Interagency Issues Advisory on Use of Technology to Detect and Mitigate Unmanned Aircraft Systems

The Department of Justice (DOJ), the Federal Aviation Administration (FAA), the Department of Homeland Security (DHS), and the Federal Communications Commission (FCC) issued an advisory guidance document to help non-federal public and private entities better understand the federal laws and regulations that may apply to the use of capabilities to detect and mitigate threats posed by Unmanned Aircraft Systems (UAS) operations.

The “Advisory on the Application of Federal Laws to the Acquisition and Use of Technology to Detect and Mitigate Unmanned Aircraft Systems” (the “Advisory”) provides a brief overview of various provisions of the U.S. criminal code enforced by DOJ, as well as federal laws and regulations related to aviation safety and efficiency, transportation and airport security, and the radio frequency spectrum administered respectively by the FAA, DHS, and FCC.

“As the number of drones in our airspace continue to rise, it is unsurprising that the availability of counter-drone technologies has likewise increased,” said Jeffrey A. Rosen, deputy attorney general. “Because these technologies may be presented for sale without a full discussion of important legal requirements, this Advisory steps forward to provide an outline of the relevant legal landscape. By encouraging a common understanding of potentially applicable laws, the Advisory can help foster responsible industry growth and promote public safety.”

The Advisory has been issued at a time when the commercial demand for UAS detection and mitigation is high, but the authority to use those capabilities is far from clear. To date, Congress has given limited authority to only four departments – Defense, Energy, Justice, and Homeland Security – to engage in UAS detection and mitigation activities, notwithstanding certain otherwise potentially applicable federal criminal laws. The Departments and Agencies issuing the Advisory do not have the authority to approve non-federal public and private use of UAS detection or mitigation capabilities, nor do they conduct legal reviews of commercially available products’ compliance with those laws.

The advisory urges entities to take the advice presented in this Advisory seriously – to consult with counsel and think carefully about the functionality of individual detection or mitigation systems, the way the system operates, and the way the system will be used. A thorough understanding of how a system functions and the applicable law is necessary to ensure that, if UAS detection and mitigation technologies are employed, they will be used effectively, responsibly, and legally.

Although the Advisory is an important discussion of potentially applicable federal law and regulations in this space, it cautions that additional state or local laws may apply, and that entities should further consider the impacts such technology could have on privacy, civil liberties and civil rights.

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.