Can Surveillance Drones Prevent the Next Kunduz?

A Ku-band antenna that had been “scabbed” onto an AC-130U gunship failed to transmit video on the morning of Oct. 3 during a mission in Kunduz, Afghanistan, contributing to a tragedy in which more than 30 people died, Air Force Special Operations Command Gen. Bradley Heithold said recently.  

Gen. John Campbell, who issued a Nov. 25 statement on the airstrike, said that destroyed a Doctors Without Borders hospital.  “During the flight, the electronic systems onboard the aircraft malfunctioned, preventing the operation of an essential command and control capability and eliminating the ability of the aircraft to transmit video, send/receive email, or send/receive electronic messages,” the report reads, in part. “Confusion was exacerbated by the lack of video and electronic communications between the headquarters and the aircraft, caused by the earlier malfunction,” it continues.

Today, for the first time, Heithold went into more detail on what exactly went wrong on the AC-130.
 “Today, we pump full-motion video into the airplane and out of the airplane. So we have a Ku-band antenna on the airplane … the U-model. It’s sort of scabbed on. In fact, we had some problems with it recently on a mission in Afghanistan where it didn’t work. I wish it had been working,” Heithold said. “On our current legacy airplanes, the solution we used was rather scabbed on: take the overhead escape hatch out, put an antenna on, stick it back up there, move the beams around. We’ve had some issues, but we’re working with our industry partners to resolve that issue.”

He added, “99.9 percent of the time we’ve had success with it. These things aren’t perfect; they’re machines.”

Heithold said that dedicated Ku-band data transfer is now standard on later models of the AC-130, which should make data transfer much more reliable. “If you’re looking at an AC-130J, for instance, you’ll see a bump in the area just above the co-pilot. That is a built-in Ku-band capability to move information into and out of the airplane, primarily full-motion video … The AC-130W? It’s built in. The AC-130J? It’s built in. It’s going to be much more reliable than the case of our legacy airplanes,” in Kunduz, he said.

The technological problems Campbell describes in his report stand in stark contrast to the way information and data processing are supposed to work on an AC-130. Ideally, in a situation like the one that played out on Kunduz, its crew can  see and transmit full-motion video data from the plane’s battle management center computer, or BMC. When the BMC is working properly, the Joint Operations Center, or JOC, is able to see what the gunship is targeting via the video-feed. Combat air controllers or soldiers on the ground can also see what’s happening via small, handheld tablet computer called a Remote Operations Video Enhanced Receiver or ROVER.

Some AC-130 also carry a targeting laser, sometimes referred to as a “Big Ass Green Laser” but which Heitghthold called simply the “green beam.” It allows ground crew to collaborate targeting decisions.

“We mounted it on a gunship and from a couple miles away you could flash a green spot,” James “Hondo” Guerts, an Air Force acquisition executive, said last year. “Then we told the Afghans, if you’re shooting and you’re seeing a big green blinking light on you, that’s probably not good for you.”

The green beam “can point at the target and [allow operators to] say, ‘Yup, you’re looking at the right thing,” said Heithold. But it only works when ground troops have “eyes on the target”, which the Campbell report makes clear was not the case. And Heithold, a lack of eyes is no longer an exceptional situation. It’s becoming the norm.

“The fights that we’re in today, the JTAC is frankly not on the objective. They’re in the rear making the call based on what we’re showing them,” he said.

Drones To Fill in Intelligence Gaps

Efforts to extend the aircrew’s awareness go beyond the aircraft itself, Heithold said. Under an initiative dubbed, Tactical Off-Board Sensing, the AC-130 might launch small foldable drones —Heithold mentioned Raytheon’s Coyotes — to provide full motion video.

“It comes out of that tube. It goes in a pre-planned orbit. I can stand off somewhere. It can tell me what’s there. It gives me a site picture before I ever get there. Now I can strike from a distance,” he said.

The Air Force has tested the system and will soon try it out in combat, said Heithold. The tragedy in Kunduz created a special urgency for the new capability.

“In a case like that, had you had another set of eyeballs—it’s another sensor on the airplane. We’ve got two very-high-definition sensors on the AC-130. Imagine now if I can duplicate that by taking something off the airplane, getting it down [closer to the target.] It’s quiet. It’s got a pretty darn high-definition sensor … I get a heck of a lot more fidelity on the target back to the airplane … giving the airplane visibility on the target up close. More visibility and clarity I have on the target, the more effective I’m going to be,” he said.

The military is considering additional disciplinary action for the crew in the Kunduz case. Campbell’s report makes clear that human error was a major contributing factor. Without naming the crew, Heithold added a note of agreement, saying that technology would never suffice in the place of good judgement or patient targeting.

“Sometimes it’s old-style Vietnam,” he said. “Make contact with the guy on the radio and talk on the target. And we have to train our crews that when technology fails us, we’re still able to prosecute the mission by talking the way we used to, ‘what are you looking at?’ Well, I’m looking at this.’ So technology is going to help us in many, many ways but we also want our crews to know, it won’t always work … That stuff fails, you’ve got to be able to go back to the dead reckoning. Same situation here. If it fails, you’re not going to have the level of fidelity on the target, etc. as you had had it been working. It’s common sense.”

DefenseOne: http://bit.ly/1IQ9uYh

« Can Big Data Help Climate Change?
Facebook Rule Change After Privacy Ruling »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.