Key Takeaways — Chapter 19
Core Concepts
1. Relationship surveillance exists on a spectrum from consensual coordination to coercive control. The spectrum runs from mutual, reversible location sharing to stalkerware-facilitated abuse. Key variables — consent, reciprocity, purpose, proportionality, and the consequences of not being able to opt out — determine where specific arrangements fall.
2. Stalkerware is commercial, prevalent, and deliberately designed to evade detection. Commercial stalkerware products are sold through mainstream channels, marketed with a fig-leaf of legitimate use, and engineered to be invisible to the device owner. The Coalition Against Stalkerware has developed technical standards for detection and survivor-centered response protocols.
3. The dual-use problem makes software-focused regulation insufficient. The same application can be a legitimate parental control tool or an abuse weapon depending on consent and relationship context. Technical regulation cannot resolve this; addressing stalkerware requires legal recognition of coercive control, survivor support, and increased enforcement risk for abusers.
4. Safety planning must precede technical remediation. Removing stalkerware without safety planning can escalate danger. Survivors should contact a domestic violence hotline or advocate before taking technical action on a monitored device.
5. Parental monitoring technology exists on a welfare spectrum. Monitoring tools range from minimally invasive (Bark's safety-signal flagging) to comprehensively surveillance-oriented (keystroke logging, message reading). The appropriate scope of parental monitoring depends on the child's age and developmental stage; disclosed monitoring serves different developmental functions than covert monitoring.
6. The "protection as surveillance" inversion characterizes the family technology market. Products marketed for family safety (Life360, parental monitoring apps) frequently operate as commercial data extraction infrastructure. Parents who install these products for their children's safety may not know their family's location data is being sold to commercial brokers.
7. Coercive control is the structural context for the most harmful forms of relationship surveillance. Evan Stark's framework identifies surveillance not as incidental to abusive relationships but as a primary mechanism of control. Technology-facilitated coercive control — stalkerware, smart home weaponization, account access — is documented in the vast majority of domestic violence cases.
The Consent Framework in Relationships
The meaningful consent framework applies in relationship surveillance with additional complexity: power differentials in relationships (parent-child, economically dependent partner, abuser-survivor) make formal consent (agreement under pressure) structurally different from genuine consent. The question is not only "did they agree?" but "was the agreement genuinely free, and can they genuinely withdraw it without significant negative consequence?"
The answer to this question is often no — in parenting relationships (children cannot meaningfully consent to or withhold consent from parental decisions), in relationships with significant power imbalances, and in relationships where surveillance is already installed and operating. Consent frameworks are necessary but insufficient for evaluating relationship surveillance; the power context of the relationship is as important as the formal consent.
Practical Takeaways for Students
If you are considering monitoring software in a relationship: - Disclose fully before implementing. - Offer reciprocity if you are asking for location sharing. - Create a genuine, consequence-free exit mechanism. - Ask whether the monitoring serves the monitored person's interests or your own anxiety/control needs.
If you suspect stalkerware on your device: - Use a secondary device for sensitive communications while investigating. - Contact the National Domestic Violence Hotline (1-800-799-7233) or techsafety.org before taking action. - Do NOT remove stalkerware without safety planning. - On iPhone: Settings > Privacy & Security > Safety Check.
If a friend discloses concerns about partner surveillance: - Listen and validate without pressuring them toward any particular response. - Share resources: thehotline.org, stopstalkerware.org, techsafety.org. - Emphasize that physical safety comes before device security. - Let them set the pace.
Looking Ahead
Chapter 20 concludes Part 4 by turning the surveillance gaze inward — examining the Quantified Self movement, wearable health devices, and the phenomenon of voluntary self-monitoring. If the previous chapters have shown us surveillance imposed from outside and within relationships, Chapter 20 examines what happens when we become the watchers of ourselves.