FAA Successfully Tests New Drone-Detecting Tech At Airport

In this Thursday, Jan. 21, 2016 photo, Trent Lukaczyk, an unmanned aerial vehicle (UAV) engineer who builds and flies drones to monitor changes in the ocean environment, controls a DJI Phantom 3 Advanced drone to take photos and videos over the coastline


AA Font size + Print

In this Thursday, Jan. 21, 2016 photo, Trent Lukaczyk, an unmanned aerial vehicle (UAV) engineer who builds and flies drones to monitor changes in the ocean environment, controls a DJI Phantom 3 Advanced drone to take photos and videos over the coastline

New system is geared toward protecting areas from rogue drones.

The FAA says that they can now detect drones flying near airports and find the drones’ controllers on the ground. It’s a development that could prove key to preventing future drone on plane collisions and marks a big step forward in integrating drones into commercial airspace.

The idea of hobby drones getting sucked into airplane engines causing mayhem and fiery crashes was the recurring scare story last fall after the FAA reported that the number of annual drone sightings by commercial pilots had quadrupled to 650, just by August. Fear not. Well, fear less. Earlier this month, the FAA and defense contractor CACI, successfully tested a new drone detection technology at Atlantic City International Airport. It’s called SkyTracker, and it follows the radio signals that drones use to connect their operators, which would enable authorities to locate the rogue operator. From Jan. 25 to Feb. 2 the FAA conducted 141 tests, with drones both on the ground and in flight.

“SkyTracker successfully identified, detected, and tracked UAS in flight, and precisely located drone ground operators – all without interfering with airport ground operations. We are very proud to partner with the FAA and DHS to help ensure national airspace safety from the escalating UAS threat,” John Mengucci, CACI’S COO, remarked in an FAA press release last week.

According to its makers, SkyTracker also allows law enforcement to “initiate countermeasures that, unlike other technologies, do not interfere with legitimate electronics or communications systems in the area, or with UAS that are being operated responsibly as determined by the U.S. government,” the company has said.

What sort of countermeasures do those include? The company’s literature doesn’t say but last fall, at a House Transportation and Subcommittee Hearing, Rep. Peter De­Fazio, D-Ore, said they included forcing the drone to land, revert back to the operator, or “in the case of hos­tiles, they de­liv­er something to the op­er­at­or,” presumably in the form of a jammed signal, at least. CACI did not immediately respond to a request for clarification.

Jody Brown, the company’s executive vice president, confirmed to Defense One that they have deployed the system to the military but wouldn’t comment on where, or even which military. They also list embassies and sporting events as the sorts of places where they could deploy SkyTracker.

Of course, there are lot of potential remedies for rogue drones floating (sorry) around. Both Droneshield.org and Domestic Drone Counter Measures market drone detecting technology to consumers. But if you actually want to down a drone, the remedies vary in terms of legality and safety. The shotgun defense is legal in Kentucky, (for now), but actively jamming wifi or cellular signals, a control feature for many popular drones is illegal ,at least for regular consumers. The Tokyo Police Department has dispatched drone-hunting drones armed with nets. Last August, Sen. Chuck Schumer, D-NY, proposed mandatory geo-fencing firmware upgrades, which, cyber security researcher Michael Robinson quickly showed to be a very hackable solution for at least one of the most popular brands.

The FAA one step closer to incorporating UAVs into commercial airspace, as mandated by Section 333 of the FAA Modernization and Reform Act of 2012. The test marks an important step forward in that process.

It’s a good solution, but not a perfect one. A drone that could operate autonomously and didn’t need to send or receive radio signals in order to fly would be impervious to the SkyTracker system. But, autonomous drones? Who would ever make such a thing?

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.