Skip to content
Naked Security Naked Security

Congress looks to take the wheel on autonomous vehicles

With autonomous vehicles an obvious target for attack, moves by Congress to make their security a priority is a welcome start - but it's only a start

What is the US Congress doing to enable the upsides of the coming autonomous vehicle (AV) world and to protect everybody from the downsides?

Well, they’re discussing it. In some cases they’ve proposed legislation about it. What will actually get done and when is not yet clear.

What is clear is that so far, while cybersecurity and privacy are components of both discussion and legislation, the language is a long way from airtight, which could be a problem.

Autonomous vehicles (AVs), otherwise known as self-driving cars, are automatic targets. Given the massive amount of data collection and connectivity necessary to make such a system function, how could they not be?

The gleam in the AV industry’s eye is for hundreds of millions of “devices” to be collecting and sharing data – through V2V (vehicle to vehicle) communication – that will identify drivers and perhaps their passengers, track their location, speed, driving habits and more.

Besides the obvious privacy implications, that offers opportunities for hackers to take control of critical systems like brakes, steering, accelerator, locks etc, or demand a ransom to leave them alone. In short, AVs are a “target-rich environment”.

And, of course, multiple giants of both the auto industry and the internet – Ford, GM, Toyota, Google, Apple, Tesla, Uber, Lyft and more – are racing to get their models on the road.

So what is Congress doing?

The House Energy and Commerce Committee, in a rare display of bipartisanship late last week, unanimously approved the SELF DRIVE Act, which contains sections on both cybersecurity and privacy. The bill will now move to a vote in the full House.

Among other things, it would require manufacturers of any “highly automated vehicles” to have a cybersecurity plan that includes, “a process for identifying, assessing, and mitigating reasonably foreseeable vulnerabilities from cyber attacks or unauthorized intrusions, including false and spurious messages and malicious vehicle control commands.”

Its privacy provisions track pretty closely to the “Privacy Principles” issued in 2014 by the Alliance of Automobile Manufacturers and the Association of Global Automakers, which call for vehicle owners to be given “clear, meaningful notice” about the collection and use of driver data; “certain choices” about how it is collected, used and shared; along with other provisions about data security, minimization and de-identification and retention.

And Senator Edward Markey (D-Mass.) introduced a bill in March titled the Security and Privacy in Your (SPY) Car Act that would direct the National Highway Traffic Safety Administration (NHTSA) to “conduct a rulemaking” to protect against “unauthorized access” to the vehicle’s electronic controls or driver data.

Elsewhere in the Senate, autonomous vehicle cybersecurity got some lip service prior to a hearing titled “Paving the Way for Self-Driving Vehicles” before the Senate Committee on Commerce, Science, and Transportation about six weeks ago.

Committee chairman Senator John Thune (R-S.D.), along with ranking minority member Bill Nelson (D-Fla.) plus Gary Peters (D-Mich.), issued a list of bipartisan “principles”, the last of which declared that “cybersecurity should be a top priority for manufacturers of self-driving vehicles and it must be an integral feature of self-driving vehicles from the very beginning of their development”.

But Thune, in his opening statement at the hearing, didn’t even mention cybersecurity or privacy, and the witnesses didn’t include a cybersecurity expert or a privacy advocate.

The only witness who even brought those topics up was John M Maddox, president and CEO of the American Center for Mobility.

There is no word yet on when the committee will file legislation – Thune’s office had not responded to questions at the time of this post.

But, as numerous experts note, whatever the intent, legislative language frequently leaves a lot of, uh, wiggle room.

Who is going to define “reasonably foreseeable vulnerabilities” mentioned in the SELF DRIVE Act; or “reasonable measures to protect against hacking attacks” in the SPY Car Act?

Lee Tien, senior staff attorney at the Electronic Freedom Foundation, said “reasonable” can depend on what levels of security and privacy are “practically possible”.

“Cars have lots of parts,” he said. “They’re not all made by Ford or GM or whomever. There’s a lot of assembling of parts – hardware, software, firmware – made by other companies. Who has vetted those parts and their code? Who knows, at a deep level, what that code does? How much modeling of how the systems work together has been done?”

And regarding privacy, he noted that the Markey bill has a huge exception for “driving data stored as part of the EDR [event data recorder] system or other safety systems onboard … that are required for post-incident investigations, emissions history checks, crash avoidance or mitigation, or other regulatory compliance programs”.

“That could swallow the rule, frankly,” he said.

Some experts say Congress should stay out of it – that this is a problem for the private sector to solve.

Gary McGraw, vice-president of security technology at Synopsys, contends that,“the government won’t ever figure it out. They can’t figure out health care, so why would we think they can figure this out?

He said manufacturers are “paying a lot more attention to it. They’re working on it.” And he said he has some faith in the market as well. “This [security] could be a real differentiator for customers,” he said.

Indeed, security appears to be more of a “top priority” for the industry than it does for Congress.


5 Comments

Hope they get it right, ’cause if they don’t:
Future car thefts; Hack into a self driving car that is parked. Make it drive to a location where it parks on a platform, which is loaded into a container with a faraday cage, and taken down the street/overseas to be sold. Thieves won’t even have to be on the same continent to steel a car, or ever touch it.

Reply

If you can hack the car that heavily you can imagine that you might be able to get it to turn its “call home” feature off, so you wouldn’t need a Faraday cage – just park it somewhere else, and then sell it to the new “owner” online.

Bicycle thieves already do this: they “store” a stolen bicycle by chopping off the current lock, riding round the corner to a new location (without the bolt cutters, which are carried away by the motorcylist who took them to the scene of the crime) and locking it up again with a new lock.

Buyer collects from the new location.

Reply

I can see Michael Knight standing outside yelling; KITT come home, I won’t drive though anymore walls, I promise…

Reply

If manufacturers won’t even bother to fix something simple, like an ignition switch, without government intervention how much effort will they expend “doing the right thing” for privacy and security with something very complicated? And how can we have faith in the market when the problem is pervasive across all brands so that consumer’s only real choice in the matter is to avoid purchasing a new vehicle?

Reply

There are national security implications to this. Imagine if terrorists could command a thousand cars to drive straight at a parade or other target.

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!