2019
DOI: 10.1177/1741659018820562
|View full text |Cite
|
Sign up to set email alerts
|

The commodification of mobile phone surveillance: An analysis of the consumer spyware industry

Abstract: This article examines the attempts of ‘spyware’ developers to commodify and market their products to a general audience. While consumers of ‘spyware’ have often been government and law enforcement (Citizen Lab, 2015), there is an increasing attempt to market, sell, and commodify ‘spyware’ for use by wider audiences. ‘Spyware’ is sold as a security product commonly aimed at businesses, parents, and intimate partners. Pursuant to calls for a “sociology of security consumption” (Goold et al., 2010: 3), this artic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 16 publications
1
16
0
Order By: Relevance
“…however, the availability of such products highlights the commodification and marketisation of abuse, supply emerging to meet demand amongst those with an intention to spy on others without their consent (Harkin, Molnar and Vowles, 2019).…”
Section: Establishing Omnipresencementioning
confidence: 99%
“…however, the availability of such products highlights the commodification and marketisation of abuse, supply emerging to meet demand amongst those with an intention to spy on others without their consent (Harkin, Molnar and Vowles, 2019).…”
Section: Establishing Omnipresencementioning
confidence: 99%
“…There is a burgeoning industry of spyware developers who sell powerful tools of surveillance to general consumers (Franceschi-Bicchierai & Cox, 2017). These products are commonly marketed to parents, businesses, and those who wish to “spy” on their intimate partner (see Harkin et al, 2019). Once a mobile phone or personal computer is compromised by spyware, a third-party “operator” can spy on the activity on that device, typically being capable of tracking the GPS location of the user, having access to confidential SMS message or phone call information, accessing any photos or video taken by the device, monitoring internet browsing activity, and in certain cases, having live access to the camera or speaker of the phone for eavesdropping, among other capabilities (Harkin et al, 2019).…”
Section: Consumer Spyware and Its Impacts On Family Violencementioning
confidence: 99%
“…Developing a comprehensive understanding of the scale and scope of spyware use is inherently difficult due to its clandestine nature, but it is apparent that it is a present danger to the privacy of phones and personal devices. While spyware may be used in several different contexts, it is clear that it is often deployed by perpetrators of intimate partner abuse, with many spyware vendors explicitly suggesting it be used against “spouses” (see Harkin et al, 2019).…”
Section: Consumer Spyware and Its Impacts On Family Violencementioning
confidence: 99%
See 1 more Smart Citation
“…Although it may seem that bridges with low clearance are not political, Winner explains that there was evidence suggesting that the underpasses were built this way to preclude public buses from using the roads -denying those who relied on public transit, predominantly low-income New Yorkers of color, access to certain public spaces (Winner, 1980;Woolgar & Cooper, 1999). Today, we can speak of the politics of algorithms, which can automate decisions in discriminatory ways (Noble, 2018;Eubanks, 2018;Benjamin, 2019) and spyware, which is used and abused by authoritarian governments to track, suppress, and harm human rights activists and dissidents (Harkin et al, 2019;Penney et al, 2018). Technology has the potential to reinforce or undermine existing power relationships in the context in which it is used, and even technologies or related practices that appear neutral, benign, or even benevolent have potential impacts on civil liberties and human rights.…”
Section: Introductionmentioning
confidence: 99%