According to Forbes, the customs and border control service (CBR) and the immigration customs service (ICE) use a set of tools called IVE from Berla automotive forensic forensics. The IVE set includes a mobile application for the identification of the vehicle, a hardware kit for access to media systems and specialized software for data analysis. According to state contracts, in August CBP spent more than $ 380,000 on Ive. ICE, which has been buying Berla tools since 2010, spent $ 500,000 on IVE in September.
Mobile application Ive
Group of Privacy Defenders Surveillance Technology Oversight Project (S.T.O.P.) stated that cars are also stored on passengers, and they also store data about passengers and The police can extract them using special tools. According to S.T.O.P., in 2020, law enforcement agencies gained access to on -board computers hundreds of thousands of times. Moreover, loopholes in laws allow you to access the data about the car, information from the phone and accounts connected to the machine in web services without a warrant.
Forbes mentioned a recent search for the 2019 Dodge Chamber car, which was used to transport illegal citizens across the border from Mexico to the United States. The police were able to access the information and entertainment system of the car and collected a wide range of information-the location of the suspect, user passwords, email addresses, IP addresses and phone numbers.
Investigator of the Bureau for Alcohol, Tabacle, Firemates and Explosives (Bureau of Alcohol, Tobacco, Firearms and Explosives, ATF) said that media systems in modern cars can be used to collect a large amount of data, as well as for remote spying behind the phone connected to the car.
ATF confirmed that this method of collecting information is available in more than 10,000 different BMW, Buick, Cadillac, Chevrolet, Chrysler, Dodge, Fiat, Ford, GMC, Hummer, Jeep, Lincoln, Maserati, Mercedes, Mercury, Pontiacy, Pontiacy, Pontiacy, Pontiacy , Ram, Saturn, Toyota and Volkswagen. Moreover, Tesla information and entertainment systems store Google and Spotify services, as well as Wi-Fi passwords, etc.
We previously wrote about how to hack a car remotely without even starting the engine. Within the framework of such a cyber attack, we can unlock certain functions in the vehicle, remove software restrictions, etc.