Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingPhysical Security

Things are looking up for the commercialization of drones

By Robert R. Ackerman Jr.
Drones: Nuisance or Serious, Immediate Threat?
January 12, 2021

For years, there has been optimistic talk that drones – the popular name for UAVs (unmanned aerial vehicles) – would become ubiquitous and used for security purposes. Instead, drones have been popular among hobbyists but much less so in the commercial sector, undermined by strict federal government restrictions.

It’s changing. The drone-industry is becoming an increasingly promising technology-intensive industry, one that will employ far more workers than it does today while enhancing the efficiency and security of a variety of businesses.

Just after Christmas, U.S. regulators after a long delay finally established industrywide requirements for remote identification of drones. This means that the Federal Aviation Administration (FAA), which heretofore had to approve drone use beyond the line-of-sight on a case-by-case basis, has now instead established broad safety standards. These are intended to promote eventual widespread home delivery of small packages and a number of other previously restricted applications.

Among other things, the FAA has mandated the use of onboard radio transmitters for drones to transmit their positions, substantially enhancing drone safety. Existing models will have to be retrofitted with the technology.

These new steps open the door in 2021 to the natural business appetite to jump on a profitable opportunity. The FAA estimates that there are 1.25 million personal drones in the United States and 385,000 commercial drones. Now the FAA predicts by 2023 there will be 835,000 commercial drones – more than double the current number - largely because more businesses will adopt UAV programs for deliveries, inspections and other uses.

With the new regulations, this forecast could easily turn out to be overly conservative.

 “Almost anyone you talk to will probably agree that drones will be commonly used in almost all industries across the board,” says Dino Boukouris, a strategic and M&A advisor at Momentum Cyber which counsels the cybersecurity ecosystem and is an expert on drones and drone security. “Look for the drone industry to be opening up hundreds of thousands of jobs in coming years,” adds Brett Velicovich, an independent, Washington-based consultant known as “drone warrior,” with four Fortune 500 clients.

Major players will include the agricultural and utility industries, construction, oil and gas, and first responders. And, arguably, the biggest of all could be the security industry.

“Today, security guards do rounds once an hour,” Boukouris points out. “How efficient is that?  Drones could solve that need easily.”

In coming years, companies are highly likely to adopt UAVs to monitor their perimeters, to the point where it will likely thin the ranks of guards. This is predictable because the key to security events is the timely, efficient understanding of pertinent details and the assignment of actions in response to the event.

Drones have the edge because details of the event and assigned actions are uploaded directly via software to the drone for immediate deployment. In the case of a human intrusion, a geospatially-enabled video management system can automatically inform the drone of the intrusion and the exact location of the event. The drone can then fly to the location of the event using pre-defined flight routes, locking the camera on intend targets and waiting for further instructions.

Clearly, drones can do all this and guards cannot. Surveillance cameras, of course, are also part and parcel of security today and can pinpoint criminal behavior that slips by guards, but they do not assign reactions.

Drones can also be used to improve security in parking lots, prison yards and in border security, and to better protect college campuses, cultural landmarks and livestock on ranches. They may even wind up becoming important security tools in residential neighborhood security watch systems.

More than the makers and users of other IoT devices, drone manufacturers and users need to look at the big picture. Routine business considerations alone are insufficient. Underlying digital technology today is the fact that surveillance and security – whether commercial or residential – continues to grow steadily in a world of increasing volatility, ambiguity and complexity. Privacy – not just security – is becoming a key concern.

Drones do harbor some vulnerabilities. The full implementation of onboard radio transmitters, for instance, could take years. So flying blind in the interim could continue to endanger people. “Drones can crash into each other today, and that is a problem,” says Greg Falco, a postdoctoral scholar at Stanford researching drone prospects and cyber risks. Even more significant, drones can be compromised like any other IoT device, in their case from as much as a mile away.

Security is the bigger issue and needs more work. Once a drone has been located, it can be hacked and video and other images the drone is broadcasting to its base station can be downloaded. In one high-profile case roughly two years ago, rogue drones grounded planes at London Gatwick, England’s second-busiest airport, generating flight delays and cancellations.

Drones are already being used to target Wi-Fi connections, many of which are not well secured. Too often, they rely solely on single-factor authentication and the use of typical passwords that can be easily cracked, especially with the absence of an encrypted connection. This makes it easy, for example, to intercept communication in a building or in a public cafe. It’s also a concern that drones are commonly manufactured in China or assembled from Chinese components and could contain a hidden backdoor for the Chinese government.

Fortunately, there is some good news on the drone front as well.

Drones, like other electronic devices, can be better protected. Major drone manufacturers issue patches when new security threats emerge and these should always be installed. Also helpful is a virtual private network (VPN), which stops hackers from accessing communications when connected to the internet.

In coming years, storage in the cloud and, in particular, encryption, will be the best answer to security concerns. The latter will become common as prices recede.

Significant growth in commercial drones is a matter of dollars and cents and fundamentally inevitable. Risk alone will not stop industries from embracing drones, especially as they are continually outfitted with better camera systems and batteries. This is a good thing. No question, the widespread use of drones will create significant new opportunities for the security industry and also help juice the overall economy.

 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: drones safety standard Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob ackerman

Robert R. Ackerman Jr. is founder and managing director of AllegisCyber Capital and co-founder of cyber startup foundry DataTribe. He was the first investor to create a venture fund focused exclusively on cybersecurity and data science and has been investing in cybersecurity for more than 15 years in the U.S. and select international markets. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Internet of Things

    Poor security threatens Internet of Things hypergrowth

    See More
  • digital-cyber

    Five tips for chief information security officers to increase their strategic value to the CEO and board of directors

    See More
  • test

    CISOs are changing their ways amid their toughest environment ever

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!