Unmanned border flights suspended despite Bush call for more

Although President Bush and Homeland Security Secretary Michael Chertoff have touted the use of unmanned aerial vehicles for border security, recent problems with the technology indicate that UAVs face major challenges in their conversion to a domestic surveillance role, according to officials and budget documents.

In a speech to the nation in May, Bush said UAVs will be used to prevent illegal crossings into the United States. But the Border Patrol has not flown a UAV along the southern border since its only Predator B drone was destroyed in a crash outside of Nogales, Ariz., in late April, an agency spokesman said.

Although Bush announced that National Guard troops are being deployed to the border, the Guard is not providing any UAV assets, the spokesman added. Instead, the Border Patrol is now accelerating its plan to procure a new Predator B from General Atomics Aeronautical Systems. The spokesman said the agency will spend $6.5 million to buy the UAV this summer.

But UAV problems have not escaped attention in Congress. In the report accompanying their version of the fiscal 2007 Homeland Security appropriations bill, House lawmakers noted the Predator crash and another, unspecified, mishap involving a UAV under development for the Coast Guard.

The report withholds $6.8 million for the Border Patrol to procure another UAV in fiscal 2007 until the agency reports findings of an investigation into the Predator crash, and implications of those findings for future UAV operations. The Coast Guard also was ordered to report on what caused the mishap of the developmental UAV and any implications that might have on the planned procurement of that drone.

The Predator crash is still under investigation by the National Transportation Safety Board, but preliminary results have revealed that it was caused by General Atomics operators, the Border Patrol spokesman said. General Atomics declined to comment for this article.

A Coast Guard spokeswoman said the other mishap occurred in April by a UAV under development by Bell Helicopter Textron, Inc. She added, however, that the Coast Guard still plans to test that UAV in fiscal 2007 and begin procuring it in fiscal 2009.

Nonetheless, industry is heeding the threat posed by the House report as it adapts UAVs from mainly military missions abroad to broader domestic operations under the control of federal civilian agencies.

"The message and the language is being taken seriously. There's no discounting the message that's being sent," said Daryl Davidson, executive director of the Association for Unmanned Vehicle Systems International. Davidson said he believes the support for using UAVs domestically is strong, but challenges are emerging as they become more mainstream.

Some challenges include ensuring that UAVs are safe to operate, working out civilian airspace use with the Federal Aviation Administration, and appeasing private aircraft operators who view UAVs as imposing on their travel routes. He added that the funding restrictions in the House report are a concern, but believes that industry will work through the Senate or in conference to maintain support for UAV development and procurement.

"UAVs have been in the consideration and planning phase of homeland security and border security for years now, and I think they're finally getting to the point of procuring these systems," Davidson said. "We look at this as just the very beginning."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.