Hack my plane why don't you!
They had to 'sell' you with email, for you to approve a tool for you to do your job better?
Windows was (is) a crappy platform for anything you have to keep in configuration for cal/cert or other compliance issues. Every time it gets connected to the network, it starts slurping updates off some server in Redmond. And that's the low risk stuff. Most non-tech savvy people who get a prompt for some administrative function might as well have a button that says "Make the nasty popup go away and show me the nice video of kittens now".
Join Date: Dec 2001
Location: England
Posts: 1,389
Likes: 0
Received 0 Likes
on
0 Posts
The 787 has this chip which has this back door, but the 787 does not have any ability to recieve reprogramming instructions into the FMC while airborne.
Data is transmitted to ground stations for monitoring purposes like ADS/CPDLC etc. but the FMCs do not acccept commands unless the cockpit crew choose to accept it. ie route loading, atc clearances etc.
The chips if hacked may corrupt the software logic of systems but the worst is a systemic shut down of automation.
Those familliar with Boeing system logic will see that when the auto mode is corrupted, it reverts back to primary basic mode; if the system continues to malfunction, the system is isolated!
So the threat may exist, but hackers bringing down a 787 is very isolated.
Data is transmitted to ground stations for monitoring purposes like ADS/CPDLC etc. but the FMCs do not acccept commands unless the cockpit crew choose to accept it. ie route loading, atc clearances etc.
The chips if hacked may corrupt the software logic of systems but the worst is a systemic shut down of automation.
Those familliar with Boeing system logic will see that when the auto mode is corrupted, it reverts back to primary basic mode; if the system continues to malfunction, the system is isolated!
So the threat may exist, but hackers bringing down a 787 is very isolated.
Perhaps worth remembering that two American space satellite systems were hacked in 2007/8...
Cover Story: Hacking Cases Draw Attention To Satcom Vulnerabilities | Defense News | defensenews.com
In the case of Landsat 7 and Terra, the hackers created highly specialized radio frequency signals and transmitted the signals to the spacecraft from the Svalbard ground station in Norway. They did so on four occasions in 2007 and 2008. The commission was most specific about the probing of Terra. On June 20, 2008, hackers “achieved all steps required to command” NASA’s Terra, “but did not issue commands,” the commission said.
but the FMCs do not accept commands unless the cockpit crew choose to accept it. ie route loading, atc clearances etc.
Stuxnet was designed to spin Iran's centrifuges overspeed (uncommanded) while presenting normal reading to the plant operators.