This page contains a Flash digital edition of a book.
services to transmit information to their end customers, so it is possible for data to be intercepted ‘in the air’ or on terrestrial networks (which is much more likely, and probably easier than tracking thousands of flying aircraft moving at high speeds). There will be entrepreneurs stepping forward to solve


When you need a creative and detailed paint scheme applied on your aircraft, where can you find a team with the skill and drive to complete it beautifully?


such problems whenever a problem presents itself. Some of these will be to give passengers a better assurance to keep their conversations more private by providing tougher encryption (which takes the NSA a bit longer to crack a message, thus rendering the gathered information less useful with the passage of time). You can imagine how a few technology startups will jump into the fray to provide internationally-traveling executives (who are in the midst of a terse negotiation and would not want the possibility of a competitor listening in) with a means to protect their privacy when flying over the Atlantic Ocean. Perhaps SecureCall (note to self: copyright this name) will develop an encryption key that is refreshed every 15 minutes and provides its customers with some degree of security. There is recent product announced from a company that provides a ‘USB condom’ so that when you plug in a smartphone or tablet into a recharging port on an airplane or an airport (or any other place into which you should not stick an unprotected charger), it is secured. The USB condom will shield against “juice jacking,” where a seemingly harmless charging station is used to steal data or harm a device (or insert a virus onto a smartphone at an airport, and hope that the infected device is connected while in flight, thus providing easier access to critical aircraft systems). Such unscrupulous devices do exist outside of James Bond movies and they serve as very real means of stealing information directly from a target. Stay tuned for more such products that might provide small amounts of cyber protection.


Paint master specialists Troy Reinke and Stacy Finch were excited to take on this large aircraft paint project. The custom paint scheme commissioned by artist Wilfrid Buch with countless lines swirling around the fuselage to create a psychedelic 3D image required talent, patience and detail few paint technicians possess.


For the rest of the story visit www.DuncanAviation.aero/ experience/paint.php.


ISLANDS OF UNCONNECTED INFORMATION


Experience. Unlike any other.


01.02 2014


34 +1 402.475.2611 | 800.228.1836


The greatest potential concern for the entire international community might be that countries or regions might feel the need to create differing (non-cooperative) air traffic and other mechanisms in order to address perceived U.S. government surveillance. Such a development would not only increase costs for airlines, operators, OEMs and repair stations (as well as business opportunities to some of these), but would create another layer of confusion onto the entire environment needlessly. Imagine if the EU forces anyone using SESAR to use a certain type of encryption scheme for all communications and the Middle Eastern countries create a competing scheme, etc. While the avionics vendors might welcome the opportunity to sell upgraded equipment, the business risk to support such diverging efforts might eventually drive the aviation-focused communications provider industry into the ground by increasing costs to the point where operators might balk at paying resulting prices.


DOMmagazine


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64