[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
USING UNMANNED AERIAL SYSTEMS WITHIN THE HOMELAND: SECURITY GAME-CHANGER?

=======================================================================

                                HEARING

                               before the

                       SUBCOMMITTEE ON OVERSIGHT,
                     INVESTIGATIONS, AND MANAGEMENT

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                             JULY 19, 2012

                               __________

                           Serial No. 112-107

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC] [TIFF OMITTED] TONGRESS.#13


                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________



                  U.S. GOVERNMENT PRINTING OFFICE
80-848                    WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, gpo@custhelp.com.  


                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Ron Barber, Arizona
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

       SUBCOMMITTEE ON OVERSIGHT, INVESTIGATIONS, AND MANAGEMENT

                   Michael T. McCaul, Texas, Chairman
Gus M. Bilirakis, Florida            William R. Keating, Massachusetts
Billy Long, Missouri, Vice Chair     Yvette D. Clarke, New York
Jeff Duncan, South Carolina          Danny K. Davis, Illinois
Tom Marino, Pennsylvania             Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)
                  Dr. R. Nick Palarino, Staff Director
                   Diana Bergwin, Subcommittee Clerk
              Tamla Scott, Minority Subcommittee Director


                            C O N T E N T S

                              ----------                              
                                                                   Page

                               STATEMENTS

The Honorable Michael T. McCaul, a Representative in Congress 
  From the State of Texas, and Chairman, Subcommittee on 
  Oversight, Investigations, and Management:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable William R. Keating, a Representative in Congress 
  From the State of Massachusetts, and Ranking Member, 
  Subcommittee on Oversight, Investigations, and Management:
  Prepared Statement.............................................    30
The Honorable Henry Cuellar, a Representative in Congress From 
  the State of Texas.............................................     5
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Prepared Statement.............................................    10

                               WITNESSES
                                Panel I

Mr. Todd E. Humphreys, Ph.D., Assistant Professor, Cockrell 
  School of Engineering, The University of Texas at Austin:
  Oral Statement.................................................    12
  Prepared Statement.............................................    13

                                Panel II

Mr. Gerald L. Dillingham, Ph.D., Director, Physical 
  Infrastructure Issues, Government Accountability Office:
  Oral Statement.................................................    36
  Prepared Statement.............................................    38
Chief Deputy William R. McDaniel, Montgomery County Sheriff's 
  Office, Conroe, Texas:
  Oral Statement.................................................    46
  Prepared Statement.............................................    47
Ms. Amie Stepanovich, Litigation Counsel, Electronic Privacy 
  Information Center:
  Oral Statement.................................................    49
  Prepared Statement.............................................    50

                             FOR THE RECORD

The Honorable Michael T. McCaul, a Representative in Congress 
  From the State of Texas, and Chairman, Subcommittee on 
  Oversight, Investigations, and Management:
  Statement of Michael Toscano, President and CEO, Association 
    for Unmanned Vehicle Systems International (AUVSI)...........     6
  Letter From the Air Line Pilots Association International......     9
Association for Unmanned Vehicle Systems International:
  Unmanned Aircraft System Operations Industry ``Code of 
    Conduct''....................................................    61


   USING UNMANNED AERIAL SYSTEMS WITHIN THE HOMELAND: SECURITY GAME-
                                CHANGER?

                              ----------                              


                        Thursday, July 19, 2012

             U.S. House of Representatives,
    Subcommittee on Oversight, Investigations, and 
                                        Management,
                            Committee on Homeland Security,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 9:40 a.m., in 
Room 311, Cannon House Office Building, Hon. Michael T. McCaul 
[Chairman of the subcommittee] presiding.
    Present: Representatives McCaul, Long, Duncan, Marino, 
Keating, Clarke, and Davis.
    Also present: Representatives Cuellar and Brady.
    Mr. McCaul. The committee will come to order. First and as 
a matter of business, Mr. Keating is running late, and I would 
ask unanimous consent that Mr. Cuellar sit as the Ranking 
Member of the subcommittee for this hearing. Seeing no 
objection? Mr. Duncan, you have no objection to that?
    I now recognize myself for an opening statement.
    Unmanned aerial systems, commonly known as drones, have 
been a game-changer for our men and women serving in Iraq and 
Afghanistan. The systems have provided our troops with much-
needed eyes in the skies and have taken the fight to the enemy, 
eliminating some of the most dangerous al-Qaeda terrorists. 
Drones have also increased our capabilities to secure our 
borders and aid our first responders.
    U.S. Customs and Border Protection began first looking at 
these drones back in 2004. Now CBP owns 10 UAS aircraft. These 
systems have been used to surveil drug smuggler tunnels, video 
dams, bridges, levees, riverbeds at risk of flooding, and 
assist with the deployment of National Guard resources 
responding to local flooding. CBP has also flown missions in 
support of the Border Patrol, Texas Rangers, U.S. Forest 
Service, FBI, and others. The systems have become a force 
multiplier for military operations and for border security.
    However, we are on the edge of a new horizon: Using 
unmanned aerial systems within the homeland. Currently, there 
are 200 active Certificates of Authorization issued by the 
Federal Aviation Administration to over 100 different entities, 
such as law enforcement departments and academic institutions, 
to fly drones domestically. This map on the monitor shows the 
locations of COA, or COA recipients as of April 2012. The 
number of recipients since that time has in fact increased.
    The FAA plans to select six test sites around the country 
for the use of non-Government drones this year and plans to 
allow the deployment of non-Government drones Nation-wide by 
the year 2015.
    While the FAA is responsible for ensuring these systems fly 
safely in U.S. airspace, with only 2\1/2\ short years until 
drones begin to dominate the skies in the U.S. homeland, no 
Federal agency is taking the lead to deal with the full 
implications of using unmanned aerial systems and developing 
the relevant policies and guidelines for their use. This is 
despite the fact that 4 years ago the Government Accountability 
Office recommended to the Secretary of Homeland Security that 
she direct the TSA Administrator to examine the security 
implications of future, non-military UAS operations in the 
National airspace system and take any actions deemed 
appropriate.
    GAO's recommendation was well-founded because in 2004, TSA 
issued an advisory that described possible terrorist interest 
in using UASs as weapons. The advisory noted the potential for 
UASs to carry explosives or disperse chemical or biological 
weapons. It discussed how the Revolutionary Armed Forces of 
Colombia, or FARC, and Hezbollah were interested in acquiring 
these UASs. While the advisory acknowledged there was no 
credible evidence to suggest that terrorist organizations 
planned to use these systems in the United States, it did state 
that the United States Government was concerned that these 
aerial vehicles could be modified and used to attack key assets 
and critical infrastructures within the United States.
    These concerns were validated just last week, or last year 
when a Massachusetts man agreed to plead guilty to attempting 
to damage and destroy Federal buildings. The individual was 
arrested in September 2011 after an undercover FBI 
investigation revealed his plot to use multiple remote 
controlled aircraft laden with explosives to collapse the dome 
of the United States Capitol and attack the Pentagon using that 
UAV system.
    As if this plot wasn't frightening enough, cutting-edge 
research out of the University of Texas at Austin has revealed 
yet more security vulnerabilities. Specifically, researchers 
from the Cockrell School of Engineering led by Dr. Todd 
Humphreys, who is our first witness today, proved that civilian 
unmanned aerial systems can be hacked into and hijacked with a 
relatively small investment of money and time. These findings 
are alarming and have revealed a gaping hole in the security of 
using unmanned aerial systems domestically. Now is the time to 
ensure these vulnerabilities are mitigated to protect our 
aviation system as the use of unmanned aerial systems continue 
to grow.
    The Department of Homeland Security's mission is to protect 
the homeland. Unfortunately, DHS seems either disinterested or 
unprepared to step up to the plate to address the proliferation 
of unmanned aerial systems in U.S. airspace. The potential 
threats they pose to our National security and the concerns our 
citizens have of how drones fly over cities will be used, 
including protecting civil liberties of individuals under the 
Constitution.
    For example, in discussions with my subcommittee staff 
prior to this hearing, Department officials repeatedly stated 
that the Department does not see this function, the domestic 
use of drones, as part of their mission and has no role in the 
domestic unmanned aerial systems. I strongly disagree. I can't 
imagine how they would find that they have no role when there 
is a terror plot thwarted by the FBI attempting to hit the 
United States Capitol and the Pentagon. What more Homeland 
Security interest could there possible be?
    DHS's lack of attention about this issue is truly 
incomprehensible.
    It should not take a 9/11-style attack by a terrorist 
organization such as Hezbollah or a lone wolf-inspired event to 
cause DHS to develop guidance addressing the security 
implications of domestic drones. It should not take a hearing 
to force the DHS to develop policy when it comes to the 
security of our homeland, and what it should take is 
responsible leadership willing to recognize a potential threat 
and take the initiative. DHS lacks this initiative and I am 
concerned that DHS is reverting back to a pre-9/11 mindset, 
which the 9/11 Commission described as a lack of imagination in 
identifying threats and protecting the homeland.
    We are disappointed that DHS declined to testify here 
today. This is simply another example of how DHS leadership is 
failing to get ahead of the curve on an issue which directly 
impacts the security of the United States. I hope our 
witnesses' testimony will be a call to action for the 
Department. During today's testimony we look forward to 
learning more about the security issues related to the domestic 
use of drones and what DHS needs to do to prepare for their 
widespread use.
    [The statement of Mr. McCaul follows:]

                Statement of Chairman Michael T. McCaul
                             July 19, 2012

    Unmanned aerial systems, commonly known as ``drones'', have been a 
game changer for our men and women serving in Iraq and Afghanistan. 
These systems have provided our troops with much-needed ``eyes in the 
sky'' and have taken the fight to the enemy, eliminating some of the 
most dangerous al-Qaeda terrorists. Drones have also increased our 
capabilities to secure our borders and aid first responders.
    U.S. Customs and Border Protection began first looking at using 
drones back in 2004. Now, CBP owns ten UAS aircraft. These systems have 
been used to surveil drug smuggling tunnels; video dams, bridges, 
levees, and riverbeds at risk of flooding; and assist with the 
deployment of National Guard resources responding to local flooding. 
CBP has flown missions in support of the Border Patrol, Texas Rangers, 
U.S. Forest Service, FBI, and others. These systems have become a force 
multiplier for military operations and border security.
    However, we are now on the edge of a new horizon: Using unmanned 
aerial systems within the homeland. Currently, there are about 200 
active Certificates of Authorization issued by the Federal Aviation 
Administration to over 100 different entities, such as law enforcement 
departments and academic institutions, to fly drones domestically. This 
map shows the location of COA recipients as of April 2012. The number 
of recipients since that time has increased.
    The FAA plans to select six test sites around the country for the 
use of non-Government drones this year and plans to allow the 
deployment of non-Government drones Nation-wide by 2015.
    While the FAA is responsible for ensuring these systems fly safely 
in U.S. airspace, with only 2\1/2\ short years until drones begin to 
dominate the skies in the U.S. homeland, no Federal agency is taking 
the lead to deal with the full implications of using unmanned aerial 
systems and developing the relevant policies and guidelines for their 
use. This is despite the fact that 4 years ago the Government 
Accountability Office recommended the Secretary of Homeland Security 
direct the TSA Administrator to examine the security implications of 
future, non-military UAS operations in the National airspace system and 
take any actions deemed appropriate.
    GAO's recommendation was well-founded because in 2004 TSA issued an 
advisory that described possible terrorist interest in using UASs as 
weapons. The advisory noted the potential for UASs to carry explosives 
or disperse chemical or biological weapons. It discussed how the 
Revolutionary Armed Forces of Columbia, or FARC, and Hezbollah were 
interested in acquiring UASs. While the advisory acknowledged there was 
no credible evidence to suggest that terrorist organizations planned to 
use these systems in the United States, it did state that the U.S. 
Government was concerned that these aerial vehicles could be modified 
and used to attack key assets and critical infrastructure in the United 
States.
    These concerns were validated just last week when a Massachusetts 
man agreed to plead guilty to attempting to damage and destroy Federal 
buildings. The individual was arrested in September 2011 after an 
undercover FBI investigation revealed his plot to use multiple remote-
controlled aircraft laden with explosives to collapse the dome of the 
U.S. Capitol and attack the Pentagon.
    As if this plot wasn't frightening enough, cutting-edge research 
out of the University of Texas at Austin has revealed yet more security 
vulnerabilities. Specifically, researchers from the Cockrell School of 
Engineering led by Dr. Todd Humphreys proved that civilian unmanned 
aerial systems can be hacked into and hijacked with a relatively small 
investment of money and time. These findings are alarming and have 
revealed a gaping hole in the security of using unmanned aerial systems 
domestically. Now is the time to ensure these vulnerabilities are 
mitigated to protect our aviation system as the use of unmanned aerial 
systems continues to grow.
    The Department of Homeland Security mission is to protect the 
homeland. Unfortunately, DHS seems either disinterested or unprepared 
to step up to the plate to address the proliferation of Unmanned Aerial 
Systems in U.S. air space, the potential threats they pose to our 
National security, and the concerns of our citizens of how drones 
flying over our cities will be used including protecting civil 
liberties of individuals under the Constitution. For example, in 
discussions with my subcommittee staff prior to this hearing, 
Department officials repeatedly stated the Department does not see this 
function (domestic use of drones) as part of their mission and has no 
role in domestic unmanned aerial systems. I strongly disagree.
    DHS's lack of attention about this issue is incomprehensible. It 
should not take a 9/11-style attack by a terrorist organization such as 
Hezbollah or a lone wolf-inspired event to cause DHS to develop 
guidance addressing the security implications of domestic drones. It 
should not take a hearing to force DHS to develop policy when it comes 
to the security of our homeland. What it should take is responsible 
leadership willing to recognize a potential threat and take the 
initiative. DHS lacks that initiative. I am concerned DHS is reverting 
back to a pre-9/11 mindset, which the 9/11 Commission described as a 
lack of imagination in identifying threats and protecting the homeland.
    We are disappointed DHS declined to testify today. This is simply 
another example of how DHS leadership is failing to get ahead of the 
curve on an issue which directly impacts the security of the United 
States. I hope that our witnesses' testimony will be a call to action 
for the Department. During today's testimony, we look forward to 
learning more about the security issues related to the domestic use of 
drones and what DHS needs to do to prepare for their widespread use.






    Mr. McCaul. With that, the Chairman now recognizes the 
Ranking Member, I guess pro tem, Mr. Cuellar.
    Mr. Cuellar. Thank you very much, Mr. Chairman. Thank you 
for this opportunity to be here with you as the Ranking Member 
for the Border-Maritime where we deal with border security and 
dealing with some of the UAVs that I think you and I have 
worked on together. It certainly gives us an opportunity, and 
also as the co-chair of the Congressional Unmanned System 
Caucus with Congressman Buck McKeon. Just for informational 
purposes, Members, we do have tomorrow a caucus meeting, and we 
are going to have Members, representatives from the FBI, DHS, 
CBP tomorrow at 10:00 at the Rayburn Room 2261. I will give a 
copy to the Members here. This will be an excellent opportunity 
for Members and their staff to learn about current and future 
domestic law enforcement use of unmanned aerial vehicles.
    We have, Buck McKeon and myself, have spent a lot of time 
with other Members of the caucus looking at the issues that you 
have brought up, Mr. Chairman, privacy issues that have been 
brought up, and as you know a lot of the privacy issues have 
already been decided by the Supreme Court. All we are looking 
at is using a different type of platform. So whether it is a 
helicopter, an airplane, or in this case a UAV, a lot of those 
issues have been addressed by the Supreme Court issues, and 
there is 1, 2 pages that I have though. So if anybody wants to 
learn about the privacy issues on drones or UAVs, please 
contact my office or Buck's office.
    But the other thing, Mr. Chairman, you do bring up a lot of 
good points that I think we need to cover. Good questions. I 
look forward to hearing from my UT graduate also, from UT. I do 
have two degrees from UT, and Doctor, it is a pleasure meeting 
you. I do have a few questions for you on that, but I think 
this type of a dialogue would be good to talk about the UAVs.
    One last thing, Mr. Chairman, as you mentioned, the FAA, we 
did pass the reauthorization of the FAA that talks about the 
integration of more civilian UAVs and there are different steps 
we have brought in. If you haven't talked to the FAA, I would 
ask you to spend some time with the FAA because they have 
certain steps that they will be going into the future use on 
this. I know that the Ranking Member, Mr. Keating, for this 
particular subcommittee is on his way. He does have a 
statement. I am not going to read his statement. He will be up 
here and if you will give him the opportunity to also make that 
statement when he shows up.
    But at this time, Mr. Chairman, thank you for allowing me 
to be here with you.
    Mr. McCaul. I thank the Ranking Member, and before I 
continue I ask unanimous consent to include a statement from 
Mr. Michael Toscano, president and CEO of the Association for 
Unmanned Vehicle Systems International, and Captain Lee Moak, 
the president of the Airline Pilots Association, describing the 
domestic use of UAS, both of whom are very much in favor of 
this hearing. Hearing no objection, so ordered.
    [The statements of Mr. Toscano and Mr. Moak follow:]

   Statement of Michael Toscano, President and CEO, Association for 
             Unmanned Vehicle Systems International (AUVSI)

    On behalf of the Association for Unmanned Vehicle Systems 
International (AUVSI) and its members, I want to thank the committee 
for examining important issues relating to the expansion of unmanned 
aircraft systems (UAS) in the National Airspace System. Unmanned 
aircraft extend human potential and allow us to execute dangerous or 
difficult tasks safely and efficiently, saving time, saving money and, 
most importantly, saving lives.
    Whether it is helping search-and-rescue teams find a lost child, 
giving researchers a new understanding of hurricanes, or helping to 
fight wildfires, the applications of unmanned aircraft in the United 
States are virtually limitless. The incredible benefits of UAS aren't 
just theoretical, however; the technology is already serving important 
homeland security and safety functions here at home. For example:
   U.S. Customs and Border Protection (CPB) currently uses UAS 
        to monitor the border to help interdict illicit trafficking. 
        According to the CPB's Office of Air and Marine, unmanned 
        aircraft in 2011 assisted with the seizure of thousands of 
        pounds of narcotics and the apprehension of dozens of 
        individuals taking part in illegal activities.
   UAS aided the response to the severe flooding of the Red 
        River in the upper Midwest in April 2011. According to the U.S. 
        Customs and Border Protections Office, which leant the UAS to 
        the effort, the UAS mapped more than 800 nautical miles along 
        the flooded tributaries and basins in Minnesota and North 
        Dakota, and provided streaming video and analysis of the areas 
        affected by the flood such as levee integrity and ice damming. 
        The information provided by UAS gave forecasters more accurate 
        predictions of when and where the flooding would be at its 
        worst.
   In 2008, NASA assisted the State of California in fighting 
        wildfires with the use of Ikhana, a UAS equipped with advanced 
        technology. The information about the fires collected by Ikhana 
        was transmitted to command centers within minutes, and then 
        distributed into the field giving firefighters crucial 
        situational awareness.
   UAS were used to help search-and-rescue teams in the 
        aftermath of Hurricane Katrina. Scientists from the University 
        of South Florida worked with Florida rescuers in Mississippi, 
        in what was the first known use of small UAS for an actual 
        disaster. Brought in to survey Pearlington, MS, within 2 hours, 
        the responders had the data from the UAS showing that no 
        survivors were trapped and that the flood waters from the 
        cresting Pearl River were not posing an additional threat.
    These are just a few examples of the real-world security and safety 
applications of UAS. And there are likely many more. As with any new 
revolutionary technology, all of the potential uses of UAS have 
probably not been thought of yet.
    It's important to note, meanwhile, that, just as we recognize the 
beneficial security and safety functions of UAS, so too does the 
American public. According to a recent National poll conducted by 
Monmouth University in New Jersey, nearly two-thirds of Americans 
support the use of unmanned aircraft to protect the U.S. borders and 
control illegal immigration. Eighty percent of Americans support the 
use of unmanned aircraft to help in search-and-rescue missions.
    As we further integrate UAS into the U.S. airspace and recognize 
the corresponding security and safety benefits, we are also mindful 
that UAS operations and the technology itself must be as safe as 
possible. Safety has always been a top priority for the industry, and 
we are already working with a variety of stakeholders to ensure 
unmanned aircraft are integrated safely into our Nation's airspace. The 
industry is in regular contact with the Federal Aviation Administration 
(FAA) and we have met with, and continue to maintain an open dialogue 
with, representatives from the pilot community, air traffic 
controllers, and others with an interest in aviation safety.
    Safety is also one of three main pillars of the industry's new Code 
of Conduct published earlier this month. We understand and take very 
seriously the need to conduct UAS operations in safe manner that 
mitigates risk and instills confidence in our systems. Specifically 
with regard to safety, the guidelines recommend when and by whom UAS 
should be flown, address training and crew fitness requirements, call 
for a thorough risk assessment before each UAS flight and codify our 
commitment to respecting other users of the airspace, the privacy of 
individuals, and the concerns of the public.
    UAS users are already demonstrating a commitment to safety. Case in 
point is the Arlington, Texas Police Department. Home to one of the 
most fully developed UAS programs of any local law enforcement agency 
in the country, the Arlington Police Department works cooperatively 
with the FAA to safely fly its UAS for operational missions city-wide. 
The department has developed pre-flight checklists, flight and squawk 
logs, training protocols and a standard operating procedure for all UAS 
flights. This is a model for the safe usage of UAS we hope to instill 
in manufacturers and operators through our Code of Conduct.
    The UAS used by the Arlington Police Department also exemplify the 
types of unmanned aircraft we can expect to see more of in the coming 
years. The vast majority of UAS currently flying in the United States 
are small models that weigh under 25 pounds and can fit in the trunk of 
a car. The Arlington Police Department, for example, is using an 11-
pound mini-helicopter, which has proven effective for surveying multi-
car crashes on interstate highways. The UAS allow the crash scenes to 
clear more quickly, reduce pollution, and keep officers safe by 
reducing the amount of time they spend roadside. Even when the domestic 
airspace is further opened in 2015, most unmanned aircraft will be 
limited to no more than 55 pounds.
    In addition to safe operations, the industry is committed to 
building safeguards into UAS technology, such as ``sense and avoid'' 
systems and other innovations, which will enable a safe and orderly 
integration. For example, the U.S. Army recently completed a 2-week 
evaluation of a Ground Based Sense and Avoid (GBSAA) system at Dugway 
Proving Ground in Utah. The system uses 3-D radar and software 
algorithms to detect other aircraft flying in the vicinity of UAS, and 
safely steer UAS away from other aircraft. In both live and simulated 
tests, the system successfully recognized conflicts and navigated UAS 
away from other aircraft.
    The GBSAA system provides a window into the type of ``sense and 
avoid'' technologies available for the U.S. domestic airspace. 
Meanwhile, the development of this particular system is ahead of 
schedule. The Army has said the GBSAA could be deployed as early as 
March 2014, 1 full year ahead of the Army's initial estimate of 2015.
    In addition to ``sense and avoid'' systems, it is important to 
underscore that many UAS have multiple redundant systems that add extra 
layers of safety and security. This is an especially relevant point in 
light of the recent media attention surrounding so-called ``spoofing'' 
of a GPS signal by researchers at the University of Texas. ``Spoofing'' 
is not a new issue. Papers have been written on the subject since the 
1990s and, in 2001, the U.S. Department of Transportation broadly 
examined vulnerabilities in the GPS system relating to aviation, 
maritime, and ground applications.
    The industry is well-aware of ``spoofing.'' Meanwhile, as the DOT 
vulnerability assessment demonstrates, ``spoofing'' is not a concern 
unique to UAS. ``Spoofing'' has implications for any technology that 
depends on GPS for guidance and timing, whether it is manned or 
unmanned aircraft, your cell phone, or your car. In fact, commercial 
airliners are relying more and more heavily on GPS signals to locate 
the runways at airports and, with the advent of the next generation air 
traffic control system, all aircraft--manned and unmanned--will rely on 
GPS for navigation.
    At the same time, ``spoofing'' is not as simple or easy as news 
reports suggest. To successfully spoof a GPS signal, one must have the 
equipment and capability to broadcast a counterfeit signal at a high 
enough power level to overpower the GPS signals emanating from more 
than 20 satellites in orbit around the earth. One must know the 
location of the target vehicle and be able to track it. If the target 
vehicle is not in close proximity to the spoofing device, this requires 
a detection system such as radar. Meanwhile, custom software is needed 
to make adjustments to the target vehicle's course. It took the 
University of Texas team four years to develop the necessary software, 
and the professor overseeing the experiment has acknowledged that the 
skills involved in ``spoofing'' are ``outside the capability of any 
average American citizen.'' In sum, in a controlled experiment where an 
aircraft is kept low to the ground, hovering in place and equipped with 
minimal safeguards, spoofing is feasible. Under real-world conditions, 
however, ``spoofing'' is much more difficult.
    That said, the industry takes the potential for ``spoofing'' very 
seriously and is already advancing technologies, such as SAASM--
Selective Availability Anti-Spoofing Module--to prevent it. SAASM, 
which involves the authentication of encrypted satellite signals, is 
already widely used by the military to thwart GPS spoofing. The 
Department of Defense (DOD) issued a directive that, as of October 
2006, required all newly-acquired UAS systems--as well as systems going 
through major modifications or upgrades--to be SAASM-equipped. As has 
happened with other technologies, innovations developed for the 
military could transition in some form to the civilian market in the 
years to come. In fact, GPS itself was a military technology that 
transitioned to civilian use.
    In addition to SAASM, many unmanned aircraft also have alternate 
navigation systems, such as radio links and backup inertial systems, 
which provide redundancy to GPS. Other backup technologies exist--or 
are being developed--that autonomously guide unmanned aircraft to a 
safe landing at a pre-determined location in the unlikely event of 
interference with navigation signals. Other ``spoofing'' 
countermeasures have been proposed since the 1990s, some of which are 
relatively simple software changes. Finally, it is also important to 
remember that while an aircraft itself may be unmanned, a trained 
professional is behind the controls, ready to respond, and bring a safe 
resolution to any problem that may arise.
    Like any other technology, unmanned aircraft technology continues 
to become smarter and safer every day. In preparation for the expansion 
of UAS in the domestic airspace, AUVSI member companies have been hard 
at work developing new technologies that would add extra layers of 
safety and security to unmanned aircraft. More and more innovations 
will be available in the very near future.
    While the industry continues to refine and enhance UAS technology, 
the FAA is preparing for its rule-making process, which will unfold 
over the next few years. In addition, later this year, the FAA is 
expected to announce the selection of six UAS test sites around the 
country. This window will provide ample time for all stakeholders to 
develop a robust framework for the integration of unmanned aircraft, 
put the technology to the test, and resolve any outstanding issues.
    Other concerns have been raised, for example, about privacy--
concerns which the industry is actively working to address. AUVSI has 
met with nearly a dozen privacy advocates and civil liberties 
organizations, as well as other interested parties, to understand their 
concerns, encourage them to work together and let them know that, like 
them, AUVSI supports Americans' rights to privacy, especially the 
protections afforded under the Fourth Amendment to the U.S. 
Constitution. Meanwhile, the industry's recently released Code of 
Conduct clearly articulates our commitment to respecting individuals' 
privacy. As the integration progress, the industry will continue to 
engage in a constructive, thoughtful, and civil dialogue on the 
National, State, and local levels with all parties to address any 
privacy concerns.
    The unmanned aircraft systems industry is committed to the safe and 
responsible integration of unmanned systems into the National airspace. 
We look forward to continuing to work with Congress, the FAA, DHS, and 
other stakeholders to ensure unmanned aircraft are integrated safely 
and responsibly, so we can unlock the tremendous potential of this 
technology to enhance public safety, advance scientific research, and 
otherwise benefit society.
                                 ______
                                 
       Letter From the Air Line Pilots Association International


                                     July 18, 2012.
The Honorable Mike McCaul,
Chairman, Oversight, Investigations, and Management Subcommittee, H2-
        176 Ford Building, Washington, DC 20515.
The Honorable Bill Keating,
Ranking Member, Oversight, Investigations, and Management Subcommittee, 
        H2-117 Ford Building, Washington, DC 20515.
    Dear Chairman McCaul and Representative Keating: The Air Line 
Pilots Association, International (ALPA) represents the safety and 
security interests of more than 53,000 professional airline pilots 
flying for 37 airlines in the United States and Canada. On their 
behalf, I respectfully request ALPA's views be included in the hearing 
record for the upcoming hearing on ``Using Unmanned Aerial Systems 
(UAS) Within the Homeland: Security Game-Changer?'' ALPA is the world's 
largest professional pilot association and the world's largest non-
Governmental aviation safety organization. As such, we are pleased the 
subcommittee is holding this hearing and appreciate your oversight and 
continued interest in the subject of unmanned aircraft systems.
    The much-publicized success of Unmanned Aircraft Systems (UAS) in 
combat operations has created a large potential market for the use of 
these aircraft by commercial enterprises. The FAA has managed the 
process of accommodating UAS into the National Airspace System (NAS) 
since it began. Currently, several UAS are in domestic use by 
Government agencies (e.g., law enforcement, Customs Border Protection 
(CBP), agriculture, etc.) operating with FAA Certificates of 
Authorization (COA) in segregated airspace. As the number of these 
aircraft increases, and the potential for business applications also 
increases, so does pressure to allow their unrestricted operation in 
the NAS. FAA has recognized the need for regulations, standards 
development, and oversight unique to future domestic UAS operations in 
the NAS and has, for several years, proactively worked with industry 
stakeholders to develop those standards and regulations. This process 
is extremely complex and draws on the expertise of both industry 
stakeholders and FAA specialists in air traffic control, airspace 
management, equipment certification and other disciplines with a direct 
bearing on the safety and security of flight operations of UAS in the 
NAS.
    ALPA recognizes the benefits that UAS may provide valuable National 
defense and law enforcement functions domestically. However, the 
introduction of such aircraft into an integrated National airspace 
system represents an entirely new concept that has the potential to 
profoundly degrade the safety of both commercial and general aviation 
flight operations if this integration is not accomplished in a 
responsible, comprehensive manner. To achieve the complex goals of safe 
and secure UAS integration in the NAS, the most capable agency to 
provide effective oversight would be the one that is currently the 
specialist agency in all aspects of aviation. FAA has decades of 
experience with safely integrating new technologies and concepts into 
the NAS and has the experience, knowledge, and expertise to provide 
harmonized regulatory standards and oversight to the many stakeholders 
to maintain aviation safety and security of NAS. While DHS can, and 
should continue to, provide expertise in the threats that must be 
mitigated, it is FAA with the expertise to develop and implement those 
mitigations. This relationship is true for all aircraft operating in 
the NAS, regardless of where the pilot sits.
    There are significant industry and Government regulatory and 
standards development activities already under way in North America and 
other parts of the world oriented toward addressing the challenges and 
concerns associated with attempts to integrate UAS into unsegregated 
airspace with the entire spectrum of civil traffic. FAA is central to 
these developments, and has partnered with numerous other agencies 
including the Department of Defense (DOD), the National Aeronautics and 
Space Administration (NASA), the Federal Aviation Administration (FAA), 
Transport Canada, and RTCA in the United States and its counterpart 
EUROCAE in Europe. The International Civil Aviation Organization (ICAO) 
has published a circular to guide the development of harmonized 
standards and practices for UAS. FAA is the lead U.S. Government agency 
in those international developments. In addition, in the United States, 
the FAA is in the process of selecting six UAS Test Site facilities to 
further develop technologies that enhance future aviation safety and 
security. RTCA is currently producing substantive recommendations for 
UAS standards for aviation safety and security for the FAA, as well. 
For further information regarding present and future issues of UAS 
relating to NAS safety and security integration, I refer you to the 
white paper attached, ``Unmanned Aircraft Systems, Challenges for 
Safely Operating in the National Airspace System'' and ask that this 
material be included in the hearing record as well.*
---------------------------------------------------------------------------
    * The document has been retained in committee files.
---------------------------------------------------------------------------
    Unmanned Aircraft Systems approval for operations in the NAS 
requires comprehensive and exhaustive total system analysis to achieve 
integration. The needs of air traffic services, airspace, airports, 
airmen, and operators all will need to be evaluated to safely and 
securely integrate the UAS into the complex and dynamic operations of 
the NAS. There are also technological requirements inherently unique to 
the UAS and, therefore the regulator's expertise must not be limited to 
certification of just the aircraft, but also the complete system, 
including the data link infrastructure, g round control station, as 
well as the security of the ground control station that contain both 
the pilot(s) and communication components. The FAA processes are 
synonymous with safety of NAS and responsibility for those processes 
should reside with them. The current role played by TSA and DHS in 
identifying and mitigating threats to the security of operation NAS 
should similarly be maintained.
    To maintain the exceptional level of safety in the NAS, it is the 
FAA that must evaluate the safety, operational, and security procedures 
that may need to be modified to provide for unique UAS requirements. As 
with all certified aircraft, furthering the understanding of the design 
and limitations of the aircraft will be required so that appropriate 
levels of safety and security assurances can be developed. ALPA has 
always been a vanguard of aviation safety, and we have worked as a 
stakeholder with the FAA for many years and are convinced that the 
thorough current certification processes of the FAA have the breadth 
and scope to continue to safely and securely maintain aviation safety 
during the entire current and future certification programs for UAS 
aircraft, pilots, and operators.
    We appreciate the subcommittee's interest in this issue and look 
forward to continuing our work together to protect the security of the 
Nation's airspace.
            Sincerely,
                                          Captain Lee Moak,
             President, Air Line Pilots Association, International.

    Mr. McCaul. Members are reminded that statements may be 
submitted for the record.
    [The statement of Ranking Member Thompson follows:]

             Statement of Ranking Member Bennie G. Thompson
                             July 19, 2012

    I would first like to thank Chairman McCaul for holding this 
hearing on a very timely subject.
    In February, President Obama signed the Federal Aviation 
Administration Reauthorization Act into law.
    Included in the Act was a provision directing the Federal Aviation 
Administration (FAA), to rapidly expand the ability of public 
agencies--including State and local law enforcement--to use Unmanned 
Aerial Vehicles, or UAVs, to fulfill their missions.
    The use of UAVs within the homeland is not a new concept.
    Following Hurricane Katrina, UAVs played a vital role in surveying 
storm-damaged communities and assisting in the search and rescue of 
trapped survivors in Mississippi and other areas affected by the storm.
    Moreover, since 2004, the U.S. Customs and Border Protection (CBP), 
within the Department of Homeland Security has deployed UAVs along the 
Southwestern Border as a force-multiplier in its border security 
efforts.
    CBP recently announced its intention to increase its fleet of 10 
UAVs to 24 by the year 2016.
    Clearly, UAVs have many beneficial uses in the National airspace 
and, when used within proper parameters, can serve as an important tool 
in securing the homeland.
    However, the use of UAVs in our National airspace may be expanding 
at a faster rate than the legal protections governing its use.
    In late 2010, there were 273 active Government-licensed UAVs, 
nearly 100 more than the previous year. Reports in 2012 demonstrate 
that the FAA has issued more than 300 UAV licenses.
    Yet, according to the Government Accountability Office, ``no 
Federal agency has specific statutory responsibility to regulate 
privacy matters related to UAVs.''
    Despite the Department of Homeland Security's role as the leading 
Federal agency operating UAVs, its Chief Privacy Officer has never 
performed a Privacy Impact Assessment on UAVs or developed safeguards 
and guidelines for ensuring that privacy protections are in place.
    Furthermore, although FAA is responsible for incorporating UAVs 
into our National airspace, according to its website: ``the FAA's sole 
mission and authority as it focuses on the integration of unmanned 
aircraft systems is safety.''
    So, who is watching the henhouse, with respect to privacy?
    That is the question that causes me concern.
    UAVs are capable of hovering in the same spot for up to 30 hours 
and recent reports indicate that in the near future, 45 hours is not 
out of the question.
    They can find and follow a single target or up to 65; utilize 
facial recognition software to find a face in a crowd or an event; read 
license plates from the sky; and some can even shoot taser projectiles, 
tear gas, and rubber balls from 300 feet above ground.
    Given these capabilities, there is the potential for invasive 
surveillance and warrantless searches with little to no privacy 
protections in place.
    Like my colleagues, I strongly support providing homeland security 
officials and law enforcement agencies with the tools they need to 
carry out their vital work on behalf of our Nation.
    However, we have a responsibility to ensure that as technology 
develops and our systems become more sophisticated, proper safeguards 
and protections are in place to ensure the right to privacy is 
maintained.
    I look forward to hearing from our witnesses and thank them for 
appearing before us today.
    I yield back.

    Mr. McCaul. The Chairman now will go to the panel and 
introduce Dr. Todd Humphreys I had the pleasure to visit 
yesterday, and being from Austin I take particular pride that 
you are here also today, and growing up in a family of Long 
Horns, I take even more in that as well. So I have a little bit 
of orange blood in myself.
    Dr. Todd Humphreys is an Assistant Professor at the 
Cockrell School of Engineering at the University of Texas at 
Austin. He specializes in the application of optimal estimation 
techniques to problems in satellite navigation, orbital and 
attitude dynamics, and signal processing. For anybody here who 
understands that, other than Dr. Humphreys, congratulations to 
you.
    He directs the radio navigation laboratory at UT Austin, 
where his current research focuses on defending against 
intentional GPS spoofing and jamming. Most recently Dr. 
Humphreys uncovered that GPS signals that navigate unmanned 
aerial systems can be hijacked and controlled. He conducted 
experiments at White Sands Missile Range with the Department of 
Homeland Security, and Dr. Humphreys--and also I believe at the 
Memorial Stadium in Austin. I believe we will see a video that 
describes that. He obtained his doctorate from Cornell 
University.
    The Chairman now recognizes Dr. Humphreys for his opening 
statement.

  STATEMENT OF TODD E. HUMPHREYS, PH.D., ASSISTANT PROFESSOR, 
  COCKRELL SCHOOL OF ENGINEERING, THE UNIVERSITY OF TEXAS AT 
                             AUSTIN

    Mr. Humphreys. Chairman McCaul, Members of the 
subcommittee, you may have heard these reports mentioned by 
Chairman McCaul that at about this time last month my students 
and I from the University of Texas hijacked a civilian unmanned 
aerial vehicle, a small helicopter, and brought it down from a 
remote location. That much is true, and I have come today 
prepared to talk about what we did, what the implications are 
for the National airspace, and what can be done to address the 
problem that our experiment brought to the fore.
    So how did we hijack this UAV, this small helicopter? We 
exploited a weakness in the Global Positioning System. You see, 
GPS signals come in two flavors. There are the military signals 
which are encrypted to prevent counterfeiting and unauthorized 
use. Then there are the second class of signals, civilian 
signals, and these signals are not encrypted. They are freely 
accessible and that has explained--that explains their enormous 
popularity, their usefulness, but it also opens up a 
vulnerability. It makes them easy to counterfeit or, in other 
words, to spoof.
    Just like monopoly money, they have a detailed structure 
but they don't have any built-in protection against 
counterfeiting or spoofing.
    So what does this have to do with UAVs? Well, the 
connection is fairly obvious. Almost all civilian UAVs depend 
heavily on civil GPS for their navigation, and that means that 
if you can convincingly fake a GPS signal you can fool a UAV 
into tracking your signal instead of the authentic one, and at 
that point you can control the UAV. You make it move left or 
right, front or back, up or down. In other words, you have 
hijacked the UAV, and you can do this from miles away.
    My friends at the University of Texas have prepared a video 
that I would like to show you which illustrates what we did and 
helps me to explain the technique involved.
    You see against the background here, a UAV, an animated 
one, like the one we used, flying above the desert floor. This 
white person entering your picture is the good guy. He is the 
UAV's remote operator and he is now uploading to the UAV a way 
point. That white diamond is a destination the UAV is supposed 
to move to. The GPS satellites above help the UAV locate itself 
and as you can see here, it recognizes where it is, where the 
destination is, and makes its tracks toward the destination 
lining up nicely with its goal.
    But the bad guy moving in here from the left is a spoofer 
operator, and he is going to transmit fake GPS signals to the 
UAV. At this point, we will pause so that I can talk a little 
bit about what you see on the screen. The peak you see on the 
screen exists in every GPS receiver. It corresponds to the 
authentic signals. You can go ahead and roll it now. But if you 
can create fake GPS signals, you have caused another peak to 
appear, and that peak, when it lines up with the authentic one, 
ends up hijacking the tracking loops inside the GPS receiver, 
and what you will notice is that as it draws off the tracking 
loops, a ghost UAV slides out the back. That ghost UAV is where 
now the UAV thinks it is. It is not its actual location, it is 
its perceived location. As it moves toward its way point it is 
the ghost UAV that lines up the way point instead of the actual 
UAV.
    We did the same here at Texas Memorial Stadium by making 
our UAV think that it was rising upward at a fast clip, and you 
will see here that in response it falls downward. We can go 
ahead and roll it. The bar at the bottom will tell you who is 
in control. At first it is the authentic signals and the ground 
controller who is in control of this UAV, but at this point 
when they go red, it is now the spoofer, the hijacker, who 
controls the UAV and you will see that it drops precipitously 
toward the ground. That is all under control of this remote 
hijacker.
    Then at White Sands we were invited by the Department of 
Homeland Security or authorized by the Department Security, and 
in fact they facilitated some of this test, so that we could 
conduct a test over the air where we capture the UAV in mid-
air. We did it from about a half-mile away. On a hilltop, we 
broadcast our signals. You can go ahead and roll it now, and 
you will see that in this case, as in the former case, the UAV 
started in a nice hovering position but then came straight down 
as if it were an elevator moving down a shaft entirely under 
control of the remote hacker.
    So what are the implications for our National airspace? 
Well, back in February, Congress handed a mandate, the Federal 
Aviation Administration, to develop a comprehensive plan for 
safely accelerating the integration of civil UAVs into the 
National airspace system, and I believe that the results of our 
demonstration should factor heavily into that plan. But the 
truth is that the FAA is, its culture and its expertise is 
geared more toward safety than security and our test implicated 
the security of the airspace. So I think it is fair to say that 
the DHS may have also a role to play in drawing up these new 
rules and regulations, and I am happy to entertain questions 
from the committee.
    [The statement of Mr. Humphreys follows:]

                Prepared Statement of Todd E. Humphreys
                             July 18, 2012

                               1. SUMMARY

    Military Global Positioning System (GPS) signals have long been 
encrypted to prevent counterfeiting and unauthorized use. Civil GPS 
signals, on the other hand, were designed as an open standard, freely 
accessible to all. These virtues have made civil GPS enormously 
popular, but the transparency and predictability of its signals give 
rise to a dangerous weakness: They can be easily counterfeited, or 
spoofed. Like Monopoly money, civil GPS signals have a detailed 
structure but no built-in protection against counterfeiting. Civil GPS 
is the most popular unauthenticated protocol in the world.
    The vulnerability of civil GPS to spoofing has serious implications 
for civil unmanned aerial vehicles (UAVs), as was recently illustrated 
by a dramatic remote hijacking of a UAV at White Sands Missile Range. 
The demonstration was conducted by the University of Texas 
Radionavigation Laboratory at the behest of the Department of Homeland 
Security (DHS). From a stand-off range of a half mile, the University 
spoofer commandeered the UAV and induced it to plummet toward the 
desert floor. The results of this demonstration will no doubt factor 
into the Federal Aviation Administration's (FAA's) plans for 
integrating UAVs into the National airspace.
    Hacking a UAV by GPS spoofing is but one expression of a larger 
problem: Insecure civil GPS technology has over the last 2 decades been 
absorbed deeply into critical systems within our National 
infrastructure. Besides UAVs, civil GPS spoofing also presents a danger 
to manned aircraft, maritime craft, communications systems, banking and 
finance institutions, and the National power grid.
    Constructing from scratch a sophisticated GPS spoofer like the one 
developed by the University of Texas is not easy. It is not within the 
capability of the average person on the street, or even the average 
Anonymous hacker. But the emerging tools of software-defined radio and 
the availability of GPS signal simulators are putting spoofers within 
reach of ordinary malefactors.
    There is no quick, easy, and cheap fix for the civil GPS spoofing 
problem. What is more, not even the most effective GPS spoofing 
defenses are fool-proof. But reasonable, cost-effective spoofing 
defenses exist which, if implemented, will make successful spoofing 
much harder.
    I recommend that for non-recreational operation in the National 
airspace civil UAVs exceeding 18 lbs be required to employ navigation 
systems that are spoof-resistant.
    More broadly, I recommend that GPS-based timing or navigation 
systems having a non-trivial role in systems designated by DHS as 
National critical infrastructure be required to be spoof-resistant.
    Finally, I recommend that the DHS commit to funding development and 
implementation of a cryptographic authentication signature in one of 
the existing or forthcoming civil GPS signals.

                             2. BACKGROUND

    The design of the Global Positioning System came together over 
Labor Day weekend in 1973. A group of hard-working engineers, mostly 
Air Force officers, decided over that weekend that the GPS satellites 
would broadcast two different types of signals, a precise military 
signal and a so-called clear access or C/A signal. The military signal 
would later be encrypted to prevent unauthorized use and imitation.
    But the clear access signal, true to its name, would be freely 
accessible to all. Detailed and accurate specifications for the clear 
access signal were later distributed to encourage its use.
    The early designers of the GPS system, for whose tireless efforts 
we are all indebted, knew the GPS was going to be valuable for 
civilians across the globe, but they never could have imagined just how 
valuable. An intentional degradation of the C/A signals called 
selective availability was discontinued by Presidential Order in 2000. 
Instantaneously, every GPS receiver across the globe went from errors 
the size of a football field to errors the size of a small room. It is 
hard to overstate the impact of this improvement in accuracy. Before 
selective availability was turned off, there were no in-car navigation 
systems giving turn-by-turn directions, because back then civilian GPS 
couldn't tell you what block you were on, let alone what street. For 
geolocation, accuracy matters.
    Things have only improved over the last decade. With more ground 
stations, better algorithms, more open-access signals, and better 
receivers, civil GPS--the family of open-access signals to which all 
civilians have access--can now tell you not only what street you are 
on, but what part of the street.
    The accuracy, transparency, and low cost of civil GPS have enabled 
a firestorm of innovation. After 2000, any engineer designing a system 
for which accurate timing or location was important found GPS to be an 
almost irresistible option. As a result, civil GPS receivers are built 
deeply into our National infrastructure: From our smartphones to our 
cars to the internet to the power grid to our banking and finance 
institutions. Some call GPS the invisible utility: It works silently, 
and for the most part perfectly reliably, in devices all around us--
devices of which we are scarcely aware.
    Nearly 40 years after the GPS design was put together we can look 
back and marvel at its designers' foresight. The GPS that we all depend 
on today is nearly identical to their original design. But with 40 
years of hindsight, many of us in the GPS community, if we could be 
transported back to those seminal meetings over Labor Day weekend in 
1973, would suggest that one crucial change be made to the clear access 
signal.
    The problem is that the same transparency and predictability that 
have made civil GPS signals so wildly popular all across the globe give 
rise to a dangerous vulnerability. Transparency and predictability make 
the civil GPS signals easy to imitate--to counterfeit. The fact is that 
civil GPS signals are like Monopoly money: They have a detailed 
structure but no built-in protection against forgery.
    That civil GPS is so easy to counterfeit, or ``spoof,'' would not 
be a problem if GPS were not so popular, its use so widespread. But 
such is not the case.
    For the past few years my students and I at the University of Texas 
Radionavigation Laboratory, and several others in the GPS community, 
have had two goals with regard to GPS security. First, we aim to alert 
GPS device manufacturers, the public, and public officials that civil 
GPS--notwithstanding its spectacular utility and historical 
reliability--is inherently insecure and shouldn't be trusted blindly. 
Second, we endeavor to develop practical and effective techniques to 
fix the problem, to make GPS secure and trustworthy for civilian users. 
The remainder of this statement is a brief summary of our major 
findings and recommendations to date.

         3. EXAMPLE CASE: HIJACKING A UAV BY CIVIL GPS SPOOFING

    What implications follow from the lack of authentication on civil 
GPS signals? Consider unmanned aerial vehicles (UAVs). In February 2012 
the U.S. Congress passed the FAA Modernization and Reform Act, which 
gives the FAA until 2015 to develop a ``comprehensive plan for safely 
accelerating the integration of civil UAVs into the National airspace 
system.'' The Modernization Act has spurred a great deal of discussion. 
Hobbyists, public safety officials, academics, UAV manufacturers, and 
many in the general public envision myriad beneficial applications of 
civil UAVs. Others, less sanguine, point out that UAVs threaten to 
invade our privacy. Still others question whether UAVs can be 
integrated safely into the National airspace.
    The connection between civil UAVs and civil GPS is straightforward: 
The vast majority of civil UAVs depend on civil GPS for navigation. It 
is true that the navigation sensor suite of a typical civil UAV also 
includes inertial sensors (accelerometers and rate sensors), 
magnetometers, altimeters, and in some cases a camera; even so, GPS is 
fundamental to the sensor suite because, unlike the other navigation 
sensors, it works in all weather conditions and does not drift.
    Does the dependence of UAVs on civil GPS make them susceptible to 
hijacking via GPS spoofing? In February 2012 the University of Texas 
Radionavigation Laboratory posed this question to the DHS. DHS 
considered the question seriously. At the time, DHS was moving forward 
with plans to offer universities and other interested civilian groups a 
chance to test their proposed techniques for addressing civil GPS 
vulnerabilities in a series of realistic over-the-air tests at White 
Sands Missile Range. My students and I proposed to DHS an experiment 
whereby we would attempt to commandeer a civilian UAV by GPS spoofing. 
DHS agreed to the test on the condition that the University of Texas 
furnish all the necessary manpower and equipment--including the target 
UAV.
    Our group selected a Hornet Mini from Adaptive Flight as the target 
UAV. This sophisticated $80k rotorcraft, used by law enforcement, has a 
navigation system built around an extended Kalman filter that draws 
measurements from an altimeter, a magnetometer, an inertial measurement 
unit, and a civil L1 C/A GPS receiver. The Hornet Mini's sensor suite 
and flight control system are representative of those in much larger 
commercial UAVs.
    It is important to note that the Hornet Mini's GPS receiver was 
equipped with a standard technology called Receiver Autonomous 
Integrity Monitoring (RAIM), which is designed to identify and discard 
GPS signals that appear to be outliers. Standard RAIM is ineffective 
against GPS spoofing because a spoofer generates a fully self-
consistent ensemble of spoofing signals; there are no outliers.
    After a dry run on the University of Texas campus, our research 
group traveled to White Sands for the test of record. The test was 
conducted as follows: A sophisticated civil GPS spoofer developed in 
our laboratory was placed on a hilltop about a half mile from the 
designated test site where the UAV would be flying. The UAV was 
commanded by its ground control operator to hover 50 feet above the 
ground at the test site. On command, our spoofer began transmitting 
weak counterfeit GPS signals toward the hovering UAV, achieving meter-
level alignment with the counterpart authentic signals at the location 
of the UAV's GPS antenna. The spoofer then rapidly increased its 
counterfeit signal power, bringing the UAV under its control. By 
inducing a false upward drift in the UAV's perceived location, the 
spoofer fooled the UAV's flight controller into commanding a dive. At 
about 10 feet above ground level a human safety pilot assumed manual 
control of the UAV to prevent it from crashing.
    Between this and other tests, the spoofer demonstrated short-term 
three-dimensional control of the UAV. Thus, we conclude that it is 
indeed possible to hijack a civil UAV--in this case, a fairly 
sophisticated one--by civil GPS spoofing.

                         4. THE LARGER PROBLEM

    The vulnerability of civil UAVs to GPS spoofing is but one 
expression of a more fundamental problem: the insecurity of civil GPS 
signals. If a UAV can be hijacked by GPS spoofing, what else could go 
wrong within our GPS-dependent National infrastructure? In what 
follows, the potential vulnerabilities of our National transportation, 
communications, banking and finance, and energy distribution 
infrastructure are discussed briefly.

4.1 Transportation
    In 2001, the U.S. Department of Transportation issued a report 
assessing the vulnerability of the U.S. transportation infrastructure 
to disruption of civil GPS.\1\ Known as the Volpe report, it 
highlighted the threats posed by civil GPS spoofing attacks. At the 
time, the open literature contained little research on such attacks and 
possible countermeasures. Accordingly, the report recommended further 
study of GPS spoofing and development of civil GPS anti-spoofing 
techniques. Unfortunately, despite a flurry of GPS security research 
over the past decade, brought about in part by the Volpe report, no 
dedicated spoofing defenses have been built into any commercially-
available GPS receivers so far as I am aware. This means that the GPS 
receivers used in commercial and general aviation aircraft, in maritime 
vessels, and in surface vehicle transport are vulnerable to GPS 
spoofing just as was the GPS receiver on the UAV tested at White Sands.
---------------------------------------------------------------------------
    \1\ Anon., ``Vulnerability assessment of the transportation 
infrastructure relying on the Global Positioning System,'' tech. rep., 
John A. Volpe National Transportation Systems Center, 2001.
---------------------------------------------------------------------------
            4.1.1 Manned Aviation
    Manned civil aircraft increasingly depend on civil GPS for 
navigation. Nonetheless, they are currently somewhat less vulnerable 
than civil UAVs to GPS spoofing for two reasons:

    (1) All commercial aircraft and many general aviation aircraft 
        continue to operate legacy VOR/DME navigation equipment along 
        with newer GPS equipment. Because of their higher power, VOR/
        DME signals are less vulnerable to spoofing than GPS signals. 
        Legacy VOR/DME equipment can provide pilots a valuable cross-
        check against which to compare GPS-produced position and 
        velocity data.

    (2) Manned aircraft are typically equipped with higher-quality 
        (lower drift) inertial measurement units (IMUs) than those used 
        in small UAVs, which means that the GPS navigation solution can 
        be more effectively cross-checked against the IMU. Whereas a 
        spoofer might be able to induce a fictitious acceleration of 
        0.5 m/s\2\ in a small UAV without being detected in a cross-
        check against the (relatively poor) IMU, an attack against a 
        larger craft with a higher-quality IMU might be limited to an 
        induced acceleration of 0.1 m/s\2\. However, it should be noted 
        that the benefit of a higher-quality IMU is only realized if 
        the navigation systems is designed to be on the lookout for 
        suspicious accelerations in the GPS solution.

    Despite these advantages, GPS spoofing remains a significant risk 
to civil manned aircraft. When the aircraft's autopilot is engaged, the 
course it commands depends primarily on the aircraft's IMU. However, 
GPS plays a role in estimating the bias drift in each of the IMU's 
axes. Thus, neither the autopilot nor the human pilot(s) may notice a 
spoofer-induced navigation error that builds up gradually over time. 
Pilots are trained to continually monitor the autopilot for errant 
behavior, and disengage it if necessary, but they rely on anomaly 
alerts provided by the aircraft's navigation system itself. I have 
reason to believe that the resilience of commercial aircraft navigation 
systems to civil GPS spoofing has not been sufficiently tested. Roll-
out of the FAA's NextGen air traffic control system, which will further 
increase the reliance of commercial and general aviation on civil GPS, 
would seem to demand even greater scrutiny as regards vulnerability to 
GPS spoofing.

            4.1.2 Maritime
    Many of the adverse effects of GPS spoofing in maritime 
applications follow the pattern of those in aviation applications. As 
with aircraft, marine craft rely on civil GPS to estimate the bias 
drift in their inertial sensors. This reliance opens up an indirect 
vulnerability to GPS spoofing. Marine vessels may in fact be more 
vulnerable than aircraft to spoofing because the discontinuation of 
LORAN in the United States 2 years ago left them with fewer 
radionavigation backups to GPS. It should be noted that differential 
GPS, often used for improved navigation accuracy on marine craft, is 
not a defense against GPS spoofing.
    Many marine craft autopilot systems could likely be induced by GPS 
spoofing to veer gradually off course, which could be especially 
dangerous in constricted waterways. And whereas formal trials have been 
conducted to evaluate the effect of GPS jamming on commercial marine 
craft (with alarming results--see the tests conducted in the North Sea 
by the U.K. Lighthouse Authority), to my knowledge no such tests have 
been performed to evaluate the effects of GPS spoofing.

            4.1.3 Surface Transportation
    The reliance of surface transportation on civil GPS is collectively 
greater than that of aviation or maritime transportation, but the 
nature of the reliance is different, being attached to far less 
worrisome consequences. A spoofing attack against an automobile could 
induce the in-car navigation system to display a false position, which 
may confuse the driver, but would be unlikely to result in an accident. 
In the case of autonomous vehicles such as the Google autonomous car, a 
substantial suspicion of GPS is built into the navigation system. GPS 
measurements are used to estimate the biases in inertial sensors, but 
LIDAR, RADAR, and optical sensors are also used for this purpose and 
their measurements are constantly cross-checked against GPS. The 
robustness of the Google autonomous car to loss of GPS or GPS spoofing 
is a good model for all autonomous systems in their use of GPS.
    Rail transport employing so-called Positive Train Control (PTC) 
systems, which automatically locate a train on a digital map in the on-
board and control center computers, may be susceptible to civil GPS 
spoofing. A GPS spoofing attack mounted against a PTC-enabled train at 
a railway switch may be able to deceive the train operator and the 
control center monitors into thinking that the train is moving along a 
different track.

4.2 Communications
    Many communications networks, including cellular networks and the 
internet, rely on civil GPS for precise timing. The discussion here 
will focus on cellular networks because these have stringent 
synchronization requirements.
    Code division multiple access (CDMA) cell-phone towers rely on GPS 
timing for tower-to-tower synchronization. Synchronization prevents 
towers from interfering with one another and enables call hand-off 
between towers. If a particular tower's time estimate deviates more 
than 10 ms from GPS time, hand-off to and from that tower is disrupted. 
In laboratory tests conducted at the University of Texas we have 
demonstrated that a spoofer can induce a 10-ms time deviation in less 
than 30 minutes when acting against a typical CDMA tower setup. A 
spoofer, or spoofer network, could also cause multiple neighboring 
towers to interfere with one another. This is possible because CDMA 
cell-phone towers all employ the same spreading code, distinguishing 
themselves only by the phasing (that is, the relative time offset) of 
their spreading codes. Furthermore, it appears that a spoofer could 
impair CDMA-based E911 user-location.

4.3 Banking and Finance
    All global financial exchanges, including the New York Stock 
Exchange (NYSE) and the Nasdaq, have gone digital. Large data centers 
hold the exchanges' matching engines, the modern-day equivalent of the 
historic trading floor, in racks of interconnected servers. The DHS 
considers these data centers critical National infrastructure. Private 
security personnel, tall fences, and the best network security money 
can buy protect the integrity of the thousands of high-stakes trades 
executed every second within these data centers.
    But there is one input port that the network firewalls leave 
entirely unprotected. An unassuming set of antennas on the roof of 
these data centers carry unsecured civil GPS signals directly into the 
core of the matching engine network. Slaved to a once-per-second 
synchronization pulse from a GPS-disciplined clock, the individual 
servers in the network apply time stamps to the trades they execute. A 
decade ago, a tenth of a second was an acceptable time stamp 
resolution. High-frequency traders now demand nanoseconds.
    I believe that all major financial exchanges across the globe are 
aware of the GPS spoofing threat. I have been in indirect contact with 
network service managers at the NYSE, BATS, and London exchanges; they 
have each taken precautions against GPS spoofing. For example, system 
time at the NYSE is ultimately traced to civil GPS, but a spoofing 
attack that shifted the apparent GPS time by more than 0.05 nanoseconds 
per second would fail a timing consistency check against redundant 
local atomic clocks. This would limit a spoofer to shifting the 
exchange's system time by less than 5 microseconds per day, making the 
NYSE system time an attractive target only for the most patient of 
spoofers.
    High-frequency traders whose servers are co-located with the 
matching engines at major exchanges may be more vulnerable to GPS 
spoofing. In the NYSE and some other exchanges, these co-located 
customers are offered either a timing feed from the exchange's system 
time or a direct feed from GPS antennas on the roof. Many co-located 
customers, distrustful of the exchange's system time, opt for the 
direct GPS feed. In laboratory tests conducted at the University of 
Texas we have shown that a popular model of GPS-disciplined oscillator 
used by these co-located customers is incapable of detecting GPS 
spoofing attacks that shift timing by less than 100 nanoseconds per 
second--or 2,000 times faster than the maximum undetectable rate when 
targeting NYSE system time.
    Why could this be a problem? Automated transactions initiated by 
co-located servers account for 50 to 70 percent of the trading volume 
on major exchanges. The high-frequency traders who own the servers do 
not like inexplicable market behavior, and unlike old-fashioned traders 
who are obligated to stay in the market no matter its behavior, high-
frequency traders can pull the plug at any moment. In the aftermath of 
the May 6, 2010 flash crash, it was revealed that automatic data 
integrity checks in trading algorithms were configured to trigger on 
unusual latency in the exchanges data feeds. In other words, if 
transaction time stamps do not look right, algorithmic traders flee the 
marketplace. A spoofing attack that aggressively manipulated the timing 
in a large number of co-located servers could therefore cause a partial 
market vacuum--what traders call a loss of liquidity--with the result 
being increased price volatility and damage to market confidence.

4.4 Energy Distribution
    In a recent study, our laboratory examined the vulnerability of a 
particular type of smart grid equipment, the phasor measurement unit 
(PMU), to a timing attack.\2\ If a spoofer manipulates a PMU's time 
stamps, it could cause spurious variations in measured phase angles. 
These variations could distort power flow or stability estimates in 
such a way that grid operators or automatic response systems would take 
incorrect or unnecessary control actions, including powering up or 
shutting down generators, potentially causing blackouts or damage to 
power-grid equipment. Under normal circumstances, a changing separation 
in the phase angle between two PMUs indicates changes in power flow 
between the regions measured by each PMU. Thus, a spoofing attack could 
create the false indications of power flow across the grid.
---------------------------------------------------------------------------
    \2\ D. Shepard, T. Humphreys, and A. Fansler, ``Evaluation of the 
Vulnerability of Phasor Measurement Units to GPS Spoofing,'' in Sixth 
Annual IFIP WG 11.10 International Conference on Critical 
Infrastructure Protection, (Washington, DC), 2012.
---------------------------------------------------------------------------
    Under controlled experimental conditions at a Department of Energy 
National laboratory, we demonstrated last December that a GPS-spoofer-
induced timing offset does indeed create a proportional offset in the 
voltage phase angle measured by a PMU. In a brief examination of the 
consequences of such an offset, we found that future smart grids will 
likely employ advanced PMUs in automated closed-loop grid control \3\ 
and that such closed-loop control has already been implemented in at 
least one network.\4\ We have reason to believe that timing 
manipulation would cause generators to trip in this network and in 
future automated closed-loop grid control networks.\2\
---------------------------------------------------------------------------
    \3\ J. Giri, D. Sun, and R. Avila-Rosales, ``Wanted: A more 
intelligent grid,'' IEEE Power & Energy, pp. 34-40, April 2009.
    \4\ E.O. Schweitzer, A. Guzman, H.J. Altuve, and D.A. Tziouvaras, 
``Real-time synchrophasor appliactions for wide-area protection, 
control, and monitoring,'' tech. rep., Schweitzer Eng. Laboratories, 
2009.
---------------------------------------------------------------------------
                         5. assessing the risk
    A thorough assessment of the spoofing risk would investigate two 
factors: (1) The probability, and (2) the consequences of an attack. 
The foregoing section presented various consequences, though certainly 
not a thorough listing, related to critical National infrastructure. 
The probability of a spoofing attack is a function of the incentives 
that would prompt an attack and the difficulty of mounting one. As an 
investigation of incentives is necessarily subjective and, in any case, 
outside my expertise, I will leave this to others, focusing here on 
assessing the difficulty of mounting a spoofing attack.
5.1 What Does it Take to Build a Spoofer?
    Constructing from scratch a sophisticated GPS spoofer like the one 
developed by the University of Texas is not easy. It is not within the 
capability of the average person on the street, or even the average 
Anonymous hacker. It is orders of magnitude harder than developing a 
GPS jammer. Nonetheless, the trend toward software-defined GNSS 
receivers for research and development, where receiver functionality is 
defined entirely in software downstream of the A/D converter, has, in 
recent years, significantly lowered the bar to developing a spoofer.

            5.1.1 Cost of Hardware
    The University of Texas spoofer was constructed almost entirely 
from commercial off-the-shelf components. The total hardware cost was 
between $1k and $2k. Universal software radio platforms that rival the 
capability of our hardware system can be purchased for less than $2k.

            5.1.2 Required Skill and Effort
    As a point of reference, I estimate that there are more than 100 
researchers in universities across the globe who are well-enough-versed 
in software-defined GPS that they could develop a sophisticated spoofer 
from scratch with a year of dedicated effort. Spoofer development is 
likely outside the capability of organized crime or terrorist 
organizations without access to advanced training, but is well within 
the capability of near-peer nation states.

5.2 Can One Buy a Spoofer?
    Unlike GPS jammers, marketed by overseas firms as ``personal 
privacy devices'' and sold by the thousands on the internet, 
sophisticated GPS spoofers such as the one developed by the University 
of Texas Radionavigation Laboratory cannot currently be obtained in any 
market of which I am aware. However, a GPS signal simulator, a piece of 
test equipment that is readily obtainable from various vendors, can 
serve as an unsophisticated yet effective GPS spoofer. A sophisticated 
spoofer is only different from a GPS signal simulator in the following 
respects:
    (1) It is capable of predicting, with nearly 100% accuracy, the 
        navigation data sequence that modulates the GPS signals--not 
        just the implied orbital and clock data, but the exact 
        sequence. This same effect can be realized on a standard GPS 
        signal simulator only by developing a secondary system that 
        generates blocks of predicted navigation data and uploads these 
        to the signal simulator.
    (2) A sophisticated spoofer is capable of precisely aligning 
        (within a few meters equivalent) the codes in its counterfeit 
        signals with the corresponding codes of the authentic signals 
        at the location of the target receiver's antenna. The 
        University of Texas spoofer is capable of achieving this 
        alignment from a standoff distance of several kilometers. An 
        off-the-shelf GPS signal simulator would have to be 
        substantially modified to achieve such alignment.
    These differences are only important if one wishes to carry out a 
stealthy spoofing attack, that is, one that effects a near-seamless 
transition from authentic to counterfeit signals and is therefore 
difficult to detect by simple timing and signal checks within the 
target system. But this is hardly necessary for a successful attack 
against most targets at present, given that few GPS-based systems 
perform even these rudimentary checks. Indeed, a vulnerability 
assessment team from Los Alamos National Lab convincingly demonstrated 
over a decade ago that an off-the-shelf GPS signal simulator is 
sufficient to mount a spoofing attack,\5\ and spoofing defenses in 
commercial receivers have hardly progressed since that time.
---------------------------------------------------------------------------
    \5\ J.S. Warner and R.G. Johnston, ``A simple demonstration that 
the GPS is vulnerable to spoofing,'' The Journal of Security 
Administration, vol. 25, pp. 19-28, 2002.
---------------------------------------------------------------------------
    High-end commercial GPS signal simulators cost several hundred 
thousand dollars, but these can be leased for a few hundred dollars on 
a weekly basis. Moreover, within the past few years much less expensive 
(less than $40k) single-frequency GPS signal simulators have emerged on 
the market. GPS signal record-and-playback devices, which can be 
purchased for a few thousand dollars, can also be used effectively as 
unsophisticated spoofers.

5.3 Range and Required Knowledge of Target
    Assuming one could build or otherwise obtain a spoofing device, a 
successful spoofing attack further requires proximity to and knowledge 
of the target system.

            5.3.1 At What Standoff Range Can a Spoofer Be Effective?
    The University of Texas Radionavigation Laboratory demonstrated a 
successful spoofing attack from a 0.62-km standoff range in our over-
the-air test at White Sands. Our spoofer's maximum standoff range is 
fundamentally limited only by the spoofer's need to track all or nearly 
all of the authentic GPS signals seen by the target receiver, which 
implies an operational range of several tens of kilometers. A spoofer's 
broadcast power requirement, even at a stand-off range of several 
kilometers, is quite modest because the authentic GPS signals are 
themselves extremely weak.

            5.3.2 What Must the Spoofer Know About the Target to Be 
                    Effective?
    For a near-seamless transition from authentic to counterfeit 
signals, and, in the case of UAV spoofing, for fine-grained control of 
the UAV after capture, a spoofer must be furnished with real-time 
estimates of the target system's location and velocity accurate to 
within a few meters and meters per second, respectively. This 
represents a substantial challenge for a would-be spoofer. In the case 
of UAV spoofing it implies that the UAV is being accurately tracked by 
a RADAR or LIDAR system. However, if a spoofer operator's goal is 
simply to confuse the target's navigation or timing system, and the 
operator is unconcerned about possible detection, then knowledge of the 
target's position and velocity is unnecessary.

6. fixing the problem: what can be done to defend against gps spoofing?
    There is no quick, easy, and cheap fix for the civil GPS spoofing 
problem. Moreover, not even the most effective GPS spoofing defenses 
are foolproof. In contrast to message authentication, such as is used 
to sign data transmitted across the internet, the security of GPS 
signal authentication is much weaker and demands a probabilistic model. 
Nonetheless, there are many possible remedies to the spoofing problem 
that, while not foolproof, would vastly improve civil GPS security. For 
discussion, it is convenient to categorize spoofing defenses along two 
axes: (1) Cryptographic or non-cryptographic, and (2) networked or 
stand-alone. A cryptographic spoofing defense relies on secret keys 
that encrypt or digitally sign components of the broadcast signals, 
whereas a non-cryptographic defense does not depend on encryption or 
digital signatures. A networked defense requires a (possibly 
intermittent) link to a communications network whereas a stand-alone 
defense operates in isolation of a network.
    Our laboratory has been engaged in developing civil GPS spoofing 
defenses over the past several years. In addition, a number of other 
researchers have proposed civil GPS spoofing defenses in the open 
literature or have otherwise disclosed their ideas to me. In what 
follows, I examine each of the proposed techniques of which I am aware. 
More promising techniques approach the ideal spoofing defense, which: 
(1) Would reliably detect a sophisticated spoofing attack such as the 
one conducted at White Sands with a low probability of false alarm, (2) 
could be implemented in the short term, (3) would not significantly 
increase the cost of a GPS-based navigation system, and (4) would be 
applicable to a broad range of GPS-dependent systems.
    It should be noted at the outset that a military-style spoofing 
defense, in which the transmitted signals are fully encrypted, is not 
appropriate for the civilian sector as it denies free and open access. 
All techniques discussed below permit signal authentication without 
denying access. Likewise, I do not believe that widespread civilian use 
of military-grade SAASM receivers is practical or likely. The 
constraints on manufacture of SAASM receivers makes them significantly 
more bulky and expensive than standard civil GPS receivers. 
Furthermore, even though SAASM receivers can be operated in an 
unclassified setting and can be re-keyed with unclassified ``black'' 
keys, use of SAASM receivers is currently restricted to military 
personnel and to other select and authorized end-users, and initial 
keying logistics would likely present a headache for civil users. 
Therefore, civilian use of SAASM-type receivers is not considered here 
as a viable option.

6.1 Jamming-to-Noise Sensing Defense
    Perhaps the simplest and most readily-implementable defense against 
GPS spoofing is to monitor the total received power near the GPS 
band(s) of interest (e.g., GPS L1). This can be done with a jamming-to-
noise (J/N) sensor within the radio frequency (RF) front-end of a GPS 
receiver. The presence of in-band spoofing signals tends to increase 
the total in-band received power. In the case of the White Sands 
demonstration, to ensure a clean capture of the UAV GPS receiver, the 
spoofing signal ensemble was configured to be at least 10 times as 
powerful as the authentic signal ensemble. The presence of these 
spoofing signals would have been readily detectable with a J/N sensor.
    This is a stand-alone non-cryptographic defense.
            6.1.1 Benefits
    (1) Simple and inexpensive. At least one mass-market GPS receiver, 
        the uBlox GPS.G6-SW-10018, already provides a crude J/N output 
        indicator.

    (2) Immediately implementable.

    (3) Forces spoofer to maintain received signal power below 
        threshold.
            6.1.2 Drawbacks
    (1) For threshold corresponding to a reasonable false alarm rate, a 
        J/N sensor will not typically detect a spoofing attack in which 
        the spoofed signals are only slightly more powerful than their 
        authentic counterparts.
6.2 Defense Based on SSSC or NMA on WAAS Signals
    The SSSC- or NMA-based defenses described below could be 
implemented on the geostationary wide-area augmentation system (WAAS) 
satellites even if they are never implemented on the GPS satellites 
themselves.
            6.2.1 Benefits
    (1) WAAS is a civil program and thus could be seen as a proper 
        avenue for implementation of civil signal authentication.

    (2) WAAS signals are generated on the ground, not on the satellite, 
        so an SSSC or NMA overlay is readily implementable.

    (3) A single WAAS-authenticated WAAS signal would be sufficient to 
        secure pre-surveyed timing receivers.
            6.2.2 Drawbacks
    (1) Implementation of SSSC or NMA on WAAS satellites alone would 
        only provide users with one, or possibly two, authenticated GPS 
        signals. While this would constrain a spoofer significantly, it 
        would not be sufficient to authenticate a full three-
        dimensional navigation solution.

6.3 Multi-System Multi-Frequency Defense
    The GPS receiver on the UAV that was spoofed in the White Sands 
demonstration was a simple single-frequency GPS L1 C/A receiver. The 
UAV's navigation system could immediately be made much more secure by 
incorporating a multi-system or multi-frequency receiver that performs 
proper cross-checks among separate signal ensembles. The improvement in 
security is one of degree, not of kind because the new signals 
accessible with such a receiver would not necessarily have any better 
inherent security than the GPS L1 C/A signals. Nonetheless, the 
improvement in security can be significant because, from a spoofer's 
perspective, it is much more challenging to simultaneously spoof 
signals at multiple frequencies and from multiple systems than to spoof 
the popular single-frequency single-system GPS L1 
C/A signals.
    Satellite navigation systems other than GPS include the Russian 
GLONASS system (fully operational), the European Galileo system 
(undergoing in-orbit validation of early spacecraft; may be operational 
by 2019), and the Chinese Compass system (global system in preliminary 
test phase). Small, low-power, inexpensive GPS + GLONASS receivers are 
now available off-the-shelf. These appear to be an excellent option for 
immediately improving navigation security in existing systems.
    As a result of GPS modernization, new civil GPS signals are now 
being broadcast at the L2 and L5 frequencies in addition to the legacy 
civil signal on L1. These signals are not yet modulated with proper 
navigation data, but they can nonetheless already be used for 
consistency checks against the GPS L1 C/A signals. Similarly, the 
Galileo system will offer open-access signals at three separate 
frequencies. Off-the-shelf multi-frequency receivers are currently 
available, but these are currently several times more expensive than 
single-frequency GPS receivers or GPS + GLONASS receivers.
    The multi-system multi-frequency defense is non-cryptographic and 
stand-alone.
            6.3.1 Benefits
    (1) Small, low-power, inexpensive GPS + GALILEO receivers are 
        available today.

    (2) Increases the difficulty of mounting a spoofing attack by 
        forcing a would-be spoofer to generate other signal ensembles 
        besides GPS L1 C/A.
            6.3.2 Drawbacks
    (1) Difficulty of mounting a spoofing attack only increases 
        linearly with the number of new signal ensembles.

    (2) Multi-system, multi-frequency capability must be combined with 
        supervisory software that performs proper consistency checks 
        among observables from all signals. Currently available multi-
        system, multi-frequency receivers do not perform this 
        supervisory function.

    (3) Multi-frequency receivers will likely remain significantly more 
        expensive than legacy single-frequency GPS L1 C/A receivers.

6.4 Single-Antenna Defense
    A stand-alone non-cryptographic single-antenna spoofing defense 
developed by Cornell University was tested against the University of 
Texas spoofer during the June White Sands trials. The technique is 
still under development but initial results indicate that it offers 
reliable spoofing detection with a low probability of false alarm. 
Without false alarms, it successfully detected each spoofing trial in 
which it was invoked at White Sands. The Cornell single-antenna defense 
is an extension of the signal spatial correlation technique developed 
by the University of Calgary PLAN group.\6\
---------------------------------------------------------------------------
    \6\ J. Nielsen, A. Broumandan, and G. LaChapelle, ``Method and 
system for detecting GNSS spoofing signals,'' May 31 2011. US Patent 
7,952,519.
---------------------------------------------------------------------------
            6.4.1 Benefits
    (1) Rapid (sub-second), reliable spoofing detection with a low 
        probability of false alarm.

    (2) Stand-alone, compact.
            6.4.2 Drawbacks
    (1) Specialized receiver will likely be several times more 
        expensive than current GPS L1 C/A receivers.

    (2) Uncertain availability.

6.5 Defense Based on Spread-Spectrum Security Codes on L1C
    In 2003, Logan Scott proposed a cryptographic anti-spoofing 
technique based on spread spectrum security codes (SSSCs).\7\ The most 
recent proposed version of this technique targets the L1C signal, which 
will be broadcast on GPS Block III satellites. Logan has briefed his 
proposal to the GPS Independent Review Team and the GPS Directorate is 
aware of it.
---------------------------------------------------------------------------
    \7\ L. Scott, ``Anti-spoofing and authenticated signal 
architectures for civil navigation systems,'' in Proceedings of the ION 
GNSS Meeting, (Portland, Oregon), pp. 1542-1552, Institute of 
Navigation, 2003.
---------------------------------------------------------------------------
            6.5.1 Benefits
    (1) SSSC are an example of a high-rate security code. As shown in 
        [footnote 8],\8\ such codes offer an excellent defense against 
        spoofing.
---------------------------------------------------------------------------
    \8\ T.E. Humphreys, ``Detection strategy for cryptographic GNSS 
anti-spoofing,'' IEEE Transactions on Aerospace and Electronic Systems, 
2011 to be published; available at http://radionavlab.ae.utexas.edu/
detstrat.

    (2) Because the signal modification is targeted to L1C, whose 
        center frequency coincides with that of the legacy GPS L1 C/A 
        signal, even single-frequency receivers would have access to an 
---------------------------------------------------------------------------
        authenticated signal.

    (3) The SSSC defense would offer global civil GPS authentication 
        for all users of GPS.
            6.5.2 Drawbacks
    (1) It appears that the first 8 Block III satellites are under 
        design lockdown. There may still be time to modify the 
        remaining satellites to incorporate hardware to support SSSC, 
        but time is quickly running out.

    (2) Even if funds materialized to implement Scott's SSSC proposal, 
        the formal design and validation process would take several 
        years.

    (3) In stand-alone operation, the keys required to verify each SSSC 
        would be released up to 5 minutes after the SSSC was 
        transmitted. For 10 satellites in view, this equates to more 
        than 30 seconds between authentication events on any signal. 
        This would be far too long for use in aviation, where integrity 
        alerts within 2 seconds of an event are required. The time-to-
        authentication could be reduced to less than 2 seconds in a 
        networked architecture. For example, the keys could be sent 
        over a UAVs command-and-control link. But if the command-and-
        control link were somehow compromised, then short-horizon 
        authentication would again become impossible.
6.6 Defense Based on Navigation Message Authentication on L1C, L2C, or 
        L5
    A spoofing defense based on navigation message authentication (NMA) 
embeds public-key digital signatures into the flexible GPS civil 
navigation (CNAV) message, which offers a convenient conveyance for 
such signatures. A detailed proposal for NMA-based authentication is 
given in [footnote 9].\9\
---------------------------------------------------------------------------
    \9\ K. Wesson, M. Rothlisberger, and T.E. Humphreys, ``Practical 
cryptographic civil GPS signal authentication,'' NAVIGATION, Journal of 
the Institute of Navigation, 2012 to be published; available at http://
radionavlab.ae.utexas.edu/nma.
---------------------------------------------------------------------------
            6.6.1 Benefits
    (1) NMA-based authentication is easier to implement than SSSC 
        because the CNAV format is extensible by design so that new 
        messages can be defined within the framework of the GPS 
        Interference Specification (IS). The current GPS IS defines 
        only 15 of 64 CNAV messages, reserving the undefined 49 CNAV 
        messages for future use.

    (2) Could be implemented post-launch on Block IIR-M, Block II-F, 
        and Block III satellites.

    (3) Like SSSC, the NMA-based defense would offer global civil GPS 
        authentication for all users of GPS.
            6.6.2 Drawbacks
    (1) Inherently less secure than SSSC because its security codes are 
        low rate.

    (2) As with SSSC, in stand-alone operation there is an up-to-5-
        minute delay between authentication events for any particular 
        signal. The discussion in Drawback 3 of the SSSC technique 
        applies here in full.
6.7 Correlation Profile Anomaly Defense
    This stand-alone non-cryptographic defense relies on the difficulty 
of: (1) Suppressing the true GPS signals during a spoofing attack, and 
(2) exactly duplicating the correlation profile of the authentic GPS 
signals. A preliminary description of this defense is given in 
[footnote 10].\10\
---------------------------------------------------------------------------
    \10\ K. Wesson, D. Shepard, J. Bhatti, and T.E. Humphreys, ``An 
evaluation of the vestigial signal defense for civil GPS anti-
spoofing,'' in Proceedings of the ION GNSS Meeting, (Portland, Oregon), 
Institute of Navigation, 2011.
---------------------------------------------------------------------------
            6.7.1 Benefits
    (1) Immediately implementable, low-cost defense.

    (2) No additional hardware required.

    (3) Effective for stationary GPS receivers such as are used for 
        timing applications.
            6.7.2 Drawbacks
    (1) Can get confused by multipath when implemented on moving 
        receivers.
6.8 Multi-Antenna Defense
    This stand-alone non-cryptographic defense is based on the premise 
that a spoofer will have great difficulty in mimicking the relative 
carrier phase of the authentic signals as seen by two or more 
spatially-separated antennas. The technique is detailed in [footnote 
11].\11\
---------------------------------------------------------------------------
    \11\ P.Y. Montgomery, T.E. Humphreys, and B.M. Ledvina, ``A multi-
antenna defense: Receiver-autonomous GPS spoofing detection,'' Inside 
GNSS, vol. 4, pp. 40-46, April 2009.
---------------------------------------------------------------------------
            6.8.1 Benefits
    (1) Extremely effective spoofing defense when combined with 
        physical security of the antenna array.

    (2) Immediately implementable.
            6.8.2 Drawbacks
    (1) Additional antenna(s) and RF front-ends required add cost and 
        weight to the defended receiver.

6.9 Defense Based on Cross-Correlation with Military Signals
    This networked cryptographic defense correlates the unknown 
encrypted military P(Y) code between two civil GPS receivers, 
exploiting known carrier-phase and code-phase relationships. It is 
similar to the dual-frequency codeless and semicodeless techniques that 
civil GPS receivers apply to track the P(Y) code on L2. Originally 
developed by researchers at Stanford University, the technique has been 
refined and tested by researchers at Cornell University and the 
University of Texas.\12\
---------------------------------------------------------------------------
    \12\ M. Psiaki, B. O'Hanlon, J. Bhatti, D. Shepard, and T. 
Humphreys, ``GPS spoofing detection via dual-receiver correlation of 
military signals,'' IEEE Transactions on Aerospace and Electronic 
Systems, 2012 submitted for review; available at http://
web.mae.cornell.edu/psiaki/.
---------------------------------------------------------------------------
            6.9.1 Benefits
    (1) Strong defense.

    (2) Immediately implementable.

    (3) Less than 2-second time to detection.
            6.9.2 Drawbacks
    (1) Requires a persistent network connection.

    (2) Computationally expensive.
                           7. recommendations
    (1) I recommend that for non-recreational operation in the National 
        airspace, civil unmanned aerial vehicles exceeding 18 lbs be 
        required to employ navigation systems that are spoof-resistant. 
        Spoof resistance will be defined through a series of four 
        canned attack scenarios that can be recreated in a laboratory 
        setting. A navigation system is declared spoof resistant if, 
        for each attack scenario, the system is:

     (a) unaffected by the spoofing attack, or

     (b) able to detect the spoofing attack.

    (2) More broadly, I recommend that GPS-based timing or navigation 
        systems having a non-trivial role in systems designated by DHS 
        as National critical infrastructure be required to be spoof-
        resistant.

    (3) I recommend that the Department of Homeland Security commit to 
        funding, development, and implementation of a cryptographic 
        authentication signature in one of the existing or forthcoming 
        civil GPS signals. The signature should at minimum take the 
        form of a digital signature interleaved into the navigation 
        message stream of the WAAS signals. Better would be to 
        interleave the signature into the CNAV or CNAV2 GPS navigation 
        message stream. Best would be to implement the signature as a 
        spread spectrum security code interleaved into the spreading 
        code of the L1C data channel.

    Mr. McCaul. Thank you, Dr. Humphreys, and let me just state 
for the record I think they canceled the UT football practice 
to do that demonstration; is that correct?
    Mr. Humphreys. Losing football practice was the biggest 
miracle of all in my students' eyes.
    Mr. McCaul. Which is a big deal in Texas.
    Let me just follow-up on your last comment because I think 
that is probably the most--well, first of all this is 
astounding that you could hijack a UAV and bring it down, and I 
think it is an eye opener. Let me also state that military UAVs 
are encrypted. This could not be done to a military UAV such as 
the ones used on the border, but any ones used domestically I 
think have this vulnerability that we are very concerned about. 
I will ask you about that later.
    But you mentioned that you talked to the FAA and their main 
concern is security of the airways.
    Mr. Humphreys. Safety of the airways.
    Mr. McCaul. I am sorry. Safety of the airways. In terms 
of--we will designate a flight pattern and they want to make 
sure that there are no other either airplanes or UAVs that 
would interfere with that flight pattern, but their focus is 
not security.
    Mr. Humphreys. That is right.
    Mr. McCaul. So there is no Federal agency that is providing 
oversight in terms of that security aspect today; is that 
correct?
    Mr. Humphreys. As far as I know. As far as I know. I 
believe that the DHS has a role to play in that and that the 
FAA could possibly play a role there, too. But as I say, its 
culture and its expertise are not designed for that.
    Mr. McCaul. Well, I think the Government Accountability 
Office agreed for you. In their report they said that this is 
the role, when they directed the Secretary of Homeland 
Security, to the TSA, to basically provide for that security, 
assess the security risk within the country domestically and 
develop a National policy. So I think you have some company 
there in terms of agreement. I find this to be you know a bit 
of a ``no one's minding the store''-type scenario. No Federal 
agency is wanting to step up to the plate, and when you got the 
GAO saying that DHS needs to do it, I tend to agree with them 
that DHS should be stepping up to the plate, and yet they 
failed to even bring witnesses to testify here today on this 
very, very important issue when you had a terror plot just 
thwarted right at the United States Capitol less than a year 
ago using one of these UAVs.
    Getting back to--well, let me ask you this. You have 
identified a real vulnerability with these domestic UAVs. Tell 
me what would be sort of your kind of nightmare scenario in 
demonstrating what you are able to do with the UAVs if a 
terrorist or some other malicious person wanted to exploit the 
system.
    Mr. Humphreys. Okay. Well, first I should point out that 
currently I am not terribly worried about this. The UAV that we 
brought down was only about 13 pounds. Not very large. It could 
do some damage to you if it fell on you and the helicopter 
blades swing swiftly. But I am not terribly worried at present.
    What my nightmare scenario would be is looking forward 3 or 
4 years where we have now adopted the UAVs into the National 
airspace without addressing this problem, and now the problem 
is scaling up so that we have got more heavy UAVs, more capable 
UAVs and yet this particular vulnerability isn't addressed. So 
that would be my nightmare scenario. We don't fix it and it 
becomes even more an indigenous problem in the UAV navigation 
systems.
    Mr. McCaul. In fact I think in the next 2 years predictably 
we will have thousands of these things flying around 
domestically. Does that give you concern given the fact that 
there is no Federal agency really addressing the security 
aspects?
    Mr. Humphreys. The FAA did make a prediction that by 2020 
there could be 30,000 of these flying our airspace. It does 
concern me. I would like someone to take, to take ownership of 
the security component of UAVs coming into the National 
airspace.
    Mr. McCaul. Getting back to the--I mean, you have done I 
think the country a great service by identifying a 
vulnerability. You know, we talk a lot about cybersecurity, if 
you are connected to the internet you are vulnerable. What you 
have identified is if you are connected to a GPS device you are 
vulnerable.
    Can you explain to us basically how that works in the 
limited amount of time I have left and how we can fix that?
    Mr. Humphreys. Yeah, sure. Well, you are right. This is a 
bigger problem than UAVs. This is just one expression of the 
larger problem of unauthenticated civilian GPS signals The 
civilian GPS signals have been so popular, so useful that over 
the last 2 decades we have absorbed the technology deeply into 
our critical National infrastructure. So it is that even manned 
aircraft have some vulnerability to spoofing. Financial 
exchanges and the energy distribution system are increasingly 
reliant on GPS for timing. So in fact this is, this is a larger 
problem than the UAV and it all gets traced back to the 
unauthenticated civilian GPS signals.
    Mr. McCaul. I see my time is about ready to expire but let 
me just say ``thank you'' for coming up to Washington and 
testifying here today. Thank you for what I believe is a great 
service to the country. Thanks for identifying a vulnerability, 
not only technology-wise but also from a bureaucratic 
standpoint. I intend for this committee to fix this problem.
    With that, the Chairman now recognizes the Ranking Member, 
Mr. Cuellar.
    Mr. Cuellar. Thank you very much, Mr. Chairman. Doctor, 
thank you again very much and I appreciate the work that you 
have done. Let me just to repeat again, the specific spoofing 
efforts were beyond successful against the encrypted military-
grade GPS systems, is that correct?
    Mr. Humphreys. It is important to remember that. Yes.
    Mr. Cuellar. Right. So we are talking civilian UAVs.
    Mr. Humphreys. We are talking about civilian GPS and 
civilian UAVs.
    Mr. Cuellar. I would note that also my understanding is 
that for the civilian, there is different purposes, law 
enforcement, ag purposes, university.
    Mr. Humphreys. Research purposes.
    Mr. Cuellar. Research purposes. All of that.
    So for civilian purposes or commercial purposes most of 
those UAVs are going to be small, maybe 11 pounds, mini-
helicopters, and I just saw one in Laredo for law enforcement 
purposes, small ones, and they are used for specific instances 
and it is usually line of sight, is that correct, most of them?
    Mr. Humphreys. Those are the norms under which they 
currently operate.
    Mr. Cuellar. So if it is law enforcement, it would be line 
of sight, most of the time it would be there, and they are 
usually 11 pounds; or whatever the case might be?
    Mr. Humphreys. Yeah. That helps to put that into 
perspective, and I appreciate that, too.
    Mr. Cuellar. Right. The other thing is since spoofing 
focuses on GPS signals, it goes beyond unmanned aircraft which 
means that anything from cell phones to aircraft will depend, 
you can have an impact on anything dealing with GPS that 
depends on GPS for navigation. So it is not only the unmanned. 
It could be other technologies; is that correct?
    Mr. Humphreys. Entirely true. As long as they are depending 
on civilian GPS signals.
    Mr. Cuellar. Right. Exactly.
    Now, I think in a recent interview you stated that the 
closest thing we had for a foolproof way to prevent spoofing 
would be for the GPS, the--I think it is part of the Air Force 
or actually also civilian?
    Mr. Humphreys. Yes. The Directorate.
    Mr. Cuellar. Yeah, the Directorate, that is correct, from 
coming down. Can you explain how this would be done without an 
impact to existing devices that rely on GPS and explain that 
Air Force Directorate?
    Mr. Humphreys. Sure. Well, I said that is the closest thing 
to foolproof, but the truth is that it would take a long time 
for that to be planned, rolled out, and implemented. So I am 
not holding my breath for a change in the signals being 
broadcast by the GPS satellites. I would like to have it happen 
because it would be a solution that would solve the problem for 
everyone worldwide that uses the civil GPS signals. At least it 
would solve the problem to some degree. How this would not 
affect people who currently use GPS, well, we can make it 
backward-compatible. So that if you pay attention, it is like a 
watermark you see in a $20 bill. If you hold up the $20 dollar 
bill, you can see the watermark. But if you don't pay attention 
you are not bothered by its presence. The same thing happens 
with adding authentication signatures to civilian GPS.
    Mr. Cuellar. Right. Bottom line is spoofing will affect GPS 
signals which means anything that depends on GPS signals for 
navigation, right?
    Mr. Humphreys. Yeah, you can think of this UAV problem as 
but one expression of the larger problem.
    Mr. Cuellar. Right, exactly. Most of the civilian 
commercial purposes of the UAVs are going to be small, and I 
have seen different types of UAVs and most of them are, I mean 
a lot of them are going to be mini-helicopters. They are going 
to be within a specific site for that specific purpose, law 
enforcement, ag, scientific, news, whatever the case might be?
    Mr. Humphreys. That is right. Initially I anticipate that 
it will always be very specific when these get authorization. I 
don't know how it is going to look 10 or 20 years from now, 
whether we are going to have UAV highways in the sky like you 
might see in the movies. But initially it is going to be very 
specific. As far as your comments about small UAVs, I want to 
point out that one of my recommendations in the written 
testimony is that UAVs exceeding 18 pounds in weight be 
required to have a spoof-resistant navigation system, but I 
recognize that we wouldn't want to encumber the smaller UAVs 
which are less of a danger and more sensitive to price with 
that same sort of requirement.
    So I recognize there is a balance to be struck here and we 
can debate about the 18 pounds versus the 16 pounds, but as 
they get above 18 pounds they do become quite, quite deadly if 
they, if something goes awry.
    Mr. Cuellar. Right, right. The bottom line is I really 
appreciate it because like any time we go into a new technology 
and we are talking about UAVs and it is basically the 
technology is a different platform. You got cameras or sensors, 
whatever it might be, but it is a different platform, whether 
it is a helicopter, an airplane, this time a UAV. I really 
appreciate what you are doing, and I certainly will be looking 
at your recommendations. I think it is a lot of good work 
that--you and your students' data. I think it is a great job 
and certainly we are going to take that into consideration, and 
I thank you for your good work.
    Mr. Humphreys. Thank you, Mr. Cuellar.
    Mr. McCaul. I thank the Ranking Member and just I would 
like for you--I haven't had a chance to ask you about your 
recommendations for safety and security but if I ask that you 
submit that for the record, that would be excellent.
    Mr. McCaul. I now recognize the gentleman from South 
Carolina, Mr. Duncan.
    Mr. Duncan. Thank you, Mr. Chairman, and I want to thank 
Dr. Humphreys for being here. This is very educational to me.
    In thinking through as we watched the video, thinking 
through what happened in 2011 in Iran with the Iranians 
claiming to have hijacked a military UAV, I guess the question 
I have for you, I know that was an encrypted signal but do you 
think that the Iranians were able to use a similar technology 
of spoofing to help bring down that UAV?
    Mr. Humphreys. I think it is important to take whatever the 
Iranians say with a couple of doses of salt. But in this case, 
I am somewhat concerned that their claims could have some 
merit. They may have initiated an electronic barrage against 
the CIA UAV that was flying their airspace, and it could have 
initiated a sequence of events that led to its capture. The 
plain fact is it showed up on Iranian television intact. 
Intact. That means we have got a lot of explaining to do.
    Mr. Duncan. Right. I mean, that means that didn't crash.
    So that type of an electronic barrage that you mentioned 
that may have been used, is that possible, a possibility within 
civilian airspace? If someone wanted to capture say a law 
enforcement UAV, could they put up an electronic barrage to 
bring down a law enforcement UAV?
    Mr. Humphreys. Similar techniques could be used. UAVs 
typically have two important wireless signals, the command-and-
control signal, the signal that goes back to the remote pilot, 
and then of course the GPS signal that helps it to navigate. 
Mostly the UAVs do well if you cut one of those two umbilical 
cords, but they don't do well if you cut both of them. In our 
case, with the spoofing, we didn't cut the cord, we supplanted 
it with a fictitious one. So I am broadly concerned about 
jamming electronic barrage attacks and about spoofing, these 
more sinister under-the-wire attacks.
    Mr. Duncan. So you not only changed the GPS signal to fool 
the UAV in regard to elevation or direction but you were able 
to tap into the command-and-control aspect as well?
    Mr. Humphreys. No, we did not attempt that. What I am 
saying is that that could be done as a jamming attack. You 
could cut that cord and prevent the remote operator from 
controlling the UAV as he or she wishes.
    Mr. Duncan. So you were able to change the GPS signal and 
to fool the plane into thinking the elevation was differently 
to bring it down?
    Mr. Humphreys. Yes, and the remote operator was in contact 
with the UAV the entire time. It was just that nothing appeared 
wrong to his sensors in the current configuration that we 
attacked.
    Mr. Duncan. But you couldn't have flown that UAV through 
any command-and-control ability to another runway and captured 
it.
    Mr. Humphreys. Ultimately, yes. It is not terribly easy to 
control it once you have got it. It is like a black stallion 
you find in the forest. You can jump on its back; can you ride 
it? The question that we have been asking ourselves is what 
could be done actually after you have captured it other than 
just moving it down like we did or doing broad strokes.
    Mr. Duncan. Right. Well, if the drone is used for 
surveillance purposes and has a real-time video feed, could 
that feed be hacked into or a replacement feed sent to fool the 
operator? I am thinking Mission Impossible here where they 
change the video feed and the operator is seeing something 
completely different; is that a possibility?
    Mr. Humphreys. Or sneak up there and put a Polaroid picture 
right in front of the video feed?
    Mr. Duncan. Exactly.
    Mr. Humphreys. Well, it turns out that these are areas of 
research in our laboratory and elsewhere, but the truth is that 
those kinds of data feeds can take advantage of the existing 
encryption utilities that are very difficult to crack. So if 
precautions have been put in place so those feeds are encrypted 
then it is not so easy.
    The attack that we were successful in was going after the 
unencrypted, unauthenticated civil GPS signal. Nobody had 
bothered to protect that signal and so that was the weakest 
link.
    Mr. Duncan. Do you think most law enforcement or most 
agencies, even Governmental agencies over the United States are 
using encrypted signals capability or using just civilian GPS?
    Mr. Humphreys. Only a very few civil government agencies in 
the United States are using the encrypted military signal. 
Almost all of us depend on these civilian signals. I will tell 
you that I had two of the lieutenants in the Austin Police 
Department in my office on Tuesday, and they were asking me for 
guidance on what I would do with their newly-purchased UAV. 
Would I use it, would I recommend that they use it during game 
day as they want to monitor for suspicious activities on, 
around the UT football stadium? Would I recommend they for SWAT 
activities as they have perhaps hostage situations and so 
forth? So I gave them my recommendations, which were if you 
have got some risk on the ground already I would get those eyes 
in the sky but if there isn't an on-going risky activity on the 
ground, I would probably keep it down.
    Mr. Duncan. Do you think criminal elements could utilize 
this activity to thwart law enforcement surveillance?
    Mr. Humphreys. I think they could use the technology, the 
spoofing technology that I was talking about?
    Mr. Duncan. The GPS technology that the students have come 
up with.
    Mr. Humphreys. I want to make a point that this is not 
easy. It wasn't easy to build the device that we have got. It 
has taken us years to perfect its use. The trouble is that 
civilian malefactors or others can get a hold of what are 
called GPS signal simulators, and they can do almost everything 
that we did. These are readily available, even purchasable. So 
I am worried that it could be a weapon in the arsenal of 
organized crime or state actors or organized terrorists.
    Mr. Duncan. Thank you. My time is up. I yield back, Mr. 
Chairman.
    Mr. McCaul. Right. The Chairman now recognizes the actual 
Ranking Member of the subcommittee, Mr. Keating.
    Mr. Keating. Thank you, Mr. Chairman. The thought of having 
two Texas representatives here prompted me to get here with 
great alacrity, but I want to thank Mr. Cuellar for his fine 
performance. I appreciate that. Thank you, Mr. Chairman. I just 
ask unanimous consent that my statement go on the record so 
that we can move expeditiously to questions.
    [The statement of Mr. Keating follows:]

              Statement of Ranking Member William Keating

    I want to thank Chairman McCaul for holding today's hearing to 
examine the use of Unmanned Aerial Vehicles, or UAVs, within the 
homeland.
    For years, the United States has successfully deployed UAVs in 
military operations throughout Iraq and Afghanistan.
    More recently, changes in the law have paved the way for public 
agencies--including State and local law enforcement--to pursue UAVs 
technology for law enforcement use.
    At present, the impact of UAVs flying in the National airspace and 
participating in day-to-day activities like watering fields and 
spraying pesticides is unknown; however, there are both risks and 
benefits to expanding this technology within the homeland.
    As a Member representing a maritime district, I am impressed with 
the ability of UAVs to map hurricanes, respond to severe flooding, and 
assist the U.S. Coast Guard in search-and-rescue missions.
    The unique manner in which UAVs conduct surveillance and 
reconnaissance has also resulted in successful military missions; 
however, it is these same capabilities that make UAVs so disconcerting 
at home.
    To that end, I am concerned about the lack of oversight on these 
vehicles, the fact that there is a continuing need to define what they 
can and cannot be used for and finally, the absence of privacy 
safeguards that currently do not exist.
    I understand the general public's concern. UAVs can be equipped 
with thermal-imaging sensors; WiFi sniffers; license plate readers, and 
facial recognition cameras.
    Moreover, they can hover over the same location for extended 
periods of time, collecting information and searching targets and 
properties within view without first obtaining a warrant.
    Some law enforcement agencies have already procured UAVs capable of 
firing non-lethal weapons and there aren't any rules, laws, or 
regulations in place to prevent these agencies from fully weaponizing 
this equipment.
    I do not mean to use this hearing as an opporuntity to fear monger 
because as a former District Attorney, I do not believe that it's law 
enforcement's intent to employ these technologies in a harmful manner, 
but I am seriously concerned that there is not one single Federal 
agency responsible for overseeing the operations of UAVs in our 
National airspace.
    Moreover, safety issues, such as: Sense-and-avoid technologies that 
enable UAVs to avoid other aircraft; the absence of a dedicated radio 
frequency for UAVs; and the assurance of constant command-and-control 
on the ground--continue to exist.
    As Chairman McCaul knows, I take a particular interest in airport 
perimeter security and the deployment of these technologies makes me 
wonder how far we are stretching this perimeter when airplanes are made 
to share the skies with UAVs. What does this mean for passenger safety?
    Furthermore, as we will learn this morning, the risk faced by 
hackers and spoofers seeking to intercept and use for their own 
purposes information captured by UAVs has not been fully addressed.
    As a result, I am looking forward to hearing from today's witnesses 
about the best path forward as we seek to safely and lawfully integrate 
UAVs in our National airspace.
    As we grapple with UAVs and the privacy and safety issues they 
present, I would be remiss if I did not also mention a much safer and 
non-invasive unmanned technology--underwater unmanned vehicles, or 
UUVs--developed throughout the United States and often tested in waters 
right off the Cape.
    There are today an estimated 450 underwater unmanned vehicles in 
the U.S. military inventory.
    At present, the primary missions of UUVs are mine detection and 
maritime security and as we've already seen with the Deepwater horizon 
disaster--where UUVs developed at Wood's Hole Oceanographic Institute 
were deployed to record the contamination of the water--there are many 
homeland security-related applications that can be pursued for 
underwater technologies, as well.
    Again, I look forward to hearing from today's witnesses.
    I yield back the balance of my time.

    Mr. Keating. I had just a question for Dr. Humphreys. When 
you are comparing the civilian, if you want to use that term, 
versus what law enforcement uses in the different codes of 
encryption, what is the cost differential? You know, if law 
enforcement wants encrypted more, is the cost-prohibitive or 
would that be a better track to take to differentiate it so 
that there is more encryption and more safety as a result from 
spoofing?
    Mr. Humphreys. Right. So perhaps you are voicing some of 
the recommendations that the AUVSI group has recommended. They 
would like to use the so-called SASM receivers, GPS receivers 
that have been formerly dedicated just for military uses, into 
the civilian UAVs so that they can be protected from these 
kinds of hacking attacks. The trouble I see with that is two-
fold. No. 1, yes, the price goes quite a bit up because there 
are only a couple of companies that can build these SASM 
receivers and so the price would much more than double, and 
that is going to hurt this Nation's industry that is sensitive 
to price, especially for the smaller devices. Second, I don't 
see the logistics working out. These SASM receives are hot 
items. You would not want them proliferating among civilians. 
You wouldn't want them to end up in the wrong hands, and you 
wouldn't necessarily want to distribute the keys on a short-
term basis because that is cumbersome for the owners and you 
don't want to distribute them on a long-term basis because then 
they can be used in unauthorized senses.
    So I don't see that as a solution. I don't see military 
signals being used by civilians as a widespread solution.
    Mr. Keating. Just another question. You know, we have dealt 
quite a bit with airport security on this committee as well. As 
any person is told to turn off your cell phone, turn off 
everything during the critical periods of communication on 
landing and takeoff, how could this be used to disrupt the 
orderly and safe takeoffs and landings of airplanes, commercial 
airplanes?
    The FAA is rolling out what is called its NextGen system. 
It is an air traffic control system that depends much more 
heavily on GPS than their current system. Of course, they are 
also using in commercial aircraft and general aviation the 
civilian GPS signals. Now, these planes are large and they have 
good inertial sensors and they have two pilots at the helm. So 
there is some redundancies in place. But the autopilots depend 
quite heavily on the GPS. Whereas they deal fairly well with an 
outage of GPS, a jamming attack for example, or some other 
reason that it goes away, I don't think the testing has been 
adequate for understanding how they would deal with a spoofing 
attack.
    Mr. Keating. Thank you. Mr. Chairman, I yield back my time.
    Mr. McCaul. Thank the Ranking Member. The Chairman now 
recognizes the gentlelady from New York, Ms. Clarke.
    Ms. Clarke. Thank you very much, Mr. Chairman. I thank our 
Ranking Member, Mr. Cuellar, for filling in.
    Dr. Humphreys, I find this whole topic quite fascinating. I 
serve as Ranking Member on the Subcommittee for Cybersecurity 
and Infrastructure Protection. So this is quite fascinating. 
One of the questions I have, and I have had this quite 
frequently as we advance our technological know-how, is whether 
in fact it pays in the outset to bake into our technology ways 
in which we can counteract disruption or if need be disarm and 
disable the devices that are developed. It would seem to me 
knowing what we know, that the next generation of UAVs would be 
sensitive enough that if any spoofing activity were to take 
place, something could be baked into the device that would 
protect us.
    What say you about that?
    Mr. Humphreys. I agree with that, and I would recommend 
wholeheartedly efforts to bake in, as you say, anti-spoofing 
techniques into the UAV technology. The problem would be 
finding ourselves 5 or 10 years from now without taking this 
issue as seriously enough that now we have got a great number 
of these UAVs plying our airspace which are, which continue to 
be just as vulnerable as the one that we took down. There are 
techniques, there are simple techniques that, while not 
foolproof, they can increase the resistance to a spoofing 
attack significantly. I recommend in my written testimony a 
long list of these techniques. Some of them simple, some of 
them not so simple. The bare fact is that anti-spoofing is 
hard. There is no quick and easy and cheap solution, but there 
are reasonable cost-effective measures we can take in the short 
term to bake this in, as you say.
    Ms. Clarke. You also stated that in your view the problem 
should be solved at the source, at the GPS satellites 
themselves. Do you believe that this is likely to occur?
    Mr. Humphreys. So I did say that on an interview. I guess I 
despair at the kinds of institutional changes that would be 
required looking for funding, looking for a political will to 
bring that about. In the very best scenario it might take 5 
years before we see any protection. So I am becoming more 
pessimistic that we can solve this problem at the GPS 
satellites themselves. I suppose that a more grassroots 
approach from the UAVs within their navigation systems is more 
reasonable, more practical.
    Ms. Clarke. Dr. Humphreys, you recommended that DHS commit 
to funding development and implementation of a cryptographic 
authentication signature in existing or forthcoming civil GPS 
signals.
    How did DHS respond to this recommendation, and do you 
think the agency will make the suggested changes?
    Mr. Humphreys. So this is a long-term recommendation. As I 
said, I am not terribly sanguine about it happening tomorrow or 
even within 5 years, but long-term I would like DHS to commit 
to funding this. The Department of Defense has indicated some 
willingness to implement a change to the civil GPS signals so 
that the can be authenticated like putting a watermark on a $20 
bill, but they don't have funds to do it. They have got tight 
budgets and they are looking for somebody who would step up to 
fund it. I believe it would fall to the DHS to fund something 
like this. I can't say that I am terribly optimistic.
    Ms. Clarke. So just listening what you have had to say, 
when you look at the rate at which these UAVs are being 
produced, and if your estimate is that it might take us about 5 
years to get there, we could be talking about you know tens of 
thousands of UAVs at that point in time having been deployed at 
some level, whether it is military, whether it is local law 
enforcement.
    So, you know, I want to thank you first of all for the work 
that you have done, the research, and the capabilities that you 
have uncovered, but my concern is, you know, what you suggest 
we do right now.
    Mr. Humphreys. The suggestions I have right now are these 
grassroots approaches for fixing the UAV without having to ask 
permission of the DHS or the GPS Directorate of the Air Force. 
There are reasonable techniques that you can bake into the GPS 
receivers and into the entire navigation systems of these UAVs. 
But while they don't prevent sophisticated, very sophisticated 
attacks, they would sure make them much harder.
    Ms. Clarke. Thank you very much. I yield back, Mr. 
Chairman.
    Mr. McCaul. I thank the gentlelady and you raise a great 
point, and if anything, I hope we can fix these vulnerabilities 
that we have, and I again ask that you put those 
recommendations into the record.
    The Chairman now recognizes the gentleman from Illinois, 
Mr. Davis.
    Mr. Davis. Thank you very much, Mr. Chairman. I must 
confess that I am fascinated by this. I was sitting here 
thinking that we may have all of these things in the 
environment zinging all around every place when you watch what 
used to be science fiction. I am not sure it is as much fiction 
now as it used to be. But I was trying to figure out the 
utilization and utility. What is the usefulness of the 
continuous development of this technology?
    Mr. Humphreys. That is a great question. There are in fact 
a lot of great uses to which these drones could be put. I 
particularly want to use them in our research so that we can do 
better detection of interference sources in the GPS radio 
bands, and I will confess also that I am looking forward to a 
day when I could get a burrito delivered to my doorstep from a 
drone that does takeout delivery.
    Other types of uses could be in monitoring power lines. Of 
course monitoring the border, helping to surveil to difficult 
situations like a SWAT attack against somebody who has got a 
hostage situation on-going. So I see these as being very 
useful, and I would not want to put the brakes on the plan the 
FAA has to roll them out in the future. I would simply want to 
hold the FAA to the language of the act passed back in February 
so that we safely accelerate the adoption of these UAVs into 
the National airspace.
    Mr. Davis. I guess since we have got a great deal of 
concern about terrorism, terrorists, terrorist plots, that it 
would give us the opportunity to stay a step ahead of 
individuals or countries even that might have other kinds of 
motivation for further development.
    Mr. Humphreys. That is true. If you put the brakes on this 
massive industry now, you end up putting us at a disadvantage 
compared to other countries. The UAV revolution is coming and 
we might as well be on the cutting edge of it.
    Mr. Davis. How do we balance, and I am thinking of all of 
the concerns that we have right now about money and 
expenditures and, you know, when we cut $25 billion out of this 
or we deny people food stamps. You know I think of people who 
are having so much difficulty simply having shelter or a place 
to live. How do we balance the utilization of our resources in 
terms of what it would take to further develop the technology 
that we are talking about versus how do you feed the hungry?
    Mr. Humphreys. Well, it is a good question, but I guess I 
would point out that in many cases these UAVs would save money. 
The Austin Police Department, the lieutenants that were talking 
to me last Tuesday, were telling me that it cost them $5 
million to buy a helicopter for manned use for surveillance and 
so forth and maybe only $50,000 for UAV. They are on a tight 
budget, so I can understand why they would be looking to the 
UAVs to save money. That frees up budgets for other worthy uses 
of those funds.
    It is also going to be I think a dynamo for innovation and 
jobs, a healthy domestic UAV industry. My main contention is 
that, let's let it go ahead, but let's be vigilant about the 
uses to which these UAVs are put and ensure that people's 
privacy and their security is a top priority.
    Mr. Davis. Well, let me thank you very much. I certainly 
support technological exploration and technological 
advancement. I just want to be as balanced about it as we can, 
and I commend you for your work. Thank you very much.
    Mr. McCaul. I thank the gentleman. The Chairman now 
indulges the gentleman from Texas, Mr. Cuellar, for one 
question.
    Mr. Cuellar. One question. Again, I appreciate all of the 
good work you have done. There are, first of all, there is the 
military type of drones or UAVs, and then there is the hobby 
UAVs and then the commercial UAVs. Would you say that?
    Mr. Humphreys. I think those are good broad 
classifications, yes.
    Mr. Cuellar. What you used was----
    Mr. Humphreys. It wasn't a personal UAV. It was an $80,000 
device.
    Mr. Cuellar. But was it a hobby?
    Mr. Humphreys. No. I mean a hobbyist could use it, of 
course, but it was quite expensive for your average weekend 
hobbyist.
    Mr. Cuellar. Right. My understanding is that most of the 
hobby UAVs do not have protection over radio signals and they 
can be easily taken over, whether it is $80,000 or $5,000. My 
understanding is most commercial UAVs have encryption 
communication, the frequency hop or the transmission methods 
where hacking or spoofing would be a lot more difficult; is 
that correct?
    Mr. Humphreys. The communication to the UAV from the remote 
pilot might well be secure, but the spoofing of the GPS signals 
is not secure and that is what we demonstrated. We were using a 
high-end sophisticated UAV. We were not using a do-it-yourself 
drone.
    Mr. Cuellar. Right. My understanding is most of the 
commercial UAVs do have the encryption on it and having the 
encryption is very important because just like Robert Hanssen, 
remember the FBI person, they were selling the encryption keys 
and there were certain things involved on that, but I just 
wanted to--like I say I appreciate the work but I want to make 
sure we----
    Mr. Humphreys. Yes. They may well have encryption on the 
command-and-control link. They do not have encryption on the 
GPS navigation link.
    Mr. Cuellar. Those are the recommendations that you 
mentioned to the Chairman----
    Mr. Humphreys. I recommend that we ensure that UAVs 
exceeding 18 pounds have certified themselves as spoof-
resistant, and I give a brief definition for that in my 
statement. Also I am willing to entertain that definition in 
further research.
    Mr. Cuellar. Okay. Thank you. Thank you, Mr. Chairman.
    Mr. McCaul. I thank the gentleman. Let me just also 
reiterate what Mr. Cuellar said earlier, and that is we have 
worked together very closely on getting these UAVs, military, 
DHS, down on the border, Southwest Border where they are very 
needed and very valuable in securing the border. What we are 
talking about here today is the domestic use of UAVs, which are 
not encrypted, which are vulnerable, and there is really no 
policy set forth at a National level in terms of: How do we 
deal with these UAVs that we know in the next couple of years 
are going to multiply by the thousands? I think it is incumbent 
upon the Department of Homeland Security, particularly in light 
of this terrorist plot, to engage on this issue and come 
forward with some leadership and provide that security and 
policy.
    So with that, I would really want to thank our witness, Dr. 
Humphreys. It has been a real pleasure, not only to hear your 
insightful and very intelligent testimony but on a personal 
level to meet you as well. Thank you for being here.
    Mr. Humphreys. Thank you, Chairman McCaul and all of you 
Members of the subcommittee.
    Mr. McCaul. With that, the first panel is adjourned and we 
will move into the second panel.
    The Chairman now recognizes the second panel, and before I 
do that, I want to ask unanimous consent that this committee 
welcome a colleague and fellow Texan, Congressman Kevin Brady, 
to introduce his local hometown sheriff.
    Mr. Brady. Great. Well, thank you very much, Chairman 
McCaul and Ranking Member Keating. I want to thank you and the 
other Members of the committee for allowing me this special 
privilege today. I am very pleased to be able to introduce to 
the committee today not only a constituent but a friend and an 
incredible law enforcement officer who has hands-on experience 
in this very subject, Chief Deputy William Randy McDaniel of 
the Montgomery County Sheriff's Office. The Montgomery County, 
Texas Sheriff's Office has jurisdiction over Houston's largest 
suburb, and it is one of the fastest-growing counties in 
America. It is the only agency in Texas that is currently using 
unmanned aerial vehicles for law enforcement purposes. In my 
view it has tremendous potential for public safety, for 
emergency response, for search and rescue, and at times during 
natural disasters such as the wildfires we experienced locally 
last year.
    Chief McDaniel is a decorated law enforcement officer with 
an impressive career spanning many decades. He has received the 
Texas Department of Public Safety, Traffic Law Enforcement 
Division Chief's Award for Excellence, two awards in that 
arena. While serving the United States Air Force, he received 
the Air Force Commendation Medal, the Humanitarian Service 
Medal, and the 15th Air Force Combat Crew Excellence Award. He 
is also a graduate of the FBI National Academy in Quantico, 
Virginia.
    I know that Chief McDaniel's testimony will be insightful 
and helpful in an emerging issue. So thank you for allowing me 
to introduce this good friend of the community today, Chief 
McDaniel. Thank you for being here.
    Mr. McCaul. Thank you, Mr. Brady, for that very good and 
kind introduction. With that I am going to introduce the rest 
of the panel.
    Dr. Gerald Dillingham is currently the director of the 
civil aviation issues for the U.S. Government Accountability 
Office, or GAO. He is a member of the Senior Executive Service 
and is responsible for direction, program evaluations, and 
policy analysis studies related to civilian aviation issues, 
including safety, environment, air traffic control, airport 
development, and international aviation.
    Prior to coming to GAO in 1981, Dr. Dillingham served on 
the faculties of the University of California and the 
University of Illinois. I note that for Mr. Davis, my 
colleague, a fellow Illinoian. In addition, he served on the 
National Commission on Terrorist Attacks upon the United 
States, or the 9/11 Commission, on the aviation in 
transportation security team from 2003 to 2004.
    Let me see here. My notes. I apologize. Our last witness, 
last but not least, Ms. Amie Stepanovich is the legal counsel 
at the Electronic Privacy Information Center. Her work includes 
issues of National security, Government surveillance, digital 
security, and open Government. Ms. Stepanovich is the moderator 
of a weekly Twitter-based privacy discussion. She regularly 
assists with EPIC's internet and social media web presence. 
Prior to joining EPIC, not to be confused with the El Paso 
Intelligence Center, I don't think anybody would ever confuse 
you with being associated with them, but Ms. Stepanovich 
graduated from New York Law School where she pursued studies on 
media law, technology, and the First Amendment. We appreciate 
you being here today as well to bring up these very important 
privacy issues that we see with the domestic use of these UAVs.
    So with that, now the Chairman recognizes Mr. Dillingham 
for his opening statement.

