Skip to main content

Irdeto security expert: ‘Think maliciously to beat hackers’

Increased connectivity in transportation is a potential goldmine for hackers. To stop them, Stacy Janes at Irdeto says it’s important to think ‘maliciously’. Adam Hill talks to him about ITS’s weak points – and why turning up car radios could be enough to bring auto manufacturers to their knees
September 4, 2018 Read time: 7 mins
© dreamstime 96585012

“I was on the hacking team: my speciality was ‘malicious thinking’. I learned how to steal cars.” The speaker is Stacy Janes. He is charming and utterly disarming. Fortunately, he is not a hacker – rather, he is employed to stop hackers. And part of that involves thinking like one. He did not actually steal any vehicles, of course – he insists quickly – “but I knew how to break into different cars”. Now, as chief security architect - automotive at Irdeto, it is his business to know about the dark arts: “My fascination is how people break into things: homes, data, identities.”

If you want to beat the hackers, the answer is simple, he says: “Think maliciously!” As the ITS industry relies increasingly on data and connectivity – enjoying all the technological benefits that brings – businesses are finding themselves increasingly vulnerable to attack by people who want to steal information or disrupt the system, causing potentially massive financial harm. The parameters are always shifting: for instance, air gapping – a process by which secured computers were isolated from unsecured ones – was popular until a few years ago when it was shown to be vulnerable to ultrasonic sounds.
 

 

Mice survival


For this reason, Janes sees the ITS business as a battleground. “It’s intelligent engineer versus equally intelligent malicious hacker,” he insists. “It’s a cat-and-mouse game and your only aim is to be the cat. Lots of mice survive – but lots of mice don’t.”

Actually, Janes does not only view business in this way. “That goes for security on every level,” he says. “When you think of protecting your home, you’re going to take your basic steps.” He pauses, then adds with a smile: “You’ve probably never broken into someone’s home.”

Housebreaking is an analogy that works for businesses keen to protect their assets. “Every company has the same policy in response to a hack: panic!” he smiles sympathetically. But it does not have to be that way. It is important to look at those things we take for granted and accept that someone, somewhere, might want to be getting unauthorised access to them – whether that is our homes, our bank accounts, or the software that keeps our business running without interruption.

“Malicious third parties can get into the ecosystem,” he says. This goes for any ITS programme, and has the potential to make exciting developments such as Mobility as a Service (MaaS) especially vulnerable.

A connected car at a traffic light could be targeted. “The vehicle trusts the traffic light so get it to send encrypted information to the car,” Janes explains. “It’s like the weakest link in the chain – it becomes complicated very quickly. My car is taking information directly from traffic lights and is going to be taking less and less input from me.” Put like that, you can see immediately why security is so important. “All the cars are constantly changing,” he continues. “So you have a never-ending change in the ecosystem – and I’m getting less and less input.”
 

MaaS weakness


8356 MaaS is an obvious target and Irdeto has partnered with Conjure to produce Keystone, a secure system that allows vehicle owners to create and control policies around multi-user vehicle access, settings and usage. Customers need to know that the person who uses a car-share vehicle after them cannot access their data, for instance – while companies do not want people being able to use services they have not paid for. Owners can decide where and how other drivers can use the vehicle, with vehicle settings customised to each authenticated user.

Irdeto provides many other protection services for companies worried about their digital platforms. “Irdeto has been doing cybersecurity since ‘cyber’ was a thing,” Janes says. “We have so much expertise. The starting point was we have to protect the assets on your computer – and every few months there is a new vulnerability. It’s a rock that someone throws through the window.”

Once an intruder gets into the house, there needs to be some form of defence – so that even if you can get in, you can’t do anything harmful. “We’re the guard dog inside the house,” says Janes. “We don’t have to shut anything down because we can ensure that you’re not doing any damage.”

An original equipment manufacturer (OEM) might realise that its telematics is vulnerable, for example. “But they can’t release a fix overnight.” That’s not necessarily vital – so long as you are defended. “So the vulnerability gets him in to your system,” Janes continues. “But the next layer of security is there. We are actually attacked every day. It’s an active situation for us – and we know how to do this, we know this works.”

