Notices
Off Topic A place to boldly go off topic. Just about anything goes.

Texting & Vehicle Break-ins

Old 08-21-2011, 03:58 AM
  #1  
Senior Member
Thread Starter
 
Join Date: Mar 2007
Location: New Jersey
Posts: 1,734
Likes: 0
Received 0 Likes on 0 Posts
Post Texting & Vehicle Break-ins

This interesting Associated Press article appeared in national newspapers on August 21, 2011:

Texting and driving donít go well together ó though not in the way you might think.

Computer hackers can force some cars to unlock their doors and start their engines without a key by sending specially crafted messages to a carís anti-theft system. They can also snoop at where youíve been by tapping the carís GPS system.

That is possible because car alarms, GPS systems and other devices are increasingly connected to cellular telephone networks and thus can receive commands through text messaging. That capability allows owners to change settings on devices remotely, but it also gives hackers a way in.
Researchers from iSEC Partners recently demonstrated such an attack on a Subaru Outback equipped with a vulnerable alarm system, which wasnít identified. With a laptop perched on the hood, they sent the Subaruís alarm system commands to unlock the doors and start the engine.

Their findings show that text messaging is no longer limited to short notes telling friends youíre running late or asking if theyíre free for dinner. Texts are a powerful means of attack because the devices that receive them generally cannot refuse texts and the commands encoded in them. Users canít block texts; only operators of the phone networks can.
These devices are assigned phone numbers just like fax machines. So if you can find the secret phone number attached to a particular device, you can throw it off by sending your own commands through text messaging.
Although these numbers are only supposed to be known by the devicesí operators, they arenít impossible to find.

Certain network-administration programs allow technicians to probe networks to see what kinds of devices are on them. Based on the format of the responses, the type and even model of the device can be deduced. Hackers can use that information to craft attacks against devices they know are vulnerable. (In this case, the researchers bypassed these steps and simply took the alarm system out of the car to identify the secret phone number.)

Actually stealing a car wouldnít be so easy. Youíd have to ensure that the phone number you found is attached to the car youíre standing in front of, for instance. There are hacking tools to do that ó they listen for cellular traffic around a particular vehicle ó but in many cases itís easier to take a car that doesnít have an alarm.

The research from Don Bailey and Mat Solnik is unsettling because it shows that such attacks are possible on a variety of other devices that use wireless communications chips. Those include ATMs, medical devices and even traffic lights. Hackers have already sent specially crafted texts with commands to instantly disconnect iPhones from the cellular network.

Bailey, whose specialty is cell phone network security, also found that similar techniques can be used to get a certain type of GPS system to cough up its location data. Such information can be used by stalkers or home burglars, for instance.
Cuda340 is offline  
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
Nero
Off Topic
1
04-04-2007 09:28 AM
Jeremiah 29:11
Challenger News
1
01-09-2007 10:15 PM
Jeremiah 29:11
Off Topic
0
11-22-2006 08:00 AM
joeyr
General Dodge Challenger Discussions
5
08-13-2006 08:21 PM


Quick Reply: Texting & Vehicle Break-ins


Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

© 2019 MH Sub I, LLC dba Internet Brands

 
  • Ask a Question
    Get answers from community experts
Question Title:
Description:
Your question will be posted in: