Title: Driverless Technology and Hacking
1Driverless Technology and Hacking
2Some organizations predict that driverless
technology will integrate with the United States
economy as soon as five to ten years.
3 Some other countries focus on the advancement as
well while also attempting progress in the area
of electric vehicles.
4 Malware and hacking have been issues for several
years in relation to computers.
5 However, now that techniques in efficiency have
developed, internal computers now accommodate
modern vehicle designs.
6 That means hacking and malware now extend to the
zone of vehicles.
7 8A Response Behind Hacks into Driverless Technology
9A company named Uber desires to up levels of
security as soon as possible.
10 Recently, two individuals in the realm of
computer security, Charlie Miller and Chris
Valasek, have hacked into a Jeep Cherokee.
11 How does this affect other vehicles? They have
also gained access to a Ford Escape and Toyota
Prius.
12 Uber plans to battle against criminals with
similar capabilities yet evil intentions.
13 For this reason, the company has hired the two
security specialists along with scientists and
researchers in the tops of their fields to
establish a platform of safe commutes.
14 For driverless technology to take a firm yet
safe stand, they reason that certain
discrepancies need smoothing.
15Google lately has tested its driverless
technology with three example cars in the city
Austin, Texas.
16 The business claims that each car possesses
total awareness around itself in a surface as
long as two North American football fields, which
comes out to about 200 yards.
17 In a worst case scenario, an autonomous car
played stop and go with a motorcyclist behind
it.
18 In other news, motorists in local communities
reported the automobiles as excessively safe.
19 On the good side, the cars have yet to have a
hacking occur.
20 However, the potential remains.
21An Interest in the Safety of Driverless Technology
22On the flip side, Perrone Robotics and Mission
Secure remain as two organizations who achieved
the feat of hacking into and taking over the
controls of a custom vehicle with driverless
technology.
23 They mentioned that prevention of such attacks
could easily arise.
24 The two groups worked along the sides of the
Department of Defense and the University of
Virginia.
25While autonomous vehicles have quite a distance
to travel before reaching full autonomy, specific
persons have illuminated the safety problems
behind the methods.
26 Some groups develop the decision making
capacities of autonomous automobiles, while
others proceed with purposes in keeping
passengers inside safe from malicious strangers.
27 From military usage to traveler convenience, a
wide spectrum of investors devote time and
resources into the myriad of projects that
surround the future of driverless technology in
the United States.