1 01:00:10,231 --> 01:00:29,626 ♪♪♪ 2 01:00:34,255 --> 01:00:38,468 Unmanned aircraft systems (aka drones) have been around for some time 3 01:00:38,551 --> 01:00:41,471 and are rapidly increasing in popularity and numbers. 4 01:00:41,596 --> 01:00:45,099 Reflecting popularity among consumers and hobbyist, 5 01:00:45,391 --> 01:00:49,604 and increase use by owners and operators of critical infrastructure. 6 01:00:49,979 --> 01:00:53,483 There is a real concern about drones and their potential use for terrorism, 7 01:00:53,858 --> 01:00:55,568 mass casualty incidents, 8 01:00:55,735 --> 01:00:57,445 interference with air traffic, 9 01:00:57,695 --> 01:01:00,615 as well as corporate espionage and invasions of privacy. 10 01:01:00,657 --> 01:01:02,325 We’re not being paranoid. 11 01:01:02,492 --> 01:01:06,454 Just look at the short amountof time it took for aircraft to become weapons. 12 01:01:06,496 --> 01:01:09,957 Less than 10 years after the Wright Brothers’ first flight, 13 01:01:09,999 --> 01:01:13,503 a person flew a plane and dropped a brick on someone’s head. 14 01:01:13,544 --> 01:01:19,926 That was followed with pistols, long guns, machine guns, leading to the era of dogfights. 15 01:01:20,426 --> 01:01:25,014 Soon after that, limited precision bombs and missiles evolved. 16 01:01:25,515 --> 01:01:28,976 It’s not hard to imagine UAS following a similar path. 17 01:01:29,936 --> 01:01:34,440 Technology though is really changing how rapidly we have to adapt. 18 01:01:34,732 --> 01:01:38,444 People used to ask me, “what keeps you up at night?” 19 01:01:38,736 --> 01:01:41,197 What keepsme up at night is the speed of change. 20 01:01:43,908 --> 01:01:46,494 The nation's critical infrastructure provides 21 01:01:46,577 --> 01:01:48,121 the essential services that 22 01:01:48,162 --> 01:01:49,247 underpin American society 23 01:01:49,288 --> 01:01:50,707 and serve as the backbone 24 01:01:50,748 --> 01:01:53,459 of our nation's economy, security, and health. 25 01:01:54,127 --> 01:01:57,130 We know it as the energy we use in our homes and businesses, 26 01:01:57,547 --> 01:01:59,132 the water we rely on, 27 01:01:59,257 --> 01:02:02,677 the transportation that moves us and the goods we use, 28 01:02:02,844 --> 01:02:04,178 the stores we shop in, 29 01:02:04,220 --> 01:02:09,058 and the communication systemswe rely on to stay in touch with friends, family, 30 01:02:09,142 --> 01:02:10,727 and to run our businesses. 31 01:02:11,227 --> 01:02:14,272 For the critical infrastructure part, the threat is that 32 01:02:14,397 --> 01:02:17,150 people can surveille in ways they never could before 33 01:02:17,233 --> 01:02:20,945 because physical security, if you look anywhere, 34 01:02:21,070 --> 01:02:25,700 it’s always about badges, locked doors and fences, barbed wire fences. 35 01:02:25,825 --> 01:02:30,246 Because it’s not three-dimensional security, it’s two, 36 01:02:30,288 --> 01:02:33,750 so now people who have critical infrastructure 37 01:02:33,958 --> 01:02:40,798 now have to think that people could come in from the third dimension, the aerial side. 38 01:02:41,174 --> 01:02:44,594 So now a fence is not going to keep people out necessarily. 39 01:02:44,594 --> 01:02:47,472 An aircraft is easy to track and we can hear an aircraft and see it. 40 01:02:47,472 --> 01:02:50,725 Then go to the airport and investigate the pilots, 41 01:02:50,725 --> 01:02:54,604 but a drone you can just put right back in your car and just drive away. 42 01:02:54,604 --> 01:03:00,109 Now drones can take great high definition video and they can also scan 43 01:03:00,109 --> 01:03:03,237 with various sensors, infrared, lidar, 44 01:03:03,237 --> 01:03:08,576 and get a very accurate detailed picture of the landscape and take that into a computer 45 01:03:08,576 --> 01:03:16,834 and build it up from the ground into an animation and it is almost like that you were there. Very, very precise. 46 01:03:17,543 --> 01:03:18,961 The potential for drone attacks 47 01:03:19,212 --> 01:03:21,380 against just one of our critica infrastructures 48 01:03:21,464 --> 01:03:23,382 can affect structures that have interdependencies, 49 01:03:24,008 --> 01:03:28,721 If a UAS incident occurred at power grid near a critical water facility 50 01:03:28,971 --> 01:03:32,183 it could impact those operations even though it was not directed at them. 51 01:03:33,768 --> 01:03:35,019 You know we, 52 01:03:35,144 --> 01:03:39,524 not only handling our regular weekly season games 53 01:03:39,565 --> 01:03:43,194 at 31 stadiums all across the United States, 54 01:03:43,277 --> 01:03:46,906 and drones present a huge challenge to us every single game. 55 01:03:47,073 --> 01:03:50,868 We have put some plans in place, we have some mitigation strategies. 56 01:03:50,910 --> 01:03:52,662 But we do not have all the answers yet. 57 01:03:53,162 --> 01:03:57,041 With increased use of Unmanned Aircraft Systems 58 01:03:57,291 --> 01:03:59,669 and recognition that there will be negative uses 59 01:03:59,919 --> 01:04:03,506 that may present a threat to critical infrastructure, 60 01:04:03,798 --> 01:04:08,845 there is increased interest in research and development of counter UAS technologies. 61 01:04:09,262 --> 01:04:12,765 These technologies are complex and need to take into account 62 01:04:12,932 --> 01:04:17,019 the potential consequences of neutralizing or disabling a UAS 63 01:04:17,228 --> 01:04:22,024 While this technology is advancing, it is not yet widely available. 64 01:04:22,775 --> 01:04:26,946 Potential threats associated with Unmanned Aircraft Systems are expected 65 01:04:27,071 --> 01:04:30,449 to continue to expand in nature and increase in volume in the coming years. 66 01:04:30,449 --> 01:04:33,911 Because of their physical and operational characteristics, 67 01:04:33,911 --> 01:04:38,457 UAS can often evade detection and create challenges for the critical infrastructure community. 68 01:04:38,457 --> 01:04:43,754 There are a multitude of companies that will knock on your door and say, 69 01:04:43,754 --> 01:04:46,299 “We have drone detection capability. 70 01:04:46,299 --> 01:04:51,637 We have drone mitigation capability. We can detect, intercept and take down a drone” 71 01:04:51,679 --> 01:04:56,851 If you don't know what the laws are and the regulations are on the books. 72 01:04:56,934 --> 01:05:02,315 Most of those technologies that I’ve seen are in violation of one of those laws or regulations. 73 01:05:02,398 --> 01:05:07,153 There’s 30 some laws and regulations that impact what you can and can’t 74 01:05:07,486 --> 01:05:10,740 do in terms of drone interception mitigation. 75 01:05:10,907 --> 01:05:14,744 It is something you definitely need to be aware of, but you’ve got to do your homework. 76 01:05:14,869 --> 01:05:17,788 There is drone detection technology and that is not illegal to use 77 01:05:18,122 --> 01:05:27,423 but you should be careful and mindful that you are notpurchasing a piece of equipment that can also 78 01:05:27,423 --> 01:05:31,010 mitigate drones and that could be considered a jammer or some kind of electronic interference. 79 01:05:31,135 --> 01:05:33,846 When a drone is brought down, stay away from it. 80 01:05:34,013 --> 01:05:36,891 Treat it as evidence and don’t allow staff to handle the drone. 81 01:05:36,933 --> 01:05:42,021 There will be a lot of forensic evidence, both physical and cyber, that can be extracted. 82 01:05:42,104 --> 01:05:45,191 You have to understand that this is digital evidence. 83 01:05:45,232 --> 01:05:49,820 And There are procedures for how you handle digital evidence and there’s procedures 84 01:05:49,820 --> 01:05:54,075 and laws case law on how you can, and what you can access. 85 01:05:54,158 --> 01:05:57,662 So A drone is no different. This is somebody else's computer, 86 01:05:57,912 --> 01:06:01,040 maybe a bad actor, maybe somebody who's violated the law, 87 01:06:01,165 --> 01:06:04,335 maybe just a hobbyist that has some right to privacy. 88 01:06:04,335 --> 01:06:07,171 That drone contains information that can tell you whose drone it is. 89 01:06:07,254 --> 01:06:10,466 So the way you handle that evidence 90 01:06:10,466 --> 01:06:15,304 when you come in contact with it, is just like how you would handle any other digital evidence. 91 01:06:15,471 --> 01:06:19,475 If you don't handle it properly, all that evidence can be lost. 92 01:06:19,600 --> 01:06:23,562 You need to have first understanding educate yourself and your people, 93 01:06:23,854 --> 01:06:27,066 2. you have to have policy that’s written, 94 01:06:27,066 --> 01:06:29,443 and you have to train people how to deal with this. 95 01:06:29,527 --> 01:06:34,365 So, while you can't do everything, you can do a lot. But you have to take the time to do it right. 96 01:06:38,244 --> 01:06:43,582 Key to successfully managing potential security incidents associated with UAS 97 01:06:43,666 --> 01:06:49,463 is first, recognizing, and then implementing an emergency response plan 98 01:06:49,463 --> 01:06:52,425 that meets Federal, State, and local regulatory requirements. 99 01:06:52,633 --> 01:06:58,889 There are several measures that can be taken to address UAS-related security challenges. 100 01:07:01,225 --> 01:07:04,979 Research and implement legally approved counter-UAS technology. 101 01:07:06,439 --> 01:07:11,736 Know the air domain around the facility and who has authority to take action to enhance security. 102 01:07:13,279 --> 01:07:18,367 Contact the FAA to consider UAS restrictions in close proximity to fixed site facilities. 103 01:07:19,785 --> 01:07:26,375 Update Emergency/Incident Action Plans to include UAS security and response strategies. 104 01:07:27,376 --> 01:07:34,091 Build Federal, State, and local partnerships for adaptation of best practices and information sharing. 105 01:07:35,217 --> 01:07:39,764 Train your employees that “if they see something, to say something”. 106 01:07:40,681 --> 01:07:45,019 And, report potential UAS threats to your local law enforcement agency. 107 01:07:47,480 --> 01:07:52,777 Now the planners, the emergency planners, the physical security planners 108 01:07:52,777 --> 01:07:56,822 and the management need to think what would we do if one of these were sighted over the facility?’ 109 01:07:56,864 --> 01:08:03,370 Now there would be points of contact, that would be alerted. What would the emergency response plan be? 110 01:08:03,496 --> 01:08:09,043 And just like a fire drill or evacuation drill, these things should be incorporated into the plan, 111 01:08:09,085 --> 01:08:15,174 a standing plan that all employees are aware of and then run a drill. 112 01:08:15,174 --> 01:08:20,346 You don’t have to have a flying object to run a drill, any more than you have to have a fire to have a fire drill. 113 01:08:20,429 --> 01:08:28,395 So, simulate a flyover event for critical infrastructure and thenhave a call chain or sequence of events 114 01:08:28,395 --> 01:08:35,277 mapped out in the plan and figure out which authorities need to be contacted to respond. 115 01:08:35,277 --> 01:08:39,615 The most effective stadiums are following best practice policies 116 01:08:39,615 --> 01:08:47,123 so the league ensures thatwe get those flight restrictions in place and then it is up to the stadium 117 01:08:47,123 --> 01:08:52,086 security directors to have the proper policy and procedures to make sure that, 118 01:08:52,086 --> 01:08:57,174 one they can effectively deal with drones if they enter our game space, 119 01:08:57,174 --> 01:09:02,805 and two if we intercept a drone anyway that they handle it properly so we don’t lose evidence. 120 01:09:02,805 --> 01:09:05,641 and when you are talking about a stadium environment, 121 01:09:05,641 --> 01:09:11,814 you’re talking about 1300 to 1500 employees doing security/customer service 122 01:09:11,814 --> 01:09:17,361 that have lots opportunity to see something that looks out of place. 123 01:09:17,361 --> 01:09:22,032 So you have to communicate clearly to those employees, 124 01:09:22,116 --> 01:09:25,452 what do I do if I see a drone? What’s the policy here? 125 01:09:25,452 --> 01:09:27,913 What am I suppose to do? Who do I tell? 126 01:09:27,913 --> 01:09:30,833 All that has to be communicated to your employees, 127 01:09:30,833 --> 01:09:34,003 We do a quick briefing before the beginning of every game 128 01:09:34,003 --> 01:09:37,131 with all the officials and sideline folks and say 129 01:09:37,131 --> 01:09:40,301 “look if a drone enters the airspace here’s the procedure 130 01:09:40,301 --> 01:09:41,468 this is what we need you to do.“ 131 01:09:41,594 --> 01:09:46,557 I hope this information will be helpful as you begin the process of developing an emergency action plan. 132 01:09:47,558 --> 01:09:54,064 Remember, the time to plan your response to a potential UAS incident is NOW, before an incident occurs. 133 01:09:55,816 --> 01:11:01,048 ♪♪