Playstation Invasion: Child Identity Theft is No Game

Hacking the System

I have always believed that all of the gaming networks, and other kidsโ€™ sites that have an e-commerce component, are the most vulnerable repositories of any large caches of PII, for a few very simple reasons. It is undeniable that although the universe of avid gamers and the galaxy of talented hackers arenโ€™t congruent, there is a rather substantial overlap. Many of our children are light years beyond our technological prowess. Smart kids have been responsible for some of the most famous hacks of history, involving compromises of both government and industry computer networks, many of which were โ€œinnocentโ€ pranksโ€”done for thrills rather than financial gain or more nefarious purposes. Remember when, a decade ago, the recording industry announced the development of the โ€œcopy-proofโ€ music CD? The idea was to prevent the uploading of music on a physical disk to one of the file-sharing sites like Napster or Kazaa where the music could be freely traded (and traded for free). A good friend of mine who had a large company that distributed physical CDs informed me that within a few days the elaborate and very expensive protection system was defeated by kids around the country using only a felt tip pen!

More importantly, youthful online gamers often exist in a culture that seems to make hacking more socially acceptable, perhaps even socially esteemed. There is a โ€œcheat siteโ€ for virtually every popular gameโ€”just Google the name of the game followed by the word โ€œcheatโ€ and youโ€™ll see what I mean. Sure, this kind of cheating is victimless and really doesnโ€™t constitute any type of crime, but itโ€™s worth considering why little Johnny, who gets straight Aโ€™s in school and would never cheat on his math test, probably has no problem using the cheat sites or even contributing to them.

The worst unintended consequence of this culture seems to be the false sense of anonymity and invincibility kids tend to feel when theyโ€™re online. They donโ€™t cheat in school because thereโ€™d be consequences if they got caught. But I sense that many kids feel that cyber-hacks, regardless of their severity, occur in an online vacuum and are free of real-world consequences. To take it one step furtherโ€”because of this assumption, young people tend to be more cavalier about the sensitive information they share publicly.

If you think about it, the Sony breach merely underscores something obvious. The gaming networks and similar sites are delicious targets for the โ€œbecause I canโ€ crowd. Although the hackers themselves may not be trying to open a phony bank account with your childโ€™s newly acquired PII, there are others, most likely older and much more venal, who would love to get their paws on that data for just such a purpose. Beyond this, there is another type of currency available uniquely on the gaming networksโ€”access to the accounts and special permissions related to a gamerโ€™s skill, highest play level and acquired โ€œspoils of warโ€โ€”all of which have value on the Internet black market. Thatโ€™s right, the youngest hackers are probably stealing identities because they are looking to make General in Halo Reach without having to do all the work themselves to rise through the ranks. (For those of you who are older than 15, Halo Reach is a video game in which players earn military-style ranks for successfully completing missions and shooting stuff.)

Regardless of the motivation, it is harmful on several levels that this information is now airborne. And as all readers of this column must know by now, once the data is airborneโ€”itโ€™s out there!

Sad reality checkโ€”we need to be as careful with our kidsโ€™ PII as we are with our own. Limit the amount of data your child makes available to anyone online. In fact, an effective countermeasure may be to fudge the data a bit. Does the gaming network really need to know any childโ€™s street address (frankly, do they really need to know yours)? From the moment your child is born and assigned a Social Security number, youโ€™d best monitor it, perhaps not every minute but certainly at least once or twice a year. And you should be sure to instruct them to pass it along to no one (employers aside). Bottom lineโ€”donโ€™t allow your childโ€™s zeal for vanquishing extra-terrestrial invaders, terrorists or street thugs alienate them from the benefits of a sound financial beginning as they come of age.

You Might Also Like

Find out what someone can do with your stolen Social Security num... Read More

October 19, 2023

Identity Theft and Scams

how to prevent identity theft
The Federal Trade Commissionโ€™s Consumer Sentinel Network re... Read More

May 17, 2022

Identity Theft and Scams

A man and woman chat in an office
COVID-19 vaccines are being rolled out across the country, and th... Read More

May 20, 2021

Identity Theft and Scams