{"id":6929,"date":"2017-03-10T04:30:03","date_gmt":"2017-03-10T12:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/10\/news-720\/"},"modified":"2017-03-10T04:30:03","modified_gmt":"2017-03-10T12:30:03","slug":"news-720","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/10\/news-720\/","title":{"rendered":"Newer car tech opens doors to CIA attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/10\/nissan_leaf_interior-100647154-orig_edit-100689252-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Fri, 10 Mar 2017 03:01:00 -0800<\/strong><\/p>\n<p>The revelation through Wikileaks that the CIA has <a href=\"http:\/\/www.computerworld.com\/article\/3177797\/security\/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html\">explored hacking<\/a> vehicle computer control systems should concern consumers, particularly as more and more cars and trucks roll off assembly lines with autonomous features.<\/p>\n<p>&#8220;I think it&#8217;s a legitimate concern considering all of the computers being added to cars,&#8221; said Kit Walsh, a staff attorney with the privacy group Electronic Frontier Foundation (EFF). &#8220;There&#8217;s no reason the CIA or other intelligence agencies or bad actors couldn&#8217;t use those vulnerabilities to hurt people.<\/p>\n<p>&#8220;The risk is greater is you&#8217;re trusting a self-driving vehicle,&#8221; Walsh said.<\/p>\n<p>WikiLeaks this week released <a href=\"http:\/\/www.computerworld.com\/article\/3177797\/security\/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html\" target=\"_blank\">more than 8,700 documents<\/a> it claimed came from the CIA&#8217;s Center for Cyber Intelligence; some of the leaks indicated the intelligence agency had looked at exploiting security vulnerabilities in smartphones, smart TVs and vehicle computer systems.<\/p>\n<p>&#8220;As of October 2014, the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,&#8221; the <a href=\"https:\/\/wikileaks.org\/ciav7p1\/\">Wikileaks post<\/a> stated. &#8220;The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.&#8221;<\/p>\n<p>WikiLeaks also linked to meeting notes from 2014 listing &#8220;potential mission areas&#8221; for the CIA&#8217;s Embedded Devices Branch. The notes included references to &#8220;Vehicle Systems&#8221; and &#8220;QNX,&#8221; which is <a href=\"http:\/\/www.computerworld.com\/article\/2859373\/ford-dumps-microsoft-for-qnx-unleashes-new-functions-in-sync-v3.html\" target=\"_blank\">Blackberry&#8217;s automotive software platform<\/a> for telematics and in-vehicle infotainment (IVI) systems.<\/p>\n<p>Increasingly, automakers have been adopting QNX. In 2016, for example, <a href=\"http:\/\/www.computerworld.com\/article\/3137991\/car-tech\/ford-to-use-blackberry-qnx-software-in-autonomous-cars.html\" target=\"_blank\">Ford announced<\/a> it was dropping Microsoft as the platform for its SYNC infotainment system and adopting QNX instead. Ford&#8217;s new SYNC 3, using QNX, was rolled out in new \u00a0vehicles last summer.<\/p>\n<p>Automakers have also been enabling over-the-air software updates for vehicles that could allow malicious code to be uploaded to on-board computer systems.<\/p>\n<p>The role of the U.S. government is to explore security vulnerabilities in order to make product manufacturers aware of potential hazards, not exploit them, Walsh said.<\/p>\n<p>In 2014, the Obama Administration assured Americans that a policy called the <a href=\"https:\/\/obamawhitehouse.archives.gov\/blog\/2014\/04\/28\/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities\">Vulnerability Equities Process<\/a> (VEP) would prevent federal agencies from withholding &#8220;major&#8221; security vulnerabilities from the companies affected by them &#8212; particularly ones that could cause consumers harm. Any security holes that were exploited by security agencies are only supposed to be used in national defense.<\/p>\n<p>The BMW i3 autonomous car co-developed by BMW, Intel and Mobileye.<\/p>\n<p>&#8220;The agencies are supposed to reveal vulnerabilities so companies can fix them and keep Americans safe. This is an example of a huge agency not following those rules and leaving people exposed to vulnerabilities so they can exploit them,&#8221; Walsh said. &#8220;We&#8217;ve seen this before from the U.S. government.&#8221;<\/p>\n<p>Last year, a group calling itself the Shadow Brokers released what appeared to be a portion of <a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/09\/nsas-failure-report-shadow-broker-vulnerabilities-underscores-need-oversight\">the National Security Agency&#8217;s hacking toolset<\/a> designed to penetrate network firewalls; it included information about several previously unknown security holes, known as zero-day or 0day vulnerabilities.<\/p>\n<p>According to <a href=\"http:\/\/www.reuters.com\/article\/us-cyber-nsa-tools-idUSKCN11S2MF\">a Reuters report<\/a>, the NSA toolset was designed to exploit vulnerabilities in widely used networking products produced by Cisco and Fortinet.<\/p>\n<p>Right now, the decision about whether to retain or disclose a vulnerability is theoretically governed by the VEP, but because the policy isn\u2019t binding on the government, it\u2019s toothless, the EFF <a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/09\/nsas-failure-report-shadow-broker-vulnerabilities-underscores-need-oversight\">said in a blog<\/a>.<\/p>\n<p>Cryptographer and computer security specialist Bruce Schneier said what&#8217;s needed is government regulation.<\/p>\n<p>&#8220;This is a huge problem,&#8221; he said. &#8220;It\u2019s things that affect the world in a direct physical manner and will cause harm to property and life.&#8221;<\/p>\n<p>Schneier said he has no doubt the CIA explored zero-day vulnerabilities in order to find ways to spy on citizens and assassinate enemies.<\/p>\n<p>&#8220;I think the worst thing about this is it demonstrates &#8212; just like the Shadow Brokers did &#8212; that the Obama Administration&#8217;s assurances that the Vulnerabilities Equities Process prioritizes defense was a lie,&#8221; Schneier said.<\/p>\n<p>According to <em>The Washington Post<\/em>, the purpose of the CIA&#8217;s hacking efforts exposed by the Wikileaks posting could not independently verified and the intelligence agency has declined to confirm the activity.<\/p>\n<p>Vehicle cybersecurity has <a href=\"http:\/\/www.computerworld.com\/article\/3081467\/car-tech\/securing-your-car-from-cyberattacks-is-becoming-a-big-business.html\" target=\"_blank\">come to the forefront<\/a> of automakers and legislators after several instances of white-hat hacking showed that vehicles could be remotely hacked and controlled.<\/p>\n<p>A modern car has dozens of computers with as much as 100 million lines of code &#8212; and for every 1,000 lines there are as many as 15 bugs that are potential doors for would-be hackers, according to Navigant Research.<\/p>\n<p>As more vehicle models come equipped with cellular, Wi-Fi and Bluetooth connectivity, experts say they have become more vulnerable to <a href=\"http:\/\/www.computerworld.com\/article\/2954668\/telematics\/hacker-shows-he-can-locate-unlock-and-remote-start-gm-vehicles.html\" target=\"_blank\">hackers who can remotely gain access<\/a>, either via wireless sniffing devices or over the internet.<\/p>\n<p>By 2020, there will be 250 million wireless &#8220;connected&#8221; cars on the road, <a href=\"http:\/\/www.computerworld.com\/article\/2875572\/gartner-foresees-250m-connected-vehicles-on-the-road-by-2020.html\">according to Gartner<\/a>.<\/p>\n<p>For example, in 2015, security experts Charlie Miller and Chris Valasek collaborated with <em>Wired<\/em> magazine to <a href=\"http:\/\/www.computerworld.com\/article\/2951489\/telematics\/hacker-hundreds-of-thousands-of-vehicles-are-at-risk-of-attack.html\" target=\"_blank\">demonstrate how they could remotely hack<\/a> into and control the entertainment system and other more vital functions of a Jeep Cherokee.<\/p>\n<p>Both hackers are experienced IT security researchers. Miller is a former NSA hacker and security researcher for Twitter; Valasek is the director of security research at IOActive, a consultancy.<\/p>\n<p>The hacking demonstration resulted in Fiat Chrysler Automobiles (FCA), the world&#8217;s seventh-largest automaker, <a href=\"http:\/\/www.computerworld.com\/article\/2952186\/mobile-security\/chrysler-recalls-14m-vehicles-after-jeep-hack.html\" target=\"_blank\">issuing a recall notice<\/a> for 1.4 million vehicles in order fix a software hole that gave hackers access control over vital functions.<\/p>\n<p>&#8220;The flag was two or three years ago when a couple of hackers took over the acceleration and brakes of a car,&#8221; Scheier said. &#8220;If you weren\u2019t woken up then, how is this going to make a difference?&#8221;<\/p>\n<p>Based on past behavior, malicious hackers don&#8217;t typically break into computer systems to harm people; the purpose is to exploit the systems for financial gain, Walsh said. So if the CIA were exploring ways to hack into vehicle computer systems, it wouldn&#8217;t be for any typical purposes.<\/p>\n<p>&#8220;Am I surprised? No,&#8221; Walsh said. &#8220;The idea that you could use hacking into a car to kill someone is something that&#8217;s been floated around &#8212; but as far as I know we didn&#8217;t have any conformation that someone who would do it was looking into how to do it.&#8221;<\/p>\n<p>Schneider isn&#8217;t surprised, either.<\/p>\n<p>&#8220;What do you think the viability is that 20 years ago they looked into ways to manually severe the brake lines of cars and kill people,\u201d Schneier said. &#8220;It\u2019s the CIA. It\u2019s their job, so yes, I\u2019m sure they were. I\u2019d be stunned if they weren\u2019t.&#8221;<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3179095\/security\/cias-exploration-of-zero-day-attacks-against-vehicles-isnt-a-first.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/10\/nissan_leaf_interior-100647154-orig_edit-100689252-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucas Mearian| Date: Fri, 10 Mar 2017 03:01:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>The revelation through Wikileaks that the CIA has <a href=\"http:\/\/www.computerworld.com\/article\/3177797\/security\/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html\">explored hacking<\/a> vehicle computer control systems should concern consumers, particularly as more and more cars and trucks roll off assembly lines with autonomous features.<\/p>\n<p>&#8220;I think it&#8217;s a legitimate concern considering all of the computers being added to cars,&#8221; said Kit Walsh, a staff attorney with the privacy group Electronic Frontier Foundation (EFF). &#8220;There&#8217;s no reason the CIA or other intelligence agencies or bad actors couldn&#8217;t use those vulnerabilities to hurt people.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3179095\/security\/cias-exploration-of-zero-day-attacks-against-vehicles-isnt-a-first.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11397,11065,714],"class_list":["post-6929","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-car-tech","tag-mobile-wireless","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6929"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6929\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6929"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}