From: THFoster6@aol.com
Date: 4/12/2013 10:30:57 PM
Subject: Fwd: looking for king air pilot in MSY
Bob Brandon (former Delta MSY
Pilot) sent me this email today, April 12th. Someone on my
distribution list of Delta Pilots or the PCN may know someone who wants to
respond to Bob about this opportunity. If so, please do so to Bob
Brandon at brandoni@bellsouth.net or his cell phone 850-291-1105.
Travis Foster
Retired DAL MSY 1998
From: robert brandon
Date: 4/12/2013 8:45:57 PM
To: Travis Foster
Subject: looking for king air pilot in MSY
Travis,
Long time no see....thanks for all the
emails.
I fly a Lear 35 for a Pensacola based
company, Lifeguard Air Ambulance. They are about to base a King Air at
Lakefront and are looking for 2 King Air captains and 2 to be co-pilots to fly
the King Air in support of Oschner Medical Center...a lot of transpalnt organ
retrieval...all hours of the day or night. I don't know the pay rate, but
if you know or hear of anyone who might be interested, would you pass them my
email address or cell phone #.
I'm flying with Joe Ellis..retired DAL
from DFW, and 2 other good guys..the flying is still fun, and recurrent
still sux.
All is well in PNS, except that the
Blues have had to stand down for the rest of the year!!??
thanks much,
Bob Brandon
cell 850-291-1105
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
From:
George
Chaudoin
Date:
4/12/2013 1:42:46 PM
Subject:
Great Lakes Aircraft Carriers
I never knew this piece of
history. Great photos and a wonderful, but long, thread. Bart
Many of
you probably didn't know that the Navy trained naval aviators on Lake Michigan
on two converted freighters. They were designated "Wolverine" and
"Sable ".
The simple answer as to why they trained on Lake Michigan is that there was virtually no chance that a submarine could enter into conflict with these aircraft carriers And that location was too far inland to be threatened by bombers.
The simple answer as to why they trained on Lake Michigan is that there was virtually no chance that a submarine could enter into conflict with these aircraft carriers And that location was too far inland to be threatened by bombers.
I
included the comments of a former commanding officer of Navy squadron VA145
below who actually trained on them.
Dave
Subject:
Fw: Great Lakes Aircraft Carriers
I was going through Navy Primary Flight Training at Glenview
Naval Air Station in 1944 while this was going on.
The aircraft and pilots were in their final phase of flight
training. We used to watch them during their Field Carrier Landing
Practice (FCLP).
hAL
Some interesting Great Lake aviation history.
Great Lakes Aircraft Carriers
Warbird Information Exchange . View topic -
USS Sable and USS Wolverine ...
Here’s more photos of the Lake Michigan
aircraft carriers USS Sable & USS Wolverine than I’ve ever seen
before. With photos of many different aircraft operating from them,
including a TBD Devastator.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++
Subject: Fwd: Researcher hacks aircraft
controls with Android smartphone
Date: April 11, 2013 12:21:45 PM EDT
Reply-To: dickdeeds@pacbell.net
I received this from several of our pilots. FYI
Dick
Dick
By
Iain Thomson in San Francisco
Posted in Security, 11th April 2013 01:12 GMT
A presentation at the Hack In The Box security summit in Amsterdam has
demonstrated that it's possible to take control of aircraft flight systems
and communications using an Android smartphone and some specialized attack
code.
Hugo Teso, a security researcher at N.Runs and a commercial airline pilot,
spent three years developing the code, buying second-hand commercial flight
system software and hardware online and finding vulnerabilities within it.
His presentation will cause a few sleepless nights among those with an
interest in aircraft security.
Teso's attack code, dubbed SIMON, along with an Android app called
PlaneSploit, can take full control of flight systems and the pilot's
displays. The hacked aircraft could even be controlled using a smartphone's
accelerometer to vary its course and speed by moving the handset about.
"You can use this system to modify approximately everything related to the
navigation of the plane," Teso told Forbes. "That includes a lot of nasty
things."
