SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

How to prevent autonomous vehicles from being used by terrorists

How to prevent autonomous vehicles from being used by terrorists
Lee Dover
Lee Dover
Contact company
Contact 2020 Vision Systems Limited
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Prevent autonomous vehicle terror by enhancing cybersecurity and introducing strict hire regulations.
  • Fully-autonomous trucks could replace up to 3 million drivers, increasing security challenges.
  • TRIP initiative educates fleet operators on terrorism risks and vehicle security measures.
Related Links
  • Security industry must adapt to terror and cyber-crime in 2018
  • How is the rise in terrorism impacting the physical security market?

In recent news, trucks, lorries and vans have been the weapon used in terror attacks around the globe, and other sources suggest that autonomous vehicles, particularly self-driving trucks and lorries, could be a reality sooner than we think. It poses the question: How can we prevent autonomous vehicles from being used as weapons in terror attacks?

Accessories for terror attacks

We already have ‘self-driving’ technologies in the cars which are on our roads today, from lane-departure warning systems, cruise control and active park-assist, but just how far are we from introducing fully-autonomous vehicles onto our roads? As Google tests its own self-drive vehicles, clocking more than 200,000 miles in a fleet of self-driving cars retrofitted with sensors, it seems we are not far from seeing fully-autonomous vehicles on our roads at all.

As reported by The Guardian, law-makers have warned that autonomous vehicles must have secure and safe technology to prevent use as an accessory in terror attacks in the future. VW dealership, Vindis, investigate further.

Developments in self-driving technology

In-car technology is constantly developing to make the driver’s life easier and enhance the driving experience. Developments with semi-autonomous technology suggest that we are significantly close to rolling out fully-autonomous vehicles. Many drivers are progressively trusting their vehicles to carry out tasks which previously would always need to be done manually.

We already have systems which keep us in our lanes on dual carriageways and motorways, systems that can parallel park our vehicles for us, and software that automatically maintains a safe, steady speed on the UK’s roads – with some even advanced enough with automated braking systems when tracking the vehicle in front. Self-driving technology is revolutionising the driving experience.

Horrendous terror attacks have taken place around the globe, using trucks and lorries as the main weapon
We may not be far from seeing fully-autonomous vehicles on our roads

But what needs to happen next? For fully-autonomous vehicles, manufacturers need to converge sensor-based technologies and connected-vehicle communications, so that they can deliver safer self-driving techniques than what each approach could ever deliver on its own.

As lorries and trucks are forecast to be some of the first fully-autonomous vehicles to be rolled out onto the roads, there are many jobs that could be at risk if the need for human driving is eliminated. Low-end estimates suggest that over 1.7 million truckers could be replaced by self-driving counterparts – which could rise to as high at 3 million, ridding trucks of their manual drivers.

Cybertechnology aims to make it incredibly hard to hijack a vehicle, to prevent terrorists from using autonomous technology as an accessory

Risks of autonomous-vehicle terror attacks

Everyone is aware of the horrendous terror attacks that have taken place recently around the globe, using trucks and lorries as the main weapon. Trucks are chosen for their size and anonymity, and have been used to drive into crowded pedestrian areas at high speeds, causing devastating results. It’s predicted that these vehicles will be amongst the first fully-autonomous vehicles on our roads, and officials worry they could play a crucial role in mitigating their use as rolling weapons. 

If autonomous trucks are to pose a real threat, we need to have a prevention. Thankfully, legislation has been passed to say that all autonomous vehicle will be armed with cybersecurity technology so that they can’t be used as an accessory in a terror attack. The cybertechnology aims to make it incredibly hard, if not impossible, to hack the vehicle for hijack, meaning potential terrorists can’t use autonomous technology as an accessory in an attack.

In recent attacks, hire vehicles have been the weapon used to cause mass disaster. Further regulations and restrictions will also be put in place with hire and rental companies. It has been suggested that companies should have access to a wider database that reveals more sensitive information in the future, so that companies are aware of individuals that are suspect. Whilst databases currently check against identity, credit and insurance, the threat of terrorism may lead to a more detailed and sensitive database.

 Law-makers have warned that autonomous vehicles must have secure and safe technology
Trucks are chosen for their size and anonymity, and can cause devastating results in crowded pedestrian areas

Educating drivers on preventative measures

TRIP is the UK’s first Terrorism Risk and Incident Prevention suite of products and training to support fleet operators that has been developed by a leading provider or training and auditing services for the road transport industry, Fleet Source. Its aim is to reduce the risks of commercial vehicles being used as a weapon in terror attacks.

The products and services serve to educate fleet operators, managers and drivers of the risks of terrorism, the nature of the threats and safety precautions that can be implemented to reduce the possibilities of their vehicle being hijacked, stolen or used in a terrorist incident.

Further prevention development is expected from the government, who hope to develop geo-fencing systems to prevent unauthorised vehicles from entering particular areas of a city – the system will slow down vehicles and control the speed as soon as they enter the sensitive area, through the use of satellites. The system would automatically connect with the vehicle and retain control, so that the vehicle only travels at a safe speed within the area.

As lorries and vans continue to be used as terror weapons, perhaps it is time to implement some of the prevention strategies sooner rather than later.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Traffic surveillance
  • Public sector security
  • Vehicle tracking
  • Security communication
  • Counter terror
  • Gates & Fencing
  • Cyber security
  • Related links
  • Articles by Lee Dover
  • Related categories
  • Access control systems & kits
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Explore security solutions to protect autonomous vehicles from potential terrorist attacks, ensuring safer and secure self-driving experience.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec