Académique Documents
Professionnel Documents
Culture Documents
their earliest form to now being complex computer systems that control the different mechanical
elements. With new technological innovations, however, comes a certain level of insecurity and
possible danger. Today, with the automotive market transforming faster than a consumer is able
to educate themselves, consumers should be cautious about purchasing vehicles with these
modern computer systems because research has shown that these new technologies are open to
programming or hacking knowledge. While not all hacks will be malicious in intent, they could
come a wide range of sources. As explained by David Fagnant, computer hackers, disgruntled
employees, terrorist organizations, or hostile nations all have the ability to gain access to an
individual car or a fleet of automobiles and possibly cause collisions or other traffic disruptions
(Fagnant, 2013).
To better introduce the insecurity that comes with modern automobiles, look at the
research done by Charlie Miller and Chris Valasek, who remotely killed a Jeep Cherokee and
took control of some of the technological systems on the car (Greenberg, 2015). Another instance
of dangers to modern automobiles was demonstrated by Jonathan Petit, who with just forty-three
dollars and laser pointer was able to confuse and defeat an autonomous automobiles LIDAR
sensors (Muoio, 2016). These researchers demonstrated that the act of a menacing hack into a
cars systems was not difficult, which should cause concerns for consumers of similar
technologies.
Vehicles become vulnerable when they are connected to the internet, which can include
the high-end cars that have the mobile Wi-Fi hot spots, as well as cars with basic functionalities
that include navigation or Bluetooth capabilities. Miller and Valasek proved through their testing
that the computers within these cars could be hacked remotely, and then they could laterally gain
access to more mission critical systems (Koscher, 2010). In modern cars, rather than having
opportunity for hackers to take control and steer, accelerate, and brake a car from a remote
connected and autonomous vehicles. As demonstrated by Miller and Valasek and their research
on the Jeep Cherokee, they were able to bring the car to a complete stop on an interstate
highway, which could cause a much larger chain of events to occur. Upon the conduction of
more research, Miller and Valasek were able to determine that with access to the braking system,
they could also disable the breaks all together, which would be devastating in stop-and-go traffic
situations.
As this connected technology has progressed, cars have become more autonomous,
meaning that there is less input required from a driver as the car relies more and more on
technology and connectivity. The present version of the autonomous vehicle technology consists
of hundreds of sensors around a car as well as cameras pointed in every direction which will
inform a car of its surroundings. However, the technology is projected to progress to a point in
which cars are able to fully communicate with one another in what is known as vehicle-to-
vehicle communication, or V2V. Cars will also have the ability to communicate with
infrastructure in a vehicle-to-infrastructure communication, or V2I. Both of these types of
communication will greatly improve the efficiency of the roadways, reduce traffic, and increase
Researcher Jonathan Petit also conducted research on how to intercept these types of
communications (Muoio, 2016). Petit set up sniffing stations which were able to pick up
signals that cars were sending each other or sending to infrastructure. These stations could not
only interpret what the signals were, but also locate where they were coming from. One station
that was placed in a highly populated area was able to pick up the location of a security vehicle
This information creates privacy concerns for the public because drivers wont know who
has access to their location or private information. Currently, privacy rules have not been created
to protect the operators of a connected vehicle, but a consumer should be able to ask themselves
some questions. A consumer, before buying a car with connected abilities, should ask about who
will have access to the data created by their car, how said data will be made available, and how
The potential dangers created by connected vehicles as well as the lack of privacy that
comes with any type of connectivity makes the purchase of a modern automobile a risky
endeavor. Through the history of automobiles, the biggest risk associated with driving were those
created their operators, humans. Now, with the removal of the biggest flaw of the car, bigger
concerns have risen to the surface and present problems which have not yet been addressed by
the departments and organizations whose primary purpose is to protect consumers from said
dangers. With this new technology rolling off the assembly line direct to consumers through
companies like Tesla and Uber, the government has not had time to create new regulations or
Consumers, who should be educated before making any purchase, should not invest in a
product that has not yet been tested or regulated by an overarching board, which in this case is a
government association such as the National Highway Traffic Safety Administration or the
United States Department of Transportation. Today, according to the website of the Department
of Transportation, the only regulations that have been created deal with how to properly test
vehicles, which proves they are behind in the regulation of such vehicles.
Works Cited
Fagnant, Daniel J., and Kara Kockelman. Preparing a Nation for Autonomous Vehicles:
Koscher, Karl, et al. Experimental Security Analysis of a Modern Automobile. 2010 IEEE
Vehicle Systems: Flow and Operations Considerations." Transportation Science, vol. 50,
Muoio, Danielle. Self-Driving cars are prone to hacks - and automakers are barely talking about
Petit, Jonathan, and Steven E. Shladover. Potential Cyberattacks on Automated Vehicles. IEEE
Automobiles have transformed from complete mechanical systems in their earliest form
to now being complex computer systems that control various mechanical elements. With new
technological innovations, however, comes a certain level of insecurity and possible danger.
Today, with the automotive market transforming faster than a consumer is able to educate
themselves, consumers should be cautious about purchasing vehicles with these modern
computer systems because research has shown that these new technologies are open to outside
dangers such as hacks or system tampering. Certain dangers of car connectivity that a consumer
should educate themselves about are the vulnerabilities created by having a car that is connected
to a broad internet network, the hacking potential of intra-vehicular networks, and the openness
programming or hacking knowledge. While not all hacks will be malicious in intent, they could
come a wide range of sources. As explained by David Fagnant, computer hackers, disgruntled
employees, terrorist organizations, or hostile nations all have the ability to gain access to an
individual car or a fleet of automobiles and possibly cause collisions or other traffic disruptions
(Fagnant, 2013). This means that anyone with a computer and a grudge can harm those who
oppose them, whether that be an infamous terrorist organization targeting a nation with views
different than their own, or an employee who was just recently fired pursuing an attack on her
former boss or fellow employees. The process of hacking, through the history of computing
technology, has become easier to figure out for anyone, meaning that everybody is vulnerable to
research done by Charlie Miller and Chris Valasek, who remotely took control of a Jeep
Cherokee and took control of some of the technological systems on the car (Greenberg). The
systems they took over included the radio, the windshield wipers, and the braking system, which
they demonstrated by bringing the Jeep to a complete stop on a busy interstate. Another instance
of dangers to modern automobiles was demonstrated by Jonathan Petit, who with just forty-three
dollars and laser pointer was able to confuse and defeat an autonomous automobiles LIDAR
sensors (Muoio). These researchers demonstrated that the act of a menacing hack into a cars
systems was not difficult, which should cause concerns for consumers of other modern cars that
Vehicles become vulnerable when they are connected to the internet, which can include
the high-end cars that have the mobile Wi-Fi hot spots, as well as cars with basic functionalities
that include navigation or Bluetooth capabilities. Miller and Valasek proved through their testing
that the computers within these cars could be hacked remotely, and then they could laterally gain
access to more mission critical systems (Koscher, 2010), such as the drive-by-wire systems used
in a cars ability to brake, accelerate, and steer. This type of connection creates an opportunity for
hackers to take control and steer, accelerate, and brake a car from a remote location (Greenberg).
Having a crucial automotive system be connected to a cars computers creates a much more
dangerous opportunity for hackers, who have the opportunity to create havoc on any passenger
connected and autonomous vehicles. As demonstrated by Miller and Valasek and their research
on the Jeep Cherokee, they were able to bring the car to a complete stop on an interstate
highway, which could cause a much larger chain of events to occur. Upon the conduction of
more research, Miller and Valasek were able to determine that with access to the braking system,
they could also disable the breaks all together, which would be devastating in stop-and-go traffic
situations.
As this connected technology has progressed, cars have become more autonomous,
meaning that there is less input required from a driver as the car relies more and more on
technology and connectivity. The present version of the autonomous vehicle technology consists
of hundreds of sensors around a car as well as cameras pointed in every direction which will
inform a car of its surroundings. However, the technology is projected to progress to a point in
which cars are able to fully communicate with one another in what is known as vehicle-to-
vehicle communication, or V2V. Cars will also have the ability to communicate with
communication will greatly improve the efficiency of the roadways, reduce traffic, and increase
the safety of drivers and pedestrians (Mahmassani, 1140-1162). This type of connectivity creates
another form of vulnerability which reduces the amount of privacy for the driver of a passenger
vehicle.
Researcher Jonathan Petit also conducted research on how to intercept these types of
communications (Muoio). Petit set up sniffing stations which were able to pick up signals that
cars were sending each other or sending to infrastructure. These stations could not only interpret
what the signals were, but also locate where they were coming from. One station that was placed
in a highly populated area was able to pick up the location of a security vehicle with seventy-
eight percent accuracy. Today, with personal privacy becoming a hot-topic, the ability for anyone
to gain access to personal locations or other private, sensitive information should concern
This information creates privacy concerns for the public because drivers wont know who
has access to their location or private information. Currently, privacy rules have not been created
to protect the operators of a connected vehicle, but a consumer should be able to ask themselves
some questions. A consumer, before buying a car with connected abilities, should ask about who
will have access to the data created by their car, how said data will be made available, and how
the data will be used (Fagnant 14-15). For example, if a government agency such as the National
Highway Traffic Safety Administration is accessing information to improve the safety and
efficiency of the roadways, then that might be a privacy breach that could be overlooked by a
consumer. However, if the government agency is the Central Intelligence Agency or the Federal
Bureau of Investigation and their primary intent is to spy on private citizens, then the consumer
The potential dangers created by connected vehicles as well as the lack of privacy that
comes with any type of connectivity makes the purchase of a modern automobile a risky
endeavor. Through the history of automobiles, the biggest risk associated with driving were those
created their operators, humans. Now, with the removal of the biggest flaw of the car, bigger
concerns have risen to the surface and present problems which have not yet been addressed by
the departments and organizations whose primary purpose is to protect consumers from said
dangers. With this new technology rolling off the assembly line direct to consumers through
companies like Tesla and Uber, the government has not had time to create new regulations or
product that has not yet been tested or regulated by an overarching board, which in this case is a
government association such as the National Highway Traffic Safety Administration (NHTSA)
or the United States Department of Transportation. Today, according to the website of the
Department of Transportation, the only regulations that have been created deal with how to
properly test vehicles, which proves they are behind in the regulation of the connected portions
of vehicles. The NHTSA currently takes new cars through a cyber security laboratory where they
test how vulnerable or closed a cars computer systems are before they become available to the
mass-market (NHTSA).
While no regulations have been created as a result of the evolving automotive market,
solutions have been proposed that would better help consumers. Mohamed Amin and Zaid Tariq
suggested that cars be produced with an intrusion detection system, which would function
exactly as it is named, and detect and inform the passengers of the vehicle when it has been
compromised (Amin & Tariq). They also suggested multipurpose electronic control units that
would have the ability to govern all network traffic. With these two proposed solutions, the
opinion, the industry has a long way to go before I would ever consider buying a car with these
modern advantages and conveniences. While the rate of car accidents has decreased with the help
of autonomous abilities and driver assist systems, the vulnerabilities created by connecting the
cars to a large internet network create the risk for more accidents, but this time not at the fault of
the driver.
Amin, Mohamed, and Zaid Tariq. Securing the Car: How Intrusive Manufacturer-Supplier
Fagnant, Daniel J., and Kara Kockelman. Preparing a Nation for Autonomous Vehicles:
Koscher, Karl, et al. Experimental Security Analysis of a Modern Automobile. 2010 IEEE
Vehicle Systems: Flow and Operations Considerations." Transportation Science, vol. 50,
Muoio, Danielle. Self-Driving cars are prone to hacks - and automakers are barely talking about
National Highway Traffic Safety Administration. Vehicle Research & Testing. NHTSA, 14
2017.
Petit, Jonathan, and Steven E. Shladover. Potential Cyberattacks on Automated Vehicles. IEEE