Feeds

Please shut up about the Mull of Kintyre Chinook crash

RAF Chinook fleet is actually a rare MoD success story

Combat fraud and increase customer satisfaction

Analysis New information is said to have emerged in the case of the 1994 RAF Chinook helicopter crash on the Mull of Kintyre. Internal MoD documents, casting doubt on the safety of the engine-control software in the wrecked Chinook, have been leaked to the media.

According to the BBC and venerable IT mag Computer Weekly - which has investigated the Mull of Kintyre crash with almost unbelievable thoroughness (vast pdf here) - today's unpublished documents indicate that the UK military flight-test centre at Boscombe Down had serious concerns about the reliability and safety of the Full Authority Digital Engine Control (FADEC) system used to run the RAF Chinook Mark 2's engines.

The FADEC system, which interposes software between the pilot and direct control of the engine's fuel flow - much as many modern "fly-by-wire" systems eliminate mechanical connection between cockpit controls and aeroplane elevators, ailerons etc - was just being introduced when Chinook ZD576 crashed in poor visibility in June 1994, killing all 29 people on board.

An initial RAF investigation concluded that the pilots had made an error and flown the helicopter into the ground, a mistake which is all too easy to make when flying on instruments at low level in poor visibility. However the pilots' families and campaigners on their behalf have always said that a problem with the FADEC software might instead have caused an engine on the helicopter to go out of control and cause a crash.

Various commentators and analysts examining the Mull of Kintyre crash have suggested that the RAF's decision to go for full digital engine control was unwise, that such systems are somehow inherently dangerous or unusual, and that some kind of analogue electromechanical backup or override should have been retained.

That viewpoint, however, has pretty much been consigned to the dustbin of history. New helicopters are nowadays routinely supplied with FADEC-controlled engines, and most older ones have now been retrofitted with the technology. There are nowadays more than 1,000 Chinooks flying, almost all FADEC equipped. Most other choppers also use such kit nowadays.

Full-authority digital control isn't used just for fun. Helicopter engines are, by the nature of their task, often worked very hard - it's very easy, with a manually controlled turbine, to push needles past red lines and cause serious damage. Pilots don't need the distraction of trying to manually control their engines while at the same time performing difficult feats like landings, or instrument flight. FADEC is actually safer than direct pilot control, and indeed the Chinook Mark 2 and its much larger companion CH47-D fleet in the US have had a good safety record since the Kintyre crash. FADEC is also widely used on aeroplane engines nowadays.

But in 1994 FADEC was fairly new in actual flight service, certainly new to the RAF Chinook fleet. It has long been well-known that test pilots and engineers at Boscombe Down had concerns about the original system fitted to the Mark 2 Chinooks. The software - the worrisome bit - was actually written by British programmers at the company known at the time as Hawker Siddeley, since absorbed into the BAE Systems empire, working for US engine firm Textron.

Several subsequent investigations have said that the FADEC could have caused the crash, though if it did so the resulting sudden power loss or overpower before the crash must have been transient - the engines showed no sign of fuel loss or damaging over-revving at the time of impact, and the crash investigators said "available evidence of instrument indications and control settings in the aircraft suggested normal operation of both engines". Again, if an engine had merely powered down briefly, expert pilots like Flight Lieutenants Cook and Tapper - both selected for operations with special forces - would have been expected to manage a safe landing, or at least a Mayday call. Even in a sudden power runaway, at least a partial call would be likely from pilots of this sort, but none was received.

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.