Congress urged to secure drone law
Allowing thousands of drones over U.S. skies raises serious privacy questions, advocacy group says
Computerworld - A leading rights advocacy group this week called on Congress to add civil liberties protections to a recently passed law that opens U.S. airspace to unmanned aerial vehicles.
The Federal Aviation Administration Modernization and Reform Act of 2012, signed into law by President Barack Obama last month, requires the FAA to permit the use of drones by law enforcement agencies, commercial organizations and hobbyists.
The statute will initially let law enforcement authorities and emergency services use drones that weigh less than five pounds and fly at an altitude of less than 400 feet starting in May. The law requires that the FAA have rules in place permitting the use of all varieties of drones by law enforcement and private entities by the end of 2015.
Over the next few years, thousands of drones are likely to be in use for varied applications like fugitive tracking and traffic management by law enforcement agencies, crop monitoring, land management, news reporting and filmmaking.
The Center for Democracy and Technology contends that the legislation provides no privacy or civil liberties protections for ordinary citizens.
The law "says nothing about the privacy implications of filling the sky with thousands of flying robots," said Harley Geiger, senior policy council at the Washington-based think tank.
Geiger said that drones pose an unprecedented privacy challenge -- the devices can can be equipped with facial recognition cameras, license plate readers, thermal-imaging cameras, open WiFi sniffers and other sensors. In addition, drones can be used to conduct continuous and pervasive surveillance over a wide area, he added.
It's one thing to use drones to track down fugitives or to conduct surveillance on a residential property before a SWAT raid. "I don't have a problem with that. What does concern me is the high likelihood that drones will be use for generalized public safety surveillance," Geiger said.
Unlike static surveillance and closed-circuit television cameras that cannot track individuals beyond their fields of vision, "drones can peek into your backyard and track you pervasively," he said.
A drone flying at a height of 400 feet or more from the ground will likely be considered to be operating in a public space. Anything that it observes while it is in a public space has few privacy protections, Geiger said.
"The way the law works right now, law enforcement would need a warrant to peer over your fence, but it won't need one to put a drone over your property and view it as long as they want," so long as it is more than 400 feet above the ground, he added.
With the FAA set to start issuing drone licenses in just a few weeks, the time for Congress to act is now, Geiger said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts