Meeting of the FAA's Drone Advisory Committee on October 17, 2019.
WASHINGTON, D.C. — Members of the FAA’s Drone Advisory Committee (DAC) unanimously approved recommendations for the agency to consider regarding remote identification and UAS security issues, which were highlighted by a recent Blue Ribbon Task Force report on UAS Mitigation at Airports.
Committee recommendations on remote ID for drones focused on efforts to encourage voluntary equipage, as the FAA has noted it is likely 24 months away from official rulemaking on that issue. The agency is scheduled to release its proposed rulemaking on remote ID on December 20 of this year.
“There’s probably no schedule that we could ever show that would be fast enough [for implementation of remote ID],” Jay Merkle, director of the FAA’s UAS integration office, said during a discussion on Remote ID at the DAC's Oct. 17 meeting.
Remote ID is seen as a critical “gate” for rulemaking around drones. Like a digital license plate, this signal broadcast by a drone would identify its operator and potentially provide other information such as purpose, flight path and payload. The FAA views remote ID as critical to enabling safe flights beyond the operator’s visual line of sight, and law enforcement sees it as necessary to combat careless or criminal drone operators violating the law or airspace restrictions.
The committee recommended allowing drones to use either Bluetooth, Wi-Fi or network to meet remote ID industry standards created by ASTM. Members also suggested the FAA develop incentives for voluntary equipage, such as access to restricted airspace and contract or waiver preference. Participants agreed that keeping the cost and ease of remote ID compliance low will be critical to operators believing the benefits outweigh the cost.
Left unaddressed at the meeting: what information will actually be contained in remote ID and who will have access to it, critical concerns for both law enforcement professionals and privacy advocates.
Since April 2016, Los Angeles International Airport (LAX) has documented 205 reports of drone activity near the airport, but was only able to identify and contact the operator of the drone in one instance, according to CEO Deborah Flint, a member of the DAC. Drone sightings close to the runway at Gatwick Airport in December 2018 famously caused the cancellation of hundreds of flights, affecting approximately 140,000 passengers.
Overwhelmingly, most drone sightings are single-source reports that are never confirmed. Most of the remaining sightings fall under the category of “careless and clueless” operators, rather than actors with malicious intent, though a clueless recreational flyer still has the potential to place airport operations at risk.
The National Security Council is working on a national-level response to “persistent UAS disruption” at a major airport, like the Gatwick incident. The project, called Core 30 CONOPs, will incorporate drone detection and mitigation techniques to determine effective technologies for the mission, what authorities are needed and other best practices.
“Right now, no one has the authority in a steady state to provide that type of counter UAS protection at airports,” said Angela Stubblefield, deputy associate administration for security and hazardous materials at the FAA. “Therefore, in a circumstance like a Gatwick scenario from 2018 where you have a persistent disruption, how do we take the authorities that exist, the technologies that are deployed, and get it into the airport environment to address that risk as quickly and as capably as we can?
“That CONOPs is in final steps of approval within the National Security Council. All of the departments and agencies have weighed in,” Stubblefield said.
In response to a question about protecting non-Core 30 airports, Stubblefield said there are resource limitations with regard to counter UAS capability.
“There’s a lot of T&E going on, but not as many systems deployed actively in the airspace as are planned. So it becomes a little bit of a volume issue,” Stubblefield said. “We wanted to focus first on those airports that, if disrupted, would have the biggest impact across the system.”
From the industry side, members of the DAC suggested manufacturers build geofencing capabilities into their drones via software, something which many OEMs including DJI already do. However, the effectiveness of geofencing — and ease of implementation by OEMs — is dependent on availability of up-to-date critical infrastructure information.
Even if agencies are available to provide up-to-date, machine-readable data on critical infrastructure to facilitate geofences, many questions remain surrounding their implementation.
“How do you get out of the geofencing if you actually have authority?” asked Brendan Schulman, DJI’s vice president of policy and legal affairs, noting that firefighters, law enforcement and other agencies may want to operate drones in geofenced areas.
“Who is actually responsible for violations, assuming we build all this infrastructure — we have remote ID, we have [unmanned traffic management] … who is actually responsible for violations?” said Gur Kimchi, vice president of Amazon subsidiary Prime Air, referring to cases where drones are operated on behalf of others and confusion around who is the responsible pilot-in-command.
Many other security recommendations focused on voluntary activity by OEMs, such as the equipage of ADS-B receivers on drones to alert operators of nearby manned aircraft, something which DJI announced it will add to all its new drone models weighing 250 grams or more released after January 1, 2020.
Recommendations on remote ID, UAS security measures and improvements to the Part 107 waiver process were unanimously approved by the committee and submitted to the FAA for consideration. New working groups were created on challenges around flying beyond the operator’s visual line of sight (BVLOS), unmanned traffic management (UTM), and improving facility mapping that underscores the FAA’s low-altitude authorization service, or LAANC. These working groups are expected to offer recommendations at the next meeting, slated for January or February of next year.