Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Uncovering the legality and security of radio frequency based drone detection systems – 5 questions to ask technology providers

By Linda Ziemba
drones freepik

<a href='https://www.freepik.com/photos/camera'>Camera photo created by ArthurHidden - www.freepik.com</a>

March 9, 2021

Last August, the Department of Justice (DOJ), Federal Aviation Administration (FAA), Department of Homeland Security (DHS), and Federal Communications Commission (FCC) issued an advisory guidance document to help non-federal public and private entities navigate the laws and regulations related to Unmanned Aircraft Systems (UAS), commonly referred to as drones, mitigation and detection technology. The advisory references various federal provisions and laws that could render such technology illegal to use but does not cover state and local laws that might also be relevant.

The advisory states radar, electro-optical, infrared, and acoustic detection systems are less likely to pose concerns under federal criminal surveillance statutes. However, Radio Frequency (RF) based systems may implicate these statutes. This should not rule out RF-based systems as an option, though, because among other unique benefits, they are the only type that can reliably detect the drone’s pilot (controller), and there are existing technologies that don’t violate the referenced statutes.

 

American Security Drone Act of 2021

The American Security Drone Act of 2021, formerly introduced as the American Security Drone Act of 2019, was given new life in January 2021 with bipartisan support and now incorporates drone detection and mitigation systems, not just drones. It would ban federal entities from purchasing drones and detection/mitigation systems developed by “covered foreign entities” which includes entities who pose a national security risk or are influenced by or located in the People’s Republic of China (PRC).

The bill stems from the U.S. government’s long-standing concerns about the popular Chinese-made DJI drone collecting information that could be exploited by the Beijing government. As a result, several government agencies have grounded their DJI fleets.

 

Get to The Bottom of System Legality and Security

The federal advisory cautions against relying solely on vendors’ representations of their systems’ legality or functionality. Here are five questions you can ask RF-based technology vendors to determine if they are in compliance with the federal advisory or could be banned by the American Security Drone Act of 2021 for security and cybersecurity reasons.

  1. Does the system include any mitigation capabilities?

Mitigation includes any method that takes a drone out of the sky which falls into two categories: non-kinetic and kinetic. Non-kinetic mitigation uses non-physical measures such as signal jamming or a geo-fence to disrupt or disable a drone. Kinetic methods include physical measures like lasers or projectiles.

The FAA considers drones as aircrafts, so bringing one down comes with a host of legal ramifications. The advisory doesn’t even go into the potential legal consequences of the property damage or injury to people a drone could cause upon a sudden landing.

For good reason, Congress only allows the Departments of Defense, Energy, Justice, and Homeland Security mitigation authority which makes the ability to locate the drone pilot even more important for the majority without this authority.

 

  1. What information is the technology collecting (e.g., UAS type, manufacturer, model, protocol, unique identifier, telemetry)?

This question comes straight from the advisory and is related to The Pen/Trap Statute. Use or installation of a pen register or trap and trace device is prohibited unless conducted with a court order or statutory exception or if you are a provider of wire or electronic communication services. The term “pen register” means a device or process which records or decodes dialing, routing, addressing, or signaling (DRAS) information transmitted by an instrument or facility from which a wire or electronic communication is transmitted.

Put simply, signal communications between a drone and its controller are protected by this statute. So RF-based systems cannot interfere with these communications or extract any information from them. This includes UAS type, manufacturer, model, protocol, unique identifier, and telemetry.

If a vendor’s answer to this question is anything but no information at all is collected, their system may implicate the Pen/Trap Statute.

 

  1. Is any of the information extracted DRAS information?

It is possible that as little as extraction of a timestamp from the drone signal by a drone detection system may qualify as DRAS information. This is why it’s better to opt for technology that only monitors for the existence of RF signals without reading or intercepting them in any way.

 

Figure 1

drones

*Image courtesy of the author

 

Figure 1 helps visualize how different types of RF-based drone detection systems operate. Systems that “read the letter” would extract things within the drone signal like GPS coordinates of the drone/controller to locate the devices. Systems that “read the address on the envelope” may read the timestamp, for example. Systems that only “look for the presence of the envelope” do not implicate the Pen/Trap Statute because they only monitor for the presence of RF signals in the environment much like a Geiger-counter detects the presence of radioactive material.

 

  1. Are electronic communications being acquired? If so, are any portions of the communications acquired by the technology “content?”

These are also questions from the advisory but this time related to the Wiretap Act which prohibits the interception of radio communications. It defines “content” as “any information concerning the substance, purport, or meaning of any wire, oral, or electronic communication” which does not include the existence of the communication.

Refer to Figure 1 to help determine which systems implicate the Wiretap Act. Systems that read or extract information inside or outside of the drone signal would be in violation.

 

  1. What is the equipment and software country of origin?

This question goes back to the security and cybersecurity concerns related to the American Drone Security Act of 2021. Network-connected hardware from an adversarial country presents a significant security risk and may soon be illegal to purchase.

Systems that illegally demodulate and decode drone signals may be reading ALL signals in your environment to determine which are the ones it’s looking for. Do you really want to take that risk even if the bill doesn’t pass?

Also, be cautious if you are working with a reseller of drone detection technology. They may be whitelabeling another technology. 

 

Disclaimer: I am not a lawyer and this should not be considered legal advice. You should seek appropriate counsel for your own situation.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: drones FAA security regulation surveillance system unmanned aircraft systems

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Linda ziemba
Linda Ziemba is the CEO and Founder of AeroDefense. Her experience spans internet security, telecommunications and entrepreneurship at companies including Websense, Secure Computing, Finjan, AT&T and Lucent Technologies. Ms. Ziemba studied at NYU Stern School of Business, completed the Executive Education Consortium for Senior Executives at Goizueta School of Business and earned her Bachelor of Science in Business Management from Murray State University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drone-enews

    Quick Guide for Evaluating Drone Detection: Top 10 Questions to Ask

    See More
  • airport

    Enhance security at mass transit hubs with radio frequency technology

    See More
  • cybersecurity-resilience-fp1170v1.jpg

    5 questions CISOs should ask when evaluating cyber resiliency

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!