{"id":4683,"date":"2016-10-07T12:18:47","date_gmt":"2016-10-07T16:18:47","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4683"},"modified":"2020-06-04T20:52:59","modified_gmt":"2020-06-04T20:52:59","slug":"hacking-uber","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/hacking-uber\/","title":{"rendered":"Hacking Uber\u2019s Self-driving Car: Using the Cloud to Takeover"},"content":{"rendered":"<p>Ever since the iCloud hack of <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/en.wikipedia.org\/wiki\/ICloud_leaks_of_celebrity_photos\">August 2014<\/a><\/span> we have known that our \u201ccloud\u201d based system of data storage is imperfect. What was commonly referred to as \u201c<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/twitter.com\/search?q=%23celebgate\">Celebgate<\/a><\/span>\u201d showcased the probable fallacies of the cloud system when 500 celebrities had their personal pictures hacked and displayed for the whole world see. The scare left cloud users weary of the platform, yet the system has persevered and is now at the forefront of concerns with autonomous motor vehicles.<br \/>\nAbout a month ago, Uber used the city of Pittsburgh as its flagship metropolis to introduce the first \u201c<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/newsroom.uber.com\/pittsburgh-self-driving-uber\/\">self-driving<\/a><\/span>\u201d Uber cars which provide a taxi like service for app users. In <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/techcrunch.com\/2016\/09\/14\/1386711\/\">mid-September the first autonomous car<\/a><\/span> gave a proud Steel city dweller a step into the future with a computer driven ride to her destination. Not surprisingly, the Uber company themselves noted that the primary reason for furthering this technology was the <em>alarming<\/em> safety issues surrounding conventional driving, noting that <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/newsroom.uber.com\/pittsburgh-self-driving-uber\/\">1.3 million<\/a><\/span> people are killed every year due to automobile related accidents.<br \/>\nThe introduction has been largely successful, however; one major hole exists which the law has been surprisingly quick to jump on. At the end of last month (September 20<sup>th<\/sup>) the Department of Transportation released a set of <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.transportation.gov\/AV\">federal cyber policy guidelines<\/a><\/span> for automated vehicles which specifically outlines acceptable procedures for autonomous cars. All of the policy reasons listed on the DOT\u2019s website cite safety as their primary concern behind the various regulations. An issue arose however when <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.legaltechnews.com\/id=1202768886167\/The-Legal-Tech-Blogosphere-Dishes-on-Cars-and-Cloud?mcode=0&amp;curindex=0&amp;curpage=ALL\">Chinese Cyber Security Researchers<\/a><\/span> were able to hack into self-driven cars from a distance of about 12 miles, and commandeer control over both the vehicle\u2019s locking and braking mechanisms.<br \/>\nIronically, with respect to the threats faced by an autonomous car,<\/p>\n<blockquote><p>issues with cyber security may rival or be greater than the issues surrounding the physical aspects of the innovation.<\/p><\/blockquote>\n<p>Using the cloud to hack into a celebrity\u2019s phone is one thing, but using the cloud to hack into a car driving itself though rush hour in downtown Pittsburgh is something else entirely. The dangers associated with this could be grave and the logical conclusions frightening, but the DOT and Uber are making positive strides to never let those scenarios see the light of day.<br \/>\nAt this point, Uber places a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/newsroom.uber.com\/pittsburgh-self-driving-uber\/\">safety driver<\/a><\/span> in each of the self-driven cars for obvious security reasons. This person is ready to fully engage the car and take over its controlling functions subject to bad road conditions, a failure in the technology, or any circumstance deemed necessary after an ocular pat down of the situation. Uber is hopeful\u2014and logical progression almost necessitates\u2014that in the very near future these technological hiccups will be fixed and a secure cloud based system will replace the safety driver producing a fully self-driven car.<br \/>\nThere is a growing number of <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.lawtechnologytoday.org\/2014\/08\/brief-cloud-computing-lawyers\/\">possible solutions to the various cyber security scares<\/a><\/span> which plague many of the <em>would-be<\/em> customers fearful of taking their first ride in the self-navigating <em>Ford Fusions<\/em>. Recently, various attorneys have developed a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.legaltechnews.com\/id=1202768491870\/10-Tips-for-Minimizing-Cloud-Security-Risks?mcode=1395244994797&amp;curindex=23&amp;curpage=2\">system of precautions<\/a><\/span> for their clients to keep in mind when negotiating cloud agreements for their respective cyber security departments. At the vanguard of these initiatives lies the risk allocation plans in the event of a data breach. Negotiating a company to include strict indemnity and liability clauses in its service agreement could add the extra incentive needed for a more infallible cloud. Finding the ultimate balance between safety and technology is a never-ending endeavor, but one thing is certain, the future is here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ever since the iCloud hack of August 2014 we have known that our \u201ccloud\u201d based system of data storage is imperfect. What was commonly referred to as \u201cCelebgate\u201d showcased the probable fallacies of the cloud system when 500 celebrities had their personal pictures hacked and displayed for the whole world see. The scare left cloud <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/hacking-uber\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4685,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4683"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4683"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4683\/revisions"}],"predecessor-version":[{"id":7165,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4683\/revisions\/7165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4685"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}