Hacking the System
I have always believed that all of the gaming networks, and other kidsโ sites that have an e-commerce component, are the most vulnerable repositories of any large caches of PII, for a few very simple reasons. It is undeniable that although the universe of avid gamers and the galaxy of talented hackers arenโt congruent, there is a rather substantial overlap. Many of our children are light years beyond our technological prowess. Smart kids have been responsible for some of the most famous hacks of history, involving compromises of both government and industry computer networks, many of which were โinnocentโ pranksโdone for thrills rather than financial gain or more nefarious purposes. Remember when, a decade ago, the recording industry announced the development of the โcopy-proofโ music CD? The idea was to prevent the uploading of music on a physical disk to one of the file-sharing sites like Napster or Kazaa where the music could be freely traded (and traded for free). A good friend of mine who had a large company that distributed physical CDs informed me that within a few days the elaborate and very expensive protection system was defeated by kids around the country using only a felt tip pen!
More importantly, youthful online gamers often exist in a culture that seems to make hacking more socially acceptable, perhaps even socially esteemed. There is a โcheat siteโ for virtually every popular gameโjust Google the name of the game followed by the word โcheatโ and youโll see what I mean. Sure, this kind of cheating is victimless and really doesnโt constitute any type of crime, but itโs worth considering why little Johnny, who gets straight Aโs in school and would never cheat on his math test, probably has no problem using the cheat sites or even contributing to them.
The worst unintended consequence of this culture seems to be the false sense of anonymity and invincibility kids tend to feel when theyโre online. They donโt cheat in school because thereโd be consequences if they got caught. But I sense that many kids feel that cyber-hacks, regardless of their severity, occur in an online vacuum and are free of real-world consequences. To take it one step furtherโbecause of this assumption, young people tend to be more cavalier about the sensitive information they share publicly.
If you think about it, the Sony breach merely underscores something obvious. The gaming networks and similar sites are delicious targets for the โbecause I canโ crowd. Although the hackers themselves may not be trying to open a phony bank account with your childโs newly acquired PII, there are others, most likely older and much more venal, who would love to get their paws on that data for just such a purpose. Beyond this, there is another type of currency available uniquely on the gaming networksโaccess to the accounts and special permissions related to a gamerโs skill, highest play level and acquired โspoils of warโโall of which have value on the Internet black market. Thatโs right, the youngest hackers are probably stealing identities because they are looking to make General in Halo Reach without having to do all the work themselves to rise through the ranks. (For those of you who are older than 15, Halo Reach is a video game in which players earn military-style ranks for successfully completing missions and shooting stuff.)
Regardless of the motivation, it is harmful on several levels that this information is now airborne. And as all readers of this column must know by now, once the data is airborneโitโs out there!
Sad reality checkโwe need to be as careful with our kidsโ PII as we are with our own. Limit the amount of data your child makes available to anyone online. In fact, an effective countermeasure may be to fudge the data a bit. Does the gaming network really need to know any childโs street address (frankly, do they really need to know yours)? From the moment your child is born and assigned a Social Security number, youโd best monitor it, perhaps not every minute but certainly at least once or twice a year. And you should be sure to instruct them to pass it along to no one (employers aside). Bottom lineโdonโt allow your childโs zeal for vanquishing extra-terrestrial invaders, terrorists or street thugs alienate them from the benefits of a sound financial beginning as they come of age.
You Might Also Like
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams