Skip to main content

Keeping an eye on cyberattacks

Hackers love an open door and ransomware attacks on transit agencies are rising. Ben Spencer examines a report by Mineta Transportation Institute on keeping personal data safe
By Ben March 24, 2022 Read time: 5 mins
Biometric data, especially when combined with other personal data points, constitutes PII and introduces ‘additional levels of complexity’ to data management © Viculia | Dreamstime.com

Robust cybersecurity practices are required to protect personal data and the US transit industry. The Mineta Transportation Institute’s white paper Personal Data Protection as a Driver for Improved Cybersecurity Practices in U.S. Public Transit says efforts to modernise public transit and provide better, more efficient services regularly require information about who, when, where and how transit services are being used.

But expanding data collection increases the importance of secure data management and privacy practices – “something lacking in many US transit agencies”, it points out.

This is an important issue because, ultimately, transit agencies will be held to account for the security of the data they collect, process and leverage for service delivery or other purposes.

To give a little context, Mineta points out that the opportunity to collect and process data from vehicles and customers in public transit has “never been greater”, with technology developments in fare management and GPS vehicle tracking offering new data collection tools.

Among these new opportunities is information that - in the wrong hands – could be used to the detriment of an individual or group of people. Specifically, the theft and sale of personally identifiable information (PII) has what the paper calls a “robust marketplace, often referred to as the dark web, and can be quite lucrative”.

Identity theft

Gaining access to sensitive PII or a collection of data points that, when linked, provide a detailed profile of an individual, can facilitate fraudulent purchases, identity theft and illegal monitoring.

The US National Institute of Standards and Technology at the US Department of Commerce defines personal data as any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.

In the US, the regulatory environment governing the protection and use of PII by public and private entities and an individual’s right to control how their personal data is used is “a patchwork at best”, Mineta says.

The US is also not among the 17 countries that have comprehensive national data protection laws in place, which include Canada, South Africa, Japan, New Zealand and Brazil.

US entities are going to face an “increasingly complex process” of navigating extra-territorial and data export requirements as more countries enact laws governing the data of their residents, the paper adds

Additionally, most digital privacy rights are being “crafted at the state level”, with California’s Consumer Privacy Act as the leading model.

Types of data

According to the paper, this increases the importance for transit agencies to have a clear picture of the types of data they and their vendors collect, and the ability to comply with local and state rules potentially governing this information.

Last October, the Transportation Security Administration issued a directive outlining new cybersecurity mandates for railroad and rail transit systems, and the authors of the paper expect the same provisions to be rolled out to large transit providers.

Among the new mandates are requirements for companies to designate a cybersecurity point person at their organisation, and for any cyber incident to be reported to the Department of Homeland Security in a timely manner.

Elsewhere, the paper explores the use of facial recognition (which has recently been introduced on Moscow’s Metro system). Mineta advises that the “well-documented shortcomings” of the technology in accurately identifying an individual create several reasons why transit agencies should pursue such data collection with “extreme caution”.

Biometric data, especially when combined with other personal data points, constitutes PII and introduces “additional levels of complexity” to data management.

For example, still photographs are not PII on their own, but become biometric data when run through facial recognition software.

The document highlights that a patchwork of state and local laws governs the collection and use of biometric data, something with which any agency considering facial recognition needs to be “well versed”.

Another part of the document focuses on employee records, warning that a failure to adequately secure employee data and records places “large troves” of PII at risk of exploitation by “nefarious actors”.

According to Check Point Research, the global transit industry has experienced a 186% year-on-year increase in weekly ransomware attacks since June 2020.

TransLink ransomware attack

For instance, a ransomware attack hit Vancouver’s transit provider, TransLink, last December, shutting down some modes of payment for customers.

The perpetrator was identified as the Egregor ransomware gang, a group known to sometimes publish stolen information even after a ransom payment. TransLink did not pay the $7.5 million ransom because of this risk.

The paper insists that transit agencies must ensure that employees can be confident their personal information, like banking details and healthcare records, is secure. A failure to protect this opens the employee up to potential harm and the company up to lawsuits.

A separate section of Personal Data Protection as a Driver for Improved Cybersecurity Practices in U.S. Public Transit provides steps to protect PII, clarifying that the ability to protect sensitive personal information collected by transit agencies and their vendors starts with the overall enterprise risk and security practices of the organisations. Some steps for protection include: reviewing the types of information being collected and how it is used, as well as articulating the organisation’s privacy policies in accordance with local, state and federal laws, business needs, legal ramifications and customer data privacy interests. Another recommendation is to ensure proper controls are in place, per agency cybersecurity policies and protocols,to limit internal and external access to PII.

Mineta’s paper concludes by saying that if the agency does not yet have the cybersecurity capabilities to reliably secure specific data flows, perhaps it would be best to forgo collection until such time that securing them is possible.

For more information on companies in this article

Related Content

  • Economic crisis needs non-partisan perspectives to stimulate growth
    February 2, 2012
    Kary Witt, President of the IBTTA and Pat Jones, Executive Director and CEO, talk about the need to put aside partisan perspectives in order to deal with the current economic crisis
  • Platform announcement: public transport is running 10 years behind schedule
    March 10, 2023
    Public transport worldwide is under pressure on a variety of fronts. Jon Salmon of Snapper Services UK explains why the industry should look more at data – and pick up some tips from the retail sector
  • EdgeVis removes bandwidth barriers to mobile streamed video
    October 26, 2017
    A new generation of video compression can lower transmission costs of data and make streaming from mobile and body-worn cameras a reality, as Colin Sowman discovers. Bandwidth limitations have long been the bottleneck restricting the expanded use of video streaming for ITS, monitoring and surveillance purposes. Recent years have seen this countered to some degree by the introduction of ‘edge processing’ whereby ANPR, incident detection and other image processing is moved into (or close to) the camera, so
  • Advanced ITS truck screening aids border control
    March 14, 2012
    State-of-the-art ITS technologies are being deployed for tracking of commercial vehicles at the US-Mexico border in Arizona, reports Pete Goldin. The border between the US and Mexico may be the epitome of America's wild west, but this remote desert frontier is being tamed by the Arizona Department of Transportation (ADOT) with a state-of-the-art ITS system. A comprehensive port-of-entry (POE) screening system is being deployed at the Mariposa Port of Entry – one of the busiest land ports in the nation – at