Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesPhysical Security

Before You Pull the Trigger: The Legal Implications of Shooting Down a Drone

By Christopher Sacco
drone-enews
February 13, 2018

It’s a scenario that isn’t hard for security professionals to imagine:  Someone spots a drone hovering inside your secure facility’s perimeter, over your event, or during your emergency response operation. The drone’s presence is at best a nuisance, and at worst, might damage people or property, or interfere with your principle mission. What options do you have?

The kneejerk response from most is, “shoot it down.” But that’s where things get complicated. There is no shortage of counter-UAS technology on the market, should you want to look for something beyond the old-fashioned shotgun, but the question of legality should be considered well before you take aim.

The FAA considers unmanned aircraft of any size to be covered under Title 18 of the United States Code 32, which describes “sabotage to include destruction of any aircraft in the special aircraft jurisdiction of the United States.” Violation of this code carries a maximum prison sentence of 20 years. In other words, it’s illegal to shoot down any aircraft in the U.S., including a drone, according to federal law. And lest you decide that simply jamming or intercepting control of the offending drone might be more your style, know that the FCC considers any form of “jamming” or otherwise interfering with radio transmission to be a violation of the Communications Act of 1934. Between these two federal laws, most anti-drone technology on the market (including net guns and jamming guns) could put you into some legal hot water.

This leaves little wiggle room for local law enforcement, first responders and security professionals when trying to mitigate the potential threat posed by an intruding drone. In a few states, such as Louisiana and Utah, police and firefighters have been granted local authority to disable drones flying over wildfires or endangering the public, but those who act on the basis of these state laws still find themselves in direct conflict with federal regulations.

There is certainly momentum toward a more unified regulatory environment that will allow law enforcement to act in reasonable ways to protect people and property, but until regulation catches up with technology, the best solution to combat an unwanted drone is a mix of prevention and employment of well-planned techniques, tactics and procedures (TTPs if you’re in the military). Here are five things you can do today within the bounds of the law:

  1. Raise awareness about “no-drone” zones that may exist around facilities or events. Signage explicitly stating restrictions will make a negligent hobbyist less likely to fly where they shouldn’t, and clearly stated restrictions might make any anti-drone actions more defensible in the eyes of the law.
  2. Include active monitoring for UAS in security plans. If cameras or personnel are already monitoring perimeters, entrances or sensitive points, add awareness of airspace to the mix. The first step in mitigation of potential malicious drones is detection.
  3. Work with a company capable of identifying and/or classifying any drones spotted in your airspace. Though radio waves cannot be legally used to down a drone, it is admissible to scan an aircraft to determine its intent. Databases exist that can categorize hobbyist versus commercial models, and, if a drone is registered, ownership can potentially be traced.
  4. Employ counter-UAS drones. This might sound counterintuitive, but military squadrons often defend airspace by flying defensive tactics that do not include firing weapons, and there are companies offering similar capabilities with drones. These “friendly” drones can detect and ID intruding UAS from the air, and can help locate operators by tracking intruding drones back to a landing point. At that point, a handoff with local law enforcement is possible.
  5. Plan with local law enforcement for worst-case scenario contingencies. There may be a case where authorities are willing to risk legal complications to preserve people or property, and a plan must be in place prior to an incident, so you’ll know what to do if and when disabling an intruding drone is absolutely required.

Because regulations are evolving and differ by locality, take the time to learn what laws apply in your specific locale. Until regulations catch up with UAS technology, providing security that includes a counter-drone plan can feel a little like policing the wild west. Smart planning and partnership with the right counter-UAS partners or technologies for you can keep your property and people safe.

KEYWORDS: airport security drone security perimeter security sports security Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher Sacco is the CEO and co-founder of ABSI, a CVE-verified Service-Disabled Veteran Owned Small Business (SDVOSB) engaged in delivering a wide variety of UAS-centric services in support of the Department of Defense, as well as other government agencies and commercial interests. Sacco is also Managing Partner of redUAS, LLC, a joint venture of six small businesses focused on delivering counter-UAS training, services, and consultation to government agencies, as well as to commercial ventures. A former US Navy officer and small UAS subject matter expert, Sacco is sought out as an expert in the employment of unmanned systems to support military, veteran, law enforcement, and first responder communities.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Spanish Pull EU Trigger Against Somali Pirates

    See More
  • Shooting Down the Pirates

    See More
  • retail-enews

    The Science of Shoplifting and How Crime Prevention Begins Before Customers Enter a Retail Store

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing