Can tech deliver a drone defense?

 

Connecting state and local government leaders

As federal and state and local agencies wrestle with laws and regulations governing drones, is a technology solution the best option?

Unmanned aerial vehicles (UAVs) have proved to be a serious headache for airspace regulators.  While business have pushed the Federal Aviation Administration to more quickly integrate UAVs into the national airspace given their potential economic impact – estimated to be in the billions –  hobbyists are currently permitted to fly drones, albeit under significant restraints. Recent incidents – such as the devices that crashed on the grounds of the White House, the video that surfaced recently of a machine gun firing from a quadcopter and incidents in California where drone-flying hobbyists disrupted firefighting efforts – have prompted a search for stronger detection and even kinetic defensive measures to thwart such nuisances or potential threats. 

Government agencies at both the federal and state level are attempting to manage the threat from drones –   initially through education. The FAA, for its part, has issued a voluntary compliance and information campaign regarding flying drones, especially into fire zones. The Department of Homeland Security circulated a bulletin on July 31 to several local law enforcement jurisdictions warning of the threat drones can pose. In California, legislators have gone a step farther and proposed a bill that would not only ban all non-sanctioned UAVs over active fires, but provide immunity to firefighters who damage or destroy such drones and permit law enforcement to jam their signals.  

Detecting these small devices, which under FAA regulations must weigh less than 55 pounds, is difficult.  While radio-wave detection tends to be the most accurate for larger aircraft, most drones -- like the piloted gyrocopter that famously landed at the U.S. Capitol -- evade detection because they are too small and fly too low.        

Some drones use geofencing to avoid designated no-fly zones. PrecisionHawk, a private drone company in North Carolina, recently demonstrated its solution for monitoring and detecting drones deployed by agriculture or oil companies for getting a better view of their assets.  The system sent an alert to the operator’s smartwatch when the drone flew too close to a predetermined no-fly zone.  During the demonstration, the operator attempted to fly into this region, but an autopilot feature overrode the operator’s commands and took the aircraft away from the no-fly zone.

Looking ahead, NASA is working with the FAA on a system to monitor UAVs in the national air space.  NASA’s proposal will seek to adapt ground traffic rules – with lanes, stop signs and lights – for low-flying drones.  More specifically, the proposal will provide “airspace design, corridors, dynamic geo-fencing, severe weather and wind avoidance, congestion management, terrain avoidance, route planning and re-routing, separation management, sequencing and spacing and contingency management.”  NASA even held a three-day conference at the end of July focused solely on safely integrating UAVs as part of its proposed traffic-management system.    

And when rogue drones are detected, what can be done to neutralize them if they pose a threat, or are interfering with government activity?  Technology challenges are hindering development of an efficient, accurate and legal method to guard against unwanted and unsafe hobbyist drone activity. 

A jammer could work by blocking either the radio waves or GPS signals drones use to navigate in the air and communicate with the operator on the ground, but as PC World pointed out, signal jammers are banned by federal law because they indiscriminately jam signals of most devices within their sphere of influence. 

Hacking could also be an option. Many off-the-shelf hobby drones are extremely vulnerable to software attacks.  These commercial drones “were constructed to be easy to connect to.  So they weren’t constructed with security in mind at all,” the Defense Advanced Research Projects Agency’s  Kathleen Fisher said during a recent 60 Minutes piece on drone security.   

Hackers are able to exploit these vulnerabilities through small software bugs allowing them to take full control of the vehicle because they are operating on unsecure networks that lack authentication and encryption, said Lee Pike, research lead for cyber-physical systems at Galois, a company that conducts software security  R&D in a phone interview with GCN.  While noting that it is feasible to use hacking as a defense, Pike stressed that hacking itself is a nuanced skill. Yet once a particular software flaw is discovered, “it is systemic in every system that has that software,” he explained.  This means that similar systems will be easy to exploit. Such attacks would become more difficult if drones have encryption or authentication add-on software to protect them.

And hacking is not without problems of its own. “The one reaction I have is one about safety,” Pike said. “You want to make sure that you aren’t causing more problems when you hack into a vehicle.  For example, causing the quadcopter to crash and a battery ... to explode could cause more harm than good,” he warned.    

For the Defense Department, small hobbyist drones that are undetectable by radar have potential to be used by the nation’s adversaries. Countering, thwarting and defending against small UAVs was a key focus at the Black Dart 2015 event, an annual exercise that took place between July 26 and August 7 and focused on live-fly, live-fire joint counter-UAS technology development and demonstration. 

“If there is anything that the terrorists have shown, it’s that they’ll be innovative and use anything that they can at their disposal to do what they're trying to do,” Black Dart project officer Air Force Maj. Scott Gregg told reporters.  “What we're trying to do at Black Dart is make sure that we are staying ahead of the game and that we have a good understanding of their capabilities before those capabilities outpace ours.”

Thales SA, a French defense-electronics manufacturer, has tested a system that uses radar to detect a drone, a camera to identify it and jamming tools to override the system and take control of the device’s path, the Wall Street Journal reported.  A prototype is expected next year, and will offer a vehicle-mounted portable solution.     

The Army, meanwhile, has developed a direct and decisive way to deal with unwanted drones.  Its C-RAM system has been tested to detect and intercept incoming drones then shoot them out of the sky.  The system was originally designed to counter rockets, artillery and mortars – hence its acronym, but it was adapted to counter small UAVs. C-RAM uses a 50mm cannon that can launch command-guided interceptors, a precision tracking radar interferometer as a sensor, a fire control computer and a radio frequency transmitter and receiver for launching munitions, the Army said.  That's probably overkill for hobbyist drones that stray off course, but the Army is concerned about defending against UAVs that have been armed and turned into flying improvised explosive devices.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.