Tucked into WikiLeaks about car hacking’ analysis of a trove of books by the Central Intelligence Agency is a meaning: It is the agency looks car hacking, WikiLeaks may be of use to carry “an almost undetectable assassinations . “
That makes it says WikiLeaks link meeting notes from the 2014 list of “place” for the CIA’s embedded Devices Branch, which includes the “Vehicle Systems” and “QNX.” The leaked documents, which The Washington Post can not verify that the CIA has declined to confirm, and it seems to suggest that the vehicles will be used assassinations, and even WikiLeaks admits “the purpose of such a not specified. “
The fear that your car can be hacked and made a crash is not new, but it is not entirely unfounded. Concern about the automotive cyber security have been raised since the automakers began outfitting cars and trucks in the computer control system.
The concerns that have been linked in recent years as the number of cars that come equipped with the link, including satellite, Bluetooth and Internet, and experts say their cause against hackers who can then gain access to the computer systems without ever stepping foot near the vehicle.
Here is what we know about the hacking and remotely control the vehicle:
Vehicles have been hacked before
In 2015, security researchers Charlie Miller and Chris Valasek hacked into a 2014 Jeep Cherokee and managed to “turn steering wheel, and simply disable the brakes and shut the engine,” the Post’s Craig Timberg reports. The way they can also access thousands of other vehicles using a wireless entertainment and navigation system called Uconnect, which is common to Dodge, Jeep and Chrysler vehicles. The hack prompted Fiat Chrysler to recall 1.4 million vehicles.
“It seems that anything that creates their detection / prevention methods for such attacks,” Valasek said via email Tuesday. “Remember, Charlie and I have done all of this research in our spare time and with limited resources.”
Miller and Valasek hack has been widely reported, but it was not the first or even the latest security breach successful. Researchers from the University of Washington and the University of California at San Diego published works in 2010 and 2011 shows that the vehicles could be compromised when hackers to gain access, either in person or remotely.
Last year, researchers in Germany released a study showing that could unlock and start 24 different vehicles with wireless remotes taking control of the remote device and the enhancement of the signal, the Wired magazine reported. While the wireless key chain was still on the kitchen counter, hackers could be driving away with the car, the researchers argued.
Yoni Heilbronn, the vice president of marketing at Argus cybersecurity, an automotive security company, said: “The equation is very simple. If a computer and connects to the outside world, it is hackable. “
Hackers might crash your car, but it is unlikely
Perhaps the biggest car-hacking fear is the idea that someone could take control of your vehicle and drive over a bridge or in a brick wall.
The release of WikiLeaks even renewed suspicions about the death of journalist Michael Hastings, who was killed in a car and just drive to Los Angeles in 2013.
“You could envision doing all sorts of things, such as to wait until the car goes over a certain speed limit and then apply one of the brakes or steer [the wheel] in automobiles, for which you to control the steering, “said Stephen Checkoway, assistant professor of computer science at the University of Illinois at Chicago.
This fear is not without value. As evidenced Miller and Valasek, hackers have compromised some of the most critical functions of the vehicle and the safety features before.
But these hacks require time and expertise to carry out, making an attack something run-of-the-mill criminal is unlikely to hold said Sam Lauzon, researcher and developer at the University of Michigan Transportation Research Institute. What’s more, automakers are increasingly isolating the computers which control most sensitive systems of the car, which means it can not be compromised, even if hackers exploit other technologies, such as entertainment, he said.
“If you’re driving down the freeway at the time there was a very slim probability of someone driving off the road,” Lauzon said. “Very slim.”
WikiLeaks CIA documents detailing how the agency did not appear to hack vehicles.
Your entertainment system is the most vulnerable
As well as the opportunity to “mission” of the WikiLeaks document list QNX, in-car entertainment and navigation technologies, the most popular operating system. Since 2010, QNX owned by Research In Motion, the company behind the BlackBerry. The system according to the company, Ford, Audi Maserati from the world-class level, has been used for more than 50 million vehicles.
Lauzon hacking the operating system, the movements of a vehicle to listen to conversations with the CIA, or other data that passes through the system allow you to monitor speculation.
Connected to the outside world is so distinct entertainment system is one of the most vulnerable to attack, said two Lauzon and Heilbronn. Cellular networks, Bluetooth, WiFi, etc. connections often, allowing you to play music, take phone calls that come through the system, look up directions, or to connect other applications.
It is hard to tell when a vehicle has been hacked
WikiLeaks claim that “almost unrecognizable” advertising opportunity is difficult to determine when it has been hacked by a car comes from the fact that, experts say.
“Today, manufacturers have no idea what’s really going on,” Heilbronn said. “It’s been hacked, or if they have no idea.”
Currently the car is behaving erratically or appears to be compromised if there is no mechanism to alert manufacturers, Lauzon said. But such technologies are under development of technology companies and automakers alike.
“I have not seen the one fitted to the vehicle at the time of the assembly, but it is something they are looking for the possibility,” Lauzon said.
Are aware of the problem of vehicle
Today, Miller and Valasek Uber ride provided by the company to work at. Auto manufacturers and transportation companies in recent years, a number of cyber experts in the industry to make products with strong security features have been scooped up as part of a joint effort.
Carlos Ghosn, Nissan has, Mitsubishi, Renault head of an alliance, the alliance said last week in Washington aimed at building self-driving and the connected car technologies and employees “who spend their time analyzing cyber experts have been around for what could go wrong with that.”
“We have the technology, the end of the ticket, not the regulator, ensuring that the appropriate level of cyber making sure you know what you’re going to take it very seriously, because we are,” he said.
It is installed in the vehicle after the vehicle is one of the global challenges to security software update. Cyber threats are always changing and software downloads to upgrade the security of the car hacking – the more you update the software on a smartphone – only recently become feasible.
In 2015, the auto industry players in the cyber security threats and how to combat them and swap information about the Automotive, Information Sharing and Analysis Center. Then last month, the National Highway Traffic Safety Administration, more secure vehicles for the construction of a cyber security “best practices” guide published instructions for the vehicle.
Computers in car hacking is actually a really good thing
You rush out to buy the latest technology to avoid a vehicle in front, it’s worth noting that the benefits of driving computers on wheels.
Anti-lock brakes with many advanced security features, including lane-assist technology and automatic crash notification, depending on the function of computers and software. They also make the engine more energy efficient, such as the ability to make phone calls with both hands on the wheel and offer conveniences, assistance under the hood, Checkoway said.
“They have enabled new attacks is worrying, but on the amount of computers, better security,” he said.
What you can do about cyber threats
The short answer is not much.
Heilbronn points out, car security, Norton or McAfee anti-virus software for your laptop is not like picking out. It is the vehicle for cyber security and software to build the vehicle before hitting the road, and the programs will continue to update with new threats emerge, he said.
“Today, the average customer has no knowledge of what should be installed,” said Heilbronn.
Lauzon has a little advice: do not install their own on-board diagnostics, or OBDII, devices that can monitor the performance of a machine, to provide Internet connections and other functions. These devices can communicate with the internal systems of the vehicle, but can rely on unsafe wireless connections, he said.