Feeds

Child email tracking – Does it work?

Kid-e-mail

  • alert
  • submit to reddit

Boost IT visibility and business value

Wouldn't it be good if parents could track who their children are emailing.

That's the promise behind Kid-e-mail which launches as a free service in the UK this November. It says it can offer parents a huge swatch of information on who their children are communicating with.

On its website Kid-e-mail says it can gather some or all of the following information: email address, IP address, date and time of opening, how long the email was open for, the browser used, the language used, client software and ISP etc.

Also "in all but the most extreme cases the unique address of the recipient's machine" will also be provided.

A neat trick, especially when you consider anyone using a dial-up connection almost certainly won't have a unique IP address. Kid-e-mail also says this information is gathered "regardless of the settings on a person's machine".

How?

Milton Keynes-based Advanced Ability, the developer of Kid-e-mail, isn't disclosing how it works. We can't figure out how the technology would work effectively - except in conjunction with a limited number of clients. Anyone help us out, here?

Kid-e-mail routes email through its servers and reformats it as a HTML email with the organisation's logo (which might act as some kind of deterrent) and a call to a perl script - or similar - on Kid-e-mail's server.

This would mean that the ploy would work only if the recipient is using a mail client that defaults to HTML mail and runs scripts without asking you. Yes, take a bow, Microsoft 'Outlook' - this one's for you.

Recipients using many clients, or perish the thought, non-Microsoft machines, will likely go untracked. We infer that this is what Kid-e-mail means when it talks of "deliberate use of sophisticated and expensive software and hardware techniques, which are for the sole intention of 'hiding' a PC when it is on the Internet".

Kid-e-mail is free, so let's remove any thought that Advanced Ability is seeking to profit from parental concern about child abductions in the UK, in the wake of the disappearance (and subsequent murder) of Milly Dowler in March, and the murders of Holly and Jessica last month.

You can also argue that pedoes will be deterred from responding to Kid-e-mail-headed emails, even if the technology is less effective than presented.

However the West Midland Police is endorsing the technology and is conducting trials, the BBC reports . This gives us cause for concern. In the current political climate, we can expect to see more companies seeking to soothe parent's understandable fears with technology of dubious effectiveness. ®

Kid tracking

UK firm creates GPS tracker for kids
Cap Cyborg to chip 11 year old in wake of UK child killings
Kid-chipper Cap Cyborg reported to police, social services

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.