Spying on other people's computers.

Spying on other people's computers.

Spying on other people's computers.

Culture and technology.
Aug. 12 2008 12:21 PM

Going Dark

Spying on other people's computers.

Illustration by Robert Neubecker. Click image to expand.

The good ol' Internet: always coming up with new solutions to old problems. Modern man suspects wife is up to something. Modern man installs PC Pandora, a spyware application that records keystrokes, takes surreptitious screen shots, and monitors chat sessions—all for the low, low price of $49.95. Success! Modern man writes a congratulatory note to the company, which it posts on its "testimonials" page:

My wife of 25 years came out of the blue after Christmas this past year and requested a divorce without much explanation. I was devastated, so I purchased your product. It only took two days to find out she has been living a dark secret life for several years as a submissive love slave to a dominant male partner in the BDSM world meeting him at least once a month. She was blown out of the water when I told her everything I knew about her lifestyle even down to the name and email address of the person she is involved with. Answered all my questions. She has no clue and thinks I spent $$$$$$ on a private investigator.

Despite modern man's feelings of triumph, it's hard to see any winners there. It's easier than ever to spy on our spouses, co-workers, boyfriends, and roommates. But does this make us happier and wiser or just more neurotic and creepy? The lesson of every surveillance movie, from The Conversation to The Lives of Others, is that listening in corrupts your peace of mind and destroys your emotional intuition.


Explore the world of commercial "spy" software and you quickly discover three main battlegrounds: girlfriends/wives vs. boyfriends/husbands, employers vs. employees, and parents vs. teenagers. You also read some of the most twisted moral logic ever committed to screen.

When the PC Pandora site opens, for example, a trim lady in a pink shirt pops up and cheerfully declares: "At this very moment, there are over 50,000 pedophiles on the Internet trying to take advantage of our children." Well then, I better install a program that records everything my kids do online and then spend my afternoons scanning the logs! In the eyes of these monitoring-software companies, MySpace is the devil's playground. The promotional copy often gives the impression that setting up a page on MySpace is but the merest pretext to an after-school Roman orgy. The message: If you don't know what "LMIRL" or "NIFOC" or "POS" means, you might as well drop your daughter off at a truck stop right now. (That's "let's meet in real life," "naked in front of the computer," and "parent over shoulder.")

It's also worth noting how these sites stress their excellent phone support—the software packages are being pitched predominately to the technically clueless. If Mom and Dad did know how to use a computer, they could easily find a recent study by the University of New Hampshire's Crimes Against Children Research Center, "Online 'Predators' and Their Victims: Myths, Realities and Implications for Prevention." Or, quicker yet, they could read an excellent summary of the study by Benjamin Radford at LiveScience. As he explains, the biggest threat to kids is still their parents, the Internet has not increased the amount of sexual abuse of children, and most Web predators rarely use deception as "most victims are well aware that the person they are communicating with online is an adult interested in sex." Monitor your kids if you want, but recognize that you are spying on them, not protecting them from a new strain of evildoers.

The Pandora software is aptly named. It evokes both the dubious idea that the computer is a Pandora's box which holds all of our secrets, and the obvious end result of any snooping: Once this stuff gets out, you wish it could be put back in. The snooper also faces the unavoidable dilemma that any information that he or she finds out almost certainly won't be worse than the breach of trust of installing monitoring software. That's why these applications sell themselves under the guise of "protecting your family" rather than "seeing what YouTube videos your husband watches." We all deserve to have a public self and a backstage self, even if that backstage self has a plushie fetish.

The office landscape is more clear-cut: Bosses want employees to "be productive"; employees want to look at ESPN.com on occasion. Or, perhaps, pornography. It's not so much that everyone is looking at porn. It's that the people who look at porn tend to look at a lot of it. A commenter on Slashdot proposes a vivid solution for his own workplace:

I stopped "special" surfing at the office when I put a linux box on a hub between the network internet router and the switches. I simply sniffed all traffic for image files and displayed it on a 42" LCD out in the sales area. Images were displayed of what people were surfing. I also attached the ip address of the user to the image. It stopped inappropriate internet surfing in that office in 3 days. When everyone can see what you are doing, you get back to real work.