Young
Apple Laptop Tech Surplus Exhibit #F0-27 - Lower Merion School District Superintendent - Christopher McGinley,
- Information Systems Coordinator Carol Cafiero
-
Director of Information Systems - George Frazier
Several years ago Frazier addressed parent groups in Illinois and North Carolina on Cyber safety and dangers to children, adolescents and teens. He also spoke with Lower Merion parents to gain a better understanding of what technology and technology services parents and guardians see as important for the future of their children. He seems to know quite a lot about what it is to be a cyberbully and cyberpredator. Frazier budgeted money to buy the iSafe America, Inc. curriculum . Here is an interesting evaluation of ISafe that was conducted by a consulting firm under contract with the National Institute of Justice.
Several meetings have been held at which the matter of laptop use, safety and security were discussed. These included:
Community
- September 11, 2008 - HS PTO meeting discussion on acceptable use and internet
safety for teens (1:1 laptop initiative Q&A) - Harriton HS
- November 14, 2009 - Internet Safety for Teens - Sponsored by the Office of the Attorney General of PA -
Ardmore YMCA
-
High School
Internet Safety (iSafe Inc.), Acceptable Use Guidelines, Copyright - Taught to every
9th grade student in the information technology course in the fall semester. Also included in the yearlong
advisory topic list for students in grades 9-12.
- Jason Hilt - L.M. Supervisor of Instructional Technology 610-645-1904
- Lower Merion Network Technicians Brad Miller, Mike Perbix, Jeremy Valentine
- Lower Merion School Principal - Sean Hughes
- Lower Merion Vice Principal - Lindy Matsko
Is remote access activity by the district logged?
- Yes. There is a log entry for every instance of the security feature activation. The logs will be reviewed as part of the special review conducted under the direction of special outside counsel.
- Upon a report of a suspected lost, stolen or missing laptop, the feature was activated by the District's security and technology departments.
AND STUDENTS HAVE ALSO DISCUSSED
- Discussed by the students 2008
- Home filtering 03/04/2010 The testing phase of the home filtering product is still underway. The filtering product mirrors the restrictions placed on the laptopwhile on the LMSD network. Home filtering is optional and will be applied at the written requestof the parent/guardian. The home filtering product will not impede access to educational websites.
-
By providing these laptops for take home, The school officials have now become responsible - and
potentially liable - for all student communications [think cyberbully] using these laptops. No school can
effectively manage 1:1 laptops. Schools are not going to employ staff to try to monitor all of
student's
online activity using school computers while at home. How will a school make sure students are not using
school computers while at home to engage in cyberbullying of other students if they are bypassing the
filter
to get to Facebook.
RULES
-
Possession of a monitored Macbook was required for classes
-
Possession of an unmonitored personal computer was forbidden and would be confiscated
-
Disabling the camera was impossible
- Jailbreaking a school laptop in order to secure it or monitor it against intrusion was an offense which merited expulsion
Best practices
for any parent who believes their school system may be
using issued hardware to spy on their children (in Lower Merion or elsewhere):
- Understand that most laptops have a microphone and a video camera embedded, and that remote activation of microphones can be utterly silent. Remote-activation software can be used to capture keystrokes, send commands over the Internet or turn computers into listening devices by turning on built-in microphones.
- If the issue becomes public, as is the case above, connecting the laptop to a school administered network or VPN may allow administrators to remove forensic traces of spying. Do not network the computer until evidence collection is complete.
- Seek out a computer security professional or your helpful neighborhood hacker to perform a full forensic hard drive capture of the potential spy platform.
- Consult a lawyer before confronting school officials. Capturing live network forensic evidence of remote spying can be far more powerful than word-of-mouth allegations.
Did you know there is a CODE OF PROFESSIONAL PRACTICE AND CONDUCT FOR EDUCATORS CHAPTER 235 .
§ 161.1. School Administrators' Handbook.
The School Administrator's Handbook contains the basic policies, directives and procedures of the
Department of Education. It is an adjunct to the school laws of the Commonwealth for the administration of
the
schools of this Commonwealth.
§ 235.10. Relationships with students. The professional educator may not:
(1) Knowingly and intentionally distort or misrepresent evaluations of students.
(2) Knowingly and intentionally misrepresent subject matter or curriculum.
(3) Sexually harass or engage in sexual relationships with students.
(4) Knowingly and intentionally withhold evidence from the proper authorities about violations of the legal
obligations as defined within this section.
§ 235.5. Conduct.
Individual professional conduct reflects upon the practices, values, integrity and reputation of the
profession. Violation of § § 235.6—235.11 may constitute an independent basis for private or public
reprimand,
and may be used as supporting evidence in cases of certification suspension and revocation.
§ 235.6. Legal obligations.
(a) The professional educator may not engage in conduct prohibited by the act of December 12, 1973 (P. L.
397,
No. 141) (24 P. S. § § 12-1251—12-1268), known as the Teacher Certification Law.
(b) The professional educator may not engage in conduct prohibited by:
(1) The Public School Code of 1949 (24 P. S. § § 1-101—27-2702) and other laws relating to the schools or
the
education of children.
(2) The applicable laws of the Commonwealth establishing ethics of public officials and public employes,
including the act of October 4, 1978 (P. L. 883, No. 170) (65 P. S. § § 401—413), known as the Public
Official
and Employee Ethics Law.
(c) Violation of subsection (b) shall have been found to exist by an agency of proper jurisdiction to be
considered an independent basis for discipline. Cross References: This section cited in 22 Pa. Code § 235.5
(relating to conduct).
TECHNOLOGY & ETHICS
Weakening the
trust TOWARDS
Public Institutions
and Agencies
Matsko acknowledged the school could start the webcam and take pictures whenever it wanted to.
The family's lawsuit alleges the school district violated civil rights, privacy and federal wiretapping
laws, and it says as many as 1,800 students could be affected at Harriton and Lower Merion High Schools. The
family also claims that every high school student in the district had a webcam laptop, and the computers
were
paid for with state and federal aid money. The damages are currently unspecified. Because it is a
class-action, there may be more parties to join. Superintendent Christopher W. McGinley was also named in
the
suit.
Lower Merion officials acknowledged that they remotely activated webcams 42 times in the past 14 months, but
only to find missing student laptops. They insist they never did so to spy on students, as the student's
family claimed in the federal lawsuit. Families were not informed of the possibility the webcams might be
activated in their homes without their permission in the paperwork students sign when they get the
computers,
district spokesman Doug Young said.
Families were not informed of the possibility the webcams might be activated in their homes without
their permission in the paperwork students sign when they get the computers, district spokesman Doug Young
said.
People should go to jail. Not only should they be sued for invasion of privacy but there should also be a child pornography component to this case as well.
Family Rights
The Center on Law and Information Policy has just released a report examining the privacy of state K - 12 educational records databases just as Congress is considering expanding these databases and funding the aggregation of the state databases into multi-state (and likely an eventual national) database of children. The report can be downloaded at http://law.fordham.edu/childrensprivacy
EDUCATION selling K-12 student INFORMATION and their rights
to
privacy
.
Privacy and Encryption companies gather and sell k12 student information. Check to see whether your school
district has a policy about disclosing student information. How 10 digits will end privacy as we know
it.
Teachers: Does your district have a policy regarding students privacy?
Student's Free Speech Rights and the Internet - Children vs. the Administrator
Surveillance vs. Workplace Privacy
“Security versus Privacy” and “Liberty versus Control”
"Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time
of
surveillance.
We do nothing wrong when we make love or go to the bathroom. We are not deliberately hiding anything when we
seek out private places for reflection or conversation. We keep private journals, sing in the privacy of the
shower, and write letters to secret lovers and then burn them. Privacy is a basic human need. [...]
For if we are observed in all matters, we are constantly under threat of correction, judgment, criticism,
even
plagiarism of our own uniqueness. We become children, fettered under watchful eyes, constantly fearful that
--
either now or in the uncertain future -- patterns we leave behind will be brought back to implicate us, by
whatever authority has now become focused upon our once-private and innocent acts. We lose our
individuality,
because everything we do is observable and recordable. [...]
This is the loss of freedom we face when our privacy is taken from us. This is life in former East Germany,
or
life in Saddam Hussein's Iraq. And it's our future as we allow an ever-intrusive eye into our
personal, private lives.
Too many wrongly characterize the debate as "security versus privacy." The real choice is liberty
versus control. Tyranny, whether it arises under threat of foreign physical attack or under constant
domestic
authoritative scrutiny, is still tyranny. Liberty requires security without intrusion, security plus
privacy.
Widespread police surveillance is the very definition of a police state. And that's why we should
champion
privacy even when we have
nothing to hide
.
The Computer Help Form that this School District could use to help them with their spying problems.
ATTN PARENTS: Who else may have your credit card information used to pay for the computer insurance you had to buy?
Abuse of Students by School Employees
Recent Amendments to Family
Educational
Rights and Privacy Act
Relating to Anti-Terrorism Activities April 12, 2002
Safety
Congressional Testimony House Education and Labor Committee Joint Subcommittee Hearing on Strengthening
School
Safety - July 8, 2009
J
oint subcommittee hearing of the Subcommittee on Early Childhood, Elementary and Secondary
Education, and the Subcommittee on Healthy Families and Communities
If School District Administrators are this ignorant about technology how will they ever be able to handle a school disaster ?
Attention Americans highly value their privacy.
U.S. Sen. Arlen Specter, D-Pa., introduced a bill Thursday to treat video surveillance the same as electronic communication under the federal Wiretap Act. Sen. Russ Feingold, D-Wis., a co-sponsor.
YOU ARE ON PAGE 3
PAGE 1
INTRO: HARRITON HIGH WEB CAM SPY
PAGE 2
HOW TO FIND A STOLEN COMPUTER - NETWORK TECHNICIANS
Hardworking School Network Technicians Spy on Children in their own House
Hardworking School Network Technicians Spy on Children
in their own House
Network Technicians
Students are not
permitted
to refuse the laptop and use their
own,
it's required that they use the one issued to them by the District.
APA CITATION STYLE FOR YOUR RESEARCH
58,000 photos taken by the school district, all by remotely accessing the webcam in the students' laptops while spying on their students in the students homes and in other places off the school premises.
Stryde Hax found a 2008 Webcast featuring Mike Perbix, an employee of the Lower Merion School district talking about how he was able to configure LANRev to go into "curtain mode" to surreptitiously peer into remote machines. In the Webcast, Perbix said "You can go into curtain mode, so if you're controlling someone's machine and you don't want them to see what you're doing you just click on the curtain mode icon...you can take a snapshot of the screen by clicking on the little camera icon." He also told about a time when they "actually had some laptops we thought were stolen which actually were still in a classroom because they were misplaced, and by the time we found out that they were back I had to turn the tracking off and I had a good 20 snapshots of the teacher and the students using the machines in the classroom."
8/17/2010 Feds won't press charges: US Attorney Zane David Memeger announced in Philadelphia that he would not file charges against officials in the Lower Merion School District. He said the review was conducted by the Federal Bureau of Investigation, as well as local and county law enforcement officials. “We have not found evidence that would establish beyond a reasonable doubt that anyone involved had criminal intent,” Mr. Memeger said.
2/16/10 VIDEO Mark Haltzman, who filed the lawsuit on behalf of Robbins and his family , said evidence now shows the district used the tracking software for non-authorized reasons - for instance, when students failed to pay the required insurance or return the laptops at year's end. At least once, a name mix-up led the district to activate the wrong student's laptop, he charged. "Thousands of webcam pictures and screen shots have been taken of numerous other students in their homes, many of which never reported their laptops lost or missing," Haltzman wrote in a motion filed Thursday. According to Haltzman, technology coordinator Carol Cafiero refused to answer his questions at a recent deposition, citing her Fifth Amendment right against self-incrimination. She and technician Michael Perbix were the only employees authorized to activate the webcams. Perbix did not fight the deposition. Haltzman called Cafiero a possible "voyeur" and wants access to her personal computer to see if she downloaded any student images. To support the charge, he cited her response to an e-mail from a colleague who said viewing the webcam pictures was like watching "a little LMSD soap opera." "I know, I love it!" Cafiero allegedly replied.
Attention Americans highly value their privacy.
U.S. Sen. Arlen Specter, D-Pa., introduced a bill Thursday to treat video surveillance the same as electronic communication under the federal Wiretap Act. Sen. Russ Feingold, D-Wis., a co-sponsor.
These are VERY important issues that have to be explained, there is nothing fun / sexy / or entertaining about it, so most folks can't be bothered to focus on this kind of information and have no notion of what their privacy rights actually are. School systems across the country must look at their security and privacy guidelines.
Apr. 21, 2010 Even in his own home, the Harriton High School sophomore had "no legitimate expectation of privacy" from the camera on his school-issued laptop, information systems coordinator Carol Cafiero contended in a court filing on Tuesday . Cafiero - who is on paid leave while the district investigates the laptop controversy - claimed Robbins lost any legal protection from the Web-camera security system when he took a school laptop home without permission. Robbins had previously broken "at least two" school computers and did not pay the insurance fee required to get permission to take home the Apple MacBook that later snapped his pictures, Cafiero's attorney, Charles Mandracchia, wrote in the filing. District officials said Monday that the built-in cameras on students' laptops had been switched on 146 times, taking 56,000 pictures in the process. District lawyer Henry E. Hockeimer said none of the photos appeared to be "salacious or inappropriate" but said that did not justify the use of the program. It was not immediately clear if the school district agreed with any of the arguments made in Cafiero's court filing. Revelations about the laptop security system's use have also prompted a federal investigation, and on Tuesday, Cafiero told an FBI agent that she had a "very limited" role in the Web-camera usage, her lawyer said. Haltzman said Cafiero's latest filing showed "no respect for the privacy of Blake Robbins" by offering details of the sophomore's past issues with computers and insurance fees. Haltzman also said the district itself "has never asserted" that Robbins had waived his right to privacy by taking home a laptop without permission. "It is false to say that he did not have an expectation of privacy," Haltzman said. "It is also wrong for Cafiero to make that type of assertion in her pleading." The civil case is due back in court Wednesday for a closed-door conference before Chief Magistrate Judge Thomas J. Rueter.
