Most Popular
1. Dow Max Drawdown Bear Stock Market 2022 - Accumulating Deviations from the Highs - 21st Feb 22
2.Putin Starts WW3 in Ukraine, Will Use Tactical Nuclear Weapons, China Prepares Taiwan Blitzkrieg - 28th Feb 22
3.World War 3 Phase 1 - Putin WINS Ukraine War! - 25th Feb 22
5.Will There Be A 2024 US Presidential Election? - 3rd Mar 22
6.Gold and SIlver, Precious Metals Sector Is at a Terrific Buy Spot - 6th Feb 22
7.Why Putin Wants the WHOLE of Ukraine - World War 3 Untended Consequences - 6th Feb 22
8.Dow Stock Market Expected Max Drawdown 2022 - 19th Feb 22
9.Stock Market Calm In the Eye of the Inflation Storm - 4th Mar 22
10.M = F - Everything is Waving! Stock Market Forward Guidance - 7th Mar 22
Last 7 days
Why APPLE Could CRASH the Stock Market! - 21st May 22
Why Is Crude Oil Ignoring US Inventories? - 21st May 22
Here is Why I’m Still Bullish on Gold Mining Stocks - 21st May 22
US Real Estate Investors – Is There An End In Sight? - 20th May 22
How Technology Affected the Gaming Industry - 20th May 22
How To Set And Achieve Reasonable Goals For Your Company - 20th May 22
How Low Could the Amazon (AMZN) Stock Price Fall? - 19th May 22
Bitten by FANG? Clocked by Cryptos? -- 'Air Pockets' Everywhere - 19th May 22
Northern General Hospital Orthopedics Fractures and and Ankle Clinic Consultations Real Patient Experience - 19th May 22
Cathie Wood Goes All in on Teladoc, ARKK INSANE Noob Investing Strategy! - 17th May 22
This is Anything but Positive for US Housing Market - 17th May 22
What Should We Do If There Is No Fed Monetary Policy Pivot? - 17th May 22
All Possible Ways to Earn Free Litecoin - 17th May 22
How low Could the Amazon Stock Price Fall? - 16th May 22
Cathy Wood ARKK INSANITY There is NO Coming Back! - 16th May 22
NASDAQ 100 Stock Market LOWER LOWS & LOWER HIGH - 16th May 22
Sanctions, trade wars worsen US inflation - 16th May 22
AI Tech Stocks Earnings BloodBath Buying Opportunity - 14th May 22
Futures Contract – Trading Crude Oil With USO - 14th May 22
How to Get Kaspersky Internet Security for 80% Discount! Do not Pay Renewal Price! - 14th May 22
Sagittarius A* Super Massive Black Hole Monster at Centre of Our Galaxy REVEALED! - 14th May 22
UK Public Debt Smoking Inflation Gun - 13th May 22
What Happens When the Stock Market Dip Keeps Dipping? - 13th May 22
Biden Seeks Inflation Scapegoats; Gold Advocate Wins GOP Primary - 13th May 22
Apple and Microsoft Nuts Are About to CRACK and Send Stock Market Sharply Lower - 12th May 22
The War on Gold Ensures the Dollar’s Downfall - 12th May 22

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

Moore's Law on Wheels - Your Car the Next Big Cyber Weapon?

Companies / Cyber War Nov 27, 2013 - 01:11 PM GMT

By: Money_Morning


William Patalon III writes: Since launching Private Briefing back in August 2011, we've been chronicling the escalating potential for cyber-warfare and cyber-terrorism. And with the cyber-assaults that China's People's Liberation Army (PLA) have been launching against America over the last year or so, it's a story that we've been following with an increasing amount of attention.

And our subscribers have made big money because of it.

For instance, in the March 15 Private Briefing report, "Double Your Money With this Cyber-Hacking of America Stock," we recommended AVG Technologies NV (NYSE: AVG), an Amsterdam-based cybersecurity whose shares we believed were good for a 100% gain in a year.

In reality it took only six months.

And in subsequent reports this summer, we recommended Kratos Defense & Security Solutions Inc. (Nasdaq: KTOS), a defense-and-cybersecurity stock that zoomed as much as 50% before surrendering some of those gains. We still have a double-digit profit in the stock. And we continue to like it for the long haul.

