Ancient War Machines Since the beginning of warfare, military planners and generals dreamed of engineered machines to destroy military enemies first before they could inflict any destruction upon their own military forces...Read more
In September 2016, the Federal Aviation Administration’s top technical advisory group adopted language seeking to ensure that cybersecurity protections would be incorporated into all future industry standards—affecting everything from aircraft design to flight operations to maintenance practices. Carl Esposito, president of Honeywell’s Electronics Solutions Business unit, sees no need for such drills, pointing to the extraordinary rigor and care avionics suppliers use in writing code. Existing safety systems are effectively impenetrable from the outside, he said, because of “encryption, security keys and end-to-end verification” of users already embedded in the software. Flight-control applications are separated from cabin-entertainment data with a physical gap between their respective power grids. In the event a warning comes to the cockpit, he maintained, aviators aren’t cybersecurity experts so “what could the pilots do about it anyway?”
However, it is well known in intelligence circles that Militarized- Satellite systems from Rogue Nations have an advantage of embedded software in the cockpit and the cabin. Test are needed immediately to resolve this avenue of attacks upon our Aviation Industry. This time box-cutters will not be used by the next level of terrorist sophistication.
(source: Andy Pasztor)