Judge Rules LM School District Insurance Company pays
:
School District Ballard Spahr law firm and L3, a computer forensics company, charged more than $550,000 in
invoices for their services to Lower Merion, which the insurance company had to pay.
The court order is part of a proposed class-action lawsuit against the 6,900-student district, which
discontinued the
LANrev webcam-tracking program
in February after a sophomore's parents
learned that their son was secretly photographed at home. Under the order (.pdf), issued by Magistrate Judge
Thomas J. Rueter of the Eastern District of Pennsylvania, affected students and their parents will have the
option of viewing the captured images privately, though they won't be given a copy. The students can
also
preview the images outside the presence of their parents, and ask the judge to block their parents from
access
to particularly sensitive images.
The Lower Merion School District on Friday argued that the district's insurer should pay what could be a million-dollar tab to resolve a lawsuit over its now-disabled laptop tracking program. In a counterclaim filed in federal court, attorneys for the district also accused New York-based Graphics Arts Mutal Insurance 180 Genesee St New Hartford NY 13413-2200 Phone: (315) 734-2000 of breaching the terms of the multimillion-dollar policy it issued last year. Graphic Arts balked, contending that its policy covered only personal injury or bodily harm, not the kind of damage that Robbins alleged. The company filed its own lawsuit against the district, asking a federal judge to rule that the contract released it from any liability related to the Robbins matter. In the interim, Graphic Arts said it would cover only 80 percent of Lower Merion's costs, and reserves the right to recoup that money if the judge rules in its favor.
Perfect Storm Many School Districts won't issue Webcam Laptops
Consortium for School Networking, an association of technology leaders who advise school districts, needs an education. Citizens need an education. Can people really be so unaware of the issues involved with trusted computing that school districts, administrators, IT professionals, and security professionals see nothing wrong with using remote administration software?
Technicians and Police Officers are incompetant. If you want to find a stolen laptop you contact a professional to get the job done. When you file a stolen vehicle report with the police, police computers send a silent radio signal to your car, automatically activating the hidden LoJack transmitter in your vehicle. Police can then track the signal and locate the vehicle. How do you report a stolen laptop to the police? Then the school is notifed to use the software to locate the laptop. With the way webcam theft tracking works, we'll need a new type of search warrant: Location To Be Determined After Search. When these laptops wake up and retrieve orders to activate their webcams, they can literally be anywhere. Bergen County school district has 2,100 students in two high schools and they use a tracking system to locate missing or stolen laptops by using [a computer's Internet] address, then police obtain a search warrant to check for the laptop. In the Henrico County, Va., public schools, about 26,000 laptops have been issued to students and the remotely operated Web cams are disengaged until a computer is stolen and reported to the police. In California, the Fullerton Elementary School District provides laptops to its pupils but - like Henrico County - it requires a reported theft before security measures are activated. The school system's technology director can turn on the camera only after the theft has been reported to police and the number of the report is entered, officials said. Police need a search warrent . If you don't know where to look and just activate the software to look you may find out that the stolen computer is somewhere you shouldn't be looking, like a child's bedroom or SKIF . So how will you fill out a webcam search warrants? How is that going to work?
Lillie Coney of the Electronic Privacy Information Center "If they thought it was right, they wouldn't have stopped. "But they weren't thinking. And they weren't planning to get caught. So they didn't tell anybody." "We've been conditioned to think we'll give up anything for security, but people have more say about these things than they think."
Put another way, principals may rule at school, but students' homes must remain a refuge. "For this school district to develop police powers in secret and then exercise those powers in secret," she said, "is problematic and disturbing."
If you tried to Protect your Privacy then jail breaking was grounds for explusion.
Parents are citizens who may be ignorant of their rights and not realize that it's wrong, and don't realize it's spyware and think they have signed their rights away when they accept the free computer, but should protest.
Missing the Boundary Line is Key:
The Police Were Not Called.
This particular laptop has never been asserted to be lost, stolen, misplaced, or
missing.
If you are using it to locate stolen property you would call the police right? If software is used to watch
what children are doing, that is spying.
ADMINISTRATORS ARROGANCE: NOT THE FIRST COMPLAINT
Student
representatives had twice objected to the program's intrusiveness to the school administrators and had
been ignored.
Leardership Starts From The Top of the state.
PENNSYLVANIA INFORMATION TECHNOLOGY
|
on paid leave Michael Perbix, a network technician
, and
|
THE LOWER MERION NETWORK TECHNICIANS
1) Brad Miller 312 Davis Road Havertown, PA 19083 [p] 610-853-1161
2) Jeremy Valentine 1378 Indian Creek Dr. Wynnewood, PA 19096 [p] 610-896-469
3) Mike Perbix Network Technician has been blogging and posting on Apple mailing
lists how he did it.
Mike Perbix
talks about spying with Remote Desktop Curtain Mode
Lower Merion School District Telecommunications Specialist
[e]
PERBIX@lmsd.org
(610) 645-1964 - Work
(610) 896-2019 - Fax
Open
Subscriber
Stryde Hax , who says he works for the security firm Intrepidus Group, strydehax [e] stryde dot blog at gmail dot com did a brilliant job looking into sleuthing this out!
"Mike Perbix has a large online web forum footprint as well as a personal blog. During our testing, we infected a laptop with LANRev, then closed the lid, hoping to activate the LANRev feature which takes a webcam picture when the computer wakes. As my colleague Aaron opened the lid of his Mac, the green webcam light flickered, ever so briefly. It wasn't a glitch. It was a highly sophisticated remote spy in his system. And even though he was in control, the effect was still very creepy.
LANrev contains a security hole that put the students at risk of being spied on by people outside the school, according to a security firm that examined the software. The LANrev program contains a vulnerability that would allow someone using the same network as one of the students to install malware on the laptop that could remotely control the computer. An intruder would be able to steal data from the computer or control the laptop webcam to snap surreptitious pictures.
See the LanRev remote monitoring product Promo where
"Mike Perbix identifies himself as a high school network tech, and then speaks at length about using the track-and-monitor features of LanRev to take surreptitious remote pictures through a high school laptop webcam. A note of particular pride is evident in his voice when he talks about finding a way outside of LANRev to enable "curtain mode", a special remote administration mode that makes remote control of a laptop invisible to the victim. Listen at 35:47, when he says: "you're controlling someone's machine, you don't want them to know what you're doing" ~Mike Perbix
It isn't until 37 minutes into the video till Perbix begins talking about the Theft Tracking feature, which causes the laptop to go into a mode where it beacons its location and silent webcam screenshots out to an Internet server controlled by the school."
Mike Perbix: disable firmware lock intel laptops
*
Subject:
Re: disable firmware lock intel laptops
* From: "Perbix, Michael" <email@hidden>
* Date: Wed, 21 Oct 2009 19:30:37 -0400
OFPW (the latest version) is a universal binary and works. OFPW -command 0
will turn it off.
You could also use NVRAM, built in to the OS....
Sudo nvram -p shows you all the variables currently in your nvram....
sudo nvram security-mode=none
Turns off security, to turn it on
sudo nvram security-mode=command
To set the password, you need to know the encrypted version of it....set the password on another machine, then use sudo nvram-p to see it, copy the encrypted form of the password and use
sudo nvram security-password=<place encrypted password here>
sudo nvram security-mode=command
I use this from LANrev and sending unix scripts to set users firmware
passwords that may be wrong....or missed during a service call.
You can script a firmware password check script using openssl so that you don't have to put the weakly encrypted password in a visable script...
http://bestsinceslicedbread.blogspot.com/2009/09/compare-secure-values.html
I started documenting things I do like this in my blog...if you can call it
a blog 8-)...
-Mike
On 10/21/09 6:36 PM, "nate st.germain" <email@hidden> wrote:
try using this utility: http://code.google.com/p/efipw/
sudo efipw -p "" should set the pass to nothing.
sudo efipw -d will decrypt it.
>
> On Oct 21, 2009, at 6:32 PM, Bob Henry wrote:
>
>> Can anyone direct me to a CLI solution to turning firmware protection off on mac books?
>> I scraped this off my shoe:
>> /usr/local/bin/OFPW -pass mypassword
>> /usr/local/bin/OFPW -mode 1
but seems that OFPW is a PPC util. Please advise TIA
Bob Henry IT & DATA Wrangell Public Schools 907-874-2321 x244
Michael Perbix
Lower Merion School District
Network Technician
http://bestsinceslicedbread.blogspot.com
He describes using the remote monitoring feature to locate a stolen laptop:
Turning off the Lightspeed LsSaAlerter in OSX
We were having an issue with LsSaAlerter application which is part of the Lightspeed systems Security Agent
for OSX. the LsSaAlter application is responsible for the menu bar icon that shows you the status of the
security agent and what it is currently doing. There is also a shortcut to get to the Lightspeed
Preferences
Pane by clicking on the menu icon.
There does not appear to be any current way via filtering policies to disable that menu and even if you
MANUALLY go into the com.lightspeedsystems.securityagent.plist and set the "Enable Manger" key to
false, it resets on next logout/login.
So, to manually force that option we look to Apple's MCX system that we use to manage our laptops via
group policy. Using the Workgroup Manager application, we select the computer group and click on
PREFERENCES,
then click on the DETAILS tab. Click the little + symbol at the bottom and find the Lightspeed preference
file and load it in making sure you are loading it into the ALWAYS category. The preference file is found
at
/Library/Preferences/com.lightspeedsystems.securityagent.preferences.plist
Once loaded, click on the EDIT symbol (little pencil) next to the + and - buttons, and expand the ALWAYS
selection. Click on each entry and hit DELETE to remove it. The only entry you wish to remain is
"Enable Manager" which should be set to boolean and false. This allows the other items to still
be
controlled by the filtering policy.
