Page 44 - Arkansas Trucking Report Volume 22 Issue 6
P. 44

and weak or legacy passwords,”
                                                                                    Froat said of potential soft spots for
                 “THE WAKEUP CALL WAS TO SMALL- AND MEDIUM-                         cyber attacks. “For trucks, [National
                  SIZE CARRIERS AND BUSINESS OWNERS THAT ARE                        Highway Transportation and Security
                   UNAWARE THAT THEIR PERSONAL, DAY-TO-DAY                          Administration] guidelines and industry
                   PHISHING EMAILS AND MALWARE ACTIVITY CAN                         best practices describe connections from
                                                                                    the smartphone Bluetooth, infotain-
                  AFFECT PHYSICAL SYSTEMS SUCH AS TRUCKS AND                        ment/telematics, onboard router, and
                   AUTOMATED LOADING/UNLOADING PROCESSES.”                          any device that stores or communicates
                                                                                    data physically through onboard con-
                    —RUSS FROAT, AMERICAN TRUCKING ASSOCIATIONS’                    nections are cyber-intrusion vectors.”
                             DIRECTOR OF ENGINEERING AND IT                            It is important to know that manu-
                                                                                    facturers, technology suppliers and
                                                                                    service providers have extensive cyberse-
                 And given the importance of the   and medium-size carriers and business   curity standards and testing protocols,
              trucking industry, and the safe opera-  owners that are unaware that their   Froat said. But it also important to prac-
              tion of its vehicles, to the U.S. economy,   personal, day-to-day phishing emails   tice personal preventive cybersecurity.
              it is vital those systems be protected.  and malware activity can affect physical   “For one, never wirelessly or physi-
                 Froat, said the repercussions are   systems such as trucks and automated   cally connect a device to any part of a
              numerous and varied but the worst-  loading/unloading processes,” Froat   truck system without understanding
              case scenarios resulting from major   said. “It’s a shame that it did happen to   the cyber risks,” he said. “Same goes for
              cyberattacks would be, “impacting   TNT Express.                      company networks — you wouldn’t click
              freight commerce, U.S. economy, and   After WannaCry then Petya — not   on a link sent to you from a stranger’s
              commuter lockdown/slowing emergency   knowing how similar each intrusion   email or reply to a random message.
              responders.”                       vector was — it’s important for U.S.   Treating the truck as a company asset
                 Within the transportation indus-  fleets to take action in information   like your computer. It’s much easier to
              try, a summer cyberattack on FedEx’s   sharing to prevent it from happening to   wirelessly connect to a truck system
              European subsidiary TNT caused major   anyone else.”                  without a warning message popping up
              disruptions in operations and com-                                    to make you think twice.”
              munications. From June 28–Aug. 18   THREAT WATCH                         Froat said he knew of very few
              TNT disruptions meant “meaningful     New vehicle technologies, con-  attacks directed at motor carriers so
              volumes” were lost to competitors, espe-  nected systems for electronic logging   far. He mentioned a shipper whose
              cially in its express/overnight opera-  devices and maintenance, as well as   payments were misdirected because of
              tions, said analyst Thomas Wadewitz in   the all-pervasive cloud computing and   false orders placed by hackers and noted
              a message to clients.              its applications within the trucking   another instance in which disguised
                 FedEx put the price tag of the   industry, threaten to make carriers   hackers took loads from brokers, offered
              impact at $300 million and the lost   more susceptible to attacks. Froat said   the loads to carriers via broker boards,
              sales, coupled with other disruptions   the susceptibility comes when onboard   then took the brokers’ money and never
              like those caused by Hurricane Harvey,   electronics are connected with outside   paid the carriers.
              forced FedEx to cut its annual earnings   communications that control physical   “These are perceived to be the tip of
              forecast.                          systems via computer.              the iceberg when the chance of some-
                 Also in June, worm malware identi-  Part of the job for Froat — who got   one reporting an issue is less than 5
              fied as NotPetya crippled Danish ship-  his start as a mechanic with Penske   percent of the time,” Froat said. “These
              per A.P. Moller-Maersk for two weeks,   in Baltimore before embarking on an   $100,000 losses happen all the time
              costing close to $300 million in lost   electrical engineering degree — is to help   and never hit the FBI or DHS.”
              revenue in an attack that briefly shut   develop technology industry members   But so far, there are no reports of
              down the Port of Los Angeles’ biggest   can use to protect themselves from   anyone hacking digitally connected
              cargo terminal.                    cyber security threats.            trucking systems.
                 While alarming, Froat said he      That means identifying areas where
              didn’t think the transportation attacks   companies and trucks can be most vul-  SECURITY FORCES
              were a wakeup call to the larger carri-  nerable.                        The Technology and Maintenance
              ers and shippers, who have IT personnel   “For the companies themselves,   Council, a technical council of the
              and cybersecurity prevention methods.  it’s weak network security, network   ATA, has been recommending volun-
                 “The wakeup call was to small-   singularity, open internet access,   tary practices to solve industry issues

        44                                                                           Issue 6 2017  |  ARKANSAS TRUCKING REPORT
   39   40   41   42   43   44   45   46   47   48   49