WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

I often think about when I was a child and all the cool toys that I had: my Mickey Mouse record player, Sit-n-Spin, paint-with-water books, and enough stuffed animals to open my own store! As simple as those “nostalgic” toys seem, at the time, those were considered high-tec gadgetry.  Now, children have toys that connect directly to the Internet, interact with them in real-time, record what they say and even adapts to their interests. While these toys are “cool,” and probably on every child’s Santa list for Christmas, there are some scary security implications.

The data being collected from children as they innocently play and interact with their toys could be used to conduct market research, advertise new products directly to children and even build profiles of their interests, a profile that could follow them for the rest of their digital lives.

Let’s take Hello Barbie as an example. Developed by ToyTalk, this interactive, Wi-Fi-connected Barbie doll has a microphone, speaker and a small embedded computer, along with Wi-Fi hardware. Press a button on Barbie’s belt buckle and she wakes up, asks a question and then activates the microphone. While the child speaks to Barbie, his or her replies (and any background noise) are being recorded, encoded, encrypted and sent into ToyTalk’s servers. The audio is then processed by voice-recognition software to figure out what was said and how best to reply.

This recorded data is supposedly used to assist Mattel and ToyTalk to improve Barbie’s scripted replies that are in the doll’s backend software. This is all fine and great, making the child’s future experience with the doll even more enriching, but what happens if ToyTalk’s servers get hacked? What happens if your child’s voice falls into an online predator’s hands? What happens if Barbie gets hacked by bad people who start interacting with your child?

All scary thoughts, but rest assured parents, because Barbie will email you weekly or daily, giving highlights about what your child has said and there’s even an app that allows you to specify “off limit” conversation topics.

By the way, whatever happened to teaching our children NOT to talk to strangers?!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.