Chapter 6

Web Camera and Video Tracking

Abstract

This chapter explains how to track user activities through web cameras, mobile phone cameras, security systems, and other forms of camera-based technology. The increased use of mobile devices with cameras, personal computers with webcams, and camera systems installed at homes, businesses, and out in the general public are growing at an alarming rate. In this chapter, we will look at the growing use of this technology, what the technology is capable of, what purposes are served for good and evil, and why we should be concerned. This chapter will cover creepware and other malwares that are used to expose weaknesses in camera technology. We will also look at and discuss how camera systems everywhere are allowing government agencies a view into our private worlds.

Keywords

Creepware
Webcam
Satellite
Nanny cam
Xbox Kinect
Gaming Console
CCTV
DVR
Privacy
Sextortion
Blackshades
Remote Administration Tool (RAT)
Visual malware
PlaceRaider
Digital Forensics
NSA
GCHQ
Optic Nerve
Facial Recognition

Camera tracking

The increased use of mobile devices with cameras, personal computers (PCs) with webcams, and camera systems installed at homes, businesses, and out in the general public are growing at an alarming rate; the threats are also growing to expose security issues with them that violate your privacy. In this chapter, we will look at the growing use of this technology, what the technology is capable of, what purposes are served for good and evil, and why we should be concerned.
As we discuss these topics and how they relate to reconnaissance and surveillance, it will become evident that you are now always on camera. We carry one with us everywhere we go. There tends to be a camera located everywhere. Let’s consider this example: You wake up and get ready for work, while in your home you are on camera as your home has an active internal security surveillance system. You check your e-mail before you leave the house on your laptop configured with a webcam. You pack up to leave and grab your mobile phone and tablet and get into your car. Your drive to work passing roughly 10 traffic lights before pulling in and parking in the parking garage. There is video surveillance feeds in the garage. You enter work and each entrance/exit and floor contains surveillance equipment. You dock your work laptop (with integrated webcam) and get to work briefly checking your mobile devices that are directly sitting next to you. Each time you leave your desk to move within the office, you take your phone with you. You leave for lunch and go to mall to eat in the food court with a few friends. The mall has video surveillance feeds. After work, you drive back home (10 traffic lights) and settle in for the evening. After dinner, you decide to load a game on your Microsoft Xbox and join a few friends online to play games. Later, you check your social media sites online and Skype with a friend.
We can go on and on but I think you get the picture. You are on camera 24 hours a day and this does not include the government’s ability to pinpoint and track your whereabouts via satellite. This does not include military or law enforcement being able to use satellite tracking. In this chapter, we will discuss all of the ways you may or may not know you are being captured on camera and how you protect yourself. Digital surveillance is here to stay and will probably become more invasive over time, so learning how to mitigate threats and being aware of new threats is the key to regaining your privacy.

Tracking examples

In the example given, we covered quite a few things that you may or may not be aware of. Let’s recapitulate.
In the example: You wake up and get ready for work, while in your home you are on camera as your home has an active internal security surveillance system.
The reality of this is, although deemed secure, you are on camera in your own home. If you have a provider watching, they obviously have policies in place to protect your privacy; however, what if they are hacked? What if stored information is exposed? Although not likely, it is possible. What if those same cameras had a flaw and can be hacked by a neighbor or someone passing by?
You check your e-mail before you leave the house on your laptop configured with a webcam. You pack up to leave and grab your mobile phone and tablet and get into your car.
As we will discover while exploring this chapter, there are new forms of malware and hacking applications that allow an intruder to take over your device completely and view your surroundings from your webcam. Mobile devices are also exploitable via apps that also perform this behavior.
Your drive to work roughly passing 10 traffic lights before pulling in and parking in the parking garage. There is video surveillance feeds in the garage. You enter work and each entrance/exit and floor contains surveillance equipment.
As we have learned in earlier chapters, traffic lights (as well as bridges and other infrastructures) are protected with cameras that track your location. Surveillance systems are normally installed in public places such as parking garages and at the entrance of company locations. These same systems are also located within company work spaces.
You dock your work laptop (with integrated webcam) and get to work briefly checking your mobile devices that are directly sitting next to you. Each time you leave your desk to move within the office, you take your phone with you.
The same risks at home have now transferred with you to work. You are working on a system with a webcam (usually, directly integrated into your laptop or workstation) and your mobile devices are always close by.
You leave for lunch and go to mall to eat in the food court with a few friends. The mall has video surveillance feeds. After work, you drive back home (10 traffic lights) and settle in for the evening.
When you leave work, you pass all of the same surveillance gear you encountered on your journey into work and, similarly, where you go there will be more.
After dinner, you decide to load a game on your Microsoft Xbox and join a few friends online to play games. Later, you check your social media sites online and Skype with a friend.
You are back at home with the same possible threats but now you have opened even more by using other cameras located in your home.
Although this evidence may seem overwhelming, nothing can be further from the truth – it is possible that you are always on camera. In this chapter, we will look into each of these threats, how they have been exploited in the past, and, if possible, why it is important to be vigilant in securing against them.

Security Surveillance Systems (Private Home)

Systems put in place at home to protect your belongings, from intrusion and otherwise, can be helpful. There are actual cases where these systems have been helpful in not only preventing crime but also solving cases of crimes that have been committed. There are two classes of these types of surveillance systems. One you set up and monitor yourself or a professional system that is monitored by a third party. These systems can be internally and externally located at your home. Obviously, you would want these systems to be located.
In the summer of 2013, an arrest was made on a man who conducted a home intrusion in New Jersey and assaulted a woman in front of two small children. Jewelry was stolen and the suspect fled. A “nanny cam” had been installed in the woman’s home used to keep an eye on the sitting services while away from the home. These webcams are common so that those who put their kids in the hands of others can be watched, so they can monitor how their children were handled that day. The suspect wanted in this home invasion had been captured on camera, and during investigation by the local law enforcement as well as the Federal Bureau of Investigation (FBI), an arrest was made to take the man into custody. As we can see, security systems do in fact provide a wealth of value when they are used for good. As seen in Figure 6.1, the camera caught the invasion and provided all of the evidence required to prosecute this attacker.
image
Figure 6.1 Home Invasion Caught on Nanny Cam
So, what about the privacy of the nanny? Was it disclosed that there was a nanny cam installed? Although this question may not even come up because of the nature of how successful this cam had been in capturing a criminal; however, this is also a concern because if not disclosed, this camera would be watching those entering the home and recording their actions without their knowledge or consent. This is where the argument comes in – where does privacy end and security begin? On one hand, a criminal was caught and taken off the streets. If the hired daycare or sitter watching children did something heinous, it would be caught. These are positives and gain the support of many, but what about privacy of those who do not know they are being recorded such as a good babysitter who cares for the children and never know that their private conversations on their cell phone are overheard and so on.
Another concern with personal home security systems is that they can be hacked. Most systems work off of wireless networking and TCP/IP, therefore, if not secured correctly, can be easily penetrated and remotely used. Your living room has now become a prime time television for a stalker.
If you are not using a personal security system and have installed camera systems for a third party vendor or company to monitor for you, you should be aware that this means that a third party has the ability to see what you do in the name of “security.” If these personal security systems monitored by a third party are exploited by someone attacking the vendor, then you could also be at risk.

Security Surveillance Systems (Businesses)

Systems put in place at businesses mirror those previously discussed when we did an overview on home-based security systems. Businesses need to protect their interests and assets the same way that a personal home owner would, and more so, because they are responsible for activities of their workforce. For example, what if someone in the office stole a piece of equipment and/or stole something from another co-worker? What if a crime is committed? There are legal implications that need to be considered.
Besides basic security, these cameras also provide a deterrent feature. Those who believe they will be caught are less likely to commit a crime. When you work for a company, go through on-boarding, and use the company’s resources, it should not come as a surprise to you that you will be monitored.
Where this seems to cross borders is, what type of business are we talking about? For example, if this is a fortune 500 company where workers come in to do business everyday, it may not seem inappropriate to have security cameras placed in common areas; however, what if the business we are talking about is a school? What if it was a church? What if your right to privacy was invaded based on the business that was under surveillance?
Another concern is what if business systems then invaded your personal privacy at home? A great example of this can be seen when a school district in Pennsylvania during 2010 activated student webcams on school-loaned laptops used by the students. Parents were not informed and student privacy (and safety) was put at risk.
It can be said that in some instances, these cameras provide protection, can be used as a deterrent, and, in some cases, prevent or solve crimes, whereas in some instances, it can be used to commit crimes and evade your privacy. In such situations, understanding your surroundings and doing due diligence (covered in Chapter 8) will help you mitigate risks as much as possible.

Privacy or Security?

“Those who give up liberty for safety deserve neither” – Benjamin Franklin.
Those words ring true today more than ever. There is a large debate taking place and has been growing each day over the amount of “security” we need to be “safe.” What is more concerning is the amount of privacy we wipe away as citizens under the guise of false security. Yes, it can be argued that cameras can be used for good, but in the wrong hands they are extremely dangerous. Civil rights are invaded, privacy is slowly eliminated … what more will it take to show those who believe in being a free society that we are moving closer to George Orwell’s 1984 each and every day we allow cameras to become a part of our lives? We carry a phone that tracks our every location. We drive in cars that can be tracked. We do things online that can be tracked. We make transactions that are tracked. Now, we do it all in front of cameras.
The question of privacy or security is one that cannot be answered easily. As long as there are those who live in fear and believe that the security offered is worth the rights they give up are worth it outweighs those who do not, we will continue to head down a path of giving up those rights. This question I believe is one that will be answered over time and through experience. We will have to take the ride and see where we get off. Hopefully, we do not live in an over-secure world and have given up all of our rights.

Security Surveillance Systems (Public)

If you are a fan of popular television drama, there are many shows available where crime is investigated by pulling camera footage to establish a timeline, to show specifics on “who was at the location” and otherwise. Although this is exciting on drama TV, it should be considered that these activities really do take place. As a matter of fact, many crimes are investigated in this manner. Part of doing Digital Forensics is recovering data stored on systems to re-enact a crime or offer evidence of a crime taking place.
Traffic lights, bridges, traffic cams for news outlets, and many other areas where we publically congregate are increasingly being put under video surveillance. Are we at risk or will this offer protection? There is much debate in this area; however, we can highlight examples where this type of surveillance was deemed to be helpful. The Boston Marathon example is one that sheds light on the helpfulness of video surveillance in public areas. As seen in Figure 6.2, the two suspects caught performing this heinous act were caught because law enforcement officials sifted through all available public video surveillance to put together the timeline and acts of terrorists performing an attack.
image
Figure 6.2 Boston Marathon Video Surveillance
As mentioned, this is a good thing. The wrongdoers were captured because of the fact that they were caught in the act by the video footage. This advocates for more video surveillance to be placed in public places in order to stop these types of activities all together or to deter those from doing them. What the public may not know is, in order to provide this level of security video must be recorded at all times.
What the public may not know as well is, advanced computing systems are in place to scan video surveillance footage stored in databases that perform facial recognition as an example. Software is being developed to do advanced mining of data to create maps, pinpoint location, and other highly questionable tasks that if in the wrong hands could spell trouble for anyone’s privacy.
Regardless, you should be made aware that you are under surveillance. This can be done by anyone who is using this technology by posting a sign to let those in the vicinity know that it is taking place. As seen in Figure 6.3, the signs can alert the public that the area that they are in is under surveillance.
image
Figure 6.3 Video Surveillance Warning Signs
This technology is also considered closed-circuit television (CCTV). CCTV is the technical name for a “network” of video cameras, viewing stations, and a digital video recorder (DVR) system that records, stores, and allows you to retrieve video data. DVR systems that store data generally have hard disks that store the data they record. Since video is generally large in size when stored, the disk drives used to store them need to be large in size. Generally, the quality of the video can be lessened to decrease the amount of size it can be when stored. This will create a problem when forensics is done in a criminal case. It can be argued that the picture is not “clear” so it cannot accurately show the identity of someone accused.
Other types of public surveillance you should be concerned about are with law enforcement. Generally, police officers have recording equipment as part of standard issue on all police cruisers and other transportation equipment. Some enforcement agents also use body worn video cameras to show all actions taken while doing their work. Although this can help the enforcement agent, it can also create issues with privacy on routine stops or if you were suspected but innocent of a crime. The material is still recorded regardless.
According to the American Civil Liberties Union (ACLU), there are major problems with public video surveillance. The opinion is that video cameras and CCTVs are being made more and more of a necessity based on the fear brought on by the media, the government, and the voice of terrorism. Obviously, some form of this security is needed, specifically around high target areas or national landmarks but the proliferation of it to every corner of our lives is deemed ineffective.
As an example, when criminologists and other experts have reviewed cases based on terrorism, video cameras did not deter their consideration or ability to attack at all.
Another concern by the ACLU is that CCTV is prone to serious abuse. For example, in 1997, a police official used information captured by a police database to blackmail patrons of a gay club. Other forms of abuse such as institutional abuse and personal abuse are also possible. Targeting, discrimination, and other concerns also top the list.
The ACLU is also concerned about the lack of limits of controls on camera use, for example, public CCTV systems that can do facial recognition. The US Supreme Court since the late 1960s has used the verbiage “reasonable expectation of privacy” to assist with adding a level of privacy to police searches. The Fourth Amendment to the US Constitution allows for protection against police-based video searches; however, today no rules stop the abuse of CCTV. Some protection against video searches conducted by the police exists, but there are currently no general, legally enforceable rules to limit privacy invasions and protect against abuse of CCTV systems.
Another concern is that growing and uncontrolled use of video surveillance systems will change the face of society as we know it, as public citizens will begin to act differently when they know they are being watched and monitored at all times.

Satellite Surveillance Systems

Government/military agencies use satellite-based surveillance systems to perform reconnaissance operations domestically and globally. One may argue that these systems invade privacy; however, they have also proven to establish and maintain global security. Again, in the wrong hands this information could be problematic for anyone who deem privacy important, but what about security? Let’s discuss an example where these satellite systems have proven to be helpful.
Reconnaissance satellites are generally ones that observe the Earth and can zoom in to view everything and anything from space to Earth’s surface. Generally, used for military operations or law enforcement intelligence, these systems allow for high-resolution viewing, eavesdropping visually, and, at times, with audio and recognition.
As seen in Figure 6.4, the capture of Osama Bin Laden was largely done by observing the compound in which he was suspected (and later found to be inhabiting) via satellite. These same techniques were used in the second Iraq war to find Saddam Hussein.
image
Figure 6.4 Using Satellite for Military Operations
Again, we can see where it is helpful, but this same technology can be used to track anyone, anything, and at any time globally and that when used by a malicious entity could prove to be considerably damaging. On a smaller scale, Google Earth and other tools allow for this level of pinpointing (nonmilitary grade) via latitude and also longitude.

PC devices and webcams

Now that we have reviewed video surveillance and its many applications, we should look at video at the PC level. Web cameras (or webcams for short) are not new and have been around for years. They allow a user of a PC to incorporate video into software on their PC such as Webex, chatting software (such as Apples iChat), and Skype. Although this technology has been in use for years, it has grown to become more of a threat over recent years. As seen in Figure 6.5, the webcam can be a device either mounted on a PC or integrated directly into it.
image
Figure 6.5 PC Webcams
As this technology has not evolved much since its inception, what has evolved is the nature of the attacks that can be done with it. In 2013, the FBI conducted a probe after Miss Teen USA Cassidy Wolf made a complaint that she had been a victim of sextortion. Later, after the investigation, Jared James Abrahams was arrested for using Blackshades and remotely penetrating her computer and viewing her through her webcam. He made copies of images and sent them to her demanding sexual favors. Cassidy Wolf immediately brought this issue to the authorities and after law enforcement involvement, made the arrest of Abrahams. Abrahams had also pled guilty to not only conducting this operation but also against 100–150 other women.
This highlights the use of creepware, and through this probe and others like it, 90 other people were arrested in a hacker sting of other using this software. During this sweep, the co-creator of Blackshades was also arrested. The remote administration tool (RAT) was used to access the webcams of unsuspecting victims and spy on them. This arrest led to the development of counter-spy software (SnoopWall) that can be used to thwart these types of attacks.
Creepware
According to a report by Symantec (maker of anti-malware software), creepware is a growing issue. Creepware is the buzz word for a RAT used in conjunction with a Trojan to access and control your system without your knowledge. Essentially, it needs to be installed on your system; however, with spoofing e-mail and other common methods, getting it installed is generally not an issue for someone not savvy with keeping their systems clean, those not using anti-malware software, or those just tricked into installing it. Someone could also locally install it without your knowledge.
There are many flavors of the software to include but not limited to Blackshades (W32.Shadesrat), Poison Ivy (Backdoor.Darkmoon), and DarkComet (Backdoor.Krademok). Symantec and other malware fighters have said that you should be aware that the software running can remain undetectable to the common eye and you will need to scan for it to ensure that it gets cleaned off. Obviously, due diligence helps as well – never install something on your system from an untrusted source.

