39.6 F
Indianapolis
Thursday, April 25, 2024

Texting, grand theft auto style; alarms pose risk

More by this author

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

SAN FRANCISCO (AP) — Texting and driving don’t go well together –

though not in the way you might think.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Computer hackers can force some cars to unlock their doors and

start their engines without a key by sending specially crafted

messages to a car’s anti-theft system. They can also snoop at where

you’ve been by tapping the car’s GPS system.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

That is possible because car alarms, GPS systems and other devices

are increasingly connected to cellular telephone networks and thus

can receive commands through text messaging. That capability allows

owners to change settings on devices remotely, but it also gives

hackers a way in.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Researchers from iSEC Partners recently demonstrated such an attack

on a Subaru Outback equipped with a vulnerable alarm system, which

wasn’t identified. With a laptop perched on the hood, they sent the

Subaru’s alarm system commands to unlock the doors and start the

engine.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Their findings show that text messaging is no longer limited to

short notes telling friends you’re running late or asking if

they’re free for dinner.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Texts are a powerful means of attack because the devices that

receive them generally cannot refuse texts and the commands encoded

in them. Users can’t block texts; only operators of the phone

networks can.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

These devices are assigned phone numbers just like fax machines. So

if you can find the secret phone number attached to a particular

device, you can throw it off by sending your own commands through

text messaging.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Although these numbers are only supposed to be known by the

devices’ operators, they aren’t impossible to find. Certain

network-administration programs allow technicians to probe networks

to see what kinds of devices are on them. Based on the format of

the responses, the type and even model of the device can be

deduced. Hackers can use that information to craft attacks against

devices they know are vulnerable. (In this case, the researchers

bypassed these steps and simply took the alarm system out of the

car to identify the secret phone number.)

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Actually stealing a car wouldn’t be so easy.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

You’d have to ensure that the phone number you found is attached to

the car you’re standing in front of, for instance. There are

hacking tools to do that – they listen for cellular traffic around

a particular vehicle – but in many cases it’s easier to take a car

that doesn’t have an alarm.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The research from Don Bailey and Mat Solnik is unsettling because

it shows that such attacks are possible on a variety of other

devices that use wireless communications chips. Those include ATMs,

medical devices and even traffic lights. Hackers have already sent

specially crafted texts with commands to instantly disconnect

iPhones from the cellular network.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Bailey, whose specialty is cellphone network security, also found

that similar techniques can be used to get a certain type of GPS

system to cough up its location data. Such information can be used

by stalkers or home burglars, for instance.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The type of GPS system he studied is known as assisted GPS, which

means that it uses cellular signals in addition to the usual

satellite signals. That makes the system vulnerable.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The research isn’t just about taking off with someone else’s car or

finding out where that person has been.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

It raises the possibility of other, more sinister dangers, such as

those potentially affecting braking and acceleration, said Scott

Borg, director of the U.S. Cyber Consequences Unit, a group that

studies hacking threats. That becomes possible as networked

electronics are more tightly coupled with physical

machinery.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

“Doing one that is harmful is quite hard, but we need to prepare

for people doing that,” Borg said.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The research got the attention of a trade group for electric

utilities, the North American Electric Reliability Corp. After the

pair showed off the techniques at the Black Hat security conference

in Las Vegas this month, the group warned that the types of

wireless chips exploited by the pair are also used at power plants

and said that more caution is needed in their use.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The vulnerable GPS system was made by Zoombak Inc., which promotes

its products’ usefulness in tracking children and automobiles. The

company said it has made changes to its devices, so that outside

parties can no longer get location data without

passwords.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Bailey and Solnik are working with the manufacturer of the car

alarm system to fix its vulnerabilities. Bailey said the

unidentified manufacturer has fixed many of the security

issues.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Bailey said stricter security standards are needed.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

“We’re so excited to use technology that we’re deploying it too

quickly and not really thinking about the impact of security,” he

said.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Online:

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 13px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Video demonstration of attack:Ā 

“text-decoration: none; color: #000066;” href=

“http://bit.ly/n6axTv” target=

“-blank”>http://bit.ly/n6axTv

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“text-decoration: none; color: #000066;” rel=”item-license” name=

“e39ec6c0-44a1-442f-8505-c3e8bef5afcd” href=

“http://hosted.ap.org/dynamic/stories/U/US_TEC_AUTO_THEFT_BY_TEXTING?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2011-08-19-10-12-31#e39ec6c0-44a1-442f-8505-c3e8bef5afcd”>

Ā© 2011Ā The

Associated Press. All rights reserved. This material

may not be published, broadcast, rewritten or

redistributed.Ā Learn more about our

“text-decoration: none; color: #000066;” href=

“http://hosted2.ap.org/APDEFAULT/privacy”>Privacy

PolicyĀ andĀ 

href=”http://hosted2.ap.org/APDEFAULT/terms”>Terms of Use.

- Advertisement -
ads:

Upcoming Online Townhalls

- Advertisement -

Subscribe to our newsletter

To be updated with all the latest local news.

Stay connected

1FansLike
1FollowersFollow
1FollowersFollow
1SubscribersSubscribe

Related articles

Popular articles

EspaƱol + Translate Ā»
Skip to content