Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Leadership and ManagementPhysical SecurityPorts: Sea, Land, & Air

Fresh C-sUAS solutions are needed to defeat airport drone risks

By Jeffrey Starr
drone-sky-copy.jpg
September 28, 2021

When a drone came within 100 feet of a descending airplane in late June, police in Glasgow felt a clear sense of deja vu.

For years, the news media has been filled with stories of rogue drones veering into private airspace and coming dangerously close to commercial airliners. This time, the event happened over the skies of Scotland, when the pilot of a plane approaching the runway of Glasgow’s Paisley Airport saw and reported an illegally operated unmanned aerial vehicle (UAV) just in the nick of time.

When it comes to safety in the air, drones present one of the most pernicious threats to an aircraft at both takeoff and landing. Airplanes are at the highest risk when flying at low altitudes, and as drones become cheaper, smaller and more ubiquitous, the number of near-miss incidents in the sky continues to climb.

July’s incident in Glasgow was the fourth such close call in the U.K. alone this year. In May, an incoming passenger flight to Edinburgh nearly collided with a drone at 2,200 feet. Two different air ambulance helicopters were practically sideswiped by passing drones while transporting passengers or attempting to land on hospital rooftops.

But the problem is global. In recent years, airports in cities as varied as Newark, Dublin and Dubai have all grounded planes after drones were spotted near the runway. In one of the most widely reported and disruptive events, the runway at Gatwick Airport outside of London was shut down for 33 hours in 2018 at the cost of nearly $70 million.

There is no doubt that drones, both big and small, present a clear danger to planes and their passengers. Ignoring the threat can lead to catastrophe, both business loss and human life. The question is no longer whether drones are an issue above our runways. The question is how to defend against them.

The various dimensions of airport drone threat

Drone threats to airports do not come in a one-size-fits-all model. There are, in fact, multiple distinct categories of risk: accidental collision, deliberate attacks, and hostile surveillance and espionage.

Since a plane’s ability to maneuver and alter course is most limited at landing and takeoff, both of which bring the plane into low altitudes where drones are most likely to be present, the threat is most elevated when the plane is flying just above the runway.

Mid- and large-size drones can carry payloads, making them particularly dangerous. But even when explosives are not at play, these larger UAVs can do significant damage to aircraft. These include shattered windshields, lost optics and penetration and inhalation hazards, which ultimately require emergency landings after impact, according to the Canada National Research Council’s Aerospace Research Center.

At low speeds of around 140 knots, aircraft that collided with drones showed plastic damage and extensive deformation to the aircraft skin, as well as damage to the vessel’s underlying honeycomb structure. At higher speeds of 250 knots, severe deformation of slat curvature, secondary damage to the leading edge and even penetration of drone debris into the aircraft’s fractured area have been observed.

Given all these variables, it’s clear that a proper drone defense strategy requires a differentiated approach to correspond with the multi-faceted threat. A counter-drone strategy should start with understanding both the most accessible as well as the most dangerous drones that present the most significant threat and then calibrate a comprehensive, targeted and flexible defense strategy.

Traditional C-UAS technology is not suitable for airports

Standard counter-drone mitigation technology presents significant issues when applied near civil and commercial aircraft.

Jammer-based solutions, for example, may disrupt drone communications, but they also can potentially hamper other crucial communications systems in the area. In an airport, this is especially sensitive and highly problematic.

Kinetic “hard-kill” solutions, such as shooting down a rogue UAV with some sort of projectile, are risky in all crowded situations because they can cause collateral damage. Airports are crowded, and low-flying aircraft are difficult to maneuver in these situations.

A fresh approach is needed

A fresh anti-drone mitigation approach is needed for airports, along with appropriate and aligned regulations. To keep airport airspace safe, qualified and authorized security agencies should be able to take control of a hostile drone or drone swarm situation.

New cyber takeover technologies represent a fresh and innovative approach. A cyber takeover involves authorized security agency personnel disconnecting the drone from its remote control, taking over the drone, and then sending the rogue drone via a safe route to landing. All of this must happen without interfering with legitimate authorized drones and communication signals in the vicinity. Cyber takeover systems do not rely upon jammers or kinetic technology. As such, they avoid collateral damage, interference, disruption or disturbance. Continuity is preserved as communications, commerce, transportation and everyday life proceed smoothly.

Focusing on the real risk and using the most suitable technology, along with appropriate legislation, would result in neutralized threats while allowing the uninterrupted functioning of airports and aircraft. This approach would lower the risk at low altitude levels and increase levels of safety, control and continuity.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: airport access control airport safety Cyber response drone countermeasures drone security risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeffrey Starr is CMO at D-Fend Solutions. Starr has held executive roles at companies in information, security, compliance, and risk management businesses.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Software-as-a-Service

    How to ensure your SaaS solutions are secure

    See More
  • Security newswire default

    Speed of Tech. Advancements, Resistance to Change are Top Risks for Businesses

    See More
  • drone attack

    Global incidents show rogue drones have increased

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing