Biggest Security Incidents of 2017

Biggest Security Incidents of 2017

As we look back on these security events, think of how we can move forward to predict and prevent incidents like this in the future.

Like most industries, security saw some common trends throughout 2017. Many of the tragic incidents this year fell into one of three categories. As we look back on these security events, think of how we can move forward to predict and prevent incidents like this in the future.

Mass Shootings

Two of the 10 deadliest mass shootings in modern U.S. history occurred in 2017. On Oct. 1, a gunman opened fire from the Mandalay Bay hotel down onto the crowd at an outdoor music festival on the Las Vegas Strip. The gunman killed 58 people and himself, and wounded more than 500 others. The Mandalay Bay attack is the deadliest mass shooting committed by an individual in the United States.

A month later, on Nov. 5, a gunman opened fire onto the congregation during a service at the First Baptist Church in Sutherland Springs, Texas. Of the small congregation, 26 people were killed and 20 others were injured. It was later found that the gunman should not have been able to legally acquire a firearm due to a domestic violence conviction during his time in the United States Air Force. The incident raised concerns about similar attacks on “soft targets” such as houses of worship.

Vehicle Attacks

The trend of vehicular attacks from 2016 continued in 2017, with multiple instances worldwide. At least 13 people were killed and about 100 were injured on August 17 when a van plowed through a crowd of people in Barcelona, Spain. Responsibility for the attack was claimed by ISIS.

Eight people were killed and almost a dozen injured in New York when a man in a rented pickup truck drove down a busy bicycle path. Authorities found a note near the truck claiming that the attack was made in the name of ISIS.

In response to these and other attacks, many public spaces and events added heavy barriers and roadblocks to their security measures. The purpose of the barriers is to prevent vehicles from being able to drive into pedestrian areas to cause harm.

Bombing Attacks

Bombing attacks were committed by terrorists around the world in 2017. On May 22, a suicide bomber detonated an improvised explosive device packed with nuts and bolts to act as shrapnel in the foyer area of the Manchester Arena in Manchester, United Kingdom. The attack occurred after a concert that was attended by 14,200 people, and 22 people were killed. It was the deadliest attack in the United Kingdom since the July 7, 2005 London bombings.

On Dec. 11, a man wearing a homemade pipe bomb set off his explosive in a busy subway walkway below the Port Authority Bus Terminal in New York City. The device that detonated was a foot-long pipe containing black powder, a battery, wiring, nails and screws, and was attached to the suspect with Velcro and zip ties. Authorities said the suspect pledged allegiance to ISIS and had at least two devices. No one was killed in the attempted suicide bombing, but three people sustained minor injuries.

As a result of the attempted transportation-related bombing, Senate Minority Leader Chuck Schumer has urged the TSA to expedite rollout of their new suicide-vest-detecting tech. The explosive screening system detects potential threats by identifying any metallic or non-metallic objects that block the naturally occurring emissions from a person’s body and triggers an alarm if a person carrying or wearing a person-borne improvised explosive device passes by it. 

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.