At three in the morning, a family in Tulsa, Oklahoma woke to a stranger's voice coming from their daughter's bedroom. The voice was male and it was speaking to their two-year-old through the baby monitor — a network-connected device with a built-in...
In This Chapter
- Opening Scene: 3 AM on the WiFi
- 17.1 The Home as a Newly Surveilled Space
- 17.2 Baby Monitors: From Radio to WiFi
- 17.3 Nanny Cams: Power, Consent, and Domestic Labor
- 17.4 Smart Home Hubs: Who Has Access to Your Home's Data?
- 17.5 Tenant Surveillance: Cameras in Rental Properties
- 17.6 Consent in Shared Spaces: Housemates, Partners, Children
- 17.7 Jordan's Landlord
- 17.8 The Smart Home and Intimate Partner Surveillance (Preview)
- 17.9 Legal Frameworks: An Imperfect Map
- 17.10 The Structural Stakes of Domestic Surveillance
- Chapter Summary
- Key Terms
- Discussion Questions
Chapter 17: Baby Monitors, Nanny Cams, and the Surveilled Home
Opening Scene: 3 AM on the WiFi
At three in the morning, a family in Tulsa, Oklahoma woke to a stranger's voice coming from their daughter's bedroom. The voice was male and it was speaking to their two-year-old through the baby monitor — a network-connected device with a built-in speaker that was designed for the parents to talk to their child remotely. The parents found their daughter standing in her crib, confused and frightened. The voice, it would emerge, belonged to a hacker in Louisiana who had found the monitor on the public internet, had accessed it through a factory-default password the family had never changed, and had been surveilling the room for an unknown period of time before deciding to speak.
This incident, reported in 2014 and one of dozens of similar cases documented over the following decade, illuminates the fundamental tension that defines surveillance in the networked home: technology designed to protect becomes technology that exposes; technology designed to watch becomes technology that can be watched through. The family had purchased the monitor to keep their daughter safe. Instead, they had installed a surveillance device in the most intimate space of their home — their sleeping child's bedroom — and had connected it to a network where a stranger could access it.
The story of the contemporary home is, increasingly, a story of surveillance. Spaces that Western societies have long treated as categorically private — the bedroom, the kitchen, the living room, the bathroom's threshold — are now threaded with cameras, microphones, and sensors that capture, transmit, and store data about the people who live there. Some of this surveillance is chosen: parents who install baby monitors, homeowners who mount indoor security cameras, people who plug in smart speakers. Some is imposed: landlords who install cameras in common areas, domestic workers who discover hidden cameras in their workplaces. And some falls in between: the smart TV that watches while you watch, the home router that logs every device that connects.
This chapter examines the surveilled home — the transformation of the domestic sphere from a space of relative privacy into a space of pervasive monitoring. It asks: who watches inside the home, who they are watching, who benefits from that watching, and who bears its costs.
17.1 The Home as a Newly Surveilled Space
Historical Expectations of Domestic Privacy
The Western legal tradition has long treated the home as the paradigmatic site of privacy. The maxim "a man's home is his castle" — originally articulated in English common law by Sir Edward Coke in 1628 and later invoked in American constitutional jurisprudence — reflects a deep cultural and legal assumption: that the domestic sphere is categorically different from public space, that what happens inside the home is presumptively private, and that intrusion into the home by external parties — particularly the state — requires extraordinary justification.
This expectation is culturally specific and historically contingent. Homes have always been surveilled — by neighbors, by landlords, by religious institutions, by extended family — in ways that the castle metaphor obscures. The tenement apartments of nineteenth-century American cities provided minimal actual privacy; walls were thin, windows close, and landlords present. The homes of enslaved people in the antebellum South were surveilled continuously and violently by slaveowners for whom the distinction between household and workplace was deliberately erased. For women throughout most of Western history, the home was a site of patriarchal surveillance, not personal freedom.
But the normative weight of the castle metaphor shaped legal doctrine, and that doctrine has produced a robust set of protections against government intrusion into private homes that has not yet adequately adapted to the new reality: the home itself is now producing surveillance data, and the most significant threats to domestic privacy come not from government entry but from the networked devices inside the home.
💡 Intuition Check: Think about the devices in your home or apartment that connect to the internet. Make a quick list. Now, for each device, ask: what data does this device collect about the people in this space? Where does that data go? Who can access it? Most people find that they cannot answer these questions for most of their devices. This knowledge gap — knowing you have devices but not what they do with data — is itself a structural feature of contemporary domestic surveillance.
