Congress urged to secure drone law
Allowing thousands of drones over U.S. skies raises serious privacy questions, advocacy group says
Computerworld - A leading rights advocacy group this week called on Congress to add civil liberties protections to a recently passed law that opens U.S. airspace to unmanned aerial vehicles.
The Federal Aviation Administration Modernization and Reform Act of 2012, signed into law by President Barack Obama last month, requires the FAA to permit the use of drones by law enforcement agencies, commercial organizations and hobbyists.
The statute will initially let law enforcement authorities and emergency services use drones that weigh less than five pounds and fly at an altitude of less than 400 feet starting in May. The law requires that the FAA have rules in place permitting the use of all varieties of drones by law enforcement and private entities by the end of 2015.
Over the next few years, thousands of drones are likely to be in use for varied applications like fugitive tracking and traffic management by law enforcement agencies, crop monitoring, land management, news reporting and filmmaking.
The Center for Democracy and Technology contends that the legislation provides no privacy or civil liberties protections for ordinary citizens.
The law "says nothing about the privacy implications of filling the sky with thousands of flying robots," said Harley Geiger, senior policy council at the Washington-based think tank.
Geiger said that drones pose an unprecedented privacy challenge -- the devices can can be equipped with facial recognition cameras, license plate readers, thermal-imaging cameras, open WiFi sniffers and other sensors. In addition, drones can be used to conduct continuous and pervasive surveillance over a wide area, he added.
It's one thing to use drones to track down fugitives or to conduct surveillance on a residential property before a SWAT raid. "I don't have a problem with that. What does concern me is the high likelihood that drones will be use for generalized public safety surveillance," Geiger said.
Unlike static surveillance and closed-circuit television cameras that cannot track individuals beyond their fields of vision, "drones can peek into your backyard and track you pervasively," he said.
A drone flying at a height of 400 feet or more from the ground will likely be considered to be operating in a public space. Anything that it observes while it is in a public space has few privacy protections, Geiger said.
"The way the law works right now, law enforcement would need a warrant to peer over your fence, but it won't need one to put a drone over your property and view it as long as they want," so long as it is more than 400 feet above the ground, he added.
With the FAA set to start issuing drone licenses in just a few weeks, the time for Congress to act is now, Geiger said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts