Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityArenas / Stadiums / Leagues / EntertainmentConstruction, Real Estate, Property ManagementInfrastructure:Electric,Gas & WaterPorts: Sea, Land, & AirTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Six steps to control a rogue drone incident

By Jeffrey Starr
Respond to rogue drone incidents with these six steps
December 8, 2020

The Minnesota Twins were leading the  Pittsburgh Pirates 5-1 in the fifth inning when a drone appeared, hovering over home plate at  Minneapolis’s Target Field. A timeout was called. No one seemed to know what to do. A few days later, a similar scenario played out in Fenway Park, followed by drone incidents at several more games this season.

Small, unmanned aircraft systems (sUAS), commonly referred to as drones, are ubiquitous, diverse, and increasingly cheaper and faster to market. Their small size, relative durability and vast range of capabilities make them a vexing target for security services, because dealing with sUAS detection means making split-second decisions between what could be a hobbyist’s gadget or a weaponized aerial vehicle carrying a dangerous payload. The drone surveillance challenge lies in proper drone detection and intelligent mitigation, which can only be achieved via a thorough understanding of the rogue drone event lifecycle.

So, how does the lifecycle of a rogue drone incident play out? Teach your security personnel six possible steps, all of which fall under two broader stages: detection, then mitigation.

Step 1: Detection

All drone events begin with detection, using four primary technologies: acoustic sensors (microphones); optical sensors (cameras); and traditional radar and radio-frequency (RF)-based methods, such as radio direction finders. RF cyber takes this even further, using cyber means to penetrate the RF communications.

Acoustic methods, such as a cluster of microphones pick up on the sounds a drone makes. Good microphones can use that sound to calculate direction.

Optical sensors are essentially video cameras. They rely on imaging technology, including infrared and thermal.

Drone detection radar sends out a signal as a burst, the reflection bounces and measures direction and position as the returning echo.

Radio direction finders use antennas to receive radio waves and then utilize a processor to analyze the RF spectrum. The finders can detect radio communication between the intruding drone and its controller.

There are various pros and cons for each of these methods, which will depend on the needs of the specific environment, as well as the individual characteristics of the drone.

Tall buildings in an urban landscape, for example, create limited lines of sight, rendering optical solutions ineffective. Noisy environments combined with quiet drones can challenge acoustics, and radar may detect false positives and then be unable to distinguish a bird from a drone. 

Step 2: Location and Tracking

Now you want to locate and track the drone via GPS.

The above radars can be used for tracking and detection. If you deploy RF sensors, they could reveal transmissions between the drone and its pilot. This will give you the location of the drone and even in some cases the pilot as well.

If you relied on visual detection and identification, for example with optical sensors, you may be able to access information, map, and track from a camera, including GPS location and visual radius of the drone. This does, however, require line-of-sight.

RF cyber methods allow for passive and accurate real-time location tracking by extracting the drone’s GPS positions automatically, with no need for clear line-of-sight.

Step 3: Identification and Discovery

The next step is to know where the drone came from and ideally be able to figure out its intent. Many drones are friendly and pose no harm. You’ll want to extract the drone’s unique communication identification number, a.k.a. its “tail number,” which will tell you if this particular drone has authorization to be in the airspace. This will help you determine your next moves.

You should be able to identify from where the drone took off and you might want to identify the pilot – to alert law enforcement, to prevent future disruptions. 

Step 4: Mitigation

Most traditional methods of mitigation have their origins in the military counter-unmanned aerial systems (c-UAS) space and tend to revolve around either jamming, or kinetic methods.

While these jamming and kinetic methods have proven to be effective in mitigating drones, they carry certain disadvantages and risks in urban and sensitive environments, especially with crowds or VIPs in the area, and when in close proximity to important communications. 

Jamming systems can cause serious communications interference to your operational or security communications, GPS navigation, or control systems, and can disrupt Wi-Fi and cellular networks. In addition, the counter-drone effect is temporary until the jamming is over, at which point the pilot may retake control of the drone.

In some cases, the execution of mitigation with these methods represents the end of the incident, hopefully with a positive outcome. In some situations, depending on the technology applied, two other potential steps within mitigation may arise as viable options, both of which focus on this aspect of the drone’s operations.

Step 5: Fend-Off

“Fend-off” means mitigating the drone without destroying it or totally disabling it. In particularly sensitive areas, fend-off may be a useful option.

During fend-off, the signal of the rogue drone operator’s remote control is disconnected. This will either cause the drone to hover in place or fly back to its original takeoff position. Either way, the immediate threat is dissolved.

While jamming may also cause a drone to hover or go back to take-off position, it also interferes with nearby frequencies – this could include nearby airports, internal security communications, media, etc. Contrarily, an RF-cyber fend-off is surgical in its approach to cutting the drone’s remote-control communications, without adverse effects.

Step 6: Takeover

In some scenarios, a drone incident lifecycle will end before step 5. You may learn that the drone in question is harmless, and it will either leave your air space, or you’ll decide to let it fly away.

In other scenarios, a fend-off will be performed, which may mitigate the threat and partially resolve an otherwise dangerous situation, at least for the duration of the incident.

Another option, only recently available using new developments in RF-cyber takeover, is ending the incident by seizing control of the rogue drone and landing it safely. In a takeover situation, you as the defensive operator, or your autonomous system, will complete the detection and mitigation steps, and set a new flight path for a safe landing of the drone. Takeover avoids the risks of disruption and collateral damage, and focuses on maintaining control, ensuring a safe landing, and maintaining continuity. This method also allows for inspection and/or confiscation of the drone.

Back in Minneapolis, MLB players were lobbing baseballs at the hovering drone when it started to buzz away and both Twins and Pirates got back on the field. Security personnel at the stadium could have struck out in a major way, but sometimes the drone operator ends the drone incident lifecycle. No two drone events are the same. Like drones themselves, each is unique and often full of surprises. 

table

 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: drone security risk management surveillance system Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeffrey Starr is CMO at D-Fend Solutions. Starr has held executive roles at companies in information, security, compliance, and risk management businesses.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drone attack

    Global incidents show rogue drones have increased

    See More
  • drone-sky-copy.jpg

    Fresh C-sUAS solutions are needed to defeat airport drone risks

    See More
  • document security

    How to improve legal document security in six steps

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing