Cyber Threat: Transportation

Disabled Autos

Hyperconnectivity and driverless cars raise new cyber risks for automakers and their suppliers.
By: | April 7, 2014 • 7 min read
042014_03c_cars

Hacking into cars is not a future concern. It is possible now, and the potential danger will increase as carmakers continue to enhance connectivity features in automobiles.

But even that threat pales against the potential damage cyber attacks could wreak when driverless cars take to the roads for real.

Advertisement




One common perceived threat here and now comes from the ease of access that manufacturers have built in for drivers. If a driver can unlock a car door and start the engine using a cell phone, an unauthorized person can turn off that engine and lock the doors from a cell phone.

Taking a drive into the near future, could someone arrange for all of the cars on a Los Angeles freeway to have their engines turned off at the exact same time?

Even now, the ability to hack into and remotely control a car is a clear and present danger.

 Video: Behind the wheel of a car, you may be able to text, watch a movie or even sleep — if it’s a computer-controlled, driverless car. The WSJ’s Michael Kofsky heads to the test track to show how it works and safety questions it raises.

A pair of security engineers — doing their research with an $80,000 grant from the Pentagon — were able to hack into the systems of Toyota and Ford cars, and override a driver’s braking attempts, according to an account of the scenario in Forbes.

The pair was able to “demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers,” according to Forbes.

Expanding such abilities simultaneously to a fleet of cars is a feat yet to be accomplished.

“It could be possible to hack into one or another vehicle, but there is nothing that can stop the whole fleet at the same time,” said Mark Brooks, senior research engineer at the Southwest Research Institute (SwRI) in San Antonio. “Current levels of connectivity are not seen as major threats because they are not continuous.”

No One at the Wheel

“Even when a driver is using a navigation system, that is just a single download. The industry is much more concerned about continuous streaming back and forth, as with driverless cars,” he said.

Driverless cars rely on a number of sensors to operate, and are definitely vulnerable to attack, according to one of the hackers at the Def Con Hacking Conference in August.

“I’m a huge fan of unmanned vehicles,” said a hacker who goes by the name of Zoz to Venture Beat, a blog that focuses on technology. “I love robots. I think they’re the future. But, like everything else humans ever made, it’s going to get hacked.”

Google’s driverless car’s primary system is a “laser range finder mounted on the roof of the car,” which generates a 3D map of the area, according to IEEE, a technology professional organization.

R4-14p34-36_03Cars_ER.indd“The vehicle also carries other sensors, which include: four radars, mounted on the front and rear bumpers, that allow the car to ‘see’ far enough to be able to deal with fast traffic on freeways; a camera, positioned near the rear-view mirror, that detects traffic lights; and a GPS, inertial measurement unit, and wheel encoder, that determine the vehicle’s location and keep track of its movements.”

Zoz told Venture Beat that it would not require sophistication to attack and derail those sensors, and he pointed out that engineers in Iran were able to hack and capture a U.S. drone by “spoofing” the GPS and feeding it incorrect location information.

Death and destruction are always a worry when hackers can subvert an operating system, but apportioning liability is also a major concern, SwRI’s Brooks said.

Advertisement




“If there were any problems, whose fault would it be? The carmaker? The navigation OEM? The software company? The driver? These are the discussions everyone is starting to have.”

Those initial conversations can be difficult, said Dave Wasson, professional and cyber liability practice leader at brokerage Hays Cos. in Chicago.

“The issues are known. People are aware of the risks. But at the moment there is kind of a paralysis because it is unclear how to quantify these risks, and also because even if we could quantify them, there are very limited options yet in how to deal with them.”

A Flawed System

Wasson added that a reordering of the current liability structure is both necessary and inevitable. “Right now, you have a pull market, with small OEMs seeking coverage because the first-tier OEMs and carmakers demand that they be indemnified. But that is not sustainable. A client might demand a $15 million cover from a small supplier, but that cover could cost the supplier $50,000 when he only grosses $100,000 on the contract.”

It is a situation where bigger companies are offloading their risk management onto smaller ones, and that, Wasson said, is flawed.

“Even when the suppliers comply, often the package does not work the way either the supplier or the OEM client thinks it will,” he said.

“Eventually the large firms will realize that they need to take this as primary,” Wasson said. “They have the assets, the skills, the risk managers, and the brokerage relationships to get it done properly.

“Besides, they are the ones who are going to get sued. They can turn to their indemnification contracts, but if the small supplier with few assets goes bankrupt, then what? It’s the company with the badge on the car that people are going to go after.”

As those issues percolate, commercial vehicle operators have other challenges as well.

“One really big cyber issue for a logistics company or express delivery service would be to have the GPS signals for their vehicles scrambled, or the electronic shipment documents tampered with,” said Steve Surber, area vice president for Arthur J. Gallagher in Irvine, Calif.

A cyber attack could be used to divert a shipment, cover theft, tamper with cargo, or even just to delay a shipment that is time sensitive. And the theft could be of the truck or trailer itself, some of which are worth up to $60,000, he said.

On another level, hacking can be used to disrupt the loss control systems of trucking lines, many of which use GPS and electronic reporting to track their fleet performance, Surber said.

Cyber alterations of such reporting could hide potential liability issues such as speeding, sleeping, unauthorized stops, fuel diversion, or many other misdeeds by shippers, loaders, drivers or consignees.

“Companies already rely heavily on computer systems and networks to help with loss control,” he said.

Among insurers, coverage is still evolving, he added. “There is some coverage from cyber policies, but mostly we are still seeing claims handled through general liability.”

Wasson, at Hays Cos., said that while the cyber risk and liability markets are pull markets at present, with owners seeking to transfer risk, the business is not without push.

“We are energetic about working with our carriers,” he said. “There is coverage and there is capacity.”

Cyber Security Efforts

In April, an automotive consortium started revving up its efforts to enhance cyber security.

The Automobile Consortium for Embedded Security — a part of SwRI — includes automakers, original equipment manufacturers, other suppliers, and cyber security experts.

The program aims to provide “pre-competitive and non-competitive research in automotive embedded systems security to protect the safety, reliability, brand image, trade secrets and privacy of client members’ future products,” according to the organization.

Mark Brooks, senior research engineer, Southwest Research Institute

Mark Brooks, senior research engineer, Southwest Research Institute

“As soon as they start claiming their vehicles are secure, they would paint a target on themselves. It’s not like safety or fuel economy. With security, there are bad guys and you don’t want to attract their attention.”

The consortium, Brooks said, “is looking at emerging research both in new technologies and new protections for embedded security for the automotive world.”

“There are lots of theoretical threats,” he said, “but we want to be sure we are focusing our efforts on the most relevant ones.”

The unique challenge is that automakers want to enhance the protections in their vehicles, but ironically, it is not something they want to advertise.

“As soon as they start claiming their vehicles are secure, they would paint a target on themselves.

“It’s not like safety or fuel economy. With security, there are bad guys and you don’t want to attract their attention.”

He said that automakers also are hesitant to unilaterally invest in cyber security efforts.

Advertisement




“As we started talking to automakers, we found them eager to be part of developing security, but it’s tough for them to take the lead or commit a lot of money to something that will not help them sell cars,” Brooks said.

“They also don’t want to reinvent the wheel,” he said. “They are very interested in solving common problems with peer-reviewed research and applications.”

                                                                                                               

Complete coverage on the inevitable cyber threat:

Risk managers are waking up to the reality that the cyber risk landscape has changed.

Cyber: The New CAT. It’s not a matter of if, but when. Cyber risk is a foundation-level exposure that must be viewed with the same gravity as a company’s property, liability or workers’ comp risks.

042014_02c_hospital_thumbnailCritical Condition. The proliferation of medical devices creates a host of scary risks for the beleaguered health care industry.

Alaska Plane CrashUnmanned Risk. The dark side of remote-controlled drones, which have already been hacked — by students.

dv738024An Electrifying Threat. There is a very real possibility hackers could devastate the nation’s power grids — for a potentially extended period of time.

Gregory DL Morris is an independent business journalist based in New York with 25 years’ experience in industry, energy, finance and transportation. He can be reached at riskletters@lrp.com.
Share this article:

Risk Insider: Bob Morrell

Risk Technology: Risk Managers Lead from Within

By: | April 22, 2014 • 2 min read
Bob Morrell is CEO and Co-Founder of Riskonnect. He oversees the strategic vision and strategy of Riskonnect, a provider of risk management technology. Bob hones his competitive skills practicing mixed martial arts, along with his family. Bob can be reached at bob.morrell@riskonnect.com.

This year marks my twentieth in the risk management field.  Now I would never call myself a risk manager.  Far from it: I’m a computer geek, and proud of it.  Today we refer to the Internet, Cloud, Mobile and Big Data, but I’ve been working with technology my entire life.  So much has changed in those twenty years.  Networking computers together was rudimentary and extremely limited when I started.  Now everything, and everyone, is interconnected, and that has changed everything.

That interconnectivity has allowed organizations to move away from the isolated, siloed processes of the past, and produced dramatic changes in the way we conduct our business and our lives. I’ve watched risk management evolve from a department called upon primarily when things go wrong, to a pervasive philosophy for running a successful business.  Fewer and fewer risk managers I speak to work in isolation, reacting to claims as they come in.  Rather they are a collaborative lynchpin to manage risk.  They don’t wait for bad things to happen.  They proactively put safety programs in place, analyze loss data and make their organizations more risk-aware.  They know an enormous amount about the inner workings of their organization, its suppliers, distributors, vendors and team members.  This is a fundamental transition from a middle management, administrative function, to an executive level function that is key to the organization’s success.

