Home/Resources/Women’s Safety and Privacy Toolkit/Smart toys & location trackers
Smart toys & location trackers2020-05-19T13:36:17+10:00

Smart toys & location tracking: privacy & safety concerns with children & pets

‘Smart’ and ‘connected’ toys that promise to entertain, increase safety, and connect us to our kids and pets while we’re away from home are flooding into the Australian marketplace. These devices may offer domestic and family violence survivors new ways to increase their privacy and safety, by understanding the privacy settings and using their devices strategically. Unfortunately, some devices can create security and surveillance risks, and may provide yet another, highly invasive way that technology can be misused to monitor, harass, threaten, or harm a survivor.

What is the Internet of Things (IoT)?

The Internet of Things refers to devices connected to each other and to a device or app that can control them. These devices may be connected through a home network, a website, or an app through the Internet, Bluetooth, or other means.

Smart Toys

We now have the ability to buy toys that listen and speak to children, read stories, ask questions, and search for information on the Internet. Some toys come equipped with cameras, microphones, and speakers so the toys can interact with the child.

Safety and privacy risks related to voice recognition are of concern. It is important to understand the difference between ‘voice recognition’ and ‘speech recognition’. Voice recognition is the ability for a device to determine who is speaking: an adult vs. a child, for example, or even specific people in the house. Speech recognition is the ability for a device to understand spoken words. This may be familiar from smartphones or home automation personal assistants like Amazon’s Alexa or Google Home.

The main risk associated with these toys is the potential for surveillance by an abuser, a neighbour, or other third party. Many devices are not built with strong security protections. For example, some devices can be connected through Bluetooth, allowing for people in close proximity, such as neighbours, to access the toy.

Others offer security against third parties or strangers, but might give unauthorized video or audio access to someone who gives the toy as a gift, for example. The information gathered could be used to stalk, control, or harass a survivor.

Small drones used for recreation are another increasingly popular toy. Tiny devices often called ‘nano drones’ fit in the palm of the hand and cost around $30. Some can take photographs or videos. Larger drones for racing or other competitions are much more expensive and may include microphones or cameras. Some drones are controlled remotely, much as the older generation of remote-control toys, but some new drones can be controlled by mobile devices.

Other IoT Devices for Families

In addition to smart toys, many other devices are currently marketed to parents and families that are designed to increase children’s safety. These may not have adequate security features, or may be purposely misused to monitor or harm a child or other family member.

  • Baby monitors, which have long been vulnerable to monitoring through radio waves in their older versions, are now connected through the Internet to a handset or a parent’s mobile device.
  • Location tracking devices have long been marketed as a way to keep children or aging parents safe from wandering off. Previously based on GPS technology, newer devices use more energy-efficient, longer-lasting technologies paired with the convenience of a connection to a mobile device or web interface.

These new devices, being Internet-connected, open up new risks for monitoring by a domestic violence abuser or child sexual abuse offender either within the home or not living with the child.

IoT Devices for Pets

Another growing market for connected devices is targeted at pet owners.

  • Food and water dispensers are being combined with cameras and speakers so that owners can check in on their pets when they are away, even playing with them through the device or tossing a treat.
  • Some devices track a pet’s location or vital signs, relaying the information over the Internet or via an app.
  • As with devices for children, location tracking devices for pets were previously based on GPS technology. Newer devices use more energy-efficient, longer-lasting technologies paired with the convenience of a connection to a mobile device or web interface.

These devices, like smart toys, often have inadequate security features, or do not encourage owners to change default security settings. The devices could be used to monitor the home through a camera or track the location of the person while walking their pet, for example.

Benefits of Connected & Smart Devices

Connection to children and pets from a distance can be an important part of emotional well-being. Being able to track the location and safety of children and pets can help reassure a survivor that their loved ones are safe and healthy. In the event of violence or harassment towards the survivor, children, or pets, cameras in these devices might capture useful footage for evidence.

Questions About IoT Devices

When considering purchasing connected toys or bringing these devices into the home, there are a few questions to consider. First, does that particular device need to be ‘smart’ or ‘connected’? Do the benefits outweigh the risks? How secure is the device and the app that runs it? Are there features that allow the user to individualise and increase privacy and security?

Strategies to Increase Privacy & Safety

Steps to increase the privacy and safety of smart toys include learning about the built-in security options of the device, turning it off when not in use, and changing the default passwords or other security settings.

If a survivor suspects that a device is being misused, they can begin to document the incidents. Our Stalking & Technology-Facilitated Abuse Log is one way to document each occurrence. These logs can be helpful in revealing patterns, determining next steps, and may potentially be useful in building a case if the survivor chooses to engage with the legal system.

Survivors might also try to access evidence through the device, or the app or website that controls it. They can also try to reach out to the manufacturer to try to regain control over a device or the account associated with it. With these devices and others, it is also important to take steps to increase network and WiFi security. For more information, see our handout on WiFi security.

Acknowledgment

This handout has been adapted under licence from content originally created by the National Network to End Domestic Violence (NNEDV).

More Information

Read this article for more information on Online Privacy & Safety Tips.

Read this article for more information on Being Web Wise.

Read more information on creating a Technology Safety Plan: A Guide for Survivors & Frontline Workers.

Read this ridesharing safety guide, Uber Safety Guide in Collaboration with WESNET.

Download our Stalking & Technology-Facilitated Abuse Log.

Download this page in a handout version (in PDF).

CLICK HERE