First, Teso looked at the Automatic Dependent Surveillance-Broadcast (ADS-B)
system that updates ground controllers on an aircraft's position over a
1Mb/s data link. This has no security at all, he found, and could be used to
passively eavesdrop on an aircraft's communications and also actively
interrupt broadcasts or feed in misinformation.
Also vulnerable is the Aircraft Communications Addressing and Reporting
System (ACARS), the communication relay used between pilots and ground
controllers. Using a Samsung Galaxy handset, he demonstrated how to use
ACARS to redirect an aircraft's navigation systems to different map
coordinates.
"ACARS has no security at all. The airplane has no means to know if the
messages it receives are valid or not," he said. "So they accept them and
you can use them to upload data to the airplane that triggers these
vulnerabilities. And then it's game over."
Teso was also able to use flaws in ACARS to insert code into a virtual
aircraft's Flight Management System. By running the code between the
aircraft's computer unit and the pilot's display he was able to take control
of what the aircrew would be seeing in the cockpit and change the direction,
altitude, and speed of the compromised craft.
He admitted that some of this was moot, given that the human pilot could
always override the automatic systems, but the software could be used to
make cockpit displays go haywire or control other functions, like deploying
oxygen masks or lights.
The precise nature of the code flaws wasn't released for understandable
reasons but Teso says the Federal Aviation Administration and the European
Aviation Safety Administration have both been informed and are working on
fixing the issue.
Posted in Security, 11th April 2013 01:12 GMT
A presentation at the Hack In The Box security summit in Amsterdam has
demonstrated that it's possible to take control of aircraft flight systems
and communications using an Android smartphone and some specialized attack
code.
Hugo Teso, a security researcher at N.Runs and a commercial airline pilot,
spent three years developing the code, buying second-hand commercial flight
system software and hardware online and finding vulnerabilities within it.
His presentation will cause a few sleepless nights among those with an
interest in aircraft security.
Teso's attack code, dubbed SIMON, along with an Android app called
PlaneSploit, can take full control of flight systems and the pilot's
displays. The hacked aircraft could even be controlled using a smartphone's
accelerometer to vary its course and speed by moving the handset about.
"You can use this system to modify approximately everything related to the
navigation of the plane," Teso told Forbes. "That includes a lot of nasty
things."
First, Teso looked at the Automatic Dependent Surveillance-Broadcast (ADS-B)
system that updates ground controllers on an aircraft's position over a
1Mb/s data link. This has no security at all, he found, and could be used to
passively eavesdrop on an aircraft's communications and also actively
interrupt broadcasts or feed in misinformation.
Also vulnerable is the Aircraft Communications Addressing and Reporting
System (ACARS), the communication relay used between pilots and ground
controllers. Using a Samsung Galaxy handset, he demonstrated how to use
ACARS to redirect an aircraft's navigation systems to different map
coordinates.
"ACARS has no security at all. The airplane has no means to know if the
messages it receives are valid or not," he said. "So they accept them and
you can use them to upload data to the airplane that triggers these
vulnerabilities. And then it's game over."
Teso was also able to use flaws in ACARS to insert code into a virtual
aircraft's Flight Management System. By running the code between the
aircraft's computer unit and the pilot's display he was able to take control
of what the aircrew would be seeing in the cockpit and change the direction,
altitude, and speed of the compromised craft.
He admitted that some of this was moot, given that the human pilot could
always override the automatic systems, but the software could be used to
make cockpit displays go haywire or control other functions, like deploying
oxygen masks or lights.
The precise nature of the code flaws wasn't released for understandable
reasons but Teso says the Federal Aviation Administration and the European
Aviation Safety Administration have both been informed and are working on
fixing the issue.
Subject: Hacker uses an Android to remotely
attack and hijack an airplane
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
From: DWSkjerven@aol.com
Date: 4/8/2013 8:26:33 PM
Subject: Fwd: Say Goodbye
Not a dry eye in the crowd.
Just to hear this song again makes
it worthwhile
Sharing photos. Enjoy
Somebody
has done a great job of compiling vintage airline and aircraft pictures and
showing them to a moving soundtrack by Andrea Bocelli.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Full post disclaimer in left column. PCN Home Page is located at: http://pcn.homestead.com/home01.html
No comments:
Post a Comment