| Recurring |
one_organization, multiple_organization |
(a) The software failure incident related to remotely hacking a car through a plug-in tracking device from insurance companies happened again at the same organization, Metromile. Student engineers from the University of California, San Diego examined a device from Mobile Devices used by auto insurer Metromile and discovered they could remotely engage a car's brakes or disable them completely by sending specially-coded text messages [38919].
(b) The incident of car hacking through plug-in tracking devices is not unique to a single organization. The article mentions that similar vulnerabilities have been demonstrated in the past with Chrysler vehicles, where security researchers showed how Chryslers could be hacked over the Internet, leading to a recall of 1.4 million cars [38919]. This indicates that the issue of car hacking through software vulnerabilities is not limited to a specific organization but is a broader concern across the automotive industry. |
| Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase can be seen in the article where researchers discovered a vulnerability in a plug-in tracking device used by auto insurer Metromile. They found that by sending specially-coded text messages, they could remotely engage a car's brakes or disable them completely. This vulnerability was due to flaws in the design of the device, allowing unauthorized access to a car's internal controls [38919].
(b) The software failure incident related to the operation phase is evident in the same article where it was mentioned that the vulnerability in the tracking device could be exploited if the car was at a slow crawl of 5 miles per hour or less. This indicates that the failure could occur during the operation of the vehicle, potentially leading to dangerous situations if the brakes were remotely engaged or disabled [38919]. |
| Boundary (Internal/External) |
within_system, outside_system |
(a) within_system: The software failure incident described in the article is primarily within the system. The vulnerability was related to a plug-in tracking device used by insurance companies that connects to a car's internal controls through the OBD-II port. The researchers were able to remotely engage a car's brakes or disable them completely by sending specially-coded text messages to the device. The flaw was within the design and implementation of the tracking device itself, allowing unauthorized access to critical car functions [38919].
(b) outside_system: The software failure incident also involved factors originating from outside the system. The vulnerability exploited by the researchers was related to the use of cellular networks to communicate with the tracking device. By sending text messages to the device, the hackers were able to manipulate the car's brakes remotely. This external communication channel provided a gateway for attackers to exploit the system, highlighting the risks associated with external connectivity and communication protocols [38919]. |
| Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident in the article was primarily due to non-human actions. The incident involved a vulnerability in a plug-in tracking device used by insurance companies, which allowed hackers to remotely engage a car's brakes or disable them by sending specially-coded text messages to the device [38919].
(b) However, human actions were also involved in addressing the software failure incident. The researchers who discovered the vulnerability presented their findings at a computer conference, and the device maker issued a software update in response to the identified flaw. Additionally, U.S. Senators introduced a bill to require measures to protect against hacking attacks in cars [38919]. |
| Dimension (Hardware/Software) |
hardware, software |
(a) The software failure incident in the article is related to hardware. The incident involved remotely hacking a car by tapping into a plug-in tracking device from an insurance company. The researchers were able to send specially-coded text messages to the device, which allowed them to remotely engage a car's brakes or disable them completely. This indicates that the failure originated from the hardware aspect of the tracking device [38919].
(b) The software failure incident in the article is also related to software. The researchers discovered that they could exploit vulnerabilities in the software of the tracking device to remotely control the car's brakes. The device received text messages, and through software manipulation, the researchers were able to take control of the car's internal controls. The device maker issued a software update to address the identified flaws, highlighting the software aspect of the failure [38919]. |
| Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident described in the articles is malicious in nature. Hackers were able to remotely hack into cars by exploiting vulnerabilities in the plug-in tracking devices from insurance companies. They could send specially-coded text messages to engage or disable a car's brakes, demonstrating the potential for serious harm [38919]. The incident highlights the dangers of malicious attacks on connected devices and the need for robust security measures to protect against such threats. |
| Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The software failure incident described in the article was primarily due to poor decisions made in the design and implementation of the plug-in tracking devices used by insurance companies. The devices were found to have serious vulnerabilities that allowed hackers to remotely engage a car's brakes or disable them completely by sending specially-coded text messages [38919]. These vulnerabilities were a result of inadequate security measures and oversight in the development of the devices, highlighting the poor decisions made by the manufacturers in ensuring the safety and integrity of the technology. |
| Capability (Incompetence/Accidental) |
development_incompetence, accidental |
(a) The software failure incident related to development incompetence is evident in the article as the researchers from the University of California, San Diego discovered a vulnerability in the plug-in tracking device from Mobile Devices used by auto insurer Metromile. They were able to remotely engage a car's brakes or disable them completely by sending specially-coded text messages to the device. This vulnerability highlights a lack of professional competence in the development of the device, as it allowed for potentially dangerous manipulation of a car's internal controls [38919].
(b) The software failure incident related to accidental factors is demonstrated by the unintentional vulnerability discovered in the plug-in tracking device. The researchers did not have to look very hard for flaws in the device, indicating that the vulnerability was not intentionally introduced but rather accidentally present in the design. This accidental flaw allowed for the potential remote manipulation of a car's brakes, highlighting the unintended consequences of the device's design [38919]. |
| Duration |
temporary |
The software failure incident described in the article is more aligned with a temporary failure rather than a permanent one. This incident was temporary because the failure was due to specific circumstances introduced by the vulnerability in the plug-in tracking device used by insurance companies to monitor driving behavior. The vulnerability allowed hackers to remotely engage a car's brakes or disable them, but the issue was addressed through a software update issued by the device maker [38919]. |
| Behaviour |
crash, omission, value, other |
(a) crash: The software failure incident described in the article can be categorized as a crash. The researchers were able to remotely engage a car's brakes or disable them completely by sending specially-coded text messages to the tracking device plugged into the car's computer port. This action led to a failure in the system's intended function of controlling the car's brakes, resulting in a potential crash risk [38919].
(b) omission: The incident also involves an omission failure. The tracking device, when manipulated by the researchers, omitted to perform its intended function of accurately tracking the car's movements and instead allowed unauthorized control over critical functions like braking [38919].
(c) timing: There is no specific mention of a timing-related failure in the article.
(d) value: The software failure incident can be linked to a value failure. The device, upon receiving the specially-coded text messages, performed its intended functions incorrectly by engaging or disabling the car's brakes inappropriately, compromising the safety and integrity of the system [38919].
(e) byzantine: The incident does not exhibit characteristics of a byzantine failure.
(f) other: The other behavior observed in this software failure incident is the potential compromise of the system's security and safety due to unauthorized access and control over critical functions of the car, highlighting a security vulnerability in the software system [38919]. |