Best of the Week
Most Popular
1. Market Decline Will Lead To Pension Collapse, USD Devaluation, And NWO - Raymond_Matison
2.Uber’s Nightmare Has Just Started - Stephen_McBride
3.Stock Market Crash Black Swan Event Set Up Sept 12th? - Brad_Gudgeon
4.GDow Stock Market Trend Forecast Update - Nadeem_Walayat
5.Gold Significant Correction Has Started - Clive_Maund
6.British Pound GBP vs Brexit Chaos Timeline - Nadeem_Walayat
7.Cameco Crash, Uranium Sector Won’t Catch a break - Richard_Mills
8.Recession 2020 Forecast : The New Risks & New Profits Of A Grand Experiment - Dan_Amerman
9.Gold When Global Insanity Prevails - Michael Ballanger
10.UK General Election Forecast 2019 - Betting Market Odds - Nadeem_Walayat
Last 7 days
US Treasury Bonds Pause Near Resistance Before The Next Rally - 18th Oct 19
The Biggest Housing Boom in US History Has Just Begun - 18th Oct 19
British Pound Brexit Chaos GBP Trend Forecast - 18th Oct 19
Stocks Don’t Care About Trump Impeachment - 17th Oct 19
Currencies Show A Shift to Safety And Maturity – What Does It Mean? - 17th Oct 19
Stock Market Future Projected Cycles - 17th Oct 19
Weekly SPX & Gold Price Cycle Report - 17th Oct 19
What Makes United Markets Capital Different From Other Online Brokers? - 17th Oct 19
Stock Market Dow Long-term Trend Analysis - 16th Oct 19
This Is Not a Money Printing Press - 16th Oct 19
Online Casino Operator LeoVegas is Optimistic about the Future - 16th Oct 19
Stock Market Dow Elliott Wave Analysis Forecast - Video - 16th Oct 19
$100 Silver Has Come And Gone - 16th Oct 19
Stock Market Roll Over Risk to New highs in S&P 500 - 16th Oct 19
10 Best Trading Schools and Courses for Students - 16th Oct 19
Dow Stock Market Short-term Trend Analysis - 15th Oct 19
The Many Aligning Signals in Gold - 15th Oct 19
Market Action Suggests Downside in Precious Metals - 15th Oct 19
US Major Stock Market Indexes Retest Critical Price Channel Resistance - 15th Oct 19
“Baghad Jerome” Powell Denies the Fed Is Using Financial Crisis Tools - 15th Oct 19
British Pound GBP Trend Analysis - 14th Oct 19
A Guide to Financing Your Next Car - 14th Oct 19
America's Ruling Class - Underestimating Them & Overestimating Us - 14th Oct 19
Stock Market Range Bound - 14th Oct 19
Gold, Silver Bonds - Inflation in the Offing? - 14th Oct 19
East-West Trade War: Never Take a Knife to a Gunfight - 14th Oct 19
Consider Precious Metals for Insurance First, Profit Second... - 14th Oct 19
Stock Market Dow Elliott Wave Analysis Forecast - 13th Oct 19
The Most Successful IPOs Have This One Thing in Common - 13th Oct 19
Precious Metals & Stock Market VIX Are Set To Launch Dramatically Higher - 13th Oct 19
Discovery Sport EGR Valve Gasket Problems - Land Rover Dealer Fix - 13th Oct 19
Stock Market US Presidential Cycle - Video - 12th Oct 19
Social Security Is Screwing Millennials - 12th Oct 19
Gold Gifts Traders With Another Rotation Below $1500 - 12th Oct 19
US Dollar Index Trend Analysis - 11th Oct 19
China Golden Week Sales Exceed Expectations - 11th Oct 19
Stock Market Short-term Consolidation Does Not change Secular Bullish Trend - 11th Oct 19
The Allure of Upswings in Silver Mining Stocks - 11th Oct 19
US Housing Market 2018-2019 and 2006-2007: Similarities & Differences - 11th Oct 19
Now Is the Time to Load Up on 5G Stocks - 11th Oct 19
Why the Law Can’t Protect Your Money - 11th Oct 19
Will Miami be the First U.S. Real Estate Bubble to Burst? - 11th Oct 19
How Online Casinos Maximise Profits - 11th Oct 19
3 Tips for Picking Junior Gold Stocks - 10th Oct 19
How Does Inflation Affect Exchange Rates? - 10th Oct 19
This Is the Best Time to Load Up on These 3 Value Stocks - 10th Oct 19
What Makes this Gold Market Rally Different From All Others - 10th Oct 19
Stock Market US Presidential Cycle - 9th Oct 19

Market Oracle FREE Newsletter

Stock Market Trend Forecast Oct - Dec 2019 by Nadeem Walayat

Moore's Law on Wheels - Your Car the Next Big Cyber Weapon?

Companies / Cyber War Nov 27, 2013 - 01:11 PM GMT

By: Money_Morning

Companies

William Patalon III writes: Since launching Private Briefing back in August 2011, we've been chronicling the escalating potential for cyber-warfare and cyber-terrorism. And with the cyber-assaults that China's People's Liberation Army (PLA) have been launching against America over the last year or so, it's a story that we've been following with an increasing amount of attention.


And our subscribers have made big money because of it.

For instance, in the March 15 Private Briefing report, "Double Your Money With this Cyber-Hacking of America Stock," we recommended AVG Technologies NV (NYSE: AVG), an Amsterdam-based cybersecurity whose shares we believed were good for a 100% gain in a year.

In reality it took only six months.

And in subsequent reports this summer, we recommended Kratos Defense & Security Solutions Inc. (Nasdaq: KTOS), a defense-and-cybersecurity stock that zoomed as much as 50% before surrendering some of those gains. We still have a double-digit profit in the stock. And we continue to like it for the long haul.

However, this whole cyber-hacking, -terrorism, -warfare story is more than just the latest profit opportunity - much more, in fact...

Far Out... But Totally Feasible

It's an ever-changing saga that will influence every aspect of our lives - including our personal safety, our constitutional rights, our economic well-being, and our national security. Earlier this year, for instance - in the China's Internet Army special report that we put together for you - we explained how Beijing-backed military hackers cyber-grabbed the designs for many of America's front-line weapons systems.

And in another special report - The Syria Crisis Survival Guide- we even gave you a glimpse of what a cyber war might look like (and made a special point of saying that the Pentagon believes that mainstream Americans - not military targets - would get the worst of such a skirmish).

Here at Private Briefing, those are the kinds of stories that we like to identify, and follow closely for you.

And that's why we zeroed in on the concept of "cyberjacking" - an act of computer-aided carjacking that's designed to either assassinate the vehicle's driver or passengers, or to turn the car into an actual weapon.

I know this sounds far out. But it isn't "tinfoil hat" stuff. You see, if it isn't totally feasible now, it soon will be.

And that's why the suspicious death of Michael Hastings immediately ignited all sorts of conspiracy theories - most of them centering on cyberjacking.

In our view, that makes cyberjacking a topic worth tackling for you.

Moore's Law on Wheels

My family still has the 1929 Model A Ford coupe that my grandfather William Patalon Sr. - my Dad's father - bought back in 1928. The tall, boxy (but gorgeous) tan coupe rolls on thin, orange-spoked wheels, and is a simple, simple piece of machinery.

The "plug wires" are flat pieces of bare copper that connect the four squat white Champion spark plugs to the gangly Bakelite distributor cap. The brakes are mechanical, operated by levered steel rods - and trust me, you have to stand on the brake pedal to really slow that baby down.

The tolerances on the gears in the 85-year-old three-speed manual tranny are so wide that, to keep it from grinding as you shift, you have to fill that gearbox with 600-weight gear oil; shifting gears in cold weather, before the car is warmed up, is like trying to stir hardening concrete with a plastic Slurpee straw.

Compare that with today's cars, which are like rolling testimonials to Silicon Valley - or a Space Shuttle on wheels.

In fact, the Institute of Physics says that NASA sent the Apollo astronauts to the moon back in 1969 using less computing power than you'll find in the typical family car - and we're not even talking about some top-of-the-line factory supercar.

Today's typical car contains as many as 50 different computers. They control the stereo display, the air conditioning system, the door locks, the air bags, and the ABS anti-lock brakes. The crucial computer is the "brain" that controls the motor, adjusting the air-fuel mixture, the engine emissions, the rate at which the sparkplugs fire, and the cooling system. More sophisticated cars will have special visual displays in the dash, satellite navigation systems, anti-theft devices, performance suspension systems.

In the old days when you wanted to "soup up" (hot rod) a car, you'd add a bigger carb, headers, a dual-point distributor, and a special camshaft and lifters. Today you can actually change the "chip" in the engine-management system, replacing the stock chip with one that tells the engine to start boosting the horsepower sooner, that is, at lower engine speeds, than you'd see at the factory settings.

You can even go out and spend thousands to add an aftermarket engine-management system that will help your car make even more power.

Then there's the software.

Today's typical luxury car has more than 100 million lines of computer code, while software and electronics account for 40% of the car's cost and half of warranty claims, John D. Lee, a professor at the University of Wisconsin-Madison's industrial and systems engineering department, told BusinessWeek earlier this year.

It's important to note (you'll see why in a moment) that performance isn't the only goal of all this technology. By connecting into these "systems" and reading the computer "error" codes, service technicians can diagnose problems and make repairs before those problems become a safety hazard or cause a total breakdown.

Thanks to the explosive growth we've seen in the sensors and wireless markets, cars will be able to transmit those error codes directly to your auto dealer or repair shop, letting your friendly neighborhood technician know that there's a problem now, or that there will be one soon.

And if you're talking about all the technology contained in today's cars, those four-dozen computers we mentioned are just the beginning.

There's also satellite radio, the built-in Bluetooth for your smartphone, remote starters for those cold days, GM OnStar, Ford Sync, Mercedes Mbrace, and BMW Assist. Those branded systems utilize 3G wireless data access and are backed up by permitting "non-secure" access via a cellphone modem for use in parts of the country not serviced by 3G coverage.

The world's top aircraft currently use "fly-by-wire" technology, which means that the control yoke in the cockpit connects to the control surfaces electronically - instead of by braided steel cables or simple hydraulics like in the old days.

Cars will soon have a similar "steer-by-wire" technology.

According to one report that I read, steering is still "mechanical" (direct linked) on all production vehicles... except for the 2014 Infiniti Q40.

You can bet that others will follow. And I'm betting that you can see where I'm going with this.

"We Will Control the Horizontal ... We Will Control the Vertical"

One of my favorite movies of all time is the original Inherit the Wind, a fictionalized account of the infamous Scopes Monkey Trial that pitted Clarence Darrow against three-time presidential candidate William Jennings Bryan.

There's a scene in that movie in which the Darrow character ("Henry Drummond," who is played by Spencer Tracy) is telling the (all-male) jury that progress always comes at a price.

"Gentlemen, progress has never been a bargain ... you have to pay for it," Tracy says. "Sometimes I think there's a man behind a counter who says, 'All right, you can have a telephone; but you'll have to give up privacy, and the charm of distance. Madam, you may vote; but at a price; you lose the right to retreat behind a powder-puff or a petticoat. Mister, you may conquer the air; but the birds will lose their wonder, and the clouds will smell of gasoline'."

In the age of cyber-terrorism, the technological progress that's taken us from my family's Model A Ford to the Infiniti Q40 has also come at a price. Those 50 computers we mentioned: They can be accessed via a powered data port that's not any different than the USB port on your notebook or desktop PC.

Technicians will tell you that it's usually located out of plain sight - up under the dash (detailed shop manuals on any vehicle can locate it precisely for you). By plugging a special small module into that port - something that requires just a few seconds' worth of access - a hacker can "Bluetooth-enable" your car's computer system.

And you have to believe that the best hackers (or those with the financial backing of a major government or military service) could figure out a way to access those computers through such onboard systems as OnStar.

At the DefCon 21 cybersecurity conference this summer, security engineers Charlie Miller and Chris Valasek claimed they were able to use a laptop to break into the software inside a Toyota Prius and Ford Escape. The Pentagon-funded duo said they were able to control the brakes, the accelerator, change the speedometer, flash the headlights, tighten the seat belts, and sound the horn - with a few simple keystrokes.

In a test drive for a magazine, Miller and Valasek used an Apple MacBook plugged into a Ford's electronics to speed up the car, slam on its brakes - and then to violently jerk the car's steering. In another test, they reportedly used an old Nintendo D-pad.

"Imagine you're driving down a highway at 80 [miles an hour]," Valasek said. "You're going into the car next to you or into oncoming traffic. That's going to be bad times."

Other so-called "white-hat" hackers - the folks who break into systems to identify vulnerabilities that need to be fixed - have had similar successes.

Also this summer, two Spanish experts said they were about to unveil a $22 device that they claimed would let them bypass the security in a car's electronic-control unit. One of those experts, a man named Javier Vázquez Vidal, said "it would take no time at all to gain total control over a vehicle - deploying an airbag, activating the brakes or immobilizing a car."

And back in 2011, researchers at the University of Washington and the University of California-San Diego reported being able to wirelessly hack into cars - "owning" the vehicle, as they called it. The researchers were worried enough about the security threat to refuse to identify the make-and-model vehicles that they cyber-jacked - not wanting their findings to be used by criminals.

Automakers were quick to claim that the systems of the vehicles they are building are secure - and would remain so.

Ford Motor Co. (NYSE: F) spokesman Craig Daitch told CNBC that "while an attack by a hacker who obtains physical access to a vehicle for a prolonged period of time is difficult to completely diminish, Ford has made strides in limiting the ways a hacker can fully take control of a vehicle."

And Toyota Motor Co. (NYSE ADR: TM) public affairs manager Cindy Knight told the popular financial cable channel that "cyber-security is an important issue for the entire automotive industry, from automakers to suppliers to the agencies that oversee motor vehicle safety. At Toyota, we take seriously any form of tampering with our electronic control systems. We strive to ensure that our electronic control systems are robust and secure and we will continue to rigorously test and improve them."

Even so, this is a growing cause for concern for law enforcement and safety officials - both here in America and in countries around the world. With each passing day, in fact, they have more and more to worry about.

And you can see why.

As our "steer-by-wire" example of the Infiniti Q40 underscores, with each new model year, technology takes control of an ever-increasing share of an auto's functions.

And they also have the development of autonomous (self-driving) vehicles to worry about.

We've all heard about the Google Inc. (Nasdaq: GOOG) program to develop self-driving cars. Even Congress and the Defense Advanced Research Projects Agency (DARPA), the military's research arm that helped create the Internet, have provided incentives for inventors to develop autonomous-vehicle technology.

A Deep Concern

Here in the United States, the National Highway Traffic Safety Administration (NHTSA) has launched a cybersecurity research program to investigate the potential for cyber-jacking.

In Senate testimony earlier this year, NHTSA Administrator David Strickland acknowledged that "these interconnected electronics systems are creating opportunities to improve vehicle safety and reliability, but are also creating new and different safety and cybersecurity risks. We don't want to be behind the eight ball."

A new office in that agency that focuses on the safety of vehicle electronics will study the risks to systems in cars, as well as those that "talk" with other vehicles.

European Cybercrime Center Director Troels Oerting says there are growing fears that in-car technologies will be hacked and used by organized crime for profit, competitive advantage, and even revenge.

The Cybercrime Center is a unit of Europol, the European Union (EU) law-enforcement agency.

"We are very concerned about the direction of car hacking," Oerting told CNBC recently. "Everyone [in the car industry] wants to make cars more helpful - for them to help with steering, parking, braking and even driving - but if you do this the downside is that someone will try to use this to their advantage, and for criminals, this would generally be for profit or revenge."

And the portrait he painted wasn't a pretty one.

If a car can be cyberjacked, what's to stop organized criminals from "eliminating" their enemies by using remote control to literally drive their enemy's vehicle off a bridge or a cliff, Oerting asked. In countries such as South Africa, where carjacking is already commonplace, gaining remote access to in-car technology would allow criminals to stop a car, unlock its doors and get to the driver very easily.

"Wireless technology is integrated into practically everything nowadays, and if there's wireless access to anything there's a possibility to remotely control it," Oerting cautioned.

Miller and Valasek, whose Pentagon-funded research was published in the whitepaper Adventures in Automotive Networks and Control Units, have precisely the same worry.

"Automobiles are no longer just mechanical devices," the two U.S. researchers wrote. "Today's automobiles contain a number of different electronic components networked together that as a whole are responsible for monitoring and controlling the state of the vehicle. Drivers and passengers are strictly at the mercy of the code running in their automobiles and, unlike when their Web browser crashes or is compromised, the threat to their physical well-being is real. You can't have safety without security."

Now you can see why folks were so quick to believe the Internet scuttlebutt about journalist Michael Hastings having been murdered. The odd timing and circumstances of the single-vehicle crash and explosion ignited suspicions. But it was easy to raise folks' hackles about the potential for such an assassination scenario.

The reason: The technology to allow such a scenario to play out already exists.

So trust us to stay on this story... to report back with updates... and to seek ways for you to make money.

To get Bill's Private Briefings automatically delivered to your inbox every morning, sign up right here. As you'll see, this is the best deal he's ever arranged for you - by far.

Source :http://moneymorning.com/2013/11/27/the-next-big-cyber-weapon-your-car/

Money Morning/The Money Map Report

©2013 Monument Street Publishing. All Rights Reserved. Protected by copyright laws of the United States and international treaties. Any reproduction, copying, or redistribution (electronic or otherwise, including on the world wide web), of content from this website, in whole or in part, is strictly prohibited without the express written permission of Monument Street Publishing. 105 West Monument Street, Baltimore MD 21201, Email: customerservice@moneymorning.com

Disclaimer: Nothing published by Money Morning should be considered personalized investment advice. Although our employees may answer your general customer service questions, they are not licensed under securities laws to address your particular investment situation. No communication by our employees to you should be deemed as personalized investent advice. We expressly forbid our writers from having a financial interest in any security recommended to our readers. All of our employees and agents must wait 24 hours after on-line publication, or after the mailing of printed-only publication prior to following an initial recommendation. Any investments recommended by Money Morning should be made only after consulting with your investment advisor and only after reviewing the prospectus or financial statements of the company.

Money Morning Archive

© 2005-2019 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in

6 Critical Money Making Rules