Honda Civic Hybrid Software Patch Fail

HybridCars tells of continual problems with the hybrid Civic made by Honda. The latest issue has led to “Owners Disappointed with Battery Software Fix”

“My 2008 [Civic Hybrid] purchased new started having these problems about 6 months ago. Now Honda reprogrammed the software. Made it even worse.”

“I took my 2007 HCH with 38,000 miles to the dealer for the software update a week ago. Prior to the update, I had no problems or complaints with my car. I loved it. Just the right combination of mileage, 41 mpg average with adequate power. After this update my mileage has dropped to 35.5 average with a noticeable loss of power.”

Apparently, the software change does not directly address the battery problem–but instead reduces the vehicle’s reliance on the batteries and electric motor. Essentially, the “fix” extends the life of the battery, but turns a Civic Hybrid into a standard hybrid in the process.

Battery life forces reduced reliance on the electric motor. This is what I dislike about hybrids — hidden long-term battery issues. First you have reduced power. Second you have disposal and replacement costs. Third you have landfill and recycling issues…and so on.

It sounds great to talk about electric on the show-room floor, but you lose the benefits and face high costs just a few years later.

The software “patch” should be increasing use of electric motor not reducing it. This proves the backwards nature of the hybrid model today. Yet another example of diesel engines providing better long-term efficiencies.

I would really like to see manufacturers provide open data on engine efficiencies over a ten year period — or at least the average life of a car. Something like this might work:

  1. Modern small diesel engines’ efficiency arrives to 0.40-0.41 and more, whilst the gasoline engines’ efficiency hardly go over 0.27-0.28 (based on fuel mass). So, their efficiencies based on fuel masses are related by the formula:
    Efficiency_mass_gasoline = 0.68 * Efficiency_mass_diesel
  2. Gasoline’s and diesel’s densities are 0.74 kg/l and 0.84 kg/l, respectively. So their efficiencies based on fuel volume will be proportionally smaller:
    Efficiency_volume_gasoline = 0.62 * Efficiency_volume_diesel
  3. Now, if you analyse the declared data for various diesel engines, you’ll find out that their approximate fuel consumption at max power can be calculated with the formula (in litres per hour):
    FC_diesel = 0.19 x HPmax
  4. Knowing the relation between diesel and gasoline’s efficiencies (the formula n.2 above), the formula for gasoline engine fuel consumption will be, approximately:
    FC_gasoline = 0.30 x HPmax

Long term efficiency should be clear.

Honda has in the past has been sued for false advertising and has paid owners a rebate due to lowered MPG over time. That is not a good sign for hybrids. The article also points out that reducing time spent on electric has changed the car’s emissions profile, which also raises concerns by regulators such as the California Air Resources Board (CARB). Maybe MPG now will be from an average over years of driving?

Time to Talk about APT

I posted a response to a Securosis blog post where they say this:

There’s a lot of hype in the press (and vendor pitches) about APT — the Advanced Persistent Threat. Very little of it is informed, and many parties within the security industry are quickly trying to co-opt the term in order to advance various personal and corporate agendas. In the process they’ve bent, manipulated and largely tarnished what had been a specific description of a class of attacker.

My response may show up sometime soon; in the meantime, here is what I said:

Excellent comments above. I agree with most here and just wanted to relate an interesting experience and three points about APT.

Some government officials met with me after my talk on security breaches at RSA 2010 in San Francisco. They laughed at me and said the word/acronym APT is hyped too much and misunderstood. They also gave me the “we know far more than anyone else about what is really going” story. I held back from being a smart-ass about all this posturing nonsense and instead asked for details.

First, I say worry less about use of language and words like APT. Clarity and understanding has a place/time — like a meeting where action is required. Public discussion is not that time. Absolute accuracy in language/definition during general conversation is really a straw-man argument — attack of a phrase or word instead of substance being put forward. We also could get upset about misuse of the word too versus to, the word hacker, the phrase critical infrastructure, etc. but open communication is never really clean. If you say car, you could mean just about anything, yet no one gets upset about car. Words get “bent, manipulated and largely tarnished” yet language works amazingly well. Cool, no? Or should I say that it’s hot? Move along please. If you struggle with APT you will really have a hard time with cloud.

Second, I agree completely that sharing APT info is better but I have seen two reasons used for controlled disclosure instead of openness.

A) Power and politics unfortunately sneak into this. The relatively immature and open field of play in Washington gives an incentive for sparse and sometimes unverifiable disclosures. Releasing information in a limited fashion can create a dramatic influence over the hill. Was it coincidence for example that during the debate regarding control and leadership for cybercommand the WSJ released a story that spies have infiltrated the US energy sector? A totally open discussion would not have had the same effect — reporters might have come to a different conclusion. Civilian leadership will lose control if the military and intelligence communities do not have more open discussion with them. Classic political science.

B) There is some chance that disclosure during an ongoing investigation could compromise its success. Only after the investigation is over should be made open to study. The questions are who gets to decide when a case is closed and how much should they share to whom? The guys I spoke with said they’ve been watching APT for over ten years. We talked about a few case examples and I realized they are stringing everything together — they would say the case is always open. I disagree with them in principle but more importantly I do not have any authority to make them close a case, disclose, and start new ones. I also can not easily parse who they trust and who they fear.

Third, check out the HTCIA. The audience for my presentations at the International Conference were almost all Peace Officers, Investigators and Prosecuting Attorneys. Discussions were less theoretical and more case/fact-based than your usual group. It’s a great place to share information on real attacks with fellow security professionals.

Titanic Secret Revealed

A descendant of a sailor on the Titanic claims to have revealed a secret about the infamous breach.

Investigators never found the truth — an error at the helm caused the initial hole, but the sinking allegedly resulted from a decision to continue sailing. The BBC News explains the rationale behind the secret:

Louise Patten’s grandfather decided not to disclose what he knew and even kept his story from an official enquiry into the sinking.

“By his code of honour, he felt it was his duty to protect his employer – White Star Line – and its employees,” Ms Patten said.

“It was made clear to him by those at the top that, if the company were found to be negligent, it would be bankrupted and every job would be lost.

“The enquiry had to be a whitewash. The only person he told the full story to was his beloved wife Sylvia, my grandmother.”

The story thus could be updated to include a self-serving and unaccountable company, and a captain who was negligent in handling the situation. I assume false pride or incorrect belief in the ship’s ability to survive impact is what led him to steam ahead.

However, I have a hard time believing the first part of the revealed secret.

Mrs Patten said the tragedy had occurred during a period when shipping communications were in transition from sail to steam.

Two different systems were in operation at the time, Rudder Orders (used for steam ships) and Tiller Orders (used for sailing ships).

Crucially, Mrs Patten said, the two steering systems were the complete opposite of one another, so a command to turn ‘hard a-starboard’ meant turn the wheel right under one system and left under the other.”

She said when the helmsman, who had been trained in sail, received the direction, he turned the vessel towards the iceberg with tragic results.

I have only been a passenger on vessels of massive size but they give feedback on direction steered. A hard turn would especially have made the boat shift. It could have been corrected unless the iceberg was so close it was too late anyway. It seems that if he could not detect and turn the other way in time (and not because of a design failure) then contact with the iceberg was likely to happen no matter what he did. Steering the wrong direction thus may have increased the damage before they corrected but not been entirely at fault.

Continuing to sail after impact is a much more shocking revelation and thus requiring investigation.

The breach, in other words, may have been impossible to avoid even if they had steered the right direction upon first warning. The decision to disregard the breach’s effect and push the ship ahead is what led to much greater disaster.

When a system is compromised it usually comes from a simple mistake; a service was left enabled, a weak cipher was used, etc.. This historic event illustrates why management should not continue to use a compromised system even if they believe it to be “unbreakable”. It also illustrates how accountability for customer security may be viewed by some managers.

ATM Russian Roulette

Triton has issued a security warning for their ATM based on an IOActive security assessment, which was presented at BlackHat earlier this year. It has seven “bullet” points that are very basic, illustrating the simplicity of managing risk versus the danger of ignoring it.

They also said this about the assessment:

Security is among Triton’s utmost concerns; strengthening our ATMs’ defenses is an on-going effort. The opportunity is welcomed to highlight the success of Triton’s continuing efforts to protect ATMs from emerging threats. Triton is hopeful that Mr. Jack’s work serves as a reminder to customers to be vigilant about installing software updates immediately upon release.