It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Phage
a reply to: smurfy
Yes. And as such he would be very interested in government concerns about cybersecurity. It's likely he did see the report.
originally posted by: Phage
a reply to: smurfy
While being interviewed he discussed the GAO audit with the FBI.
Actually, no. I did not know which you were referring to.
That that would be after he was taken off the plane, not the previous meeting some months ago, the one as you know I was referring to.
As for arrest or detention coming off the plane, were the police there just to see if the FBI were behaving properly?
originally posted by: Zaphod58
a reply to: Phage
The entire industry would be shocked, considering that the people that design the systems are some of them saying it can't be done.
He obtained physical access to the networks through the Seat Electronic Box, or SEB. These are installed two to a row, on each side of the aisle under passenger seats, on certain planes. After removing the cover to the SEB by “wiggling and Squeezing the box,”
Roberts told agents he attached a Cat6 ethernet cable, with a modified connector, to the box and to his laptop and then used default IDs and passwords to gain access to the inflight entertainment system. Once on that network, he was able to gain access to other systems on the planes.
originally posted by: Zaphod58
a reply to: roadgravel
I'm with one of the experts. I have a hard time believing that he did this as many times as they say he did, and not one passenger or crew member ever said "Hey, what do you think you're doing?"
originally posted by: Zaphod58
a reply to: smurfy
Considering that FAA agents are not designers of the systems, I'm going to listen to Boeing and the people that design the system and software before I listen to them.
Eventually, Roberts and his research partner determined that it would take a convoluted set of hacks to seriously subvert an avionics system, but they believed it could be done. He insisted to WIRED last month, however, that they did not “mess around with that except on simulation systems.” In simulations, for example, Roberts said they were able to turn the engine controls from cruise to climb, “which definitely had the desired effect on the system—the plane sped up and the nose of the airplane went up.”
Today he would not respond to questions about the new allegations from the FBI that he also messed with the systems during a real flight.
Source: The A Register
More modern aircraft use an updated standard, ARINC 664 - except for Airbus planes that use a modified version dubbed AFDX. This retains the non-TCP/IP nature of the earlier standard and adds unidirectional data traffic control via paired cables and only ever accepts one sending system, although data can be sent to multiple endpoints.
The one exception to this is the Boeing 777, which uses a modified version of ARINC dubbed 629, which allows Boeing to use off-the-shelf network components in the aircraft. Boeing was also granted special leave to allow ARINC 629 to be linked into a standard IP network, but only for data outputs not inputs, and with no connections to the flight management or avionics systems.