6,039 research outputs found

    An Analysis of Vehicle Ramming as a Terrorist Threat

    Get PDF
    Ramming attacks in which drivers deliberately plow their vehicles into public gatherings, pedestrians, or bicyclists, have become an increasingly common terrorist tactic. This MTI Security Perspective, by Brian Michael Jenkins and Bruce R. Butterworth analyzes 78 vehicular attacks between January 1973 and April 2018. According to their analysis, it is a growing trend, and a frightening one. The 78 attacks led to 281 deaths and around 1,200 injuries. Sixteen attacks took place between 1973 and 2007, while 62 took place between 2008 and April 2018. Thirty of these occurred in 2017 and the first four months of 2018 alone

    “Smashing Into Crowds” -- An Analysis of Vehicle Ramming Attacks

    Get PDF
    Vehicle ramming attacks are not new. But since 2010 Jihadists have urged their use. Is this the wave of the future, or a terrorist fad? To answer this and other questions the authors expanded and updated the database used in their May 2018 MTI Security Perspective entitled An Analysis of Vehicle Ramming as a Terrorist Threat to include 184 attacks since January 1, 1970. They also reviewed literature and examined some cases in detail. This MTI Security perspective indicates that while not new, vehicle rammings are more frequent and lethal since 2014, although the number of attacks seems to be dropping in 2019. Still it is too early to know if this is because of government countermeasures or because it is a fad that has come and gone. They also found that: (a) the majority of attacks occur in developed countries like the US and Europe; (b) though not more lethal than some other tactics they can be easily carried out by those who cannot get bombs or guns in a target-rich environment that is difficult to protect; (c) while Jihadists (responsible for only 19% of the attacks) have exhorted their use since 2010, it isn’t clear these calls have been successful -- instead the pattern of attacks suggest a kind of wider contagion; (d) attackers plowing vehicles into public gatherings and pedestrianized streets are the most lethal, particularly the attacks are planned and the drivers rent or steal large trucks or vans driven at speed; and finally, (e) government authorities cannot prevent these attacks but can and are doing things to prevent them and mitigate fatalities when they occur

    Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment

    Get PDF
    Vehicles today are relying more on technologies to bring about fully autonomous features. The conventional wirings within are being simplified into a network of electronic components, and this network is controlled via advanced sensing of the environment to make decisions in real-time. However, with the heavy reliance on the sensor readings, any inaccurate reading from the sensors could result in decisions that may cause life-threatening incidents. As such, this research focuses on the in-depth assessment of potential vulnerabilities of an important and commonly used obstacle sensing device, which is the ultrasonic sensor, in modern as well as autonomous vehicles. This research will help bring awareness to the car manufacturers and AV researchers so as to mitigate such issues

    Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

    Get PDF
    In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off-line societycritical facility. More work is necessary to increase usage of security strategies, available methods, processes and standards. The security information, currently often insufficient, should be provided in the user manuals of products and services to protect system users. We confirmed it lately when we conducted an additional survey of users, with users feeling as left out in their quest for own security and privacy. Finally, hardware-related security questions begin to come up on the agenda, with a general increase of interest and awareness of hardware contribution to the overall cyber-physical security. At the end of this paper we discuss possible countermeasures for dealing with threats in infrastructures, highlighting the role of authorities in this quest
    • …
    corecore