Investigating the FAA Outage: Separating Fact from Fiction

Investigating the FAA Outage: Separating Fact from Fiction - SKIT

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system. Flights were grounded or delayed at airports across the country, and many pilots were unable to file flight plans or receive important information about the airspace they were flying in.

The FAA initially reported that the outage was caused by a problem with the system’s hardware, but later confirmed that it was due to a software issue. The FAA’s technical teams worked quickly to resolve the problem, but it still took several hours for the system to be fully restored.

While the FAA was able to restore the system relatively quickly, the impact of the outage was still felt for several days. Many flights were cancelled or delayed, and passengers faced long lines and wait times at airports. The FAA also issued a ground stop for flights headed to certain airports, which prevented flights from taking off until the NOTAM system was back online.

The Noise – Was This a Cyberattack?

Was this a cyberattack? - SKIT

Almost immediately, social media was flooded with theories of a potential cyberattacks, parallels to recent events like the water treatment plant and potential cover-ups.  It is natural for our minds to immediately jump to conclusions, especially when it comes to major events that disrupt our daily lives. However, when it comes to cyberattacks, it is important to not immediately assume that a major event is related to a cyberattack without proper investigation and evidence.

First and foremost, cyberattacks can often be difficult to detect and understand, and it may take time to determine the true cause of an event. Jumping to conclusions without all the facts can lead to misinformation and false accusations, which can cause further harm and damage.

Additionally, assuming that a major event is related to a cyberattack can also lead to a lack of focus on other potential causes. For example, a power outage could be caused by a cyberattack, but it could also be caused by a natural disaster or a mechanical failure. By not considering all potential causes, important information and potential solutions may be overlooked.

My Take

As previously mentioned, the core issue was identified a software issues or more specifically a corrupted file which appears to have persisted in backup copies, according to a report by CNN.  It has yet to be determined if this was intentional or accidental, as the incident response team (IRT) is still in the infancy of its investigation. The United States government at the time of this post has indicated that they do not believe this was a cyber-related event.

It is important to note that corrupted files can happen for a variety of reasons. Hardware failure, such as a malfunctioning hard drive or memory chip, can cause data to become corrupt or inaccessible. Human error, like accidentally deleting a file or saving over a file without a backup, can also lead to corrupted files. 

Malware, like viruses and ransomware, can corrupt files by altering or encrypting the data, making it difficult to recover. Software bugs can also cause corruption, where a program encounters an error and is unable to save the file correctly. Power outages can also cause files to become corrupt if the computer is not properly shut down.   

By all accounts, it is likely feasible that the last two may have been the culprit, but we need to remain patient until more details emerge.  It goes without saying that it is not enough to just have backups, but to ensure they are regularly tested.

Lessons Learned

This outage highlights the importance of the FAA’s air traffic control system and the critical role it plays in the safe and efficient operation of flights in the United States. It also serves as a reminder that even the most advanced technology can experience unexpected problems and that it’s important to have tested backup systems in place to minimize the impact of such issues.

Equally important, we should approach major events with a level-headed and methodical approach, and to not rush to conclusions without proper investigation and evidence. Gathering all the facts and considering all potential causes can ensure that the true cause of an event is identified and that the appropriate actions are taken to mitigate any damage and prevent future incidents.

A good data backup strategy should be in place, and to have software and tools to detect, diagnose and recover from corrupted files. Regular software updates, rollback procedures and malware scans can also help to prevent and mitigate large impact to critical operations.

Overall, the FAA’s ability to restore the system relatively quickly is commendable, but it’s important to remember that the outage caused significant disruptions for many travelers and the aviation industry as a whole. The FAA should strive to avoid such situations in the future and make sure that necessary measures are in place to minimize the impact of any future outages.


To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.
Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

10 Ways to Improve Your Math Skills for Cybersecurity

10 Ways to Improve Your Math Skills for Cybersecurity

As highlighted in our earlier discussion, The Intersection of Math and Cybersecurity, a solid grasp of mathematics is indispensable within the realm of cybersecurity. The specific demands…

The Intersection of Math and Cybersecurity - Does Cybersecurity Require Math?

The Intersection of Math and Cybersecurity

During my weekend exploration of a renowned Q&A platform, I unexpectedly encountered a question that left me intrigued. I couldn’t help but wonder if the original poster (OP) was playfully jesting or sincerely seeking knowledge. This curious moment brought forth a reminiscent smile as I recalled the age-old adage we all encountered during our early school years: “Math is fundamental to all endeavors.” However, an interesting twist emerged: Does this axiom extend its influence into the intricate realm of Cybersecurity?

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20