When the call came to officials at the National Highway Traffic Safety Administration, they knew they had a problem they had never faced but had long feared.
On the line was Fiat Chrysler Automobiles, with news that two technology researchers had hacked wirelessly into a Jeep Cherokee, through its dashboard connectivity system. They had managed to gain control of not just features like the radio and air-conditioning, but the actual functions of the car: the engine, the brakes and the steering.
That revelation set in motion a nine-day flurry of activity by the automaker and the safety agency that culminated Friday in a sweeping recall of 1.4 million vehicles.
"Launching a recall is the right step to protect Fiat Chrysler's customers, and it sets an important precedent for how NHTSA and the industry will respond to cybersecurity vulnerabilities," said Mark R Rosekind, the agency's administrator.
In an age when the cars on the nation's highways are increasingly web-connected, it was the first safety recall issued for a hacking threat. And it brought immediate demands on Capitol Hill for action to root out and guard against flaws in other cars that could pose a similar danger.
The initial call from Fiat Chrysler to Washington on July 15 led to a long set of discussions between the automaker and regulators that extended through the weekend, according to a person briefed on the activities.
Staff specialists at the safety agency aimed to grasp the full scope of the breach, and were particularly alarmed that the hacking allowed someone to essentially crash a vehicle.
The researchers, Charlie Miller and Chris Valasek, had given the automaker a heads up: The two men planned to make their findings public early this week. The vulnerability existed far beyond just the Jeep, they said. Other vehicles across Chrysler's lineup of cars and trucks used the same system, called Uconnect, that had let them in. Hundreds of thousands of vehicles could be affected.
Fiat Chrysler software specialists scrambled to make a patch available to plug the hole, and released one on the automaker's website on July 16, the day after the call to Washington. The company also planned to issue a technical service bulletin - a notice mainly used by dealers, but not considered a recall.
Officials at the safety agency, however, wanted to know more about the exact functions that could be taken over by hackers. In NHTSA parlance, if the result presented an "unreasonable risk to safety," a recall would be required. And if drivers were vulnerable to an attack where they could lose control of their cars, that would certainly seem to qualify, even though a recall for a web security threat had never before taken place.
In the meantime, the researchers made their findings known on Tuesday in an article published by the news technology site Wired, telling how they had taken control of a cooperating driver's car from 10 miles away as it sped down a St. Louis highway. (It was the same day, coincidentally, that Rosekind was visiting Michigan for a speech in which he addressed the need for improved web security in vehicles.)
NHTSA officials decided that the vulnerability was simply too dangerous not to require a formal recall. Additionally, without a recall, the automaker would not be required to file regular compliance reports on how many affected vehicles had been fixed.
After further conversations between Washington and the company's headquarters in Auburn Hills, Mich., Fiat Chrysler settled Thursday on a recall affecting 1.4 million vehicles. (A small percentage of that number, the company said, involves certain 2015 models getting a separate software patch unrelated to the remote Jeep hacking.)
Fiat Chrysler issued a public statement saying that security "is a top priority," as is retaining consumer confidence in its vehicles. Fiat Chrysler will send affected owners a USB drive they can plug into their vehicles to install an update to block the hacking vulnerability. Owners can also download the update directly onto their own portable drive.
The recall affects certain vehicles equipped with 8.4-inch touch screens from the 2013 model year onward. That includes some Jeep Cherokees and Grand Cherokees, Dodge Durangos, Ram pickup trucks and 300 sedans, Dodge Chargers and Vipers. (The company set up a VIN search tool to let consumers check if their vehicle is affected.)
The automaker also said it had "applied network-level security measures" on the Sprint cellular network that communicates with its vehicles as another step to block the vulnerability.
On Friday, Valasek, one of the two researchers, posted on social media that when he tried connecting again to his test Jeep, the pathway through Sprint's network had been blocked.
Precise aspects of what Fiat Chrysler knew about possible Uconnect problems before this month remain unclear. In documents filed with regulators on Friday, the company said that testing in January 2014 identified "a potential security vulnerability" with a communications port used with the system. A supplier began work on security improvements shortly thereafter, the company said, and those changes made it into later production vehicles. But the software patch for other potentially affected vehicles was not released until this month.
A Fiat Chrysler spokesman, Berj Alexanian, declined to comment on the precise timeline of when the patch was developed, but said that since its release the company has "taken more steps to ensure the confidence and security of our customers," including deciding, "in an abundance of caution, to continue the distribution under the auspices of a recall."
©2015 The New York Times News Service