Privacy Ref Blog

Quick Thoughts on IoT

Recently I saw an interesting image on twitter from @darrencauthon.  The image was a television with an alleged FBI notice notifying the individual that their new smart TV had “suspicious files” and that they were being penalized $500 before they could use their TV again.  All of this is accompanied by legal jargon meant to frighten the user into believing the hoax.  The bottom of the note is even signed by FBI Director James Comey himself apparently.  This is your classic example of ransomware and I immediately had a thought on what may cause this issue.

Your TV on ransomware

Your TV on ransomware

The text reads as follows:

As a result of full scanning of your device, some suspicious files have been found and your attendance of the forbidden pornographic sites has been fixed.  For this reason your device has been locked.

Information on your location and snapshots containing your face have been uploaded on the FBI cyber crime departments datacenter.

First of all, familiarize with the positions stated in section <<The legal basis of violations>>. According to these positions our actions bear criminal character, and you are a criminal subject.  The penalty as a base measure of punishment on you which you are obliged to pay in a current of three calendar days is imposed.

The size of the payment is $500.00


Disconnection or disposal of the device or your attempts to unlock the device independently will be apprehended as unapproved actions interfering the execution of the law of the united states of America (Read as section 1509 – investigations).  In this case and in case of penalty non-payment in a current of three calendar days from the date of this notification, the total amount of penalty will be tripled and the respective fines will be charged to the outstanding penalty. In case of dissent with the indicted prosecution, you have the right to challenge it in court.

To make a penalty payment, go to section <<Payment penalties>>

With the era of smart and connected devices it is more important than ever to make sure the devices are protected from external tampering by hackers.  The above example shows that the television was probably an easy target for the ransomware because, when it was manufactured and its operating system installed, there probably were minimal protections established.  This most likely stems from the issue that it is a “smart TV” but in reality, it is computer specialized to perform as a television.

All IoT devices are small, specialized computers and should have malware and other security protections installed just like a standard desktop computer would.  This requires a shift in perspective on the parts of all of us.  When your business gets involved with IoT devices, either selling or using them in your office, be sure to check how it is protected from outside threats and act accordingly.

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at

Posted on January 4, 2017 by Ben Siegel

« »

No Responses

Comments are closed.

« »

Subscribe to our mailing list

Please fill out the form below.


Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to or call (888) 470-1528.


February 8, 2017

New On-Line Class Offering
Learn more about privacy program fundamentals with Bob Siegel and Privacy Ref. Find out more about this offering on our On-Line Classes Page.

Latest Blog Posts

April 12, 2017

Planning for Summit 2017
With the IAPP Privacy Summit less than a month away, it is time to start planning what you will be doing there.  If you are going to the Summit this year, there are a large number of sessions, speakers, and exhibitors for you to check out and learn from.  This stands alone from the thousands of attendees, all of whom have some level of privacy expertise and experience that you can learn from. Continue reading this post...

March 23, 2017

It’s just a leak
In recent weeks, leaks have been at the forefront of news.  This is mostly in a political spectrum, but it illustrates the importance of managing how information flows through an organization.  There have been examples other than those coming from the White House though. Being non-political in nature, they have different consequences and lessons to be learned. Continue reading this post...

Other Recent Posts