 STATEMENT OF GERALD L. DILLINGHAM, PH.D., DIRECTOR, PHYSICAL 
    INFRASTRUCTURE ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE

    Mr. Dillingham. Thank you, Mr. Chairman, Ranking Member, 
and Members of the subcommittee. My statement today discusses 
three areas: First, an overview of the findings and 
recommendations from our 2008 study that focused on some of the 
key challenges to safe integration of unmanned aerial systems 
in the National airspace; second, DHS's role in the domestic 
use of these systems; and, third, our preliminary observations 
on emerging issues.
    In 2008, the four key challenges we identified to 
integration were the ability of UASs to sense and avoid other 
aircraft, ensuring uninterrupted command and control, the 
development of standards to ensure that UASs meet established 
safety, reliability, and performance requirements and, finally, 
to ensure that the regulations being developed for unmanned 
aircraft be equal to existing regulations for manned aircraft.
    To address these challenges, GAO developed a matter for 
Congressional consideration and three recommendations, two for 
FAA and one for DHS. We recommended that FAA issue a 
comprehensive UAS program plan and that it establish processes 
to obtain available operational data. We have closed those 
recommendations as being implemented. We suggested that 
Congress create an organization within FAA to coordinate 
Government and private-sector efforts to address the safety 
challenges and we also recommended that TSA examine the 
potential security implications related to UASs and take 
appropriate action.
    We have closed our matter for Congressional consideration 
and our recommendation to TSA, but as not being implemented.
    Regarding DHS's role with UASs international airspace, DHS 
is one of several partner agencies of FAA's Joint Planning and 
Development Office that is working to integrate UASs.
    FAA has granted Customs and Border Protection authority to 
operate its 10 UASs to support its National security missions 
along the U.S. Northern and Southern Borders. DHS has also 
provided UAS support to other Federal and State agencies in 
carrying out their missions.
    As the Chairman described in his opening statement, TSA, 
acting in this role as lead agency for transportation security, 
in 2004 issued an advisory which indicated that the Federal 
Government was concerned that UASs could be modified and used 
to attack key assets and infrastructure in the United States.
    However, neither DHS nor TSA has taken any significant 
actions to implement our 2008 recommendations to examine the 
potential security implications of UAS.
    According to TSA officials, in 2008 and again as recently 
as this month, they believe that the agency's current practices 
are sufficient and that no additional actions are needed.
    With regard to emerging issues, our on-going work has 
identified three key issues that warrant further consideration. 
First is privacy as it relates to the collection and use of 
surveillance data. Members of Congress, civil liberties 
organizations, and civilians have expressed concerns at the 
potential increased use of UASs in the National airspace by law 
enforcement or for commercial purposes as potential privacy 
implications. Currently, no Federal agency has specific 
statutory responsibility to regulate privacy matters relating 
to UAS. Stakeholders have told us by developing guidelines for 
the appropriate use of UASs ahead of widespread proliferation 
could in fact preclude abuses of the technology and negative 
public perception of the potential uses that are planned for 
these aircraft.
    A second emerging issue is that owners of model aircraft do 
not require permission or license from FAA to operate their 
aircraft. As the Chairman described in his opening statement, a 
man in Massachusetts pleaded guilty for plotting to use a 
large, remote-controlled model aircraft filled with C4 plastic 
explosive to attack the Pentagon and the U.S. Capitol. This 
kind of incident highlights the potential for model aircraft to 
be used to cause harm.
    A third emerging issue is the potential for jamming of GPS 
signals that control UASs. In a GPS jamming scenario, the 
aircraft could potentially lose its ability to determine where 
it is located and in what direction it is traveling. Low-cost 
devices that jam GPS signals are readily available on the 
internet.
    Mr. Chairman, Ranking Member Keating, and Members of the 
subcommittee, we plan to issue a full report to this 
subcommittee and other committees in the Congress on our UAS 
work later in the fall.
    Thank you, Mr. Chairman.
    [The prepared statement of Mr. Dillingham follows:]

               Prepared Statement of Gerald L. Dillingham
                             July 19, 2012

                             GAO HIGHLIGHTS

    Highlights of GAO-12-889T, a testimony before the Subcommittee on 
Oversight, Investigations, and Management, Committee on Homeland 
Security, House of Representatives.

Why GAO Did This Study
    UAS aircraft do not carry a human operator on board, but instead 
operate on pre-programmed routes or by following commands from pilot-
operated ground stations. An aircraft is considered to be a small UAS 
if it is 55 pounds or less, while a large UAS is anything greater. 
Current domestic uses of UAS are limited and include law enforcement, 
monitoring or fighting forest fires, border security, weather research, 
and scientific data collection by the Federal Government. FAA 
authorizes military and non-military UAS operations on a limited basis 
after conducting a case-by-case safety review. Several other Federal 
agencies also have a role or interest in UAS, including DHS. In 2008, 
GAO reported that safe and routine access to the National airspace 
system poses several obstacles.
    This testimony discusses: (1) Obstacles identified in GAO's 
previous report on the safe and routine integration of UAS into the 
National airspace, (2) DHS's role in the domestic use of these systems, 
and (3) preliminary observations on emerging issues from GAO's on-going 
work.
    This testimony is based on a 2008 GAO report and on-going work, and 
is focused on issues related to non-military UAS. In on-going work, GAO 
analyzed FAA's efforts to integrate UAS into the National airspace, the 
role of other Federal agencies in achieving safe and routine 
integration, and other emerging issues; reviewed FAA and other Federal 
agency efforts and documents; and conducted selected interviews with 
officials from FAA and other Federal, industry, and academic 
stakeholders.

UNMANNED AIRCRAFT SYSTEMS.--USE IN THE NATIONAL AIRSPACE SYSTEM AND THE 
              ROLE OF THE DEPARTMENT OF HOMELAND SECURITY

What GAO Found
    GAO earlier reported that unmanned aircraft systems (UAS) could not 
meet the aviation safety requirements developed for manned aircraft and 
posed several obstacles to operating safely and routinely in the 
National airspace system. These include: (1) The inability for UAS to 
detect, sense, and avoid other aircraft and airborne objects in a 
manner similar to ``see and avoid'' by a pilot in a manned aircraft; 
(2) vulnerabilities in the command and control of UAS operations; (3) 
the lack of technological and operational standards needed to guide the 
safe and consistent performance of UAS; and (4) the lack of final 
regulations to accelerate the safe integration of UAS into the National 
airspace. GAO stated in 2008 that Congress should consider creating an 
overarching body within the Federal Aviation Administration (FAA) to 
address obstacles for routine access. FAA's Joint Planning and 
Development Office (JPDO) has taken on a similar role. FAA has 
implemented GAO's two recommendations related to its planning and data 
analysis efforts to facilitate integration.
    The Department of Homeland Security (DHS) is one of several partner 
agencies of JPDO working to safely integrate UAS into the National 
airspace. Since 2005, FAA has granted DHS authority to operate UAS to 
support its National security mission in areas such as the U.S. 
northern and southern land borders. DHS's Transportation Security 
Administration (TSA) has the authority to regulate security of all 
modes of transportation, including non-military UAS, and according to 
TSA officials, its aviation security efforts include monitoring reports 
on potential security threats regarding the use of UAS. Security 
considerations could be exacerbated with routine UAS access. TSA has 
not taken any actions to implement GAO's 2008 recommendation that it 
examine the security implications of future, non-military UAS.
    GAO's on-going work has identified several UAS issues that, 
although not new, are emerging as areas of further consideration in 
light of greater access to the National airspace. These include 
concerns about privacy relating to the collection and use of 
surveillance data. Currently, no Federal agency has specific statutory 
responsibility to regulate privacy matters relating to UAS. Another 
emerging issue is the use of model aircraft (aircraft flown for hobby 
or recreation) in the National airspace. FAA is generally prohibited 
from developing any rule or regulation for model aircraft. The Federal 
Bureau of Investigation report of a plot to use a model aircraft filled 
with plastic explosives to attack the Pentagon and U.S. Capitol in 
September 2011 has highlighted the potential for model aircraft to be 
used for unintended purposes. An additional emerging issue is 
interruption of the command and control of UAS operations through the 
jamming and spoofing of the Global Positioning System between the UAS 
and ground control station. GAO plans to report more fully this fall on 
these issues, including the status of efforts to address obstacles to 
the safe and routine integration of UAS into the National airspace.



    Chairman McCaul, Ranking Member Keating, and Members of the 
subcommittee: I appreciate the opportunity to testify before you today 
on obstacles to unmanned aircraft systems (UAS) safe and routine 
operations in the National airspace, the role that the Department of 
Homeland Security (DHS) has in UAS operations, and emerging UAS issues. 
Many stakeholders have exhibited increased interest in UAS for border 
security and disaster assistance, among other uses. Additionally, as 
combat operations in Afghanistan decrease, all of the United States 
military services expect to conduct more UAS training flights across 
the contiguous United States.\1\
---------------------------------------------------------------------------
    \1\ House Permanent Select Committee on Intelligence, Performance 
Audit of the Department of Defense Intelligence, Surveillance, and 
Reconnaissance (Washington, DC: Apr. 2012).
---------------------------------------------------------------------------
    UAS aircraft do not carry a human operator on board, but instead 
operate on pre-programmed routes or by following commands from pilot-
operated ground stations. These aircraft are also referred to as 
``unmanned aerial vehicles,'' ``remotely piloted aircraft,'' ``unmanned 
aircraft,'' or ``drones.'' The term ``unmanned aircraft system'' is 
used to recognize that a UAS includes not only the airframe, but also 
associated elements such as a ground station and the communications 
links. UAS are typically described in terms of weight, endurance, 
purpose of use, and altitude of operation. Most UAS are considered 
small, weighing less than 55 pounds; some of which fly less than 400 
feet above the ground. According to an industry association, small UAS 
are expected to comprise the majority of UAS that will operate in the 
National airspace.
    The Federal Aviation Administration (FAA) authorizes military and 
non-military (academic institutions; Federal, State, and local 
governments including law enforcement entities; and private sector 
entities) UAS operations on a limited basis after conducting a case-by-
case safety review. Only Federal, State, and local government agencies 
can apply for a Certificate of Waiver or Authorization (COA); private-
sector entities must apply for special airworthiness certificates in 
the experimental category.\2\
---------------------------------------------------------------------------
    \2\ COAs and special airworthiness certifications in the 
experimental category represent exceptions to the usual certification 
process. FAA examines the facts and circumstances of a proposed UAS to 
ensure that the prospective operator has acceptably mitigated safety 
risks.
---------------------------------------------------------------------------
    Between January 1, 2012 and July 17, 2012, FAA had issued 201 COAs 
to 106 Federal, State, and local government entities across the United 
States, including law enforcement entities as well as academic 
institutions. Additionally, FAA had issued 8 special airworthiness 
certifications for experimental use to four UAS manufacturers. 
Presently, under COA or special airworthiness certification, UAS 
operations are permitted for specific times, locations, and operations. 
Thus it is not uncommon for an entity to receive multiple COAs for 
various missions. Over the years, concerns have been expressed by the 
Congress and other stakeholders that sufficient progress has not been 
made to integrate UAS into the National airspace system. In 2008, GAO 
reported that safe and routine access to the National airspace system 
poses several obstacles. We also stated that Congress should consider 
creating an overarching body within FAA to coordinate Federal, 
academic, and private-sector efforts in meeting the safety challenges 
of allowing routine access to the National airspace system. 
Additionally, we made two recommendations to FAA related to its 
planning and data analysis efforts to facilitate the process of 
allowing UAS routine access to the National airspace. We also 
recommended that DHS assess the security implications of routine 
access. FAA is working toward implementing the requirements set forth 
by its February 2012 reauthorization to accelerate UAS integration.\3\
---------------------------------------------------------------------------
    \3\ FAA Modernization and Reform Act of 2012, Pub. L. No. 112-95, 
 332-334, 126 Stat. 11 (2012).
---------------------------------------------------------------------------
    Several other Federal agencies also have a role or interest in UAS, 
including the Department of Homeland Security (DHS), the Department of 
Defense (DOD), and the National Aeronautics and Space Administration 
(NASA).\4\ DHS's Transportation Security Administration (TSA) has 
authority to regulate the security of all transportation modes, 
including non-military UAS, to ensure that appropriate safeguards are 
in place. According to TSA, its aviation security efforts include 
addressing risks, threats, and vulnerabilities related to non-military 
UAS. In addition, according to DHS officials, Customs and Border 
Protection (CBP) owns ten UAS that it operates for its own missions as 
well as for missions in conjunction with other agencies. DOD has 
successfully used UAS for intelligence, surveillance, reconnaissance, 
and combat missions.\5\ While many of DOD's UAS operations currently 
take place outside of the United States, the military services require 
access to the National airspace to conduct UAS training. DOD has also 
assisted DHS in border security missions, including two missions since 
2006 where the National Guard provided support in four Southwestern 
Border States. NASA uses UAS primarily for research purposes, such as 
the Predator B for wildfire mapping and investigations as well as an 
expected arctic mission next year on surface sea ice.
---------------------------------------------------------------------------
    \4\ Senior executives from these four Federal agencies represent 
the UAS ExCom, whose mission is to enable increased and ultimately 
routine access of Federal UAS engaged in non-military aircraft 
operations into the National airspace to support these agencies' 
operational, training, development, and research requirements.
    \5\ GAO, Unmanned Aircraft Systems: Comprehensive Planning and a 
Results-Oriented Training Strategy Are Needed to Support Growing 
Inventories, GAO-10-331 (Washington, DC: Mar. 26, 2010).
---------------------------------------------------------------------------
    My statement today discusses: (1) Obstacles we identified in our 
previous report to the safe and routine integration of UAS into the 
National air space, (2) DHS's role in the domestic use of these 
systems, and (3) preliminary observations on emerging issues from our 
on-going work examining UAS. This statement is based on our 2008 UAS 
report \6\ and on-going work for this subcommittee, the House Committee 
on Transportation and Infrastructure and its subcommittee on Aviation, 
and the Senate Committee on Science, Commerce, and Transportation. Our 
on-going work is focused on issues related to non-military UAS and is 
based on our analysis of FAA's efforts to integrate UAS into the 
National airspace, the role of other Federal agencies in achieving safe 
and routine integration, and other emerging issues. Our preliminary 
observations are based on our review of various FAA and other Federal 
agency efforts and documents; and selected interviews with officials 
from FAA and other Federal, industry, and academic stakeholders. Our 
2008 report contains detailed explanations of the methods used to 
conduct that work. We have discussed the information in this testimony 
with officials from FAA and DHS, and incorporated their comments as 
appropriate. The work on which this statement is based was performed in 
accordance with generally accepted Government auditing standards. Those 
standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives.
---------------------------------------------------------------------------
    \6\ GAO, Unmanned Aircraft Systems: Federal Actions Needed to 
Ensure Safety and Expand Their Potential Uses Within the National 
Airspace System, GAO-08-511 (Washington, DC: May 15, 2008).
---------------------------------------------------------------------------
                               BACKGROUND

    Current domestic uses of UAS are limited and include law 
enforcement, monitoring or fighting forest fires, border security, 
weather research, and scientific data collection. UAS have a wide-range 
of potential uses, including commercial uses such as pipeline, utility, 
and farm fence inspections; vehicular traffic monitoring; real estate 
and construction site photography; relaying telecommunication signals; 
and crop dusting. FAA's long-range goal is to permit, to the greatest 
extent possible, routine UAS operations in the National airspace system 
while ensuring safety. Using UAS for commercial purposes is not 
currently allowed in the National airspace. As the list of potential 
uses for UAS grows, so do the concerns about how they will affect 
existing military and non-military aviation as well as concerns about 
how they might be used.
    Domestically, State and local law enforcement entities represent 
the greatest potential use of small UAS in the near term because small 
UAS can offer a simple and cost-effective solution for airborne law 
enforcement activities for agencies that cannot afford a helicopter or 
other larger aircraft.\7\ For example, Federal officials and one 
airborne law enforcement official said that a small UAS costing between 
$30,000 and $50,000 is more likely to be purchased by State and local 
law enforcement entities because the cost is nearly equivalent to that 
of a patrol car. According to recent FAA data, 12 State and local law 
enforcement entities have a Certificate of Waiver or Authorization 
(COA) while an official at the Department of Justice said that 
approximately 100 law enforcement entities have expressed interest in 
using a UAS for some of their missions. According to law enforcement 
officials with whom we spoke, small UAS are ideal for certain types of 
law enforcement activities. Officials anticipate that small UAS could 
provide support for tactical teams, post-event crime scene analysis and 
critical infrastructure photography. Officials said that they do not 
anticipate using small UAS for routine patrols or missions that would 
require flights over extended distances or time periods.
---------------------------------------------------------------------------
    \7\ FAA generally considers UAS in the two broad categories of 
``small'' and ``large,'' and has used these categories to split its 
efforts to develop rules that would allow Government and commercial UAS 
access to the National airspace. FAA has been developing rules for 
small UAS for several years. Although there is no widely-accepted 
common classification system for UAS, an aircraft is considered to be a 
small UAS if it is 55 pounds or less, while a large UAS is anything 
greater.
---------------------------------------------------------------------------
    FAA has been working with the Department of Justice's National 
Institute of Justice to develop a COA process through a memorandum of 
understanding to better meet the operational requirements of law 
enforcement entities. While the memorandum of understanding 
establishing this COA process has not been finalized, there are two law 
enforcement entities that are using small UAS on a consistent basis for 
their missions and operations. The proposed process would allow law 
enforcement entities to receive a COA for training and performance 
evaluation. When the entity has shown proficiency in operating its UAS, 
it would then receive an operational COA allowing it to operate small 
UAS for a range of missions. In May 2012, FAA stated that it met its 
first requirement to expedite the COA process for public safety 
entities. FAA's reauthorization also required the agency to enter into 
agreements with appropriate Government agencies to simplify the COA 
process and allow a Government public safety agency to operate unmanned 
aircraft weighing 4.4 pounds or less if flown within the line of sight 
of the operator, less than 400 feet above the ground, and during 
daylight conditions, among other stipulations.

            OBSTACLES TO SAFE AND ROUTINE INTEGRATION OF UAS

    In 2008, we reported that UAS could not meet the aviation safety 
requirements developed for manned aircraft and posed several obstacles 
to operating safely and routinely in the National airspace system.
   Sense-and-avoid technologies.--To date, no suitable 
        technology has been identified that would provide UAS with the 
        capability to meet the detect, sense, and avoid requirements of 
        the National airspace system. Our on-going work indicates that 
        research has been carried out to mitigate this, but the 
        inability for UAS to sense and avoid other aircraft or objects 
        remains an obstacle. With no pilot to scan the sky, UAS do not 
        have an on-board capability to directly ``see'' other aircraft. 
        Consequently, the UAS must possess the capability to sense and 
        avoid an object using on-board equipment, or with the 
        assistance of a human on the ground or in a chase aircraft,\8\ 
        or by other means, such as radar. Many UAS, particularly 
        smaller models, will likely operate at altitudes below 18,000 
        feet, sharing airspace with other vehicles or objects. Sensing 
        and avoiding other vehicles or objects represents a particular 
        challenge for UAS, because other vehicles or objects at this 
        altitude often do not transmit an electronic signal to identify 
        themselves and, even if they did, many small UAS, do not have 
        equipment to detect such signals if they are used and may be 
        too small to carry such equipment.
---------------------------------------------------------------------------
    \8\ Chase pilots are in constant radio contact with research pilots 
and serve as an ``extra set of eyes'' to help maintain total flight 
safety during specific tests and maneuvers. Chase pilots monitor 
certain events for the research pilot and are an important safety 
feature on all research missions.
---------------------------------------------------------------------------
   Command-and-control communications.--Similar to what we 
        previously reported, ensuring uninterrupted command and control 
        for UAS remains a key obstacle for safe and routine integration 
        into the National airspace. Without such control, the UAS could 
        collide with another aircraft or crash, causing injury or 
        property damage. The lack of dedicated radiofrequency spectrum 
        for UAS operations heightens the possibility that an operator 
        could lose command and control of the UAS. Unlike manned 
        aircraft that use dedicated radio frequencies, non-military UAS 
        currently use undedicated frequencies and remain vulnerable to 
        unintentional or intentional interference. To address the 
        potential interruption of command and control, UAS generally 
        have pre-programmed maneuvers to follow if the command-and-
        control link becomes interrupted (called a ``lost-link 
        scenario''). However, these procedures are not standardized 
        across all types of UAS and, therefore, remain unpredictable to 
        air traffic controllers who have responsibility for ensuring 
        safe separation of aircraft in their airspace.
   Standards.--A rigorous certification process with 
        established performance thresholds is needed to ensure that UAS 
        and pilots meet safety, reliability, and performance standards. 
        Minimum aviation system standards are needed in three areas: 
        Performance; command-and-control communications; and sense-and-
        avoid. In 2004, RTCA, a standards-making body sponsored by FAA, 
        established a Federal advisory committee called the Special 
        Committee 203 (or SC 203), to establish minimum performance 
        standards for FAA to use in developing UAS regulations.\9\ 
        Individuals from academia and the private sector serve on the 
        committee, along with FAA, NASA, and DOD officials. ASTM 
        International Committee F38 on UAS, an international voluntary 
        consensus standards-making body, is working with FAA to develop 
        standards to support the integration of small UAS into the 
        National airspace.\10\
---------------------------------------------------------------------------
    \9\ RTCA, formerly the Radio Technical Commission for Aeronautics, 
is a private, not-for-profit corporation that develops consensus-based 
performance standards regarding communications, navigation, 
surveillance, and air traffic management system issues. RTCA serves as 
a Federal advisory committee, and its recommendations are the basis for 
a number of FAA's policy, program, and regulatory decisions.
    \10\ ASTM International, formerly known as the American Society for 
Testing and Materials (ASTM), is a globally recognized leader in the 
development and delivery of international voluntary consensus 
standards. ASTM members deliver the test methods, specifications, 
guides, and practices that support industries and governments 
worldwide.
---------------------------------------------------------------------------
   Regulations.--FAA regulations govern the routine operation 
        of most aircraft in the National airspace system.\11\ However, 
        these regulations do not contain provisions to address issues 
        relating to unmanned aircraft. As we highlighted in our 
        previous report, existing regulations may need to be modified 
        to address the unique characteristics of UAS. Today, UAS 
        continue to operate as exceptions to the regulatory framework 
        rather than being governed by it. This has limited the number 
        of UAS operations in the National airspace, and that limitation 
        has, in turn, contributed to the lack of operational data on 
        UAS in domestic operations previously discussed. One industry 
        forecast noted that growth in the non-military UAS market is 
        unlikely until regulations allow for the routine operation of 
        UAS. Without specific and permanent regulations for safe 
        operation of UAS, Federal stakeholders, including DOD, continue 
        to face challenges. The lack of final regulations could hinder 
        the acceleration of safe and routine integration of UAS into 
        the National airspace.
---------------------------------------------------------------------------
    \11\ Title 14, Code of Federal Regulations (14 CFR).
---------------------------------------------------------------------------
    Given the remaining obstacles to UAS integration, we stated in 2008 
that Congress should consider creating an overarching body within FAA 
to coordinate Federal, academic, and private-sector efforts in meeting 
the safety challenges of allowing routine access to the National 
airspace system. While it has not created this overarching body, FAA's 
Joint Planning and Development Office has taken on a similar role. In 
addition, Congress set forth requirements for FAA in its February 2012 
reauthorization to facilitate UAS integration. Additionally, we made 
two recommendations to FAA related to its planning and data analysis 
efforts to facilitate the process of allowing UAS routine access to the 
National airspace, which FAA has implemented.

    ROLE OF THE DEPARTMENT OF HOMELAND SECURITY IN DOMESTIC UAS USE

    DHS is one of several partner agencies of FAA's Joint Planning and 
Development Office (JPDO) working to safely integrate UAS into the 
National airspace. TSA has the authority to regulate the security of 
all transportation modes, including non-military UAS, and according to 
TSA officials, its aviation security efforts include monitoring reports 
on potential security threats regarding the use of UAS. While UAS 
operations in the National airspace are limited and take place under 
closely controlled conditions, this could change if UAS have routine 
access to the National airspace system. Further, DHS owns and uses UAS.
    Security is a significant issue that could be exacerbated with an 
increase in the number of UAS, and could impede UAS use even after all 
other obstacles have been addressed. In 2004, TSA issued an advisory in 
which it stated that there was no credible evidence to suggest that 
terrorist organizations plan to use remote-controlled aircraft or UAS 
in the United States. However, the TSA advisory also provided that the 
Federal Government remains concerned that UAS could be modified and 
used to attack key assets and infrastructure in the United States. TSA 
advised individuals to report any suspicious activities to local law 
enforcement and the TSA General Aviation Hotline.\12\ Security 
requirements have yet to be developed for UAS ground control stations--
the UAS equivalent of the cockpit.\13\ Legislation introduced in the 
112th Congress would prohibit the use of UAS as weapons while operating 
in the National airspace.\14\
---------------------------------------------------------------------------
    \12\ Department of Homeland Security, TSA Advisory: Security 
Information Regarding Remote Controlled Aircraft and Unmanned Aerial 
Vehicles (Washington, DC: Nov. 22, 2004).
    \13\ Additionally, in response to the events of September 11, 2001, 
entry doors to passenger airplane cockpits were hardened to prevent 
unauthorized entry.
    \14\ No Armed Drones Act of 2012, H. R. 5950, 112th Cong. (2012).
---------------------------------------------------------------------------
    In our 2008 report, we recommended that the Secretary of Homeland 
Security direct the administrator of TSA to examine the security 
implications of future, non-military UAS operations in the National 
airspace and take any actions deemed appropriate. TSA agreed that 
consideration and examination of new aviation technologies and 
operations is critical to ensuring the continued security of the 
National airspace. According to TSA officials, TSA continues to work 
with the FAA and other Federal agencies concerning airspace security by 
implementing security procedures in an attempt to protect the National 
Airspace System. Examples of this collaboration include the coordinated 
efforts to allow access to temporary flight-restricted airspace such as 
those put in place for Presidential travel and DHS Security Events. 
However, to date, neither DHS nor TSA has taken any actions to 
implement our 2008 recommendation. According to TSA officials, TSA 
believes its current practices are sufficient and no additional actions 
have been needed since we issued our recommendation.
    DHS is also an owner and user of UAS. Since 2005, CBP has flown UAS 
for border security missions. FAA granted DHS authority to operate UAS 
to support its National security mission along the United States 
northern and southern land borders, among other areas. Recently, DHS 
officials told us that DHS has also flown UAS over the Caribbean to 
search for narcotics-carrying submarines and speedboats. According to 
DHS officials, CBP owns ten UAS that it operates in conjunction with 
other agencies for various missions. As of May 2012, CBP has flown 
missions to support six Federal and State agencies along with several 
DHS agencies. These missions have included providing the National 
Oceanic and Atmospheric Administration with videos of damaged dams and 
bridges where flooding occurred or was threatened, and providing 
surveillance for DHS's Immigration and Customs Enforcement over a 
suspected smuggler's tunnel. DHS, DOD, and NASA, are working with FAA 
to identify and evaluate options to increase UAS access in the National 
airspace. DHS officials reported that if funding was available, they 
plan to expand their fleet to 24 total UAS that would be operational by 
fiscal year 2016, including 11 on the Southwest Border.
    The DHS Inspector General reviewed CBP's actions to establish its 
UAS program, the purpose of which is to provide reconnaissance, 
surveillance, targeting, and acquisition capabilities across all CBP 
areas of responsibility. The Inspector General assessed whether CBP has 
established an adequate operation plan to define, prioritize, and 
execute its unmanned aircraft mission. The Inspector General's May 2012 
report found that CBP had not achieved its scheduled or desired level 
of flight hours for its UAS. It estimated that CBP used its UAS less 
than 40 percent of the time it would have expected.\15\
---------------------------------------------------------------------------
    \15\ The report made four recommendations intended to improve CBP's 
planning of its UAS program to address its level of operation, program 
funding, and resource requirements, along with stakeholder needs.
---------------------------------------------------------------------------
            PRELIMINARY OBSERVATIONS ON EMERGING UAS ISSUES

    Our on-going work has identified several UAS issues that, although 
not new, are emerging as areas of further consideration in light of the 
efforts towards safe and routine access to the National airspace. These 
include concerns about: (1) Privacy as it relates to the collection and 
use of surveillance data, (2) the use of model aircraft, which are 
aircraft flown for hobby or recreation, and (3) the jamming and 
spoofing of the Global Positioning System (GPS).
   Privacy concerns over collection and use of surveillance 
        data.--Following the enactment of the UAS provisions of the 
        2012 FAA reauthorization act, Members of Congress, a civil 
        liberties organization, and others have expressed concern that 
        the increased use of UAS for surveillance and other purposes in 
        the National airspace has potential privacy implications. 
        Concerns include the potential for increased amounts of 
        Government surveillance using technologies placed on UAS as 
        well as the collection and use of such data. Surveillance by 
        Federal agencies using UAS must take into account associated 
        Constitutional Fourth Amendment protections against 
        unreasonable searches and seizures. In addition, at the 
        individual agency level, there are multiple Federal laws 
        designed to provide protections for personal information used 
        by Federal agencies. While the 2012 FAA reauthorization act 
        contains provisions designed to accelerate the safe integration 
        of UAS into the National airspace, proposed legislation in the 
        112th session of Congress, seeks to limit or serve as a check 
        on uses of UAS by, for example, limiting the ability of the 
        Federal Government to use UAS to gather information pertaining 
        to criminal conduct without a warrant.\16\
---------------------------------------------------------------------------
    \16\ Preserving Freedom from Unwarranted Surveillance Act of 2012, 
S. 3287, 112th Cong. (2012) and Farmer's Privacy Act of 2012, H.R. 
5961, 112th Cong. (2012).

    Currently, no Federal agency has specific statutory responsibility 
        to regulate privacy matters relating to UAS. UAS stakeholders 
        disagreed as to whether the regulation of UAS privacy-related 
        issues should be centralized within one Federal agency, or if 
        centralized, which agency would be best positioned to handle 
        such a responsibility. Some stakeholders have suggested that 
        FAA or another Federal agency should develop regulations for 
        the types of allowable uses of UAS to specifically protect the 
        privacy of individuals as well as rules for the conditions and 
        types of data that small UAS can collect. Furthermore, 
        stakeholders with whom we spoke said that developing guidelines 
        for technology use on UAS ahead of widespread adoption by law 
        enforcement entities may preclude abuses of the technology and 
        a negative public perception of UAS. Representatives from one 
        civil liberties organization told us that since FAA has 
        responsibility to regulate the National airspace, it could be 
        positioned to handle responsibility for incorporating rules 
        that govern UAS use and data collection. Some stakeholders have 
        suggested that the FAA has the opportunity and responsibility 
        to incorporate such privacy issues into the small UAS rule that 
        is currently underway and in future rulemaking procedures. 
        However, FAA officials have said that regulating these sensors 
        is outside the FAA's mission, which is primarily focused on 
        aviation safety, and has proposed language in its small UAS 
---------------------------------------------------------------------------
        Notice of Proposed Rulemaking to clarify this.

   Model aircraft.--According to an FAA official with whom we 
        spoke and other stakeholders, another concern related to UAS is 
        the oversight of the operation of model aircraft--aircraft 
        flown for hobby or recreation--capable of sustained flight in 
        the atmosphere and a number of other characteristics.\17\ 
        Owners of model aircraft do not require a COA to operate their 
        aircraft.\18\ Furthermore, as part of its 2012 reauthorization 
        act, FAA is prohibited from developing any rule or regulation 
        for model aircraft under a specified set of conditions.\19\ 
        However, the 2012 reauthorization act also specifies that 
        nothing in the act's model aircraft provisions shall be 
        construed to limit FAA's authority to take enforcement action 
        against the operator of a model aircraft who endangers the 
        safety of the National airspace system.\20\ The Federal Bureau 
        of Investigation report of the arrest and criminal prosecution 
        of a man plotting to use a large remote-controlled model 
        aircraft filled with plastic explosives to attack the Pentagon 
        and U.S. Capitol in September 2011 has highlighted the 
        potential for model aircraft to be used for non-approved or 
        unintended purposes.
---------------------------------------------------------------------------
    \17\ The 2012 reauthorization act defines the term ``model 
aircraft'' to mean an unmanned aircraft that is: (1) Capable of 
sustained flight in the atmosphere, (2) flown within visual line of 
sight of the person operating the aircraft, and (3) flown for hobby or 
recreational purposes.
    \18\ FAA's Advisory Circular 91-57 sets out model aircraft 
operating standards that encourage voluntary compliance with specified 
safety standards for model aircraft operators.
    \19\ This prohibition on FAA model aircraft rules or regulations 
only applies where the aircraft is: (1) Flown strictly for hobby or 
recreational use, (2) operated in accordance with a community-based set 
of safety guidelines and within the programming of a Nation-wide 
community-based organization, (3) limited to not more than 55 pounds 
(unless otherwise certified through a design, construction, inspection, 
flight test, and operational safety program administered by a 
community-based organization), (4) operated in a manner that does not 
interfere with and gives way to any manned aircraft, and (5) when flown 
within 5 miles of an airport, prior notice of the operation is given to 
the airport operator and the air traffic control tower.
    \20\ Pub. L. No. 112-95,  336, 126 Stat. 11.77 (2012).

    The Academy of Model Aeronautics, which promotes the development of 
        model aviation as a recognized sport and represents a 
        membership of over 150,000, published several documents to 
        guide model aircraft users on safety, model aircraft size and 
        speed, and use. For example, the Academy's National Model 
        Aircraft Safety Code specifies that model aircraft will not be 
        flown in a careless or reckless manner and will not carry 
        pyrotechnic devices that explode or burn, or any device that 
        propels a projectile or drops any object that creates a hazard 
        to persons or property (with some exceptions).\21\ The Academy 
        of Model Aeronautics also provides guidance on ``sense and 
        avoid'' to its members, such as a ceiling of 400 feet above 
        ground of aircraft weighing 55 pounds or less. However, apart 
        from FAA's voluntary safety standards for model aircraft 
        operators, FAA has no regulations relating to model aircraft. 
        Currently, FAA does not require a license for any model 
        aircraft operators, but according to FAA, the small UAS Notice 
        of Proposed Rule Making, under development and expected to be 
        published late 2012, may contain a provision that requires 
        certain model aircraft to be registered.
---------------------------------------------------------------------------
    \21\ The Academy of Model Aeronautics National Model Aircraft 
Safety Code allows members to fly devices that burn producing smoke and 
are securely attached to the model aircraft and use rocket motors if 
they remain attached to the model during flight. Model rockets may be 
flown but not launched from a model aircraft.
---------------------------------------------------------------------------
   GPS jamming and spoofing.\22\--The jamming and spoofing of 
        the communication signal between the UAS and ground control 
        station could also interrupt the command and control of UAS 
        operations. In a GPS jamming scenario, the UAS could 
        potentially lose its ability to determine where it is located 
        and in what direction it is traveling. Low-cost devices that 
        jam GPS signals are prevalent. According to one industry 
        expert, GPS jamming would become a larger problem if GPS is the 
        only method for navigating a UAS. This problem can be mitigated 
        by having a second or redundant navigation system on-board the 
        UAS that is not reliant on GPS. In addition, a number of 
        Federal UAS stakeholders we interviewed stated that GPS jamming 
        is not an issue for the larger, military-type UAS, as they have 
        an encrypted communications link on the aircraft. A stakeholder 
        noted that GPS jamming can be mitigated for small UAS by 
        encrypting its communications, but the costs associated with 
        encryption may make it infeasible. Recently, researchers at the 
        University of Texas demonstrated that the GPS signal 
        controlling a small UAS could be spoofed using a portable 
        software radio. The research team found that it was 
        straightforward to mount an intermediate-level spoofing attack 
        but difficult and expensive to mount a more sophisticated 
        attack.\23\ The emerging issues we identified not only may 
        exist as part of efforts to safely and routinely integrate UAS 
        into the National airspace, but may also persist once 
        integration has occurred. Thus, these issues may warrant 
        further examination both presently and in the future.
---------------------------------------------------------------------------
    \22\ GPS spoofing is when counterfeit GPS signals are generated for 
the purpose of manipulating a target receiver's reported position and 
time. Todd E. Humphreys, Detection Strategy for Cryptographic GNSS 
Anti-Spoofing, IEEE Transactions on Aerospace and Electronics Systems 
(August 2011).
    \23\ The presentation ``Assessing the Civil GPS Spoofing Threat'' 
by Todd Humphreys, Jahshan Bhatti, Brent Ledvina, Mark Psiaki, Brady 
O'Hanlon, Paul Kintner, and Paul Montgomery sought to assess the 
spoofing threat of a small civil UAS. The team built a civilian GPS 
spoofer and tested some countermeasures. They concluded that GPS 
spoofing is a threat to communications security and civil spoofing has 
not been the focus of research in open literature.
---------------------------------------------------------------------------
    Chairman McCaul, Ranking Member Keating, and Members of the 
subcommittee, this concludes my prepared statement. We plan to report 
more fully this fall on these same issues, including the status of 
efforts to address obstacles to the safe and routine integration of UAS 
into the National airspace. I would be pleased to answer any questions 
at this time.

    Mr. McCaul. Thank you, Dr. Dillingham, for your good work. 
The Chairman now recognizes another fellow Texan, Chief 
McDaniel.

  STATEMENT OF CHIEF DEPUTY WILLIAM R. MC DANIEL, MONTGOMERY 
             COUNTY SHERIFF'S OFFICE, CONROE, TEXAS

    Chief McDaniel. Thank you, sir.
    The Montgomery County Sheriff's Office is the seventh-
largest in the State of Texas, and is responsible for law 
enforcement services for a county that covers over 1,000 square 
miles and has a population of over 471,000. As indicated, it is 
an extremely fast-growing county. The county is diverse in 
geography as well as population, with an extremely urban area 
with a very dense population on our Southern Border with 
Houston and Harris County, to an extremely rural area in the 
northern portion of our county.
    The sheriff's office is committed to protecting the lives 
and the property of the people we serve, and since my sheriff 
took office in 2005, we have sought out new and better 
technology to enhance both our efficiency as well as our 
effectiveness in carrying out our public safety mission. I 
believe the UAV systems now available to public safety agencies 
are exactly the type of technology that will make us more 
successful. It is not just a law enforcement tool, but a public 
safety asset that can now be used by fire departments, 
emergency management offices, and probably other governmental 
units as well.
    The sheriff's office has owned a Shadow Hawk UAV since 
December 2011, having purchased it through a Homeland Security 
grant. Although we have not used it for an operational mission 
to date, we absolutely see its benefit and its mission profile 
for SWAT operations, high-risk warrants, locating lost persons, 
manhunts, hazardous material spills, fire scene, traffic 
accident investigations, or traffic management and observation 
due to hurricane evacuations.
    We did not obtain this for the purpose of surveillance. I 
do not believe small UAVs such as our Shadow Hawk are 
particularly designed or suited for that type of mission.
    Although the FAA has expertise in the aeronautical field, 
they do not have the necessary public safety mission experience 
to effectively oversee this type of operational environment. If 
Federal oversight is necessary, it would seem appropriate to 
establish it under the Department of Homeland Security. 
Different from the aeronautical component the FAA would 
continue to manage, DHS would manage the operational aspect by 
setting and enforcing operational guidelines and procedures, 
establish a database relating to the UAVs, agencies using them, 
mission results, and act as a resource and information tool for 
current and interested public safety agencies.
    Current case law supports the use of air assets by law 
enforcement, and I do not believe that it is necessary to 
introduce new legislation that would severely restrict the 
UAV's effectiveness. I encourage you to recognize unmanned 
aerial vehicle systems as an important tool for public safety 
agencies. I believe in this technology and its mission of 
protecting the citizens of my county, my State, and this 
Nation.
    [The prepared statement of Chief McDaniel follows:]

               Prepared Statement of William R. McDaniel
                             July 19, 2012

    Montgomery County is directly north of Houston and contiguous to 
Harris County. The county is diverse in both geography and population. 
The current census lists the population at over 471,000. It is 
approximately 1,042 square miles in size with highly populated urban 
areas in the southern portion of the county (The Woodlands) to very 
rural areas in the north. Sam Houston National Forest, situated in the 
northwestern portion of the county encompasses 47,609 acres. Situated 
in the middle of the county is Lake Conroe, a large lake (21,000 
acres), with a significant population surrounding it.
    In 2005, the Montgomery County Sheriff's Office began to explore 
various avenues to enhance our operational effectiveness. One idea was 
to obtain air assets for public safety response needs. We envisioned 
having an air asset that was multi-purpose and could be utilized in a 
variety of critical incidents to improve our ability to respond. 
Initially we looked at small aircraft (i.e. Cessna's, etc.) as well as 
helicopters. We looked at both new and used aircraft and quickly 
realized we did not have sufficient funding to purchase nor maintain 
such an item. As an example, a ``law enforcement'' helicopter, with 
associated equipment, would require over $2 million for the initial 
cost. We would be unable to fund full-time personnel to operate and 
maintain the aircraft. A small, fixed-wing aircraft would be less 
costly, around $400,000, but we would still have the same staffing 
issues. In addition, we compared operational costs and determined the 
hourly cost alone would be prohibitive, based on our budget.
    We are fortunate to be situated in an area with agencies (Houston 
PD, State Police, and DEA) that do have air assets and we have 
certainly called upon them to assist us in a variety of ways. It has 
been problematic; however, since these agencies also have budget 
constraints which limit their operational flight hours as well as their 
ability to respond. The problem has been further compounded by the need 
for these air assets to cover large areas or, because it may be a State 
or Federal asset, it is deployed to other areas of the State or 
country. They are, therefore, unavailable at times.
    We continued to review opportunities over the next few years. One 
such opportunity was a pilot project through the Department of Justice. 
The program was offering certain types of ``ultra-light'' aircraft for 
testing by law enforcement. A letter was sent to the DOJ representative 
on two different occasions; however, no response was ever received.
    In 2008, a call was received from the CEO of Vanguard Defense 
Industries (VDI) requesting a meeting to discuss the concept of a UAV 
for law enforcement. During our first meeting, a discussion was held 
regarding the practicality of using a UAV for law enforcement purposes. 
The platform being proposed was a small helicopter with a color video 
camera and Forward Looking Infrared (FLIR) capabilities. The aircraft 
could be launched quickly, provide an aerial view during a critical 
incident, and be economical to purchase and operate. We discussed at 
length the types of incidents we thought would be appropriate for its 
use. These included SWAT call-outs, high-risk warrants, manhunts, lost 
persons, and accident scene investigation (aerial photography). In 
meetings that followed, we expanded on its use to an overall public 
safety response instead of being geared strictly towards law 
enforcement. In addition to a law enforcement use, we envisioned fire 
departments and emergency management offices as agencies that would 
benefit from such an asset. We then added to the types of incidents it 
would be suitable for to include hazardous materials spills, fires, 
damage assessment, or traffic management observation due to hurricane 
evacuations.
    While VDI was working on the manufacturing component, we began to 
research funding sources and eventually submitted a grant proposal 
through the Department of Homeland Security's Urban Areas Security 
Initiative (UASI) program in December, 2010. The UASI project goal, 
identified in the grant project was, ``to enhance regional response 
capability.'' The grant was approved in June, 2011, and the delivery of 
the Shadowhawk was made in December, 2011. The total funding for the 
grant was $220,000. This included a 1-year maintenance agreement and 
air crew training for two personnel. Within a few months the Sheriff's 
Office purchased an upgraded guidance system, as well as an LED 
lighting system, to better identify the aircraft.
    In 2010, we also initiated our Certificate of Authorization (COA) 
application to the FAA. The web-based application process was 
relatively simple to complete and many email exchanges and phone 
conversations took place with FAA personnel. It was clear to us that 
this was somewhat ``uncharted waters'' for them and we were warned on 
several occasions that it would be a lengthy process. Once the final 
application was submitted, it was a number of months before the 
application was approved. The initial COA was renewed in 2012.
    To date, the Montgomery County Sheriff's Office has only had one 
opportunity to utilize the Shadowhawk for an operational mission; 
however, the FAA denied our request for an emergency COA, citing there 
had to exist a ``loss of life or potential loss of life'' before they 
would approve it. We certainly believed there to be a potential danger 
to the law enforcement officers who were going to conduct the mission. 
We opted to not press the issue at that point. To some critics, this 
would seem to be a waste of Federal tax dollars. I would point out, 
however, public safety operations are not static or particularly 
consistent. This is especially true with ``special missions.'' As an 
example, our SWAT unit responded 23 times in 2011 but has not been 
``called out'' in 2012. The need is there; however, and will continue 
to be. Those types of incidents we identified as being ideal for the 
Shadowhawk are actual types of incidents we have experienced over and 
over again in the past. It is only a matter of ``when'' the next such 
incident will occur.
    We continue to think of ways to deploy our UAV and one such example 
is utilizing a UAV to deliver a cellular phone or an emergency medical 
kit to a flood victim, stranded on the roof of a house. (Currently, the 
FAA prohibits this type of activity.) It would appear to be highly 
effective to send a UAV in to deploy a cellular phone, have a first 
responder explain to the victim what the procedures will be to be 
picked up by a helicopter or boat (excellent safety protocol) and then 
continue with the rescue operation or; be able to drop a first aid kit 
to a victim with a UAV in a timely manner so they can immediately 
address their basic first aid needs as opposed to forcing them to wait 
on medical help to be delivered by aircraft or boat (not very timely). 
In discussions we have had with the manufacturer of the Shadowhawk, it 
would be relatively easy to build the necessary platform for the 
Shadowhawk to ``drop'' supplies as stated. There are still, no doubt, 
scenarios we have not even dreamed of wherein the UAV could be used to 
benefit public safety.
    There has been a knee-jerk reaction to the use of UAV's by public 
safety agencies in the United States with National media outlets 
painting a dark picture of tens of thousands of ``drones'' being used 
daily to ``spy'' on citizens. We believe there is sufficient case law 
in place to establish, for the UAV community, the legal requirements 
and procedures for operation and also the necessary repercussions for 
those agencies who fail to comply with the legal mandates. UAV's 
operate just like their manned counterparts. Obviously, the primary 
difference is having a crew on the ground operating it as opposed to a 
crew operating the airborne aircraft. There has been case law developed 
over the years to deal with manned aircraft operations for public 
safety agencies. We believe these same laws would absolutely apply to 
UAV operations.
    Governmental entities, as identified and approved by the FAA, must 
follow strict guidelines and protocols and are extensively scrutinized 
by the FAA hierarchy for improper operations. The problem exists in the 
rank-and-file FAA hierarchy having no real concept of the needs of 
public safety agencies. It is my perception they tend to look at the 
use of UAV's with myopic vision. This was fine for past years as new 
technology, in the FAA domain, was scarce. Now that UAV technology is 
here, the FAA does not have the experience in its application. FAA 
staffers do not have the law enforcement, fire, or emergency management 
background to be able to relate to the mission of these agencies. The 
sole purpose of the FAA is to monitor them from an aeronautical 
standpoint only. Obviously, they are the experts in this environment; 
however, we believe they have no real understanding regarding the 
``critical mission'' aspect of UAV operations. If UAV operations remain 
under the oversight and control of the FAA, as is currently the case, 
domestic UAV operations will continue to be severely hampered or 
limited to the point of being useless.
    If it is necessary to require Federal oversight of UAV operations 
within the United States, it would seem to be most appropriate that The 
Office of State and Local Law Enforcement within DHS would be the 
likely agency at the Federal level to be tasked with this role. DHS 
would serve as a database, keeping track of the types of UAV's in use, 
agencies using them, types of missions the UAV is being flown, mission 
results, keeping track of case results (if used in response to a 
criminal offense--narcotics warrant/SWAT operation), etc. To this end, 
we would propose having DHS work as a liaison for local agencies that 
use UAV's. DHS could provide contact information, act as a resource and 
information tool, and as a monitoring/approving agency for public 
safety agency operations. Obviously, it is incumbent on such agencies 
to work through the COA approval process to allow the FAA the 
opportunity to scrutinize the aircraft, the associated operating 
systems, locations, etc. The FAA, however, does not need to go beyond 
that, other than the regular, routine review of agency flight 
operations to insure flight safety rules are being followed.
    UAV systems for public safety agencies are extremely viable, 
effective, and economical means to enhance the public safety response 
to critical incidents. The use of drones by public safety agencies is, 
ultimately, about protecting and making safe the citizens we serve. Too 
much focus is being made on the impractical application of UAV's and 
not about its true design and purpose.

    Mr. McCaul. Thank you, Chief.
    The Chairman now recognizes Ms. Stepanovich.

 STATEMENT OF AMIE STEPANOVICH, LITIGATION COUNSEL, ELECTRONIC 
                   PRIVACY INFORMATION CENTER

    Ms. Stepanovich. Mr. Chairman and Members of the 
subcommittee, thank you for the opportunity to testify today 
concerning the use of drones in the United States. My name is 
Amie Stepanovich. I am Association Litigation Counsel at the 
Electronic Privacy Information Center, a nonpartisan research 
organization in the District of Columbia that is focused on 
focusing public attention on emerging issues in privacy and 
civil liberties. We thank you for holding this hearing today, 
and believe it is very important to address these issues early.
    Drones greatly increase the capacity for domestic 
surveillance. Drones are specifically designed to carry highly 
invasive surveillance technology. They are cheaper to buy, 
maintain, and operate than typical aerial surveillance 
vehicles, and they can operate undetected in both urban and 
rural environments. Sensitive information collected by drones 
is particularly vulnerable to unlawful access. As previously 
discussed, drones are not secure.
    EPIC observed in comments to the FAA on drone test site 
locations that drone hacking poses a threat to the security of 
lawful drone operations. Hackers are not only able to gain 
control of drone movements, but they are also able to intercept 
the date feeds transmitted by a drone.
    We recognize that drone technology has very positive uses 
in the United States. It can be used to monitor for 
environmental abuse, help prevent the spread of forest fires, 
and assist in search-and-rescue operations. However, there are 
substantial legal and Constitutional issues involved in the 
deployment of aerial drones by Federal agencies.
    As drone technology becomes cheaper, it will also become 
more widespread and the threat to privacy will become more 
substantial. EPIC supports compliance with current Federal law 
for the deployment of drone technology and limitations for 
Federal agencies and other organizations that obtain drones for 
a specified purpose, but the current state of the law is 
insufficient to address the drone surveillance threat. 
Legislation is needed to protect against the use of drones in 
surveillance tools and to provide for redress against drone 
operators who fail to comply with those protections.
    Congress has directed the FAA to develop regulations that 
will encourage widespread deployment of drones in the United 
States. The forthcoming regulations will address licensing 
procedures for both public and private drone operators, 
including DHS, and the Customs and Border Protection Bureau, a 
DHS component. Earlier this year in a formal petition to the 
FAA, EPIC urged the agency to conduct a rulemaking to implement 
privacy rules for domestic drones. EPIC's petition was joined 
by more than 100 other organizations, experts, and members of 
the public who also believed that privacy rules are necessary 
before drones enter our domestic skies in a more widespread 
way. The FAA has not yet responded to EPIC's request for agency 
action, and this failure to act means that there is also no 
administrative framework in place to regulate drones in our 
skies.
    As has previously been mentioned, CBP currently operates 10 
drones in the United States. The DHS Inspector General recently 
assessed CBP's practice in making drones available by other 
Federal agencies, including the Department of Defense, the FBI, 
the Secret Service, many local law enforcement agencies, and 
others.
    Regarding privacy concerns, the Inspector General said that 
a standardized process was needed to request CBP drones for 
non-CBP purposes in order to provide transparency. To the 
extent that DHS chooses to operate drones within the United 
States, the agency must develop appropriate regulations to 
safeguard privacy. As you have indicated, Chairman McCaul, the 
privacy and security concerns arising from the use of drones 
needs to be addressed. Several of your colleagues have made 
efforts to address some of the privacy threats of drone. 
However, we believe those efforts are not sufficient.
    There are several simple steps that we believe can protect 
privacy as the use of drones increases in our skies. First, 
Congress should pass targeted legislation. An initial step 
would be the passage of Congressman Austin Scott's bill to 
limit drone surveillance in the United States in cases where a 
warrant has not been first obtained. However, to fully address 
the invasive nature of drones, new legislation must prohibit 
nonspecific untargeted drone surveillance, limit the use of 
drone surveillance data collected, transmitted, stored, or 
shared, and require notice of drone surveillance operations and 
policies. The law should also provide for independent audits 
and oversight.
    Second, Congress should expressly require Federal drone 
operators, including DHS and its components, to implement 
regulations subject to public notice and comment that address 
the privacy implications of drone use.
    Finally, I think Congress should clarify the circumstances 
under which drones purchased by CBP in pursuit of its mission 
may be deployed for other purposes. The failure to make clear 
the circumstances when Federal and State agencies may deploy 
drones for aerial surveillance has already raised significant 
concerns about the agency's programs.
    Once again I thank you for the opportunity to testify 
today, and I will be pleased to answer your questions.
    [The prepared statement of Ms. Stepanovich follows:]

                 Prepared Statement of Amie Stepanovich
                             July 19, 2012

    Mister Chairman and Members of the subcommittee, thank you for the 
opportunity to testify today concerning unmanned aerial systems, or 
drones, in the United States. My name is Amie Stepanovich. I am the 
associate litigation counsel at the Electronic Privacy Information 
Center.
    EPIC is a non-partisan research organization, established in 1994, 
to focus public attention on emerging privacy and civil liberties 
issues.\1\ We work with a distinguished panel of advisors in the fields 
of law, technology, and public policy.\2\ We have a particular interest 
in the protection of individual privacy rights against Government 
surveillance. In the last several years, EPIC has taken a particular 
interest in the unique privacy problems associated with aerial drones. 
We have urged the Federal Aviation Administration (``FAA''), as it 
considers new regulations to permit the widespread deployment of 
drones, to also develop new privacy safeguards.\3\
---------------------------------------------------------------------------
    \1\ About EPIC, EPIC, http://www.epic.org/about (last visited July 
16, 2012).
    \2\ EPIC Advisory Board, EPIC, http://www.epic.org/epic/
advisory_board.html (last visited July 16, 2012).
    \3\ Unmanned Aerial Vehicles (UAVs) and Drones, EPIC, http://
www.epic.org/privacy/drones (last visited July 16, 2012).
---------------------------------------------------------------------------
    In my statement today, I will describe the unique threats to 
privacy posed by drone surveillance, the problems with current legal 
safeguards, the EPIC petition to the FAA, and the need for Congress to 
act.
    We appreciate the subcommittee's interest in domestic drone use and 
its substantial impact on the privacy of individuals in the United 
States.

