The software gained infamy in October 2014 following the release of a report by the Electronic Frontier Foundation, a non-profit digital rights group, which alleged that ComputerCop was privacy-invasive due to a number of security flaws, including the storage and transmission of key logging output in a non-encrypted format.
[1] On October 1, 2014, the Electronic Frontier Foundation released a report considering the ComputerCop software to be spyware due to a number of major design flaws—particularly within its key logging system.
More significantly, the key logger was criticized for storing logged data in non-encrypted plain text on the user's hard drive, including passwords and other sensitive information.
[1] Promotional material for ComputerCop was also found to contain endorsements by the American Civil Liberties Union and the National Center for Missing and Exploited Children.
"[3] Steve Moawad, the Senior Deputy District Attorney of Contra Costa County, California, similarly noted that the EFF had "overstat[ed] the risk" of ComputerCop, and that there had not yet been any identity theft cases in connection to the software.
[5] In further statements to the technology website Ars Technica, Blakely stated that proper use of the software was "something we whole-heartedly endorse", but that "if you're of the persuasion of the people of the EFF who would rather not do anything, then that's something that I can't help.
"[6] In September 2016, the Treasury Department completed an investigation, confirming that the distributors had "altered the 2001 letter from TEOAF and made it appear to be blanket permission for all law enforcement agencies to use equitable sharing funds to purchase the software", but that it cannot be prosecuted due to statute of limitations.