Deep Mystery: Looking For MH370

Researchers at the Dutch company leading the underwater hunt for Malaysia Airlines jet MH370 say they believe the plane may have glided down rather than dived in the final moments, meaning they have been scouring the wrong patch of ocean for two years.

Flight MH370 disappeared in March 2014 with 239 passengers and crew on route to Beijing from Kuala Lumpur. Searchers led by engineering group Fugro have been combing an area roughly the size of Greece for two years.

That search, over 120,000 square kilometres of the southern Indian Ocean off Western Australia, is expected to end in three months and could be called off after that following a meeting of key countries Malaysia, China and Australia on Friday. So far, nothing has been found.

"If it's not there, it means it's somewhere else," Fugro project director Paul Kennedy told Reuters.

While Mr. Kennedy does not exclude extreme possibilities that could have made the plane impossible to spot in the search zone, he and his team argue a more likely option is the plane glided down - meaning it was manned at the end - and made it beyond the area marked out by calculations from satellite images. "If it was manned it could glide for a long way," Mr. Kennedy said. "You could glide it for further than our search area is, so I believe the logical conclusion will be well maybe that is the other scenario."

Doubts that the search teams are looking in the right place are likely to fuel calls for all data to be made publicly available so that academics and rival companies can pursue an "open source" solution - a collaborative public answer to the mystery.

Fugro's controlled glide hypothesis is also the first time officials have lent some support to contested theories that someone was in control during the flight's final moments.

Since the crash there have been competing theories over whether one, both or no pilots were in control, whether it was hijacked - or whether all aboard perished and the plane was not controlled at all when it hit the water. Adding to the mystery, investigators believe someone may have deliberately switched off the plane's transponder before diverting it thousands of miles.

However, the glide hypothesis is not supported by the investigating agencies: America's Boeing Co, France's Thales SA, US investigator the National Transportation Safety Board, British satellite company Inmarsat PLC, the UK Air Accidents Investigation Branch and the Australian Defence Science and Technology Organisation.

The meeting between officials from China, Australia and Malaysia is expected to discuss the future of the search. The three governments have previously agreed that unless any new credible evidence arises the search would not be extended, despite calls from victims' families.

Any further search would require a fresh round of funding from the three governments on top of the almost A$180 million ($137 million) that has already been spent, making it the most expensive in aviation history.

Deciding the search area in 2014, authorities assumed the plane had no "inputs" during its final descent, meaning there was no pilot or no conscious pilot. They believe it was on auto-pilot and spiraled down when it ran out of fuel.

But Kennedy said a skilled pilot could glide the plane approximately 120 miles (193 km) from its cruising altitude after running out of fuel. One pilot told Reuters it would be slightly less than that.

For the aircraft to continue gliding after fuel has run out, someone must manually put the aircraft into a glide - nose down with controlled speed.

"If you lose all power, the auto-pilot kicks out. If there is nobody at the controls, the aircraft will plummet down," said a captain with experience of flying Boeing 777s - the same as MH370.

Like all pilots interviewed for this story, he declined to be named given the controversy around the lost jet.

Telegraph:

 

« ‘Dropping Elephant’ Is A New Cyber Espionage Group
Phineas Fisher Fingered: Hacking the Turkish Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.