Delano Herald Journal

Serving the communities of Delano, Loretto, Montrose, MN, and the surrounding area

Mark Ollig Column – 11/18/13



Today’s cars are equipped with sophisticated computer technologies, providing us with increased safety, improved mechanical efficiency, and some impressive high-tech devices.

It is said tens of millions of lines of computer programming instruction code are used for the digital components inside newer cars.

However, a major concern has arisen.

All of us know computers can be “hacked” into and taken over by computing enthusiasts with the right technical knowledge and access.

Today’s major concern is: cyber-car hacking.

Car thieves have figured out how to construct a wireless-operating gadget with the electronics and computer programming code required for gaining access into our cars and their internal computer controlling units.

Yes indeed, folks, yours truly watched a video of a person approaching a newer car and unlocking its doors with a “mystery gadget” resembling a garage door opener.

The first thought which came into my mind was “uh oh, they figured it out.”

The bad guys are now using wireless computing hacking methods to break into our cars.

Another video shows how a newer car in California was recently hacked. The car owner’s dash camera recorded the culprit while standing in front of the car.

The video shows this person using the handheld mystery gadget to wirelessly unlock the car doors – emulating the action of the car owner’s keyless entry or remote smart-key fob (frequency operated button).

The intruder hurriedly got inside the car.

After apparently searching for valuables, he got out of the car and quickly walked down the street – most likely to attempt another cyber-car hacking.

So, someone has figured out the code needed to manipulate our cars’ short-range keyless remote fob and command the doors to unlock . . . wonderful.

Oh, by the way, many smart-key fobs also open the trunk; and allow the starting of the engine using the car’s pushbutton ignition – making it easy pickings for a car thief using the mystery gadget.

In 2011, two University of Washington and University of California-San Diego researchers were able to wirelessly hack into and take control of cars.

They thoughtfully withheld details of the specific car models they were able to hack into in order to prevent potential cyber-car hackers from using the knowledge.

These same researchers published two studies explaining the weaknesses of today’s computer-controlled automobiles.

One study is called “Comprehensive Experimental Analyses of Automotive Attack Surface.” You can read it at: tinyurl.com/bytes-univ2.

In this study, I noted on page 3 a diagram showing the digital input/output (I/O) channels of a modern car’s Electronic Control Units (ECUs).

Access to these I/O channels can be obtained via the following methods:

• Indirect physical access.

• Short-range wireless access (Bluetooth).

• Long-range wireless access.

These I/O channels include the On-Board Diagnostic system information (OBD), which normally uses a 16-pin connector to physically interface with a display box to read the car’s stored codes for various operations, and to diagnose engine and electrical problems. The OBD information is usually retrieved via direct physical access; however, a Bluetooth interface is obtainable for wirelessly gathering OBD information from the car.

The study suggests a car’s telematics (telecommunications and informatics) control unit is possibly the most vulnerable to a long-range wireless attack.

Telematics integrates with the Earth-orbiting satellite Global Positioning System (GPS), and accesses the Internet via cellular voice and data networks.

Wireless roadside assistance services (such as Safety Connect) can link with the car’s telematics device and activate the code needed to remotely unlock a car door.

Telematics connections with cellular channels (which are accessible from a long range); provide another point of entry for potential cyber-car attackers.

“Our own group documented experiments on a complete automobile, demonstrating that if an adversary were able to communicate on one or more of a car’s internal network buses, then this capability could be sufficient to maliciously control critical components across the entire car,” the study stated.

We may soon be hearing stories about “wireless drive-by cyber-auto attacks.”

This phrase can be defined as when a cyber-car hacker inside the automobile driving next to you, wirelessly takes control and manipulates your car’s computerized electronic systems by accessing an I/O channel into one of your vehicle’s control systems.

Easy folks, let’s not panic just yet.

Combating cyber-car hacking includes using application-level authentication, code encryption, and security hardening of the car’s underlying computer-coding platform.

A cyber-car hacker, using an illegally rigged, wireless car door unlocking access device, sometimes just wants to remove the sellable items found inside the automobile.

One bit (no pun intended) of common sense from your car-caring columnist: do not keep valuables inside your car or trunk when it’s unattended.

I expect to see a “vehicle cyber-defense” organization established soon to combat these cyber-car hackers – if one hasn’t been established already.

Automobile makers need to be focused on delivering new cars with built-in cyber-security safeguards.

They also need better encryption defenses for the wireless smart-key fobs, and telematics in order to protect them from being hacked into.

The following are two video news reports uploaded to YouTube showing these cyber-car thieves in action.

Both tinyurl.com/bytes-abc7-1 and tinyurl.com/bytes-abc7-3 show surveillance video of cyber-car thieves using the mystery gadget to enter locked cars.

I think back to simpler car driving days, when I cruised around in a 1977 Plymouth Volaré.

Its car door unlocked using a physical key.

Also, the Volarés’ “advanced” electronics and wireless features were contained inside the AM-FM radio, and its 40-channel CB radio, which I regularly used.








Leave a Reply

Your email address will not be published.