Translate

Tuesday, October 2, 2012

Don't Become a Car Hacking Victim


From one futuristic scam threat in last week's issue (having your mobile device hacked at a charging station) to another -- car hacking. Like juice jacking, as the mobile device threat is called, car hacking -- in effect taking control of the computer circuitry in your automobile -- is a very real threat. Just because hacking car computers hasn't happened "in the wild" yet, doesn't mean some crook hasn't got a plan to do so in the works. Experts warned about it as long ago as 2008 after researchers in California and Washington disabled the brakes, changed the speed readings, switched off the engine and locked the doors of several cars. They even demonstrated how an infected CD could be inserted into a car's player to take control of its safety systems. And while we could only imagine most of those actions being done for serious criminal purposes that don't touch most of us, the ability to steal or lock us in our cars (or out of them) and alter the speedometer has disturbing implications. 

One of the California researchers even said recently that hacking a car could enable crooks and snoops to listen in to conversations. The threat is only going to increase as computer chips are built into more car components, along with entertainment devices that automatically connect to the Internet via wi-fi and on-board communication systems like the hands-free technology called Bluetooth. We are all in what the auto industry apparently calls the age of the connected car. All cars built after 1996 must have a built-in diagnostic system that checks emissions and engine performance. And those built from 2008 on must have a communications network that keeps tabs on things like cruise control, antilock brakes and power steering. 

That, however, is not the problem. It's the introduction of other systems, ranging from video players capable of streaming movies from the Internet to vehicle tracking devices, that carries the threat by potentially allowing hackers who can get into these systems to "cross the bridge" into the car control systems. At a security conference in Las Vegas last summer [1011], two researchers demonstrated how they could tap into the network-based security system of a modern sedan, unlock it and start it -- from some distance away. This sort of activity has car manufacturers scrambling to improve security access on their vehicles, while the US Department of Transportation is planning to test new models to check if their computers can be hacked. Most recently, the National Academy of Sciences entered the fray after reviewing investigations on unintended acceleration of some cars. 

Although there's no suggestion this was caused by car hacking, an Academy panel said in January that while safety and entertainment systems in vehicles are supposed to be separate, "it is not evident that this separation has been adequately designed for cybersecurity concerns." And a recent report by the Bloomberg business news agency quoted the National Highway Traffic Safety Administration as saying: "The agency recognizes there are potential vulnerabilities, especially those related to future connected vehicles, that need to be fully understood and addressed." In the meantime, what can you do?
Well, at least one auto with this advanced connectivity is already on the market and Paul Lubic, a security blogger in this field, suggests that if you're buying a new car, you should ask if its systems can be accessed remotely and, if so, what security features have been built in. In particular, you will want to know if on-board devices use the security feature known as encryption, which basically masks it so hackers can't break into it. Don't expect the showroom sales person to necessarily know the answers right now (although they certainly will have to in the future). Do the homework yourself. A study by well-known consumer security outfit McAfee suggests the sort of things you want to know include:
  1. Whether any board systems connect to the Internet and/or cellular networks. 

  2. Whether there's a link between the GPS (if it has one) and the safety monitoring systems and where your personal GPS data is stored. 

  3. Is there any on-board device that collects and stores information from your cell phone or other "smart" device? 

  4. Can the car's security system detect an intrusion? 

  5. Can personal data on any on-board system be cleared before you sell the vehicle?
You can download the McAfee report, Caution: Malware Ahead, for full details. 

And if you want to know which car Lubic says has this advanced connectivity installed, check out his blog post: Upcoming Cyber Security Threats Part 5: Hackers Controlling Your Car

In the future, it's likely that auto manufacturers will strengthen this security element on their vehicles but, according to Bloomberg, current models could be particularly vulnerable. However, you can console yourself in the knowledge that you're statistically more likely to get your auto stolen by a regular car thief than through car hacking -- at least, for now.

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)