"The Spy Act prohibits keystroke logging, hijacking, and phishing"
About this Quote
The subtext is more strategic. By naming recognizable threats, Stearns frames privacy and security as a matter of criminal predation rather than corporate surveillance, government overreach, or the gray zones of data brokerage. The quote draws a bright moral boundary: there are "bad actors" doing "bad things", and the state is stepping in. That framing helps avoid thornier questions about how broadly “spy” behavior can be defined, who gets swept up (researchers, employers, parents, law enforcement), and whether enforcement mechanisms might expand monitoring in the name of stopping monitoring.
Context matters: this kind of language emerges when lawmakers are trying to translate technical harms into kitchen-table fear without getting trapped in technicalities. “Keystroke logging” signals sophistication, while “phishing” and “hijacking” are accessible enough to trigger recognition. It stresses prohibition, not capacity-building: punishment over resilience, deterrence over education. The line works because it reassures the public that the digital world is governable, and it reassures colleagues that the bill targets obvious villains, even if the real battle is over definitions, carve-outs, and enforcement power.
Quote Details
| Topic | Privacy & Cybersecurity |
|---|---|
| Source | Help us find the source |
| Cite |
Citation Formats
APA Style (7th ed.)
Stearns, Cliff. (2026, January 17). The Spy Act prohibits keystroke logging, hijacking, and phishing. FixQuotes. https://fixquotes.com/quotes/the-spy-act-prohibits-keystroke-logging-hijacking-46719/
Chicago Style
Stearns, Cliff. "The Spy Act prohibits keystroke logging, hijacking, and phishing." FixQuotes. January 17, 2026. https://fixquotes.com/quotes/the-spy-act-prohibits-keystroke-logging-hijacking-46719/.
MLA Style (9th ed.)
"The Spy Act prohibits keystroke logging, hijacking, and phishing." FixQuotes, 17 Jan. 2026, https://fixquotes.com/quotes/the-spy-act-prohibits-keystroke-logging-hijacking-46719/. Accessed 12 Feb. 2026.




