Deep Mystery: Looking For MH370

Researchers at the Dutch company leading the underwater hunt for Malaysia Airlines jet MH370 say they believe the plane may have glided down rather than dived in the final moments, meaning they have been scouring the wrong patch of ocean for two years.

Flight MH370 disappeared in March 2014 with 239 passengers and crew on route to Beijing from Kuala Lumpur. Searchers led by engineering group Fugro have been combing an area roughly the size of Greece for two years.

That search, over 120,000 square kilometres of the southern Indian Ocean off Western Australia, is expected to end in three months and could be called off after that following a meeting of key countries Malaysia, China and Australia on Friday. So far, nothing has been found.

"If it's not there, it means it's somewhere else," Fugro project director Paul Kennedy told Reuters.

While Mr. Kennedy does not exclude extreme possibilities that could have made the plane impossible to spot in the search zone, he and his team argue a more likely option is the plane glided down - meaning it was manned at the end - and made it beyond the area marked out by calculations from satellite images. "If it was manned it could glide for a long way," Mr. Kennedy said. "You could glide it for further than our search area is, so I believe the logical conclusion will be well maybe that is the other scenario."

Doubts that the search teams are looking in the right place are likely to fuel calls for all data to be made publicly available so that academics and rival companies can pursue an "open source" solution - a collaborative public answer to the mystery.

Fugro's controlled glide hypothesis is also the first time officials have lent some support to contested theories that someone was in control during the flight's final moments.

Since the crash there have been competing theories over whether one, both or no pilots were in control, whether it was hijacked - or whether all aboard perished and the plane was not controlled at all when it hit the water. Adding to the mystery, investigators believe someone may have deliberately switched off the plane's transponder before diverting it thousands of miles.

However, the glide hypothesis is not supported by the investigating agencies: America's Boeing Co, France's Thales SA, US investigator the National Transportation Safety Board, British satellite company Inmarsat PLC, the UK Air Accidents Investigation Branch and the Australian Defence Science and Technology Organisation.

The meeting between officials from China, Australia and Malaysia is expected to discuss the future of the search. The three governments have previously agreed that unless any new credible evidence arises the search would not be extended, despite calls from victims' families.

Any further search would require a fresh round of funding from the three governments on top of the almost A$180 million ($137 million) that has already been spent, making it the most expensive in aviation history.

Deciding the search area in 2014, authorities assumed the plane had no "inputs" during its final descent, meaning there was no pilot or no conscious pilot. They believe it was on auto-pilot and spiraled down when it ran out of fuel.

But Kennedy said a skilled pilot could glide the plane approximately 120 miles (193 km) from its cruising altitude after running out of fuel. One pilot told Reuters it would be slightly less than that.

For the aircraft to continue gliding after fuel has run out, someone must manually put the aircraft into a glide - nose down with controlled speed.

"If you lose all power, the auto-pilot kicks out. If there is nobody at the controls, the aircraft will plummet down," said a captain with experience of flying Boeing 777s - the same as MH370.

Like all pilots interviewed for this story, he declined to be named given the controversy around the lost jet.

Telegraph:

 

« ‘Dropping Elephant’ Is A New Cyber Espionage Group
Phineas Fisher Fingered: Hacking the Turkish Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Kintek Group

Kintek Group

Kintek Group provides cybersecurity and managed services to protect organizations from threats that exist inside and outside their networks.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.