Feeds

BA aborts flight over ringing mobile phone

Laptops allowed back - but leave the milk at home

Internet Security Threat Report 2014

A British Airways flight from London to New York turned back on Sunday after an apparently ownerless mobile phone began to ring at the back of the aircraft, CNN reports.

One of the passengers aboard flight BA 179 told the BBC: "When the plane took off a mobile phone started ringing." This provoked a security risk assessment by BA's Heathrow security team. Although it decided it was safe for the flight to continue, the pilot opted to head for home as a "precautionary measure".

A BA statement explained: "A mobile phone was located on board the aircraft which none of the passengers appeared to own. The captain assessed the situation with BA's security team at Heathrow and it was decided that it was safe to continue.

"However the captain decided to return to Heathrow as a precaution. The captain explained his decision to the 217 passengers on board the aircraft. We apologise to customers for the inconvenience but their safety is our number one priority and we will always err on the side of caution."

This is indeed erring on the side of caution, which begs the question: how will BA respond when Naomi Campbell boards a flight to New York armed to the teeth with mobile phone and jewel-encrusted Blackberry and subsequently fights her way from First Class to cattle class looking to administer a technology-assisted punishment beating to some hapless personal assistant?

We imagine that the RAF shooting down the aircraft as a precautionary measure might be the option of choice from the BA airborne terror threat manual.

Meanwhile, the PC industry can rest easy after the UK authorities announced that passengers will now be allowed to bring a single piece of hand luggage measuring 45cm by 35cm by 16cm onto planes. Laptops and other electrical items can be stuffed into such bags, but will have to be removed for screening. Liquids, except babymilk and medicines, are still forbidden.®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?