TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

United Airlines Stops Researcher Who Tweeted about Airplane Network Security

229 pointsby ehmmmabout 10 years ago

12 comments

csirac2about 10 years ago
We live in shitty knee-jerk reactionary times, but did anyone else see his tweet at the time? At best, it seemed in poor taste. At worst, the outcome seems depressingly predictable.<p>I don&#x27;t know what I&#x27;m trying to contribute here, except that whilst I have no problem with EFF working on this, their article here seems overly shrill and over-reactionary at how shrill and over-reactionary the airline was in their response to what (admittedly, in hindsight) could have easily been interpreted as a threat by an over-zealous corporate drone blind to smily-face emoticons.
评论 #9402645 未加载
评论 #9402623 未加载
评论 #9402602 未加载
评论 #9402596 未加载
评论 #9402656 未加载
评论 #9417604 未加载
评论 #9403679 未加载
评论 #9402576 未加载
评论 #9405100 未加载
评论 #9404217 未加载
narsilabout 10 years ago
The tweet in question: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;Sidragon1&#x2F;status&#x2F;588433855184375808" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;Sidragon1&#x2F;status&#x2F;588433855184375808</a>
评论 #9402852 未加载
评论 #9402667 未加载
评论 #9405127 未加载
评论 #9410463 未加载
makeitsucklessabout 10 years ago
I have a problem with the often used phrase &quot;legitimate researchers&quot;, because it suggests that certain freedoms should only apply to certain people.<p>&quot;legitimate researcher&quot; is not a specific job, researching is an activity any citizen can and should be free to conduct within the confines of the law, and all of that is &quot;legitimate&quot;.<p>The whole &quot;legitimate researcher&quot; creates a huge loophole through which the powers that be can create some kind of registered researcher status, with the obvious consequences for everyone else.
评论 #9403767 未加载
评论 #9403283 未加载
tripzilchabout 10 years ago
Reminds me of this 2012 story about two British tourists being barred from their flights for tweeting they were going to &quot;destroy America&quot; (slang for &quot;having a blast&quot;):<p><a href="http:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;technology-16810312" rel="nofollow">http:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;technology-16810312</a><p>I wonder how they connect the tweets to the persons? Do they actually actively search Twitter for keywords, and when they hit they dig into it until they have found a name, which they check against their passengers lists? There&#x27;s probably some shortcuts they can use, but it still seems weird to me.
评论 #9405345 未加载
itgabout 10 years ago
What an overreaction from the EFF. Use a bit of judgement and realize it isn&#x27;t a smart idea to talk about hacking an airplane full of passengers.
评论 #9402785 未加载
评论 #9402734 未加载
616cabout 10 years ago
So for aspiring infosec people, can someone explain how he can crack the encryption of EICAS? Different commenters on different site articles claim that the 737 never had EICAS, or maybe they mean that the Oxygen Mask On light is of course <i>not</i> connected to the internal avionics network.<p>Are there people who know this stuff better and have pointers? I would love to know more.
评论 #9404297 未加载
评论 #9404236 未加载
tptacekabout 10 years ago
Really dumb.<p>Really dumb of this security consultant to have bragged about tampering with airplane control systems in the middle of a flight.<p>Really dumb of EFF to make a <i>cause célèbre</i> of him.<p>EFF&#x27;s analysis of this situation seems to revolve around the consultant&#x27;s intent. He&#x27;s a security researcher, ego not a real threat, and undeserving of scrutiny.<p>I&#x27;d have thought that EFF would be better acquainted with pentesters by now. Anyone who spends a lot of time with pentesters knows that when it comes to disrupting or disabling critical systems, intent doesn&#x27;t have much to do with the outcome of a pentest. We break shit <i>all the time</i> without trying. We break shit even when we&#x27;re trying not to. Smart clients who have spent the last decade working with pentesters often have e-l-a-b-o-r-a-t-e rules of engagement designed to avoid prod disruption. We still break shit in prod, even when we follow the letter of the rules.<p>So this goofy tweet the consultant sends: is it what you&#x27;d expect right before a terrorist crashes a plane? Of course not. But is it exactly what you&#x27;d expect right before some idiot trips a bug that does something to force an emergency landing? It absolutely is.<p>Is it outside the realm of possibility that some control system somehow bridged to airplane wireless would have a problem that would allow a passenger to deploy the oxygen masks? It is not. Would that design flaw be idiotic? Yes it would. Does the idiocy of that design flaw mean it&#x27;s unlikely to be there? No it does not. <i>Virtually every system you interact with in the world has idiotic design flaws</i>. Wait, that&#x27;s not a question. &quot;Does virtually every system...&quot; YES. YES THEY DO.<p>So imagine that, just like in pretty much every pentest ever, this consultant is merely poking around trying to see what functionality is exposed to him through this design flaw. No intention to make anything happen at all. Now imagine he purely by accident does manage to, I don&#x27;t know, deploy oxygen masks. No harm done (stipulate nobody on the flight has a severe heart condition). Plane integrity undamaged. Plane fully capable of continuing along its itinerary. Nonetheless, what&#x27;s the likely outcome here? Unplanned emergency landing.<p>There probably is no such vulnerability. But then you have to ask yourself: who in United&#x27;s flight operations chain of command is qualified to assess whether there is? Really, who in the entire flight safety chain of command, from flight captain through FAA to DOJ, is? There aren&#x27;t that many people in the world who know how EICAS messages work. All they have to work with is the hypothetical. &quot;Unexpected behavior found in in-flight wireless. Tinkering in process!&quot; That&#x27;s a threat!<p>I think the thing that frustrates me most about this story is the fact that it&#x27;s probably not possible to launch anything more than nuisance attacks from the vantage point of a passenger. And yet because of our (admirable and effective) attitude with regard to flight safety, those nuisance attacks are all economically devastating. In other words, this kind of &quot;research&quot; is unhelpful.<p>Where EFF made me flip out this time: <i>Nevertheless, United’s refusal to allow Roberts to fly is both disappointing and confusing. As a member of the security research community, his job is to identify vulnerabilities in networks so that they can be fixed.</i> Wat. United&#x27;s decision here is extremely easy to understand: they do not want to offer service to someone who was willing to disrupt a flight to make a point. Meanwhile: the &quot;security research community&quot; does not deputize its members, make them swear an oath, and given them a little tin badge. No part of this guy&#x27;s &quot;job&quot; gave him the right to tamper with the computer systems on an aircraft. If EFF thinks that&#x27;s what it means to be a vulnerability researcher, they are broken. They cannot advocate effectively for legitimate research while promoting the idea of special rights for people who call themselves security researchers.
评论 #9403706 未加载
yeukhonabout 10 years ago
I second the motion that this is dumb. But weakness of airplane security is not unknown. Numerous presentations had been done at BlackHat and DefCon over the last few years, and people generally received good responses. But does anyone know if these presenters ever contacted the airline authority before they went on stage?
notduncansmithabout 10 years ago
As someone who&#x27;s flying United today, this is a bit disconcerting. Note to self: don&#x27;t crack jokes.
评论 #9403995 未加载
评论 #9403805 未加载
评论 #9404636 未加载
velox_ioabout 10 years ago
&#x27;Corporate types&#x27; have a lack of humour at the best of times, but that isn&#x27;t what is going on here.<p>It&#x27;s the 1 in 100, 1 in 1,000,000 chance that the tweet wasn&#x27;t a joke, but a real threat. They can&#x27;t take the risk that they knew about it, and didn&#x27;t take it seriously and 100&#x27;s died.
billpollockabout 10 years ago
United Airlines is THE worst.<p><a href="http:&#x2F;&#x2F;www.nytimes.com&#x2F;2013&#x2F;01&#x2F;29&#x2F;business&#x2F;passenger-vs-airline-policy-stand-offs-in-the-air.html" rel="nofollow">http:&#x2F;&#x2F;www.nytimes.com&#x2F;2013&#x2F;01&#x2F;29&#x2F;business&#x2F;passenger-vs-airl...</a><p>In my case they <i>almost</i> apologized for having had Federal Air Marshals detain me.
评论 #9404727 未加载
评论 #9404510 未加载
h4x3rabout 10 years ago
The War against security researchers &quot;hackers&quot; has began, and I think the reason is because in &quot;information war&quot; the hackers are a threat.<p><a href="http:&#x2F;&#x2F;blog.erratasec.com&#x2F;2015&#x2F;01&#x2F;obams-war-on-hackers.html" rel="nofollow">http:&#x2F;&#x2F;blog.erratasec.com&#x2F;2015&#x2F;01&#x2F;obams-war-on-hackers.html</a><p>Note: They keep saying &quot;HACKERS&quot; and not criminals!