Chapter
Operator Training and Qualification
Addressing Potential Security Risks
Intentional Hacking and Signal Jamming
Availability and Protection of Radiofrequency Spectrum
Responsibility for Security Issues
Eyes in the Sky: Sensor Payloads
Cameras and Electro-Optical Imagers
Concerns over Privacy and Intrusiveness
Chapter 2: Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses*
Background, Uses, and Drone Technology
Fourth Amendment Jurisprudence
Curtilage and Open Fields
Manned Aerial Surveillance
Warrants, Suspicionless Searches, and Special Needs
Application of Fourth Amendment to Drones
Warrant Requirement and Suspicionless Drone Searches
Legislative Proposals in the 112th Congress to Constrain Domestic Use of Drones
Preserving Freedom from Unwarranted Surveillance Act of 2012 (H.R. 5925, S. 3287)
Preserving American Privacy Act of 2012 (H.R. 6199)
Farmers Privacy Act of 2012 (H.R. 5961) and Other Restrictions on EPA Drone Use
Chapter 3: Unmanned Aircraft Systems: Measuring Progress and Addressing Potential Privacy Concerns Would Facilitate Integration into the National Airspace System*
Status of Obstacles to Safe and Routine Integration of UAS into the National Airspace System
Sense and Avoid Technologies
Command and Control Communications
Dedicated Radio-Frequency Spectrum
FAA Progress toward UAS Integration Requirements
Emerging Issues Related to UAS Integration Include Potential Security and Privacy Concerns and GPS Jamming and Spoofing
Security of Domestic UAS Use
Privacy Concerns over the Collection and Use of UAS Acquired Data
Appendix I: Objectives, Scope, and Methodology
Appendix II: Federal Entities with Certificates of Waiver or Authorization Approved from January 1, 2012, to July 13, 2012
Chapter 4: Statement of Michael McCaul, Chairman, Subcommittee on Oversight, Investigations and Management. Hearing on ''Using Unmanned Aerial Systems within the Homeland: Security Game Changer?''*
Chapter 5: Statement of Todd Humphreys, Assistant Professor, the University of Texas at Austin. Hearing on ''Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?''(
3. Example Case: Hijacking a UAV
4.1.3. Surface Transportation
5.1. What Does it Take to Build a Spoofer?
5.1.2. Required Skill and Effort
5.2. Can One Buy a Spoofer?
5.3. Range and Required Knowledge of Target
5.3.1. At What Standoff Range Can a Spoofer Be Effective?
5.3.2. What Must the Spoofer Know about the Target to Be Effective?
6. Fixing the Problem: What Can Be Done
to Defend Against Gps Spoofing?
6.1. Jamming-to-Noise Sensing Defense
6.2. Defense Based on SSSC or NMA on WAAS Signals
6.3. Multi-System Multi-Frequency Defense
6.4. Single-Antenna Defense
6.5. Defense Based on Spread-Spectrum Security Codes on L1C
6.6. Defense Based on Navigation Message Authentication on L1C, L2C, or L5
6.7. Correlation Profile Anomaly Defense
6.8. Multi-Antenna Defense
6.9. Defense Based on Cross-Correlation with Military Signals
The University of Texas at Austin
Chapter 6: Unmanned Aircraft Systems: Use in the National Airspace System and the Role of the Department of Homeland Security. Statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues, Government Accountability Office. Hearing on ''Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?''(
Obstacles to Safe and Routine
Role of the Department of Homeland Security in Domestic UAS Use
Preliminary Observations on Emerging
Chapter 7: Statement of William R. McDaniel, Chief Deputy, Montgomery County Sheriff's Office, Conroe, Texas. Hearing on ''Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?''(
Chapter 8: Testimony of Amie Stepanovich, Association Litigation Counsel, Electronic Privacy Information Center. Hearing on ''Using Unmanned Aerial Systems Within the Homeland: Security Game Changer?''(
I. Aerial Drones Pose a Unique
II. Current Privacy Safeguards are Inadequate
III. EPIC Has Urged the Administrative Action
IV. Congress Should Establish Safeguards Related to the Use of Drones