MH370: Pilot Committed Suicide & Killed Everyone Else

An aviation expert who has been researching the disappearance of Malaysia Airlines flight MH370 says it is likely the pilot committed suicide. Ewan Wilson, a New Zealand-based air accident investigator and the founder of Kiwi Airlines, believes captain Zaharie Shah was mentally ill and that his actions ultimately resulted in the deaths of all those on board.

Furthermore Wilson, a veteran commercial pilot himself, alleges five previous incidents of “murder/suicide” in the aviation industry over the past three decades.

Wilson, whose book Good Night Malaysian 370: The Truth Behind The Loss Of Flight 370, was released in July, is in Birmingham to meet with aviation experts to discuss his findings and “have a candid chat about mental health screening for pilots in the airline industry.”

He told the Birmingham Mail: “There is a fundamental desire to ignore the mental health issue in the aviation industry.

“We have shown why hijacking by a passenger or accidental depressurisation are highly unlikely scenarios.

“By process of elimination, this leaves pilot suicide as the only other serious option in our analysis of what occurred on March 8.

The authors say the most likely scenario is that Shah deliberately depressurised the cabin, thereby depriving those on board of oxygen and causing them to lose consciousness for up to four hours before the Boeing 777 disappeared beneath the waves.

Although oxygen masks would have dropped down automatically from above the seats, the available supply was limited to just 20 minutes.

Those unable to grab a mask, including sleeping passengers, would have passed out within the space of a few minutes.

The entire 'ghost plane', including her cabin crew whose air supply is only marginally longer, would have slipped into a coma and died shortly after from hypoxia.

Shah, who locked his co-pilot out of the cockpit, survived long enough - either by re-pressurising the aircraft, or from breathing his own, more extensive air supply - to evade radar and "execute his master plan", the pair conclude.

They say he then performed a controlled ditching in the sea, which would explain why no debris has been found because the plane landed and sank in one piece.

An earlier report from the Australian Transport Safety Bureau (ATSB) also concluded that passengers may have died from hypoxia, and Malaysian authorities have previously named Shah as their prime suspect.

While Wilson stressed incidents of suicide flights are “highly unusual experiences”, he called for “more proactive tests for mental health screening”

He added: “This isn’t a witch hunt. Pilots should be encouraged to have mechanisms to feel free to say if they have got pressure in their lives and need some assessment.”

huffpo

« Why Digital Brands Have Kicked Traditional Marketing to the Side of the Road
Who Wants To Run The NSA Now? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.