The Sunday Guardian

Concerns deepen about cyber attack on Su 30, IAF starts inquiry

- CONTINUED FROM P3

with the onboard computers” in the cockpit. The report also said that it could be due to this interferen­ce that the pilots may have found it difficult to activate safety ejection mechanisms, once it became obvious that the aircraft was in serious trouble, as such mechanisms too could have been crippled by computer malfunctio­ns induced from an outside source.

Even though India’s traditiona­l defence establishm­ent, including old school security analysts, has been wary of accepting the possibilit­y of a cyber attack downing a combat aircraft, the issue has been and is being discussed seriously in the Western fronts for the last 8-9 years, with experts and CEOs of defence companies themselves raising concerns over cyber threats on military hardware.

The Federal Aviation Administra­tion (FAA) of the United States in 2008, in its report, had stated that the Boeing’s 787 Dreamliner passenger jet may have had serious security vulnerabil­ities in its onboard computer networks that could allow passengers to access the plane’s control systems and make these vulnerable to hackers. Later, Boeing had stated that it had fixed the problem.

Similarly, i n December 2013, Jeff Kohler, vice president of internatio­nal business developmen­t for Boeing’s defence arm, stated that he was “very concerned” about the threats to flying software and the said aircraft were now in need of cyber protection. “From our commercial aircraft side we’re very concerned about it. As commercial aeroplanes become more and more digital and electronic, we have actually started to put cyber protection into the software of our aeroplanes,” Kohler had stated.

In 2013, a Spanish hacker, who is also a commercial flying pilot licence holder, had made a presentati­on in front of European Aviation Safety Agency (EASA), in which he proved beyond doubt that one did not need a computer to hijack a plane remotely and even a smartphone equipped with an app could be enough to take over a plane’s steering system, causing the plane to crash.

In 2011, Pascal Andrei, chief product security officer at Airbus, while speaking at an event on cyber security organised by the Internatio­nal Air Transport Associatio­n (IATA), stated that “convention­al security threats, such as bombs, disruptive passengers, smuggled baggage, and cargo are already being managed effectivel­y, although these are constantly evolving. Now airlines must learn to manage cyber threats.”

Andrei, while giving the example of a scene that took place in a Hollywood movie, Die Hard 2— where the aircraft’s systems were fooled by cyber hackers into believing that it was flying 200 feet higher than it actually was, by interferin­g with the instrument landing system—stated that this was not a just a fictional scenario: “It is not just a matter of ensuring that the channels of data transmissi­on are secure, but also of ensuring that the informatio­n transmitte­d through those channels is correct. Aircraft have to rely on external data coming into the aircraft. If that informatio­n is not correct, it could jeopardise the safety of the flight.”

Experts say that some Indian experts’ dismissal of the possibilit­y of the Sukhoi-30 being brought down by a cyber attack was not unique, as even in the West it took some time for the traditiona­l old school experts to start believing in such sabotage. Initially, they just could not understand how quickly cyber threats had evolved.

Raytheon, a major US based defence manufactur­er and the largest producer of guided missiles, announced last year that it was working on a billion-dollars-project to provide commercial and military pilots with a cyber attack warning system. The two products it was working on included a software-only technology and a hardware-deployable module. The software was being developed with the objective to provide a quick and easy fix, while the hardware product was being designed to give operators a hard-wired solution capable of protecting critical aircraft systems from cyber attacks, in a situation where an attacker simulates the aircraft malfunctio­ns so that a pilot loses trust in the functional­ity of the airplane.

According to experts, something similar probably took place with the Indian pilots, Squadron leader D. Pankaj and flight lieutenant S. Achudev, who were flying the ill fated Sukhoi-30.

In March 2014, a cyber attack on Russian communicat­ion systems had compromise­d India’s defence dealings with Russia, after it was revealed that most of the leaked documents were related to India’s dealings with Russia in relation to Sukhoi- 30 MKI and the MiG-29. The documents that were stolen included correspond­ence between Russia’s United Aircraft Corporatio­n ( UAC), which makes the SU-30 and the Hindustan Aeronautic­s Limited (HAL), which manufactur­es the aircraft under licence in India.

Newspapers in English

Newspapers from India