Drones a target of U.S. House bill

Legislation specifies that the government would need a warrant to collect information in a private place using a drone.

Drone technology is advancing to the point where 30,000 unmanned aerial vehicles are expected to be in use over U.S. skies within the next two decades.

That could rub a lot of people the wrong way because of privacy concerns, so Washington is taking action. There's a new bill in the House of Representatives that aims to legislate exactly how drones can be used.

The bill ( PDF ) specifies that the government would need a warrant to collect information in a private place using a drone. As for public spots, the government would have to give prior notice about drone surveillance via a media outlet, government web site or with physical signage in the area.

The bill also spells out that drones cannot be armed by private parties and law enforcement entities, although the military can include weapons on its UAVs.

The Preserving American Privacy Act has bipartisan support and is co-sponsored by Rep. Zoe Lofgren and Rep. Ted Poe.

"The expanded use of drones on U.S. soil raises serious Constitutional and civil liberties issues that Congress needs to address," Lofgren said in a statement to TheNextWeb .

Drone capabilities are chilling, even non-lethal ones.

A Congressional Research Service report ( PDF ) says that currently, drones can be outfitted with high-powered cameras, thermal imaging devices, license plate readers, and laser radar.

"In the near future, law enforcement organizations might seek to outfit drones with facial recognition or soft biometric recognition, which can recognize and track individuals based on attributes such as height, age, gender, and skin color," the report says.

Or how about intelligent flocks of drones?

Last fall a research team at the University of Connecticut announced it was working on fully autonomous drones capable of "thinking" and navigating the hazards of their surroundings without human intervention and in groups, sort of like herd animals.

Despite concerns, there's plenty of interest in developing the technology and lots of people want to get their hands on it.

In fact, more than 1,000 people have pre-ordered a super quiet wing-flapping robot that resembles a dragonfly. The little UAV, which starts at only $119, comes with up to 20 environmental sensors, various cameras and GPS.

Users -- the first of whom should get their units in July -- will control it with various apps that will let them do things such as take aerial photos, play games and use for security.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitylegal issuesprivacy

More about 2C

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Christina DesMarais

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place