Interagency Issues Advisory on Use of Technology to Detect and Mitigate Unmanned Aircraft Systems

The Department of Justice (DOJ), the Federal Aviation Administration (FAA), the Department of Homeland Security (DHS), and the Federal Communications Commission (FCC) issued an advisory guidance document to help non-federal public and private entities better understand the federal laws and regulations that may apply to the use of capabilities to detect and mitigate threats posed by Unmanned Aircraft Systems (UAS) operations.

The “Advisory on the Application of Federal Laws to the Acquisition and Use of Technology to Detect and Mitigate Unmanned Aircraft Systems” (the “Advisory”) provides a brief overview of various provisions of the U.S. criminal code enforced by DOJ, as well as federal laws and regulations related to aviation safety and efficiency, transportation and airport security, and the radio frequency spectrum administered respectively by the FAA, DHS, and FCC.

“As the number of drones in our airspace continue to rise, it is unsurprising that the availability of counter-drone technologies has likewise increased,” said Jeffrey A. Rosen, deputy attorney general. “Because these technologies may be presented for sale without a full discussion of important legal requirements, this Advisory steps forward to provide an outline of the relevant legal landscape. By encouraging a common understanding of potentially applicable laws, the Advisory can help foster responsible industry growth and promote public safety.”

The Advisory has been issued at a time when the commercial demand for UAS detection and mitigation is high, but the authority to use those capabilities is far from clear. To date, Congress has given limited authority to only four departments – Defense, Energy, Justice, and Homeland Security – to engage in UAS detection and mitigation activities, notwithstanding certain otherwise potentially applicable federal criminal laws. The Departments and Agencies issuing the Advisory do not have the authority to approve non-federal public and private use of UAS detection or mitigation capabilities, nor do they conduct legal reviews of commercially available products’ compliance with those laws.

The advisory urges entities to take the advice presented in this Advisory seriously – to consult with counsel and think carefully about the functionality of individual detection or mitigation systems, the way the system operates, and the way the system will be used. A thorough understanding of how a system functions and the applicable law is necessary to ensure that, if UAS detection and mitigation technologies are employed, they will be used effectively, responsibly, and legally.

Although the Advisory is an important discussion of potentially applicable federal law and regulations in this space, it cautions that additional state or local laws may apply, and that entities should further consider the impacts such technology could have on privacy, civil liberties and civil rights.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3