Why Cybersecurity Is So Essential to the Future of Transportation
The more our train and subway systems are connected, the greater the number of ways hackers have to penetrate them in order to wreak their unique brand of havoc.
An effective cybersecurity solution for rail systems will provide real-time alerts and constant monitoring.
Janna Starcic/METRO Magazine
4 min to read
An effective cybersecurity solution for rail systems will provide real-time alerts and constant monitoring.
Janna Starcic/METRO Magazine
Mobility-as-a-service (MaaS) companies that offer on-demand transportation alternatives to private vehicles have proliferated in recent years. These range from ride-hailing services like Uber to micro-mobility platforms like the electric scooter company, Bird. Global MaaS revenues are expected to exceed $1 trillion by 2030, disrupting the entire transportation industry and fostering a competitive ecosystem of dynamic transportation marketplaces. And as the global population rapidly urbanizes, MaaS companies will compete more and more with public transit for riders.
But don’t count out public transportation just yet. For billions of people around the globe, public transit is an essential element of daily life, with railways serving as the backbone of these public transportation systems across the globe. From the New York City Subway to the Shanghai Metro, rail is often the fastest and most convenient transportation method for commuters worldwide. And with 68% of the global population set to live in urban areas by 2050, its importance to billions of commuters worldwide will likely grow in the coming decades.
Ad Loading...
To succeed in this increasingly competitive mobility landscape, public transportation in general and trains specifically must meet modern demands for efficient, advanced, on-demand service. Indeed, rail systems today are undergoing rapid digitization and adopting more automated, wireless, and connected technologies, both trackside and onboard.
The advantages are manifold: Investing in modernizing rail transit systems is both environmentally and economically beneficial. Transportation is the largest source of U.S. emissions, and rail transit assists in reducing road congestion and curbing CO2 emissions in the face of climate change. Further, rail transit systems help maximize economic productivity. Reliable service ensures employees arrive to work on time, alleviates the stress of bumper-to-bumper commutes, and allows commuters to work on-the-go with Wi-Fi equipped trains. When public transportation systems and last mile Mobility-as-a-Service are combined, the enormous benefits are magnified. Take a train to the city, a subway to work, and jump on a scooter from the station to your office. No cars, no congestion, no smog.
The more our train and subway systems are connected, the greater the number of ways hackers have to penetrate them in order to wreak their unique brand of havoc.
But these technological advancements are not without a cost, most notably greater cyber risk. The more our train and subway systems are connected, the greater the number of ways hackers have to penetrate them in order to wreak their unique brand of havoc. What’s more, as urban commuters increasingly rely upon improved public transportation, these systems will become even more attractive as targets for bad actors — due to the tremendous damage such hacks can have on the economy and public safety.
This is no futuristic, dystopian scenario: Railways and metro systems have already been subjected to cyber-attacks. In 2008, a 14-year old Polish hacker used a television remote control to manipulate the Lodz tram network, derailing four tram cars and injuring 12 passengers. In 2016, the British transport system experienced 4 cyber-attacks in just one year, with cybercriminals hacking into computer networks, message boards, and individual trains. Though none of these four incidents caused physical damage or injury, hackers’ ability to access these systems points to a serious public safety threat. And accounts of grave security breaches continue to mount. This past March, IT security professionals discovered hackers selling access to a Chinese rail system on the dark web that would have enabled the buyer to virtually manipulate the train control system. This is why it is more critical now than ever that cities and transportation agencies invest in cybersecurity measures to protect citizens and commuters.
Public transportation needs to implement customized cybersecurity solutions that are built from the ground up, tailored to the specific needs of each system. Too often, cybersecurity solutions are offered as a one-size fits all package, ignoring the intricacies of individual transit systems and exposing them to greater risk. Railways need protective mechanisms suited to the industry’s unique needs.
Ad Loading...
Most of the aged legacy components were never designed with cybersecurity in mind, to begin with. This is precisely why railways require solutions suited for the digital age.
Making the problem even more complicated is the fact that today’s rail systems often combine legacy technology, with life-cycles of up to 30 years, with advanced components. Furthermore, most of the aged legacy components were never designed with cybersecurity in mind, to begin with. This is precisely why railways require solutions suited for the digital age.
An effective cybersecurity solution for rail systems will provide real-time alerts and constant monitoring, offering rail operators full visibility into their systems and the ability to address potential threats quickly. Continuous threat detection must be complemented by actionable insights, allowing rail operators, who are not necessarily native speakers of cybersecurity, to review alerts and implement next steps.
As mobility grows increasingly competitive, urban public transportation must not only be efficient and reliable, it must also remain secure. This can be achieved by continuing to make cybersecurity a priority. Otherwise, despite its advantages to commuters, the environment and the economy, public transit’s appeal will soon have run its course.
Amir Levintal is the co-founder and CEO of Cylus a cybersecurity solutions provider.
Polis comprises cities and regions, as well as corporate partners, from across Europe, promoting the development and implementation of sustainable mobility. This year’s event had over a thousand attendees across various policy forums and an exhibition.
Across North America and beyond, transit agency officials are contending with a perfect storm of operational headaches and strategic challenges that hamper daily service and long-term progress.
Simply incentivizing electrification is not enough to make a meaningful impact; we must shift our focus toward prioritizing public transportation and infrastructure.
For many years, the narrative surrounding public transit improvements has been heavily weighted toward environmental gains and carbon reduction. While these are undeniably crucial long-term benefits, the immediate focus of this new funding environment is firmly on demonstrable system efficiencies and a clear return on investment.
The notion of agencies being over- or underfunded, I argued, doesn’t hold up. If an agency wants to turn up the heat — to grow beyond the status quo — it must demonstrate measurable value.
Some agencies might suggest they are funded in the public transportation space. Some complain that they are funded too little. I have never heard a public transportation executive proclaim that they are funded too much. And if no public agencies are funded too much, then, by definition, none are funded too little. To steal from Goldilocks’ thinking, they are all funded just right.
From East Asia to Europe, more than 400 exhibitors and 70 sessions tackled global mobility challenges — highlighting AI, automation, and urban transit equity in the race toward a carbon-free future.
A closer look at ridership trends, demographic shifts, and the broader impacts of service reductions reveals why maintaining, and even improving, bus service levels should be a top priority in 2025.