GROUNDZERO
Posts : 461 Reputation : 24 Join date : 2013-03-01
| Subject: Richard Clarke: Hastings Accident “Consistent with a Car Cyber Attack” Tue Jun 25, 2013 2:46 pm | |
| Richard Clarke: Hastings Accident “Consistent with a Car Cyber Attack”“Intelligence agencies… know how to remotely seize control of a car.”Kurt Nimmo Infowars.com June 24, 2013 Richard Clarke. Photo: National Communications SystemFormer U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarketold The Huffington Post on Monday that the fatal crash of journalist Michael Hastings’ Mercedes C250 coupe last week is “consistent with a car cyber attack.”“There is reason to believe that intelligence agencies for major powers” — including the United States — know how to remotely seize control of a car,” Clarke said.On Saturday, Infowars.com posted a video of a talk presented by Dr. Kathleen Fisher, a program manager for DARPA, the Defense Advanced Research Projects Agency, an agency of the United States Department of Defense responsible for the development of new technologies. Fisher admitted that the Pentagon has researched remotely controlling cars through hacking on board computers.In 2011, Car and Driver magazine published an article substantiating the Pentagon research. “Currently, there’s nothing to stop anyone with malicious intent and some computer-programming skills from taking command of your vehicle. After gaining access, a hacker could control everything from which song plays on the radio to whether the brakes work,” writes Keith Barry, citing research conducted by the Center for Automotive Embedded Systems Security, a partnership between the University of California San Diego and the University of Washington.“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,” Clarke told The Huffington Post. “You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”Clarke was careful not to directly implicate the government in hacking Hastings’ car. “So if there were a cyber attack on the car — and I’m not saying there was,” he said, “I think whoever did it would probably get away with it.”He also put credence in the FBI’s claim – despite claims to the contrary by associates of the writer – that the agency was not investigating him. “I believe the FBI when they say they weren’t investigating him,” said Clarke. “That was very unusual, and I’m sure they checked very carefully before they said that.”“I’m not a conspiracy guy. In fact, I’ve spent most of my life knocking down conspiracy theories,” said Clarke. “But my rule has always been you don’t knock down a conspiracy theory until you can prove it [wrong]. And in the case of Michael Hastings, what evidence is available publicly is consistent with a car cyber attack. And the problem with that is you can’t prove it.”Despite the overwhelming evidence that Michael Hastings was targeted and assassinated for his journalism – most notably his story resulting in the fall of Gen. Stanley McChrystal and remarks on NSA surveillance – the establishment media continues to portray the attack on Hastings as the delusional meanderings of conspiracy theorists. Clarke’s comments serve as the latest pièce de résistance in an unfolding drama revealing just how far the government will go to silence critics and truth tellers.Prior to his murder, Hastings said the Obama administration had declared war on the press. His desire to go into hiding – expressed in an email mere hours before his assassination – demonstrates the ability of the government to monitor opponents by using a well-developed NSA surveillance grid and take executive action against investigative journalists and others who dare to stand up to the national security state. | |
|
quietobserver Super Elite
Posts : 2707 Reputation : 131 Join date : 2013-02-06
| Subject: Re: Richard Clarke: Hastings Accident “Consistent with a Car Cyber Attack” Sun Jul 07, 2013 7:58 pm | |
| Document & FYI I'm not looking to sow a spirit of fear, just wanted to 'share' a little bit. I'm trying to find out if its available somewhere online. Packet Sniffing and Targeted Probing. To begin, we Used CARSHARK to observe traffic on the CAN buses In order to determine how ECUs communicate with each other. This also revealed to us which packets were sent as we activated various components (such as turning on the headlights). Through a combination of replay and informedprobing, we were able to discover how to control the radio,the Instrument Panel Cluster (IPC), and a number of theBody Control Module (BCM) functions, as we discussbelow. This approach worked well for packets that comeup during normal operation, but was less useful in mappingthe interface to safety-critical powertrain components."Even at speeds of up to 40 MPH on the runway, the attack packets had their intended effect, whether it was honking the horn, killing the engine, preventing the car from restarting, or blasting the heat. Most dramatic were the effects of De- viceControl packets to the Electronic Brake Control Module (EBCM) — the full effect of which we had previously not been able to observe. In particular, we were able to release the brakes and actually prevent our driver from braking; no amount of pressure on the brake pedal was able to activate the brakes. Even though we expected this effect, reversed it quickly, and had a safety mechanism in place, it was still a frightening experience for our driver. With another packet, we were able to instantaneously lock the brakes unevenly; this could have been dangerous at higher speeds. We sent the same packet when the car was stationary (but still on the closed road course), which prevented us from moving it at all even by flooring the accelerator while in first gear.These live road tests are effectively the “gold standard” for our attacks as they represent realistic conditions (unlike our controlled stationary environment). For example, we were never able to completely characterize the brake behavior until the car was on the road; the fact that the back wheels were stationary when the car was on jack stands provided additional input to the EBCM which resulted in illogical behavior. The fact that many of these safety-critical attacks are still effective in the road setting suggests that few DeviceControl functions are actually disabled when the car is at speed while driving, despite the clear capability and intention in the standard to do so.Engine.Most of the attacks against the engine were found by fuzzing DeviceControl requests to the ECM. These findings are summarized in Table V-A. We were able to boost the engine RPM, disturb engine timing by resetting the learned crankshaft angle sensor error, disable all cylinders simultaneously (even with the car’s wheels spinning at 40 MPH when on jack stands), and disable the engine such that it knocks excessively when restarted, or cannot be restarted at all. Additionally, we can forge a packet with the “airbag deployed" bit set to disable the engine. Finally, we also discovered a packet that will adjust the engine’s idle RPM.Brakes. Our fuzzing of the Electronic Brake Control Module (see Table IV) allowed us to discover how to lock individual brakes and sets of brakes, notably without needing to unlock the EBCM with its DeviceControl key. In one case, we sent a random packet which not only engaged the front left brake, but locked it resistant to manual override even through a power cycle and battery removal. To remedy this, we had to resort to continued fuzzing to find a packet that would reverse this effect. Surprisingly, also without needing to unlock the EBCM, we were also able to release the brakes and prevent them from being enabled, even with car’s wheels spinning at 40 MPH while on jack stands.HVAC. We were able to control the cabin environment via the HVAC system: we discovered packets to turn on and off the fans, the A/C, and the heat, in some cases with no manual override possible. | |
|