Now, next time your clients in that computer list refresh their preferences, the menu item will no longer be
present.
BTW, this is a good way to force preferences for many third party programs that support PLIST preference
files. Of course, it is good to test, and you may have to use OFTEN or ALWAYS. Always means that the
preference can NOT be changed...OFTEN means it sets the preference on login, and can be changed, but on next
login the preferences will be reset to what you want them.
Sunday, September 13, 2009
Enable and Disable the built in iSight.
This can be accomplished by changing the permissions of 2 files. It can be done by removing rwx for all
users (ie chmod a-rwk) on the following
/System/Library/QuickTime/QuickTimeUSBVDCDigitizer.component/Contents/MacOS/QuickTimeUSBVDCDigitizer
/System/Library/PrivateFrameworks/CoreMediaIOServicesPrivate.framework/Versions/A/Resources/VDC.plugin/Contents/MacOS/VDC
This has been tested on OSX 10.5.7 (MacBook) and OSX 10.5.8 (MacBook Pro)
A DMG with the completed script and application can be found
here
.
The script should go somewhere in your path (/usr/sbin or such) and have the appropriate permissions and
owner. You can then run it from a utility such as ARD or LANrev, or from a SSH login by issueing the
command
with the appropriate option use -h or -help for info.
The Application has a copy of the isighter script contained in it's bundle. The actual Applescript is
an
example of how to run a terminal command with admin privileges and can be found
here
.
ENJOY!
Posted by Michael Perbix
strydehax
explains that "Perbix
puts
it in context on an admin newsgroup
, in a post which makes it clear that his script allows for the
camera to appear shut down to user applications such as Photo Booth but still function via remote
administration:
"what this does is prevent internal use of the iSight, but some utilities might still work (for
instance an external application using it for Theft tracking"
What's the purpose of shutting down a camera for the user of the laptop but still making it available to network administrators? Ask yourself: if you wanted to convince someone that a webcam blinking was a glitch, would disabling the cameras help make your case?"
" Posted on digg and SAC: ""As a recent graduate of Harriton, I thought I could shed some light on the situation. These laptops were 2.0ghz 2gb Macbooks issued out to all the students for the entire year to do whatever they wanted and this was the 2nd year of the program. The webcam couldn't be disabled due through tough tough security settings. Occasionally we would notice that the green light was on from time to time but we just figured that it was glitching out as some macbooks do sometimes. Some few covered it up with tape and post its because they thought the IT guys were watching them. I always thought they were crazy and that the district, one of the more respectable ones within the state, would never pull some s*** like this. I guess I was wrong. I am a little surprised because nobody in the past had be disciplined for doing anything inappropriate during school or outside of school. The only thing coming close was a kid performing a simple hack to make another account in order to install games. This specific incident was traced through the network by the IT dept. While I still think there might be a chance the vice principal/ disciplinarian doesn't have these specific images as she is quite the type to make a bluff like that, it sounds to me like this is legit. If they have been watching all of us and looking at our logs and looking at what we type, I can assure you that they have seen lots and lots and lots of dirty things."" "
" I am the father of a 17 y/o Harrington High student. She has had one of these laptops for 2 years. She has noticed the "green light" coming on but was not computer literate enough to know what initiated it. While it is true that frivolous law suits exist, there are many suits that are found to be true. The LMSD has helped create an atmosphere of distrust in their community. It should be no surprise that parents do not automatically come to their defense.My daughter's noticing the light on her laptop was identified prior to any news of a laptop. The assumption was that it was a defect. That is now not as clear. "Were students and families explicitly told about the laptop security system?
Removing Webcam Tracking feature from Laptops at LMSD
Strydehax Update 2/23/2010 11:28am
Aaron Rhodes says the reason LANRev is using the raw camera device is that
Apple
implemented security measures to prevent remote activation of the webcam
in OSX.
LANRev was
designed to bypass this security measure
. Ask yourself, "what kind of software bypasses OS
security measures?"
On the topic of whether or not we yet have proof of illegal use, I would ask you to listen carefully to the
webcast, and listen for the word "house" at 1:28. Listen for "yes we have used it."