Mobile Devices

Mobile devices pose the same exact threat as PC systems do. Your video camera can be used against you no matter what device you use or what vendor you select. If the device has a camera, software can be installed to use it for malicious reasons. As we covered in Chapter 4, mobile devices can be tracked everywhere they go. Now, you can also install an app on it (hidden of course) and the video can be remotely accessed by an attacker.
Another concept to wrap your head around is just how in depth that spying can go. According to a new research, a form of visual malware (also called PlaceRaider) can be used to create 3D models using your camera to build models of your environment in order to create a map. This highly advanced surveillance tool can be used to reconstruct a physical environment. Because this technology is new and has been created by the US Naval Surface Warfare Center, it is being claimed to be out of reach of the general hacker. This does bring to light that the government, however, can pull off such surveillance should be a concern.
Another concern may be false devices. This may seem very “James Bond” to you, but … dummy devices are used to spy on you as well, such as a fake mobile device that is really a recording device. As seen in Figure 6.6, the wireless charge-coupled device (CCD) spy camera/cell phone CN-SPY008 is a device that contains a color CCD camera and wireless video and audio used to capture data inconspicuously.
image
Figure 6.6 A Fake Surveillance Device
All of these devices should concern you. James Bond just became more advanced and anyone with a credit card can find, purchase, and use these stealth devices. Hackers can penetrate your legitimate devices or government agencies can access your devices for information.

Gaming Consoles

One of the biggest and growing threats today is with gaming consoles. Sony Playstation, Nintendo Wii, and Microsoft Xbox are few of the providers of devices that essentially do it all; however, they fly under the radar because they are not generally seen as a mobile device, a PC, or an entertainment system. What is interesting is, they are all three and much more. These gaming consoles have network connectivity, the ability to integrate into your systems and TV, and allow for the same as well as more application usage than all of these devices put together. They fly under the radar because they are generally not viewed as more than just being game consoles.
These devices also ask for your personal information, your financial information, and other data in order to allow you to interact with the vendor to get software, team up with other players, and interact with both vendor and gamers. Having read about all of the threats associated with surveillance thus far, this one should worry you the most. Consider your children use this system in their bedrooms, or perhaps you do. You may be under surveillance.
Microsoft’s Xbox (360 and now Xbox One) uses a motion detection system that functions off of a video camera called the Kinect. As seen in Figure 6.7, the Kinect can capture motion, allow players to view each other, and much more.
image
Figure 6.7 Microsoft’s Xbox Kinect System
According to researchers, this platform is considered highly sensitive to causing privacy issues. Children use it, it’s located in private locations in the home, it’s not secure by default … these are but a few of the high-level concerns many have about the system.
The system has also been found to be crawling with child predators and has even been considered to be a channel in which terrorists communicate. Because of this issue, earlier this year, Edward Snowden released that the UK version of the NSA (GCHQ) had considered using the Kinect for mass surveillance. The program called “Optic Nerve” was said to have targeted over a million users for facial recognition database collection. Because of this release of information, Microsoft responded that they did not authorize this and that they were concerned. Their response would be to expand their use of encryption and bolster security. It should be considered that the Xbox One now ships with the Kinect by default and has already sold millions of units. This means that these systems are everywhere and could potentially be used as a surveillance tool. The Xbox One has additional privacy controls that can be used; however, the question of how safe it really is still remains.
This can be said for any game console that allows for video interaction. As more and more consoles are shipped with interactive gear, this threat only grows. To mitigate these threats beyond applying controls to them, simply not using them is advised and/or if your children use them ensure that they only use them under supervision, with privacy controls enabled, and in a common area in the home.

Legal and ethical concerns

In this section, we will review case law in regard to how webcams can be used to spy against individuals and how they are brought forth in a court of law. In the following case, we will read about the Plaintiff Mr. Lammle who filed a claim against his then employer, the defendant, Ball Aerospace & Technologies Corporation, when Mr. Lammle was informed that his position had been filled after taking two separate leaves of absence.
Among other claims, Mr. Lammle also alleged that he was “falsely accused” of sleeping on the job and a webcam allegedly was used to spy on him. Mr. Lammle did not come forth with any evidence to establish the truth of each of these allegations.
In conclusion, the Defendant’s Motion for Summary Judgment is granted. “Judgment shall enter in favor of the Defendant on all of the Plaintiff’s claims, and the Clerk of the Court shall close this case.”
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLORADO
Honorable Marcia S. Krieger
Civil Action No. 11-cv-03248-MSK-MJW
ALAN C. LAMMLE,
Plaintiff,
v.
BALL AEROSPACE & TECHNOLOGIES CORPORATION,
Defendant.
OPINION AND ORDER GRANTING
DEFENDANT’S MOTION FOR SUMMARY JUDGMENT
This matter comes before the Court on the Defendant Ball Aerospace & Technologies Corporation’s Motion for Summary Judgment (#116). The pro se Plaintiff Alan C. Lammle has not responded to the motion.1

I. Material Facts

Where a party fails to respond to a motion for summary judgment, the Court does not reflexively grant relief to the movant. Rather, it must examine the movant’s submissions to determine whether the movant has met its burden of demonstrating that no material issues of fact remain for trial. Reed v. Bennett, 312 F.3d 1190, 1194-95 (10th Cir. 2002); Fed. R. Civ. P.
Lammle v. Ball Aerospace & Technologies Corporation Doc. 156
Dockets.Justia.com
56(e)(3). In doing so, however, the Court deems Mr. Lammle to have conceded the truth of any properly-supported facts alleged by the Defendant. Fed. R. Civ. P. 56(e)(2). With that standard in mind, the Court turns to the facts as asserted in the Defendant’s motion. In 2005, Mr. Lammle was hired by Ball Aerospace & Technologies Corporation (Ball), an information technology company, as a computer technician in the Information Management (IM) Department. In that position, Mr. Lammle served as the dedicated technician for engineers working at Ball. He was responsible for servicing and repairing their computers, troubleshooting software problems, and performing service calls to the engineers.
In June 2008, Mr. Lammle was hospitalized with pancreatitis. Due to his health problems, Mr. Lammle took a leave of absence from work until March 3, 2009. Upon returning to work, Mr. Lammle discovered that in his absence, the IM Department had been reorganized. Mr. Lammle was told that he would no longer be providing field support to the engineers. Instead, he was assigned to a service desk position. At the service desk, Mr. Lammle was responsible for providing remote computer service to all customers. Mr. Lammle continued to receive the same salary and benefits as he did before his leave of absence. Shortly after returning to work, Mr. Lammle complained to his supervisors that he had been demoted. He also complained that he was not being provided with sufficient training for his new position. In an e-mail sent to the Human Resources manager, Toya Specman, Mr. Lammle stated that he thought he would eventually be laid off because of his age and his “perceived disability.” About a week later, Mr. Lammle’s wife and former attorney, Amy Jane Simmons, sent a letter to Ball’s legal department, alleging that Mr. Lammle had been falsely accused of sleeping on the job and that the accusation was part of a scheme intended to bring about Mr. Lammle’s termination. On March 27, 2009, Ms. Simmons sent another letter to Ball’s legal department. Ms. Simmons alleged that Mr. Lammle was suffering “harassment” because his pay was not directly deposited into his bank account that afternoon. On March 31, 2009, Mr. Lammle filed a Charge of Discrimination with the Equal Employment Opportunity Commission. In his Charge, Mr. Lammle alleged that he had been “discriminated against based on [his] age, 47, in violation of the [ADEA] and based on a perceived disability... in violation of the ADA.” Specifically, he alleged that after his “demotion,” he was “subjected to harassment and adverse terms and conditions of employment when [Ball] failed to give [him] appropriate training, and access to tools needed to perform the duties of [his] reassigned position.” He further alleged that he was “issued a fabricated verbal warning [for sleeping on the job] under threat of termination on March 20, 2009.”
In April, Mr. Lammle sent another e-mail to Ms. Speckman, raising additional allegations of harassment. In addition his allegations of being denied training and not being paid properly, Mr. Lammle alleged that another service desk employee appeared to have a web camera directed at him, so that “[he] could be fired for sleeping on the job” if he even “blinks or closes his eyes.” Finally, in May, Ms. Simmons wrote another letter to Ball’s legal department. She alleged that not only was Mr. Lammle being monitored by web cam and remote access of his desktop, but that someone was going through his personal lunchbox. She alleged that someone had stolen a used insulin syringe out of his lunchbox. Ms. Simmons suggested that perhaps the syringe was taken so that it could be tested for other substances and used “to fabricate another reason to terminate [Mr. Lammle].”
In June 2009, Mr. Lammle was hospitalized again. After he was discharged, Mr. Lammle did not report back to work. Instead, he began a second leave of absence. When he returned to work on December 1, 2010, he was informed that his position had been filled. Mr. Lammle received a right to sue letter from the EEOC in September 2011. He then commenced this action. As narrowed by earlier proceedings, Mr. Lammle has three remaining claims in this case: (1) disability discrimination under the Americans with Disabilities Act (ADA), (2) age discrimination under the Age Discrimination in Employment Act (ADEA), and (3) common law intentional infliction of emotional distress. Ball seeks summary judgment on each claim.

II. Summary Judgment Standard

Rule 56 of the Federal Rules of Civil Procedure facilitates the entry of a judgment only if no trial is necessary. See White v. York Intern. Corp., 45 F.3d 357, 360 (10th Cir. 1995). Summary adjudication is authorized when there is no genuine dispute as to any material fact and a party is entitled to judgment as a matter of law. Fed. R. Civ. P. 56(a). Substantive law governs what facts are material and what issues must be determined. It also specifies the elements that must be proved for a given claim or defense, sets the standard of proof, and identifies the party with the burden of proof. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248 (1986); Kaiser-Francis Oil Co. v. Producer’s Gas Co., 870 F.2d 563, 565 (10th Cir. 1989). A factual dispute is “genuine” and summary judgment is precluded if the evidence presented in support of and opposition to the motion is so contradictory that, if presented at trial, a judgment could enter for either party. See Anderson, 477 U.S. at 248. When considering a summary judgment motion, a court views all evidence in the light most favorable to the non-moving party, thereby favoring the right to a trial. See Garrett v. Hewlett Packard Co., 305 F.3d 1210, 1213 (10th Cir. 2002).
If the movant has the burden of proof on a claim or defense, the movant must establish every element of its claim or defense by sufficient, competent evidence. See Fed. R. Civ. P. 56(c)(1)(A). Once the moving party has met its burden, to avoid summary judgment the responding party must present sufficient, competent, contradictory evidence to establish a genuine factual dispute. See Bacchus Indus., Inc. v. Arvin Indus., Inc., 939 F.2d 887, 891 (10th Cir. 1991); Perry v. Woodward, 199 F.3d 1126, 1131 (10th Cir. 1999). If there is a genuine dispute as to a material fact, a trial is required. If there is no genuine dispute as to any material fact, no trial is required. The court then applies the law to the undisputed facts and enters judgment.
If the moving party does not have the burden of proof at trial, it must point to an absence of sufficient evidence to establish the claim or defense that the non-movant is obligated to prove. If the respondent comes forward with sufficient competent evidence to establish a prima facie claim or defense, a trial is required. If the respondent fails to produce sufficient competent evidence to establish its claim or defense, then the movant is entitled to judgment as a matter of law. See Celotex Corp. v. Catrett, 477 U.S. 317, 322-23 (1986).

III. Analysis

A. Claims under the ADA and ADEA

Mr. Lammle presents two theories of recovery for each of his statutory claims. First, he claims that he was subjected to disparate treatment because of his age and/or perceived disability when he was reassigned to a service desk position and was not provided training related to his new position.2 Second, Mr. Lammle claims that since he returned to work, he was repeatedly harassed and subjected to a hostile work environment because of his age and/or perceived disability, in violation of the statutes.

1. Disparate Treatment

Mr. Lammle claims that when he returned to work in March 2009, he was “demoted” to an office position and was denied training on certain software systems.
The ADA provides that “[n]o covered entity shall discrimination against a qualified individual on the basis of the disability in regard to job application procedures, the hiring, advancement, or discharge of employees, employee compensation, job training, and other terms, conditions, and privileges of employment.” 42 U.S.C. § 12112(a). To prevail on a disparate treatment or discrimination claim under the ADA, Mr. Lammle must show that Ball intentionally discriminated against him for a reason prohibited by the statute. Jaramillo, 427 F.3d at 1306. In so doing, Mr. Lammle must make out a prima facie case, showing that (1) he is a disabled person as defined by the Act; (2) he was qualified, with or without reasonable accommodation, to perform the essential functions of the job held or desired; and (3) his employer discriminated against him because of his disability. See Mackenzie v. City & Cnty. of Denver, 414 F.3d 1266, 1274 (10th Cir. 2005). To demonstrate “discrimination’ under the third element, Mr. Lammle must show that he suffered an “adverse employment action because of the disability.” EEOC v. C.R. England, Inc., 644 F.3d 1028, 1037-38 (10th Cir. 2011). Similarly, to establish a prima facie case under the ADEA, Mr. Lammle must prove that (1) he is a member of the class protected by the ADEA; (2) he was qualified for the position at issue; (3) he suffered an adverse employment action; and (4) he was treated less favorable than others not in the protected class.
Jones, 617 F.3d at 1279.
When, as here, there is no direct evidence of discrimination, the Court applies the burden-shifting framework outlined in McDonnell Douglas Corp. v. Green, 411 U.S. 792, 802-02 (1973). The McDonnell Douglas framework applies to Mr. Lammle’s discrimination claims under both the ADA and the ADEA. See Jaramillo v. Colo. Judicial Dep’t, 427 F.3d 1303, 1306 (10th Cir. 2005); Jones v. Oklahoma City Public Schools, 617 F.3d 1273, 1278 (10th Cir. 2010). Under this framework, Mr. Lammle must first make out a prima facie case of discrimination, as described above. If he is successful, the burden shifts to Ball to articulate a legitimate, nondiscriminatory reason for its employment actions. If Ball proffers such a reason, the burden shifts back to Mr. Lammle to ultimately show that the stated reasons are merely “pretextual.”
McDonnell Douglas, 411 U.S. at 804-05.
Assuming, without necessarily finding, that Mr. Lammle could establish a prima facie case on the undisputed facts here, Ball has carried its burden by proffering a legitimate, nondiscriminatory reason for Mr. Lammle’s change in employment conditions in March 2009 – namely, that Mr. Lammle’s reassignment was necessary due to the reorganization of the IM Department. Ball proffers that the reorganization was due to budgetary concerns and the need to create more efficiency. It also proffers that Mr. Lammle was not provided training on certain computer systems because other service desk employees were already providing support on those systems. Thus, to survive summary judgment, Mr. Lammle must show a genuine dispute as to whether Ball’s proffered reasons for its employment decisions are pretextual. In other words, Mr. Lammle must show that the stated reasons are untrue, and that age and/or disability discrimination was the real reason.
An employee produces sufficient evidence of pretext when he shows “such weaknesses, implausibilities, inconsistencies, incoherencies, or contradictions in the employer’s proffered legitimate reasons” for its actions that a reasonable fact finder could rationally find them unworthy of belief and therefore infer that the employer did not act for the asserted nondiscriminatory reasons. Jaramillo, 427 F.3d at 1308. The Court is mindful that when evaluating pretext, the pertinent question is not whether the employer’s proffered reasons were right, wise, or fair, but whether the employer honestly believed those reasons and acted in good faith upon those beliefs. Stover v. Martinez, 382 F.3d 1064, 1076 (10th Cir. 2004).
In support of their position, Ball proffered the affidavit of Toya Speckman, its Senior Human Resources Manager. Ms. Speckman testified that in 2008, budgetary constraints required that IM Department improve its efficiency and lay off several employees. The evidence shows that the reorganization of the IM Department resulted in greater use of outside contractors, thereby reducing the need for Ball’s technicians to work in the field. Further, the IM Department began delegating a higher volume of service calls to the service desk, where computer technicians could resolve problems remotely. Ms. Speckman testified that to implement the necessary layoffs, the IM Department manager, John LaFalce, conferred with the Human Resources and together they compared each employee’s skills and performance level to those possessed by other layoff candidates and Ball’s operational requirements. Ms. Speckman testified that the review identified three candidates for layoff – Mr. Lammle was one of them. She testified that although Ball laid off the other two candidates, it did not lay off Mr. Lammle. Ball opted instead to reassess its needs when Mr. Lammle returned from his leave of absence. Ms. Speckman stated that the individuals who were laid off were 28 and 30 years old, and neither was disabled. The evidence shows that although Mr. Lammle previously provided dedicated support to Ball’s engineers, after the reorganization, Ball employees no longer served in that capacity. Ms. Speckman testified that when Mr. Lammle returned to work in March 2009, no technician positions involving field work were available. She stated that because Ball needed a service desk position filled when Mr. Lammle returned, he was assigned to that position. Ms. Speckman testified that there were at least two other individuals who were formerly computer technicians who were assigned to the service desk during the reorganization. One of those individuals was 54 years old, and the other was 36 years old; neither of them was disabled.
The evidence also shows that Ms. Speckman explained to Mr. Lammle that he had not received training on the “IFS” computer system because another service desk employee was already providing assistance on that system. During Mr. Lammle’s performance review in June 2009, he was informed on how to access free online training and given suggestions for ways that he could increase his knowledge base and advance his career. Indeed, Mr. Lammle admits that he eventually did receive extensive training related to his position at the service desk.
Having reviewed the record, the Court finds that there is nothing to support an inference that Ball’s proffered reasons for Mr. Lammle’s reassignment and any denial of training are unworthy of belief. There is nothing implausible, inconsistent, or contradictory about Ball’s reasons for its employment decisions. Rather, it appears that the decision-makers at Ball made choices that they determined were in the best interest of the company. Accordingly, the Court finds that nothing in the record that creates a genuine dispute of fact as to whether Ball’s proffered reasons for changes in his employment were pretextual. Thus, Ball is entitled to summary judgment on Mr. Lammle’s claims.

