The ASIS Foundation announces its findings of a comprehensive research endeavor led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts.

The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV technologies.

New challenges and considerations

Autonomous vehicles are rapidly proliferating across land, sea, and air domains, revolutionizing various sectors and impacting markets, user behavior, and service attitudes. While uncrewed aerial system (UAS) technologies have matured significantly, there is a surge in investment towards autonomous ground vehicles (AGVs) capable of carrying passengers and cargo. Simultaneously, countries with advanced expertise and infrastructure are actively developing autonomous weapons systems, presenting new challenges and ethical considerations.

There is a surge in investment towards AGVs capable of carrying passengers and cargo 

At the heart of the report lies a meticulous examination of the threats, risks, challenges, and opportunities posed by AVs within security operations. From logistical and operational benefits to the technical prowess they offer, AV technologies promise unprecedented advancements. However, they also introduce a plethora of vulnerabilities and implications that demand careful consideration from security practitioners. 

Advancement of AV technology

"We've witnessed the evolution of autonomous vehicle technology since the 1990s,” said principal researcher Alison Wakefield, Co-Director of the Cybersecurity and Criminology Center at the University of West London. “While these advancements hold immense potential across various sectors, including commercial, military, and security, they also bring a myriad of risks and challenges. Our report aims to provide security practitioners with valuable insights and recommendations to navigate this complex landscape effectively."

Governments and global bodies are grappling with regulatory frameworks to balance social 

The continued advancement of AV technology hinges upon artificial intelligence (AI), which faces intense political, legal, and ethical scrutiny. Governments and international bodies are grappling with regulatory frameworks to balance social, economic, and military benefits against potential risks. However, regulations remain fragmented and evolving, alongside emerging ethical and legal dilemmas. Technical hurdles, coupled with substantial liability costs for system errors, underscore the complex landscape of AV deployment. The report highlights the intricate regulatory landscape surrounding AVs, emphasizing the need for practitioners to navigate national and international regulations, industry frameworks, and emerging standards effectively.

Recommendations for security practitioners 

"Ishmael Bhila, Peter Lee, and Alison Wakefield's research is a testament to their dedication to understanding the complexities of AV technologies within security applications," said Martin Gill, Ph.D., Chair, ASIS Foundation. "Their findings provide invaluable guidance for security practitioners seeking to harness the transformative potential of AVs while safeguarding against potential risks." 

The report offers useful advice for security practitioners to leverage AV technologies

Security practitioners must navigate this intricate environment to effectively harness AV technologies while ensuring responsible and secure utilization. They must comprehend varying regulatory landscapes, public sentiments, and security requirements across jurisdictions, while addressing risks to critical infrastructure from both malicious and unintentional actors. Anticipated trends include heightened security concerns as criminal and terrorist groups adapt commercial AVs, challenges posed by affordable surveillance capabilities, and the interconnectedness of AVs across domains. The report offers practical recommendations for security practitioners to leverage AV technologies effectively while mitigating risks and challenges. From training and regulation compliance to cybersecurity measures, the guidance outlined in the report empowers practitioners to embrace AV technologies responsibly.

Territory of AV technologies

The report emphasizes the pivotal role of organizations like ASIS International in facilitating collaboration among stakeholders, sharing expertise, and driving best practices to harmonize service provision in alignment with multisectoral needs, national and international guidelines, and public perceptions. Embracing emerging technologies while remaining vigilant to security implications is paramount for security practitioners to adapt and thrive in this dynamic landscape. 

As the security landscape continues to evolve, the insights offered by Bhila, Lee, and Wakefield's research serve as a compass for navigating the uncharted territory of AV technologies. Their work underscores the importance of staying informed and proactive in harnessing the transformative potential of AVs within security operations.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...