  {"id":16187,"date":"2016-11-17T17:57:29","date_gmt":"2016-11-17T22:57:29","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/"},"modified":"2016-11-17T17:57:29","modified_gmt":"2016-11-17T22:57:29","slug":"thinking-of-getting-a-connected-tesla-beware-the-risks","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/","title":{"rendered":"Thinking of getting a connected Tesla? Beware the risks."},"content":{"rendered":"<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium\" src=\"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg\" alt=\"Tesla Model S\" width=\"628\" height=\"417\" \/><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>As the internet and wireless connectivity become ubiquitous, we are leveraging technology in ways that were impossible twenty years ago. Insurance companies such as Progressive, Allstate and State Farm are now offering discounts in exchange for plugging a dongle that tracks acceleration and speed into your car. Automakers such as Ford, Jeep, and Tesla are adding networked services to their cars. These developments in networked technology offer significant advantages to automakers attempting to deliver on their customer promise &#8211; convenience, analytics, and improved safety come to mind immediately. However, these new technologies are not without their risks. As technology proliferates in the auto industry, automakers seeking to leverage this technology must be deliberate about how they deal with the risks. One example of both success and failure in this arena is Tesla.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Cost<\/strong><\/h3>\n<hr \/>\n<p>Tesla motors has leapt to a leadership position in the high end electric car business. Tesla has made electric cars sexy and implemented a number of industry leading features. The Model S features on-demand internet radio, an in dash navigation system that adjusts to real-time traffic, and WiFi and internet connectivity among other features. All Tesla cars come standard with \u201cthe hardware needed for full self-driving capability at a safety level substantially greater than that of a human driver.\u201d [1] This is an incredibly exciting development, but also an incredibly risky one. Researchers at Keen Security Lab in China were able to take full remote control of a Tesla Model S. They demonstrated opening the trunk, manipulating the seat position, windshield wipers, and causing the car to brake. All of this was accomplished remotely from a laptop with no prior physical access to the car.[2] Fortunately, in this instance, the team that discovered the vulnerability was a responsible team of professional security researchers. They reported the bug to Tesla prior to releasing their discovery to the wild. This will not always be the case. Vulnerabilities like this sell for millions on the open market. Can you imagine how much the NSA would pay for the ability to listen to the blue tooth mic in Putin\u2019s Mercedes?<\/p>\n<h3><strong>Benefit<\/strong><\/h3>\n<hr \/>\n<p>At the same time that the Internet of Things(IoT) creates new risks, it also generates new benefits. In the above example, Tesla fixed the issue via an over the air software update before Keen Security published their proof of concept exploit. In a similarly beneficial incident, Tesla issued a recall for a charging adapter that overheated and potentially caused fires. Rather than have Tesla owners return to the dealer, they issued an over the air update which corrected the issue. [3] These two examples demonstrate how the IoT can be a double edged sword. Providing safety and security on the one hand and putting the same at risk on the other.<\/p>\n<h3><strong>Analysis<\/strong><\/h3>\n<hr \/>\n<p>So, how should Tesla address this? First, they must recognize the issue. As John Villasenor has said \u201cUnintended linkages are the rule, not the exception.\u201d [4] Tesla has not seen this yet, but Jeep has. A security team was able to disable the brakes and accelerator by hacking into the entertainment system. Tesla should learn from this failure. Second, they must audit the code prior to deployment. It is difficult to audit their own code. They should either form an independent security team or hire a third party to perform penetration testing. Third, they must balance time to market with security considerations. At this point, that should be relatively easy as Tesla is leading the game. As competitors catch up, there will be more and more psychological pressure to take shortcuts in order to cut time to market. They must resist this urge. The downside of some hacker taking control of a car and driving it through some busy area far outweigh whatever incremental benefit they get from being first to market. Finally, and this one is controversial, they should open source portions of their software for non-commercial use. This is controversial because it potentially surrenders their advantage over other automakers. However, a number of large companies (i.e. Google, Apple, Microsoft, AMD) have open sourced proprietary software and benefited from the added development. This also allows some hedge against the potential downside as then the entire community is responsible instead of Tesla alone. If Tesla follows these four items, they will be well positioned to dominate the smart car market.<\/p>\n<p>The IoT provides an as of yet unrealized amount of opportunity for integration, modification, convenience, and analytics. It is tempting to run full throttle towards these benefits. This is unwise and companies must remain cognizant of the security implications of their developments. If they do not, government will step in to regulate and they are not well equipped to understand the details and nuances of secure development. It is in everyone\u2019s best interest that corporate America not allow technology to outpace security.<\/p>\n<p>&nbsp;<\/p>\n<p>Word Count: 799<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Citations:<\/strong><\/h3>\n<hr \/>\n<p>[1] \u201cTesla Model S Features,\u201d <a href=\"https:\/\/www.tesla.com\/models\">https:\/\/www.tesla.com\/models<\/a><\/p>\n<p>[2] Keen Security Lab by Tencent, \u201cCar Hacking Research: Remote Attack Tesla Motors,\u201d \u00a0<a href=\"http:\/\/keenlab.tencent.com\/en\/2016\/09\/19\/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars\/\">http:\/\/keenlab.tencent.com\/en\/2016\/09\/19\/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars\/<\/a><\/p>\n<p>[3] James C. Chen, \u201cPart 573 Defect Information,\u201d <a href=\"http:\/\/www-odi.nhtsa.dot.gov\/acms\/cs\/jaxrs\/download\/doc\/UCM448668\/RCDNN-14V006-9349.pdf\">http:\/\/www-odi.nhtsa.dot.gov\/acms\/cs\/jaxrs\/download\/doc\/UCM448668\/RCDNN-14V006-9349.pdf<\/a><\/p>\n<p>[4] John Villasenor, \u201cFive Lessons On The &#8216;Security Of Things&#8217; From The Jeep Cherokee Hack,\u201d<\/p>\n<p><a href=\"http:\/\/www.forbes.com\/sites\/johnvillasenor\/2015\/07\/27\/five-lessons-on-the-security-of-things-from-the-jeep-cherokee-hack\/#51208c9f204a\">http:\/\/www.forbes.com\/sites\/johnvillasenor\/2015\/07\/27\/five-lessons-on-the-security-of-things-from-the-jeep-cherokee-hack\/#51208c9f204a<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you enter the connected world of cars, be sure you understand the dangers!<\/p>\n","protected":false},"author":2008,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","categories":[2271,2044,845,129,2309,128],"class_list":["post-16187","hck-submission","type-hck-submission","status-publish","hentry","category-auto-industry","category-cyber_security","category-cybersecurity","category-electric-car","category-hacking","category-tesla"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"As you enter the connected world of cars, be sure you understand the dangers!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/\",\"name\":\"Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.blogcdn.com\\\/www.autoblog.com\\\/media\\\/2012\\\/09\\\/lead5-2012-tesla-model-s-fd-1347337015.jpg\",\"datePublished\":\"2016-11-17T22:57:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.blogcdn.com\\\/www.autoblog.com\\\/media\\\/2012\\\/09\\\/lead5-2012-tesla-model-s-fd-1347337015.jpg\",\"contentUrl\":\"http:\\\/\\\/www.blogcdn.com\\\/www.autoblog.com\\\/media\\\/2012\\\/09\\\/lead5-2012-tesla-model-s-fd-1347337015.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/thinking-of-getting-a-connected-tesla-beware-the-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Thinking of getting a connected Tesla? Beware the risks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/","og_locale":"en_US","og_type":"article","og_title":"Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management","og_description":"As you enter the connected world of cars, be sure you understand the dangers!","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/","og_site_name":"Technology and Operations Management","og_image":[{"url":"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/","name":"Thinking of getting a connected Tesla? Beware the risks. - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/#primaryimage"},"thumbnailUrl":"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg","datePublished":"2016-11-17T22:57:29+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/#primaryimage","url":"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg","contentUrl":"http:\/\/www.blogcdn.com\/www.autoblog.com\/media\/2012\/09\/lead5-2012-tesla-model-s-fd-1347337015.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/thinking-of-getting-a-connected-tesla-beware-the-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Thinking of getting a connected Tesla? Beware the risks."}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/2008"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=16187"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16187\/revisions"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=16187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=16187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}