I was wondering how a webcam could be successfully accessed remotely either by an attacker or others in legal agencies. I was monitoring how my logitech cam software was being installed but the only part that asked for other "connections" was something known as "logitech vid" - a skype-like app that you can make free calls to other people. I also noticed it installed a background service that allowed pretty much any application to control the hardware so I would imagine that internal security is as strong as the client's softwares. I would see a hard time getting outbound access since client is behind both ZA firewall (but again based on specific application trusts) and router with UPnP disabled so definitely no ports are getting opened. ZA has a low-level hook (pretty much first app installed on the Windows box) so there's pretty much 0 chance of that being disabled. But, "Windows Generic Host Process" pretty much controls everything (and its code is closed) so I wouldn't be surprised if complete takeover was possible if sophisticated enough command could be issued from Redmond, albeit a spotty (hoppy) connection due to all the bounces. Anyone else like to conjure up some more conspiracies?
P.S. Do you think that little LED need to be on for the cam to be actually recording or do you think that's logitech's prop code?