AirAsia plane with 162 aboard missing en route to Singapore

December 28, 2014

AirAsia plane1

Singapore/Jakarta, Dec 28: An AirAsia plane with 162 people aboard went missing en route from Indonesia to Singapore this morning shortly after the pilots requested a change of flight plan because of weather, the third major aviation incident this year involving a Malaysian carrier.

AirAsia Flight QZ8501 with 155 people on board -- including one British, one Malaysian, one Singaporean, three Koreans, -- and seven crew members lost contact with air traffic control at 0724 local time Indonesia (0454 IST).

Sixteen children and one infant were among the passengers on board the AirAsia Airbus A320-200 that went missing on the flight from Surabaya, Indonesia, to Singapore.

At a press conference this morning, Indonesian officials said the plane was several hours past the time when its fuel would have been exhausted.AirAsia flight

There were unconfirmed media reports that a aircraft crashed in the waters of East Belitung, off the east coast of Sumatra.

The exact location of the crash site has not been identified, media reports said.

The aircraft was in the Indonesian Flight Information Region (FIR), more than 200 nm southeast of the Singapore -- Jakarta FIR boundary, when contact was lost, Civil Aviation Authority of Singapore (CAAS) said.

Contact with the plane was lost 42 minutes after takeoff. There were no Indian nationals on board.

The plane took off from Surabaya (Indonesia) at 5:20 am local time and was scheduled to land at Singapore's Changi Airport at 8:30 am.

A statement on AirAsia's Facebook page said: "AirAsia Indonesia regrets to confirm that flight QZ8501 from Surabaya to Singapore has lost contact with air traffic control at 0724hrs this morning."

"At the present time we unfortunately have no further information regarding the status of the passengers and crew members on board, but we will keep all parties informed as more information becomes available," the Malaysia-based carrier said in a statement.

The aircraft was an Airbus A320-200 with the registration number PK-AXC.

"At this time, search and rescue operations are in progress and AirAsia is cooperating fully and assisting the rescue service," the statement said.

Indonesian Transport Ministry official Hadi Mustofa said the plane had asked for an unusual route before it lost contact, local media reported.

Air Asia said the pilot had requested "deviation" from the its flight plan because of bad weather.

"The aircraft... was requesting deviation due to en route weather," it said.

Indonesia's National Search and Rescue Agency (Basarnas) Bangka Belitung said it has dispatched one vessel to search for AirAsia flight QZ8501.

"We received information from Basarnas in Jakarta that contact had been lost with an AirAsia flight over Bangka Belitung waters...We then dispatched a vessel with a search and rescue team of 22 members to check the information," Febi Imam Saputra, an information official at Basarnas Bangka Belitung, was quoted as saying by the Indonesian Antara news agency.

"If we look at the map, these coordinates refer to an area around 20 nautical miles from East Belitung," said Febi.

Search and rescue operations have been activated by the Indonesian authorities from the Pangkal Pinang Search and Rescue office.

Indonesian authorities have mobilised search and rescue operation near Belitung Island, deploying five ships and a surveillance aircraft carrying 15 Indonesian Air Force personnel.

The Civil Aviation Authority of Singapore has confirmed that it is linking up with Indonesian authorities to help locate the missing plane. Australia and Malaysia have also offered assistance.

A massive search is underway for the missing plane. The last detected position of the missing AirAsia Indonesia Flight QZ8501 is believed to be between Tanjung Pandan on Belitung island and Kalimantan, Indonesia, according to Indonesia's Director of Air Transport, Djoko Murjatmodjo.

"The position where contact was lost was between Tanjung Pandan and Pontianak, about 100 nautical miles south-east of Tanjung Pandan," said Djoko.

The pilot Captain Iriyanto has an experience of6,100 flying hours.

AirAsia Group CEO Tony Fernandes has asked his company to stay strong. "Thank you for all your thoughts and prayers. We must stay strong," tweeted Fernandes, an ethnic Indian, who set up the budget airlines which now flies to several countries.

Fernandes has said that he is heading to Indonesia.

Malaysia has also offered assistance in the search operation.

AirAsia is popular in the region as a budget carrier. It has about 100 destinations, with subsidiaries in several Asian countries.

The loss of contact with the AirAsia plane comes nearly 10 months after the disappearance of Malaysia Airlines Flight MH370, which went missing on March 8.

Searchers are yet to find any debris from Flight MH370, which officials believe crashed in the southern Indian Ocean.

Another Malaysia Airlines plane MH17 was shot down over Ukraine in July, killing all 298 on board.

AirAsia plane3

AirAsia plane2

AirAsia plane4

AirAsia plane5

 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 8,2020

China is aggressively pursuing a diverse range of tactics -- from cyber-attacks to recruiting insiders for economic espionage, Indian security agencies have warned. The specific alert circulated among key stakeholders suggests that Chinese operatives are not only planning to steal classified cutting-edge defense technology but also eyeing to recruit best academicians and researchers around the globe, especially from the US.

Sources said they have noticed that China has authorized an "aggressive program of stealing US science and technology information by recruiting Americans in the technology sector with access to trade secrets".

In the technology sector of the US, many Indians scientists are working at the forefront. "This is a serious matter for Indian government and security establishments," said a top source further adding that Chinese always pursue economic espionage because it suits their low cost manufacturing sector on the basis of stolen research and costly design developed by top companies across the globe.

"An alert was also issued in early January about Chinese cyber intrusion attempts at several companies where Indian researchers are working. The espionage attempt was to target UAV technology and certain top-end military equipment designs. After stealing the techniques and design, China starts producing these equipment domestically and sells at a cheaper rate, inflicting irreparable damage to the original equipment manufacturers," the sources in the security establishment observed.

Recently, the US accused China for targeting academia by sending researchers to American labs and using talent recruitment programme to steal scientific analysis. The US has also found that young recruits of the People's Liberation Army posing as students are entering into various universities across the globe to get research papers and recruit academia.

Earlier this year, the US charged a former Boston University student of visa fraud for failing to disclose the status as a lieutenant in the China's People's Liberation Army.

The US intelligence agencies have found that their "universities have become a soft target in the global espionage war with China".

In January this year, the US Department of Justice charged a leading academician at the Harvard University for hiding his alleged role in a Chinese government programme.

In July last year, the Federal Bureau of Investigation (FBI) Director Christopher Wray had revealed that the FBI is probing nearly 1,000 cases of economic espionage and attempted intellectual property theft, nearly all of them leading back to China.

Accordingly, Indian Missions have been informed about the threats being posed by Chinese spies and attempts to recruit Indian scientists and technologists working in the US and other parts of the world.

Sources further stated that security establishments in India have informed the scientist fraternity to be on alert amid threat posed by Chinese spies.

The Chinese had earlier recruited a personnel, Dongfan Chung, working at Boeing for economic espionage. Chung had stolen secret technology to benefit Chinese government and during the raid at his house more than 2.5 lakh classified pages related to Boeing were recovered.

"There has been intense debate on the international platforms regarding Chinese-sponsored theft of intellectual property. American agencies have gone on record to say that China was targeting trade secrets. In the backdrop of pandemic and global health crisis, Indian establishments in defence and technology sectors have been told to be extra cautious as China is planning to become the most advanced economy while the other countries are crippled by the highly contagious virus," the sources further added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 12,2020

Washington, May 12: The US Federal Bureau of Investigation and cybersecurity experts believe Chinese hackers are trying to steal research on developing a vaccine against coronavirus, two newspapers reported Monday.

The FBI and Department of Homeland Security are planning to release a warning about the Chinese hacking as governments and private firms race to develop a vaccine for COVID-19, the Wall Street Journal and New York Times reported.

The hackers are also targeting information and intellectual property on treatments and testing for COVID-19.

US officials alleged that the hackers are linked to the Chinese government, the reports say.

The official warning could come within days.

In Beijing Foreign Affairs ministry spokesman Zhao Lijian rejected the allegation, saying China firmly opposes all cyber attacks.

"We are leading the world in COVID-19 treatment and vaccine research. It is immoral to target China with rumors and slanders in the absence of any evidence," Zhao said.

Asked about the reports, President Donald Trump did not confirm them, but said: "What else is new with China? What else is new? Tell me. I'm not happy with China."

"We're watching it very closely," he added.

A US warning would add to a series of alerts and reports accusing government-backed hackers in Iran, North Korea, Russia and China of malicious activity related to the pandemic, from pumping out false news to targeting workers and scientists.

The New York Times said it could be a prelude to officially-sanctioned counterattacks by US agencies involved in cyber warfare, including the Pentagon's Cyber Command and the National Security Agency.

Last week in a joint message Britain and the United States warned of a rise in cyber attacks against health professionals involved in the coronavirus response by organised criminals "often linked with other state actors."

Britain's National Cyber Security Centre and the US Cybersecurity and Infrastructure Security Agency said they had detected large-scale "password spraying" tactics -- hackers trying to access accounts through commonly used passwords -- aimed at healthcare bodies and medical research organisations.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.