Angående att ta över styrningen av ett plan så ska det tydligen låta sig göras enligt en trovärdig expert:
"According to Sally Leivesley, a former scientific adviser to the UK’s Home Office, the Boeing 777’s speed, direction and altitude could have been changed using radio signals sent from a small device. The theory comes after investigators determined that someone with knowledge of the plane’s system intentionally flew the jet off course.
“It might well be the world’s first cyber hijack,” Leivesley told the U.K.’s Sunday Express. “This is a very early version of what I would call a smart plane, a fly-by-wire aircraft controlled by electronic signals.”
In Leivesley's opinion, the evidence increasingly indicates that someone took over the plane’s controls “in a deceptive manner” and overwhelmed the plane’s system either remotely or from a seat on the plane."
http://www.businessinsider.com/missi...ijacked-2014-3
Ur samma artikel:
"Last year, a Spanish researcher showed it was possible to hack a plane using a mobile phone. According to WTOP, during a presentation in April 2013 at the Hack-In-The-Box security summit in Amsterdam, Hugo Teso allegedly proved that with an Android smartphone, a specific “attack code” and an Android app called PlaneSploit, he could hijack both a plane’s system as well as the pilot’s display."
Sen har vi några intressanta saker som kanske kan ha ett samband med varandra.
För ett antal år sedan skapade Kina ett eget OS som skulle vara säkert mot amerikanskt intrång:
"China has installed a secure operating system known as "Kylin" on government and military computers designed to be impenetrable to US military and intelligence agencies, The Washington Times reported on Tuesday.
The newspaper said the existence of the secure operating system was disclosed to Congress during recent hearings which included new details on how China's government is preparing to wage cyberwarfare with the United States.
Kevin Coleman, a private security specialist who discussed Kylin during the April 30 hearing of the US-China Economic and Security Review Commission, said its deployment is significant because it has "hardened" key Chinese servers."
""This action also made our offensive cybercapabilities ineffective against them, given the cyberweapons were designed to be used against Linux, UNIX and Windows," he said, citing three popular computer operating systems."
http://phys.org/news161355225.html
Sedan försvinner ett plan med 20 kineser som jobbade på Freescale som pysslar med teknik som kan användas militärt, bl.a. radar:
"Avoiding radar via “cloaking technology” has long been one of the objectives of the defence industry and Freescale has been active developing chips for military radar.
On its website, the company says its radio frequency products meet the requirements for applications in “avionics, radar, communications, missile guidance, electronic warfare and identification friend or foe”.
Last June it announced it was creating a team of specialists dedicated to producing “radio frequency power products” for the defence industry.
And on March 3, it announced it was releasing 11 of these new gadgets for use in “high frequency, VHF and low-band UHF radar and radio communications”."
http://www.express.co.uk/news/world/...efence-company
Sedan håller man en övning där ett passagerarplan eskorteras av jaktplan vid amerikanska kusten:
"Members of the South Carolina Air National Guard are conducting an air defense exercise along the coast.
Guard Senior Master Sergeant Edward Snyder says people might see fighter jets escorting a civilian aircraft Thursday over the North Charleston and Myrtle Beach areas."
http://www.washingtontimes.com/news/...coastal-skies/
Och nu häromdagen visar det sig att NSA hackat kinesiska Huawei:
"The agency pried its way into the servers in Huawei’s sealed headquarters in Shenzhen, China’s industrial heart, according to N.S.A. documents provided by the former contractor Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect a third of the world’s population, and monitored communications of the company’s top executives.
One of the goals of the operation, code-named “Shotgiant,” was to find any links between Huawei and the People’s Liberation Army, one 2010 document made clear. But the plans went further: to exploit Huawei’s technology so that when the company sold equipment to other countries — including both allies and nations that avoid buying American products — the N.S.A. could roam through their computer and telephone networks to conduct surveillance and, if ordered by the president, offensive cyberoperations."
http://www.nytimes.com/2014/03/23/wo...l.html?hp&_r=1