The peer-to-peer car rental app Turo is facing intense scrutiny after vehicles rented through its platform were linked to two deadly attacks.
The incidents have raised serious questions about the app’s safety protocols and the potential for misuse of its services.
In New Orleans, a pickup truck plowed through the bustling Bourbon Street area, killing at least 15 people and injuring dozens more.
Meanwhile, in Las Vegas, a Cybertruck exploded outside the Trump International Hotel, resulting in one death and seven injuries.
Las Vegas Metropolitan Police Department Sheriff Kevin McMahill confirmed that the Cybertruck used in the Vegas attack had been rented through Turo.
The company also acknowledged that a host vehicle from its platform was involved in the New Orleans tragedy.
“We are heartbroken to learn that one of our host’s vehicles was involved in this awful incident. We are actively partnering with the FBI. We are not currently aware of anything in this guest’s background that would have identified him as a trust and safety threat to us at the time of the reservation,” a Turo spokesperson told NewsNation.
Sheriff McMahill described the connection between the two attacks as a “coincidence.”
However, both cases remain under investigation, with federal and local law enforcement agencies seeking to determine any potential links.
Turo’s Business Model Under the Microscope
Turo bills itself as the “world’s largest car sharing marketplace,” allowing users to rent vehicles from “trusted hosts” in their area.
The app requires renters to provide a driver’s license, be over 18, and submit personal information for approval.
Cars can be picked up, delivered, or accessed remotely via lockboxes or app-controlled entry, a feature that has drawn both praise for convenience and criticism for security vulnerabilities.
Despite its popularity, the attacks have sparked debate over whether Turo’s vetting process is rigorous enough to prevent misuse.
Critics argue that platforms like Turo may unintentionally create opportunities for bad actors to exploit lax security protocols.
This is, indeed, a loophole for terrorists -as for any criminals- to get a tool for their plans.
IT MUST BE PLUGGED!
Same day
Both middle aged
Both military backgrounds
Fort Bragg
Both rented vehicle
Electric vehicle
Traveled to site
Turo
Explosives
Firearms
Prominent locations
Don’t believe in coincidences