Feeds

MH370 airliner MYSTERY: The El Reg Pub/Dinner-party Guide

Some tech angles for your consideration

Internet Security Threat Report 2014

Analysis So, the mysterious case of the missing flight MH370. We've mainly stayed out of this - apart from noting that no, the jet wasn't hackjacked using a mobile phone. But naturally we've been poking around a bit to see what we could find out, and it's not completely nothing.

Here's what we bring to the party. Some of us know a bit about aviation, occasionally to the extent of having held pilot's licences. Some of us know a bit about the theory of navigation. Some of us know a bit about satellites and wireless data generally. And we happen to know an experienced airline pilot who has flown Boeing 777s. So we've been able to drill through a lot of misleading reports about "satellite tracking" and extended flight below 5,000 feet and that sort of thing.

So here's the timeline as we understand it, with what insight we can add:

0041 local time 8 Mar (1641 GMT 7 March)

Flight MH370 takes off from Kuala Lumpur headed for Beijing. Scheduled landing time was 0630, approximately 5 hours 50 minutes later.

Our man in the cockpit tells us that it would be normal to have enough fuel to arrive at Beijing, then to divert to another airport (+1 hour) plus a further reserve (+30 minutes more, give or take). Thus the plane would normally have taken off carrying fuel for perhaps 7 hours 30 minutes in the air. If the captain wanted, "he could easily take another hour's fuel without the copilot becoming too suspicious, especially in such a vertical crew culture as the far eastern carriers have". (Normally a captain tries not to overload a plane with fuel as air-freighting fuel from airport to airport costs fuel - and thus money - in itself.)

Our man adds: "IF they were both in on some type of plan they could have filled it up to whatever level of fuel they wanted, all the way to maximum tanks fuel which could give them 13-14 hours endurance at the limit".

Malaysia Airlines Boeing 777 9M-MRO

Boeing 777-2H6ER 9M-MRO, the aircraft used on flight MH370. Credit: Rodger McCutcheon, Auckland Photo News

We'd note, though, that if the plane had taken on an unusually large amount of extra fuel the fact would probably have leaked to the media by now, and the Malaysian government would be speaking of different search areas than it is doing. Some Far Eastern reports suggest a full 8 hours' worth or more of fuel was loaded (as opposed to 7 as most of the media are suggesting) and this would be cautious but normal conduct by the captain.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.