![]() ![]() Yergin told KPRC’s Joel Eisenbaum that although manufacturers “are starting to get into cyber-security… it’s the Wild West out there.” Yergin also said when it comes to privacy, “anything on your phone transfers.” And once your phone sends data to your car, it's pretty much permanently on your infotainment system. The key to all of this: Project iVe simply reads information from the infotainment and telematics systems already installed by the manufacturers. Successfully hack one GM system (say Cadillac’s CUE) and you’re probably not far off from being able to do the same to IntelliLink (GMC and Buick) and MyLink (Chevrolet). Why such a significant jump? Consolidation. Today, Berla says they can crack the code on over 4,600 cars. When Berla started Project iVe in 2013, the company said they could access data on about 80 different car models. With that kind of popularity, you no longer need to be a federal agency like the FBI to get at information. ![]() Seventy-seven percent of America has at least one smartphone. But technology has shifted and so have expectations.īuilt-in systems are slowly being pushed out by BYOS- bringing your own smartphone. Fast-forward to today: Fox-Brewster says cars can still be tracked through OnStar as well as other systems from SiriusXM and ATX Technologies (provider to Mercedes of Tele-Aid services). More than a decade ago, the concern was over tracking vehicles or listening in through systems like GM’s OnStar. Brenner, who specializes in cybercrime and cyberconflict, points to an example of how in 2003, the FBI figured out they could get court orders to have companies discreetly use embedded technology to eavesdrop on drivers and passengers. Two years later, another group of took control of a brand new Jeep using the company’s UConnect system.Įarlier this year, Forbes writer Thomas Fox-Brewster penned an article called “Cartapping: How Feds Have Spied on Connected Cars for 15 Years.” The term “cartapping” is nothing new: it was first coined by University of Dayton law professor Susan Brenner who’s been blogging about the practice since 2006. In 2015, Wired reported that it took GM five years to close a security gap that could allow a hacker to remotely take control of a car using OnStar. ![]() How is that possible- if you know your way around the systems, it actually wasn’t that hard to do. Accessing a car’s data is unregulated with no standard from the manufacturers (as of yet) for any sort of “automotive cybersecurity.” In fact, various government agencies and researchers have been hacking car computer and communication systems for more than a decade. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |