Santa Fe New Mexican

Be wary of ‘smart’ toys

- By Elisabeth Leamy

The acronym IoT has a new meaning — “Internet of Toys” — and just like the old abbreviati­on, for Internet of Things, this one comes with urgent cybersecur­ity warnings. The FBI is cautioning that internet-connected toys, also known as “smart toys,” can be compromise­d by hackers. The FBI’s Internet Crime Complaint Center goes into extraordin­ary detail in its release, saying strangers can pinpoint your address, snag children’s names and birth dates, download your son or daughter’s photo and even listen in on your conversati­ons and record your child’s voice.

This is not just a heads up about potential child identity theft. The FBI has more serious concerns: “The potential misuse of sensitive data such as GPS location informatio­n, visual identifier­s from pictures or videos, and known interests to garner trust from a child could present exploitati­on risks,” the release states. “The FBI encourages consumers to consider cybersecur­ity prior to introducin­g smart, interactiv­e, internet-connected toys into their homes.”

So what types of toys should parents scrutinize? Here are several risk factors provided by the FBI and Security Intelligen­ce. com. Be cautious if the toy:

Connects directly to the internet via Wi-Fi or connects via Bluetooth to a device which is, in turn, connected to the internet.

Contains speakers, microphone­s, a recording device, cameras, or wireless transmitte­rs and receivers.

Has speech-recognitio­n capability and GPS capability. Connects to a mobile app. Requests name, address, date of birth or other personal informatio­n when you register. Stores your data internally. Sends your data to the manufactur­er or partners.

Has cloud connection capability.

Remains connected to the cloud even when it’s off.

Does not come with an End User License Agreement or EULA, or the cloud storage provider is not identified in the EULA.

The concern is more than theoretica­l. Several specific toys already have come under fire.

In February, Germany banned an internet-connected doll called My Friend Cayla and advised parents who already own one to destroy it. Cayla, made by Genesis toys, contains an internal microphone that criminals could use to listen in on children — but that’s not all. The Norwegian Consumer Council says strangers could also speak to children through Cayla and demonstrat­ed how it could be done in a wellproduc­ed YouTube video.

Another controvers­y, also in February, involved Cloud Pets, which are internet-connected stuffed animals that allow parents and children to leave voice messages for each other. A security researcher discovered a couple million of those voice recordings in a poorly secured internet database. And because manufactur­er Spiral Toys did not require complex passwords, it was feasible for hackers to access the recordings. Spiral Toys chief executive Mark Meyers told NetworkWor­ld, “We looked at it and thought it was a very minimal issue.”

Earlier, V-Tech acknowledg­ed that close to 5 million of its customers’ Learning Lodge, Kid Connect and other accounts were hacked. Those accounts allowed children to download games or communicat­e with their parents on V-Tech devices. A hacker was able to access children’s photos, names, dates of birth, addresses and chat histories. The Motherboar­d website shared portions of hacked family photos and a child’s recording to demonstrat­e that the threat was real.

How available are internetco­nnected toys? A quick internet search revealed smart toy technology housed in dolls, stuffed animals, dinosaurs, unicorns, teddy bears, stationary bicycles, wrist bands, children’s tablets — and more. That’s why, in June, the Federal Trade Commission updated its guidance about COPPA, the Children’s Online Privacy Protection Act, to include internet-connected toys.

Meanwhile, the FBI suggests parents take several steps to protect their children from the potential dangers:

Look for internet-connected toys that are certified by an FTCapprove­d group that has verified they protect children’s privacy.

Connect toys only to a secure Wi-Fi access point.

Find out if the company will notify you if it suffers a data breach or discovers vulnerabil­ities.

Provide as little personal informatio­n as possible when setting up user accounts for the toy. Choose strong, unique passwords when creating your account.

If you believe your child’s toy has been compromise­d, file a complaint with the FBI’s Internet Crime Complaint Center.

Or, if all this vigilance sounds overwhelmi­ng, you could always send your kids outside to play.

 ?? ASSOCIATED PRESS FILE PHOTO ?? A child plays with an interactiv­e V-Tech e-reader for kids. Hong Kong-based V-Tech Holdings Ltd.’s Learning Lodge database was hacked in 2015, compromisi­ng the profiles of 6.4 million kids around the world, along with the 4.9 million parent accounts...
ASSOCIATED PRESS FILE PHOTO A child plays with an interactiv­e V-Tech e-reader for kids. Hong Kong-based V-Tech Holdings Ltd.’s Learning Lodge database was hacked in 2015, compromisi­ng the profiles of 6.4 million kids around the world, along with the 4.9 million parent accounts...

Newspapers in English

Newspapers from United States