Report outlines options for protecting planes from laser weapons

A new congressional report concludes that it is "highly unlikely" that an airliner could be downed by a handheld laser, but outlines several options for policymakers to consider for reducing risks.

The Homeland Security Department and the FBI issued a memo last month warning that terrorists have explored using lasers as weapons. Transportation Secretary Norman Mineta said earlier this month that there have been 31 incidents since the end of December in which laser beams were shone into airplane cockpits during flight.

"A recent rash of incidents involving lasers aimed at aircraft cockpits has raised concerns over the potential threat to aviation safety and security," according to a Congressional Research Service report, which was published this week by the Federation of American Scientists' Project on Government Secrecy. "While none of these incidents has been linked to terrorism, security officials have expressed concern that terrorists may seek to acquire and use higher powered lasers to, among other things, incapacitate pilots."

Lasers, an acronym for light amplification by stimulated emission of radiation, come in different forms and strengths, ranging from low-powered handheld ones to forceful industrial systems. Some lasers that can cause eye damage through momentary exposure are packaged as laser pointers and can be purchased over the Internet, the report says.

"While most would agree that incapacitating both pilots and downing an airliner by aiming a handheld laser pointer into the cockpit is highly unlikely, there is concern that a military laser, such as the Chinese-made ZM-87 laser blinder, or a high powered industrial laser in the hands of terrorists could pose a more significant threat," the report adds. "There is also concern that terrorists may improvise an intense laser blinder by bundling several higher powered handheld laser devices."

The report says policymakers might want to consider a range of options to mitigate the threat of lasers, such as restricting the sale or use of certain laser devices; amending criminal statutes associated with interfering with flight operations; providing pilots with laser eye protection; expanding and enforcing laser-free zones around airports; and educating the public regarding the risks of lasers to aviation safety.

According to the FAA, there have been more than 400 incidents since 1990 in which pilots have been startled, distracted, temporarily blinded or disoriented by laser exposure. To date, however, no aviation accidents have been attributed to laser lights.

The FAA noted that a "laser attack could be quickly deployed and withdrawn, leaving no obvious collateral damage or projectile residue, and would be difficult to detect and defend against."

The report says that although no official conclusions have been reached, the recent rash of laser incidents may be attributable to the increasing availability and reduced cost of green laser pointers, which are about 35 times brighter than red lasers.

The report notes, however, the difficulty in protecting airliners from laser incidents. "Pre-empting a terrorist attack using lasers would likely be extremely difficult because a laser would be virtually undetectable until shined at an aircraft, and even then, may be difficult to spot from the ground."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.