Skip to main content

ITS and the battle against terrorism

Following the murderous events in Paris, investigators will be looking at how the terrorists’ plans could have been detected and foiled and why that did not happen in this case. Full details are not yet known but from the press reports it appears that there were several missed opportunities which centre on travel and transport: A car stopped by the German police was found to contain weapons and had a Paris address programed into its satellite navigation; the ‘mastermind’ has travelled undetected from Syria,
November 30, 2015 Read time: 2 mins

Following the murderous events in Paris, investigators will be looking at how the terrorists’ plans could have been detected and foiled and why that did not happen in this case. Full details are not yet known but from the press reports it appears that there were several missed opportunities which centre on travel and transport: A car stopped by the German police was found to contain weapons and had a Paris address programed into its satellite navigation; the ‘mastermind’ has travelled undetected from Syria, another two participants had travelled from Belgium in hired cars. After the atrocities took place another suspect is reported to have been stopped on their way to the Belgian border and then released.

If those initial reports turn out to be correct, then there are clearly internal communications issues for the security services to address but beyond that they will be looking at how such networks can be detected and their plots foiled. While the detection will probably centre on intercepting communications, preventing the perpetrators from arranging, equipping and carrying out their murderous deeds is likely to involve disrupting their travel plan. The reality is that the systems employed by the transportation sector are better equipped to detecting – or being modified to detect – the movement of marked individuals and suspect vehicles than any others currently deployed.

So in addition to tighter border controls, the response to Paris could involve road authorities, car hire and car share companies and transit operators having to monitor traffic and travellers for marked individuals. Furthermore, if one or more of these individuals is detected, there is likely to be a duty to inform the relevant authority.

While it probably won’t be long before we know the outcomes of these security reviews it seems clear that the transportation sector will be involved in countering future plots. Therefore it would be preferable for transportation authorities to participate in these conversations from the outset, rather than waiting for regulations to be imposed from on high.

Related Content

  • Saving the world, one parking space at a time
    December 7, 2020
    Donald Shoup, professor of urban planning at University of California, Los Angeles (UCLA), tells Adam Hill about why parking is too cheap – and how Monopoly could seriously raise its game
  • ULEZ: is it the best way to tackle air quality?
    August 31, 2023
    Issues of equity and economics need to considered in London's ultra-clean air zone expansion
  • Texas, Oklahoma move to interoperable tolling
    April 25, 2013
    Electronic toll systems in Texas and Oklahoma could be interoperable as soon as 2014, according to toll authorities from both states. Moves to link tolling systems in Texas and Oklahoma will enable drivers with Texas tolling accounts or Oklahoma turnpike accounts to travel on the other state’s toll roads using their current toll tags. The tolls would be automatically billed to the out-of-state driver’s account. “Oklahoma Governor Mary Fallin said it would be good to have interoperability with other states,
  • ITS America publishes connected vehicle guidance
    April 22, 2015
    Guidance on the likely impact of multipath communications on connected vehicle development has been published by ITS America. ITS America’s Connected Vehicle Technical Insight looks at the challenges and opportunities wireless interoperability could provide in vehicle applications. In particular the 22-page document examines the processes by which data can be transferred from one vehicle to another (V2V), or between a vehicle and the infrastructure (V2I).