Report: Automakers fail to fully protect against hacking

By JOAN LOWY Associated Press WASHINGTON (AP) — Automakers are cramming cars with wireless technology, but they have failed to adequately protect those fe...

By JOAN LOWY
Associated Press

WASHINGTON (AP) — Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to a senator.

Sen. Edward Markey, D-Mass., asked automakers a series of questions about the technologies and any safeguards against hackers built into their vehicles. He also asked about how the information that vehicle computers gather and often transmit wirelessly is protected.

Markey posed his questions after researchers showed how hackers can get into the controls of some popular cars and SUVs, causing them suddenly to accelerate, turn, sound the horn, turn headlights off or on and modify speedometer and gas-gauge readings.

The responses from 16 manufacturers “reveal there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect and use personal driver information,” a report by Markey’s staff concludes.

Today’s cars and light trucks typically contain more than 50 electronic control units — effectively small computers — that are part of a network in the car. At the same time, nearly all new cars on the market today include at least some wireless entry points to these computers, such as tire pressure monitoring systems, Bluetooth, Internet access, keyless entry, remote start, navigation systems, WiFi, anti-theft systems and cellular-telematics, the report said. Only three automakers said they still have some models without wireless entry, but those models are a small and declining share of their fleets.

“Drivers have come to rely on these new technologies, but unfortunately the automakers haven’t done their part to protect us from cyberattacks or privacy invasions,” Markey said in a statement.

Among the report’s findings:

— Most manufacturers said they were unaware of or unable to report on past hacking incidents. Three automakers declined to answer the question. One automaker described an app designed by an outside company and released for Android devices that could access a vehicle’s computer network through the Bluetooth connection. A security analysis didn’t indicate any ability to introduce malicious code or steal data, but the automaker had the app removed from the Google Play store as a precautionary measure.

— Each manufacturer is handling the introduction of new technology in very different ways, and for the most part these actions are insufficient to ensure security. Hackers can get around most security protections cited by manufacturers, according to the security experts Markey consulted.

— Only one manufacturer appeared able to detect a hacking attempt while it was happening and only two described credible means of responding to such intrusions in real time. Information from most automakers indicated they wouldn’t know about a hacking attempt unless data from the vehicle’s computers was downloaded by a dealer or at a service center.

Most new cars are also capable of collecting large amounts of data on a vehicle’s driving history through an array of pre-installed technologies, including navigation systems, telematics, infotainment, emergency assistance systems and remote disabling devices that allow car dealers to track and disable vehicles whose drivers don’t keep up with their payments or that are reported stolen, the report said.

Half the manufacturers said they wirelessly transfer information on driving history from vehicles to another location, often using third-party companies, and most don’t describe “an effective means to secure the data,” the report said.

Manufacturers are also using personal vehicle data in various and often vague ways to “improve the customer experience,” the report said. Policies on how long they store drivers’ information vary considerably. Customers often are not made aware explicitly of the data collection and, when they are, they frequently cannot opt out without disabling valuable features like navigation.

Last November, 19 automakers accounting for most of the passenger cars and light trucks sold in the U.S. agreed on a set of principles to protect motorists’ privacy. The voluntary agreement was aimed in part at heading off possible legislation. Markey has said voluntary efforts don’t go far enough.

The auto industry is also in the early stages of establishing a voluntary information sharing and analysis center or other comparable program about existing or potential cyber-related threats. “But even as we explore ways to advance this type of industrywide effort, our members already are each taking on their own aggressive efforts to ensure that we are advancing safety,” the Alliance of Automobile Manufacturers said in a statement.

The Society of Automotive Engineers also has established a security committee that is evaluating the vulnerability of cars to hacking and is drafting “standards and best practices to help ensure electronic control system safety,” the alliance said.

The Association of Global Automakers, another trade association, said the responses provided to Markey are many months old and don’t reflect extensive discussions between the industry and federal technology experts aimed at improving the industry’s understanding of cyber threats.

The manufacturers who replied to Markey are BMW, Chrysler, Ford, General Motors, Honda, Hyundai, Jaguar Land Rover, Mazda, Mercedes-Benz, Mitsubishi, Nissan, Porsche, Subaru, Toyota, Volkswagen-Audi and Volvo. Three other automakers — Aston Martin, Lamborghini and Tesla — didn’t reply to his request for information.

___

Follow Joan Lowy on Twitter at http://www.twitter.com/AP_Joan_Lowy

Copyright 2015 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Copyright © 2024 The Associated Press. All rights reserved. This website is not intended for users located within the European Economic Area.

    The State Department seal is seen on the briefing room lectern ahead of a briefing by State Department spokesperson Ned Price at the State Department in Washington, DC, on January 31, 2022. (Photo by MANDEL NGAN / POOL / AFP) (Photo by MANDEL NGAN/POOL/AFP via Getty Images)

    State Dept urges workforce to prioritize disability rights in accessibility playbook

    Read more
    U.S. Marine Corps Forces Cybersp/Staff Sgt. Jacob OsborneMarines with Marine Corps Forces Cyberspace Command pose for photos in the cybersecurity operations center at Lasswell Hall aboard Fort Meade, Maryland.

    CMMC requirements demand innovative approaches to securing CUI

    Read more