car hackers
TRANSCRIPT
![Page 1: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/1.jpg)
Car Hackers
![Page 2: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/2.jpg)
Would the term "car hackers" come to mind if your car would not start.
![Page 3: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/3.jpg)
What if you were actually driving down the road and suddenly your streering wheel turned, your brakes didn't
work or your engine simply shut down.
![Page 4: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/4.jpg)
Would the term "car hackers" come to mind in that situation.
![Page 5: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/5.jpg)
For most of us the answer is probably not.
![Page 6: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/6.jpg)
But that may be changing quickly.
![Page 7: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/7.jpg)
In the early 1990's the World Wide Web began
to connect millions of us to the new and
thrilling online universe.
![Page 8: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/8.jpg)
It was not until a few years later that we began to hear warnings about the dangers of cyber attacks and viruses
and the problems they could cause.
![Page 9: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/9.jpg)
Well now those dangers not only lurk on our computers sitting on our desks, but also within the computers installed
into our vehicles.
![Page 10: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/10.jpg)
Car Hackers Lurk
![Page 11: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/11.jpg)
These hackers, using just the right series of computer commands, can now hack into vehicles anywhere, at any
time, whether they are parked of driving down the freeway at 60 MPH.
![Page 12: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/12.jpg)
We now live a world that many have come to call the "Internet of Things," meaning that we are all connected and
wired into a sometimes lawless, borderless, and in many cases, an insecure online world.
![Page 13: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/13.jpg)
And just how big is this world? In 2010 it was estimated that they were roughly 2 billion devices connected in some form
to the Internet.
![Page 14: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/14.jpg)
By 2020 that number is expected to grow to an
estimated 25 billion.
![Page 15: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/15.jpg)
This speed of growth in size, coupled with the inherent insecurity of the Internet itself, makes it almost impossible for effective security systems and measures to keep pace.
![Page 16: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/16.jpg)
This means that currently existing vulnerabilities are simply built into the constantly expanding connected world we live
in.
![Page 17: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/17.jpg)
When it comes to the cars we drive, even if a vehicle could be designed that was safe from car hackers and their abilities as they exist today, that vehicle would not be available for sale in a dealership showroom until 2018.
![Page 18: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/18.jpg)
In essence, it would already be three years behind the ever growing abilities of these hackers.
![Page 19: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/19.jpg)
Can We Keep Up With Car Hackers
![Page 20: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/20.jpg)
The car industry and governmental agencies alike are moving as fast as possible to address this issue, but each admits that they are playing catch up and truth be told,
don't ever really know how far they are behind in the first place.
![Page 21: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/21.jpg)
I won a classic car that was built in 1970.
![Page 22: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/22.jpg)
Its mechanical design is simple compared to that of today's vehicles.
![Page 23: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/23.jpg)
It also does not have a computer built into it.
![Page 24: Car hackers](https://reader033.vdocuments.net/reader033/viewer/2022061518/55d11ecbbb61ebdb398b47b5/html5/thumbnails/24.jpg)
It is not only cool as can be, it is also impervious to anything that car hackers can attempt to throw at it.