  {"id":16710,"date":"2016-11-17T22:29:32","date_gmt":"2016-11-18T03:29:32","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/"},"modified":"2016-11-17T22:29:32","modified_gmt":"2016-11-18T03:29:32","slug":"dude-wheres-my-car-car-hacking-in-the-digital-age","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/","title":{"rendered":"Dude, Where\u2019s My Car? Car Hacking in the Digital Age"},"content":{"rendered":"<p style=\"text-align: center\"><strong>Dude, Where\u2019s My Car? Car <span style=\"text-decoration: line-through\">Jacking<\/span> Hacking in the Digital Age<\/strong><\/p>\n<p>In 2015, Chrysler recalled over 1.4 million vehicles after hackers proved that they could remotely hijack a Jeep\u2019s digital control systems over the internet.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> In a popular <a href=\"https:\/\/www.wired.com\/video\/hackers-wireless-jeep-attack-stranded-me-on-a-highway\">video<\/a> posted to Wired Magazine\u2019s website, hackers Charlie Miller and Chris Valasek demonstrated how they could use the internet to gain wireless control of thousands of vehicles from their laptop.<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a> Using what\u2019s known in the cyber security industry as a \u2018zero-day\u2019 exploit\u2014a previously undiscovered vulnerability in an operating system that\u2019s been there since the system was coded\u2014Chris and Charlie were able to use the 2015 Jeep Grand Cherokee\u2019s internet-connected entertainment system to send commands to the vehicle\u2019s steering, brakes, transmission, radio, and dashboard functions.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> To prove how powerful (and dangerous) their discovery was, the two hackers seized control of a Jeep driven by a Wired reporter in an experiment, cutting the vehicle\u2019s transmission and bringing it from 70mph to a dead-stop on a highway outside St. Louis.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a><\/p>\n<p style=\"text-align: center\">\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-16693 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Jeep-Hacked-300x225.jpg\" alt=\"jeep-hacked\" width=\"492\" height=\"369\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Jeep-Hacked-300x225.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Jeep-Hacked.jpg 582w\" sizes=\"auto, (max-width: 492px) 100vw, 492px\" \/>Photo Credit: Wired.com<\/p>\n<p>How is this possible you ask? The answer lies in the rush by automakers like Chrysler to \u201cturn the automobile into a smartphone.\u201d<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> Automakers have competed with each other to offer internet connected services for entertainment, navigation and safety\u2014features that earn the companies significant recurring monthly revenue streams long after a car drives off the lot.<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> In the push to get internet-enabled features into vehicles, automakers like Jeep parent Fiat Chrysler have generally failed to secure them from digital attack. Chris\u2019 and Charlie\u2019s discovery of a vulnerability in the \u2018UConnect\u2019 internet-connected computer found in thousands of new vehicles produced by Fiat Chrysler gave them access to the most critical functions of a vehicle.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> The UConnect software enables Chrysler vehicles to connect to the internet for entertainment and navigation purposes while also enabling drivers to make phone calls and have access to wifi.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> In all, Chris and Charlie estimate that there are as many 471,000 vehicles vulnerable to their UConnect hack.<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16691 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands-300x165.png\" alt=\"no-hands\" width=\"502\" height=\"276\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands-300x165.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands-768x423.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands-1024x565.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands-600x331.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/No-Hands.png 1440w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/>Photo Credit: Wired.com<\/p>\n<p>How did Chris and Charlie discover a vulnerability in UConnect? Simple: they signed up for mechanics accounts on Chrysler\u2019s website and downloaded technical manuals and wiring diagrams for vehicles including the Jeep Grand Cherokee used in their demonstration.<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a> Luckily, the two hackers were cybersecurity researchers and readily shared their discovery with Chrysler, allowing the company to fix the security flaw in a massive recall.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a> While the recall was embarrassing and costly for Chrysler, no one was hurt and the vulnerability Chris and Charlie discovered has since been fixed according to the company.<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> But the success of the two hackers in rendering a $45,000 vehicle inoperable points to larger issues\u2014namely, why was it so easy for two researchers to find a way in?<\/p>\n<p>&nbsp;<\/p>\n<p>While Chrysler quickly developed and distributed a patch to fix the zero-day exploit utilized by Chris and Charlie, the incident should serve as a wakeup call to automakers\u2014and makers of internet connected devices everywhere\u2014to the need to think about cybersecurity when designing, building and installing internet connected devices. Chris and Charlie argue that their discovery shows the need to build better protections into vehicles before automotive hacking becomes a practical threat.<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a> How has Chrysler responded? By embracing the work of the two hackers and offering an industry-first $2,500 \u201cbug bounty\u201d to hackers who inform the company of new security flaws discovered in its vehicles.<a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a> But Chris and Charlie worry that automakers are moving too slow. In August of this year, just days after the hackers presented findings at the annual Black Hat conference that showed Chrysler\u2019s patch hadn\u2019t completely shut off outside access to the UConnect system, police in Houston, Texas arrested two men accused of using their laptop to steal 30 Jeeps over a six-month period.<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a> The thieves are accused of hacking Chrysler\u2019s DealerCONNECT software to reprogram vehicles\u2019 security systems to accept a generic key and remotely start them.<a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a> The Department of Homeland Security estimates that over 100 Fiat Chrysler vehicles have been stolen nationwide using similar methods.<a href=\"#_ftn17\" name=\"_ftnref17\">[17]<\/a><\/p>\n<p style=\"text-align: center\">\n<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16688 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-300x200.jpg\" alt=\"Charlie Miller (right) a security researcher at Twitter,  and Chris Valasek (left), director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo \u00a9 Whitney Curtis for WIRED.com)\" width=\"434\" height=\"289\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-300x200.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-768x512.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-1024x683.jpg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-600x400.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers.jpg 1800w\" sizes=\"auto, (max-width: 434px) 100vw, 434px\" \/>Photo Credit: Wired.com<\/p>\n<p>While there are certainly a myriad of benefits to internet-connected vehicles, including Tesla\u2019s innovative over-the-air software updates that improve vehicle functionality and emissions performance, automakers everywhere must recognize that they are responsible for protecting consumers from the dangers of connecting vehicles to the internet of things. In an age when a webcam can take down the internet (<a href=\"http:\/\/www.telegraph.co.uk\/technology\/2016\/10\/24\/hackers-used-hijacked-webcams-to-bring-down-internet\/\">seriously<\/a>), companies everywhere must change their business and operating models to reflect this new responsibility. For automakers, these changes look like more robust testing and de-bugging of internet connected devices and a commitment to employing leading cybersecurity measures. Government regulations must also be updated to reflect the challenges posed by the internet of things. Regulations should hold automakers accountable for protecting consumer safety in the same way that they currently mandate crash-testing and seatbelt use.<\/p>\n<p>&nbsp;<\/p>\n<p>(Word Count: 783)<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> Greenberg, Andy. &#8220;Hackers Remotely Kill A Jeep On The Highway&#8211;With Me In It.&#8221;\u00a0<em>Wired<\/em>\u00a021 July 2015<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> Greenberg, Andy. &#8220;The Jeep Hacker Are Back to Prove Car Hacking Can Get Much Worse.&#8221;\u00a0<em>Wired<\/em>\u00a01 Aug. 2016<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> Greenberg, Andy. &#8220;The Jeep Hacker Are Back to Prove Car Hacking Can Get Much Worse.&#8221;\u00a0<em>Wired<\/em>\u00a01 Aug. 2016<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> Greenberg, Andy. &#8220;The Jeep Hacker Are Back to Prove Car Hacking Can Get Much Worse.&#8221;\u00a0<em>Wired<\/em>\u00a01 Aug. 2016<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> Greenberg, Andy. &#8220;The Jeep Hacker Are Back to Prove Car Hacking Can Get Much Worse.&#8221;\u00a0<em>Wired<\/em>\u00a01 Aug. 2016<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> Greenberg, Andy. &#8220;The Jeep Hacker Are Back to Prove Car Hacking Can Get Much Worse.&#8221;\u00a0<em>Wired<\/em>\u00a01 Aug. 2016<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> Lewis, Brooke A. &#8220;Police: Suspects Used Laptops to Steal Cars in Houston Area.&#8221;\u00a0<em>Houston Chronicle<\/em>. N.p., 4 Aug. 2016. Web. 14 Nov. 2016.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> Lewis, Brooke A. &#8220;Police: Suspects Used Laptops to Steal Cars in Houston Area.&#8221;\u00a0<em>Houston Chronicle<\/em>. N.p., 4 Aug. 2016. Web. 14 Nov. 2016.<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> Lewis, Brooke A. &#8220;Police: Suspects Used Laptops to Steal Cars in Houston Area.&#8221;\u00a0<em>Houston Chronicle<\/em>. N.p., 4 Aug. 2016. Web. 14 Nov. 2016.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Will hackers soon have us all saying &#8220;dude, where&#8217;s my car?&#8221;<\/p>\n","protected":false},"author":2188,"featured_media":16711,"comment_status":"open","ping_status":"closed","template":"","categories":[513,2378,2377,2309,2019,2376],"class_list":["post-16710","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-car","category-car-hacking","category-chrysler","category-hacking","category-internet-of-things","category-jeep"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Will hackers soon have us all saying &quot;dude, where&#039;s my car?&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/\",\"name\":\"Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Car-Hackers-2.jpg\",\"datePublished\":\"2016-11-18T03:29:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Car-Hackers-2.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Car-Hackers-2.jpg\",\"width\":1800,\"height\":1200,\"caption\":\"Charlie Miller (right) a security researcher at Twitter, and Chris Valasek (left), director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo \u00a9 Whitney Curtis for WIRED.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/dude-wheres-my-car-car-hacking-in-the-digital-age\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dude, Where\u2019s My Car? Car Hacking in the Digital Age\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/","og_locale":"en_US","og_type":"article","og_title":"Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management","og_description":"Will hackers soon have us all saying \"dude, where's my car?\"","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/","og_site_name":"Technology and Operations Management","og_image":[{"width":1800,"height":1200,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/","name":"Dude, Where\u2019s My Car? Car Hacking in the Digital Age - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-2.jpg","datePublished":"2016-11-18T03:29:32+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-2.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Car-Hackers-2.jpg","width":1800,"height":1200,"caption":"Charlie Miller (right) a security researcher at Twitter, and Chris Valasek (left), director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo \u00a9 Whitney Curtis for WIRED.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/dude-wheres-my-car-car-hacking-in-the-digital-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Dude, Where\u2019s My Car? Car Hacking in the Digital Age"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/2188"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=16710"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/16710\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/16711"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=16710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=16710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}