logo
Boeing crash: Geofenced asymmetric cyberterrorism attack can happen again

Boeing crash: Geofenced asymmetric cyberterrorism attack can happen again

Thiruvananthapuram, July 21 (UNI) In a disturbing possibility of a geofenced asymmetric cyberterrorism attack, if the engines of the Boeing 787-8 aircraft that crashed in Ahmedabad on June 12 responded to software commands rather than to those from the humans on board, it could happen again, warranting urgent rectification.
"The invisible cutoff of fuel switches poses a serious challenge to India's scientists, engineers, and pilots. It is possible that someone interfered remotely, using software to control a critical part of the aircraft. This could mean the aircraft was hijacked through code rather than by force — and if that's true, it could happen again," internationally renowned CPS security researcher and CII-SCADA engineer KS Manoj told UNI.
In a potentially grave breach of aviation safety, the recent incident involving Air India's Boeing 787 Dreamliner (VT-ANB) at Ahmedabad airport has raised serious concerns over the possibility of the geofenced asymmetric
cyberattack, leading to a sudden and simultaneous shutdown of both engines during takeoff.
The aircraft, which had completed a routine flight from Delhi earlier that day without any technical anomalies, reportedly experienced an unexplained dual engine failure as it began its takeoff roll from Ahmedabad.
According to preliminary findings, both fuel control switches moved to the OFF position without any pilot input, a highly improbable and dangerous scenario that could have resulted in catastrophe had the aircraft been airborne.
Cybersecurity and aviation experts believe the nature and timing of the incident suggest the presence of a pre-programmed cyber trigger, possibly linked to the aircraft's GPS coordinates, making it a textbook example of a
geofenced asymmetric cyberattack.
Such attacks are designed to activate only when the aircraft enters or exits a specific physical location, bypassing manual controls and exploiting vulnerabilities in the aircraft's digital control systems.
The incident has drawn attention from international aviation authorities. The US National Transportation Safety Board (NTSB), which is monitoring the investigation given the aircraft's American origin, has reportedly
criticized the Indian preliminary report for being speculative and lacking technical depth.
Experts in aerospace cybersecurity argue that the investigation so far has failed to examine key attack surfaces such as the FADEC (Full Authority Digital Engine Control), cockpit display integrity, and avionics network security. Notably, no cockpit video footage has been provided to verify whether the fuel switch toggling occurred physically or as a deceptive display artifact.
Furthermore, the Aircraft Accident Investigation Bureau (AAIB) has come under scrutiny for its composition, which lacks specialists in avionics cybersecurity, SCADA/ICS forensics, or digital sabotage detection.
Despite the Dreamliner being a highly computerized, software-defined platform connected through networked critical systems, the probe team reportedly does not include representation from CERT-In, NCIIPC, DRDO, or any digital avionics research wing.
Senior cyber intelligence analysts warn that the incident bears chilling similarities to asymmetric cyber warfare techniques previously observed in other sectors, including the 2020 Mumbai power grid disruption — despite a predictive FIR filed by the Kerala Police.
In that case, a cyberattack was initially dismissed as human error. Analysts argue that if this latest aviation incident is not addressed with urgency and transparency, it may embolden further attacks on India's critical aviation infrastructure.
The concern is heightened by the aircraft's classification as Critical Information Infrastructure (CII) under Section 70 of the IT Act, which mandates specialized cyber protection and forensic oversight.
Aviation safety experts stress that the absence of pilot error, the unexplained movement of both fuel switches, the geographical specificity of the incident, and the aircraft's earlier normal operation from Delhi all point toward a location-bound malicious trigger. If the display screens inside the cockpit were compromised to hide or spoof the switch status, it would have rendered the pilots helpless in a high-stakes scenario.
The broader fear is that such attacks could bypass even highly trained flight crews, by silently manipulating systems they are taught to trust, KS Manoj, who is also a Research Engineer at CPS Security CPS Security Intelegrid ECC (P) Ltd, pointed out.
Experts are calling for an immediate joint investigation by AAIB, CERT-In, NCIIPC, and DRDO, and have urged the Ministry of Civil Aviation to treat the incident as a suspected act of cyber terrorism under Section 66F of the IT Act.
There is also a growing demand for a comprehensive audit of all FADEC equipped aircraft and for pre-flight security verifications that include geolocation-bound logic checks.
Unless acknowledged and mitigated at the earliest, experts warn that these emerging forms of cyber-physical sabotage could serve as a prelude to far more catastrophic events. Rather than remaining sitting ducks,
authorities must act decisively.
Analysts also caution that many of India's VVIPs regularly depend on such modes of air transportation, raising
national security stakes. The incident is being closely watched not only as a measure of India's technical preparedness, but also as a bellwether for the global aviation industry's ability to confront the next generation of threats -- where software, not explosives, may become the preferred weapon of choice.
The detailed statement of technical author KS Manoj is given below:
The Invisible Cutoff: A Chilling Mystery in the Sky
The Boeing 787 Dreamliner had just lifted off from Ahmedabad. The engines roared to life as expected, and the nose of the aircraft pointed confidently toward the skies. Everything seemed normal — until it wasn't. Just moments into the climb, something unthinkable happened.
A sudden shutdown in the sky.
Inside the cockpit, a strange silence replaced the usual hum of the powerful engines. The captain, Pilot 1, stared at the electronic display screen in front of him. This screen, called EICAS (Engine Indicating and Crew Alerting System), monitors the health of the aircraft's engines and systems.
Then came the shock.
The fuel flow dropped to zero. The engine speed began to fall. A warning flashed: 'ENGINE SHUTDOWN.'
The captain was stunned. He immediately turned to his co-pilot and asked: 'Why did you cut off?'
To which the co-pilot, equally confused, replied: 'I didn't.'
Who turned off the fuel?
Here lies the mystery: No one in the cockpit admitted to shutting off the engines. And why would they? Cutting off fuel just after takeoff is practically unthinkable.
Both pilots denied touching the switches. There was no reason to shut down the engines at that moment. The conversation recorded on the Cockpit Voice Recorder (CVR) proves that the captain was shocked and the co-pilot clearly denied any action.
But is there any proof? Sadly, no.
There is no CCTV camera inside the cockpit. There is no video footage showing the pilots' hand movements.
And Boeing 787s do not come equipped with inbuilt cockpit cameras.
So we cannot visually confirm what actually happened.
However, the aircraft's Flight Data Recorder (FDR) tells us one thing with certainty: The fuel switches moved from ON to OFF (CUTOFF), and then were turned back ON (RUN) during flight.
This was not imagined. It happened.
But the how and why remain a mystery.
The pilots tried to save the plane
Realizing what had happened, the pilots acted swiftly. They followed emergency procedures: they turned the fuel switches OFF (CUTOFF), then back ON (RUN) — trying to restart the engines.
It's similar to restarting a frozen phone.
But this wasn't a phone — it was a passenger aircraft full of lives, and time was running out. One engine showed signs of recovery. The other did not. The aircraft could not stay in the air.
What Did the Investigation Find?
The investigation confirmed that the fuel switches were OFF, then turned ON again — mid-air.
The voice recording revealed the pilots reacting in real-time, trying desperately to recover.
And when the wreckage was recovered, the fuel switches were found in the ON (RUN) position — proving that the pilots tried to save the aircraft until the very end.
So, What Really Happened?
The facts are chilling: Both engines shut down. Neither pilot touched the fuel switches. There is no video evidence. The data confirms the switches were moved. The pilots responded immediately to restart the engines.
This leads to a disturbing possibility: Was this a technical malfunction — or something far more sinister?
Could it have been a cyberattack?
A remote instruction sent to the aircraft's systems?
Did the engines follow commands from software, not from the humans on board?
Why this cannot be ignored
If this was not pilot error — If this was not a normal mechanical fault — then someone might have interfered remotely, using software to take control of a critical part of the aircraft.
It could mean the aircraft was hijacked — not by force, but through code.
And if that's true, it could happen again.
A timeline that raises questions
Flight VT-ANB flew safely from Delhi earlier that day. But during takeoff from Ahmedabad, both engines suddenly shut down — without warning.
The pilots didn't touch the fuel switches.
Yet they moved. And there's no video to explain how.
Everything had been normal just hours earlier.
So, what changed between Delhi and Ahmedabad?
Can anyone connect the dots?
UNI DS PRS
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

US condemns Hong Kong's arrest bounties targeting overseas pro-democracy figures
US condemns Hong Kong's arrest bounties targeting overseas pro-democracy figures

First Post

time5 minutes ago

  • First Post

US condemns Hong Kong's arrest bounties targeting overseas pro-democracy figures

US Secretary of State Marco Rubio condemned Hong Kong's issuance of arrest bounties for 19 overseas pro-democracy activists, calling it 'transnational repression' and vowing that the Trump administration will defend American freedoms. read more US Secretary of State Marco Rubio on Saturday condemned Hong Kong's offer of rewards for any information leading to the arrest of a select list of overseas activists, including some based in the United States. 'The extraterritorial targeting of Hong Kongers who are exercising their fundamental freedoms is a form of transnational repression,' Rubio said in a statement. 'We will not tolerate the Hong Kong government's attempts to apply its national security laws to silence or intimidate Americans or anyone on US soil.' STORY CONTINUES BELOW THIS AD Hong Kong police on Friday announced bounties for information leading to the arrest of 19 overseas activists, accusing them of national security crimes. Police said the activists were involved in what they called the 'subversive' Hong Kong Parliament – a pro-democracy non-governmental organization established in Canada. A reward of HK$200,000 ($25,500) each was offered for 15 of the activists, while the four others were already wanted for HK$1 million, the statement said. 'With this new round of arrest warrants and bounties, the Hong Kong government continues to erode the autonomy that Beijing itself promised to the people of Hong Kong following the 1997 handover,' Rubio said. 'Freedom of speech and political discourse are core American values, which the Trump administration will continue to defend.'

‘Purchased' honorary titles, international web of shell firms: How Ghaziabad conman operated fake embassy for 9 yrs
‘Purchased' honorary titles, international web of shell firms: How Ghaziabad conman operated fake embassy for 9 yrs

Indian Express

time33 minutes ago

  • Indian Express

‘Purchased' honorary titles, international web of shell firms: How Ghaziabad conman operated fake embassy for 9 yrs

A pristine white bungalow, four flashy sedans with blue and white diplomatic number plates parked in the driveway, national flags from across the world and a man posing as an 'ambassador'. When Uttar Pradesh Police's Special Task Force (STF) raided the 'Embassy of Westarctica' in Ghaziabad's upscale Kavi Nagar neighbourhood earlier this week, they came across an elaborate con job. Far from an an ordinary swindler, Harsh Vardhan Jain, the accused, had been running a fake embassy of a country that doesn't exist, without raising any suspicion for the last nine years. Jain had planned every detail meticulously to build this façade, according to the police. He had allegedly printed fake press cards, doctored photos with top dignitaries and even 'purchased' honorary titles from self-proclaimed micronations. The preliminary investigation, police say, has revealed that Jain was running a multi-nation scam. How did Jain manage to execute such a fraud, undetected for years, right beneath the vigilant gaze of the local Ghaziabad Police is yet to be revealed. How Jain's fake embassy operation was finally exposed is also unknown. According to the UPSTF, Jain is a Ghaziabad-born MBA graduate who claims to have studied in London. His father, JD Jain, was a once reputed industrialist, with marble export businesses operating in Rajasthan. In the early 2000s, Jain reportedly came in contact with self-styled godman Chandraswami, who allegedly introduced him to arms dealer Adnan Khashoggi and Ehsan Ali Syed, another conman posing as a businessman who was convicted in a fraud case in Switzerland. With their help, Jain is said to have established more than a dozen companies in Dubai, London, and Mauritius — many of them shell firms used to collect 'brokerage' for jobs and promises of huge loans before duping them. After a few years in London and Dubai, Jain allegedly returned to India in 2011 and began projecting himself as a diplomat. Police say he leveraged honorary titles from unrecognised micronations — Seborga, Westarctica, and Lodonia — to set up a fake embassy in his Ghaziabad home. He had also been posing as the ambassador of a fictional nation called Poulvia. When STF officers entered the Kavi Nagar bungalow on July 22, they found what appeared to be a diplomatic mission: cars with blue number plates bearing phrases like 'Honorary Consul – Baron Westarctica', flags of different nations on the property, and signages that were creating the illusion of official legitimacy. Inside, they recovered over Rs 44 lakh in Indian currency, foreign currency from the United Kingdom, United States, United Arab Emirates, and Turkey, 20 sets of fake diplomatic number plates, 34 stamps and seals of various fake entities,12 passports (some from unrecognized nations), Fake IDs including press cards and two PAN cards, a laptop, phone, and over a dozen luxury watches. Jain had been running the operation, STF officials said, by posing as a diplomatic representative allegedly by using the fake IDs and doctored photos. His setup included 'morphed' images showing him with late President APJ Abdul Kalam and Prime Minister Narendra Modi, among other leaders, in an attempt to look credible. Through this lavish setup, he had allegedly been luring individuals and companies with promises of jobs and international business deals. To outsiders, the 'embassy' appeared credible, complete with red and green diplomatic license plates and signage that implied ties with multiple global institutions. Officials said he even issued bogus 'diplomatic passports' from micronations and collected money as 'fees' with promises of providing employment in these micronations. Micronations are self-proclaimed countries not recognised by any sovereign state. While any associations with these micronations are often symbolic, Jain had allegedly used his associations with them to create an aura of legitimacy. Seborga, one of the micronations of which he had been posing as an ambassador, is a self-declared principality in Italy. In its statement, it said that it appointed Jain as an honorary councilor in good faith after he had contacted them. The statement also clarified that it was a symbolic post with no legal or diplomatic standing. The principality said that over the years Jain had aso 'recommended individuals to represent Seborga in India' some of whom had been appointed by the micronation. Westarctica, which claims to be a non-profit organisation working towards the cause of preserving the Antarctic ice sheet, confirmed that Jain was given the honorary title of 'Consul to India' after he made a donation in 2016. However, he violated protocol by calling his residence an embassy and printing unauthorised materials like diplomatic number plates and passports, according to a statement. 'He was indefinitely suspended,' the group said in a statement. Ladonia, another micronation, which claims to provide a cultural identity for people who believe in free speech and artistic expression and has clear boundaries but mostly 'non-resident' citizens denied any ties with Jain. forged documents to claim he was its Ambassador to India and harassed officials after they refused to recognize him. In a detailed response to questions asked by The Indian Express, Ladonia's Press Officer, Julia Andersson, said Jain became a 'symbolic citizen' on November 12, 2016, and had 'purchased' an honorary barony title. The micronation alleged that in November 2017, Jain had forged a certificate falsely claiming to be Ladonia's Ambassador to India, backdating it to September 15, 2016, in an attempt to predate the symbolic appointment of another Indian individual and had been 'harrassing' its officials by spamming them with texts and mails requesting for Ladonian paraphernalia, a request that was denied by the micronation. According to STF and police officials, Jain's network spanned multiple countries. He alleegdly maintained 11 bank accounts in the UK, UAE, Mauritius, and India; set up shell firms like Island General Trading Co. LLC (Dubai), East India Company UK Ltd and State Trading Corporation Ltd (UK); claimed to help clients get international contracts or jobs abroad; charged hefty 'brokerage'and used these fake diplomatic affiliations that he had purchased to appear credible enough to seek business clients. Police sources said that he made over 30 trips to the UAE alone and visited over 40 countries in the past decade to build a globe-trotting con operation. Police are currently trying to determine the number of people defrauded. An FIR (No. 671/2025) has been registered at Kavi Nagar police station under sections 318(4), 336(3), 338, and 340(2) of the Bharatiya Nyaya Sanhita, relating to forgery, impersonation, and cheating. Jain was remanded to judicial custody on July 23, where the STF seeked custodial remand to trace the full extent of his hawala network. Officials also said that the Income Tax Department would be informed about the seized cash and foreign currency. Further investigation is on into his multiple PAN cards, international accounts, and fake documentation.

