Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Defending airspaces from hostile drones

By Dane Dodd
drones-freepik1170x658v4.jpg
March 8, 2022

Unmanned aerial vehicles, more commonly known as “drones,” pose a growing danger to people, enterprises and infrastructure. Just last month, on January 17, 2022, Houthi rebels from Yemen used explosive-laden aerial drones to attack a strategic oil facility in the United Arab Emirates (UAE) and start a fire at Abu Dhabi International Airport. These attacks killed three people and prompted the UAE to pose an immediate ban on all types of recreational drones. This attack was very similar to two drone attacks launched against oil refineries in Saudi Arabia on September 14, 2019. 


In the U.S., a swarm of four, unauthorized drones appeared above the Palo Verde Nuclear Generation Station near Phoenix, Arizona, after dark on September 29 and again on September 30, 2019, just days after the similar attacks in Saudi Arabia. Eight months earlier, a similar incursion was reported at Pennsylvania’s Limerick nuclear generating facility. In July 2020, a small recreational drone carrying copper coils and nylon cords was used to successfully attack an electric utility substation in Hershey, Pennsylvania. In each of these examples, inexpensive recreational drones have been used to facilitate criminal activity. 


In October 2021, U.S. authorities from the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and National Counterterrorism Center (NCTC) published advisories for law enforcement warning of the increased threat drones pose to critical infrastructure. This warning from U.S. authorities echoes concerns raised by Marine General Kenneth McKenzie, then the head of U.S. Central Command, who saw the threat of inexpensive “Costco” drones early on. In July 2020, at an event hosted by the Middle East Institute, General McKenzie said, “I’m not talking about large, unmanned platforms which are the size of a conventional fighter jet that we can see and deal with, as we would any other platform. I’m talking about the one you can go out and buy at Costco right now in the United States for a thousand dollars, four quad, rotorcraft or something like that that can be launched and flown. And with straightforward modifications, it can be made into something that can drop a weapon like a hand grenade or something else.”

 

“Drone” is a broad term that includes toys for kids, recreational drones for hobbyists, professional drones for agriculture, e-commerce, entertainment, emergency management and research and weaponized devices for military use. Military drones have been used for surveillance and direct action to destroy enemy personnel and property for more than 20 years. During this time, drones have become more advanced, more networked, and now fly faster and farther with more sophisticated capabilities. Like many technologies, drones have become more capable, but they have also become less expensive. Today’s abundance of low-cost recreational drones provides extremists, criminals, drug cartels, and anyone interested in sowing discord with the ability to assassinate people, destroy property, and deliver military-style attacks anywhere in the world. 


How Drones Work

The most common type of drone is an unmanned aerial vehicle, or UAV for short, which is typically constructed of lightweight composite materials, so they are easy to fly and maneuver. While most aerial drones are controlled using radio waves, recent developments in wireless connectivity have made it possible to pilot a drone using a smartphone or tablet. This makes it easier for a pilot to use the drone’s camera to see from the drone’s perspective. A drone’s built-in cameras are arguably its most valuable feature. Not only do cameras make it easier for a pilot to navigate a drone, but they allow people to do anything from shooting video to shooting a gun. 


When we think of drones, we typically imagine a small, remotely piloted aircraft. Unmanned aerial vehicles span from microdrones, which are as small as the nail on your pinky finger, to larger drones that could conceivably carry a person. Increasingly, aerial drones are being deployed in swarms where multiple drones, networked with each other, fly in unison. Swarms of microdrones are particularly worrisome because they are more challenging to detect. But drones aren’t always aerial.


Unmanned marine vehicles, or UMVs, are submersible devices that can “swim” in water. While their buoyancy limits their weight capacity, they threaten submerged infrastructure. On land, we come across unmanned ground vehicles (UGVs), like NASA’s Mars rovers. These drones can climb, walk and crawl over rugged terrain while carrying significant payloads. With Tesla and other auto manufacturers creating self-driving technology, we aren’t far off from a future with self-driving UGVs on the road with manned vehicles.


All unmanned vehicles could pose a threat whether a drone is in the air, in the water or on land. With a drone, someone can disrupt an entire facility without ever setting foot on the property.


Drones and Hostile Reconnaissance

Incidents with hostile drones have increased significantly over the last two years. The Federal Aviation Administration (FAA), which tracks unmanned aircraft sightings (UAS), now receives more than 100 UAS reports each month. Most of the UAS incidents tracked by the FAA are reported near airports by commercial pilots. A cursory review of recent drone incidents underscores the problem.


On January 28, 2022, two people were injured when a drone fell on them at a stadium in Jabalpur, India. On January 24, 2022, an English Premier League soccer match was stopped because of an illegal drone overflight. On January 15, 2022, an invasive drone was seen above the NFL playoff game between the Cincinnati Bengals and the Las Vegas Raiders. In March of last year, the police arrested a man in Simi Valley, California for allegedly using a drone to deliver heroin. A man was arrested for flying a drone in temporarily restricted airspace in Miami Beach, Florida, in the week leading up to last year’s Super Bowl. We also see a lot of drone activity around airports, such as when the Piedmont Triad International Airport in Greensboro, North Carolina, had to divert, suspend and hold flights due to illegal drone activity over the airfield. 


As IoT (Internet of Things) capabilities expand, we have many more devices connected to a wireless network in government facilities, hospitals and commercial and financial buildings. Because these IoT networks can be accessed with proximity connections, drones can get close enough to connect to the network, hack into IoT devices, and potentially gain access to sensitive information. A hacker could even use a drone to set up jammers that block the network and render IoT devices useless, interrupting operations that rely on the network.