            I. AERIAL DRONES POSE A UNIQUE THREAT TO PRIVACY

    An unmanned aircraft, or drone, is an aerial vehicle designed to 
fly without a human pilot on board. Drones can either be remotely 
controlled or autonomous. Drones can be weaponized and deployed for 
military purposes.\4\ Drones can also be equipped with sophisticated 
surveillance technology that makes it possible to identify individuals 
on the ground. Gigapixel cameras used to outfit drones are among the 
highest-definition cameras available, and can provide ``real-time video 
streams at a rate of 10 frames a second.''\5\ On some drones, sensors 
can track up to 65 different targets across a distance of 65 square 
miles.\6\ Drones may also carry infrared cameras, heat sensors, GPS, 
sensors that detect movement, and automated license plate readers.\7\ 
Drones are currently being developed that will carry facial recognition 
technology, able to remotely identify individuals in parks, schools, 
and at political gatherings.\8\
---------------------------------------------------------------------------
    \4\ See, e.g., Predator B UAS, General Atomics Aeronautical, http:/
/www.ga-asi.com/products/aircraft/predator_b.php (last visited June 25, 
2012); X-47B UCAS, Northrop Grumman, http://www.as.northropgrumman.com/
products/nucasx47b/index.html (last visited July 16, 2012).
    \5\ US Army Unveils 1.8 Gigapixel Camera Helicopter Drone, BBC News 
Technology (Dec. 29, 2011), http://www.bbc.co.uk/news/technology-
16358851.
    \6\ Id.
    \7\ Customs and Border Protection Today, Unmanned Aerial Vehicles 
Support Border Security (July/Aug. 2004), available at http://
www.cbp.gov/xp/CustomsToday/2004/Aug/other/aerial_vehicles.xml.
    \8\ Clay Dillow, Army Developing Drones that Can Recognize Your 
Face From a Distance, PopSci (Sept. 28, 2011, 4:01 PM), http://
www.popsci.com/technology/article/2011-09/army-wants-drones-can-
recognize-your-face-and-read-your-mind.
---------------------------------------------------------------------------
    In a report on drones published by EPIC in 2005, we observed, ``the 
use of [drones] gives the federal government a new capability to 
monitor citizens clandestinely, while the effectiveness of the . . . 
surveillance planes in border patrol operations has not been 
proved.''\9\ Today, drones greatly increase the capacity for domestic 
surveillance.
---------------------------------------------------------------------------
    \9\ Spotlight on Surveillance: Unmanned Planes Offer New 
Opportunities for Clandestine Government Tracking (August 2005), EPIC, 
http://epic.org/privacy/surveillance/spotlight/0805/ (last visited July 
16, 2012).
---------------------------------------------------------------------------
    Much of this surveillance technology could, in theory, be deployed 
in manned vehicles. However, drones present a unique threat to privacy. 
Drones are designed to undertake constant, persistent surveillance to a 
degree that former methods of surveillance were unable to achieve. 
Drones are cheaper to buy, maintain, and operate than helicopters, or 
other forms of aerial surveillance.\10\ Drone manufacturers have 
recently announced new designs that would allow drones to operate for 
more than 48 consecutive hours,\11\ and other technology could extend 
the flight time of future drones out into weeks and months.\12\ Also, 
``by virtue of their design, size, and how high they can fly, [drones] 
can operate undetected in urban and rural environments.''\13\
---------------------------------------------------------------------------
    \10\ Nick Wingfield and Somini Sengupta, Drones Set Sights on U.S. 
Skies, NY Times (Feb. 17, 2012), available at http://www.nytimes.com/
2012/02/18/technology/drones-with-an-eye-on-the-public-cleared-to-
fly.html?pagewanted=all; http://www.wired.com/autopia/2012/05/drone-
auto-vids/; Sabrina Hall, Shelby County Sheriff's Department Wants 
Drones, WREG (May 3, 2012), available at http://wreg.com/2012/05/03/
shelby-county-sheriffs-department-wants-drones/. Drones can run from 
$300 for the most basic drone, able to record and transmit video, to 
$18 million for a General Atomics Predator B drone, the model owned by 
the United States Bureau of Customs and Border Protection. See Parrot 
AR.Drone 2.0, Apple, http://store.apple.com/us/product/H8859ZM/A (last 
visited July 16, 2012); Office of the Inspector Gen., Dep't Homeland 
Security, OIG-12-85, CBPs Use of Unmanned Aircraft Systems in the 
Nation's Border Security (May 2012), available at http://
www.oig.dhs.gov/assets/Mgmt/2012/OIG_12-85_May12.pdf [hereinafter DHS 
OIG Report] at 2.
    \11\ Mark Brown, Lockheed Uses Ground-Based Laser to Recharge Drone 
Mid-Flight (July 12, 2012), available at http://www.wired.co.uk/news/
archive/2012-07/12/lockheed-lasers.
    \12\ Steven Aftergood, Secret Drone Technology Barred by 
``Political Conditions'' (Mar. 22, 2012), available at http://
www.fas.org/blog/secrecy/2012/03/sandia_drone.html.
    \13\ Jennifer Lynch, Are Drones Watching You?, Electronic Frontier 
Foundation (Jan. 10, 2012), available at https://www.eff.org/deeplinks/
2012/01/drones-are-watching-you.
---------------------------------------------------------------------------
    The ability to link facial recognition capabilities on drones 
operated by the Department of Homeland Security (``DHS'') to the 
Federal Bureau of Investigation's Next Generation Identification 
database or DHS' IDENT database, two of the largest collections of 
biometric data in the world, exacerbates the privacy risks.\14\ Drones 
could be deployed to monitor individuals in a way that was not possible 
previously.
---------------------------------------------------------------------------
    \14\ See Next Generation Identification, Federal Bureau of 
Investigation, http://www.fbi.gov/about-us/cjis/
fingerprints_biometrics/ngi/ngi2/ (last visited July 16, 2012); Privacy 
Impact Assessment, Department of Homeland Security, Automated Biometric 
Identification System (IDENT) (July 31, 2006), http://www.dhs.gov/
xlibrary/assets/privacy/privacy_pia_usvisit_- 
ident_final.pdf.
---------------------------------------------------------------------------
    Sensitive information collected by drones is particularly 
vulnerable to unlawful access. In comments addressing the issue of 
drone test site locations, EPIC observed, ``drone hacking,'' or the 
process of remotely intercepting and compromising drone operations, 
poses a threat to the security of lawful drone operations.\15\ Recent 
examples have highlighted the ease with which drones may be ``hacked''. 
The University of Texas was able to use GPS signals in order to gain 
full control of a drone.\16\ The researchers indicated that the method 
could be use on any drone operated over the civilian GPS band, which 
include the majority of drones in the United States.\17\ Hackers are 
also able to intercept video and audio feeds, as well as other 
information collected and transmitted by surveillance drones.\18\
---------------------------------------------------------------------------
    \15\ Comments of EPIC to the FAA re: Request for Comments on 
Unmanned Aircraft System Test Sites (May 8, 2012), available at http://
epic.org/privacy/drones/EPIC-FAA-2012-0252.pdf.
    \16\ Alex Fitzpatrick, Researchers Prove Drones Can Be Hacked, 
Mashable (June 29, 2012), available at http://mashable.com/2012/06/29/
drone-hacking/.
    \17\ Id.
    \18\ Siobhan Gorman, Yochi Dreazen, and August Cole, Insurgents 
Hack U.S. Drones, Wall St. J. (Dec. 17, 2009), available at http://
online.wsj.com/article/SB126102247889095011.html.
---------------------------------------------------------------------------
    Within DHS, the Bureau of Customs and Border Protection (``CBP'') 
is the primary operator of unmanned aerial drones. CBP operates ten 
drones in the United States, including the Predator B and its maritime 
variant the Guardian, at a cost per unit of about $18 million each.\19\ 
By 2016, CBP plans to operate 24 drones, with the ability to deploy one 
anywhere in the continental United States within 3 hours.\20\
---------------------------------------------------------------------------
    \19\ See DHS OIG Report, supra note 11 at 2.
    \20\ William Booth, More Predator Drones Fly U.S.-Mexico Border, 
WASH. POST (Dec. 21, 2011), available at http://www.washingtonpost.com/
world/more-predator-drones-fly-us-mexico-border/2011/12/01/
gIQANSZz80_story.html.
---------------------------------------------------------------------------
    But there are problems with the CBP program. According to a recent 
report of the DHS Inspector General, CBP ``needs to improve planning of 
its unmanned aircraft systems program to address its level of 
operation, program funding, and resource requirements, along with 
stakeholder needs.''\21\ The Inspector General assessed CBP's practice 
of making the drones available for use by other Federal and State 
agencies, including the Bureau of Land Management, the Department of 
Defense, the Federal Bureau of Investigation, the Texas Rangers, the 
United States Forest Service, the National Oceanic and Atmospheric 
Administration, the Office of Border Patrol, the United States Secret 
Service, the Immigrations and Customs Enforcement, the Federal Agency 
Management Agency, and local Law Enforcement Agencies.\22\
---------------------------------------------------------------------------
    \21\ See DHS OIG Report, supra note 11 at 1.
    \22\ Id. at 6-7.
---------------------------------------------------------------------------
    The Inspector General concluded that all purchases of new drones 
should be suspended until CBP develops a plan that addresses 
``necessary operations, maintenance, and equipment.''\23\ Regarding 
privacy concerns, the DHS Inspector General said that a standardized 
process was needed to request CBP drones for non-CBP purposes, in order 
to ``provide transparency.''\24\
---------------------------------------------------------------------------
    \23\ Id. at 8
    \24\ Id. at 7.
---------------------------------------------------------------------------
             II. CURRENT PRIVACY SAFEGUARDS ARE INADEQUATE

    Current regulations permit civil organizations to operate a drone 
within the United States only pursuant to a special ``experimental'' 
designation.\25\ However, Government operators of drones do not have a 
similar restriction.\26\ Recent policy changes at the FAA, the 
administrative agency in charge of licensing both Governmental and non-
Governmental drones to operate in the National airspace, are designed 
to ``streamline'' the process by which Government agencies, including 
law enforcement, receive drone licenses.\27\
---------------------------------------------------------------------------
    \25\ See Fact Sheet, FAA, Unmanned Aircraft Systems (UAS) (Dec. 1, 
2010), available at http://www.faa.gov/news/fact_sheets/
news_story.cfm?newsid=6287 (``A Special Airworthiness Certificate in 
the Experimental Category is the only certification available to civil 
operators of UAS.'').
    \26\ See Id. (``The COA process is available to public entities, 
such as government agencies (including local law enforcement and state 
universities), who want to fly a UAS in civil airspace.'').
    \27\ See FAA Makes Progress with UAS Integration, Federal Aviation 
Administration, (May 14, 2012, 3:09 PM) http://www.faa.gov/news/
updates/?newsId=68004 (``The FAA has been working with its government 
partners to streamline COA procedures as part of the effort to ensure 
[drones] are safely integrated into the [national airspace system].'').
---------------------------------------------------------------------------
    The CBP currently operates drones with few regulations concerning 
privacy. No current legislation limits the visual surveillance that a 
DHS drone may engage in. And while the Privacy Act of 1974 expressly 
prescribes the circumstances under which agencies can retain personally 
identifiable information, the agency may still exempt itself from the 
Privacy Act provisions that limit the collection and use of personal 
information.\28\ DHS has not sought public comment on or published any 
specific rules or guidelines that restrict the surveillance practices 
of its drone program. Also, despite recent releases of records, the 
FAA's process for the application for and approval of a drone license 
are still mostly opaque, preventing any transparency or accountability 
for operators.\29\
---------------------------------------------------------------------------
    \28\ See e.g. 5 U.S.C.  552a(j) (allowing agencies to exempt 
themselves from maintenance requirements pursuant to law enforcement 
reasons).
    \29\ See FAA Releases Lists of Drone Certificates--Many Questions 
Left Unanswered, Electronic Frontier Foundation, (Apr. 19, 2012) 
https://www.eff.org/deeplinks/2012/04/faa-releases-its-list-drone-
certificates-leaves-many-questions-unanswered (listing information 
about the FAA's drone authorization process that remains unknown).
---------------------------------------------------------------------------
    There are substantial legal and Constitutional issues involved in 
the deployment of aerial drones by Federal agencies that need to be 
addressed. And, as we have noted, no legislation currently provides 
adequate safeguards to protect privacy rights against the increased use 
of drones in the United States.
    As drone technology becomes cheaper and more proliferate, the 
threat to privacy will become more substantial. High-rise buildings, 
security fences, or even the walls of a building are not barriers to 
increasingly common drone technology.
    The Supreme Court is aware of the growing risks to privacy 
resulting from new surveillance technology but has yet to address the 
specific problems associated with drone surveillance. In United States 
v. Jones, a case that addressed whether the police could use a GPS 
device to track the movement of a criminal suspect without a warrant, 
the Court found that the installation and deployment of the device was 
an unlawful search and seizure.\30\ Justice Sotomayor in a concurrence 
pointed to broader problems associated with new forms of persistent 
surveillance.\31\ And Justice Alito, in a separate concurrence joined 
by three other Justices, wrote, ``in circumstances involving dramatic 
technological change, the best solution to privacy concerns may be 
legislative.''\32\
---------------------------------------------------------------------------
    \30\ United States v. Jones, 132 S.Ct. 945, 949 (2012). See also 
U.S. v. Jones, EPIC, http://epic.org/amicus/jones/.
    \31\ Id. at 954-57.
    \32\ Id. at 964.
---------------------------------------------------------------------------
    As you have indicated, Mister Chairman, the privacy and security 
concerns arising from the use of drones needs to be addressed.\33\ 
Several of your colleagues in the House of Representatives have made 
efforts to address some of the privacy threats of drones, and we 
support these initiatives.
---------------------------------------------------------------------------
    \33\ Press Release, United States House of Representatives 
Committee on Homeland Security, A Look Ahead: House Committee on 
Homeland Security (July 13, 2012), available at http://
homeland.house.gov/press-release/look-ahead-house-committee-homeland-
security-34 (``However, no Federal agency is taking responsibility for 
creating comprehensive policies and regulations concerning the use of 
these systems domestically. Additionally, vulnerabilities to `drone' 
hackers exist, as recently demonstrated by researchers at the 
University of Texas, raising concerns these vehicles could be 
commandeered by terrorists or others with ill intent.'').
---------------------------------------------------------------------------
    An amendment to the National Defense Authorization Act of 2013, 
introduced by Congressman Jeff Landry (R-LA) and passed by the House, 
would prohibit information collected by drones operated by the 
Department of Defense from being used in court as evidence if a warrant 
was not obtained.\34\ In June, House Representative Austin Scott (R-FL) 
introduced legislation to expand this protection, requiring all law 
enforcement to first obtain a warrant before conducting any criminal 
surveillance.\35\ Also, Congressman Markey (D-MA) and Congressman 
Barton (R-TX) sent a letter to the FAA raising concerns about the 
increased use of drones in the United States, noting, ``there is . . . 
potential for drone technology to enable invasive and pervasive 
surveillance without adequate privacy protections.''\36\
---------------------------------------------------------------------------
    \34\ See H.R. 4310, 112th Cong.  1084 (2012), available at http://
www.gpo.gov/fdsys/pkg/BILLS-112hr4310rfs/pdf/BILLS-112hr4310rfs.pdf; 
see also Pete Kasperowicz, House Approves 20 en bloc Amendments to 
Defense Reauthorization, Including Satellite Language, the Hill (May 
17, 2012), available at http://thehill.com/blogs/floor-action/house/
228147-ndaa-update-1-house-approves-20-en-bloc-amendments-including-
satellite-language.
    \35\ Preserving Freedom from Unwarranted Surveillance Act of 2012, 
H.R. 5925, 112th Cong. (2012), available at http://thomas.loc.gov/cgi-
bin/query/z?c112:H.R.5925:.
    \36\ Letter from Congressmen Edward J. Markey and Joe Barton to 
Michael Huerta, Acting Federal Aviation Administration Administrator 
(Apr. 19, 2012) available at http://markey.house.gov/sites/
markey.house.gov/files/documents/4-19-12.Letter%20FAA%20Drones- 
%20.pdf.
---------------------------------------------------------------------------
    However, these measures are not sufficient to protect the myriad of 
privacy interests implicated by increased drone use.

   III. EPIC HAS URGED THE ADMINISTRATIVE ACTION TO ADDRESS DRONE USE

    The FAA has been directed by Congress to develop regulations in 
order to permit more widespread deployment of drones in the United 
States.\37\ The forthcoming regulations will address licensing and 
procedures for both public and private drone operators, including DHS 
and CBP. Experts, including Professor Ryan Calo, the former Director of 
Privacy and Robotics at the Center for Internet and Society at Stanford 
Law School, have noted that this effort will have significant privacy 
implications.\38\
---------------------------------------------------------------------------
    \37\ See FAA Modernization and Reform Act of 2012, Pub. L. 112-95  
324(c)(1) (2012), available at http://thomas.loc.gov/cgi-bin/query/
z?c112:H.R.658:.
    \38\ See, M. Ryan Calo, The Drone as a Privacy Catalyst, 64 Stan. 
L. Rev. Online 29 (2011), available at http://
www.stanfordlawreview.org/online/drone-privacy-catalyst; see also Ryan 
Calo and John Villasenor, Ten Myths About Drones, Huffington Post (May 
22, 2012), http://www.huffingtonpost.com/ryan-calo/drones-
myths_b_1537040.html; Drones Over America: What Can They See, NPR (Mar. 
12, 2012), available at http://www.npr.org/2012/03/12/148293470/drones-
over-america-what-can-they-see.
---------------------------------------------------------------------------
    Earlier this year, in a formal petition to the agency, EPIC urged 
the FAA to conduct a privacy rulemaking on the use of drones, with the 
aim of creating regulations to ensure baseline privacy protections.\39\ 
EPIC's petition was joined by more than 100 organizations, experts, and 
members of the public who also believe that drones should not be more 
widely deployed until privacy safeguards are established.\40\
---------------------------------------------------------------------------
    \39\ Petition from EPIC, et al., to Michael P. Huerta, Acting 
Administrator, FAA (Feb. 24, 2012), available at http://epic.org/
privacy/drones/FAA-553e-Petition-03-08-12.pdf [hereinafter EPIC 
Petition to FAA].
    \40\ Id.
---------------------------------------------------------------------------
    The FAA has thus far failed to respond to EPIC's request for agency 
action. The FAA's failure to act means that there is no framework in 
place that ensures that civilian operators and Federal agencies, such 
as DHS, utilize drone technology in a privacy-protective manner. To the 
extent that DHS, as well as other agencies, chooses to operate drones 
within the United States, we believe that the DHS should also develop 
appropriate regulations to safeguard privacy.
    Specifically, the Department of Homeland Security must utilize its 
Privacy Office, one of the most robust, well-funded Privacy Offices in 
the Federal Government. The Privacy Office at DHS ``conducts [Privacy 
Impact Assessments] on technologies, rulemakings, programs, and 
activities . . . to ensure that privacy considerations and protections 
are incorporated into all activities of the Department.''\41\
---------------------------------------------------------------------------
    \41\ Guide to Implementing Privacy, Department of Homeland Security 
(June 2010), http://www.dhs.gov/xlibrary/assets/privacy/
dhsprivacyoffice-guidetoimplementingprivacy.pdf at 14.
---------------------------------------------------------------------------
    However, despite a DHS component operating one of the largest, and 
definitely the most well-publicized drone fleet in the United States 
for the past 7 years, a Privacy Impact Assessment has never been 
conducted on the privacy impact of drone surveillance. At a minimum, we 
believe that if the CPB plans to continue the drone program, the DHS 
privacy office must assess the privacy impact of the program and 
publish a report for public review.

 IV. CONGRESS SHOULD ESTABLISH SAFEGUARDS RELATED TO THE USE OF DRONES

    There are several strategies to provide meaningful privacy 
protections that address the increased use of drones in our domestic 
skies. First, Congress should pass targeted legislation, based on 
principles of transparency and accountability. A first step would be 
the consideration and passage of Congressman Scott's bill to limit the 
use of drone surveillance in criminal investigations without a warrant.
    State and local governments have also considered laws and 
regulations to further prevent abuses of drone technology.\42\ These 
proposals would serve as a good basis for Federal legislation. Drone 
legislation should include:
---------------------------------------------------------------------------
    \42\ See, e.g., Erika Neddenien, ACLU Teams with Lawmaker to Push 
Regulation of Unmanned Drones in VA, WTVR (July 12, 2012) http://
wtvr.com/2012/07/12/aclu-working-with-lawmaker-to-push-regulation-of-
unmanned-drones-in-va/  (last visited July 16, 2012); Press Release, 
Seattle City Council, Seattle City Council Committee to Discuss Drones 
in Seattle and the Issues They Present (May 1, 2012), available at 
http://council.seattle.gov/2012/05/01/seattle-city-council-committee-
to-discuss-drones-in-seattle-and-the-issues-they-present/.
---------------------------------------------------------------------------
   Use Limitations.--Prohibitions on general surveillance that 
        limit drone surveillance to specific, enumerated circumstances, 
        such as in the case of criminal surveillance subject to a 
        warrant, a geographically-confined emergency, or for reasonable 
        non-law enforcement use where privacy will not be substantially 
        affected;
   Data Retention Limitations.--Prohibitions on retaining or 
        sharing surveillance data collected by drones, with emphasis on 
        identifiable images of individuals;
   Transparency.--Requiring notice of drone surveillance 
        operations to the extent possible while allowing law 
        enforcement to conduct effective investigations. In addition, 
        requiring notice of all drone surveillance policies through the 
        Administrative Procedure Act.
    These three principles would help protect the privacy interests of 
individuals. In addition, the law should provide for accountability, 
including third-party audits and oversight for Federally-operated 
drones and a private right of action against private entities that 
violate statutory privacy rights.
    Second, Congress should act to expressly require Federal agencies 
that choose to operate drones, such as DHS and its components, to 
implement regulations, subject to public notice and comment, that 
address the privacy implications of drone use. Recently, in EPIC v. 
DHS, the D.C. Circuit Court of Appeals ruled that the Department of 
Homeland Security violated the Administrative Procedure Act when it 
chose to deploy body scanners as the primary screening technique in 
U.S. airports without the opportunity for public comment.\43\ The Court 
observed that there was ``no justification for having failed to conduct 
a notice-and-comment rulemaking.''\44\ We believe that the public has a 
similar right to comment on new surveillance techniques, such as 
unmanned aerial vehicles, undertaken by Federal agencies within the 
United States.
---------------------------------------------------------------------------
    \43\ See EPIC v. DHS, 653 F.3d 1 (D.C. Cir. 2011).
    \44\ Id. at 8.
---------------------------------------------------------------------------
    Finally, Congress must clarify the circumstances under which the 
drones purchased by the CBP in pursuit of its mission may be deployed 
by other agencies for other purposes. The failure to make clear the 
circumstances when Federal and State agencies may deploy drones for 
aerial surveillance has already raised significant concerns about the 
agency's program.\45\
---------------------------------------------------------------------------
    \45\ See Jason Koebler, First Man Arrested with Drone Evidence Vows 
to Fight Case, US News (Apr. 9, 2012), available at http://
www.usnews.com/news/articles/2012/04/09/first-man-arrested-with-drone-
evidence-vows-to-fight-case.
---------------------------------------------------------------------------
                             V. CONCLUSION

    The increased use of drones to conduct surveillance in the United 
States must be accompanied by increased privacy protections. We 
recognize that drone technology has the potential to be used in 
positive ways. For example, drones may be used to monitor for 
environmental abuse, prevent the spread of forest fires, and assist in 
the rescue of individuals in dangerous situations.\46\
---------------------------------------------------------------------------
    \46\ See, e.g., Tim Wall, Flying Drones Fight Fires, Discovery News 
(Nov. 10, 2011), available at http://news.discovery.com/earth/flying-
drones-fight-fires-111110.html; Meghan Keneally, Drone Plane Spots a 
River of Blood Flowing From the Back of a Dallas Meat Packing Plant, 
Daily Mail Online (Jan. 24, 2012), available at http://
www.dailymail.co.uk/news/article-2091159/A-drone-plane-spots-river-
blood-flowing-Dallas-meat-packing-plant.html; Sean Holstege, Drones' 
Good Flies Hand in Hand with Bad, Experts Fear, AZCentral (July 7, 
2012), available at http://www.azcentral.com/12news/news/articles/2012/
07/07/20120707arizona-unmanned-drones-concerns.html.
---------------------------------------------------------------------------
    However, the current state of the law is insufficient to address 
the drone surveillance threat. EPIC supports legislation aimed at 
strengthening safeguards related to the use of drones as surveillance 
tools and allowing for redress for drone operators who fail to comply 
with the mandated standards of protection. We also support compliance 
with the Administrative Procedure Act for the deployment of drone 
technology and limitations for Federal agencies and other organizations 
that initially obtain a drone for one purpose and then wish to expand 
that purpose.
    Thank you for the opportunity to testify today. I will be pleased 
to answer your questions.

    Mr. McCaul. Thank you, Ms. Stepanovich.
    Let me start first with Mr. Dillingham. You mentioned, as I 
did in my opening statement, TSA identified a potential 
terrorist threat through the use of these UAV systems, the FARC 
in Colombia, and they talk about Hezbollah. Then, of course, 
their concerns really came to fruition last September when it 
was reported by the Associated Press: Man to blow up Pentagon 
and U.S. Capitol is arrested, and this was a drone that he was 
going to use to do that.
    Mr. Dillingham. Yes, sir.
    Mr. McCaul. The United States Capitol and the Pentagon, the 
very targets of 9/11. Yet the Department and as you recommended 
through the GAO, the Department has a role in this to provide a 
security assessment and a National policy. The Department 
apparently disagrees with you and frankly disagrees with me as 
the Chairman, and has refused to provide testimony before this 
committee here today. I find that reprehensible. I believe the 
Department should come before this committee to answer why they 
believe they should not have a role in this, when they had a 
direct threat to the United States Capitol and the Pentagon, 
and yet they don't see it as a role of the Department of 
Homeland Security to come up with a policy and a security 
assessment to monitor the threat that these domestic drones can 
pose to the American people.
    Do you have any idea what their rationale is?
    Mr. Dillingham. Mr. Chairman, we specifically followed up 
in preparation for this hearing. But before that, the GAO has a 
policy of once we issue a recommendation that we do periodic 
follow-ups because those agencies are not only responsible for 
reporting to the GAO, but they also report to the Congress. So 
we followed up most recently and asked the TSA again about 
their position: Had their position changed? They indicated that 
their position had not changed, but they added--their added 
comments were that they were doing, they were taking actions 
that they thought were sufficient to address the issue.
    As you know, one of the central tenets of TSA's security 
are risk analysis or risk assessment so that they know where 
they would best deploy their resources. So we asked for some 
evidence of risk assessment that was done with regard to UAVs 
or UASs. We were not able to obtain that from DHS.
    So we still think that our recommendation is valid and 
needed to be addressed. For balance, though, let me say that 
DHS is participating with the Joint Planning and Development 
Office as part of the cross-Government-wide development for 
plans. But in terms of exactly what the nature and scope of 
that participation is beyond being members of that particular 
group, we were not able to ascertain at this point. But we 
continue to work that issue for our full report.
    Mr. McCaul. Well, I can't ascertain it either. If they 
won't come before this committee to describe what they are 
doing, how can we possibly know what they are doing? You said 
they have taken certain precautions, but yet they will not come 
before this committee to tell us what precautions they are 
taking. They have defied not only you but I think the will of 
this committee and the will of the American people. I am not 
pleased about that, obviously.
    Let me go to Chief McDaniel. You actually received Homeland 
Security grants to purchase these drones; is that correct?
    Chief McDaniel. That is correct.
    Mr. McCaul. But yet they have no role?
    Chief McDaniel. No, sir.
    Mr. McCaul. I hope you are saying that facetiously. You 
said you believe that there needs to be Federal oversight by 
the Department of Homeland Security; is that correct?
    Chief McDaniel. Yes, sir. There is a difference between the 
aviation aspect of it that certainly the FAA is entitled to as 
experts in that environment, but they do not have the 
understanding and the expertise that I believe an agency such 
as the DHS would have in understanding the operational roles 
and missions that, in our case, law enforcement would have and 
the needs that we would have.
    Mr. McCaul. I tend to agree with you. I think FAA provides 
the safety of the routes but not security.
    Tell me just very briefly the legitimate law enforcement 
purposes. I do believe there is a legitimate law enforcement 
purpose for the use of these domestically. Can you expand on 
that?
    Chief McDaniel. Well, we have periodic needs for our SWAT 
team to be called out and respond to critical incidents 
involving barricaded suspects, high-risk warrants, and this is 
an asset that provides that incident commander with a 
situational awareness to see everything that is going on within 
that incident so that he can better manage that incident and 
bring it to a safe conclusion.
    Mr. McCaul. I agree. I think it should be limited to a 
specific instance or mission within a legitimate law 
enforcement purpose. I think what most American people do not 
want to see are thousands of these drones being eyes of the 
skies, sort of spying on the American people.
    That takes me to you, Ms. Stepanovich. When it comes to the 
privacy issues, which I think are of legitimate concern, I 
think people can accept if these are being used for a manhunt, 
as we use law enforcement helicopters. They are used in the sky 
for various legitimate law enforcement purposes. What they 
don't want to see is sort of spying without any mission 
involved in the plan. So there is no policy.
    The Department of Homeland Security has an Office of 
Privacy. Don't you believe they should be involved in working 
with people like yourself and people like the sheriff and 
people like the GAO to develop a privacy policy?
    Ms. Stepanovich. EPIC does believe that. In fact, we 
believe that a great first step, DHS has the most robust 
privacy office in the Federal Government, and they have not 
even done a privacy impact assessment on their own drone 
program, which is also one of the most robust and definitely 
one of the most well-publicized programs in the Federal 
Government. So they have not even gone in to determine what 
impact these drones will have on the American public as they 
use them. We think that would be a great first step, and then 
after that has been completed, to really go in and to monitor 
these and determine what they can be used for and what they 
cannot be used for.
    Mr. McCaul. Let me just conclude by saying that while you 
all may not agree on all of the issues, one thing you do agree 
on is that DHS has a role here to play, whether it is providing 
a security analysis, working with the State and locals and with 
privacy. I hope this hearing gets their attention. I hope your 
testimony gets their attention to step up to the plate and do 
something about this.
    With that, I recognize the Ranking Member, Mr. Keating.
    Mr. Keating. Thank you, Mr. Chairman.
    Chief McDaniel, I am not saying by any stretch of the 
imagination you would do this, but just a question for you: If 
there was a law enforcement person, chief or other official, 
for instance, who wanted to replace the rubber bullets with 
real bullets, do you know of any State law, rule, regulation, 
that could stop anyone from doing that in place right now?
    Chief McDaniel. I am not aware of any law within the State 
of Texas that would prevent that; no, sir.
    Mr. Keating. I would suggest that that is probably typical 
for all States. Do you think that we should be looking at this 
both at the Federal and State level?
    Chief McDaniel. Certainly I can understand it as being a 
concern. The actuality of that ever occurring is slim and none, 
in my view, based upon the platform, the accuracy that would be 
required, all of those things that go into a lethal or less-
than-lethal-force situation. I do not believe these UAVs are 
appropriate for that type of a weapons platform.
    Mr. Keating. Thank you.
    A question for Ms. Stepanovich. I can just envision, 
probably in the more extreme example, the paparazzi or someone 
else--you know how they invade someone's privacy right now--
abusing these vehicles. Is there any way even besides criminal 
law and other law, is there a way that we could trace someone 
who is photographing or doing video cam work on people in their 
private lives out in their backyard or in front of a pool or 
wherever, is there any way we can trace that so there can be 
civil action? Do you think there is available civil action that 
could be brought forward?
    Ms. Stepanovich. On the State level, there could be civil 
action in some States. You would have to look to the Peeping 
Tom laws. However, some of those are very, very specific and 
they require the motivation to catch a person in a state of 
undress. Other than that, there really is no legislation that 
would address those circumstances. Right now with the opaque 
process for licensing these drones to be used and the fact that 
hobbyists can gain control of a drone and use it without 
getting a license at all, there is additional barriers too, 
especially the paparazzi using these.
    Mr. Keating. In addition to Homeland Security, do you 
believe the FAA should be involved in setting these kinds of 
regulations?
    Ms. Stepanovich. I believe the FAA has a role. It do not 
believe that they are set up to go the full distance that the 
Department of Homeland Security can go. However, they are the 
licensing authority, and in their authority they have the 
ability to request the description of what a drone is going to 
be licensed for and what they will be used for and to hold the 
licensee to task for that purpose. We don't believe that is 
taking place right now, and we think that would be an 
appropriate function of the FAA.
    Mr. Keating. I will just conclude by commenting that I 
agree with the Chairman as well. There is some need of some 
kind of oversight because people's privacy rights are in 
danger. There is a potential for terrorist activities that are 
involved and misuse that way. There should be some kind of 
control other than the good common sense of law enforcement as 
to how this is used as well. We are hopeful we can follow up 
this hearing with that kind of input from Homeland Security and 
perhaps FAA.
    Mr. McCaul. I thank the Ranking Member for his comments.
    The Chairman now recognizes Mr. Duncan from South Carolina.
    Mr. Duncan. Thank you, Mr. Chairman. I do want to follow 
up. I think we do need a hearing with the FAA to bring them 
forward and ask questions about what they are doing to 
implement permitting and certificates in this country with the 
flying of unmanned aerial systems because we have got a robust 
civilian aviation population in this country. If you have 
visual flight rules and you have got a civilian aviator that 
goes up in his Cessna 172, he is not filing a flight plan. He 
is generally currently probably not looking to see if there is 
a certificate whether the sheriff is flying a drone in the 
area. These drone pilots, they are not looking forward for 
other aircraft in their air space, they are looking down at 
whatever they are surveilling. So I think there is a real 
threat to civilian aviation with unmanned aerial systems, 
especially if we see a dramatic increase that is projected 
based upon the information that has been provided today. So I 
think that is a valid question that we need to talk with the 
FAA about with regard to civilian aviation and VFR flight 
rules.
    The gist of my concern about drones and unmanned aerial 
systems is the privacy issue. It is a real issue and it is a 
real concern to the constituents I represent and it is a real 
concern to Americans all across this great land on what the 
Government is surveilling. We just had recently an episode in 
Nebraska where farmers were upset that the EPA was flying 
aircraft and possibly UAVs to check their fencing and whether 
their cattle were getting into streams, and enforcement issues, 
are they going to use UASs for that going forward. I am a 
cosponsor of Austin Scott's bill, which I think is an important 
piece of legislation.
    When I think about privacy issues, I think about what we 
have done in the war on terror and surveillance of people that 
we suspect are involved in terrorism. In order to listen in on 
their phone conversations, whether cell phone or landline, the 
FISA court is involved. Well, is the FISA court going to be 
involved in unmanned aerial systems surveilling American 
citizens in this country on what their activities are, whether 
it is terrorist activities or narcotic activities? Where is the 
right of privacy and where does a court such as FISA get 
involved in this?
    I think these are legitimate questions that we need to ask. 
We have an Office of Privacy within Homeland Security that the 
Chairman mentioned earlier. That Office of Privacy is there for 
a reason. It is to make sure that the Department of Homeland 
Security is involved in making sure that the privacy rights of 
American citizens are not violated as we try to protect this 
great country. Is that Office of Privacy involved with the 
Department of Homeland Security with regard to unmanned aerial 
systems?
    I think it is a valid question for us to ask, and I want to 
thank Amie for being here. I want to ask you: What methods of 
civil liberty protection are best to cooperate with this growth 
in UAS?
    Ms. Stepanovich. We think that the best principles to 
always look at are transparency and accountability. So we are 
looking at, again, procedures at FAA to make sure that drone 
operators aren't allowed to utilize their drones for purposes 
outside of what they have initially been licensed for. We want 
to see DHS implement regulations protecting privacy and 
ensuring that they cannot be used for generalized surveillance. 
We think that that is not in line with Constitutional 
principles and should not be used. Then we would like to see, 
as we have proposed in our longer statement, legislation that 
is really geared towards protecting these rights. We think that 
it is important to do this now, as previous witnesses have 
stated. Violations have not occurred yet, and if we wait for 
the drones to go up in the air before we act, I think that we 
are going to regret it.
    Mr. Duncan. Well, thank you for protecting civil liberties 
in this country and what you are doing.
    I come from South Carolina. We are on the coast. There is 
the threat of hurricanes. I can see and understand a 
certificate is issued for, whether it is the EPA or whether it 
is Homeland Security or some organization, to fly the coastline 
prior to a hurricane coming in to assess changes in the 
environment, take real-time actual aerial photos that can be 
used. I can understand a certificate being issued for Custom 
and Border Patrol if they know that there is an area of the 
border that is being exploited, a one-time certificate. I can 
understand the need for some sort of privacy committee to issue 
those certificates. I can understand a one-time certificate or 
a temporary certificate being issued to a sheriff if you had a 
prison break or you had a lot of drug activity. But these are 
isolated incidents. They are not carte blanche flying of 
unmanned aerial systems across this country.
    Mr. Dillingham, why has the Department of Homeland Security 
been so slow to develop policies and guidance related to the 
domestic use of drones?
    Mr. Dillingham. That is a good question, sir. We have not 
been able to get an answer from DHS or TSA why they have not 
followed our recommendations.
    We have been told by many stakeholders that it is better to 
act on these potential issues before we have a crisis or before 
some of these things occur because oftentimes not only does it 
take regulations 2 or 3 years to be enacted, but oftentimes 
when regulations are enacted in a crisis situation, sometimes 
they are not the best work that the agencies do. So we continue 
to follow-up with DHS and point out that we think they have a 
role in the UAV situation as well, both in terms of privacy as 
well as security.
    Mr. Duncan. Well, I don't want to wait for a crisis 
situation. If I know this Chairman as well as I think I know 
him, I believe we will have the Department of Homeland Security 
sitting where you are sitting to answer these tough questions, 
and I yield back.
    Mr. McCaul. I thank the gentleman for his confidence in his 
Chairman. Let me just say that not only have they been slow, 
they have completely disregarded Mr. Dillingham and the GAO and 
they have defied this committee by refusing to testify on the 
issue, indicating that they have no role, no role whatsoever in 
the domestic use of UAVs.
    With that, I now recognizes Ms. Clarke.
    Ms. Clarke. Thank you very much, Mr. Chairman. Let me add 
my voice to that of my colleague about concern with respect to 
DHS and their response to this committee. Clearly this is an 
emerging threat, and it is certainly within the jurisdiction of 
DHS to respond to this committee, this subcommittee, in its 
request to know where they stand with regards to this. It is 
not acceptable to not participate, to not share with us their 
thinking when you think about the implications of these 
devices.
    Dr. Dillingham, you note in your testimony that currently 
no Federal agency has specific statutory responsibility to 
regulate privacy matters related to UAS. Do you agree with Ms. 
Stepanovich that the responsible agency should be DHS? In your 
opinion, which agency is best positioned to take this on, and 
why?
    Mr. Dillingham. I think our answer at this point is we are 
probably not in a position to say who should be responsible, 
but we think the process that is under way now in terms of the 
potential agencies, including Justice, Homeland Security, FAA, 
should be working together to figure out who in fact is going 
to take the lead in these particular areas. It is in no one's 
mission at this point because UASs didn't exist in the domestic 
area before not too long ago, so we think this is something for 
collaboration and cooperation, but definitely something that 
needs to be attended to now rather than later.
    Ms. Clarke. Ms. Stepanovich, do you agree?
    Ms. Stepanovich. We do agree, and we agree that as other 
agencies implement drones in the United States, we think that 
those agencies should also take on a role in regulating and 
protecting the privacy of the people who may come under 
surveillance because of those operations.
    Ms. Clarke. Ms. Stepanovich, the organization representing 
UAV manufacturers and operators recently released an industry 
code of conduct. That included some privacy safeguards. 
Moreover, compliance with the guidelines is both voluntary and 
unenforceable. Although the attempt to address concerns in that 
manner was laudable, can you explain why official action with 
enforcement is necessary?
    Ms. Stepanovich. I am holding the voluntary code of conduct 
right here. It is 1 page front and back. All they say on 
privacy is we will respect the privacy of individuals. As you 
mentioned, it is both voluntary and nonenforceable. We believe 
that without official action, if everything comes down to that 
one line on this 1 page, that privacy will not be sufficiently 
protected.
    [The information follows:]

   Association for Unmanned Vehicle Systems International: Unmanned 
        Aircraft System Operations Industry ``Code of Conduct''

    The emergence of unmanned aircraft systems (UAS) as a resource for 
a wide variety of public and private applications quite possibly 
represents one of the most significant advancements to aviation, the 
scientific community, and public service since the beginning of flight. 
Rapid advancements in the technology have presented unique challenges 
and opportunities to the growing UAS industry and to those who support 
it. The nature of UAS and the environments which they operate, when not 
managed properly, can and will create issues that need to be addressed. 
The future of UAS will be linked to the responsible and safe use of 
these systems. Our industry has an obligation to conduct our operations 
in a safe manner that minimizes risk and instills confidence in our 
systems.
    For this reason, the Association for Unmanned Vehicle Systems 
International (AUVSI), offers this Code of Conduct on behalf of the UAS 
industry for UAS operation. This code is intended to provide our 
members, and those who design, test, and operate UAS for public and 
civil use, a set of guidelines and recommendations for safe, non-
intrusive operations. Acceptance and adherence to this code will 
contribute to safety and professionalism and will accelerate public 
confidence in these systems.
    The code is built on three specific themes: Safety, 
Professionalism, and Respect. Each theme and its associated 
recommendations represent a ``common-sense'' approach to UAS operations 
and address many of the concerns expressed by the public and 
regulators. This code is meant to provide UAS industry manufacturers 
and users a convenient checklist for operations and a means to 
demonstrate their obligation to supporting the growth of our industry 
in a safe and responsible manner. By adopting this Code, UAS industry 
manufacturers and users commit to the following:

                                 SAFETY

   We will not operate UAS in a manner that presents undue risk 
        to persons or property on the surface or in the air.
   We will ensure UAS will be piloted by individuals who are 
        properly trained and competent to operate the vehicle or its 
        systems.
   We will ensure UAS flights will be conducted only after a 
        thorough assessment of risks associated with the activity. This 
        risks assessment will include, but is not limited to:
     Weather conditions relative to the performance capability 
            of the system.
     Identification of normally anticipated failure modes (lost 
            link, power plant failures, loss of control, etc) and 
            consequences of the failures.
     Crew fitness for flight operations.
     Overlying airspace, compliance with aviation regulations 
            as appropriate to the operation, and off-nominal 
            procedures.
     Communication, command, control, and payload frequency 
            spectrum requirements.
     Reliability, performance, and airworthiness to established 
            standards.

                            PROFESSIONALISM

   We will comply with all Federal, State, and local laws, 
        ordinances, covenants, and restrictions as they relate to UAS 
        operations.
   We will operate our systems as responsible members of the 
        aviation community.
   We will be responsive to the needs of the public.
   We will cooperate fully with Federal, State, and local 
        authorities in response to emergency deployments, mishap 
        investigations, and media relations.
   We will establish contingency plans for all anticipated off-
        nominal events and share them openly with all appropriate 
        authorities.

                                RESPECT

   We will respect the rights of other users of the airspace.
   We will respect the privacy of individuals.
   We will respect the concerns of the public as they relate to 
        unmanned aircraft operations.
   We will support improving public awareness and education on 
        the operation of UAS.
    As an industry, it is incumbent upon us to hold ourselves and each 
other to a high professional and ethical standard. As with any 
revolutionary technology, there will be mishaps and abuses; however, in 
order to operate safely and gain public acceptance and trust, we should 
all act in accordance with these guiding themes and do so in an open 
and transparent manner. We hope the entire UAS industry will join AUVSI 
in adopting this industry Code of Conduct.

    Ms. Clarke. Is there a particular downside for the 
manufacturers in not providing a much more robust code of 
conduct?
    Ms. Stepanovich. Many privacy experts, including Ryan Calo, 
a former professor at Stanford and an expert in privacy and 
robotics, has said that people in the United States will be 
very hesitant to accept the adoption of this technology if 
privacy safeguards are not put into place prior to the adoption 
of it. So we believe that if we don't address this now, that 
there will actually be a visceral reaction from the American 
public and that we will not be able to comply with the spirit 
of the FAA act which requires that drones be allowed into the 
United States National airspace.
    Ms. Clarke. So from a commercial use standpoint or even a 
local law enforcement standpoint, is it within the best 
interest of manufacturers to strengthen their code of conduct?
    Ms. Stepanovich. We believe it is not only in the best 
interest for them to strengthen the code of conduct, it is also 
in their best interest to support large-scale legislation and 
regulations related to privacy.
    Ms. Clarke. Thank you very much, Mr. Chairman, and I yield 
back.
    Mr. McCaul. I thank the gentlelady.
    The Chairman now recognizes Mr. Billy Long from Missouri.
    Mr. Long. Thank you, Mr. Chairman.
    Any of you can answer. Can you define a drone for me? Is 
there a certain size or certain altitude that it flies at? What 
constitutes what we are trying to deal with?
    Mr. Dillingham. I guess I will try and start. It varies, 
sir. It varies from hand-held model airplane types to the ones 
that we are most familiar with in terms of the Predators and 
the Global Hawks that are used mostly in the war theater.
    What we are talking about here for the most part are what 
is called the small UAVs, which is what FAA is trying to 
develop a rule for, and that is I think less than 55 pounds and 
relatively small in size.
    Mr. Long. A flying trash can, are you familiar with that?
    Mr. Dillingham. I have heard that phrase before. It could 
be the size of a flying trash can, or it could be the size of a 
hummingbird.
    Mr. Long. I thought you said 55 pounds?
    Mr. Dillingham. Right. But I am saying it varies in size, 
the small UAV rule that is being worked refers to that size, 55 
and down.
    Mr. Long. Okay. I know that the flying trash cans, 
originally when they were developed, I think part of their 
thought process was to use them for police work. If you are in 
a neighborhood and you are chasing a suspect through several 
buildings or whatever where they can fly that over at a fairly 
low altitude. But I just had a question on that.
    To answer Mr. Duncan's question, or part of it, maybe not 
answer it but I think that the Transportation and 
Infrastructure Committee has tried to tackle the problem of 
getting in general airspace, general aviation, and also FAA 
airspace. So I think that that is a separate issue that 
hopefully we are trying to handle on that angle.
    Generally, to the sheriff, it has always been my 
understanding that anything that can be seen by anyone driving 
down the street, flying a helicopter I guess I would say, but 
if you are driving down the street and a guy is sitting on his 
lawn smoking marijuana, then you have a right to arrest that 
man, correct?
    Chief McDaniel. That is correct, sir. Yes.
    Mr. Long. If he is in his backyard and he has a privacy 
fence, you are not allowed to go put a ladder up and look over 
the fence, are you, because that is not available to people?
    Chief McDaniel. The norm is to be able to view it from what 
the public can see.
    Mr. Long. Okay. That is kind of where I was going--that was 
my hillbilly way of getting there, I guess.
    At 30,000 feet or whatever, we always think of the Predator 
drones that are armed of course that have been successful in a 
lot of military operations, but my constituents and I think a 
lot of constituents across the country are concerned with that 
type of surveillance, albeit they are not armed. You can't see 
them. You can't hear them, but that is a whole different level, 
isn't it, than what we were talking about a second ago, being 
able to see what you can normally see?
    Chief McDaniel. Certainly the utilization of a UAV up over 
an area would open it up to view for law enforcement or any 
other governmental entity.
    Mr. Long. These small ones that we are talking about here 
today, the 55 pounds and below, the flying trash cans, I have 
seen those. I think that they would be fairly apparent to 
people. I have not seen one operate. I have seen them on the 
shelf where they develop them, but as far as the sounds that 
they put out and things like that, most of those, are people 
going to be able to acknowledge there is something flying up 
over their farm or their house, looking to see if you are 
shooting doves?
    Chief McDaniel. Yes, sir. That is an excellent point. The 
UAVs that public safety agencies, law enforcement, and fire 
departments are using or looking to utilize are not the Global 
Hawk or the Predator at $20 million or $30 million a copy. 
These are very small in stature. The maximum time aloft on our 
Shadow Hawk is 2 hours and 20 minutes.
    Mr. Long. At what altitude?
    Chief McDaniel. At no more than 400 feet above ground 
level.
    Mr. Long. So privacy concerns would be a little bit 
alleviated I would assume with that type?
    Chief McDaniel. Absolutely. At that altitude and the type 
of engine that it has, it sounds like a very powerful weed 
eater, and you will be able to notice that it is above.
    Mr. Long. Maybe you could make a weed eater out of one of 
them. That would be kind of handy.
    Mr. Chairman, the Department of Homeland Security will not 
testify before this subcommittee, the Department of Homeland 
Security; is that correct?
    Mr. McCaul. That is correct.
    Mr. Long. I rest my case.
    Mr. McCaul. Thanks for the point well taken, and I will 
close on that as well.
    The Chairman now recognizes for the third time in this 
hearing Mr. Cuellar from Texas.
    Mr. Cuellar. Thank you very much. It is refreshing to hear 
my good Republican friends talk about civil liberties. Thank 
you, I appreciate that. But one more thing on the EPA story by 
Fox, Fox actually took that back. It was not a UAV, it was 
actually aircraft that they have been flying for the last 10 
years under both Democratic and Republican Presidents, just to 
make that sort of correction.
    Let me say this. I have a border sheriff who happens to be 
my brother. I have got three peace officers, and I believe that 
if there is going to be evidence collection techniques, I would 
assume that your jurisdiction or as a sheriff, you have certain 
procedures as law enforcement to follow that; is that correct?
    Chief McDaniel. That is correct, sir.
    Mr. Cuellar. If someone violates that, I would assume that 
they would be liable for not following that; is that correct?
    Chief McDaniel. Yes, sir.
    Mr. Cuellar. Okay. Having three peace officers in my 
family, I put a lot of trust in law enforcement on that. Even 
though there are some bad apples, you still have to follow the 
Constitution; is that correct?
    Chief McDaniel. Absolutely.
    Mr. Cuellar. Talking about the Constitution, there is the 
Fourth Amendment of the U.S. Constitution that prohibits 
unreasonable searches and seizures and requires search warrants 
to be based on probable cause, and the Supreme Court has 
already interpreted different cases. For example, talking about 
aircraft--and keep in mind that the Supreme Court has already 
talked about using cameras on aircraft. This time it is a 
different platform. It happens to be UAVs. For example, just to 
make sure we all understand, the Supreme Court has said that 
there is an expectation of privacy. When it is inside the 
house, it is a different type of privacy. Once you go outside 
the house, there is a different type of privacy. A business has 
less expectation of privacy than inside the home, and the 
Supreme Court has talked about the open field doctrine, and I 
believe you understand what I am talking about here. You are 
familiar with the Dow Chemical Company v. The United States. I 
am sure you are also familiar with the open fields doctrine of 
California v. Serrano case. The Supreme Court held that the 
police did not have to obtain a search warrant when observing a 
person's backyard or curtilage from an airplane more than 1,000 
feet above the air; is that correct? That is what the Supreme 
Court held.
    Also, the court also defined aerial searches in Florida v. 
Riley that said, and Chief, you mentioned the 400 feet, I think 
we mentioned the 400 feet, that held that police officers do 
not need a search warrant when they are flying a helicopter 
above 400 feet. So in this case a different type of platform, 
but if you are flying above 400 feet, no search warrant. But if 
you are flying below 400 feet, and I believe most of the law 
enforcement and most of those UAVs will be at 400 feet or 
below. So, therefore, if you are flying at 400 feet in 
altitude, then at that time you would need a search warrant, 
whether you use a helicopter or UAV, probably not an airplane. 
So the Supreme Court has already laid out the law on what it 
is.
    Now, I do agree with my colleagues here that we probably 
need to look at some legislation but as we draft the 
legislation, we got to keep in mind that the Supreme Court has 
already defined open doctrine, home business, and certain 
expectations; is that correct?
    Chief McDaniel. Yes, sir, that is absolutely correct. As 
far as case law is, in my view and from those I have talked 
with, there is no difference between establishing a separate 
type of case law for UAVs. The manned aircraft component is 
nothing more than an aircraft with people in it compared to a 
UAV that has them on the ground. The case law is the same 
because they are both aircraft, air assets.
    Mr. Cuellar. In the Dow Chemical Company v. The United 
States, it involved airborne use of thermal imaging. So here is 
another case where technology is being used. Again, I am one of 
those that is fascinated by the UAVs; but at the same time I do 
understand there are concerns. The doctor that just testified, 
I looked at his recommendations and they are very, very good 
recommendations, and I think we need to look at those 
recommendations. But all I am saying, Members, there is already 
some case law on this. The Supreme Court has ruled on this. If 
we do any legislation, I just say let's look at the legislation 
of the Supreme Court. Let's use some common sense in applying 
some of this, and put a little trust in our law enforcement, 
which I appreciate, and having three brothers and having one 
who is a border sheriff, I appreciate the work that you all do.
    Thank you very much, Mr. Chairman.
    Mr. McCaul. I thank the gentleman.
    In closing, let me thank the witnesses for being here. As a 
former Federal prosecutor, I understand--is there somebody I 
missed? Oh, my goodness, Mr. Davis from Illinois, I sincerely 
apologize.
    Mr. Davis. I really don't have a lot to ask, but let me 
ask, Dr. Dillingham, you mentioned in your testimony something 
about using the instruments to jam signals and that that could 
become a problem and the use. Would you mention that a little 
bit more?
    Mr. Dillingham. Yes, sir. One of the emerging issues that 
we have identified is the potential that the signals that 
control these UAVs in flight, and we are again talking about 
the small ones as opposed to the encrypted DOD-type, could in 
fact be jammed and break command-and-control links with the 
UAV, meaning that the UAV could go off-course, not 
necessarily--or could include being taken control over, but 
clearly breaking that command-and-control link with the 
appropriate persons or organizations that were controlling it. 
It is something that needs to be addressed now before we have 
these potentially serious kinds of incidents.
    Mr. Davis. Thank you very much. Let me ask you, Chief 
McDaniel, the data that is collected, could you describe what 
kind of data it is? What is it used for and how long is it 
kept? Would the individuals have any idea that this data may be 
collected that involves them?
    Chief McDaniel. The only data that we are collecting off of 
our Shadow Hawk is color video. We can convert that to both 
still photographs or video. Depending upon the situation, we 
would obviously store that video for criminal purposes; i.e., 
if our SWAT team is going in on an individual or it is a high-
risk warrant, we would also have that video or those 
photographs preserved as evidence. It does have a FLIR system, 
a forward looking infrared camera system, that can identify 
heat sources in low-light conditions. However, the idea behind 
that was more for searching for lost persons in our National 
forests to more readily be able to identify them.
    Mr. Davis. Let's say you got a tip that a farmer was using 
some of his or her acreage and they had a little plot of 
marijuana growing and you wanted to check that out with one of 
these vehicles. Would there be a way to do that without 
acquiring a search warrant, or would you be within--and I am 
going to ask you, Ms. Stepanovich, when he finishes, how would 
you handle a situation like that?
    Chief McDaniel. Well, as indicated earlier, the Supreme 
Court in 1924 established the open fields doctrine which allows 
for things to be observed that the majority of the public could 
see. In responding to the example that you present, the reality 
is, and this is based upon law enforcement, investigation 
techniques, et cetera, utilizing this drone to try to observe a 
marijuana field would not be appropriate. It would not be a 
good investigative tool, A, because of the constraints that the 
FAA puts on the use of UAVs by law enforcement agencies, flying 
no higher than 400 feet AGL, and because of the noise and the 
size of it.
    So if we are trying to investigate whether there is a 
marijuana field to continue with our investigation and to 
ultimately arrest suspects, the UAV is not it.
    Mr. Davis. Ms. Stepanovich, are you comfortable that enough 
attention is being given to the individual rights and civil 
liberties of citizens given the use of this type of 
surveillance?
    Ms. Stepanovich. I am not sure if ``comfortable'' would be 
the right term. We do respect the fact that law enforcement at 
this time does not expect to use drones for broad and 
untargeted access. We respect the Supreme Court precedent that 
Representative Cuellar had referred to that allows for aerial 
surveillance in ``open fields.''
    However, recently the Supreme Court did investigate a case 
of in U.S. v. Jones of police using GPS without a warrant to 
track a suspect. Drones allow for the same type of pervasive 
and very intensive surveillance that GPS allows for. In that 
case Justice Alito wrote a very eloquent dissent saying, and I 
quote: ``In circumstances involving dramatic technological 
change, the best solution to privacy concerns may be 
legislative.'' We agree with Justice Alito in that case, and we 
believe that drones represent a similar jump in technology from 
normal tracking of an individual with a policeman in a police 
car, as drones respect to aerial tracking in a helicopter or 
airplane.
    Mr. Davis. Thank you very much.
    Thank you, Mr. Chairman, for a very interesting hearing, 
and I yield back.
    Mr. McCaul. Thank you, Mr. Davis. I apologize again for my 
oversight. Speaking of oversight, this has been a real 
productive hearing and very insightful.
    Let me just close by saying as a former Federal prosecutor, 
I recognize the value of--legitimate law enforcement value of 
technology. I think as with technology, we have to balance 
privacy and security. Obviously, the Fourth Amendment applies 
here. The case law, as Mr. Cuellar has set forth, is there. I 
have studied it in my prior career. But this is an evolving 
field. We have thousands of these things that could be deployed 
in the skies now. Over the next couple of years, we may see 
more than a couple of thousand, maybe 10,000 of these things. I 
think it is incumbent upon the Department of Homeland Security 
to come up with a policy, to come up with a security analysis.
    I think the one thing that we can all agree on, 
interestingly on both sides of the aisle on this committee, 
both Republicans and Democrats, and I think all three of these 
witnesses agree on one thing, and that is that DHS has a role. 
I think Mr. Dillingham and GAO stated it 4 years ago. Chief 
McDaniel, you stated it in your testimony here today. I think 
local law enforcement does need that guidance. I think, Ms. 
Stepanovich, you as a privacy expert, the Office of Privacy 
within DHS should be involved in this issue.
    So I hope that we can all walk away from here with that 
common goal and understanding, and I sure hope that this wakes 
up the Department, that they need to step up to the plate and 
do something.
    With that, I want to thank the witnesses. This has been a 
very insightful, productive hearing, and I thank the Members 
also for their questions. Thanks so much, and this hearing now 
is adjourned.
    [Whereupon, at 11:30 a.m., the subcommittee was adjourned.]