Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSectorsVideo SurveillanceArenas / Stadiums / Leagues / Entertainment

Drones: Nuisance or Serious, Immediate Threat?

How can enterprise security leaders protect their environments?

By Jonathan Hunter
Drones: Nuisance or Serious, Immediate Threat?
anti-drone systems
Jonathan Hunter

Jonathan Hunter

Drones: Nuisance or Serious, Immediate Threat?
anti-drone systems
Jonathan Hunter
September 1, 2017

As drones become easier to acquire, they pose an increasing threat to public buildings, events and people. To chief security officers (CSOs), drones can be a threat to the privacy and security of the organizations they are charged with protecting. In general, companies face a risk to key business operations as drones can be used to steal IP, damage infrastructure or gather sensitive data about a business. Fortunately, as the drone technology evolves, so does the technology that is being devised to mitigate them.

 

The Emerging Threat

Over the past decade, the technology for building and operating drones has become relatively inexpensive and very accessible, causing a rapid proliferation in use. In 2016, the Consumer Electronics Association estimated that 700,000 new drones would be sold to commercial and recreational users in the U.S. that year alone. For CSOs, this proliferation is accompanied by the realization that corporate property – as well as large gatherings such as theme parks, concerts and sporting events – are vulnerable “soft targets,” potentially exposed to a drone-based terror attack or the theft of sensitive information.

It is commonplace for drones to have the ability to see and capture data in the form of images and video. A livestream or a recording of individuals or buildings can easily be captured without consent. Moreover, even if the drone is operated by the company itself for internal purposes, the footage it collects is likely to be transmitted back to the user or the cloud via a connection that is not always secure, offering the potential for hackers to intercept and steal the data.

 

Examples of Drone-Based Security Breaches

Many recent high-profile incursions of drones around the globe have made headlines of interest to CSOs. To cite just a handful of examples:

  • In January 2015, a two-foot-wide drone was discovered flying at a low altitude in the vicinity of the White House in Washington, D.C. before it finally crashed on the southeast side of the building and was recovered by the U.S. Secret Service. As soon as it was detected inside the White House compound, there was an immediate alert and lockdown of the complex until the device was examined.
  • In February 2016, a drone crashed into the 40th floor of New York City’s Empire State Building and then fell onto a ledge five levels lower. The user, who claimed to be shooting video to promote a non-profit, was charged with reckless endangerment and illegal navigation of an aircraft in and over the city.
  • A February 2016 article in The Independent reported that “Star Wars” filmmakers had experienced issues with drones while filming “The Force Awakens” at the Greenham Common RAF base in Berkshire; including the leaking of a few photographs of the set. That fall, the Daily Mail reported how several drones were spotted during the filming of the seventh season of HBO’s popular show “Game of Thrones,” presumably to gain information about the plot.
  • In August 2016, a drone crashed at the Koeberg Nuclear Power Station in Cape Town, South Africa, leading nuclear experts to react with outrage toward lax security at the facility. The incident led to the suspension of Koeberg’s safety officer as a precautionary measure.
  • In February 2017, National Football League security grounded a drone that was being flown over a practice game of the Atlanta Falcons, near the campus of Rice University, prior to Super Bowl LI. It was not evident from the subsequent NFL pool report regarding how long the drone flew above the practice, who was flying the drone or whether the Falcons were concerned about the drone as it related to their preparation for their matchup against the New England Patriots.

 

Choosing the Optimal Counter-Drone Strategy

In light of these and similar incidents, CSOs are duty-bound to implement the best strategies to minimize the potential for damage to their respective organizations. The challenge then becomes one of evaluating which strategies are likely to be most effective. Since there are several companies claiming to have anti-drone technologies, what criteria should CSOs look at?

Key to this decision is recognition that technology currently exists to take control of a drone. Commercial counter-drone platforms are being developed, using sophisticated automated detection strategies, that can stop, redirect or land a drone safely. (U.S. military veterans have played a key role in the development of such platforms, using their experience to inform the capabilities of the technology.) This is done by taking advantage of weaknesses found in digital radio signals without simply jamming those signals or affecting other radio communications in the vicinity. These technologies are flexible and able to operate either on their own or capable of working in tandem with existing software.

These anti-drone systems have been designed to manipulate the drone radio signals to handle a wide range of potential drone attack scenarios and drone types. The systems are relatively simple for end-users such as CSOs to operate, requiring no technical background in drone security. CSOs who make an investment in such a system for their organizations are likely to see a near-term payoff with regard to the extra layer of security they have put into place.

In light of the increasing availability of counter-drone technology and the ever-increasing threat that drones present, all CSOs – no matter what the specific function of the organizations they are charged with keeping safe – stand to win by analyzing the benefits of these types of technologies when developing a comprehensive security and safety plan.

KEYWORDS: drone security intellectual property security perimeter security Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan Hunter is Chief Executive Officer of Department 13, the developer of MESMER, a software-based counter-drone solution for the government and commercial sectors.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drone1-900px.jpg

    Small Consumer Drones Pose Little Risk of Serious Head Injury

    See More
  • Drones: A Security Tool, Threat and Challenge - Security Magazine

    Drones: A Security Tool, Threat and Challenge

    See More
  • car in field.JPG

    Drones help law enforcement collect threat intelligence

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing