In the last Dropcam post, I wrote about reversing the USB setup procedure that the Dropcam uses to initially connect to your WiFi network. After exploring the USB tunneling protocol, the next step was to take it apart, or at least take off the back of the enclosure:
read more.....http://blog.includesecurity.com/2014/04/reverse-engineering-dropcam-rooting-the-device.html