Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityCybersecurity NewsGovernment: Federal, State and Local

Smart Cities Have New Physical Threats: The Impact of Drones on Security and Public Safety

By Eben Frankenberg
drones
October 16, 2018

Smart city leaders are rightfully concerned about cybersecurity. Securing smart digital cities with millions of IOT devices from rogue actors with easy access to Internet connections anywhere in the world requires constant vigilant effort. Unfortunately, away from all the headlines of cybersecurity lies a new, but equally concerning threat: rogue actors with easy access to inexpensive drones that can violate individual privacy, menace citizenry in public spaces, and deliver contraband or even lethal payloads.

Physical security and cybersecurity are different sides of the same security coin. As the cities of tomorrow emerge with more complex networks and connected and autonomous technologies of all kinds, city planners must consider physical security as an integral component of smart city security.

 

Drones Mean New Considerations for Smart City Security

In 2017, drone industry sales topped $1 billion dollars, more than 10 million were sold globally, and nearly 3 million drones will be sold in the U.S. alone in 2018. With growth like this, it is clear that security planners must consider smart city security as a 3-dimensional challenge rather than the 2D challenge they’ve dealt with for centuries   

In a Washington Post July OpEd, Secretary of Homeland Security Kirstjen M. Nielsen, wrote: “Drone technology offers the potential to change our world – from enabling historic transformations in e-commerce to faster emergency response. But the technology also has a dark side. It can be used to spy on us, to threaten our critical infrastructure, or to attack crowds and public places.”

The good news is that comprehensive cyber and physical security is possible, but it does require extending smart city security beyond its current 2D paradigm and digital emphasis.

 

Critical Infrastructure Protection

Every city requires critical utility services, often delivered over vast networks and from great distance. Electricity grids may have dozens of generating locations, hundreds of substations, thousands of towers, and tens of thousands of wire miles. Water and sewer networks store and deliver water from open air reservoirs and send waste from homes and apartments to open air treatment plants. Many cities have industrial districts in and around populated areas that include potentially hazardous chemical plants, refineries, or manufacturing facilities.

After years of focus on security, nearly all of these facilities have layers of protection from external actors. This includes cyber security and security against ground threats – people or vehicles. Yet, nearly all of them lack the necessary security to prevent rogue drones from delivering payloads or from gaining network access by hovering above a site and appearing to be an internally located device. It is worth noting the actions of Greenpeace, which flew a drone dressed as Superman into a French nuclear facility in July. Rogue operators are seldom so public about their activities.

Smart cities also have parks and places for residents to gather, whether as individuals enjoying a sunny day, or tens to hundreds of thousands attending an event (e.g. parades, festivals, sporting events, etc.). There have been many cases of drones accidentally crashing into people and groups, and the recent news of an attempted drone attack on the President of Venezuela highlights just how close we are to munitions on drones as a mayhem delivery vehicle of choice for bad actors.

 

Using Drones for Public Safety

As noted by Secretary Nielsen, there are equally compelling positive use cases for drones in smart cities, extending or expediting services and saving money. First responders fly missions to help fight fires, understand accidents, track suspects, or search for lost or wayward people. Utilities use drones to inspect facilities, towers, reservoirs, wires, and pipelines. Innovative companies hope to one day deliver everything from packages to food to medicine to even organs for transplant surgery.

While NASA and FAA work on rules for enabling drones in the national airspace, smart cities need to factor drones into their security planning. For example, security infrastructure should contemplate that first responders may deploy portable equipment that scans the skies around their drones to ensure no other aircraft are operating nearby (e.g. news helicopters, etc.). Given the growth in use of drones by first responders nationally, this should be one of the early objectives for smart cities, demonstrating safe drone use for all to see.

Another step is to identify parks, stadiums and other facilities where large numbers of people gather and implement a security architecture of deployed sensors to continuously surveil the air above such spaces and inform the proper authorities if unauthorized drones are in the vicinity. The same can also be done for industrial facilities like power plants, chemical plants, petroleum refineries, ports, or key manufacturing facilities. Working collaboratively with state and federal authorities can lead to a joint architecture for securing critical infrastructure and public spaces.

Now is the time for smart city leaders to expand their concepts of security. Cyber is a well-documented new threat matrix which has received a lot of deserved attention. But the other very real new threat is the physical one posed by drones, which also needs to be addressed. To counter the growing drone-based threat, industry is moving quickly to design and manufacture sensors augmented with AI that enable comprehensive 3D security architectures at commercial price points. As these physical security sensors are deployed and integrated along with cyber assets, smart city leaders will be on a path to creating a robust, multi-layered cyber-physical security solution that offers full-time situational awareness and protection for all residents.

KEYWORDS: city security drones event security public safety smart city

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eben Frankenberg is CEO of Echodyne Corp which he co-founded in 2014 to bring metamaterials-based radar products to market. Before Echodyne, Frankenberg held executive leadership positions at Intellectual Ventures (IV) which included creating and incubating new companies like Echodyne, founded in 2014, Evolv Technologies, Inc., founded in 2013 to deliver security imaging products, Kymeta, founded in 2012 to deliver metamaterials-based satellite communication terminals, and TerraPower, founded in 2008 to deliver next generation nuclear power reactors. Frankenberg was COO of Intellectual Ventures as it grew from 50 to 550 people, and from $250M to >$5B of capital under management.

Prior to joining Intellectual Ventures, Frankenberg spent nine years at Onyx Software Corporation in various executive leadership roles. From 1995-2000, he led sales and marketing as the company grew from $2M to $160M annual run rate and went from basement start-up to 800 person publicly traded NASDAQ company. Frankenberg has a B.A. from Dartmouth, and a M.S. from Stanford.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0419-city-feat-slide1_900px

    The Impact of City Surveillance and Smart Cities

    See More
  • Global AI

    Artificial intelligence bolsters public safety & security in smart cities

    See More
  • drones

    Drones and Security: The Future of Public Space Safety

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!