THE AUP
- Staff Access to Networked Information Resources Acceptable Use Policy PDF
- Administrative Regulations for Staff Acceptable Use Policy PDF
- Staff Network Account Request Form PDF
- Student Network Access Policy PDF
-
Student Guidelines
PDF
Educational Technology for the 21st Century
• Use of district technology for communication and operations
• Guide students to the understanding and adherence of guidelines for acceptable use of technology
• Awareness and use of technology resources
• Basic knowledge and use of district network
• Awareness and development of age appropriate technology competencies for students
• Apply technology tools to best practices for teaching and learning
Supervisor of Instructional Technology - Jason Hilt
Administrative Assistants - Andrea Papsin. Sherry Zielke
Webmaster - Jason Michael
SIS Support Technicians - Jessica Bolton, Jim Roletter
Desktop Technician - Chuck Ginter, Jim Wills
Helpdesk Technician - Amanda Wuest
Audio/Visual Technician - Jim Rigby
Building Level Technology Support - Tom Crocker, David Feight, Kyle O'Brien, Neil Pancoast, Matt Shaw,
Matt Stanford
Building Level Instructional Technology Specialists - Beth Hampton, Rhonda Keefer, James Langmayer, Tom
McGee,
Andy Pron
In this episode we show you how to take a
USB web cam and turn it into a spy camera.
Further Reading:
Why K-12 School Districts should be using Open Source Software Technology
Trusted Computing is controversial as the hardware is not only secured for its owner, but also secured
against its owner as well. Such controversy has led opponents of trusted computing, such as
Richard Stallman
, to refer to it instead as
"treacherous computing"
, even to the point where some scholarly articles
have begun to place scare quotes around "trusted computing".
Trusted Computing opponents such as the Electronic Frontier Foundation and Free Software Foundation claim
trust in the underlying companies is not deserved and that the technology puts too much power and control
into
the hands of those who design systems and software. They also believe that it may cause consumers to lose
anonymity in their online interactions, as well as mandating technologies Trusted Computing opponents deem
unnecessary. They suggest Trusted Computing as a possible enabler for future versions of mandatory access
control, copy protection, and
digital rights management
.
Some
security experts
have spoken out against Trusted Computing,
believing it will provide computer manufacturers and software authors with increased control to impose
restrictions on what users are able to do with their computers. There are concerns that Trusted Computing
would have an anti-competitive effect on competition in the IT market.
There is concern amongst critics that it will not always be possible to examine the hardware components on
which Trusted Computing relies, the Trusted Platform Module, which is the ultimate hardware system where the
core 'root' of trust in the platform has to lie.
The whole focus is on giving the system operator lots of flexibility to do whatever they want , while giving customers, experimenters, competitors, and citizens zero flexibility or opportunity.
If not implemented correctly, it presents a security risk to overall platform integrity and protected data . The specifications, as published by the Trusted Computing Group, are open and are available for anyone to review. However, the final implementations by commercial vendors will not necessarily be subjected to the same review process. In addition, the world of cryptography can often move quickly, and that hardware implementations of algorithms might create an inadvertent obsolescence. Trusting networked computers to controlling authorities rather than to individuals may create digital imprimaturs.
The Cambridge cryptographer Ross Anderson has great concerns that "TC can support remote censorship [...] In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored (as at present) [...] So someone who writes a paper that a court decides is defamatory can be compelled to censor it — and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to be used to suppress everything from pornography to writings that criticize political leaders." He goes on to state that:
[...] software suppliers can make it much harder for you to switch to their competitors' products. At a simple level, Word could encrypt all your documents using keys that only Microsoft products have access to; this would mean that you could only read them using Microsoft products, not with any competing word processor. [...]
The [...] most important benefit for Microsoft is that TC will dramatically increase the costs of switching away from Microsoft products (such as Office) to rival products (such as OpenOffice). For example, a law firm that wants to change from Office to OpenOffice right now merely has to install the software, train the staff and convert their existing files. In five years' time, once they have received TC-protected documents from perhaps a thousand different clients, they would have to get permission (in the form of signed digital certificates) from each of these clients in order to migrate their files to a new platform. The law firm won't in practice want to do this, so they will be much more tightly locked in, which will enable Microsoft to hike its prices.[7]
Ross Anderson summarizes the case by saying
"The fundamental issue is that whoever controls the TC infrastructure will acquire a huge amount of power. Having this single point of control is like making everyone use the same bank, or the same accountant, or the same lawyer. There are many ways in which this power could be abused."
Microsoft Spy
- 17-page
Microsoft Global Criminal Spy Guide. Its programs, make it easier for law enforcement to obtain user data,
violations of trust toward its customers. For a large corporation with millions of users and an aggressive
PR
agenda, the document raises concerns and sparks conversations the company would rather not confront.
"It's part of a very intense political debate about the role of intermediary companies like
Microsoft
aiding surveillance for law enforcement. It's embarrassing for Microsoft for their users to see how much
the people who carry their email have arrangements with law enforcement... All of the people who carry our
communications are an easy conduit for our government to spy on us, and a lot of people are unhappy about
that.
Is your data encrypted? 45 state privacy laws - Only Safe Harbor-Data Encryption
Almost all states and the federal government have enacted or plan to enact legislation requiring
notification
of security breaches involving personal information. Many existing state and federal privacy laws have also
gained teeth recently-including stiff penalties in some cases. These include:
- MA 201.CMR.17 - The new model for privacy laws, Massachusetts's recent legislation mandates encryption and even impacts companies in other states (compliance deadline extended to March 1, 2010)
- CA SB1386 - If you handle data for residents of the country's most populous state, California, you must notify individuals if a breach occurs-unless the data is encrypted
- NV SB 227 - Vendors in Nevada must now comply with the Payment Card Industry Data Security Standard (PCI DSS)
APPLE CLASSROOMS
OF TOMORROW
What a nightmare!
