Drone As First Responder Programs Are Swarming Across the United States

Police DFR programs involve a fleet of drones, which can range in number from four or five to hundreds.
In response to 911 calls and other law enforcement calls for service, a camera-equipped drone is launched from a regular base to get to the incident first, giving responding officers a view of the scene before they arrive.
In theory and in marketing materials, the advance view from the drone will help officers understand the situation more thoroughly before they get there, better preparing them for the scene and assisting them in things such as locating wanted or missing individuals more quickly.
A drone responding to a vandalism case may capture video footage of everyone it passes along the way.
Drones are subject to the same mission-creep issues that already plague other police tools designed to record the public; what is pitched as a solution to violent crime can quickly become a tool for policing homelessness or low-level infractions that otherwise wouldn't merit police resources.
This could lead to drone surveillance of communities that happen to have a higher concentration of ShotSpotter microphones or other acoustic gunshot detection technology.
Artificial intelligence is also being added to drone data collection; connecting what's gathered from the sky to what has been gathered on the street and through other methods is a trending part of the police panopticon plan.
Now there are a few dozen departments with known DFR programs among the approximately 1,500 police departments known to have any drone program at all, according to EFF's Atlas of Surveillance, the most comprehensive dataset of this kind of information.
Chula Vista Police claim that the DFR program lets them avoid potentially dangerous or deadly interactions with members of the public, with drone responses resulting in their department avoiding sending a patrol unit in response to 4,303 calls.
This led to a lawsuit in which EFF submitted an amicus brief, and ultimately the California Court of Appeal correctly found that drone footage is not exempt from CPRA requests.
It took a lawsuit and a recent Alaska Supreme Court decision to ensure that police in that state must obtain a warrant for drone surveillance in otherwise private areas.
While some states do require a warrant to use a drone to violate the privacy of a person's airspace, Alaska, California, Hawaii, and Vermont are currently the only states where courts have held that warrantless aerial surveillance violates residents' constitutional protections against unreasonable search and seizure absent specific exceptions.
Clear policies around the use of drones are a valuable part of holding police departments accountable for their drone use.
These policies must include rules around why a drone is deployed and guardrails on the kind of footage that is collected, the length of time it is retained, and with whom it can be shared.
A few state legislatures have taken some steps toward providing some public accountability over growing drone use.
In Minnesota, law enforcement agencies are required to annually report their drone programs' costs and the number of times they deployed drones with, including how many times they were deployed without a warrant.
In Illinois, the Drones as First Responders Act went into effect June 2023, requiring agencies to report whether they own drones; how many are owned; the number of times the drones were deployed, as well as the date, location, and reason for the deployment; and whether video was captured and then retained from each deployment.
Illinois agencies also must share a copy of their latest use policies, drone footage is generally supposed to be deleted after 24 hours, and the use of face recognition technology is prohibited except in certain circumstances.
DFR programs are just one way police are acquiring drones, but law enforcement and UAV manufacturers are interested in adding drones in other ways, including as part of regular patrols and in response to high-speed vehicle pursuits.
Police technology company Axon -known for its Tasers and body-worn cameras - recently acquired drone company Dedrone, specifically citing that company's efforts to push DFR programs as one reason for the acquisition.


This Cyber News was published on www.eff.org. Publication date: Thu, 27 Jun 2024 19:13:06 +0000


Cyber News related to Drone As First Responder Programs Are Swarming Across the United States

Drone As First Responder Programs Are Swarming Across the United States - Police DFR programs involve a fleet of drones, which can range in number from four or five to hundreds. In response to 911 calls and other law enforcement calls for service, a camera-equipped drone is launched from a regular base to get to the ...
1 year ago Eff.org
Look up: The new frontier of cyberthreats is in the sky - Attackers replaced Digiwin’s original Update.exe execution file with Winword.exe. Update.exe is part of Digiwin’s auto update workflow, but attackers caused it to launch Microsoft Word 2010 instead, which loaded a backdoor that could ...
8 months ago Bleepingcomputer.com
Victory! Police Drone Footage is Not Categorically Exempt From California's Public Records Law - Video footage captured by police drones sent in response to 911 calls cannot be kept entirely secret from the public, a California appellate court ruled last week. The police department is the first law enforcement agency in the country to use drones ...
1 year ago Eff.org
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
1 year ago Securityzap.com
Congressional leaders concerned by NYPD's use of Chinese-made drones - Members of Congress expressed concern Thursday about New York City's plan to use Chinese-made drones to assist police responding to gunfire in five high-crime precincts. The program, which is currently being tested, will pair drones with the ...
1 year ago Therecord.media
Munich Airport drone chaos: security breach triggers shutdown - Munich Airport recently experienced a significant security incident involving unauthorized drone activity that led to a temporary shutdown of airport operations. This event highlights the growing threat of drone-related security breaches at critical ...
1 month ago Theregister.com
Power of Flexible Tech: Applying Conference Room Tech to Front Lines - We work with public safety, government, defense, security, and enterprise organizations to help them use unmanned systems, from drones to ground robotics, to enhance their situational awareness and streamline operations. The level of insight these ...
1 year ago Americansecuritytoday.com
The Dangerous Mystery of Hamas' Missing 'Suicide Drones' - Faced with the looming possibility that Hamas could leverage some of the same techniques, Israel began running drills, practicing with fighter jets to intercept UAVs. In February 2014, it announced a prototype of a new air defense system: The "Iron ...
1 year ago Wired.com
The 20 Most Essential Crypto Bug Bounty Programs - Working with cryptocurrency has become more and more popular in the last few years, but it’s not without risks. It’s important for sites that conduct digital payments and transfers to have security measures in place to help keep your data safe ...
2 years ago Hackread.com Hunters
Poland downs drones in its airspace, becoming first NATO member to fire during war - Reuters - Poland has made history by becoming the first NATO member to engage and shoot down drones in its airspace during an ongoing conflict. This unprecedented action highlights the evolving nature of modern warfare, where unmanned aerial vehicles (UAVs) ...
2 months ago Reuters.com
CVE-2020-3422 - A vulnerability in the IP Service Level Agreement (SLA) responder feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the IP SLA responder to reuse an existing port, resulting in a denial of service (DoS) ...
2 years ago
CVE-2023-32690 - libspdm is a sample implementation that follows the DMTF SPDM specifications. Prior to versions 2.3.3 and 3.0, following a successful CAPABILITIES response, a libspdm Requester stores the Responder's CTExponent into its context without ...
2 years ago
CVE-2024-40992 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
Russia-Ukraine war: Drone attack on Moscow kills one, injures seven - The recent drone attack on Moscow marks a significant escalation in the Russia-Ukraine conflict, resulting in one fatality and seven injuries. This incident highlights the increasing use of unmanned aerial vehicles (UAVs) in modern warfare, ...
1 month ago Bbc.com
Ukraine war: Russia launches drone attack on Kyiv - The article reports on a recent drone attack launched by Russia on Kyiv, the capital of Ukraine, amid the ongoing conflict between the two nations. This attack highlights the increasing use of unmanned aerial vehicles (UAVs) or drones in modern ...
1 month ago Bbc.com
Lazarus Group Hunts European Drone Manufacturing Data - The Lazarus Group, a notorious North Korean state-sponsored hacking collective, has been actively targeting European drone manufacturers to steal sensitive data. This cyber espionage campaign aims to acquire intellectual property and technological ...
3 weeks ago Darkreading.com Lazarus Group
North Korea hackers target Europe drone makers - North Korean hacker groups have been actively targeting European drone manufacturers, aiming to steal sensitive technology and intellectual property. These cyberattacks highlight the growing threat posed by state-sponsored actors in the aerospace and ...
2 weeks ago Therecord.media North Korea hackers
Russia imposes 24-hour traveler mobile internet blackouts amid Ukraine drone attacks - Russia has implemented 24-hour mobile internet blackouts for travelers crossing its borders, a move linked to ongoing security concerns amid Ukraine drone attacks. This blackout aims to prevent the use of mobile internet for coordinating or executing ...
6 hours ago Therecord.media
Fighting For Your Digital Rights Across the Country: Year in Review 2023 - EFF works every year to improve policy in ways that protect your digital rights in states across the country. Thanks to the messages of hundreds of EFF members across the country, we've spoken up for digital rights this year from Sacramento to ...
1 year ago Eff.org
North Korean IT worker army expands operations in Europe - GTIG's report follows multiple warnings issued by the FBI regarding North Korea's massive army of IT workers sent abroad to generate revenue, who have tricked hundreds of companies in the United States and worldwide into hiring them over the years. ...
7 months ago Bleepingcomputer.com
Tech upgrades for first responders are a necessity, not a luxury - Public safety professionals want technology upgrades and adoption of federal standards for first responder IT security, reporting and efficiency, according to Mark43. First responders face growing concerns amidst cybersecurity surge. The ...
1 year ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
US Uses Visa Restrictions in Struggle Against Spyware - The United States will impose visa restrictions on foreign individuals who have been involving the misuse of spyware, the latest effort by the Biden Administration to address the dangers of the commercial software that often is used by governments ...
1 year ago Securityboulevard.com
'Fugitive' Spanish aristocrat behind North Korea cryptocurrency conference arrested - Alejandro Cao de Benós, the Spanish man from an aristocratic family who became one the Western world's most vocal supporters of North Korea, has been arrested in Spain. The arrest relates to allegations of fraud in the United States, where the ...
1 year ago Therecord.media
CVE-2025-38060 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago

Cyber Trends (last 7 days)