MH370 Gentle Landing Theory

images?q=tbn:ANd9GcQ_EibYzosSgaYSwwoCWK_EwnlRkowQyMCV4W-M6FyqRWX5jHuS

Experts believe the missing MH370 flew on autopilot until it ran out of fuel, as an assumption Australian safety investigation officials are pronouncing in establishing that an underwater search must go further south to find the Malaysia Airlines jet’s most likely resting place.

After analyzing data between the plane and a British firm Inmarsat satellite, officials believe Malaysia Airlines flight 370 was on autopilot the entire time it was flying across a vast expanse of the southern Indian Ocean, Australian Transport Safety Bureau (ATSB) Chief Commissioner Martin Dolan said.

Investigators searching for flight MH370 now believe a catastrophic event, leading to oxygen starvation, is the most likely scenario in the disappearance of the Boeing 777-200 airliner.

The Australian-led search team say that the plane was flying on autopilot on a consistent course when it finally crashed into the southern Indian Ocean when its engines flamed out. ASTB Chief commissioner Dolan said it was “highly, highly likely” that MH370 was on autopilot for hours before it crashed, because of the orderly path the plane took.
“Certainly for its path across the Indian Ocean, we are confident that the aircraft was operating on autopilot until it ran out of fuel,” Dolan said.

Asked whether the autopilot would have to be manually switched on, or whether it could have been activated automatically under a default setting, Dolan replied: “The basic assumption would be that if the autopilot is operational it’s because it’s been switched on.”

But exactly when the Boeing 777 began running on autopilot is still not known.
“Autopilot theory would explain plane’s ‘orderly path’,” says Australian Transport Minister, Warren Truss.
“We could not accurately nor have we attempted to fix the moment, when [the Boeing 777-200 airliner] was put on autopilot,” Truss said. “It will be a matter for the Malaysian-based investigation to look at precisely when [the airliner] may have been put on autopilot.”

Efforts to find the Boeing 777-200 airliner is now focusing on an area near to where the original search off Australia’s west coast began, upon the March 24 shocking revelation of Malaysian Prime Minister Najib Razak, announcing the airliner ended its journey on March 8 in the southern Indian Ocean. “We are now shifting our attention to an area further south of the 7th arc – broadly in the area where our first search efforts were focused,” Truss said.

Oliver McGee:  

Oliver McGee is CEO-Founder, Partnership Possibilities for America

« Hackers Target Saudi Government Websites
Humans Should Ban Artificially Intelligent Weapons »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.