Death by Robot

As the use of autonomous machines increases in society, so too has the chance of robot-related fatalities

Elaine Herzberg

Was killed recently by an Uber autonomous car that hit the 49-year-old at approximately 40mph as she was crossing the road in Tempe, Arizona. Police confirmed there was an operator in the Volvo SUV at the time of the collision, and stated that it didn’t appear the car had slowed down.

Robert Williams

Cited as the first human killed by a robot, Williams was an assembly worker at Ford’s Flat Rock plant in Michigan. He was crushed to death by the arm of a one-ton robot on the production line on 25 January 1979. His family was awarded $10m in damages. The court concluded that he was struck on the head due to inadequate safety measures.

Surgery patients

While robot-assisted surgery has allowed surgeons to perform operations remotely with minimal invasiveness, a 2016 US study found that it was linked to the deaths of 144 people between 2008 and 2013.

Causes of death included parts falling into patients’ bodies, machines turning off/on at the wrong time and loss of video feeds. “Despite widespread adoption of robotic systems… a non-negligible number of technical difficulties and complications are still being experienced during procedures,” the study said.
 
Micah Johnson

Believed to be the first person killed by a police robot. In July 2016, Johnson was involved in a standoff with Dallas law enforcement after fatally shooting five officers and injuring seven others. Police attached a block of C-4 explosive to a bomb-disposal robot and detonated it when it was near the suspect. “We saw no other option,” said the Dallas police chief.

Nine South African soldiers

In October 2007, an Oerlikon GDF-005 semi-autonomous anti-aircraft gun jammed and exploded before firing 250 high-explosive rounds at soldiers who were training with it. The weapon is capable of tracking targets and reloading automatically. “I think it is bad luck more than anything else,” one expert told the New Scientist.

Guardian

You Might Also Read: 

Artificial Intelligence, Robotics & All Tomorrows Wars:

Killer Robots Will Be Ubiquitous In The US Army:

 

 

« Cambridge Analytica Used ProtonMail To Hide Email Paper Trails
Human vs Machine Attack Response »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.