recommended reading

U.S. Border Drones Need 'Further Refined' Privacy Policies, DHS Chief Says

DHS' Jeh Johnson, a former top Pentagon lawyer, formulated the White House policy on lethal drone strikes in Yemen and Somalia.

DHS' Jeh Johnson, a former top Pentagon lawyer, formulated the White House policy on lethal drone strikes in Yemen and Somalia. // Carolyn Kaster/AP

The new Homeland Security Department chief told Congress that he wants to enhance privacy guidelines for the department's use of drones in residential areas -- but DHS Secretary Jeh Johnson stopped short of prohibiting the controversial practice of local police borrowing them.

Other agencies, including sheriff’s offices and the National Guard have borrowed unmanned aerial surveillance systems from DHS nearly 700 times during the past three years, the Associated Press reported last month.  

It is unknown how many hours the other organizations used drones from the department’s fleet of 10 unmanned jets, the purpose of their missions or who paid for the flights. 

"There may be some instances where, for a very important law enforcement objective, we might support some local law enforcement's efforts at drug trafficking or something of that nature, so I wouldn’t rule that out but the principal reason they are there is border security,” Johnson told a House committee in his first congressional appearance since taking office two months ago.

DHS began purchasing the remotely-piloted aircraft in 2004, to curb illegal immigration, smuggling and potential terrorist activity.

In general, DHS has not fully utilized its drones for any objectives, according to federal investigators. In May 2012, a department inspector general blasted the agency for idling its fleet of then-seven aircraft for 63 percent of the time the jets should have been airborne, averaging 3,909 hours per year instead of 10,662 hours. After acquiring three more drones, the fleet put in 5,100 hours during fiscal 2013, DHS officials told Nextgov last month.

“Each year, we are working toward the number of flight hours that we believe are optimal for the program," department spokesman Brian Friel said. 

Johnson, a former top Pentagon lawyer, formulated the White House policy on lethal drone strikes in Yemen and Somalia. At the time, he reportedly complained that the Obama administration was being too secretive about the targeted drone program. 

On Wednesday, Johnson said, "I want to be sure that as we go forward with this technology that we are also providing adequate assurances, safeguards, protections when it comes to privacy for our citizens who live around the border.”

He added that he wants “to make sure we further refine or policies in that regard if we are going to continue to conduct surveillance along the border."

Johnson also vowed to spend appropriations on drones only on missions that lawmakers have mandated. "My priority is border security,” he said. “If I have surveillance technology that Congress has funded and given to me for that purpose, that’s my priority." 

At the time of the IG report, DHS officials reported that between 2006 and 2011 the agency spent $55.3 million for aircraft operations and maintenance. Each drone costs about $18 million. 

Lawmakers have continued to invest in additional vehicles and accessories for border security purposes. Those instruments include VADER -- vehicle and dismount exploitation radar -- that detects and follows people traveling on foot as well as vehicles moving on land. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.