Lessons to Learn

By Jon Allen

Jon Allen, a principal at Booz Allen Hamilton, is a leader in the firm's manufacturing, high tech, and retail business, focusing on automotive and industrial manufacturing clients. 

It is hard to miss the frightening headlines about car hacking scenarios.  But in reality, there’s more to automotive cyber security. Hackers may be individuals seeking financial gain, or groups that have an issue with a particular brand, and even state actors who see vehicles as gateways to massive personally identifiable information (PII) hauls. The threat scenarios will vary, but stealing data is the most likely motivation.

The real stories we’ll see will look like this: a hacker lurks in back-end systems and vehicle networks to extract data and sell it or holds it for ransom. A nation state’s cyber offense team manipulates indicators, like a gas gauge, to sow confusion and distrust among drivers, undermining a particular company’s brand. Unlike the attention-grabbing research done by white hat hackers—like the 2015 Jeep hack or Zubie vulnerability identified in 2014 – future hackers won’t simply focus on headline-grabbing vehicle takeovers. They’ll seek to take advantage of this irresistible mix of personal, payment, and behavioral data that our connected cars increasingly collect.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:Tech/CyberTagged with:

Related Articles

Search

Close