U.S. Army Criminal Investigation Command news release
There is nothing quite like the feeling of wheeling down the open road, blazing a path to your destination, streaming tunes on your interconnected entertainment system. You’re in control. But how much control do you really have?
Auto manufacturers use microprocessors, small computers, to control and integrate your vehicle’s functions. Windshield wipers, cornering stabilizers, automatic emergency breaking, engine management, tire pressure monitors and many other functions are interconnected.
Your entertainment system that connects with your mobile phone, which connects to your GPS, which connects to the Internet, which becomes a mobile hot-spot is also controlled by the same microprocessors that control your car’s functions.
Your car is a rolling computer with its own operating system that connects to the Internet.
It’s no secret that computers can be hacked. And your computer operated, fully connected, Internetworked car is not immune.
While the financial incentive for auto hacking is unclear, vehicle hacking is real. According to a recent Internet Crime Complaint Center (IC3) public service announcement, motor vehicles are increasingly vulnerable to remote exploits.
Vulnerabilities in your vehicle’s wireless communication equipment, your mobile phone and your vehicle’s operating system are potential points for compromise. Your vehicle’s diagnostic port, that connector the mechanic connects the “code reader” to, is a direct connection to your car’s internal control systems.
Examples
Mitigating the Vulnerabilities
When a vulnerability represents an unreasonable risk to safety, manufacturers sometimes issue recalls. However as vehicle owners, you can take the following steps to reduce your vehicle’s cybersecurity vulnerabilities:
Additional Information