Are ghosts in our motoring machines an inevitability? Should we go back to the horse and buggy days?
Not necessarily. There is some good news, for the time being, anyway: Cars are singularly unattractive to most hackers because they're, well, so singular. The things that thrill hackers, namely notoriety, respect from peers, and everyone's favorite, cash, simply don't scale on individual cars like they do with "regular" computing exploits -- which can affect many thousands of people with each successful hacking attempt.
Also, the older your car is (and therefore the less electronically integrated), the fewer openings a would-be car hacker has from which to stage an attack.
On the other hand, if a malevolent hacker and his buddies:
- Have an axe to grind with you in particular
- Are hired by a business rival, a vengeful ex-lover or a political foe of yours
- Randomly pick you as a "project demonstration" for a new type of hack
... and you own a later model car, then they might consider it worthwhile to mess with your car.
Another thing to consider: desirable vehicles are also desirable to criminals, especially intelligent criminals who know their tech. High-end car thieves target expensive automobiles for two reasons: They fetch a good price and many would-be buyers don't ask questions about where they came from. But as security mechanisms on pricey (and now even mid-range) cars have gotten more sophisticated, so have the criminals.
The Holy Grail of car hacks is to snatch control of a car without ever having to physically touch it. On most current cars, which aren't connected to any outside networks such as the Internet, this isn't very practical. However, as more vehicles use wireless technology to connect with one another and with outside services like telematics, the vulnerabilities grow.
The University of California, San Diego, and University of Washington researchers noted that it's possible to hijack currently available vehicles remotely. In their report they wrote:
"We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exﬁltration and theft" [source: Savage, Stefan, et al].
In other words, hackers can get their grubby little mitts on certain vehicles, virtually, in multiple ways. In turn, they can take over many of the driving controls, track targeted cars, eavesdrop on conversations and steal cars outright.
Will they actually want to go through all the trouble, when there are much more efficient ways out there to steal and harass? That remains to be seen.