As more manufacturers enter the drone market and develop faster ways to produce these machines, there are more drones in the world than ever before. While drones are not inherently hostile, the greater issue is that most organizations do not pay attention to their airspace and are unequipped to deal with a drone incident, hostile or not.


How to Protect Airspaces from Drones

In the U.S., it is illegal in most places to use brute force, like guns or nets, to take down a drone, even if it’s near your property. While the Federal Aviation Administration (FAA) has put restrictions in place to regulate drone flights, these regulations will not stop bad actors’ intent on damaging property or harming people.


While most drones are operated by hobbyists who just want an open space to try out their new toy, drones have increasingly become a tool to perform hostile acts against people, critical infrastructure, and vulnerable property. Today, most drones are used just for reconnaissance. But organizations need to prepare for the inevitable future where drones are used to drop poisons or explosives and bypass typical security to fly into buildings, transmit video, jam electronic signals, or leave something behind.


Virtually no one is paying attention to their airspace, and that is a gap organizations need to close quickly to defend against hostile drones. Here are the steps enterprise security can take to protect their airspace from drone overflights:


Understand the Scope of the Problem

First and foremost, organizations and their security leaders need to be able to conduct surveillance of the airspace of the site. Most buildings include about 100 feet of airspace; the FAA controls anything above that. Without surveillance capabilities of the airspace, organizations won’t have eyes to tell if there is a drone nearby.


With today’s technology, organizations have many ways to track drones. The most common method is using radar to identify drones by their motors, which emit a frequency that can be tracked, allowing leaders to figure out the type of drone, its speed and direction of travel. Recent advancements in data analytics have led to optical sensors that use analytics to identify drones in the sky and track them. Organizations can even use radio frequency detection to detect drones, usually controlled by RF signals on varying bandwidths.


The most important information a business needs to determine about a drone is its direction of travel. Drones have a short flying time because they run on batteries, while their range is limited to around 1,500 meters for those that operate on the typical 2.4 GHz frequency. If leaders can find out a drone’s direction of travel, they can discover where it came from and potential places where a pilot could control the drone.


Create an Action Plan for Drone Overflights

Although both people and businesses are prohibited from taking offensive action against drones, organizations should still plan what to do if a drone does enter their airspace. Many enterprises have clearly displayed signals banning unauthorized drone flights near their facility; while this won’t prevent all incidents, it can deter hobbyists from unintentionally flying their drones too close to a property.


I highly recommend establishing clear policies and response procedures for a facility, so everyone knows what to do if they observe a drone. These responses should help organizations find out information such as where the drone went and if the drone did anything, such as take photos or drop something. Because drones can be really small, they can be used to drop explosives in areas that are difficult to access. In January 2019, Greenpeace activists in France flew a drone over a nuclear facility and dropped a harmless smoke bomb on a building housing “the largest amount of radioactive material in the world” to prove that nuclear plants were not sufficiently protected.


Because of the potential of drones to cause significant damage to life and property, an organization’s drone response protocol should be similar to a bomb threat response. The goal is to move people to safety, search the facility and secure the site.


Make Contact with the Drone Pilot

If organizations do come across a drone in the airspace and track its direction of travel, that information can be used to find the pilot. Drone pilots are often far enough away, which makes seeing them difficult, but pilots still need to be in range to control the drone, typically within 2,000 to 3,000 meters of the drone.


To make it easier to locate drone pilots, organizations can use intelligence preparation of a facility and the surrounding areas to help identify likely areas where pilots would be. This includes outlining potential launch-and-recovery sites, like open spaces without power lines or other structures that could interfere with a drone’s flight.


Along with pinpointing these potential areas, organizations should also establish clear lines of communication with local law enforcement, so they are involved in the response. In December 2020, the FAA fined a man $182,000 for multiple unauthorized drone flights in the Philadelphia area, which was only possible because they found the drone pilot in the first place. Although organizations do not have the authority to take action against the pilot of an unauthorized drone flight, they can provide law enforcement with information about the drone to support their investigation.


What’s Next for Hostile Drones

Isolated drone incidents happen frequently, but many people do not recognize that these events are part of a greater issue. The drone problem is only increasing now, and it’s likely to worsen quickly. We have already seen drones used to commit violent crimes, like the assassination attempt on Venezuelan President Nicolás Maduro in 2018. Soon more bad actors will realize the potential of drones as a new way to attack people and businesses.


The most effective security strategies focus on preventing problems before they happen, and this approach is critical when defending your business from hostile drones. Without any clear regulation that allows businesses to take down hostile drones in their airspace, organizations must ensure they have full surveillance capabilities of their airspace, plan for potential drone overflights and partner with local law enforcement in the event a drone does enter their airspace.

KEYWORDS: drones emergency response facility security law enforcement perimeter security public private partnerships Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dodd

Dane Dodd is the senior vice president of operations of Prosegur Services Group. He has over 25 years of experience working on security and resilience with private security firms, law enforcement, the military, and other organizations. Prior to entering the private sector, Dane was an infantry officer in the United States Marine Corps for 10 years. He is a University of Florida graduate and also received a certificate of readiness from Harvard Business School.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drones-freepik

    Drones: Security threats from above

    See More
  • factory worker

    Defending manufacturing facilities from security threats

    See More
  • drones

    Drones and Security: The Future of Public Space Safety

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!