Introduction

The tragic crash of Air India Flight AI171, a Boeing 787 en route from Ahmedabad to London, has raised numerous questions, including some from the cybersecurity community:

Could this catastrophic event have been the result of a cyberattack?

In this post, we’ll explore that possibility from a technical architecture perspective. Specifically, we’ll examine:

  • The distinction between mechanical and electronically actuated systems on the Boeing 787,
  • The physical safeguards designed to prevent accidental or unauthorized manual actuation,
  • And, crucially, why a cyberattack is highly improbable as the root cause of this particular sequence of events.

System Architecture: What Can Be Controlled Electronically vs. Manually?

Modern aircraft like the Boeing 787 rely on extensive fly-by-wire and digital systems. However, not all cockpit controls are equally exposed to electronic actuation.

Note: FADEC stands for Full Authority Digital Engine Control, a fully electronic system that manages engine performance parameters such as fuel flow, thrust, and ignition automatically, replacing traditional mechanical linkages.

ComponentType of ActuationCyber Vulnerability
Fuel Control Switches (Engine 1 & 2)Manual (Mechanical)Not vulnerable — physical toggle required
Engine Start Levers / Cutoff SwitchesManual (Mechanical)Not vulnerable — isolated physical mechanism
Fire Handles / Fire Extinguisher ControlsManual (Mechanical)Not vulnerable — guarded physical actuation
Manual Landing Gear LeverManual (Mechanical)Not vulnerable — mechanical lever with fail-safe
Parking Brake HandleManual (Mechanical)Not vulnerable — isolated mechanical valve
Ram Air Turbine (RAT) Manual Deploy HandleManual (Mechanical)Not vulnerable — manual cable actuation
Emergency Oxygen Deployment ControlManual (Mechanical)Not vulnerable — cable/switch mechanism
Throttle / Thrust LeverElectronic (FADEC)Potentially vulnerable — software-controlled
Primary Flight Controls (Yoke, Rudder, etc.)Electronic (Fly-by-wire)Potentially vulnerable — software-controlled
Flight Management System (FMS), Avionics DisplaysElectronicPotentially vulnerable — software-controlled
AutopilotElectronicPotentially vulnerable — software-controlled
Boeing 787 Components: Actuation Type and Cyber Vulnerability

This architecture deliberately isolates critical manual controls like fuel cutoff switches from digital systems.

Physical Security Controls for Manual Actuation

The fuel control switches that shut off fuel to the engines are a prime example of a deliberately manual control:

  1. Guardrails / Protective Covers:
  • These switches are surrounded by an aluminum mechanical guard structure.
  • This ensures that a pilot cannot accidentally knock them into the CUTOFF position while operating other controls.

2. Spring-Loaded Latch Mechanism:

  • There’s a spring mechanism built in that requires a deliberate lift before the switch can move.
  • This provides a tactile, physical safeguard to prevent accidental toggling due to poor ergonomics or distraction.

These critical controls have no electronic actuation path and include physical safeguards (guards, spring-loaded latches, tactile (giving sense of touch) design) that require deliberate human action.

This architectural principle is supposed to maintain human authority even in extreme scenarios such as total electronic failure or attempted cyber compromise.

These design features reflect an important principle of aviation safety:

Critical engine shutoff mechanisms should require deliberate, unmistakable human action.

Could a Cyber Attack Cause This Sequence?

In this incident:

  • The fuel control switches physically moved from RUN to CUTOFF just after takeoff, shutting down both engines within seconds.
  • The cockpit voice recorder captured confusion between pilots, suggesting neither pilot knowingly commanded this sequence.

But based on the architecture above:

The fuel control switches are completely isolated from electronic systems and have no electronic actuation path and include physical safeguards (guards, spring-loaded latches, tactile (giving sense of touch) design) that require deliberate human action.

There is no software path for malware or unauthorized code to move these switches remotely.

Even malicious manipulation of fly-by-wire systems or avionics would not allow actuation of these switches.

This architectural principle is supposed to maintain human authority even in extreme scenarios such as total electronic failure or attempted cyber compromise.

Therefore:

The hypothesis of a cyberattack directly causing the fuel control switches to move is technically implausible.

What Components Could a Cyberattack Impact on the Boeing 787?

While a cyberattack is highly improbable for this specific failure mode, certain aircraft systems are, in principle, more exposed:

The table below summarizes key Boeing 787 components that could, in principle, be exposed to cyberattack, along with why they’re vulnerable and their likely attack vectors.


Component
Type of VulnerabilityWhy Vulnerable?Likely Attack Vector
Flight Management System (FMS)Software compromiseProcesses flight plan/navigation data electronicallyGround-based malware during maintenance upload or malicious data injection via ACARS/SATCOM
Autopilot / Flight DirectorsSoftware compromiseElectronically commanded by flight control computersIndirect compromise if FMS or flight control systems infected
Thrust Levers (via FADEC)Software compromiseFADEC interprets thrust lever positions electronicallyPossible compromise of FADEC firmware or upstream FMS inputs
Primary Flight Controls (fly-by-wire)Software compromiseControlled electronically by flight control computersIndirect compromise if flight control computers compromised
Avionics DisplaysData integrity / spoofingDepend on sensor/fleet data inputsMalicious input injection or tampering of connected sensors/data feeds

Important note: While these components are potentially exposed to cyber risks in principle, the Boeing 787 is not directly connected to the public internet. Possible attack vectors would generally involve indirect paths, such as malware introduced during maintenance via diagnostic tools or malicious data injection through connected systems like ACARS or SATCOM. Proper isolation and authentication mechanisms reduce practical exposure.

However:

  • The fuel control switches remain a physically actuated, guarded, spring-loaded mechanism.
  • They are explicitly designed to resist exactly this kind of unauthorized or inadvertent change — whether accidental or malicious.

Conclusion

The preliminary report on AI171 points to an asymmetric sequence of switch movements that is puzzling from both human factors and procedural perspectives.

But from a cybersecurity standpoint:

  • The physical and architectural design of the Boeing 787 fuel control switches makes a cyberattack an improbable root cause for this event.
  • If there were malicious intent, it would have had to involve either:
    • Physical tampering with the switches prior to flight, or
    • A very different attack surface (e.g., misleading data to pilots, not actuating physical switches).

Disclaimer: This article provides a technical cybersecurity analysis of Boeing 787 cockpit architecture and control systems. It does not speculate on the cause of the AI171 accident, assign blame, or draw conclusions beyond the cybersecurity perspective. The discussion is intended solely to explain which systems are potentially exposed to cyber risk and which are isolated by design.

2 responses to “A Cybersecurity Perspective on the AI171 Incident: Boeing 787 Manual vs. Electronic Controls”

  1. Naresh Maharaj Avatar
    Naresh Maharaj

    Interesting insights Tej!

    Liked by 1 person

  2. Kamlakar Kadam Avatar
    Kamlakar Kadam

    Amazing and informative write-up Tej!

    Like

Leave a reply to Naresh Maharaj Cancel reply

Trending