However, this whole cyber-hacking, -terrorism, -warfare story is more than just the latest profit opportunity - much more, in fact...

Far Out... But Totally Feasible

It's an ever-changing saga that will influence every aspect of our lives - including our personal safety, our constitutional rights, our economic well-being, and our national security. Earlier this year, for instance - in the China's Internet Army special report that we put together for you - we explained how Beijing-backed military hackers cyber-grabbed the designs for many of America's front-line weapons systems.

And in another special report - The Syria Crisis Survival Guide- we even gave you a glimpse of what a cyber war might look like (and made a special point of saying that the Pentagon believes that mainstream Americans - not military targets - would get the worst of such a skirmish).

Here at Private Briefing, those are the kinds of stories that we like to identify, and follow closely for you.

And that's why we zeroed in on the concept of "cyberjacking" - an act of computer-aided carjacking that's designed to either assassinate the vehicle's driver or passengers, or to turn the car into an actual weapon.

I know this sounds far out. But it isn't "tinfoil hat" stuff. You see, if it isn't totally feasible now, it soon will be.

And that's why the suspicious death of Michael Hastings immediately ignited all sorts of conspiracy theories - most of them centering on cyberjacking.

In our view, that makes cyberjacking a topic worth tackling for you.

Moore's Law on Wheels

My family still has the 1929 Model A Ford coupe that my grandfather William Patalon Sr. - my Dad's father - bought back in 1928. The tall, boxy (but gorgeous) tan coupe rolls on thin, orange-spoked wheels, and is a simple, simple piece of machinery.

The "plug wires" are flat pieces of bare copper that connect the four squat white Champion spark plugs to the gangly Bakelite distributor cap. The brakes are mechanical, operated by levered steel rods - and trust me, you have to stand on the brake pedal to really slow that baby down.

The tolerances on the gears in the 85-year-old three-speed manual tranny are so wide that, to keep it from grinding as you shift, you have to fill that gearbox with 600-weight gear oil; shifting gears in cold weather, before the car is warmed up, is like trying to stir hardening concrete with a plastic Slurpee straw.

Compare that with today's cars, which are like rolling testimonials to Silicon Valley - or a Space Shuttle on wheels.

In fact, the Institute of Physics says that NASA sent the Apollo astronauts to the moon back in 1969 using less computing power than you'll find in the typical family car - and we're not even talking about some top-of-the-line factory supercar.

Today's typical car contains as many as 50 different computers. They control the stereo display, the air conditioning system, the door locks, the air bags, and the ABS anti-lock brakes. The crucial computer is the "brain" that controls the motor, adjusting the air-fuel mixture, the engine emissions, the rate at which the sparkplugs fire, and the cooling system. More sophisticated cars will have special visual displays in the dash, satellite navigation systems, anti-theft devices, performance suspension systems.

In the old days when you wanted to "soup up" (hot rod) a car, you'd add a bigger carb, headers, a dual-point distributor, and a special camshaft and lifters. Today you can actually change the "chip" in the engine-management system, replacing the stock chip with one that tells the engine to start boosting the horsepower sooner, that is, at lower engine speeds, than you'd see at the factory settings.

You can even go out and spend thousands to add an aftermarket engine-management system that will help your car make even more power.

Then there's the software.

Today's typical luxury car has more than 100 million lines of computer code, while software and electronics account for 40% of the car's cost and half of warranty claims, John D. Lee, a professor at the University of Wisconsin-Madison's industrial and systems engineering department, told BusinessWeek earlier this year.

It's important to note (you'll see why in a moment) that performance isn't the only goal of all this technology. By connecting into these "systems" and reading the computer "error" codes, service technicians can diagnose problems and make repairs before those problems become a safety hazard or cause a total breakdown.

Thanks to the explosive growth we've seen in the sensors and wireless markets, cars will be able to transmit those error codes directly to your auto dealer or repair shop, letting your friendly neighborhood technician know that there's a problem now, or that there will be one soon.

And if you're talking about all the technology contained in today's cars, those four-dozen computers we mentioned are just the beginning.

There's also satellite radio, the built-in Bluetooth for your smartphone, remote starters for those cold days, GM OnStar, Ford Sync, Mercedes Mbrace, and BMW Assist. Those branded systems utilize 3G wireless data access and are backed up by permitting "non-secure" access via a cellphone modem for use in parts of the country not serviced by 3G coverage.

The world's top aircraft currently use "fly-by-wire" technology, which means that the control yoke in the cockpit connects to the control surfaces electronically - instead of by braided steel cables or simple hydraulics like in the old days.

Cars will soon have a similar "steer-by-wire" technology.

According to one report that I read, steering is still "mechanical" (direct linked) on all production vehicles... except for the 2014 Infiniti Q40.

You can bet that others will follow. And I'm betting that you can see where I'm going with this.

"We Will Control the Horizontal ... We Will Control the Vertical"

One of my favorite movies of all time is the original Inherit the Wind, a fictionalized account of the infamous Scopes Monkey Trial that pitted Clarence Darrow against three-time presidential candidate William Jennings Bryan.

There's a scene in that movie in which the Darrow character ("Henry Drummond," who is played by Spencer Tracy) is telling the (all-male) jury that progress always comes at a price.

"Gentlemen, progress has never been a bargain ... you have to pay for it," Tracy says. "Sometimes I think there's a man behind a counter who says, 'All right, you can have a telephone; but you'll have to give up privacy, and the charm of distance. Madam, you may vote; but at a price; you lose the right to retreat behind a powder-puff or a petticoat. Mister, you may conquer the air; but the birds will lose their wonder, and the clouds will smell of gasoline'."

In the age of cyber-terrorism, the technological progress that's taken us from my family's Model A Ford to the Infiniti Q40 has also come at a price. Those 50 computers we mentioned: They can be accessed via a powered data port that's not any different than the USB port on your notebook or desktop PC.

Technicians will tell you that it's usually located out of plain sight - up under the dash (detailed shop manuals on any vehicle can locate it precisely for you). By plugging a special small module into that port - something that requires just a few seconds' worth of access - a hacker can "Bluetooth-enable" your car's computer system.

And you have to believe that the best hackers (or those with the financial backing of a major government or military service) could figure out a way to access those computers through such onboard systems as OnStar.

At the DefCon 21 cybersecurity conference this summer, security engineers Charlie Miller and Chris Valasek claimed they were able to use a laptop to break into the software inside a Toyota Prius and Ford Escape. The Pentagon-funded duo said they were able to control the brakes, the accelerator, change the speedometer, flash the headlights, tighten the seat belts, and sound the horn - with a few simple keystrokes.

In a test drive for a magazine, Miller and Valasek used an Apple MacBook plugged into a Ford's electronics to speed up the car, slam on its brakes - and then to violently jerk the car's steering. In another test, they reportedly used an old Nintendo D-pad.

"Imagine you're driving down a highway at 80 [miles an hour]," Valasek said. "You're going into the car next to you or into oncoming traffic. That's going to be bad times."

Other so-called "white-hat" hackers - the folks who break into systems to identify vulnerabilities that need to be fixed - have had similar successes.

Also this summer, two Spanish experts said they were about to unveil a $22 device that they claimed would let them bypass the security in a car's electronic-control unit. One of those experts, a man named Javier Vázquez Vidal, said "it would take no time at all to gain total control over a vehicle - deploying an airbag, activating the brakes or immobilizing a car."

And back in 2011, researchers at the University of Washington and the University of California-San Diego reported being able to wirelessly hack into cars - "owning" the vehicle, as they called it. The researchers were worried enough about the security threat to refuse to identify the make-and-model vehicles that they cyber-jacked - not wanting their findings to be used by criminals.

Automakers were quick to claim that the systems of the vehicles they are building are secure - and would remain so.

Ford Motor Co. (NYSE: F) spokesman Craig Daitch told CNBC that "while an attack by a hacker who obtains physical access to a vehicle for a prolonged period of time is difficult to completely diminish, Ford has made strides in limiting the ways a hacker can fully take control of a vehicle."

And Toyota Motor Co. (NYSE ADR: TM) public affairs manager Cindy Knight told the popular financial cable channel that "cyber-security is an important issue for the entire automotive industry, from automakers to suppliers to the agencies that oversee motor vehicle safety. At Toyota, we take seriously any form of tampering with our electronic control systems. We strive to ensure that our electronic control systems are robust and secure and we will continue to rigorously test and improve them."

Even so, this is a growing cause for concern for law enforcement and safety officials - both here in America and in countries around the world. With each passing day, in fact, they have more and more to worry about.

