The Latest in IT Security

Senator Wants Cybersecurity Answers from Automakers


A U.S. senator has asked 20 automobile manufacturers how each plans to stave off wireless hacking attempts on vehicle computer systems, as well as prevent violations of driver privacy. I write to request information regarding your companys protections against the threat of cyberattacks or unwarranted invasions of privacy related to the integration of wireless, navigation and other technologies into and with automobiles, wrote Sen. Ed Markey, D-Mass, in a letter to Daniel Akerson, CEO of General Motors, on Monday (Dec. 2). Markeys questions imply that he wants carmakers to apply computer-industry security processes, including implementation of anti-virus software, incident logging, incident-response planning, software vulnerability patching and third-party penetration testing — the last of which would stage real hacker attacks on mass-production vehicles. MORE: Hacking the Internet of Things Todays cars and light trucks contain more than 50 separate electronic control units (ECUs), connected through a controller area network (CAN) or other network, Markey said. Vehicle functionality, safety and privacy all depend on the functions of these small computers, as well as their ability to communicate with one another. Identical letters were also sent to the heads of the North American divisions of Aston Martin, Audi, BMW, Chrysler, Ford, Honda, Hyundai, Jaguar Land Rover, Lamborghini, Mazda, Mercedes Benz, Mitsubishi, Nissan, Porsche, Subaru, Tesla, Toyota, Volkswagen and Volvo. (Audi, Lamborghini, Porsche and Volkswagen share ownership.) Car hacking isnt just in the movies Markey, one of the half-dozen lawmakers on Capitol Hill who has demonstrated a clear understanding of computer technology, cited research done earlier this year by two Pentagon-funded white hat hackers. In a recent study that was funded by the Defense Advanced Research Projects Agency (DARPA), Markey wrote, Charlie Miller and Chris Valasek demonstrated their ability to directly connect to a vehicles computer systems, send commands to different ECUs through the CAN and thereby control the engine, brakes, steering and other critical vehicle components. Miller, whose day job is at Twitter, and Valasek, who works for Seattle security firm IOActive, used the Pentagons grant money to open up the dashboards, and then take control, of a Toyota Prius and a Ford Escape. MORE: Hackers Hijack Prius with Mac Laptop Because the duo plugged laptops into the cars wiring, the vulnerabilities they found wouldnt be covered by Markeys requests for information, which concern wireless access to vehicle computer systems. However, because Ford and Toyota dismissed Miller and Valaseks research as unrealistic and unlikely to take place in the real world, it made the companies responses fair game for Markeys questions. Both companies reportedly noted that the researchers directly, rather than wirelessly, accessed the vehicles computer systems, Markey wrote, and referred to the need to prevent remote hacking from a wireless device. As Markey then noted, vehicle hacks have indeed accessed car systems wirelessly. Other hacks have used methods that didnt require digging into dashboards or getting under hoods. In the past few years, white-hat hackers have started cars using text messages, modified smartphone apps and specially crafted audio CDs. Real criminals have used mechanics diagnostic tools to steal luxury vehicles. Tough questions for car makers Markeys security-related questions ask each manufacturer: — How many vehicles in its 2013 and 2014 production fleets have wireless access. — What kind of consumer-accessible vehicle computer systems are present, including Wi-Fi, Bluetooth, smartphone integration, Web browsers, OnStar and similar cellular systems, as well as vehicle-to-vehicle communications. — Whether the vehicles have been subjected to third-party penetration tests. — Whether any kind of dedicated security technology is in place. — What kind of security breaches have already occurred. — Whether the company has procedures to mitigate incidents and push out software patches. The senator also asked several privacy-related questions, including how each company collects, stores and distributes information collected by in-car systems relating to driver behavior and history, navigation, location, speed and mileage. Markey wants to know whether such information is shared with law enforcement, debt-collection agencies or insurance providers, collected by auto dealers or auto-rental companies or sold to third parties. In a series of questions that affect both security and privacy, Markey asks how many vehicles contain technology, such as General Motors OnStar, which could remotely shut down a vehicle, and whether customers were made aware of such features. The senator asks that each company respond to his questions by Jan. 3. The Auto Alliance, an association of auto manufacturers whose 12 members were all sent Markey letters, issued a pre-emptive statement that cybersecurity is among the industrys top priorities and the auto industry is working continuously to enhance vehicle security features. The two-page statement cited the reliability and advantages of in-car computing, as well as cooperation in research and development with other transportation industries, but did not answer Markeys questions. Follow Paul Wagenseil at  @snd_wagenseil . Follow Toms Guide at @tomsguide, on Facebook and on Google+. Top Holiday Gift Ideas 2013 How to Hack Other Peoples Drones for Less Than $400 6 Best Car Alarm Systems Copyright 2013 Toms Guides , a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Comments are closed.



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments