Further Reading — Chapter 17
Security Research
1. Which? Magazine. "Baby Monitor Security: Tests Reveal Alarming Vulnerabilities." Which.co.uk, 2020.
The UK consumer organization's systematic security testing of eight popular WiFi baby monitors, documenting vulnerability rates, specific security failures, and manufacturer responses. The study provides a model for consumer-facing security assessment and is unusual in testing actual retail products rather than theoretical vulnerabilities. The methodology section is worth reading for students interested in how consumer electronics security research is conducted. Freely available at which.co.uk.
2. Federal Trade Commission. "Internet of Things: Privacy and Security in a Connected World." FTC Staff Report, 2015.
The FTC's analysis of security and privacy in consumer IoT devices, including baby monitors and smart home systems. While dated, the report established the analytical framework the agency applies to IoT security complaints and remains a useful overview of the consumer protection landscape. The appendix on best practices for IoT manufacturers provides a standard against which specific devices can be evaluated. Available free at ftc.gov.
Domestic Labor and Surveillance
3. National Domestic Workers Alliance. "Home Economics: The Invisible and Unregulated World of Domestic Work." NDWA Report, 2012.
While pre-dating the widespread adoption of smart home surveillance specifically, this comprehensive study of domestic workers' legal and economic vulnerability provides the essential structural context for understanding why nanny cam surveillance is so difficult for affected workers to contest. Data on wages, legal status, immigration status, and worker experiences forms the analytical foundation for thinking about power in domestic employment. Available at domesticworkers.org.
4. Daniels, Jessie. "The Trouble with White Feminism: Whiteness, Digital Feminism and the Internet." In Intersectionality and Technology, 2016.
Daniels examines how surveillance in domestic spaces falls disproportionately on women of color, connecting domestic worker surveillance specifically to broader patterns of racial and gender hierarchy. The analysis of nanny cams as a site of racial power dynamics is especially relevant to this chapter's concerns about who bears the costs of domestic surveillance.
Smart Home and IoT Policy
5. Apthorpe, Noah, Dillon Reisman, and Nick Feamster. "A Smart Home Is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic." arXiv preprint, 2017.
A technical research paper demonstrating that even fully encrypted smart home device traffic can reveal behavioral patterns (presence at home, activity levels, device interactions) through traffic analysis. The paper's finding that encryption does not fully protect behavioral privacy from smart home devices is essential for understanding why data minimization, not just encryption, is required. Available free on arXiv.
6. Electronic Frontier Foundation. "Security Analysis of Consumer-Grade Smart Home Devices." EFF Technical Reports, various years.
The EFF's ongoing series of technical security assessments of consumer smart home devices. The reports are accessible to non-technical readers and document specific vulnerabilities in specific products, with timelines for manufacturer responses. Free at eff.org.
Legal Analysis
7. Citron, Danielle Keats. "Sexual Privacy." Yale Law Journal, 2019.
While focused on sexual privacy specifically, Citron's analysis of the legal gaps that allow intimate surveillance (including recording in private domestic spaces) to go unaddressed provides the most rigorous current legal framework for understanding domestic privacy rights. Citron argues for a comprehensive approach to privacy that accounts for the intimacy and sensitivity of what is surveilled, not only the technical mechanisms. Law review databases.
8. Solove, Daniel J. "A Taxonomy of Privacy." University of Pennsylvania Law Review, 2006.
Solove's foundational taxonomy distinguishes between different types of privacy violations — information collection, information processing, information dissemination, and invasion — in ways that are directly applicable to smart home surveillance. Students who want a rigorous conceptual framework for analyzing domestic surveillance harms will find this article invaluable. Available through law review databases and on SSRN.
Intimate Partner Violence and Technology
9. National Network to End Domestic Violence. "A Snapshot of Domestic Violence and Technology Abuse." Safety Net Report, 2020.
NNEDV's annual survey of technology abuse in domestic violence situations, including data on how smart home devices are used as tools of coercive control. The report documents specific device types, specific tactics, and survivor experiences in a format accessible to students without technical backgrounds. Essential reading for the intersection of smart home technology and intimate partner violence examined at the end of this chapter. Free at nnedv.org.