And you can see why.

As our "steer-by-wire" example of the Infiniti Q40 underscores, with each new model year, technology takes control of an ever-increasing share of an auto's functions.

And they also have the development of autonomous (self-driving) vehicles to worry about.

We've all heard about the Google Inc. (Nasdaq: GOOG) program to develop self-driving cars. Even Congress and the Defense Advanced Research Projects Agency (DARPA), the military's research arm that helped create the Internet, have provided incentives for inventors to develop autonomous-vehicle technology.

A Deep Concern

Here in the United States, the National Highway Traffic Safety Administration (NHTSA) has launched a cybersecurity research program to investigate the potential for cyber-jacking.

In Senate testimony earlier this year, NHTSA Administrator David Strickland acknowledged that "these interconnected electronics systems are creating opportunities to improve vehicle safety and reliability, but are also creating new and different safety and cybersecurity risks. We don't want to be behind the eight ball."

A new office in that agency that focuses on the safety of vehicle electronics will study the risks to systems in cars, as well as those that "talk" with other vehicles.

European Cybercrime Center Director Troels Oerting says there are growing fears that in-car technologies will be hacked and used by organized crime for profit, competitive advantage, and even revenge.

The Cybercrime Center is a unit of Europol, the European Union (EU) law-enforcement agency.

"We are very concerned about the direction of car hacking," Oerting told CNBC recently. "Everyone [in the car industry] wants to make cars more helpful - for them to help with steering, parking, braking and even driving - but if you do this the downside is that someone will try to use this to their advantage, and for criminals, this would generally be for profit or revenge."

And the portrait he painted wasn't a pretty one.

If a car can be cyberjacked, what's to stop organized criminals from "eliminating" their enemies by using remote control to literally drive their enemy's vehicle off a bridge or a cliff, Oerting asked. In countries such as South Africa, where carjacking is already commonplace, gaining remote access to in-car technology would allow criminals to stop a car, unlock its doors and get to the driver very easily.

"Wireless technology is integrated into practically everything nowadays, and if there's wireless access to anything there's a possibility to remotely control it," Oerting cautioned.

Miller and Valasek, whose Pentagon-funded research was published in the whitepaper Adventures in Automotive Networks and Control Units, have precisely the same worry.

"Automobiles are no longer just mechanical devices," the two U.S. researchers wrote. "Today's automobiles contain a number of different electronic components networked together that as a whole are responsible for monitoring and controlling the state of the vehicle. Drivers and passengers are strictly at the mercy of the code running in their automobiles and, unlike when their Web browser crashes or is compromised, the threat to their physical well-being is real. You can't have safety without security."

Now you can see why folks were so quick to believe the Internet scuttlebutt about journalist Michael Hastings having been murdered. The odd timing and circumstances of the single-vehicle crash and explosion ignited suspicions. But it was easy to raise folks' hackles about the potential for such an assassination scenario.

The reason: The technology to allow such a scenario to play out already exists.

So trust us to stay on this story... to report back with updates... and to seek ways for you to make money.

To get Bill's Private Briefings automatically delivered to your inbox every morning, sign up right here. As you'll see, this is the best deal he's ever arranged for you - by far.

Source :

Money Morning/The Money Map Report

©2013 Monument Street Publishing. All Rights Reserved. Protected by copyright laws of the United States and international treaties. Any reproduction, copying, or redistribution (electronic or otherwise, including on the world wide web), of content from this website, in whole or in part, is strictly prohibited without the express written permission of Monument Street Publishing. 105 West Monument Street, Baltimore MD 21201, Email:

Disclaimer: Nothing published by Money Morning should be considered personalized investment advice. Although our employees may answer your general customer service questions, they are not licensed under securities laws to address your particular investment situation. No communication by our employees to you should be deemed as personalized investent advice. We expressly forbid our writers from having a financial interest in any security recommended to our readers. All of our employees and agents must wait 24 hours after on-line publication, or after the mailing of printed-only publication prior to following an initial recommendation. Any investments recommended by Money Morning should be made only after consulting with your investment advisor and only after reviewing the prospectus or financial statements of the company.

Money Morning Archive

© 2005-2019 - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.

Post Comment

Only logged in users are allowed to post comments. Register/ Log in