Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
  • Reliability.fm
    • Speaking Of Reliability
    • Rooted in Reliability: The Plant Performance Podcast
    • Quality during Design
    • Critical Talks
    • Dare to Know
    • Maintenance Disrupted
    • Metal Conversations
    • The Leadership Connection
    • Practical Reliability Podcast
    • Reliability Matters
    • Reliability it Matters
    • Maintenance Mavericks Podcast
    • Women in Maintenance
    • Accendo Reliability Webinar Series
    • Asset Reliability @ Work
  • Articles
    • CRE Preparation Notes
    • on Leadership & Career
      • Advanced Engineering Culture
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • ReliabilityXperience
      • RCM BlitzĀ®
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
    • on Risk & Safety
      • CERMĀ® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Feed Forward Publications
    • Openings
    • Books
    • Webinars
    • Journals
    • Higher Education
    • Podcasts
  • Courses
    • 14 Ways to Acquire Reliability Engineering Knowledge
    • Reliability Analysis Methods online course
    • Measurement System Assessment
    • SPC-Process Capability Course
    • Design of Experiments
    • Foundations of RCM online course
    • Quality during Design Journey
    • Reliability Engineering Statistics
    • Quality Engineering Statistics
    • An Introduction to Reliability Engineering
    • An Introduction to Quality Engineering
    • Process Capability Analysis course
    • Root Cause Analysis and the 8D Corrective Action Process course
    • Return on Investment online course
    • CRE Preparation Online Course
    • Quondam Courses
  • Webinars
    • Upcoming Live Events
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home

by Greg Hutchins Leave a Comment

Unsafe at Any Speed

Unsafe at Any Speed

Guest Post byĀ Ed PerkinsĀ (first posted on CERMĀ Ā® RISK INSIGHTS – reposted here with permission)

In the 1960’s Ralph Nader became famous by writing an expose’ of the Corvair, a rear-engined Chevy built by General Motors.

He called it ā€œUnsafe at Any Speed: The Designed-In Dangers of the American AutomobileĀ ā€œ[1][2].Ā  He accused car makers of ignoring safety, resisting providing seat belts and other design issues that contributed to injuries in accidents.

In 1966 the U.S. Congress passed the Highway Safety Act (aka National Traffic and Motor Vehicle Safety Act), which created mandatory federal safety standards for motor vehicles and established what is now the National Highway Traffic Safety Administration.

This week, the U.S. Senate Commerce Committee held a hearing on the ā€œInternet of Thingsā€.

Among others, the vulnerability of today’s cars with their interconnected computerized control systems to hacking was highlighted. Senators Markey (D-Mass) and Blumenthal (D-Conn) announced they plan to introduce legislation that would direct the National Highway Traffic Safety Administration (NHTSA) and the Federal Trade Commission (FTC) to establish federal standards ā€œto secure cars and protect drivers’ privacyā€.

Markey also announced the release of a staff report ā€œTracking & Hacking: Security & Privacy Gaps Put American Drivers at Riskā€[3].

Studies have shown how hackers can get into the controls of some popular vehicles, causing them to suddenly accelerate, turn, kill the brakes, activate the horn, control the headlights, and modify the speedometer and gas gauge readings.[4]

Senator Markey sent letters in 2014 to the major automobile manufacturers requesting information on how prevalent these technologies are, what is being done to secure them against hacking attacks, and how personal driving information is managed.[5]

Markey’s report discusses the responses to his letter from 16 major automobile manufacturers: BMW, Chrysler, Ford, General Motors, Honda, Hyundai, Jaguar Land Rover, Mazda, Mercedes-Benz, Mitsubishi, Nissan, Porsche, Subaru, Toyota, Volkswagen (with Audi), and Volvo. Letters were also sent to Aston Martin, Lamborghini, and Tesla, but those manufacturers did not respond.

The report notes that new technologies in cars have enabled valuable features that have the potential to improve driver safety and vehicle performance and vehicles are becoming more connected through electronic systems like navigation, infotainment, and safety monitoring tools.

The proliferation of these technologies raises concerns about the ability of hackers to gain access and control to the essential functions and features of those cars. It also raises privacy issues over the ability of third parties to utilize information on drivers’ habits for commercial purposes without the drivers’ knowledge or consent.

It also notes that today’s cars and light trucks typically contain more than 50 separate electronic control units (ECUs), connected through a controller area network (CAN) or other networks (such as Local Interconnect Networks or FlexRay).

Vehicle functionality, safety, and privacy all depend on the functions of these small computers, as well as their ability to communicate with one another. Cars also have the ability to record vehicle data to analyze and improve performance.

Additionally, onboard navigation technologies and the ability to integrate mobile devices with vehicle-based technologies have fundamentally altered the manner in which drivers and the vehicles can interact during the vehicles’ operation.

This information technology has resulted in an increased ability to gather driving information.

Such information-gathering abilities can be used by the automobile manufacturer to provide customized service and improve customer experiences, but in the wrong hands, such information could also be used maliciously. In particular, wireless technologies create vulnerabilities to hacking attacks that could be used to invade a user’s privacy or modify the operation of a vehicle.

Two recent developments highlight potential threats to both automobile security and to consumer privacy.

The report’s key findings were summarized:

  1. Nearly 100% of cars on the market include wireless technologies that could pose vulnerabilities to hacking or privacy intrusions.
  2. Most automobile manufacturers were unaware of or unable to report on past hacking incidents.
  3. Security measures to prevent remote access to vehicle electronics are inconsistent and haphazard across all automobile manufacturers, and many manufacturers did not seem to understand the questions posed by Senator Markey.
  4. Only two automobile manufacturers were able to describe any capabilities to diagnose or meaningfully respond to an infiltration in real-time, and most say they rely on technologies that cannot be used for this purpose at all.
  5. Automobile manufacturers collect large amounts of data on driving history and vehicle performance.
  6. A majority of automakers offer technologies that collect and wirelessly transmit driving history data to data centers, including third-party data centers, and most do not describe effective means to secure the data.
  7. Manufacturers use personal vehicle data in various ways, often vaguely to ā€œimprove the customer experienceā€ and usually involving third parties, and retention policies – how long they store information about drivers – vary considerably among manufacturers.
  8. Customers are often not explicitly made aware of data collection and, when they are, they often cannot opt out without disabling valuable features, such as navigation.

The report concludes ā€œThese findings reveal that there is a clear lack appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect and use personal driver informationā€.

Two major coalitions of automobile manufacturers recently issued a voluntary set of privacy principles. These principles are designed to demonstrate they are committed to protecting consumer privacy by ensuring transparency and choice, responsible use and security of data, and accountability.

Since the impact of these principles depends in part on how the manufacturers interpret them, in terms of consumer awareness, data collection disclosure, and data use security and accountability; and the inconsistent and incomplete state of security and privacy practices in the industry, the report calls for development of new standards that will ā€œprotect the data, security, and privacy of drivers in the modern age of increasingly connected vehiclesā€.

The National Highway Traffic Safety Administration (NHTSA), in consultation with the Federal Trade Commission (FTC) on privacy issues, would be designated to promulgate these standards.

The proposed legislation according to Markey will address these security and privacy concerns[6]:

Security

  • Requirement that all wireless access points in the car are protected against hacking attacks, evaluated using penetration testing;
  • Requirement that all collected information is appropriately secured and encrypted to prevent unwanted access; and;
  • Requirement that the manufacturer or third-party feature provider be able to detect, report and respond to real-time hacking events.

Privacy

  • Transparency requirement that drivers are made explicitly aware of data collection, transmission, and use of driving information;
  • Consumers can choose whether data is collected without having to disable navigation; and
  • Prohibition on the use of personal driving information for advertising or marketing purposes.

The legislation will also call for new cars to be evaluated by a rating system—a ā€œcyber dashboardā€ā€”that informs consumers about how well the vehicle protects drivers beyond those minimum standards.

This information will be displayed on the label of all new vehicles.

  1. http://en.wikipedia.org/wiki/Unsafe_at_Any_Speed
  2. http://en.wikipedia.org/wiki/Ralph_Nader
  3. http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf
  4. Report titled ā€œThe Scary Truth of How Terrorists Could Crash Your Car,ā€ published by AOL Autos about threats posed by the prevalence of software in automobiles.
  5. http://www.markey.senate.gov/news/press-releases/as-wireless-technology-becomes-standard-markey-queries-carcompanies-about-security-privacy
  6. http://www.markey.senate.gov/news/press-releases/markey-blumenthal-to-introduce-legislation-to-protect-drivers-from-auto-security-and-privacy-vulnerabilities-with-standards-and-cyber-dashboard

Filed Under: Articles, CERMĀ® Risk Insights Tagged With: Ed Perkins

« Introduction to Risk Terminology
Heat Welding of Plastics »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERMĀ® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Risk Prioritization in FMEA – a Summary
  • What Are Best Practices for Facilitating Qualitative Assessments?
  • So, What’s Still Wrong with Maintenance
  • Foundation of Great Project Outcomes – Structures
  • What is the Difference Between Quality Assurance and Quality Control?

© 2023 FMS Reliability Ā· Privacy Policy Ā· Terms of Service Ā· Cookies Policy

This site uses cookies to give you a better experience, analyze site traffic, and gain insight to products or offers that may interest you. By continuing, you consent to the use of cookies. Learn how we use cookies, how they work, and how to set your browser preferences by reading ourĀ Cookies Policy.