A U.S. map shows the active United Airline flights in the air on a large display monitor at United Airline's new Network Operations Center Monday, June 18, 2012, in Chicago. The center, which was relocated to Willis Tower in Chicago, oversees more than 5,600 flights per day with employees planning flights, forecasting,routing scheduling crews and working with air traffic control.
A US map shows the active United Airline flights in the air on a large display monitor at United Airline's new Network Operations Center Monday, June 18, 2012, in Chicago. The center, which was relocated to Willis Tower in Chicago, oversees more than 5,600 flights per day with employees planning flights, forecasting,routing scheduling crews and working with air traffic control. -AP Photo

LAS VEGAS:Air traffic control software used around the world could be exploited by hackers to unleash squadrons of ghost planes to befuddle those entrusted to keep the skies safe, a security researcher said Thursday.

Cyprus-based Andrei Costin demonstrated his findings at a Black Hat gathering of cyber defenders that ends Thursday in Las Vegas.

“This is for information only,” Costin said as he outlined how someone with modest tech skills and about $2,000 worth of electronics could vex air traffic controllers or even stalk celebrities traveling in private jets.

“Everything you do is at your own risk.”Costin's target was an ADS-B system in place for aircraft to communicate with one another and with air traffic control systems at airports.

The system, which has been rolled out internationally in recent years in a multi-billion dollar upgrade, was designed to better track aircraft so airport traffic can flow more efficiently.

A perilous flaw is that the system is not designed to verify who is actually sending a message, meaning that those with malicious intent can impersonate aircraft either as pranks or to cause mayhem, according to Costin.

“There is no provision to make sure a message is genuine,” he said.

“It is basically an inviting opportunity for any attacker with medium technical knowledge.”Air traffic controllers faced with a signal from a fake airplane resort to cross-checking flight plans, putting relevant portions of air space off limits while they work.

“Imagine you inject a million planes; you don't have that many people to cross-check,” Costin said. “You can do a human resource version of a denial of service attack on an airport.”Denial of service attacks commonly used by hackers involve overwhelming websites with so many simultaneous online requests that they crash or slow to the point of being useless.

Aviation agencies are adept at identifying and locating “rogue transmitters” on the ground, but not at countering signals from drones or other robotic aircraft becoming more common and available, according to the researcher.

Another danger in the new-generation air traffic control system, according to Costin, is that position, velocity and other information broadcast by aircraft isn't encrypted and can be snatched from the air.

“Basically, you can buy or build yourself a device to capture this information from airplanes,” Costin said.

He listed potential abuses including paparazzi being able to track private jets carrying celebrities or other famous people.

Costin showed how a friend was able to identify a plane broadcasting the identification numbers of Air Force One, the military jet used by the US president, and plot it on a map on an iPad.

“It can be a very profitable business model for criminals to invest a small amount of money in radios, place them around the world” and then sell jet tracking services or information about flights, the independent researcher said.

“If it was Air Force One, why does Air Force One show itself?” Costin wondered aloud.

“It is a very high profile target and you don't want everyone to know it is flying over your house.”There are websites with databases matching aircraft registration numbers with listed owners.

Opinion

Editorial

More pledges
25 May, 2024

More pledges

THE administration’s campaign to bring Gulf investment to Pakistan continues apace, with the prime minister...
Pemra overreach
25 May, 2024

Pemra overreach

IT seems, at best, a misguided measure and, at worst, an attempt to abuse regulatory power to silence the media. A...
Enduring threat
25 May, 2024

Enduring threat

THE death this week of journalist Nasrullah Gadani, who succumbed to injuries after being attacked by gunmen, is yet...
IMF’s unease
Updated 24 May, 2024

IMF’s unease

It is clear that the next phase of economic stabilisation will be very tough for most of the population.
Belated recognition
24 May, 2024

Belated recognition

WITH Wednesday’s announcement by three European states that they intend to recognise Palestine as a state later...
App for GBV survivors
24 May, 2024

App for GBV survivors

GENDER-based violence is caught between two worlds: one sees it as a crime, the other as ‘convention’. The ...