But risk managers are increasingly finding that email and spreadsheets are clumsy, inefficient, and ultimately create obstacles to managing risk throughout their company.  With the speed and global reach of business, when even ‘local’ businesses rely on a far-flung supply chain, yesterday’s technology introduces risk, inefficiencies and increased levels of error. Today’s business demands technology that facilitates decisions for tomorrow’s business challenges. Organizations need a platform – a platform that provides secure, efficient and consistent methods of communicating risk-related events and data.  Fortunately this need comes at a time when we have a convergence of technologies that can make this vision a reality.

 This is a fundamental transition from a middle management, administrative function, to an executive level function that is key to the organization’s success.

Just imagine running your business on technology of twenty years ago.  Sending paper memos (when CC referred to a literal ‘carbon copy’), using a phone tethered to your desk, taking delivery of policy documents in hard copy – oh wait, they still do that.  Would that put your business at a competitive disadvantage?  Of course it would – and risk management would suffer too.

Risk management no longer has to take a back seat to other parts of the organization. Quite the opposite. By leveraging commercial cloud platforms, the pervasiveness of the Internet and the interconnectivity of everyone and everything, the risk management team can be the most modern, forward-looking part of the company. Risk management has become the bellwether of change – actually bearing the standard for technology-enabled collaboration and productivity across the organization. Imagine that.

Share this article:

Sponsored: Healthcare Solutions

The Promise of Technology

A roundtable in Philadelphia explores the power of technology in WC and its potential to take us where we have never been before.
By: | December 10, 2014 • 7 min read

SponsoredContent_HCS
The field of workers’ compensation claims management seems ideally suited as a proving place for the power of technology.

Predictive analytics in the hands of pharmacy and medical management experts can give claims managers the data they need to intervene in troublesome claims. Wearables and other mobile technologies have the potential to give healthcare providers “real-time” reports on the medical condition of injured workers.

Never before have the goals of quick turnaround and transparency in managing claims appeared so tantalizingly achievable.

In the effort to learn more about technology’s potential, in September, Risk & Insurance® partnered with Duluth, Ga.-based Healthcare Solutions to convene an information technology executive roundtable in Philadelphia.

The goal of the roundtable was to explore technology’s promise and to gauge how advancements are serving the industry’s ultimate purpose, getting injured workers safely back to work.

 

Big Data, Transparency and the Economies of Scale

Integration is a word often heard in connection with workers’ compensation claims management. On one hand, it refers to industry consolidation, as investors and larger service providers seek to combine a host of services through mergers and acquisitions.

In another way, integration applies to workers’ compensation data management. As companies merge, technology is allowing previously siloed stores of data to be combined. Access to these new supersets of data, which technology professionals like to call “Big Data,” present a host of opportunities for payers and service providers.

Through accessible exchange systems that give both providers and payers better access to the internal processes of vendors, a service provider can show the payer the status of the claim across a much broader spectrum of services.

SponsoredContent_HCS“One of the things I see with all of this data starting to exchange is the ability to use analytics to predict outcomes, and to implement workflows to intervene.”
–Matthew Landon, Vice President of Analytics, Bunch CareSolutions.

“Any time that we can integrate with a payer across multiple products such as pharmacy, specialty and PPO services, what it does is gives us a better picture of the claim and that helps us to drive better outcomes,” said roundtable participant Chuck Cavaness, chief information officer for Healthcare Solutions.

Integration across multiple product lines also produces economies of scale for the payer, he said.

Big Data, according to the roundtable participants, also provides claims managers an unparalleled perspective on the cases they manage.

“One of the things that excites us as more data is exchanged is the ability to use analytics to predict outcomes, and to implement workflows to intervene,” said roundtable participant Matthew Landon, vice president of analytics with Lakeland, Fla.-based Bunch CareSolutions, A Xerox Company.

Philadelphia roundtable participant Mike Cwynar, vice president of Irvine, Calif.-based Mitchell International, agrees with Landon.

Jerry Poole, President and Chief Executive Officer, Acrometis

Jerry Poole, President and Chief Executive Officer, Acrometis

“We are utilizing technology to consolidate all of the data, to automate as many tasks as we can, and to provide exception-based processing to flag unusual activity where claims professionals can add value,” Cwynar said.

Technology is also enabling the claims management industry to have more productive interactions with medical providers, long considered one of the Holy Grails of better case management.

