精东传媒

Hello Barbie, hello hackers: accessing personal data will be child’s play

Hello Barbie, hello hackers: accessing personal data will be child’s play

At the top of some children’s Christmas present wish list this year will be the new Hello Barbie doll, writes Associate Professor Katina Michael. 

Mattel鈥檚 latest doll connects to the internet via Wi-Fi and uses interactive voice response (IVR) to effectively converse with children. When the doll鈥檚 belt button is pushed, conversations are recorded and uploaded to servers operated by Mattel鈥檚 partner, .

Hello Barbie tries to engage with children in intelligible and free-flowing conversation by asking and responding to questions, as well as being able to learn about its users over time.

As says: "Just like a real friend, Hello Barbie doll listens and adapts to the user鈥檚 likes and dislikes."

But is Barbie the friend she promises to be?

Some might welcome Hello Barbie and similar talking dolls, such as , as a fun and novel development in smart toys that will keep children occupied. Others have expressed concerns, such as the from the .

As one reporter found, Hello Barbie prompts those conversing with her to about themselves, but when the focus is on her she quickly changes the subject to invariably gender-normative subjects and fashion.

Hello Barbie: Let鈥檚 get serious and talk about something really important: fashion.

She mines children for personal details but gives little in return, other than vacuous compliments and fashion advice. Her friend credentials come further into question as she routinely discloses all the information gathered to ToyTalk who operate the speech processing services for Hello Barbie.

What鈥檚 in the privacy statement?

As with many products, the detail that really matters is in the fine print; in this instance ToyTalk鈥檚 Hello Barbie , so there are a few important points to consider before wrapping her up and putting her under the Christmas tree.

ToyTalk outlines that it may:

[鈥 use, store, process, convert, transcribe, analyze or review Recordings in order to provide, maintain, analyze and improve the functioning of the Services, to develop, test or improve speech recognition technology and artificial intelligence algorithms, or for other research and development and data analysis purposes.

Essentially it can use the information gathered from the child, or anyone who converses with Hello Barbie, for any purpose that it chooses under the vague wording 鈥渄ata analysis purposes鈥.

ToyTalk will also share recordings with unknown 鈥渧endors, consultants, and other service providers鈥 as well as 鈥渞esponding to lawful subpoenas, warrants, or court orders鈥.

Has Hello Barbie become a sophisticated surveillance device masquerading as an innocuous child鈥檚 toy?

In England, the draft introduces 鈥渆quipment interference鈥, which allows security and intelligence agencies to interfere with electronic equipment in order to obtain data, such as communications, from a device. This would mean that government agencies could lawfully take over children鈥檚 toys and use them to monitor suspects.

These data collection practices are significant, as they reach much deeper than marketing practices that collect information about children鈥檚 likes and preferences. In conversing with toys, such as Hello Barbie, children reveal their innermost thoughts and private play conversations, details of which are intended for no one else to hear.

Once a child has developed a friendship with Hello Barbie, it might not be so easy to take her away.

Security risks

ToyTalk does recognise that 鈥渘o security measures are perfect鈥 and that no method of data transmission can ever be 鈥済uaranteed against any interception or other type of misuse鈥.

Just last month the toy maker , including those of 6.3 million children. Photos of children and parents, audio files, chat logs and the name, gender and birth date of children were accessed by the hackers.

It鈥檚 not just toys that are at risk. There are ongoing reports of being hacked so that outsiders can view live footage of children (and family), talk to the infant and even control the camera remotely.

Smart toys are going to be tempting propositions for hackers, with some already proving that they could make , to more usual targets such as hacking credit card details.

Barbie has also been in hot water before. The has a camera lens embedded in the doll鈥檚 chest disguised as a pendant which prompted the that it could be used to make child pornography.

The Internet of Things provides direct access to children and their spaces through an increasing array of products and gizmos. Such security breaches not only act as a stark reminder of the vulnerability of children鈥檚 high-tech toys, but also lead us to reflect on other risks the trend in so-called smart toys might be introducing into children鈥檚 lives.

An invasion of play

But Hello Barbie doesn鈥檛 just reveal a child鈥檚 private conversations to large corporations, and potentially law enforcement agencies. She also tells tales much closer to home: to parents.

A smartphone app enables parents to listen to the conversations between their child and their Hello Barbie. They can also receive alerts when new recordings become available, and can access and review the audio files.

Anyone with access to the parent account can also choose to share recordings and other content via Facebook, Twitter or YouTube. While some may see this as a novel feature, it is important to consider the potential loss of privacy to the child.

Play is an important part of the way children learn about the world. A key part of this is the opportunity for private spaces to engage in creative play without concerns about adults intruding.

It looks like Hello Barbie鈥檚 dream to be a fashion-setter might just come true as she pioneers a new trend for smart and connected toys. In turn, the child loses out on both a trusted toy and on the spaces where they can lose themselves in other worlds without worrying about who鈥檚 listening in.

The Conversation

By , Senior Lecturer in Criminology, and , Associate Professor, School of Information Systems and Technology,

This article was originally published on . Read the .

UOW academics exercise academic freedom by providing expert commentary, opinion and analysis on a range of ongoing social issues and current affairs. This expert commentary reflects the views of those individual academics and does not necessarily reflect the views or policy positions of the 精东传媒 of 精东传媒.