But some security researchers imagine a less sensational, if equally troubling possibility: Hundreds or thousands of aircraft radioing their approach to an air traffic controltower, and no way to sort through which are real and which are ghost plane signals crafted by a malicious hacker.