Human-free robo-cars on Washington streets after governor said the software is 'foolproof'

We must have missed the bit where code bugs were extinct


The governor of Washington has green-lit the testing of self-driving cars on the US state's public roads, with or without human operators, calling the technology "foolproof."

Gov. Jay Inslee this week signed an executive order (PDF) that called for new rules on autonomous car testing and, for the first time, provisions to test cars fully autonomously on Washington's streets, without the need for a human to sit behind the wheel.

In order to operate completely sans-meatware, the car would need to be fully certified and shown to have safety protections in place to assure it can get itself out of harm's way should something go wrong.

"Vehicles shall be equipped with an automated driving system that performs all aspects of the driving task on a part- or full-time basis within the vehicle’s operational design limits, and it must be capable of bringing the vehicle to a safe condition in the event of a system failure," the order reads.

Inslee announced the move while flanked by executives from General Motors and Google, who will no doubt be pleased with the looser testing standards and are no doubt looking forward to exploiting the new rules. Inslee, meanwhile, will be able to court those companies to bring their jobs and tax dollars to Washington when they set up testing facilities.

The governor also seems to have an extraordinary, if not impractical, confidence in the safety of fledgling autonomous cars and complex computer systems in general.

"One thing I know about radar, it doesn’t drive drunk, it doesn’t drive distracted,” he is quoted as saying.

"We humans are really good at a lot of things, driving cars isn’t necessarily one of them compared to the automated processes that are digital and foolproof. I just have huge confidence in the safety aspects of this."

We dare say a few people, particularly security researchers and embedded engineers and AI developers and anyone else who has touched a keyboard and mouse, will take exception to the "foolproof" comment. On multiple occasions, experts have shown that connected cars are vulnerable to hijacking, and even without hackers, self-driving cars have been found to contain rather dangerous bugs. ®

Similar topics


Other stories you might like

  • The future: Windows streaming through notched Apple screens

    Choice is the word for Jamf's Dean Hager

    Interview As Apple's devices continue to find favour with enterprise users, the fortress that is Windows appears to be under attack in the corporate world.

    Speaking to The Register as the Jamf Nation User Conference wound down, the software firm's CEO, Dean Hager, is - unsurprisingly - ebullient when it comes to the prospects for Apple gear in the world of suits.

    Jamf specialises in device management and authentication, and has long been associated with managing Apple hardware in business and education environments. In recent years it has begun connecting its products with services such as Microsoft's Azure Active Directory as administrators face up to a hybrid working future.

    Continue reading
  • There’s a wave of ransomware coming down the pipeline. What can you do about it?

    AI can help. Here’s how…

    Sponsored The Colonial Pipeline attack earlier this year showed just how devastating a ransomware attack is when it is targeted at critical infrastructure.

    It also illustrated how traditional security techniques are increasingly struggling to keep pace with determined cyber attackers, whether their aim is exfiltrating data, extorting organisations, or simply causing chaos. Or, indeed an unpleasant combination of all three.

    So, what are your options? More people looking for more flaws isn’t going to be enough – there simply aren’t enough skilled people, there are too many bugs, and there are way too many attackers. So, it’s clear that smart cyber defenders need to be supplemented by even smarter technology incorporating AI. You can learn what this looks like by checking out this upcoming Regcast, “Securing Critical Infrastructure from Cyber-attack” on October 28 at 5pm.

    Continue reading
  • Ransomware criminals have feelings too: BlackMatter abuse caused crims to shut down negotiation portal

    Or so says infsec outfit Emsisoft

    Hurling online abuse at ransomware gangs may have contributed to a hardline policy of dumping victims' data online, according to counter-ransomware company Emsisoft.

    Earlier this month, the Conti ransomware gang declared it would publish victims' data and break off ransom negotiations if anyone other than "respected journalist and researcher personalities" [sic] dared publish snippets of ransomware negotiations, amid a general hardening of attitudes among ransomware gangs.

    Typically these conversation snippets make it into the public domain because curious people log into ransomware negotiation portals hosted by the criminals. The BlackMatter (aka DarkSide) gang's portal credentials (detailed in a ransom note) became exposed to the wider world, however, and the resulting wave of furious abuse hurled at the crims prompted them to pull up the virtual drawbridge.

    Continue reading

Biting the hand that feeds IT © 1998–2021