In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays.

While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate.

Integrating drones in existing regulatory ecosystem

Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account.

Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones.

The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem

For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security.

Counter-UAS measures and regulations

Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design.

It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other.

Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies:

  • Military grade solutions - including lasers and surface-air missiles
  • Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne
  • Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route

Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. 

Drones need to integrate into a long existing and well-balanced ecosystem
One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones

European c-UAS legislation

Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures.

In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary.

US c-UAS legislation

Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent.

In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations.

However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries.

Updating counter-drone legal infrastructure

In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites.

Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Gilad Sahar Co-Founder, CEO, Convexum

As Co-founder and CEO of Convexum, Gilad is taking part in bringing innovative, safe and fully automatic counter-drone solutions for sports venues, critical infrastructure and private enterprises. Gilad has more than 15 years’ experience as leader in research and development projects related to protocols reverse engineering, dating back to his service in the IDF elite intelligence unit 8200 during which he won several accolades for his accomplishments. Gilad was part of the pioneering team of Cellebrite’s mobile forensic division, where he managed the decoding research efforts for 4 years and gave numerous talks in conferences and trainings.

In case you missed it

What are the new trends and opportunities in video storage?
What are the new trends and opportunities in video storage?

Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?

Secure, pinpoint location with UWB-enabled indoor positioning
Secure, pinpoint location with UWB-enabled indoor positioning

Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilisation rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimised for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organisation of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.

How to deter thieves on construction sites
How to deter thieves on construction sites

Construction site theft can cause project delays, property damage and loss of profit for companies in the construction sector. It is imperative to deter thieves from targeting construction sites with the help of construction site security. Here, we look into the various security options and how they can help protect your firm from the threat of a break-in. Construction theft has soared during the COVID-19 Pandemic Construction site theft is an ever-increasing problem in the UK, costing the industry an estimated £800 million per year. Unfortunately, this type of crime has accelerated further throughout lockdown by an estimated 50% due to the abandonment of construction sites across the UK. With many uncertainties around a potential second wave in the UK, it is time for construction firms to enhance their security strategies to help prevent thieves from becoming opportunists on construction sites. Why are construction sites ‘easy’ targets? Construction sites can easily be targeted, as they typically lack adequate security loss prevention practices. The most popular security-related issues that are leading causes of construction site theft are: Poor overall site security Multiple pieces of equipment sharing the same keys Easy access to open cabs Unsecured sites, particularly at night and over weekends Lack of product identification systems If you do not want your site becoming a costly statistic, you might want to try implementing some or all of these preventive measures. Strengthen your perimeter Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the site. To stop opportunist thieves in their tracks, you will need to go one step further by erecting robust fencing and concrete blocks along with signage warning intruders about the consequences of trespassing. Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the siteIf potential trespassers can see that it would be too challenging to attempt a break-in, then they will look elsewhere to find another construction site which is not as well secured. Lock away valuable tools When considering the vulnerabilities in your construction site, it pays to think about this from the perspective of a criminal. What is it exactly that they are looking for? What can a thief steal easily to make money if they were to remove something from your site? Unfortunately, many construction firms do not lock away their tools, materials or vehicles properly, which makes them an easy target. Ensure valuable tools and materials are locked away and are not left unsecured or lying around. Criminals are mostly interested in scaffolding, bowsers and other valuables that are quick to sell on, so it is important to have a strategy in place to keep these locked away, safe and securely. Put tracking devices in your equipment If you are unable to securely lock away valuable tools, then modern technology makes securing equipment easier than ever before. Tracking devices can be installed onto vehicles and equipment; if any thief is unwise enough to steal from the site, site owners will be able to provide the location to the police who will be able to follow this up. Site owners should also engrave company identification numbers on valuable tools, equipment and vehicles so that it can easily be identified and will serve as proof who it rightly belongs to. Invest in CCTV Closed Circuit Television, otherwise known as CCTV, is renowned for being one of the most effective deterrents for thieves, especially when it comes to construction and building sites.The items that criminals steal from sites are notoriously hard to trace The items that criminals steal from sites are notoriously hard to trace, but if you have CCTV, there is a chance that you can capture clear footage to help bring criminals to justice, such as footage of the vehicle used and the car licence plate. CCTV cameras can help to oversee every inch of a construction site, and can even be hidden out of sight where required. Step up with regular site patrols With a wide range of security monitoring methods available, stepping up on regular site patrols can help to keep track and respond to any criminal activity taking place on your site. Traditional site patrols can be carried out on a schedule by professional SIA-approved security agents. With the presence of guards patrolling a construction site, any criminals in the area will be deterred to force entry onto the site. Schedule supply deliveries on an as-needed basis To prevent an excess of supplies ‘sitting around’ on the site, construction site managers should instead order what is needed at the time, so that valuable materials are not left around waiting to be stolen for weeks at a time. Good planning and excellent communication between the team will be required so that projects are not delayed, but planning accordingly will help to reduce the chances of theft on a construction site. Drone surveillance As technology becomes more and more advanced, drone surveillance may soon be a security option that many construction sites could benefit from.Many construction firms in the UK are using drone services to provide aerial images, and are seeing huge cost savings by either purchasing and operating their own drones or by hiring out the work to a company equipped to provide imaging.As technology becomes more and more advanced, drone surveillance may soon be a security option With surveillance drones already handling tasks like mapping and surveying of construction sites, one day they may be able to patrol construction sites at night, equipped with motion sensors and infrared or night vision cameras; They could be automatically deployed from a charging station and fly along a pre-programmed route at regular intervals. One to keep an eye on for the near future! Construction site security to help protect your site If you are ready to tighten security on your own construction site, then your starting point will be to identify your main vulnerabilities and get in touch with a reputable security specialist.