Grand Cherokee's network and discovered and exploited various security holes on the vehicle. Their activities generated a lot of reaction by the National Highway Transportation Safety Administration (NHTSA) and Congress which pushed automakers to place more focus on security. The hack exposed other vulnerabilities including those supporting these systems such as the wireless connections to cellular network providers. With a little bit of knowledge and the tools needed to push messages onto the CAN bus, one can greatly compromise safe vehicle operation. The immobilizer systems used on today's vehicles have grown to become quite sophisticated. In basic terms these systems use cryptography by utilizing a challenge response type pattern as an exchange between the key fob and the immobilizer module. There are numerous tools out in the marketplace that have proven to be highly successful in helping the technician during troubleshooting operations. Now vehicle security and immobilizers are not one in the same. While there may be issues with a vehicle not starting due to a defective key or key transponder or something in the immobilizer system, one may find themselves dealing with an immobilizer system after repairing a vehicle that required the replacement of a module. In such cases, one is typically required to program the module and then re-establish proper immobilizer operation. If one doesn't have the ability to set up the immobilizer, this will likely result in a vehicle that will not start. For those of www.VehicleServicePros.com JUNE 2022 PROFESSIONAL TOOL & EQUIPMENT NEWS 25http://www.VehicleServicePros.com