2. Hostile Work Environment

Mr. Lammle claims that, beginning in March 2009 when he returned to work, he was subjected to harassment. Ball moves for judgment in its favor on this claim, arguing that Mr. Lammle cannot prove that he was subjected to severe or pervasive harassment that altered the conditions of his employment, nor can he prove that the alleged harassment occurred because of his age or disability.
For a hostile environment claim to survive summary judgment, the plaintiff must show that a rational jury could find that the workplace was permeated with discriminatory intimidation, ridicule, and insult that were sufficiently severe or pervasive to alter the terms, conditions, or privileges of employment, and the harassment stemmed from age- or disabilityrelated animus. See Mackenzie, 414 F.3d at 1280; Lanman v. Johnson Cnty., Kansas, 393 F.3d 1151, 1155 (10th Cir. 2004). To evaluate whether a working environment is sufficiently hostile or abusive, the Court examines the totality of the circumstances, including the frequency of the conduct, the severity of the conduct, whether the conduct was physically threatening or humiliating or a mere offensive utterance, and whether the conduct unreasonably interfered with the employee’s work performance. Harris v. Forklift Sys., Inc., 510 U.S. 17, 23 (1993).
Additionally, the environment must be both subjectively and objectively hostile. Id. Applying these principles, the Court concludes that the record falls far short of showing age- or disability-related harassment. Several of Mr. Lammle claims of harassment relate to the employment decisions made by Ball, such as the reassignment and denial of training. These decisions cannot be considered “harassment” because they were not undertaken for the purpose of intimidation, ridicule, or insult. Mr. Lammle also alleges that (1) he was “falsely accused” of sleeping on the job, (2) a webcam allegedly was used to spy on him, (3) he was allegedly yelled at on two occasions by his manager, (3) he did not receive his direct deposit on time, and (4) someone allegedly stole a used syringe from his lunchbox. Mr. Lammle has not come forth with any evidence to establish the truth of each of these allegations. Assuming he could do so, and assuming that these incidents could be considered forms of harassment, there is simply nothing in the record to support an inference that what happened to Mr. Lammle was because of his age or a perceived disability. Accordingly, the Court finds that there is no genuine dispute of fact with regard to Mr. Lammle’s hostile work environment claims under the ADA and ADEA, and Ball is entitled to judgment on these claims.

B. Intentional Infliction of Emotional Distress

Finally, Mr. Lammle claims that he suffered severe emotional distress as a result of the “comments, actions, and inactions of [Ball].” He alleges that Ball failed to “provide any relief or assistance to [him,] severely altered [his] employment circumstances and created a hostile employment environment.”
Under Colorado law, a plaintiff may recover for the tort of intentional infliction of emotional distress (otherwise known as “outrageous conduct”) if the plaintiff proves that (1) the defendant engaged in extreme and outrageous conduct, (2) recklessly or with the intent of causing the plaintiff severe emotional distress, and (3) causing the plaintiff to suffer severe emotional distress. Han Ye Lee v. Colo. Times, Inc., 222 P.3d 957, 966-67 (Colo. App. 2009).
Ball argues that Mr. Lammle cannot prove any of these elements.
Before permitting a plaintiff to present a claim for outrageous conduct to a jury, however, the Court must rule on the threshold issue of whether the plaintiff has alleged conduct that is outrageous as a matter of law. Coors Brewing Co. v. Floyd, 978 P.2d 663 (Colo. 1999). A claim for outrageous conduct contemplates only acts that are “so outrageous in character, and so extreme in degree, as to go beyond all possible bounds of decency, and to be regarded as atrocious, and utterly intolerable in a civilized community.” Destefano v. Grabrian, 762 P.2d 275, 286 (Colo. 1988).
Here, it appears Mr. Lammle alleges that Ball engaged in outrageous conduct when it took certain employment actions against him, and when it failed to prevent the “discrimination” from occurring. To the extent Mr. Lammle relies on the same conduct that formed the basis of his statutory claims, that conduct cannot be used as the basis of his claim for intentional infliction of emotional distress. See Emerson c. Wembley USA Inc., 433 F.Supp.2d 1200, 1228 (D.Colo. 2006); see also Katz v. City of Aurora, 85 F.Supp.2d 1012, 1021 (D.Colo. 2000) (noting under Colorado law, where the allegations forming the basis of a claim for outrageous conduct are the same as those forming the basis for a claim of discrimination, and nothing more, they fail to state an independently cognizable claim). Disregarding Mr. Lammle’s allegations that form the basis of his statutory claims, his only allegations as to his outrageous conduct claim are that Ball failed to “assist and/or attempt to rectify the discrimination.” As to those allegations, the Court finds that they are not sufficiently outrageous to support a claim for outrageous conduct. Indeed, as noted above, Mr. Lammle has failed to establish that he was subjected to discrimination. Accordingly, the Court finds that Ball is entitled to judgment on this claim.

IV. Conclusion

For the forgoing reasons, the Defendant’s Motion for Summary Judgment (#116) is GRANTED. Judgment shall enter in favor of the Defendant on all of the Plaintiff’s claims, and the Clerk of the Court shall close this case.
Dated this 1st day of September, 2013.
BY THE COURT:
Marcia S.Krieger
Chief United States District Judge
Retrieved from:

A Right to Know

Public venues that use surveillance cameras generally post signs that inform people that they are being watched and recorded. This is considered a fair-minded approach to informing the public that any activity that is illegal or otherwise not allowed will be captured on a recording. This practice of giving notice of such use of surveillance cameras is followed voluntarily by most public and private security entities, and in many countries is mandated by law. Canada is one nation that has passed such legislation, which is part of the Personal Information Protection and Electronic Documents Act.

Proprietor’s Duty to Protect

One of the legal issues regarding surveillance cameras concerns the duty of a business owner to provide an adequate level of security to his customers and clients. Property management companies that oversee residential complexes are expected to ensure the safety of their tenants against illegal activity and personal injury. Regardless of any tenant’s personal opinion about her right to privacy, surveillance cameras are seen by most people as a necessary and reasonable method of ensuring the security of all tenants of the property.

Surveillance in Schools

Perhaps, one of the most controversial legal issues has been the use of surveillance cameras in schools. This use of security cameras was a result of an increased level of illegal and sometimes violent activities that has affected many schools, especially in larger cities. A case in Tennessee involving a middle school installing surveillance cameras in locker rooms raised legal issues when the stored tapes were made accessible on the Internet. The state Supreme Court ruled that this use of surveillance cameras inherently violated students’ right to privacy under the Fourth Amendment to the US Constitution.

Silent Video Surveillance

Title I of 18 US Code Section 2510 of the Electronic Communications Privacy Act of 1986 states that video surveillance cameras are allowed to be used for watching and recording citizens without their knowledge or consent as long as no sound is recorded. Although proponents of the Fourth Amendment have contended that this violates the right to privacy, the code has been used by many government entities in this capacity without legal redress. This function is widely applied as of 2010 for watching and taping public highways and streets.

Protecting Potentially Dangerous Venues

Surveillance cameras are used to prevent access to certain especially important areas that present a potential danger to the public. Hospitals and scientific laboratories often contain chemicals and substances that could be lethal if exposed to the public. In these instances, the use of surveillance is not considered to be an invasion of privacy, due to the understood need to watch workers as they access these sensitive areas.

Retrieved from

Summary

The increased use of mobile devices with cameras, PCs with webcams, and camera systems installed at homes, businesses, and out in the general public are growing at an alarming rate, and the threats are growing to expose security issues with them that violate your privacy. In this chapter, we have looked at the growing use of this technology, what the technology is capable of, what purposes are served for good and evil, and why we should be concerned.
As we discussed these topics and how they relate to reconnaissance and surveillance, it will become evident that you are now always on camera. We carry one with us everywhere we go. There tends to be a camera located everywhere. Let’s consider this example: You wake up and get ready for work, while in your home you are on camera as your home has an active internal security surveillance system. You check your e-mail before you leave the house on your laptop configured with a webcam. You pack up to leave and grab your mobile phone and tablet and get into your car. Your drive to work roughly passing 10 traffic lights before pulling in and parking in the parking garage. There is video surveillance feeds in the garage. You enter work and each entrance/exit and floor contains surveillance equipment. You dock your work laptop (with integrated webcam) and get to work briefly checking your mobile devices that are sitting directly next to you. Each time you leave your desk to move within the office, you take your phone with you. You leave for lunch and go to mall to eat in the food court with a few friends. The mall has video surveillance feeds. After work, you drive back home (10 traffic lights) and settle in for the evening. After dinner, you decide to load a game on your Microsoft Xbox and join a few friends online to play games. Later, you check your social media sites online and Skype with a friend.
We can go on and on but I think you get the picture. You are on camera 24 hours a day and this does not include the government’s ability to pinpoint and track your whereabouts via satellite. This does not include military or law enforcement being able to use satellite tracking. In this chapter, we discussed all of the ways you may or may not know you are being captured on the camera and how you protect yourself. Digital surveillance is here to stay and will probably become more invasive over time, so learning how to mitigate threats and being aware of new threats is the key to regaining your privacy.

1 Mr. Lammle was given numerous opportunities to file a response. The motion for summary judgment was filed on December 17, 2012. On February 12, 2013, the Court granted (#133) Mr. Lammle’s first request for more time to respond. The Court specified that no further extensions would be granted. On February 21, 2013, Mr. Lammle filed a second motion for extension of time (#138), and on March 21, 2013, he filed a third motion for an extension of time to “respond to existing motions” (#145). By text order on April 2, 2013, the Court granted in part (#146) Mr. Lammle’s requests for more time. The Court ordered that Mr. Lammle had 14 days in which to comply with any pending deadline. Still, no response was filed. Despite having nearly four months to respond to the motion, Mr. Lammle has failed to do so. The Court therefore considers the motion without a response.

2 Mr. Lammle’s statutory claims are limited by the scope of his allegations in the charge of discrimination submitted to the EEOC. See MacKenzie v. City & County of Denver, 414 F.3d 1266, 1274 (10th Cir. 2005); see also Jones v. U.P.S., Inc., 502 F.3d 1176, 1186 (10th Cir. 2007).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.78.137