"attacker who is passive with respect to the medium but actively decrypts messages...An attacker of this capability could achieve their aims for a relatively low
financial outlay...an attacker will be able to collect ACARS messages from aircraft...We consider a typical attacker...attacker would be able to deploy...attacker as defined in our threat model...which might be valuable to an attacker"
Written by computer swots with a public policy agenda