The Smart Home Revolution
The term "smart home" describes residential spaces in which networked devices — connected to the internet and to each other — manage, monitor, and automate domestic functions. Smart home devices now include thermostats (Nest, Ecobee), lighting systems (Philips Hue, LIFX), door locks (August, Schlage), refrigerators, washing machines, television sets, vacuum robots (Roomba), voice assistants (Amazon Echo, Google Home, Apple HomePod), security systems, and — as we examine in this chapter — baby monitors and cameras.
The smart home ecosystem represents an enormous expansion of the data surface area of domestic life. Each device that connects to a home network collects data about behaviors inside the home: when people wake up, when they leave, what temperature they prefer, what they watch, what music they listen to, what they eat, whom they invite over, how often they clean. This data flows to the device manufacturers, to cloud platforms, and — under various conditions — to third parties that include advertisers, data brokers, and law enforcement.
The expansion of the domestic data surface area coincides with a fundamental shift in the economics of home technology: devices are sold at low margins or below cost because the commercial value lies not in the device itself but in the data the device generates over its lifetime of use. The smart speaker that costs $29.99 represents a significant loss if analyzed as a hardware product; it represents a valuable acquisition if understood as a data collection node that will generate behavioral intelligence about a household for years.
🔗 Connection to Chapter 11: The economics of the smart home are a direct application of the surveillance capitalism model analyzed in Chapter 11. Domestic behavioral data — intimate, comprehensive, longitudinal — is precisely the kind of data that surveillance capitalism's "behavioral modification market" most highly prizes. The home is not incidentally a surveillance site in the data economy; it is one of the most valuable surveillance sites precisely because of its intimacy.
17.2 Baby Monitors: From Radio to WiFi
The Technology's Evolution
The baby monitor was invented in 1937 by a toy company, Zenith Radio Corporation, which marketed it as the "Radio Nurse" — a device consisting of a transmitter (the "Guardian Ear") placed near the infant and a receiver the parent held. The device broadcast audio on an open radio frequency, which meant that it could be — and sometimes was — picked up by anyone in the area with a compatible radio. The privacy problem was, from the beginning, structural: a device designed to monitor an intimate domestic space transmitted its data over a shared medium.
The technology evolved through four generations: analog radio (1937–1990s), digital DECT radio (1990s–2000s), digital with video (2000s–2010s), and WiFi-connected smart monitors (2010s–present). Each generation brought new capabilities and new vulnerabilities. Analog monitors were easily intercepted by neighbors' monitors on the same frequency. DECT monitors were more secure from radio interception but introduced digital vulnerabilities. WiFi monitors connected the most intimate domestic space — an infant's sleep environment — to the public internet, with all the security implications that entails.
📊 Real-World Application: A 2020 study by consumer security researchers at Which? magazine (UK) tested eight popular WiFi baby monitors and found significant security vulnerabilities in six of them. Common problems included default passwords that were trivially guessable, lack of encryption for video feeds, and failure to notify users when someone else had logged in to their monitor's account. The researchers were able to access live feeds from monitors in several instances using only the monitor's default settings and basic security tools. The manufacturers had sold these devices — designed for a sleeping infant's room — with less security than a standard email account.
The Hacking Vulnerability
The incidents of stranger-access to baby monitors, documented extensively since 2013, follow a predictable pattern that illuminates the IoT security crisis examined in Chapter 15. WiFi-connected cameras, including baby monitors, are frequently sold with:
- Default passwords (often "admin" or "1234") that many users never change
- Firmware that is rarely updated and often contains known security vulnerabilities
- Cloud access portals that, once compromised, provide access to the live video feed from anywhere in the world
- No security audit disclosure — manufacturers typically do not publish information about the security testing their devices have (or have not) undergone
The hacker in the Tulsa case had found the baby monitor by scanning the public internet for devices running the monitor's software. This is not a sophisticated technique; tools for scanning the internet for vulnerable devices are freely available. The "Shodan" search engine, sometimes called "the Google for hackers," indexes internet-connected devices and their accessible data. At any given time, Shodan lists thousands of accessible baby monitors, security cameras, and other home devices that are connected to the internet without adequate security.
⚠️ Common Pitfall: Students sometimes assume that baby monitor hacking is primarily a story about sophisticated cybercriminals. It is not. Most documented baby monitor incidents involve low-skill access exploiting default passwords or unpatched vulnerabilities — security failures that are entirely within the manufacturers' capacity to prevent. The manufacturing choices that produce these vulnerabilities are not technological inevitabilities; they are cost decisions. More rigorous security requires more engineering resources. Manufacturers who do not invest in security are making a choice to externalize the security risk onto their customers.
Who Suffers the Surveillance
When a stranger accesses a baby monitor, multiple surveillance harms occur simultaneously:
The infant is surveilled without any capacity for consent or even awareness — a surveillance target of absolute vulnerability.
The parents discover that their most private domestic space has been observed by someone they did not invite and cannot identify.
The home is revealed as a non-private space, fundamentally changing the residents' relationship to their own home.
The power asymmetry in baby monitor vulnerabilities is almost total. The family purchases a device in good faith, connects it according to the manufacturer's instructions, and has no practical way to evaluate whether the device's security is adequate. The vulnerability is not visible; the monitor works exactly as advertised. The security failure is entirely on the manufacturer's side. Yet the harm falls entirely on the family.
✅ Best Practice: Baby Monitor Security
If you use or advise others who use a WiFi baby monitor:
- Change the default password immediately. Use a long, unique password (12+ characters, not used for any other account).
- Register the device and keep firmware updated. Manufacturers release security patches through firmware updates; these must be applied.
- Consider whether WiFi connectivity is necessary. A DECT digital monitor with no internet connection provides audio and video monitoring without internet exposure.
- Check whether the device stores video in the cloud. If it does, ask what the cloud provider's data retention and sharing policies are.
- Review who has account access. If the monitor came with a manufacturer account, secure that account with a strong password and two-factor authentication.
- Know what your monitor's camera can see. Consider what else in the room (personal documents, medications, other areas of the home) is visible in the camera's field of view.
17.3 Nanny Cams: Power, Consent, and Domestic Labor
What Nanny Cams Are
The "nanny cam" — a hidden or visible camera installed in a home to monitor a caregiver working with children — is one of the most legally and ethically complex forms of domestic surveillance. It sits at the intersection of employment law, privacy law, child protection, and the power dynamics of domestic labor.
Nanny cams are sold at consumer electronics stores, disguised as everyday objects: alarm clocks, houseplants, picture frames, smoke detectors, stuffed animals. The explicit design rationale for disguise is that hidden cameras provide more "authentic" footage of caregiver behavior than visible cameras that the caregiver knows about. This rationale is understandable from the employer's perspective and deeply troubling from the caregiver's perspective — because it means the surveillance is designed to operate without the knowledge of the person being surveilled.
The Legal Landscape
In the United States, the legality of hidden nanny cams is governed primarily by state law, and state law varies significantly:
One-party consent states (majority of states): In most U.S. states, video recording (without audio) in your own home is legal even if the recorded person is unaware, as long as the camera is recording a space where there is no reasonable expectation of privacy. A camera in a living room or kitchen is generally legal. A camera in a bathroom or bedroom is generally not.
Two-party (all-party) consent states: States including California, Illinois, Maryland, Massachusetts, Washington, and others require that all parties to a recorded communication consent to the recording. In these states, recording audio of a caregiver without their knowledge — even in your own home — may be illegal.
The audio distinction: The two-party consent requirement typically applies to audio recording, not video. Hidden cameras that capture video but not audio are generally legal in more states than cameras that capture audio.
This legal complexity produces a patchwork in which the same act — installing a hidden camera that records an employee in a client's home — may be entirely legal in one state, legal if the camera is video-only, and illegal with audio in another.
📊 Real-World Application: The International Nanny Association has adopted guidelines recommending that families disclose camera use to caregivers. These are voluntary guidelines; compliance is not monitored. Surveys of domestic workers — nannies, housekeepers, home health aides — conducted by the National Domestic Workers Alliance have found that the majority are not informed of cameras in the homes where they work. The surveys also document that domestic workers typically feel unable to raise the issue of surveillance with employers for fear of job loss.
The Power Dynamics of Domestic Surveillance
The nanny cam case crystallizes the power asymmetry at the heart of workplace surveillance. The homeowner controls the space; the domestic worker enters it. The homeowner knows whether cameras are present; the worker typically does not. The homeowner can review footage at will; the worker cannot. The homeowner has legal and economic power over the employment relationship; the domestic worker — frequently an immigrant, frequently a person of color, frequently in a precarious economic position — has little.
