«З боку Росії знову з’являється спроба впливати на політичний і безпековий порядок в Європі», – наголосив Петр Фіала
…
U.S. auto safety regulators have launched another investigation of Tesla, this time tied to complaints that its cars can come to a stop for no apparent reason.
The government says it has 354 complaints from owners during the past nine months about “phantom braking” in Tesla Models 3 and Y. The probe covers an estimated 416,000 vehicles from the 2021 and 2022 model years.
No crashes or injuries were reported.
The vehicles are equipped with partially automated driver-assist features, such as adaptive cruise control and “Autopilot,” which allow them to automatically brake and steer within their lanes.
Documents posted Thursday by the National Highway Traffic Safety Administration say the vehicles can unexpectedly brake at highway speeds.
“Complainants report that the rapid deceleration can occur without warning, and often repeatedly during a single drive cycle,” the agency said.
Many owners in the complaints say they feared a rear-end crash on a freeway.
The probe is another enforcement effort by the agency that include Autopilot and “Full Self-Driving” software. Despite their names, neither feature can legally drive the vehicles without people supervising.
Messages were left Thursday seeking comment from Tesla.
It’s the fourth formal investigation of the Texas automaker in the past three years, and NHTSA is supervising 15 Tesla recalls since January 2021. In addition, the agency has sent investigators to at least 33 crashes involving Teslas using driver-assist systems since 2016 in which 11 people were killed.
In one of the complaints, a Tesla owner from Austin, Texas, reported that a Model Y on Autopilot brakes repeatedly for no reason on two-lane roads and freeways.
“The phantom braking varies from a minor throttle response to decrease speed to full emergency braking that drastically reduces the speed at a rapid pace, resulting in unsafe driving conditions for occupants of my vehicle as well as those who might be following behind me,” the owner wrote in a complaint filed February 2. People who file complaints are not identified in NHTSA’s public database.
Tesla CEO Elon Musk has been fighting with U.S. and California government agencies for years, sparring with NHTSA and the Securities and Exchange Commission.
Last week, NHTSA made Tesla recall nearly 579,000 vehicles in the U.S. because a “Boombox” function can play sounds over an external speaker and obscure audible warnings for pedestrians of an approaching vehicle. Musk, when asked on Twitter why the company agreed to the recall, responded: “The fun police made us do it (sigh).”
Michael Brooks, acting executive director of the nonprofit Center for Auto Safety, said it’s encouraging to see NHTSA’s enforcement actions “after years of turning the other way,” with Tesla. But he said the company keeps releasing software onto U.S. roads that isn’t tested to make sure it’s safe.
“A piecemeal investigative approach to each problem that raises its head does not address the larger issue in Tesla’s safety culture — the company’s continued willingness to beta test its technology on the American public while misrepresenting the capabilities of its vehicles,” Brooks wrote in an email Thursday.
Other recent recalls by Tesla were for “Full Self-Driving” equipped vehicles that were programmed to run stop signs at slow speeds, heating systems that don’t clear windshields quickly enough, seat belt chimes that don’t sound to warn drivers who aren’t buckled up, and to fix a feature that allows movies to play on touch screens while cars are being driven. Those issues were to be fixed with online software updates.
In August, NHTSA announced a probe of Teslas on Autopilot failing to stop for emergency vehicles parked on roadways. That investigation covers a dozen crashes that killed one person and injured 17 others.
Thursday’s investigation comes after Tesla recalled nearly 12,000 vehicles in October for a similar phantom braking problem. The company sent out an online software update to fix a glitch with its more sophisticated “Full Self-Driving” software.
Tesla did a software update in late September that was intended to improve detection of emergency vehicle lights in low-light conditions.
Selected Tesla drivers have been beta testing the “Full Self-Driving” software on public roads. NHTSA also has asked the company for information about the testing, including a Tesla requirement that testers not disclose information.
Read MoreThe United States and its Western allies are bracing for the possibility that a Russian invasion of Ukraine would have a ripple effect in cyberspace, even if Western entities are not initially the intended target.
“I am absolutely concerned,” U.S. Deputy Attorney General Lisa Monaco told the virtual Munich Cyber Security Conference on Thursday when asked about the chances of catastrophic spillover from a cyberattack on Ukraine.
“It’s not hypothetical,” Monaco said, pointing to the June 2017 “NotPetya” virus, engineered by Russia’s military intelligence service, the GRU.
The virus initially targeted a Ukrainian accounting website but went on to hobble companies around the world, including Danish shipping giant Maersk and U.S.-based FedEx.
“Companies of any size and of all sizes would be foolish not to be preparing right now,” Monaco said. “They need to be shields-up and really be on the most heightened level of alert.”
Monaco is not the first high-ranking U.S. official to warn that potential Russian actions in cyberspace might reverberate in unexpected ways.
“We’ve seen this play before,” U.S. National Cyber Director Chris Inglis warned a virtual audience earlier this month. Like Monaco, he alluded to the NotPetya attack: “It got out of its reservoir, so to speak, and it then eviscerated broad swaths of infrastructure across Europe and across the United States.”
U.S. Homeland Security Department officials said that for the moment, there were no specific or credible threats indicating an attack like NotPetya is about to be unleashed against the United States. But they said they were not taking any chances and were closely collaborating with Ukraine and other allies, just in case.
Russia’s record
“We are all hands on deck,” Homeland Security Undersecretary Robert Silvers told the Munich Cyber Security Conference on Thursday.
“It’s no secret that Russia has proven itself willing to use cyber means to achieve its broader geopolitical objectives,” Silvers added, pointing to Russia’s attack on Ukraine’s energy grid in 2015.
Some officials remained concerned that Russian President Vladimir Putin would give the order to target countries beyond Ukraine as part of any military action against Ukraine.
“I don’t think Ukraine is his goal,” said Jaak Tarien, the director of NATO’s Cooperative Cyber Defense Center of Excellence in Estonia.
“Putin said in 2007 at the Munich Security Conference that he is sick and tired of the existing security architecture and he wants to change that, and he’s still at it,” Tarien told Thursday’s cybersecurity conference. His goal is “to get U.S. allies to fight amongst each other and disrupt our unity. So cyber is a really, really good way to do that.”
U.S. agencies are likewise worried that as tensions escalate, Russia may be tempted to ramp up cyber operations.
On Wednesday, the U.S. Cybersecurity and Infrastructure Security Agency, the FBI and the National Security Agency issued a joint advisory warning that Kremlin-linked actors might use a variety of techniques to target U.S. defense contractors.
Not all cyber experts are convinced Russia will resort to cyberattacks to hurt the West, even if the U.S. and its allies make good on promises to hit Moscow with severe economic sanctions.
“I don’t think that cyber [attacks] from state actors is going to be the first or the preferred mechanism for response,” Dmitri Alperovitch, the co-founder of the cybersecurity firm CrowdStrike, told the Munich Cyber Security Conference.
“Russia has enormous leverage in the economic sphere, even outside of cyber, to respond through export control measures, for example, on critical materials like aluminum and uranium and titanium and palladium and many other things that will do a lot to hurt the U.S. economy and the global economy,” he said.
Alperovitch also cautioned that Russia might be willing to let cybercriminals do the work instead, perhaps releasing a number of ransomware actors it has arrested in recent weeks.
“That would send an unmistakable, even unspoken message to the Russian cybercrime ecosystem that it’s open season on Western organizations,” he said.
…