Two dozens files of child pornography: Indian-origin man Jaydeep Patel arrested in Phoenix, charged
Two dozens files of child pornography: Indian-origin man Jaydeep Patel arrested in Phoenix, charged

Time of India

time33 minutes ago

  • Time of India

Two dozens files of child pornography: Indian-origin man Jaydeep Patel arrested in Phoenix, charged

Indian-origin Jaydeep Patel arrested in Phoenix on charges of child sexual abuse. 31-year-old Jaydeep Patel, an Indian-origin man in Phoenix, was arrested on suspicion of child sexual abuse and was charged with nine counts of sexual exploitation of a minor, according to court documents. Patel used to work at Phoenix Children's Hospital as a behavioral health technician but at the time of his arrest, he was no longer employed by the hospital. The case unfolded in a strange way as Patel's internet service provider tipped off the police that Patel had two dozens files of child pornography on his user profile. The top was provided in late 2024 and Patel was arrested earlier this month. Investigators said nine cybertoops were generated, leading to a search Patel's home and electronic devices. Detectives found 1,200 images and videos depicting minors. The court filings said that Patel used multiple online identities to request and store explicit content involving minors. Patel would also request in the chats 'child sexual abuse materials for his personal sexual gratification,' and openly admitted to liking young girls and being a 'pedo," according to court documents. Patel's former employer, Phoenix Children's Hospital, claimed that when they hired Patel, he had cleared all the standard background checks. The hospital said they are fully cooperating with the investigation. While Patel worked at the hospital as a behavioral health technician, he claimed to be a security officer in some online exchanges. Nine video files were recovered from Patel's social media account, court documents said. In them, young, grade-school-aged girls were either depicted exposing themselves or engaging in sexual conduct, according to documents.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store