Cybersecurity: The Internet of Things (IoT) & You — Exercise Caution

As we continue to move to a world wherein all things are networked and even toys now have connections to the cloud, people need to be cognizant and careful.  According to the Hacker News, in 2015 the toy manufacturer VTech revealed that they had suffered a data breach which resulted in the exfiltration of personally identifiable information (PII) of nearly 5M adults as well as photos of roughly 200K children.  Not only did the breach involve the PII of adults, but also the names, gender, and birthdates of children, which raises a number of additional potential issues, according to the article.  Fast forward to 2017, and yet another toymaker has fallen victim to a massive data breach.  The Hacker News reported that CloudPets, developed by a California-based company, Spiral Toys, exposed the voice recording of over 2M parents and children as well e-mail addresses and passwords for over 800K accounts.  CloudPets are stuffed animals which allow parents and children to send voice messages back and forth via the internet, according to the article. The article further states that Spiral Toys was advised at least four times that their data had been exposed and they failed to take any ameliorative steps.


I have and will continue, to make the argument that cybersecurity requires a baseline approach especially as the number of connected devices grows at a seemingly exponential rate.  So long as manufacturers are not required to meet minimum cybersecurity hygiene standards the number of incidents such as those referenced herein will crop up as seemingly innocuous devices become the target of choice due to their lax security protocols and lack of safeguards.  In the instances above the cybersecurity measures in place were either non-existent or rudimentary at best.  The encryption was weak, the databases were public, and arguably these companies failed to meet the duty of care owed to consumers and what is likely valuable PII.  The databases were reportedly devoid of either social security numbers, or credit card information. However, the fact remains that the available data could (and still may) be used as one piece of the puzzle from which additional information can be gleaned, e-mail addresses can be targeted, and passwords can be leveraged to attempt to access additional accounts (in many cases, users have a single password that is used across multiple sites).

This should raise a number of red flags for all of us.  Consider the world in which we live, our cars are connected, our appliances are connected, children’s toys are now connected, in each case we are providing at least limited information in order to access and utilize all of our connected devices and in so doing we put a large amount of trust that companies will safeguard that data.  However, as we continue to see that is often not the case.  This is further exacerbated by the “make it work mantra,” wherein the majority of users simply want products to perform as advertised.  Thus, consumers will often forego research and understanding of how/where their data is going and will be used so they can get the product to function as quickly as possible.  In the case of these toys, consider a parent who is faced with a child that just wants the toy to do whatever it has been billed and advertised as doing.  They are not interested in using complex passwords that are difficult to remember and enter, they are unlikely to research the toy company to determine if they are using two-way encryption or if they offer multi-factor authentication for their devices —  they just want the item to work.  This raises a whole new set of issues regarding the “human side” of cybersecurity.

This is one area where technology can be implemented which can manage the cybersecurity aspects of IoT devices and yet still provide ease-of-use.  The problem being that companies are ultimately profit-driven and thus in the absence of any financial incentive to bake in additional technology to help safeguard data while simultaneously enhancing ease-of-use, companies choose the lowest cost-alternative, nearly universally.  This, therefore is one area where the threat of either legal liability or dare I say, regulations can be implemented via legislation that mandates that companies and especially those in the realm of IoT take certain steps with respect to cybersecurity.  One of the keys here will be to draft intelligent legislation that does not merely require that cybersecurity protocols be baked in but rather that the additional cybersecurity have enhanced ease-of-use so that opting out of additional security measures would, in fact, be purposeful and intentional rather than merely a button to click to get the product to function online versus navigating through burdensome security-driven setup.

Until then, I encourage everyone to become device-aware and consider the information you are providing in order to get something simply “to work.”  In many cases, you may find that having a connected device is neat in theory but scary in practice.  Companies perform cost-benefit-analysis on a daily basis — so too, should consumers.

Please follow and like us:

Tags: ,

Leave a Reply

You must be logged in to post a comment.


Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography


Follow by Email