Turkey
Risk Level: Three - Caution
[ about risk levels ]
The primary risk is misidentification by local militia who infrequently target Turkish military aircraft with MANPADS and weaponsied drones. Operations to LTAJ/Gaziantep should be carefully reviewed given its proximity to the Syrian border. Along the border with Syria and Iraq in proximity to conflict zones, there is a higher level of airborne military traffic, UAS and the risk of proximity to airstrikes.
The secondary risk is from GPS jamming and spoofing. There are frequent reports from crews of GPS signal interference in Turkish airspace - with some as far away as abeam Baghdad. GPS jamming is common through the LTAA/Ankara FIR, and especially on the border between the ORBB/Baghdad and OIIX/Tehran FIRs. As of Nov 2023, GPS Spoofing is also being encountered over the Black Sea in Turkish airspace. All reports share very similar symptoms: uncommanded turns, position errors, and multiple GPWS warnings. The spoofed locations received all centre on Sevastopol, Crimean peninsula, a difference of between 120-250nm from the actual aircraft position. More info: Special Briefing, OPSGROUP Members Dashboard
Major events:
Nov 2023: GPS Spoofing being encountered over the Black Sea in Turkish airspace.
Nov 2022: Shelling and a rocket strike near a town in southern Turkey, near the border with Syria. Turkey has been carrying out airstrikes on Syria and Kurdish regions of Iraq.
May 2021: Attempted drone attack by local militia on LTCC/Diyabakir airport in South Eastern Turkey.
Jan 2019: Turkish security forces intercepted three weaponised drones during attempted attacks against sites in southern Turkey.
The secondary risk is from GPS jamming and spoofing. There are frequent reports from crews of GPS signal interference in Turkish airspace - with some as far away as abeam Baghdad. GPS jamming is common through the LTAA/Ankara FIR, and especially on the border between the ORBB/Baghdad and OIIX/Tehran FIRs. As of Nov 2023, GPS Spoofing is also being encountered over the Black Sea in Turkish airspace. All reports share very similar symptoms: uncommanded turns, position errors, and multiple GPWS warnings. The spoofed locations received all centre on Sevastopol, Crimean peninsula, a difference of between 120-250nm from the actual aircraft position. More info: Special Briefing, OPSGROUP Members Dashboard
Major events:
Nov 2023: GPS Spoofing being encountered over the Black Sea in Turkish airspace.
Nov 2022: Shelling and a rocket strike near a town in southern Turkey, near the border with Syria. Turkey has been carrying out airstrikes on Syria and Kurdish regions of Iraq.
May 2021: Attempted drone attack by local militia on LTCC/Diyabakir airport in South Eastern Turkey.
Jan 2019: Turkish security forces intercepted three weaponised drones during attempted attacks against sites in southern Turkey.
Current warnings list :
Source | Reference | Issued | Valid to | |
---|---|---|---|---|
Turkey | Notam LTAA A0180/23 | 09 Jan 2023 | 07 Apr 2023 | |
USA | FAA Information Note Turkey | 19 May 2021 | Ongoing |
Source: Turkey
Reference: Notam LTAA A0180/23
Issued: 09-Jan-23, valid until: 07 Apr 2023
Plain English: Expect GPS interference in Turkish Airspace.
IT IS REPORTED BY PILOTS THAT GPS SIGNALS CAN NOT BE RECEIVED OCCASSIONALY IN SOME PARTS OF TURKISH AIRSPACE. PILOTS WHO PLAN RNAV FLIGHT OR EXECUTE RNAV/RNP PROCEDURES WITHIN TURKISH AIRSPACE ARE ADVISED TO BE CAUTIOUS ABOUT GPS SIGNAL LOSES. 09 JAN 06:20 2023 UNTIL 07 APR 12:00 2023 ESTIMATED. CREATED: 09 JAN 06:22 2023
Source: USA
Reference: FAA Information Note Turkey
Issued: 19-May-21, valid until: Ongoing
Plain English: Drone attack in May 2021 on LTCC/Diyabakir airport in South Eastern Turkey. Local militia targeting military interests are thought to be responsible. While no threats have been made against civil aviation, the militia are known to have access to portable anti-aircraft weaponry which may pose a low-level risk through misidentification.
Title: FAA Information Note - Turkey - Militant UAS Attack Hits Airport Runway.
Click the link for full text.
Click the link for full text.