This asymmetry is not incidental to the surveillance relationship; it is its foundation. Surveillance functions as a disciplinary tool, in the Foucauldian sense (see Chapter 2), precisely because it is not reciprocal. The nanny cam watches the nanny; the nanny does not watch the family. The effect is to constitute the domestic worker as a subject of monitoring, as someone whose behavior requires continuous verification, while the family remains unobserved and unaccountable.
🎓 Advanced Concept: The Household as Legal Exception
The history of domestic labor regulation reveals that households have long been exempted from labor protections that apply in other employment contexts. The Fair Labor Standards Act of 1938, which established minimum wage and overtime protections for American workers, explicitly excluded domestic workers. It was not until the passage of the Domestic Workers Bill of Rights in New York (2010), followed by similar legislation in a handful of other states, that domestic workers gained basic labor protections — and even these state-level protections leave significant gaps.
This history of legal exceptionalism for domestic workers shapes the surveillance context: the household, precisely because it has historically been treated as outside the scope of normal labor law, is also treated as outside the scope of normal surveillance law. Workers who would have legal protections against covert surveillance in a conventional workplace have no such protections in a private home. The legal exceptionalism of domestic space compounds the power vulnerability of domestic workers.
🌍 Global Perspective: The global care economy — the network of (predominantly women, predominantly immigrants) who provide child care, elder care, and household labor internationally — involves millions of workers in surveillance relationships with their employers. In Singapore and Hong Kong, where migrant domestic workers make up a significant fraction of the workforce, labor advocacy organizations have documented widespread hidden camera use by employers with minimal legal protection for workers. The United Arab Emirates, a major destination for migrant domestic workers from South Asia and Southeast Asia, provides almost no legal protection for domestic workers against employer surveillance. This global picture reveals that domestic worker surveillance is not a US-specific phenomenon but a feature of the global power asymmetries that structure care work.
17.4 Smart Home Hubs: Who Has Access to Your Home's Data?
The Hub as Data Aggregator
Smart home hubs — Amazon Echo, Google Home, Apple HomePod, and their equivalents — are voice-activated devices that connect multiple smart home systems and provide a single interface for controlling them. They are also, structurally, comprehensive behavioral data collectors. A smart home hub that is connected to lights, thermostat, locks, TV, and appliances knows:
- When residents wake up (first voice interaction or first light activation)
- When residents leave and return (lock usage, thermostat adjustment)
- What residents watch (TV and streaming service integration)
- What residents eat (grocery order history, if Amazon integration is active)
- Who visits (additional voice patterns, if the hub's voice recognition is active)
- What residents discuss in any room where the hub is located (if the hub is always listening, as it must be to detect its wake word)
This data flows to the hub manufacturer and is used for a range of purposes that vary by manufacturer and are described (with varying degrees of specificity) in manufacturer privacy policies.
The "always listening" feature of voice-activated hubs has been the subject of significant public concern. The hubs are designed to detect a wake word ("Alexa," "Hey Google," "Hey Siri") and transmit what follows to the manufacturer's servers for processing. In practice, the hubs are also triggered by words or sounds that resemble the wake word — and the audio captured in these false-wake events has been analyzed by human reviewers at Amazon, Google, and Apple, as revealed by investigative reports in 2019.
Landlords, Manufacturers, and Law Enforcement
Three categories of external parties have claimed or demonstrated the ability to access smart home data without the knowledge or consent of the home's residents:
Landlords: Several cases have been documented of landlords installing smart home devices — smart locks, smart thermostats, smart cameras — in rental properties and retaining access to the devices' data streams. A smart lock administered by the landlord can tell the landlord when tenants come and go. A smart thermostat with landlord access reveals occupancy patterns. These practices are largely unregulated; tenants typically have no legal right to know what devices are installed in their units or who has access to those devices' data.
Manufacturers: As discussed above, device manufacturers retain extensive access to data generated by their products. The business model of smart home devices depends on this access. What manufacturers do with the data — beyond the uses disclosed in privacy policies — is not independently auditable.
Law enforcement: Smart home data has appeared in criminal cases with increasing frequency. In 2017, Amazon was ordered to produce Echo data in a murder case in Arkansas (Amazon initially resisted before the suspect consented). In 2019, Google produced Nest data in a California murder case. Ring camera footage, as examined in Chapter 16, appears routinely in criminal cases. Smart home data — voice recordings, lock access logs, thermostat schedules — is increasingly part of the evidentiary landscape in criminal proceedings, without any settled legal framework governing when and how law enforcement can access it.
📝 Note: The criminal cases in which smart home data appears often involve serious crimes — murder, assault, serious domestic violence — and the evidentiary value is real. But the same data infrastructure that enables investigators to determine when a door was unlocked in a murder investigation also enables less scrupulous access for less serious offenses, for civil matters, and for extralegal purposes. The architecture does not distinguish between legitimate and illegitimate access requests; the social and legal norms governing that distinction are still being developed.
17.5 Tenant Surveillance: Cameras in Rental Properties
The Landlord-Tenant Surveillance Dynamic
Rental housing creates a distinctive surveillance dynamic. Tenants live in a space they do not own, controlled by a landlord who has legal rights to the property and who may seek information about what happens in it. The landlord-tenant relationship has legal protections — landlords generally cannot enter rented premises without notice, and cannot surveil the interior of a private dwelling — but these protections have not kept pace with what smart home technology enables.
The most common forms of tenant surveillance include:
Cameras in common areas: Security cameras in building lobbies, hallways, parking areas, and laundry rooms are widely used and generally legal, as these are not private dwelling spaces. The line between "common area" and "private dwelling space" is legally clear at the unit's threshold — but practically, hallway cameras capture everyone who comes and goes from every unit, creating behavioral records of tenants' visitors, schedules, and associations.
Smart building systems: Modern apartment buildings increasingly incorporate smart access systems — electronic key fobs or phone-based unlocking — that log every entry and exit from the building and individual units. This data is retained by building management and provides comprehensive records of tenant occupancy patterns.
Improper cameras: Documented cases in which landlords have installed cameras inside rental units — in living rooms, kitchens, and (in the most egregious cases) bedrooms or bathrooms — represent clear privacy violations and, in most jurisdictions, criminal acts. These cases come to light when tenants discover cameras, sometimes accidentally and sometimes through the presence of a wireless camera signal on their home network.
Smart thermostats and locks: Landlords who install smart devices in rental units may retain manufacturer-level access to those devices, enabling passive monitoring of occupancy patterns without the tenant's knowledge.
Legal Protections and Their Limits
Tenants' legal protections against surveillance vary significantly by state and municipality. The relevant law draws on several bodies:
Landlord-tenant law: In most states, landlords cannot enter a rented dwelling without reasonable notice (typically 24 hours) and a legitimate purpose (repair, inspection). Installing cameras inside a unit would constitute illegal entry and surveillance. But landlord-tenant law was not written with smart device access in mind and does not clearly address remote data access through networked devices.
Wiretapping and electronic surveillance law: State and federal wiretapping laws prohibit the interception of private communications, which courts have interpreted to include video recording with audio in private spaces. A landlord who installs a camera in a tenant's unit may violate these laws.
Housing discrimination law: If surveillance is used selectively — targeting tenants of particular races, religions, or national origins — it may constitute housing discrimination under the Fair Housing Act.
State-specific protections: California has passed legislation specifically addressing tenant surveillance, requiring landlords to disclose any surveillance devices in or around rental properties. Few other states have comparable protections.
⚠️ Common Pitfall: Tenants often believe that because they are in their own apartment, they are automatically protected from any surveillance. This assumption is incorrect. Common areas of buildings are generally unprotected. Devices installed before a tenant's occupancy may not require disclosure. And even if surveillance is illegal, enforcement depends on tenants being aware that it is occurring — a circular problem when the surveillance is hidden.
✅ Best Practice: Tenant Surveillance Self-Defense
- Inspect your unit. When moving into a new rental, look for cameras, smoke detectors that seem newer or positioned oddly, and other devices that might conceal cameras. Check for wireless camera signals using a free app like Fing (network scanner) or a dedicated RF detector.
- Ask in writing. Ask your landlord in writing whether any surveillance devices have been installed in or around the unit and common areas. A written request creates a record.
- Check your lease. Review lease provisions about surveillance, access, and smart home devices.
- Know your state law. Look up your state's landlord-tenant law regarding surveillance and entry. Tenant rights organizations can provide guidance.
- If you find an illegal camera, document it before removing it. Photograph the device in place, note the date and time, and contact local law enforcement. Do not handle the device in ways that might compromise forensic evidence.
17.6 Consent in Shared Spaces: Housemates, Partners, Children
The Consent Problem in Shared Households
The legal and ethical frameworks for home surveillance break down most severely in shared households — apartments occupied by multiple tenants, homes shared by partners, and family homes where different generations live together. In these environments, the question of who has the right to install surveillance devices, and whose consent is required, has no clear answer.
Consider four scenarios:
Scenario A: One of three housemates installs a camera in the shared living room to "keep an eye on the place" while they are away. The other two housemates are not told.
Scenario B: A parent installs a smart speaker with always-on microphone capability in a home they share with their adult child. The adult child does not know the device records audio in the shared kitchen.
Scenario C: A person installs a camera in their own bedroom in an apartment they share with a partner, but the camera's field of view includes the doorway to the partner's bedroom.
Scenario D: A homeowner mounts a security camera system that covers the interior common areas of their home, which they share with a tenant who rents a room under a lease.
In each case, the legal framework provides inconsistent answers that depend on state law, the specific devices, and what "consent" has been expressed. The ethical framework is more consistently clear: surveillance of a person in a space they reasonably expect to be private requires meaningful consent from that person. Legal permissibility and ethical acceptability are not the same.
Surveillance of Children in the Home
Parents' surveillance of their children within the home occupies a legal and ethical gray zone that is distinct from adult-to-adult surveillance. Parents have both legal authority over minor children and a legal obligation of care — an obligation that surveillance technologies are marketed as serving.
The surveillance of children in the home takes many forms: baby monitors for infants, location-sharing apps for older children, parental control software that monitors content and communications, smart home devices that log children's behaviors and queries. These tools exist on a spectrum from straightforwardly protective (a baby monitor that ensures an infant is safe while sleeping) to deeply invasive (software that screenshots every website a teenager visits and records all their text messages).
The ethical questions this spectrum raises — at what age does a child have privacy rights that override parental surveillance? Does effective parenting require comprehensive monitoring? How does surveillance affect child development and family trust? — are examined in depth in Chapter 37. Here we note that the physical architecture of the smart home is frequently marketed to parents as a child-monitoring system, and that this marketing conflates safety (detecting danger) with control (monitoring behavior).
🔗 Connection to Chapter 19: The power dynamics of parental surveillance — one party having monitoring access that the other cannot reciprocate — anticipate the dynamics of intimate partner surveillance examined in Chapter 19. In both cases, surveillance is framed as care and protection; in both cases, the structural effect is a one-directional visibility asymmetry that produces differential power.
17.7 Jordan's Landlord
Jordan Ellis moved into their apartment at the beginning of the academic year, having found it through a university housing board listing. The apartment is a two-bedroom unit in a building with twelve units, owned by a property management company called Parkside Properties.
In October, Jordan noticed a small camera mounted above the mailboxes in the building's vestibule — a tight space between the building's exterior door and its interior door. The camera was pointed at the mailbox area, which would capture the face of anyone checking their mail and the doorway to the stairwell. Jordan mentioned it to Marcus, who shrugged: "Buildings have cameras. It's for security."
In November, Jordan returned from a late warehouse shift at 2 AM to find a new camera had been installed in the second-floor hallway, directly facing the entrance to their apartment. The camera was small and mounted high on the wall. Jordan did not remember seeing it before.
Jordan emailed Parkside Properties to ask about the cameras — were they new? Who had access to the footage? Would Jordan be notified if footage of them was shared with anyone? The reply came four days later: "We install cameras in common areas for resident safety. Footage is reviewed as needed by management."
That answer told Jordan almost nothing. "Common areas" presumably meant the camera was legal, but Jordan had found, after some research, that "common area" was not clearly defined and that tenant rights varied significantly by state. "Reviewed as needed by management" told Jordan nothing about who "management" included, how long footage was retained, whether it was shared with police, or under what circumstances.
Jordan asked Yara, who laughed without much humor. "They don't have to tell you anything," Yara said. "That's the whole point. You live there, but you don't control it. You never did. The cameras just make it visible."
Jordan thought about that — about the idea that the building had always been controlled by someone else, and the camera was just making that fact visible rather than creating it. It was, Jordan decided, partly true. But there was still a difference between abstract knowledge that a landlord controlled a building and the concrete knowledge that your face was being recorded every time you walked to the mailbox.
📝 Note for Students: Jordan's experience reflects patterns documented in tenant advocacy research. A 2021 survey by the Public Rights Project found that in major American cities, the majority of large apartment buildings had camera systems in common areas, and fewer than one-third of surveyed tenants had been informed of those systems in their lease agreements or move-in documentation. In cities without specific tenant surveillance disclosure requirements, this information asymmetry is standard.
17.8 The Smart Home and Intimate Partner Surveillance (Preview)
This chapter's examination of home surveillance would be incomplete without acknowledging its darkest application: the use of smart home devices to monitor, control, and terrorize intimate partners.
Smart home devices — door locks, security cameras, smart speakers, thermostats, and lighting systems — can be weaponized by an abusive partner to create an environment of total surveillance and control. Documented cases include:
- Abusive partners using smart locks to remotely lock a partner inside or outside the home
- Abusive partners using smart thermostats to control the home's temperature as a form of psychological control
- Abusive partners using home security cameras to monitor a partner's movements and visitors
- Abusive partners listening through smart speakers to conversations in the home
- Abusive partners using smart home systems to create "evidence" of a partner's behavior to use in custody disputes
These uses are documented by domestic violence advocates and by technology researchers who have studied the intersection of IoT devices and intimate partner violence. They represent a form of technology-facilitated coercive control that is difficult for victims to identify and difficult for advocates to address because it exploits consumer technology that was not designed for this purpose.
The National Domestic Violence Hotline has published guides for survivors on auditing and securing smart home devices after leaving an abusive relationship. The complexity of these guides — involving resetting dozens of connected devices, changing cloud account credentials, and assessing which devices may be compromised — reflects the depth of the vulnerability that smart home ecosystems create for abuse survivors.
Chapter 19 examines relationship surveillance in full — including stalkerware, parental controls, and the coercive control dimension of monitoring technology. The smart home preview here is a reminder that the architecture of domestic surveillance does not exist in a social vacuum; it exists within relationships of unequal power, and it amplifies that inequality.
17.9 Legal Frameworks: An Imperfect Map
Federal Law
The primary federal laws relevant to home surveillance are:
The Electronic Communications Privacy Act (ECPA, 1986): ECPA prohibits the interception of electronic communications without consent. It was written before WiFi-connected home cameras existed and has been extensively criticized as inadequate for the current technological environment. The law distinguishes between "intercepting" communications in real-time (prohibited without consent) and accessing stored communications (subject to lower protection). Smart home devices generate both real-time data streams and stored records, and the applicable standard is not always clear.
The Wiretap Act (18 U.S.C. § 2511): A component of ECPA, the Wiretap Act prohibits the intentional interception of wire, oral, and electronic communications. Courts have applied this to audio recording in homes — which is why hidden cameras with audio are more legally risky than video-only cameras.
The Video Voyeurism Prevention Act (2004): Prohibits capturing visual images of a person's "private area" without their consent when the person has a reasonable expectation of privacy. This covers the most obvious cases of improper cameras (bathroom, bedroom) but does not address cameras in common living spaces.
State Law
State law provides the primary legal framework for home surveillance, but it varies dramatically. Key variables include:
- Whether the state requires all-party consent for audio recording
- Whether state landlord-tenant law addresses surveillance disclosure
- Whether state wiretapping law explicitly covers smart home devices
- Whether state housing discrimination law addresses surveillance-based discrimination
California has been the most active state legislator in this area. The California Consumer Privacy Act (CCPA) provides some rights over data collected by smart home device manufacturers. California's two-party consent law, one of the strongest in the country, limits hidden audio recording. California has also passed legislation requiring disclosures for connected devices — though enforcement remains limited.
The International Contrast
The European Union's GDPR provides a markedly different framework. Under GDPR, smart home device manufacturers must:
- Disclose what data they collect and for what purpose
- Obtain meaningful consent for data collection
- Allow users to access, correct, and delete their data
- Report data breaches within 72 hours
- Conduct data protection impact assessments for high-risk processing
GDPR applies to devices sold in the EU and to data about EU residents. It does not protect US residents using the same devices. This regulatory asymmetry means that the same smart home ecosystem — Amazon Echo, Google Nest, Ring — may offer meaningfully different data protections to EU and US users.
17.10 The Structural Stakes of Domestic Surveillance
When Home Is Not Safe
The transformation of the home into a surveillance site has consequences that extend beyond privacy as an individual preference. The home has historically been (however imperfectly) the space where people could be themselves — could let their guard down, express unpopular views, conduct intimate relationships, be vulnerable in ways that public life does not permit. Comprehensive domestic surveillance changes this. When the home is watched — by landlords, by manufacturers, by law enforcement, by abusive partners, by hackers — the psychological freedom that domestic privacy enables is curtailed.
This is not merely a matter of whether someone "has something to hide." It is a matter of the conditions necessary for human development, intimate relationships, and political freedom. Surveillance scholars argue that people cannot fully develop their identities, cannot maintain authentic intimate relationships, and cannot engage in political dissent without some space that is protected from observation. The home has been that space. Its progressive surveillance is an erosion of that space.