 

Jeep hack


‘Normal’ people are not necessarily thinking about the right things. “People don’t think maliciously,” smiles Janes. “They don’t realise that other people think that way.” The automotive industry is an interesting case. Hacking experts Charlie Miller and Chris Valasek deliberately tried to illustrate the vulnerability of car systems by remotely hacking a 1957 Jeep Cherokee in 2015, apparently controlling the steering and braking, according to an article in Wired magazine. It worked. “When the Jeep hack happened, they knew there was a problem – it got everyone’s attention,” says Janes. Fiat Chrysler recalled 1.4 million vehicles as a precaution.

The rise of connected and autonomous vehicles means that there are, potentially, multiple points of weakness for hackers to exploit. Asked to put his ‘malicious’ hat on, Janes considers how an enemy foreign government might approach this situation for gain - to disable the US road network, for instance. “The most malicious thing they can do…” he muses. “Well, I don’t have to bomb all the bridges if my state-based hacking team could shut down trucking. After a week, there is no food, there are riots, people turning on the government – and then you attack.” That sounds awful. “That’s the worst-case scenario,” he agrees. Clearly, thinking maliciously has something going for it.

On the other hand, he points out, trucks are one thing; to try and disable all the cars in North America would potentially be more difficult. But actually, you wouldn’t have to disable them at all. “Ransomware is a big thing – not to the owner, but to the OEM,” he explains. “So what if you turn all the [car] radios up to the max and then lock it there?”
 

OEM nightmare


For a manufacturer, this is a nightmare: cars being returned to dealerships by thousands of angry customers, all with a problem that you are unlikely to be able to fix quickly. “This is where fear comes into it,” Janes says. “Then you get the stories – the media interest.” That sort of negative publicity is potentially crippling to any brand. “That’s a more likely scenario than crashing all the cars,” he goes on. “You’re really hacking a person at the OEM.” The fear of what the ransomware can do – for example: “I can get to the fleet maintenance system to push malware out onto all the cars” – is what hackers will be trying to create.

For this reason, it pays to make things as difficult as possible for them. “Hacking is a business like any other,” he concludes. “If you make them spend $1 million to get $1 million, they’re not interested.” Not every system, therefore, has to be cast-iron and bulletproof. But it has to be good enough – and Stacy Janes does most of the worrying so that the rest of us don’t have to. He has an interesting perspective on business – one which perhaps we should all give a little more thought to as we go through our daily work routines. Another thing comes out of ITS International’s conversation with him, too: the realisation that you really want people like that on your side.

For more information on companies in this article

Related Content

  • Connected offers free I2V connectivity
    November 1, 2016
    A new system could reduce the cost of implementing I2V communications across a city to less than that for a single intersection, as Colin Sowman hears. It may seem too good to be true but US company Connected Signals is offering city authorities the equipment to provide infrastructure to vehicle (I2V) communications for free. The system enables drivers to receive information about the timing of signals they are approaching via the EnLighten smartphone app (or connected in-vehicle display).
  • AVs and bombs: a sinister possibility
    November 6, 2019
    Vehicle-ramming attacks by terrorists on pedestrians – often involving multiple fatalities - are sobering reminders of how cars and vans can be used for ill. But a recent court case in the UK highlights a sinister use of newer technology
  • Turning information into stories
    April 16, 2018
    IBTTA says its TollMiner tool can transform transportation planning. Here, the tolling organisation explains how it works – and what part it might play in Donald Trump’s infrastructure plan. Imagine being able to turn the black-and-white numbers in a spreadsheet into graphics and visualisations that tell a compelling story about essential transportation infrastructure. Having easy access to the solid, reliable data you need to plan surface transportation projects and assign project resources based on
  • The future of mobility: designed for life
    August 16, 2019
    The future of mobility…sounds exciting, doesn’t it? But try to define it and you soon find it’s like putting a fence round a cloud. What will it look like? When will we get there? Who decides? And why are we still not wearing jetpacks? Maybe next year. The Royal College of Art in London does not seem like the most obvious place to look for hard-headed thinking on these things. But it has a long heritage in designing beautiful cars – and it is also home to the Intelligent Mobility Design Centre, which is lo