Back to Back Issues Page
Watch For Scams Newsletter. Internet Connected Toys
August 01, 2017
Hello

Internet Connected Toys

Watch For Scams is dedicated to helping you avoid becoming a victim of fraud.

If you like this ezine, do a friend a big favor and forward this to them. If a friend forwarded this to you, and if you like what you read, please subscribe by visiting the link below: Subscribe Here

Internet Connected Toys

Parents should consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn and tailor their behaviors based on user interactions.

These toys typically contain sensors, microphones, cameras, data storage components, and other multimedia capabilities – including speech recognition and GPS options. These features could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed.

The features and functions of different toys vary widely. In some cases, toys with microphones could record and collect conversations within earshot of the device. Information such as the child’s name, school, likes and dislikes, and activities may be disclosed through normal conversation with the toy or in the surrounding environment.

Personal information (e.g., name, date of birth, pictures, address) is typically provided when creating user accounts. In addition, companies collect large amounts of additional data, such as voice messages, conversation recordings, past and real-time physical locations, Internet use history, and Internet addresses/IPs. The exposure of such information could create opportunities for child identity fraud.

Data collected from interactions or conversations between children and toys are typically sent and stored by the manufacturer or developer via server or cloud service. In some cases, it is also collected by third-party companies who manage the voice recognition software used in the toys. Voice recordings, toy Web application (parent app) passwords, home addresses, Wi-Fi information, or sensitive personal data could be exposed if the security of the data is not sufficiently protected with the proper use of digital certificates and encryption when it is being transmitted or stored.

What Should I Do?

Consumers should consider the following recommendations, at a minimum, prior to using Internet-connected toys.

• Only connect and use toys in environments with trusted and secured Wi-Fi Internet access

• Research the toy’s Internet and device connection security measures

◦ Use authentication when pairing the device with Bluetooth (via PIN code or password)

◦ Use encryption when transmitting data from the toy to the Wi-Fi access point and to the server or cloud

• Research if your toys can receive firmware and/or software updates and security patches

◦ If they can, ensure your toys are running on the most updated versions and any available patches are implemented

• Research where user data is stored – with the company, third party services, or both – and whether any publicly available reporting exists on their reputation and posture for cyber security

• Carefully read disclosures and privacy policies (from company and any third parties) and consider the following:

◦ If the company is victimized by a cyber-attack and your data may have been exposed, will the company notify you?

◦ If vulnerabilities to the toy are discovered, will the company notify you?

◦ Where is your data being stored?

◦ Who has access to your data?

◦ If changes are made to the disclosure and privacy policies, will the company notify you?

◦ Is the company contact information openly available in case you have questions or concerns?

• Closely monitor children’s activity with the toys (such as conversations and voice recordings) through the toy’s partner parent application, if such features are available

• Ensure the toy is turned off, particularly those with microphones and cameras, when not in use

• Use strong and unique login passwords when creating user accounts (e.g., lower and upper case letters, numbers, and special characters)

• Provide only what is minimally required when inputting information for user accounts (e.g., some services offer additional features if birthdays or information on a child’s preferences are provided)

If you believe you have been a victim of this type of scam you should promptly report it to the IC3's website at www.IC3.gov. The IC3's complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration.

Remember - always watch for scams!

Steve

Back to Back Issues Page