Skip to main content

Transit 'unprepared' for cyberattack, says MTI

Four in 10 agencies do not have cybersecurity action plan in place, researchers find
By Adam Hill October 9, 2020 Read time: 2 mins
More than half of transit agencies ignore basic anti-hacking requirements (© Daniil Peshkov | Dreamstime.com)

Research from the Mineta Transportation Institute (MTI) has found that US transit agencies are not properly prepared for the potential havoc wreaked by hackers.

The report - Policy Recommendation to Enhance Surface Transit Cyber Preparedness – surveyed 90 transit agency technology leaders.

It uncovered a mismatch between approaches and attitudes: although 80% of agencies said they felt prepared, just 60% of those questioned actually have a cybersecurity preparedness plan.

This suggests complacency and a lack of readiness to face problems: MTI says most transit agencies “do not have many of the basic policies or personnel in place to respond to a cyber incident”.

This is particularly significant because the US Department of Homeland Security – which part-funds MTI - has designated the transportation as one of 16 critical infrastructure sectors whose disruption would have a debilitating effect on the country’s security.

MTI, based at San Jose State University, points out that resources to combat hack attacks are ‘scarce’ for transit agencies, which means “there needs to be a collaborative effort from the federal government, the industry, and agency leadership to establish, maintain and refine cybersecurity programmes”.

Researchers insist, however, that transit operators must adopt and implement minimum cybersecurity standards before receiving cash from the Federal Transit Administration (FTA).

The report found that more than half of agencies ignore “one of the most basic cybersecurity preparedness requirements” by failing to keep a log for longer than 12 months.

In addition, 36% do not have a cyber disaster recovery plan and 67% do not have a cyber crisis communications plan.

Help is at hand. The report’s principal investigator, Scott Belcher, says: “Fortunately, there is an abundance of information and tools, such as the Transportation Systems Sector (TSS) Cybersecurity Framework Implementation Guidance and accompanying workbook, available to public transit agencies to support a cybersecurity programme.”

For more information on companies in this article

Related Content

  • Taking the long view of ITS
    March 24, 2015
    Caroline Visser believes the ITS industry must present a coherent case for consideration of the technology to become part of transport policy and planning. As ITS advisor and road finance director for the International Road Federation (IRF) in Geneva, Caroline Visser is well placed to evaluate quantifying the benefits of ITS implementation – a topic about which there is little agreement and even less consistency. She is pressing to get some consistency in the evaluation of ITS deployments through the use of
  • EU mobility’s Covid escape route
    July 29, 2021
    European Union roads could be more resilient after the pandemic ends, thanks to the goal of creating a more integrated mobility network, says ERF’s José Diez
  • USDOT to fund New York, New Jersey transit systems upgrades
    September 23, 2014
    US Transportation Secretary Anthony Foxx has announced that 40 projects have been competitively selected to receive a share of US$3.59 billion in federal disaster relief funds to help public transportation systems in the areas affected by Hurricane Sandy to become more resilient, in order to withstand the impact of future natural disasters. Approximately 90 per cent of the funds will be invested in resilience projects primarily in New York and New Jersey, where transit systems sustained the worst of the
  • Companies depend on automation, AI and machine learning for cyber security
    February 23, 2018
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication