Laserfiche WebLink
IPR Appendix | 2023 Page F-8 <br />Acquisition and Use of Technology to Mitigate UAS (Counter-UAS) <br />In August 2020, FEMA was alerted you of an advisory guidance document issued by DHS, the <br />Department of Justice, the Federal Aviation Administration, and the Federal Communications <br />Commission: https://www.dhs.gov/publication/interagency-legal-advisory-uas-detection-and-mitigation- <br />technologies. The purpose of the advisory guidance document is to help non-federal public and private <br />entities better understand the federal laws and regulations that may apply to the use of capabilities to <br />detect and mitigate threats posed by UAS operations (i.e., Counter-UAS or C-UAS). <br />The Departments and Agencies issuing the advisory guidance document, and FEMA, do not have the <br />authority to approve non-federal public or private use of UAS detection or mitigation capabilities, nor do <br />they conduct legal reviews of commercially available product compliance with those laws. The advisory <br />does not address state and local laws nor potential civil liability, which UAS detection and mitigation <br />capabilities may also implicate. <br />It is strongly recommended that, prior to the testing, acquisition, installation, or use of UAS detection <br />and/or mitigation systems, entities seek the advice of counsel experienced with both federal and state <br />criminal, surveillance, and communications laws. Entities should conduct their own legal and technical <br />analysis of each UAS detection and/or mitigation system and should not rely solely on vendors’ <br />representations of the systems’ legality or functionality. Please also see the DHS press release on this <br />topic for further information: https://www.dhs.gov/news/2020/08/17/interagency-issues-advisory-use- <br />technology-detect-and-mitigate-unmanned-aircraft. <br />Cybersecurity Projects <br />IPR funds may be used for projects that enhance the cybersecurity of: <br />•Access controls, sensors; security cameras, badge/ID readers, ICS/SCADA systems, process <br />monitors and controls (such as firewalls, network segmentation, predictive security cloud, etc.); <br />and <br />•Passenger/vehicle/cargo security screening equipment (cybersecurity assessments are allowable). <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />“Framework”), developed by the National Institute of Standards and Technology (NIST). The Framework <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers ways to improve their programs, such as through better communication <br />with their leadership and suppliers about management of cyber risks. <br />The Cybersecurity and Infrastructure Security Agency’s (CISA) Critical Infrastructure Cyber Community <br />C³ Voluntary Program also provides resources to critical infrastructure owners and operators to assist in <br />adoption of the Framework and managing cyber risks. Additional information on the Critical <br />Infrastructure Cyber Community C³ Voluntary Program can be found at www.cisa.gov/ccubedvp. <br />DHS’s Enhanced Cybersecurity Services (ECS) program is an example of a resource that assists in <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />“Detect” and “Protect” functions to deliver an impactful solution relative to the outcomes of the <br />Framework. Specifically, ECS offers intrusion prevention and analysis services that help U.S.-based <br />companies and SLTT governments defend their computer systems against unauthorized access, <br />exploitation, and data exfiltration. ECS works by sourcing timely, actionable cyber threat indicators from