Home Automation: Survivor Privacy Risks & Strategies

Similar documents
Technology Safety Quick Tips

Phones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING

Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice

TIMING-BASED ASSISTANT CONTROLS

The Internet of Things. Steven M. Bellovin November 24,

PRE-ARRIVAL DESTINATION PREPARATION

Malling U3A Computer Group. Xmas Tech gift ideas. Chris Daly 3rd December 2018

Use of Technology to Stalk

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Protecting the Home Front

THE CONNECTED HOME FRANK MAY 10/20/2016

& Online Evidence Collection

RA2 Select. Whole home lighting control made simple. Lutron.com/ra2select. Lutron Electronics Co., Inc Suter Road Coopersburg, PA

M2M Evolution Topic: Connected Home of the future IoT. Comcast. Adam Gladsden & Tariq Chowdhury

Insignia Voice Speaker with Google Assistant Built In NS-CSPGASP-B / NS-CSPGASP-BC / NS-CSPGASP-G / NS-CSPGASP2 / NS-CSPGASP2-C

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

WiFi Smart Converter User Manual WiFi Smart Plug SH330W

Emergency safety apps: which one is right for me?

Vivint Element Thermostat

Smart Life Solution Guide

How Safe Is Your Smart Home?

Introduction to Amazon Echo and Dot

Beam Quick Start Guide

+ Front Door Security + Smart Video Alarms + Indoor Cameras + Personal Trackers SOLUTIONS FOR SMART & SAFE HOMES

Getting Started. Activation Process. G450 Overview

Getting Started With HomeKit: A Beginner's Guide

Smart Door Security Control System Using Raspberry Pi

For a complete guide, visit our website at ConnectCTC.com/CTC_Support

Lechange. By Lechange Team

RMU-IT-SEC-01 Acceptable Use Policy

Avadesign Technology DP-104. IP Video Door Phone. and APP - 1 -

ncube Home - User Guide

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Getting Started. Gateway Activation Process. Gateway Descriptions

When Not in Use: Remove the batteries if this device is to be left unattended or unused for a long period of time.

Secure Your Way of Life. Now Compa ble With. HSVGW-G Series Home Security Voice Gateway Series. Take Smart Living Up a Notch

Internet of Things Toolkit for Small and Medium Businesses

St Edmund Arrowsmith Catholic Centre for Learning

Enhanced Night Vision & Integrated Spotlight

SMART WI-FI OUTDOOR PLUG START GUIDE

ICT Acceptable Use Policy for Students

Global Mobile Consumer Survey, US Edition Overview of results

2016 Samsung Refrigeration Update. Project: RF9500K Models: RF22K9581 RF28K9580

Z-Wave 4-in-1 Multi Sensor HZS-300E/HZS-300A

What is NPP, Osko and PayID?

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

Electronic Network Acceptable Use Policy

Demand management Policy

SAVANT PRO 8 APP AT A GLANCE

ACCEPTABLE USE POLICY

RESIDENTIAL ELECTRONIC LOCKS

.hafele.com.sg www 1

Embedded Linux With Raspberry Pi IOT

Rise of the Internet of Things

Installing and Setting Up Ring Video Doorbell Elite

Installing and Setting Up Ring Video Doorbell Elite

Ctdigi.com. Instruction manual. Production by S & W Technology Labs

CarLink Guide for Android Users

Fluid Metering, Inc. Privacy Policy

Privacy Statement for DROP Connect Products and Services

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

Healthfirst Website Privacy Policy

Voice Operated Assistants. APCUG VTC - 11/4/17 Greg Skalka

HIPAA FOR BROKERS. revised 10/17

When you provide personal information to us it will only be used in the ways described in this privacy policy.

Data Privacy Breach Policy and Procedure

Smart-Voice Invocation of Scenes in Home- Automation Systems

Mobile Application Privacy Policy

PRIVACY POLICY Let us summarize this for you...

ONLINE SAFETY. Messaging, , Vlogging and Sexting

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

SECURITY PLUS. Core Security System + Real Time + Intelligence + Integration + Reliability

Camera TEIA USER GUIDE

Acceptable Use Policy (AUP)

Introduction. See page #6 for device requirements.

7 Eye-catching Smart Door Locks of 2015 / 2016 By Cindy Lin / REVIEWS COMPANY NEWS FEATURE VID

App Instructions. Quick Start Guide. works with the Google Assistant

SMART VIDEO DOORBELL CAMERA User Manual

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form

HOME SECURITY KIT. USER MANUAL SMART PROTECTION WITH THE ALL-IN-ONE SOLUTION. SMART WINDOW SENSOR SMART POWER SOCKET SMART MOTION SENSOR SMART IP CAM

Anti-Cyber Bullying Policy.

FREUND R29S Door Phone User Manual. FREUND ELEKTRONIK A/S Fuglebakken Odense NV Denmark Tlf.

65% say that they wouldn t want to go back to life without their Smart Speaker

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience

QUICK GUIDE. Camera Installation for iphone, ipad, Android smart phone and tablet

Thanks for shopping with Improvements! Orbit Bluetooth Tracker Card Item #569169

GV-Access for ios and Android Mobile Devices


DCSZ Student AUP Policy

Your Right to Privacy. It s abouthope

Autorama, Connecting Your Car to

SMARTPLUG. Quick Start Guide. Model: isp6x. Intelligent Home Solutions. Control your SmartPlug from anywhere with your smartphone WHAT YOU LL NEED

Secure Your Way of Life. Now Compable With. Home Security Gateway Series. Transforming Your Life

Examples of Internet of Things Technology in Use Today

WI-FI GARAGE DOOR CONTROLLER WITH CAMERA USER MANUAL

IPv6, PLC and Wifi: The Next Generation cocktail for home appliances

Amcrest AM-GL300 GPS Tracker User Manual Version Revised December 11th, 2015

EXCEPTIONAL ENTERTAINMENT HIGH-PERFORMANCE AUTOMATION

Smart Homes and Cities

Transcription:

Home Automation: Survivor Privacy Risks & Strategies Our homes, workplaces, and vehicles are rapidly being filled with smart and connected devices that promise to increase convenience, improve energy savings and strengthen personal security. These devices and systems offer potential tools survivors can use to strategically increase their safety. Unfortunately, these devices and the systems that control them also provide yet another, highly invasive way that technology can be misused to monitor, harass, threaten, or harm a survivor. What is IoT? The Internet of Things refers to devices connected to each other and to a device or app that can control them. These devices may be connected through a home network, the Internet and WiFi, Bluetooth, or other means. These devices, systems, or apps allow remote control of Internet-connected devices in the home: Personal Assistants (Google Home, Amazon Echo/Alexa, etc.). These devices are voice-activated, and often include features that adjust lights, play music, place phone calls, read text messages, search for information, and other functions. Home Automation Systems (Nest, Arduino, etc.). These systems often begin with a thermostat or lights, and can be expanded to include additional connected devices. Some brands will only allow for connection with devices of the same brand, and others may allow for more universal control across brands. Apps pair with IoT devices to allow web-based control through mobile devices. Many of these apps come with the IoT devices, and some work across brands. The apps might notify a user of a smoke alarm, a person at the door, or if an appliance was left on. Settings or pre-programmed routines may be built into a device or service and left to run, with or without current remote access. For example, when a user s phone nears the house, the front door might unlock, the lights Page 1 of 5

might go on, music may begin, and the thermostat may adjust to preferred settings. Connected Devices These common devices might also be part of the network: Thermostat Smart lightbulbs Smart electrical outlets (with lights or other devices plugged into them) Entertainment systems (stereo, TV, etc.) Hubs that are located on a bedside table, in a closet or other locations throughout the house that connect to the home personal assistant Security cameras and motion detectors Smoke detectors Video doorbells Smart locks Appliances (refrigerator, vacuum, etc.) Pet feeders, nanny or pet cams, toys and trackers Children s toys and trackers IoT Misuse as a Tactic of Abuse Home automation devices and systems can be misused to monitor, harass, isolate and otherwise harm survivors. The technology can track who is in the home and what they are doing. Such surveillance might be done secretly, or overtly as a way to control behavior - by capturing images, keeping activity logs, eavesdropping, and gaining access to email or other accounts linked to the connected devices. Home automation technology can also be misused to cause distress and harm by turning lights and appliances on or off, adjusting the temperature to uncomfortable levels, playing unwanted music or adjusting the volume, triggering home invasion and smoke alarms, and locking or unlocking doors. This kind of harassment can cause significant sleep disruption and trigger traumatic reactions. Page 2 of 5

Home automation may also be misused to isolate a survivor by threatening visitors, posting private video or images without consent, and blocking physical access. For example, smart locks could be remotely controlled, limiting a survivor s ability to leave the house or to return to it. A video doorbell could be used not only to monitor who comes to the door, but to harass them remotely or, in combination with a smart lock, prevent them from entering the house. People with disabilities might experience additional harm when a caregiver, family member or roommate takes control, limits access, or damages the system or devices, as might happen with other assistive technology. Safety Planning & Home Automation Misuse As with all safety planning, each survivor s experience and priorities should determine the course of action. Identifying the technology being misused and taking steps to decrease related risks will take time, energy, and access to information. If a survivor suspects that a device is being misused, they can begin to document the incidents. Our technology abuse log is one way to document each occurrence. These logs can be helpful in revealing patterns, determining next steps, and may potentially be useful in building a case if the survivor chooses to involve the legal system. Ask questions that can help identify what the person could be doing, such as: Are there any patterns in terms of when devices are misused, the time of day, related events like contact, visitation, or court proceedings? Does the person misusing the technology have access to the home or to accounts for utilities, security services, or devices? Did they in the past? What devices do you know are in the home? What else might be hidden? Page 3 of 5

Once the devices and services that might be involved have been identified, particularly what sort of system could be controlling the devices, a next step would be to identify options for regaining control of the system. For instance, if a personal assistant device is being misused, can the account be accessed by the victim and the password changed to lock out unauthorized access? If it is an app, can the system, network, or devices be reconfigured to block access? Potential approaches include: Contacting the company that made the device or maintains the software in order to change account ownership and access. Changing router or network settings. For more information, see our handout on WiFi security. Replacing the devices (lightbulbs, the thermostat, electrical outlets or other connected devices) to either remove those devices from the system, or to regain control over the system. NOTE: It is important to safety plan around the possibility that cutting off remote control may escalate harmful behavior. The Digital Divide & Home Automation As is the case with many kinds of emerging technology, high costs currently make some of these devices more prevalent in wealthier homes and businesses. That said, when working with survivors, we shouldn t make assumptions about the use of IoT devices based on economic status. And as costs come down, the devices will also become more widespread. Bear in mind that these devices may also be used by other parties in ways that can compound trauma. For example, a survivor in low-income housing might find that a landlord is misusing a video doorbell to restrict access or inappropriately monitor activity. Using Home Automation to Increase Safety These same systems and devices that may be misused to harm survivors can also be used to protect privacy and enhance safety. Here are some examples: Page 4 of 5

Security cameras, video doorbells, and other security devices could be used to notify a survivor when someone approaches or enters the house. These devices might also gather evidence to document violations of a protection order or other criminal behavior. Smart lightbulbs might provide peace of mind to a survivor by illuminating the house or a room before a survivor enters it. Pet cams and feeders might provide needed support or comfort to a survivor when they are away from home, or help reassure the survivor of a pet s health or safety. Energy saving devices might help to reduce the financial burden of living independently from an abuser. Home automation can provide assistance to survivors with disabilities, potentially decreasing the level of support needed from caregivers and increasing independence. Considerations with New Devices When considering buying new home automation devices, there are a few questions to consider. Does that particular device need to be smart or connected? Do the benefits outweigh the risks? How secure is the device and the app that runs it? Can that security be strengthened? 2018 National Network to End Domestic Violence, Safety Net Project. Supported by US DOJ-OVC Grant # 2016-TA-AX-K069. Opinions, findings, and conclusions or recommendations expressed are the authors and do not necessarily represent the views of DOJ. This is one in a series of handouts describing the risks and potential benefits of IoT devices. We update our materials frequently. Please visit TechSafety.org for the latest version of this and other materials. Page 5 of 5