Not Getting Enough Facebook and Twitter In a Day? How About An Ultimate Social Car? Ford & Facebook Are Getting It Done

February 29, 2012 at 7:44 pm

(Source: Ford via Autoblog)

[yframe url=’http://www.youtube.com/watch?v=AeUF5-PiRQY’]

Though I’m a bit alarmed by the cognitive distraction (for drivers) potential associated with this technology, it is awesome to see the collaboration between the vehicle manufacturers and the app developers to put together an “intelligent” vehicle.   For sure, Secretary LaHood and his staff at USDOT will be spending a lot of time thinking about how to accommodate these tech advancements in the vehicle environment while prioritizing the safety of drivers on the road. If you have not already seen this, the USDOT has recently proposed the first-ever federal guidelines to encourage automobile manufacturers to limit the distraction risk for these in-vehicle electronic devices.  The proposed guidelines are voluntary and would apply to communications, entertainment, information gathering, and navigation devices or functions that are built into the vehicle and are not required to safely operate the vehicles.  In any case, it is safe to say that the vehicles of today will look a LOT dumber compared to these SMART cars that will roll out of the assembly lines in Detroit a few years from now.

A Nightmare For #IntelliDrive ? Hackers Wirelessly Crash Car’s Computer At Highway Speeds

August 11, 2010 at 3:31 pm

This is inevitable in the world of electronic data and what bothers me is the fact that it can be done with relatively cheap labor (total cost of $1500) and some good amount of graduate engineering research work. If such a thing were to happen in the world of talking cars (IntelliDrive), would it open up the possibility of creating “zombie” cars whose networks can be manipulated and controlled externally to create horrific crashes? Not sure but that is terrible to even think about. Whatever be the case, the designers of the modern cars (especially the ones designed for the IntelliDrive era) should take this possibility into account and come up with fool proof data security.

Amplify’d from jalopnik.com
Hackers Wirelessly Crash Car's Computer At Highway Speeds

We’ve told you before about experiments to hack into the increasingly complicated programming in modern vehicles. How complicated? A typical luxury sedan will carry three miles of wiring, scores of processors and close to 100 million lines of software code, or roughly 20 times more than used in a F-35 Joint Strike Fighter.

Those previous experiments showed what could be done with a physical connection to a vehicle’s computer. The new work by teams from the University of South Carolina and Rutgers tried a different tack: spoofing the wireless sensors in wheels used by tire pressure monitoring systems, required in all new U.S. vehicles since 2008.

The researchers didn’t find a wide-open door so much as the security employed by a 1920s speakeasy: once they learned the secret knock, the unidentified test car’s controls let them in no questions asked. The team sent fake warning messages from 40 meters away, and in another experiment, got the test car to flash a warning that a tire had lost all pressure while beaming the signal from another car as both drove 68 mph.

Because each sensor uses a unique ID tag, it was also possible to track specific vehicles, in a way that would be far less noticeable than roadside cameras.

Read more at jalopnik.com

 

USDOT Inspector General’s audit finds nation’s air traffic systems vulnerable to cyber attack

May 6, 2009 at 4:48 pm

(Source: Associated Press

WASHINGTON — The nation’s air traffic control systems are vulnerable to cyber attacks, and support systems have been breached in recent months allowing hackers access to personnel records and network servers, according to a new report.

The audit done by the Department of Transportation’s inspector general concluded that although most of the attacks disrupted only support systems, they could spread to the operational systems that control communications, surveillance and flight information used to separate aircraft.

 The report noted several recent cyber attacks, including a February incident when hackers gained access to personal information on about 48,000 current and former FAA employees, and an attack in 2008 when hackers took control of some FAA network servers.

Auditors said the Federal Aviation Administration is not able to adequately detect potential cyber security attacks, and it must better secure its systems against hackers and other intruders.

“In our opinion, unless effective action is taken quickly, it is likely to be a matter of when, not if, ATC (air traffic control) systems encounter attacks that do serious harm to ATC operations,” the auditors said.

In response to the findings, FAA officials stressed that the support systems and traffic control networks are separated. But they agreed that more aggressive action should be taken to secure the networks and fix high-risk vulnerabilities.

According to the report, the FAA received 800 cyber incident alerts during the fiscal year that ended Sept. 30, 2008, and more than 150 were not resolved before the year finished. Fifty of those, the auditors said, had been open for more than three months, “including critical incidents in which hackers may have taken over control” of some computers.

Officials tested Internet-based systems that are used to provide information to the public such as communications frequencies for pilots, as well as internal FAA computer systems. The tests found nearly 4,000 “vulnerabilities,” including 763 viewed as “high risk.” The vulnerabilities including weak passwords, unprotected file folders, and other software problems.

The weaknesses could allow hackers or internal FAA workers to gain access to air traffic systems, and possibly compromise computers there or infect them with malicious codes or viruses, the audit warned.

Click here to read the entire article.  For those interested in downloading the report click here. Shown below is a read-only version of the audit report (in PDF).