In partnership with

πŸ‘‹ Welcome to Unlocked

The recent aviation incident at LaGuardia sparked a familiar question:

Could a cyberattack cause something like this?

It’s a serious question β€” and one that deserves more than a headline answer.

The short version is reassuring:
A direct, catastrophic crash caused purely by a cyberattack is highly unlikely today.

But the more important answer is more nuanced.

Cyber risk is becoming operational risk.

And in industries like aviation, that distinction matters.

🧠 Aviation Was Built for Failure β€” Not Just Attack

Modern aviation is one of the most safety-engineered systems in the world.

Aircraft and airport operations rely on multiple overlapping layers:

  • air traffic control (ATC) systems

  • aircraft avionics

  • navigation systems (GPS, radar, ILS)

  • airline operations platforms

These systems are intentionally segmented and reinforced with redundancy.

Pilots can revert to manual control.
ATC has fallback communication methods.
Navigation systems cross-check each other in real time.

There is no single point of failure.

That’s why a direct cyber-triggered crash remains unlikely β€” the system is designed to absorb disruption.

⚠️ Where Cyber Risk Actually Lives

The real risk in aviation doesn’t sit inside the cockpit.

It sits around it.

Air Traffic Control Disruption

If attackers disrupted ATC systems, the immediate impact wouldn’t be loss of control β€” it would be loss of clarity.

Delays. Congestion. Ground stops.

In extreme cases, confusion becomes the risk factor.

But even here, controllers are trained for degraded environments and can revert to procedural separation.

πŸ“ GPS Interference & Spoofing

GPS spoofing is not theoretical β€” it has already been observed globally, particularly in the Baltic region and the Middle East.

Potential impacts include:

  • incorrect positioning data

  • navigation inconsistencies

  • increased pilot workload

But aircraft don’t rely on GPS alone. Inertial navigation systems (INS) and ground-based aids provide backup validation.

The result is disruption β€” not immediate catastrophe.

✈️ Airline IT & Operational Systems

This is where cyber incidents happen today.

Recent events have shown how attacks on airline systems can:

  • ground flights

  • disrupt crew scheduling

  • cascade delays across regions

These systems don’t fly the aircraft β€” but they shape the environment around them.

And that environment matters.

Because pressure is where risk begins to accumulate.

πŸ”“ The Real Question Isn’t β€œCan Hackers Crash a Plane?”

Can cyber create the conditions where something goes wrong?

To directly cause a crash, an attacker would need to:
  • penetrate highly isolated avionics systems

  • override multiple redundant safeguards

  • avoid detection by both systems and pilots

That combination is extremely difficult today.

But cybersecurity experts are increasingly focused on a different model: Cyber-induced conditions. Not control β€” but influence.

🧩 When Systems Fail Together

A realistic aviation cyber scenario wouldn’t look like a movie.

It would look like multiple small disruptions happening at once:

Individually manageable, Collectively destabilizing.

In that scenario, cyber doesn’t directly cause failure, it increases the probability of human error under pressure.

🌐 The Bigger Shift: Aviation Is Becoming Software

The risk isn’t just in today’s systems.

It’s in where aviation is heading:

Each layer adds capability; Each layer also expands the attack surface.

Complexity is growing faster than security maturity in some areas.

πŸ›‘οΈ What This Means for Security Leaders

Aviation reflects a broader shift happening across critical infrastructure.

The focus is moving:

From preventing breaches β†’ to managing disruption
From system security β†’ to system resilience
From isolated incidents β†’ to multi-system scenarios

Resilient organizations are prioritizing:

  • segmentation of critical systems

  • Zero Trust access across operational environments

  • real-time anomaly detection

  • cross-system visibility

  • coordinated incident response

Because in complex environments, failure is rarely isolated.

πŸ’‘ Unlocked Tip of the Week

Ask this question:

β€œIf multiple systems degraded at once, would we still operate safely?”

Most security strategies are built around single incidents.

Real-world risk often isn’t.

πŸ“Š Poll of the Week

πŸ”₯ Final Takeaway

A cyberattack causing a crash at LaGuardia today is unlikely.

But that’s not the point.

The point is this: Cyber risk is now part of operational risk.

As systems become more connected, the line between digital disruption and physical consequence continues to narrow.

The organizations that prepare for that shift won’t just be more secure.

They’ll be more resilient when it matters most.

Stay ready. Stay resilient.

Until next time,

πŸ™‹ Author Spotlight

Meet Nick Marsteller - Head of Content

With a background in content management for tech companies and startups, Nick Marsteller brings creativity and focus to his role as the Head of Content at Everykey.

Over his career, Nick has supported organizations ranging from early-stage startups to global technology providers, driving initiatives across digital content and branding. With a background spanning SaaS, cybersecurity, and entrepreneurial ventures.

Outside of work, Nick loves to travel, attend concerts with friends, and spend time with family and his two cats, Ducky and Daisy.

Our Sponsor

Your Docs Deserve Better Than You

Hate writing docs? Same.

Mintlify built something clever: swap "github.com" with "mintlify.com" in any public repo URL and get a fully structured, branded documentation site.

Under the hood, AI agents study your codebase before writing a single word. They scrape your README, pull brand colors, analyze your API surface, and build a structural plan first. The result? Docs that actually make sense, not the rambling, contradictory mess most AI generators spit out.

Parallel subagents then write each section simultaneously, slashing generation time nearly in half. A final validation sweep catches broken links and loose ends before you ever see it.

What used to take weeks of painful blank-page staring is now a few minutes of editing something that already exists.

Try it on any open-source project you love. You might be surprised how close to ready it already is.



Keep Reading