THE APPLE
COMPUTER
is marketed to all the School Districts and the District Lawyers and Technologists aren't experts
who
know the issues or understand the law which is no excuse.
Just because there is
an
AUP
doesn't mean the school
district has the right to spy on citizens. Hard working, well meaning, sincere, but ignorant employees of
the
school systems in this country are enabled to buy the computer technology with your tax dollars using
government funds - and apple wants the easy money.
Apple
sold
these computers
to the School District. Apple makes a lot of money when
it promotes the
Understanding of 21st Century Skills and Outcomes Curriculum
.
Can Apple prove they informed the School District that the webcams should not be used to spy on
children?
Apple should be held accountable for telling the School District what to include in the
AUP. Apple needs to be investigated and possibly prosecuted for negligence if they did not take
responsibility
for giving the school district an AUP for the parents.
This school
document
identifies the hardware and software in use as Macbook laptops running OSX.
Apple
Remote Desktop 3
: Administrators have access to the laptop of every kid in the school through
this
program, and can switch from one to another and watch what the kids are doing on their computers in real
time.
Remote observation and control of target computers is plainly listed in the
Apple Remote Desktop 3 Feature
List
.
Webcameras are enabled by the IT department to allow Administrators to see their screens, and faces and
communicate with th student and take a picture of them (admins can control their laptops remotely) in Photo
Booth, or interrupt their IM conversation with their own message. No one informed the kids that they were
being monitored. Even if the laptops don't belong to the student, so should have be able to expect
privacy. The potential for abuse is nearly limitless, especially since many teens keep their computers in
their bedrooms.
Even when a non-IT employee clearly is to blame for a security breach, IT is still responsible.
Dan Morill ~ "We need to remind ourselves again and again that information security is not a technology issue - it's a people issue. We are reliant on people, their awareness, ethics and behaviour, and we must understand what they want to achieve if we are to accomplish the goals of business. This includes the employees that deliver our services and the customers that take advantage of them, as well as the senior executives and board room directors that grant us our budgets."
Guidelines for Use of Student Laptops
1
The laptop computers that will be issued to all high school students
are the property of Lower
Merion
School District
. Students are responsible for the appropriate use of these laptops both at school
and at home. The laptops are for the use of students for educational purposes. All commercial, illegal,
unethical and inappropriate use of these laptops is expressly prohibited.
Students are to comply with copyright laws. Downloading games or software is expressly prohibited. Only
District licensed software is to be installed on the laptops.
The maintenance of laptops is the student's responsibility. If laptops need repair or maintenance
students are to report to the Technology Center in their building. Vandalism to any laptop or accessory is
strictly prohibited. Students must present school issued picture ID when they bring their laptop in or pick
up
from repair.
Students should refer to the Student Acceptable Use Policy and their Guidelines. Any violation will be
subject to discipline as outlined in the Harriton and Lower Merion Student Guide.
High school teachers will distribute laptops during Advisory period on September 8, 2009. Laptops will have
a
label containing the student's name and other information specific to the laptop for identification.
APPLE SALES PITCH TO SCHOOLS
Creating a 21st Century Learning Environment with Anytime Anywhere Access to Digital Resources
The major goals of this initiative are to provide students with 21st Century learning environments both at home and in school, and to give all students access to technology resources. We have the opportunity and the responsibility to utilize research-based, technology-enabled practices to inspire and capture the imagination of our students. LMSD seeks to create a learning environment that fosters deeper cognitive development through inquiry, real and relevant project-based learning, and differentiated instruction - all supported by continuous access to digital technologies. Students will have the ability to work on projects and research both at school and at home. They will have 24/7 access to the software that they use in school. We believe that the laptop is an essential tool to assist them in thinking critically, analyzing data, solving real world problems and publishing their work.
- Letter to Parents
- Letter to LMHS Parents
- Letter to HHS Parents
- 21st Century Learning FAQ
- Classrooms for the Future
- Measuring What Really Matters
- Insurance Payments
- Getting Started Guide for Students
- Student Helpdesk Login
- Student Printing
- Home Filtering Letter
- One to One Printing and Filtering at Home
- For more information about the topic(s) covered on this page, please email email_link("laptopfaq","lmsd.org","Letter to HHS Parents"); laptopfaq@lmsd.org .
YOU ARE ON PAGE 2
PAGE 1 - INTRO: HARRITON HIGH WEB CAM SPY
PAGE 3 - NO PUNISHMENTS COMPLETE ETHICAL FAILURE