Tag: FBI

Cyber Threats Leave Vehicles Vulnerable

Car TechnologyWe have become reliant upon Bluetooth, WIFI, USB devices, and intelligent traffic communications within our vehicles. These features can improve fuel economy, reduce driver fatigue, and increase traffic safety, but it is all at a cost. Increased technologies can allow for dangerous breaches of security in vehicles. The Federal Bureau of Investigations and NHTSA recently published an alert regarding this automotive cybersecurity. 

Vulnerabilities may exist within wireless communication functions of a vehicle allowing an attacker to gain access to vehicle systems. In August 2015, a vehicle was studied in an unaltered condition which allowed cyber-attacks to affect engine speed, brakes, steering, door locks, turn signals, radio, and GPS. Obviously, this is disturbing to consumers who have advanced electronics in their vehicles. The bulletin by the FBI and NHTSA while providing important information, did not address why this could occur or how it would be prevented.

Software safety is not only a software issue, it is a system issue. Software related hazards must be identified, understood, and mitigated considering that software interfaces with hardware, humans, and other software. Software safety is an integral aspect of the overall system safety plan and the methodology is documented in a system safety plan process.

Software safety is not the same as software reliability or quality assurance. A pragmatic way to determine software safety is by incorporating a bilateral safety process.

First, software functional coverage is a process focusing on functional design and hazard identification. Secondly, software development coverage focuses on specific development tasks to ensure high quality software is safe. The bilateral approach is a strategy intended to cover all aspects of software that can impact safety. The approach requires a system hazard analysis to identify hardware and software causal factors, identification of software at critical levels which will impact the level of rigor tasks performed by the software development effort.

With each model year, vehicles become more integrated regarding communications. It is necessary for designers and manufacturers of intelligent transportation systems to undertake system safety planning of software to identify and eliminate said hazards to the extent reasonably possible.

Apple V FBI: A Battle Based in 1789

Apple PrivacyWith more than half of the US population using an Apple iPhone, the news of the battle about to play out between the mega tech company and the FBI is front and center.

The big question on everyone’s mind: can the government require Apple to decrypt the data of a terrorist suspect? The forthcoming battle and the answer to that question all circles back to the All Writs Act of 1789.

Listen in as Kevin King discusses the legal basis for the FBI’s request and how this battle is bringing privacy concerns to the forefront of public attention.

Want to hear more talks from Peter and Kevin King? Tune into WCIS 1010 AM Columbus, IN the first and third Friday of every month for People’s Law Talk.