U.S. Army spyplane pops-up on Flightradar24 during mission south of the Korean DMZ

Online flight tracking reminds us that the secretive EO-5Cs regularly fly along the border between North and South Korea.

The above screenshot was taken from Flightradar24 by Guglielmo Guglielmi, an expert in online flight tracking.

It shows a U.S. Army Dash 7 surveillance aircraft, designated EO-5C, during a mission south of the Korean Demilitarized Zone.

Three such Army aircraft packed with sensors, known as ARL (Airborne Reconnaissance Low), are believed to be stationed in South Korea. The aircraft don’t wear military markings but carry a civil registration (in this case N59AG) to disguise their real mission and some of their sensors can be retracted making the airplanes more similar to a regional liner rather than a special operations asset involved in a clandestine mission.

The EO-5C can detect and fix enemy transmissions on all the radio spectrum, collect both IR (Infrared) and visibile-light very high-resolution imagery, track moving ground targets as well as detect and monitor specific features of the ground below: capable to determine how footprints in the sand change over time, the ARL is believed to be used in Korea to hunt for Pyongyang‘s underground tunnels/facilities.

The Army has deployed the first of these ISR (Intelligence Surveillance Reconnaissance) planes to the Korean Peninsula in 1996. An EO-5C could be frequently monitored on FR24 flying from Crete to Libya to perform intelligence gathering activities in North Africa until it was replaced by another special plane: an ATR-42.

Once again it’s worth mentioning that a spook plane flying a reconnaissance mission in theater should not be trackable online using a web browser….

EO-5C US Army

Top image, FR24 via Guglielmo Guglielmi. Bottom image: U.S. Army.




About David Cenciotti 4469 Articles
David Cenciotti is a freelance journalist based in Rome, Italy. He is the Founder and Editor of “The Aviationist”, one of the world’s most famous and read military aviation blogs. Since 1996, he has written for major worldwide magazines, including Air Forces Monthly, Combat Aircraft, and many others, covering aviation, defense, war, industry, intelligence, crime and cyberwar. He has reported from the U.S., Europe, Australia and Syria, and flown several combat planes with different air forces. He is a former 2nd Lt. of the Italian Air Force, a private pilot and a graduate in Computer Engineering. He has written five books and contributed to many more ones.


  1. Maybe nobody in USOCOM doesn’t read this blog. Or, more probably don’t give a damn

  2. Most military and secret service people have no knowledge of cyber security, same as the regular joe. Many do not even activate basic security functions. Dah!

  3. Should have flown with the transponders off! Unless its a cover for flying north of the DMZ, in which case game on!

  4. Something like: “Look the American spy plane is here today turn the important ****! ”
    Comes to mind. Why are they so careless with these identifiers?

  5. If you want to play the “civilian” card, you’ll have to fake it fully, including transponder signals.
    Don’t worry, NKA doesn’t need those to track the AC, it has the means to keep tabs on it even if it observes complete radio silence. A “silent” AC is instantly suspicious to any air defense – a “civilian” one might escape vigilance in the clutter.

Comments are closed.