I'm not usually a conspiracy theorist but something is definitely fishy. Those computers can be accessed remotely by anyone with the knowledge on how to do it.
I'm not usually a conspiracy theorist, either.... and I am dumb as a stump about computers. Armed with that knowledge, I fail to see how someone can remotely access (and manipulate) the computer in your car. Can you please explain that?