In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…
Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…
With each device in a vehicle using a computer there are many ways for a hacker to gain access to the vital components of the vehicle. It is estimated that a modern luxury car comprises of more than seventy Electronic Control Units (ECUs) in each vehicle today. Of these seventy different ECUs they are all connected via a network within the vehicle. This network is known as the CAN or Controller Area Network. “This interconnection permits complex safety and convenience features such as pre-tensioning of seat-belts when a crash is predicted and automatically varying radio volume as a function of speed.” (Checkoway, et al, 2011)…
The following report is a security assessment on Aircraft Solutions and the primary objective in this assessment is to identify the existence of vulnerabilities present within the global context of Aircraft Solutions’ operations. An evaluation of the associated threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an analysis of the degree of risk present. Finally, there will be a focus on the consideration of the consequences resulting from revealing of potential threats. Assessment Hardware and policy will be the main focus of this investigation. It will be narrowed down more to hardware issues.…
In George Orwell's novel 1984, the society was brainwashed and controlled by their government. They were stripped of their rights by "Big Brother". The government says they’re at war, but the citizens never hear of the enemy battles or see them on television. The government makes them watch certain programs, and always has them under surveillance. It is as if the people of this generation cannot do anything without the government having planned it already or them watching what the citizens are doing. The government invades the privacy of the people. Our government recently used the Patriot Act as a way to invade the privacy of many people.…
Diacetylmorphine, aka: heroin, smack, horse, black tar, china white, and H, the slang names are as numerous as the places you can score this highly addictive narcotic. Heroin, a derivative of morphine, via opium, which comes from the resin of the Papaver somniferum plant has been in use for nearly 3500 years (Doweiko,2012, p.137). To understand the fascination, addiction, and potential therapies of heroin, we must first understand its history.…
When George Orwell 's epic novel 1984 was published in 1949 it opened the public 's imagination to a future world, where privacy and freedom had no meaning. The year 1984 has come and gone and recent advances in technology have emerged. These new developments have empowered the government, and help to highlight the similarities between the American government and the government in 1984. Although many cannot even begin to accept the disturbing similarities shared between America 's government today and that of George Orwell 's 1984, they do exist. Today 's American government mirrors the government in 1984, because in both societies the government violates one 's basic right to privacy, and misleads their citizens into supporting their war efforts.…
Imagine living in a world where technology is controlled by a higher power and you basically have no say in your own everyday life. In the novel written by George Orwell 1984, this imagination is reality for Winston (main character) and all of the book’s society. Dictatorship by video surveillance is how society is run in the book 1984. It becomes something of intensity that is described how the use of technology is used to control public and even private behavior.…
Dystopia. The idea is explored in a now, quite saturated, genre of novels, many of which predict propaganda integrated into daily life, “controlling” the minds of the masses. 1984 is no longer the future, and neither is the twenty-first century. Many would believe that we still have yet to live in such conditions, but the truth contrasts this more than they may be aware. Propaganda is more prevalent than ever, with the advent of the internet, a powerful tool that when wielded can instantly connect one to vast amounts of knowledge. The internet, however, has become a powerful medium for propaganda. This isn’t even necessarily limited to blatant spreading of opinions, but also to news articles, and companies that exist today. This is not…
In the novel 1984, the author George Orwell depicted a society where everyone was being constantly observed by cameras and their thoughts were controlled by their leader, Big Brother. Big Brother watches over them to guarantee they are following the rules. He also uses his power to dictate their thought to ensure that the community would do as he wanted. When this novel was first written, in 1948, the thought of something like Big Brother watching and controlling you seemed far-fetched. Reanalyzing this story now, we see that our society, with all of the advancements in technology, is not far off from the dystopian society depicted in 1984. “Many privacy-shattering things have happened to us, some with our cooperation and some not. As a result, the sense of personal privacy is very different today than it was two decades ago.”(pg.21)…
In the Dystopian novels 1984 and Brave New World, George Orwell and Aldous Huxley create atmospheres that consist of their prediction of the future. “1984” and Brave New World contain totalitarian governments that encompass distorted views on the way societies should behave. Although the two leaders in the novels, Big Brother and His Fordship, carry out their regulations differently, the idea of how to control a society remains consistent. The key to maintain and establish a successful totalitarian society is through controlling the ideology toward personal relations and correctly using the advancement of technology for the “common good”.…
Technology has strived through history to make what it is today. To the making of the wheel, cotton gin, to the first transportation system in America. A particular piece of new technology, the smartphone, allows communication through two screens and permits audio. This has particularly brought to attention because of its similarity to George Orwell’s 1984 telescreens. In the book, an authoritarian government ruled by Big Brother controls its people by various telescreens planted around various places, hidden to the eye. Shown by the quote, “Big Brother is watching you,” the setting in 1984 is ruled by fear. An alarming question brought upon us is, “are we reaching a similar setting as George Orwell’s imagination?” Although there may be important counterarguments, the answer to that question is no.…
Drone use within the United Stated of America has been a very controversial topic of the recent times; therefore, this article is being written to say why drone usage has become so controversial in our country, and all over the world.…
The principle focus regarding terrorism, aviation security and the FAA has so far been on major airports and commercial aircraft with good reason. Terrorist’s main goal is to cause fear and distrust among a population in the institutions that are necessary to modern living as well as to gain as much press coverage as possible for whatever cause on the terrorist agenda. Commandeering a vehicle that can carry a couple hundred of people and with the potential to create significant damage accomplishes those means. However, there is another layer of aviation that is not as regulated as the larger commercial airports, therefore providing services to a different class of aircraft and has not been the focus of attacks by terrorist. This layer is known…