{"id":15086,"date":"2015-04-17T12:02:47","date_gmt":"2015-04-17T17:02:47","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=15086"},"modified":"2015-04-17T12:02:47","modified_gmt":"2015-04-17T17:02:47","slug":"us-report-claims-in-flight-entertainment-leaves-planes-open-to-cyberattacks-others-disagree","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=15086","title":{"rendered":"US Report Claims In-Flight Entertainment Leaves Planes Open to Cyberattacks; Others Disagree"},"content":{"rendered":"<blockquote><p>A new report from the U.S. Government Accountability Office (GAO) warns that in-flight W-Fi, including wireless entertainment and internet-based cockpit communications, may allow hackers to gain remote access to avionics systems and compromise them. However, other experts disagree and call the report \u201cdeceiving.\u201d<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.batblue.com\/us-report-claims-in-flight-entertainment-leaves-planes-open-to-cyberattacks-others-disagree\/\">US Report Claims In-Flight Entertainment Leaves Planes Open to Cyberattacks; Others Disagree<\/a>.<\/p>\n<p>From:\u00a0 <a href=\"https:\/\/www.defcon.org\/images\/defcon-22\/dc-22-presentations\/Polstra\/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf\">Cyberhijacking Airplanes: Truth or Fiction? &#8211; DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf<\/a>.<\/p>\n<blockquote><p><strong>Closing Thoughts<\/strong><br \/>\n\u25cf Nearly every protocol used in aviation is<br \/>\nunsecured<br \/>\n\u25cf There is certainly the potential to annoy<br \/>\nATC and\/or small aircraft<br \/>\n\u25cf Increasing automation while continuing<br \/>\nwith unsecured protocols is problematic<br \/>\n\u25cf Airliners are relatively safe (for now)<\/p><\/blockquote>\n<p>The above pdf is a good read.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new report from the U.S. Government Accountability Office (GAO) warns that in-flight W-Fi, including wireless entertainment and internet-based cockpit communications, may allow hackers to gain remote access to avionics systems and compromise them. However, other experts disagree and call &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=15086\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[1365,102,323,698],"class_list":["post-15086","post","type-post","status-publish","format-standard","hentry","category-networking","tag-avionics","tag-hacking","tag-protocols","tag-security-research"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15086"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15086\/revisions"}],"predecessor-version":[{"id":15091,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15086\/revisions\/15091"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15086"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}