Who Bears the Costs
The costs of domestic surveillance are not evenly distributed. Renters are more vulnerable than homeowners — they live in spaces controlled by others and have fewer legal protections. Domestic workers are more vulnerable than their employers — they are watched in others' homes and have minimal recourse. Domestic violence survivors are more vulnerable than abusers — they live with people who can weaponize home technology against them. Lower-income households that cannot afford high-quality devices with robust security features are more vulnerable to the security failures that expose smart home data to hackers and malicious actors.
The topology of domestic surveillance vulnerability maps almost precisely onto the topology of existing social vulnerability. Those who are already least powerful, least protected, and least secure are also those for whom domestic surveillance imposes the greatest costs.
What Structural Analysis Requires
Understanding domestic surveillance structurally means asking not just about individual decisions — did the landlord act legally? did the device manufacturer act in good faith? — but about the system of incentives, legal frameworks, and power asymmetries that produce domestic surveillance as a normal feature of contemporary life.
Manufacturers produce devices with inadequate security because the costs of security failures fall on consumers, not manufacturers. Landlords install cameras with inadequate disclosure because tenants have limited legal recourse and limited practical power to object. Abusive partners weaponize smart home devices because those devices are designed for control and because the legal framework for technology-facilitated coercive control is still developing.
Each of these is a structural condition, not an individual failing. Addressing domestic surveillance requires addressing the structures — regulatory, economic, legal — that produce it.
Chapter Summary
The home, long treated as the paradigmatic site of privacy in Western legal tradition, is now threaded with surveillance infrastructure: baby monitors with inadequate security, nanny cams that operate without workers' knowledge or consent, smart home hubs that comprehensively log domestic behavior, landlord cameras that track tenants' movements, and, in the darkest cases, technology weaponized by abusive partners.
The key insight of this chapter is that domestic surveillance operates within power relationships — between manufacturers and consumers, landlords and tenants, employers and domestic workers, abusers and survivors — and that the surveillance relationship invariably flows from the more powerful to the less powerful. Baby monitor hacking exposes the most vulnerable (infants and their families) to the most powerless position (surveilled by strangers). Nanny cams place domestic workers — already in precarious economic positions — under the monitoring gaze of their employers. Tenant surveillance gives landlords data about the residents who have the least recourse.
Legal frameworks have not kept pace with this transformation. Federal law is outdated. State law is inconsistent. International frameworks like GDPR offer stronger protection but do not reach US residents. In this governance gap, the architecture of domestic surveillance has been built by consumer choice, market incentive, and power asymmetry — and the architecture, once built, is difficult to dismantle.
Chapter 18 moves from the home to the pocket — from the devices in domestic space to the device we carry everywhere, the smartphone, and the comprehensive surveillance it enables.
Key Terms
Domestic surveillance: Monitoring that occurs within the private home, including surveillance by external actors (landlords, manufacturers, hackers) and by members of the household itself.
Nanny cam: A camera, often hidden in an ordinary object, installed by a homeowner to monitor a caregiver working in the home. Legal status varies by state.
Two-party (all-party) consent: A legal standard requiring that all parties to a recorded conversation consent to the recording, applied in approximately a dozen U.S. states to audio recording.
Smart home hub: A networked device that connects and controls multiple smart home systems and serves as a data aggregation point for domestic behavioral data.
Surveillance creep: The gradual expansion of surveillance from its initially stated purpose into additional monitoring functions not originally disclosed or anticipated.
Data sovereignty: The principle that individuals should have control over data generated about them, including the ability to know what data exists, access it, correct it, and delete it.
Discussion Questions
-
The chapter argues that the home's transformation into a surveillance site threatens not just individual privacy but the conditions necessary for human development, intimate relationships, and political freedom. Do you find this argument persuasive? What evidence supports or challenges it?
-
Nanny cams are legal in most states when they record video without audio. Does legality imply ethics here? What ethical framework would you apply to a family's decision to install a hidden nanny cam?
-
Smart home manufacturers argue that their data collection is disclosed in privacy policies and that users consent when they use the devices. Apply the concept of "consent as fiction" from Chapter 16 to this claim.
-
The chapter notes that the costs of domestic surveillance fall disproportionately on those who are already most vulnerable. What policies would most effectively reduce this disparity?
-
Jordan's landlord responded to their inquiry about cameras with vague reassurances. What rights should tenants have regarding landlord surveillance, and what remedies should exist when those rights are violated?