Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSectorsVideo SurveillanceArenas / Stadiums / Leagues / Entertainment

Drones: Nuisance or Serious, Immediate Threat?

How can enterprise security leaders protect their environments?

By Jonathan Hunter
Drones: Nuisance or Serious, Immediate Threat?
anti-drone systems
Jonathan Hunter

Jonathan Hunter

Drones: Nuisance or Serious, Immediate Threat?
anti-drone systems
Jonathan Hunter
September 1, 2017

As drones become easier to acquire, they pose an increasing threat to public buildings, events and people. To chief security officers (CSOs), drones can be a threat to the privacy and security of the organizations they are charged with protecting. In general, companies face a risk to key business operations as drones can be used to steal IP, damage infrastructure or gather sensitive data about a business. Fortunately, as the drone technology evolves, so does the technology that is being devised to mitigate them.

 

The Emerging Threat

Over the past decade, the technology for building and operating drones has become relatively inexpensive and very accessible, causing a rapid proliferation in use. In 2016, the Consumer Electronics Association estimated that 700,000 new drones would be sold to commercial and recreational users in the U.S. that year alone. For CSOs, this proliferation is accompanied by the realization that corporate property – as well as large gatherings such as theme parks, concerts and sporting events – are vulnerable “soft targets,” potentially exposed to a drone-based terror attack or the theft of sensitive information.

It is commonplace for drones to have the ability to see and capture data in the form of images and video. A livestream or a recording of individuals or buildings can easily be captured without consent. Moreover, even if the drone is operated by the company itself for internal purposes, the footage it collects is likely to be transmitted back to the user or the cloud via a connection that is not always secure, offering the potential for hackers to intercept and steal the data.

 

Examples of Drone-Based Security Breaches

Many recent high-profile incursions of drones around the globe have made headlines of interest to CSOs. To cite just a handful of examples:

  • In January 2015, a two-foot-wide drone was discovered flying at a low altitude in the vicinity of the White House in Washington, D.C. before it finally crashed on the southeast side of the building and was recovered by the U.S. Secret Service. As soon as it was detected inside the White House compound, there was an immediate alert and lockdown of the complex until the device was examined.
  • In February 2016, a drone crashed into the 40th floor of New York City’s Empire State Building and then fell onto a ledge five levels lower. The user, who claimed to be shooting video to promote a non-profit, was charged with reckless endangerment and illegal navigation of an aircraft in and over the city.
  • A February 2016 article in The Independent reported that “Star Wars” filmmakers had experienced issues with drones while filming “The Force Awakens” at the Greenham Common RAF base in Berkshire; including the leaking of a few photographs of the set. That fall, the Daily Mail reported how several drones were spotted during the filming of the seventh season of HBO’s popular show “Game of Thrones,” presumably to gain information about the plot.
  • In August 2016, a drone crashed at the Koeberg Nuclear Power Station in Cape Town, South Africa, leading nuclear experts to react with outrage toward lax security at the facility. The incident led to the suspension of Koeberg’s safety officer as a precautionary measure.
  • In February 2017, National Football League security grounded a drone that was being flown over a practice game of the Atlanta Falcons, near the campus of Rice University, prior to Super Bowl LI. It was not evident from the subsequent NFL pool report regarding how long the drone flew above the practice, who was flying the drone or whether the Falcons were concerned about the drone as it related to their preparation for their matchup against the New England Patriots.

 

Choosing the Optimal Counter-Drone Strategy

In light of these and similar incidents, CSOs are duty-bound to implement the best strategies to minimize the potential for damage to their respective organizations. The challenge then becomes one of evaluating which strategies are likely to be most effective. Since there are several companies claiming to have anti-drone technologies, what criteria should CSOs look at?

Key to this decision is recognition that technology currently exists to take control of a drone. Commercial counter-drone platforms are being developed, using sophisticated automated detection strategies, that can stop, redirect or land a drone safely. (U.S. military veterans have played a key role in the development of such platforms, using their experience to inform the capabilities of the technology.) This is done by taking advantage of weaknesses found in digital radio signals without simply jamming those signals or affecting other radio communications in the vicinity. These technologies are flexible and able to operate either on their own or capable of working in tandem with existing software.

These anti-drone systems have been designed to manipulate the drone radio signals to handle a wide range of potential drone attack scenarios and drone types. The systems are relatively simple for end-users such as CSOs to operate, requiring no technical background in drone security. CSOs who make an investment in such a system for their organizations are likely to see a near-term payoff with regard to the extra layer of security they have put into place.

In light of the increasing availability of counter-drone technology and the ever-increasing threat that drones present, all CSOs – no matter what the specific function of the organizations they are charged with keeping safe – stand to win by analyzing the benefits of these types of technologies when developing a comprehensive security and safety plan.

KEYWORDS: drone security intellectual property security perimeter security Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan Hunter is Chief Executive Officer of Department 13, the developer of MESMER, a software-based counter-drone solution for the government and commercial sectors.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drone1-900px.jpg

    Small Consumer Drones Pose Little Risk of Serious Head Injury

    See More
  • Drones: A Security Tool, Threat and Challenge - Security Magazine

    Drones: A Security Tool, Threat and Challenge

    See More
  • Avoiding Nuisance Alarms with Automatic Threat Assessment

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing