General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsHacker Demonstrates Ability To Remotely Hijack An Airplane Using A Smartphone
http://www.cultofandroid.com/25949/hacker-demonstrates-ability-to-remotely-hijack-an-airplane-using-a-smartphone/You can get some pretty cool gadgets that can be remote controlled by your smartphones and tablets, such as helicopters, cars, and even tanks. But who wants one of those when you can control the real think?
At the Hack in the Box security conference in Amsterdam this week, Hugo Teso, a pilot turned IT technician, demonstrated the ability to remotely hijack an airplane using a smartphone and a radio transmitter.
Thanks to his 12 years of experience as a commercial airline pilot, and 11 years experience in IT, Teso has a good idea how aviation systems work. He explained to attendees at Hack in the Box that two of the most important ones the Automated Dependent Surveillance-Broadcast (ADS-B) and the Aircraft Communications Addressing and Reporting System (ACARS) are completely unencrypted and unauthenticated.
Read more at http://www.cultofandroid.com/25949/hacker-demonstrates-ability-to-remotely-hijack-an-airplane-using-a-smartphone/#ODY2YDFYJxMdiIuw.99
graham4anything
(11,464 posts)If you see something suspicious, report it.
Phillip McCleod
(1,837 posts)..because one of them exposed a security flaw?
yeah it would be much better if we just pretended that there were no security holes at all. that would be much better.
fuck. utterly clueless about the world we live in.
graham4anything
(11,464 posts)They still don't know why that one flight over Long Island crashed
shoulder to air missile
hacker
red laser pointer
everyone died
Phillip McCleod
(1,837 posts)trumad
(41,692 posts)Too funny.
I am in the network Security business--- a business that would hardly exist without the ability to errrr hack.
Phillip McCleod
(1,837 posts)Swordfish.. the net .. etc.
Its a synonym for programmer.. 1st & orig. meaning.
Arctic Dave
(13,812 posts)As soon as they find out who created the stuxnet they need to be nuked.
Katashi_itto
(10,175 posts)We designed and created it. Israel had the on-ground assets to physically place it since, the Iranian centrifuge system was airgapped. It was a combo effort.
Arctic Dave
(13,812 posts)Katashi_itto
(10,175 posts)KittyWampus
(55,894 posts)Vinnie From Indy
(10,820 posts)Should I file weekly reports or as they come?
Ya know my mailman always makes my dog bark EVERY DAY and I am starting to think my dog is on to something. He is a very smart dog! Should I include his name in my report?
I have so many questions! Maybe you could expound on the topic a bit more.
Cheers!
sir pball
(4,737 posts)From the linked article, which you clearly didn't read..
Unsurprisingly, Teso hasnt shared most of the juicy details regarding the tools he uses, because the vulnerabilities they exploit are yet to be fixed. He says, however, that hes been pleasantly surprised by the industrys reaction to his research and discoveries, which have vowed to aid him in his research.
Also this:
The precise nature of the code flaws wasn't released for understandable reasons but Teso says the Federal Aviation Administration and the European Aviation Safety Administration have both been informed and are working on fixing the issue.
LanternWaste
(37,748 posts)"need to be dealt with harshly, zero tolerance. Theft is theft.Terrorists are terrorists. If you see something suspicious, report it."
Reads much like a very patriotic Soviet propaganda poster or a passage from Orwell. I can only imagine your premise will be allowed all the consideration it indeed warrants...
LiberalArkie
(15,703 posts)very simple equipment because the video was being sent in the clear. Not a very good idea. It is now encrypted.
KittyWampus
(55,894 posts)to pay for something so basically essential?
Blue_Tires
(55,445 posts)in theory, this guy could feed false info to a plane's automated systems (he'll need *slightly* stronger transmitting power than what his smartphone provides) and hope the pilots are asleep at the yoke, but that's about it...
trumad
(41,692 posts)The more we understand how this type of signal communication works, the more we can help prevent it.
Blue_Tires
(55,445 posts)Because communications tampering has happened in the past...Probably more often than we think
http://en.wikipedia.org/wiki/1986_Mozambican_Tupolev_Tu-134_crash#Landing_clearance_and_crash
trumad
(41,692 posts)Network Security is what I do for a living.
If the public only knew what is going on, they'd be a heck of a lot more careful.