What's new

‘Sukhoi likely downed by cyber weapons’

Just recently i was reading comment of a senior Turkish guy regarding why CHinese and Turkish systems are being offered to Pak as his views were that Pak is a professional force fighting insurgencies with a success and in the hands of Pakistani`s there weapons reputation exceeds and some time examples are quoted based on success with Pak Army , i always wonder with most nations operating Su series why India always comes up with super theories ,cyber weapon ? seriously Russia flew in hostile environment in Syria with US/Turk/Israeli`s and God knows who so ever was there there aeroplane did not face such mystery weapons .

FOr pilots not ejecting may be a failure of FBW system as chances of loosing both engines are highly unlikely secondly when FBW system fails the aeroplane may be went into some serious anuver knocking out both pilots (indeed a horrible experience) and by the time they gained conscious its too late already my bets are HAL being a culprit behind this

https://www.flightglobal.com/news/articles/fly-by-wire-failure-downed-indian-su-30mki-330051/
 
.
Lol. It was very well known that they were likely doing low fly training mission not giving time to pilots to eject.

:hitwall: I wonder where idiots dig sources...
 
.
India can never go wrong. Any mishap and incident is all the work of black magic and voodoo planted by enemy.

India is world class and invincible.

Self delusion at best! Indian will always come up with 10000 excuse to prove that they can never go wrong.
 
.
Misconception of ejection seat mechanism.

@Stuttgart001

It is a common knowledge that the ejection seat goes shooting up by pulling the lever between the pilots legs (crotch). But thats not the only thing that happens within the fractions of seconds.

There is chain of events involved before the ejection seat is to lift off within 4 seconds. To safely bailout of the aircraft, it is paramount for the system to know the airspeed & altitude at which the fighter is flying. This crucial factor must be coordinated before the operation takes effect.

And this is done by the environment sensor, an electronic device that senses the airspeed and altitude of the seat and sends data to the recovery sequencer:

upload_2017-6-29_9-25-5.jpeg



Here comes the master control of all, viz; Recovery Sequencer - an electronic device that controls the sequence of events during ejection. If this is disabled, there would be no lift-off:

airejectseat.gif
images-diagramejectseats-250x250.gif



The TESP NACES Sequencer features the capability to process data from multiple sources such as on board sensors or external inputs. Programmable logic generates the decisions to fire redundant MIL-STD-1512 initiators according to the algorithm that is required. The original NACES unit is fully qualified and has completed a 6000-hour reliability development test. Production deliveries commenced in August 1989 to support U.S. Navy Aircrew Common Ejection Seats (NACES) in F-14D, F-18 and T-45 aircraft.


The above crucial device handles data, offers precise timing control, has processor & software programed, henceforth it is possible to hack the ejection seat.

tem4er43e4.png
 
Last edited:
.
You are the most knowledgable indian people with millitary commonsensus i have met on PDF.
Hat off to you.
No I am just another Indian. However know few things about what I highlighted. Never spoke on aspects which I do not know. Enjoy your trolling :)
 
. .
And this is done by the environment sensor, an electronic device that senses the airspeed and altitude of the seat and sends data to the recovery sequencer:

upload_2017-6-29_9-25-5-jpeg.407156



Here comes the master control of all, viz; Recovery Sequencer - an electronic device that controls the sequence of events during ejection. If this is disabled, there would be no lift-off:

These are not things you can hack remotely silly. You can fry them (at best) with a massive directed EMP sure, but they have no easy EEPROM or such to hack/switch remotely....ROM arrays will all have been programmed/designed anyway to have a base state that ensures default firing state of the system with the worst case system failure scenario. Thats like engineering 101.
 
.
These are not things you can hack remotely silly. You can fry them (at best) with a massive directed EMP sure, but they have no easy EEPROM or such to hack/switch remotely....ROM arrays will all have been programmed/designed anyway to have a base state that ensures default firing state of the system with the worst case system failure scenario. Thats like engineering 101.
What if an external device is planted in wiring of system,which allows attacker to connect remotely to system?
I suspect that if these all machines like Sukhois are subjected to a cyber atta k even the most coordinated one,then still these machines have got a backup system to fly safely back to base at best external interference can be done to weapon systems,IFF,Radio and Radar because they have receivers.
 
.
India can never go wrong. Any mishap and incident is all the work of black magic and voodoo planted by enemy.

India is world class and invincible.

Self delusion at best! Indian will always come up with 10000 excuse to prove that they can never go wrong.
I thought i was the only one who noticed them doing this.
They always talk like Like they are always 100% to the point. Know everything from atom to Galaxy. :suicide:
 
.
"his may explain why even the pilots may have found it difficult to activate safety ejection mechanisms, once it became obvious that the aircraft was in serious trouble, as such mechanisms too could have been crippled by computer malfunctions induced from an outside source. "

This single line explains knowledge of author of this article. Ejection module in Sukhoi is mechanical, i.e, not controlled by computer/ IT. Still this guy is blaming Cyber attack for failure of ejection module. JUNK ARTICLE.

Very astute observation.
 
.
What if an external device is planted in wiring of system,which allows attacker to connect remotely to system?
I suspect that if these all machines like Sukhois are subjected to a cyber atta k even the most coordinated one,then still these machines have got a backup system to fly safely back to base at best external interference can be done to weapon systems,IFF,Radio and Radar because they have receivers.

With a life saving system, there will always be a purely mechanically based backup method. Like the ejection won't be as good most of the time (cant optimise etc), but no such thing as being unable to eject (unless the actual mechanical system had a fault).

If there is planting of hacking etc physical devices inside the aircraft, then there is much serious problems afoot there...and I wouldn't even target the robust ejection seat, but more the avionics and such etc which are fully electronic based and may have only couple redundancies (all electrical these days too given the unstable design).
 
.
cyber%20crime%20copy.jpg


Source Link: CLICK HERE


Given the range of cyber interference, the source of the attack could have been from thousands of kilometres or from only a few hundred metres away.


Analysts based in the vicinity of New York and St Petersburg warn that the loss, days ago, of an advanced and mechanically certified as safe, Sukhoi 30 fighter aircraft, close to the border with China may be the result of “cyber-interference with the onboard computers” in the cockpit.

This may explain why even the pilots may have found it difficult to activate safety ejection mechanisms, once it became obvious that the aircraft was in serious trouble, as such mechanisms too could have been crippled by computer malfunctions induced from an outside source.

They point to the apparent loss of five Army vehicles, “due (according to the authorities) to a misfired mortar strike” in the same zone, saying that a single mortar round would not have enough firepower to take out such a large number of vehicles. They add that the possibilities are that the damage may have been caused by a larger projectile guided by electronic systems that may have been interfered with during flight. Given the range and complexity of cyber interference, the source of the attack could have been from thousands of kilometres or from only a few hundred metres away.

These analysts warn that although India spends over Rs 200,000 crore on defence through the armed forces and another Rs 100,000 crore on security via police units, hardly Rs 4,700 crore gets spent on cyber capability. The analysts spoken to point out that almost all this gets expended on foreign vendors, rather than domestic producers. However, this reliance on foreign shores for defence and security is across the board, so far as capital expenditure is concerned, in contrast to China, which has almost entirely indigenised its capabilities over the past 15 years.


The international analysts spoken to, who are based in Russia and the United States, two of the four giants in the cyber field (the others being Israel and China), point to the devastating effect of the lightning shutdown of the Northern Power Grid on two separate occasions in August 2012. These were attributed by authorities to an “overdrawing” of power by Uttar Pradesh, omitting to consider the fact that such excess power consumption is routine, and that in the past, UP had withdrawn far more electricity from the grid than had been the case when it tripped.

They say that it is probable that a cyber-related malfunction of a key gauge may have occurred, leading to the breakdown in supplies. It is pertinent to recall (to illustrate cyber capabilities) that it was at that time that the US and Israel introduced Stuxnet into even non-internet related control systems in the nuclear industry in Iran. As a consequence, the nuclear process gauges showed acceptable speeds, even while remote commands raised the speed of certain processes to unsafe levels, thereby leading to a shutdown in operations.

Of course, they add that it is “next to impossible” that either the US or Israel were behind the Northern Grid power outage, although both have the capability to inflict such damage on essential civilian infrastructure, and that the Stuxnet example was only given as an illustration of the lethality of cyber weaponry.

The impact of cyber warfare on complex machinery may be judged by the crippling of the USS Donald Cook in April 2014 by electronic interference sourced from a high-flying Sukhoi-24. Exactly a year later, yet another Sukhoi disabled the USS Theodore Roosevelt (an aircraft carrier armed with multiple defensive and safety mechanisms) in the Baltic Sea. Both naval vessels had to be towed to safety, as their onboard propulsion systems got damaged by electronic interference.

Other large-scale disruptions caused by cyber warfare include the crippling of operations of Stockholm airport for three days last year. There had also been large-scale power outages in the US more than a decade ago, after the worst of which a warning was conveyed by US authorities to the (state) perpetrator that the next time around, there would be a disproportionate cyber reaction to the event, targeting the offending country. Needless to say, that was the last time large-scale disruptions of the same kind occurred within the US.

Given the push towards digitalisation by the Narendra Damodardas Modi government since 26 May 2014, the realm of cyberspace has become critical in the security and economic matrix of the country. In this context, cyber theft from banks is a vulnerability which needs to be eliminated. However, as yet authorities have adopted a conventional approach towards such crimes, as for illustration the overnight siphoning of Rs 1,200 crore ($171.2 million) from Union Bank of India on 20 July 2016 through seven “swift” transactions. $166 million was taken from Union Bank’s account in New York Citibank, while 5 million was removed from J.P. Morgan Chase, again in New York. The money was wired to seven accounts: Mrs Pornjit, SIAM Bank, Thailand; Mr Sithonno, Canadia Bank, Cambodia; Sactec Corporation, Sinopec Bank, Taiwan; Mr Cheng Nesgig, Indo-China Bank, Cambodia; and three other accounts.

During the same period, Bank of Maharashtra is reported to have lost Rs 25 crore through fraud in their digital payments mechanism. Interestingly, the same year, a Bangladesh bank lost $89 million in the same manner as Union Bank of India. While the Bangladesh authorities visited Sri Lanka to bring the account holders (into which the cash had been transferred) to justice, thus far authorities in India do not appear to have been to the locations where the money was sent, to interview the recipients.

In the Indian cases, authorities focused on backdoor diplomacy to try and get back some of the money stolen, rather than aggressively pursue the perpetrators and the beneficiaries. As a consequence, India is widely regarded globally as a soft target for cybercrime, despite harsh laws on the subject. “What counts is not law but implementation and the capability to react, and in both, India has remained well below its size and potential”, these experts claim.

Based in the vicinity of New York and St Petersburg, they warn that the capabilities of Indian authorities in the cybercrime realm are of a “Fourth World” standard. They claim that only Open Source tools are used in this country to track depredators, including by locating IP addresses. However, such addresses can be easily disguised by experienced hackers, thereby leading to the wrong locations being blamed for a cyber attack. Hence, in case an attack comes from a particular country, it is close to impossible for Indian authorities to identify the source, which means that there is no way of knowing who to complain to and about whom. Unlike the US, Russia, Israel or China, where each has the capability to penetrate through such dodges and establish where exactly an attack originated from, India has thus far relied on outside police forces to deal with cybercrime in this country, many of which are in locations compromised by graft and connivance with criminal gangs.

Globally, geopolitics specialists consider Prime Minister Narendra Modi to be among the top four global leaders (the others being Donald Trump, Xi Jinping and Vladimir Putin). They, therefore, expect that India under PM Modi will soon rectify the vulnerability caused by decades of neglect of the fact that the realm of cyberspace is likely to be the theatre of future conflict.

MoS (MEA) General V.K. Singh, while Chief of Army Staff, had put together a cyber warfare group, but this seems to have been relegated in importance by his successors. Interestingly, in the US, the backbone of that superpower’s cyber capability in both attack and defence is talent from India, either still holding Indian passports or naturalised citizens.

They say that military mishaps which may be passed off as accidents may in fact be the consequence of cyber warfare from unknown sources, as there are multiple groups of experienced hackers globally available on hire to the highest bidder. They say that the creation of stronger firewalls against cyber intrusions, including in the corporate and urban infrastructure sphere, needs to become a top priority of the Modi government as it crosses its first 1,000 days of existence.
I have rarely lost patience on this forum but this guy gets on my nerves. Unable to understand how can someone love anti country news so much. Maybe blocking is the route to go.

"his may explain why even the pilots may have found it difficult to activate safety ejection mechanisms, once it became obvious that the aircraft was in serious trouble, as such mechanisms too could have been crippled by computer malfunctions induced from an outside source. "

This single line explains knowledge of author of this article. Ejection module in Sukhoi is mechanical, i.e, not controlled by computer/ IT. Still this guy is blaming Cyber attack for failure of ejection module. JUNK ARTICLE.
I saw junk in headline. Also checked the poster.
 
.
I have rarely lost patience on this forum but this guy gets on my nerves. Unable to understand how can someone love anti country news so much. Maybe blocking is the route to go.

He is not an Indian fellow.
 
.

Pakistan Affairs Latest Posts

Back
Top Bottom