The question isn't whether these vulnerabilities exist. The question is whether we're building the defensive infrastructure to protect against them before widespread adoption makes the problem unsolvable. Right now, we're not.
The questions leaders should answer
Before we mandate widespread EV adoption, policymakers need to answer basic questions that cybersecurity experts have been asking for years:
- How do you protect millions of networked vehicles from coordinated cyberattacks?
- What happens when hostile actors compromise battery management systems across thousands of vehicles simultaneously?
- How do you secure a distributed energy storage network that spans entire regions?
- What safeguards prevent foreign-manufactured components from containing backdoors or vulnerabilities?
- How do you respond when grid stability depends on vehicle batteries that can be manipulated remotely?
- These aren't rhetorical questions. They're engineering and security challenges that require concrete answers before we bet our national infrastructure on technology we haven't fully secured.
- The silence from political leaders on these topics tells you everything you need to know about their priorities.
Advertisement
Energy literacy includes security literacy
True energy literacy means understanding not just how technology works, but what risks it introduces.
Electric vehicles represent a fundamental shift in how we power transportation. That shift comes with benefits and vulnerabilities. Honest assessment requires acknowledging both.
The cybersecurity and national security experts who understand these risks aren't anti-EV. They're pro-security. They're asking for the same level of investment in defensive infrastructure that we're making in vehicle production and charging networks. That's not unreasonable. That's basic due diligence.
We can build a future with electric vehicles. But we need to build it on secure foundations, with supply chains we control, and security protocols that match the scale of the vulnerabilities we're creating.
Anything less leaves millions of Americans exposed to risks they don't understand, driving vehicles connected to networks they can't protect, dependent on infrastructure that hostile actors can target. That's the reality cybersecurity experts already know. The question is whether the rest of us will learn it before the vulnerabilities get exploited.
The engineering challenges are solvable. The supply chain vulnerabilities can be addressed. The cybersecurity protocols can be developed and implemented. But only if we acknowledge the problems honestly and invest in solutions proportional to the risks.
Advertisement
Right now, we're building a transportation system on foundations we haven't secured. That's not progress. That's negligence dressed up as innovation.
Discuss in our Forums
See what other readers are saying about this article!
Click here to read & post comments.
About the Authors
Ronald Stein is co-author of the Pulitzer Prize nominated book Clean Energy Exploitations.
He is a policy advisor on energy literacy for the Heartland Institute,
and the Committee for a Constructive Tomorrow, and a national TV
commentator on energy & infrastructure with Rick Amato.
Michael Hogan has a PhD from Standford University and is a physicist who founded a USA based
environmental science think tank. He has served on the National Academy
of Sciences, advising the President and Congress on environmental
issues. Hogan has authored over 1210 scientific books and peer reviewed
articles in atmospheric physics, terrestrial ecosystems and U.S. energy
policy.