Hacker demonstrates how to hijack an airplane using an Android app
April 11, 2013 10:47 AM Subscribe
Hacker demonstrates how to hijack an airplane using an Android app
Teso, a trained commercial pilot for 12 years, reiterated that the Automated Dependent Surveillance-Broadcast (ADS-B) is unencrypted and unauthenticated which can lead to passive attacks like eavesdropping or active attacks such as message jamming and injection. Furthermore, the Aircraft Communications Addressing and Reporting System (ACARS) – a service used to send text-based messages between aircraft and ground stations - also has no security.
Teso, a trained commercial pilot for 12 years, reiterated that the Automated Dependent Surveillance-Broadcast (ADS-B) is unencrypted and unauthenticated which can lead to passive attacks like eavesdropping or active attacks such as message jamming and injection. Furthermore, the Aircraft Communications Addressing and Reporting System (ACARS) – a service used to send text-based messages between aircraft and ground stations - also has no security.
This post was deleted for the following reason: Double. -- jessamyn
« Older Cardinal Perplexogram | Blinking lights convey so much filler Newer »
This thread has been archived and is closed to new comments
posted by k5.user at 10:48 AM on April 11, 2013 [1 favorite]