Philadelphia roundtable participant Jerry Poole, president and CEO of Malvern, Pa-based claims management company Acrometis, said more uniform and accessible information exchange systems are giving medical providers access to see how bills are moving through the claims manager’s process.

“The technology is enabling providers to call in or to visit a portal to figure out what’s happening in the process,” Poole said.

More efficient data storage and communication is also resulting in quicker turnaround times, which is shortening the duration of claims and driving down the overall cost of risk, according to Cwynar.

 

Going Mobile

Another area where technology is moving the industry forward, according to the Philadelphia technology roundtable participants, is mobile technology, which is being used to support adjustors and case managers and is also contributing to quicker return to work and lower costs for payers.

The ability to take a digital tablet to a meeting with an injured worker or a health care provider is allowing case managers to enter data and give feedback on a patient’s condition in real time.

“Our field-based case managers have mobile connectivity to our claims systems that they use while they’re out of the office attending doctor’s appointments, and can enter the data right there into the system, so they’re not having to wait until they are back at the office to enter critical clinical documentation,” said Landon.

Injured workers that use social media, e-mail and the texting function on their mobile phones are staying in better touch with those that are charged with insuring that they are in compliance with their treatment plans.

Wearable devices that provide in-the-moment information about an injured workers’ condition have the potential to recreate what is known in aviation as the “black box,” a device that will record and store the precise physical state of an employee when they were injured. Such a device could also monitor their recovery process.

But as with many technologies, worker and patient privacy also needs to be observed.

“At the end of the day, we need to make sure that we approach technology enhancement that demonstrates value to the client, while ensuring patient advocacy,” Landon said.

Consolidation

As payers and claims managers set out to harness the power of computing in assessing an injured worker’s condition and response to treatment, the cycle of investment in companies that serve the workers’ compensation space is currently playing a significant role.

The trend of private equity investing in companies that can establish one-stop shopping for such services as medical case management, bill review, pharmacy benefit management and fraud forensics has huge potential.

SponsoredContent_HCS“Any time that we can integrate with a payer across multiple products such as pharmacy, specialty and PPO services, what it does is gives us a better picture of the claim and that helps us to drive better outcomes.”
— Chuck Cavaness, Chief Information Officer, Healthcare Solutions.

The challenge now facing the industry, one the information technology roundtable participants are confident it can meet, is integrating those systems. But doing so won’t happen overnight.

“There’s a lot of specialization in the industry today,” said Jerry Poole of Acrometis.

Years ago there was a PT network. Now there’s a surgical implant guy, there’s specialized negotiations, there’s special investigations, said Poole.

The various data needs to be integrated into an overall data set to be used by the carriers to help lower the cost of risk.

“Consolidating all these providers will take standardization of communication pathways and it will likely be led by the vendors,” Poole said.

 

Securing Sensitive Information

Long before hackers turned the cyber defenses of major national retailers inside out, claims management professionals have focused increased attention on the protection of data shared across multiple partners.

Information security safeguards are changing and apply to what technology pros refer to “data at rest,” data that is stored on a particular company’s servers, and “data in flight,” data that is transferred from one user to another.

Michael Cwynar

Michael Cwynar, Vice President, Mitchell International

Mitchell’s Cwynar said carriers want certification that every company their data is being sent to needs to have that information and that both data at rest and data in flight is encrypted.

The roundtable participants agreed that the industry is in a conundrum. Carriers want more help in predictive analytics but are less willing to share the data needed to make those predictions.

And as crucial as avoiding cyber exposures and the corresponding reputational damage is for large, multinational corporations, it is even more acute for smaller companies in the workers’ compensation industry.

Healthcare Solutions’ Cavaness said the millions in loss notification and credit monitoring costs that impact a Target or a Home Depot in the case of a large data theft would devastate many a workers’ compensation service vendor.

“They’d be done in a minute,” Cavaness said.

The barriers to entry in this space are higher now than ever before, continued Cavaness, and companies wishing to do business with large carriers have the burden of proving that its security standards are uncompromising.

In Reality

Workers’ compensation risk management in the United States is by its very nature, complex and demanding. But keep in mind that those charged with managing that risk get better results year after year.

Technology has a proven capability to iron out the system’s inherent complications and take its more mundane tasks off of the shoulders of case adjustors.

The roundtable members agreed that the business goals of a lower cost of risk and an even more productive workforce will follow.
SponsoredContent
BrandStudioLogo

This article was produced by the R&I Brand Studio, a unit of the advertising department of Risk & Insurance, in collaboration with Healthcare Solutions. The editorial staff of Risk & Insurance had no role in its preparation.




Healthcare Solutions serves as a health services company delivering integrated solutions to the property and casualty markets, specializing in workers’ compensation and auto liability/PIP.
Share this article: