Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Defending airspaces from hostile drones

By Dane Dodd
drones-freepik1170x658v4.jpg
March 8, 2022

Unmanned aerial vehicles, more commonly known as “drones,” pose a growing danger to people, enterprises and infrastructure. Just last month, on January 17, 2022, Houthi rebels from Yemen used explosive-laden aerial drones to attack a strategic oil facility in the United Arab Emirates (UAE) and start a fire at Abu Dhabi International Airport. These attacks killed three people and prompted the UAE to pose an immediate ban on all types of recreational drones. This attack was very similar to two drone attacks launched against oil refineries in Saudi Arabia on September 14, 2019. 


In the U.S., a swarm of four, unauthorized drones appeared above the Palo Verde Nuclear Generation Station near Phoenix, Arizona, after dark on September 29 and again on September 30, 2019, just days after the similar attacks in Saudi Arabia. Eight months earlier, a similar incursion was reported at Pennsylvania’s Limerick nuclear generating facility. In July 2020, a small recreational drone carrying copper coils and nylon cords was used to successfully attack an electric utility substation in Hershey, Pennsylvania. In each of these examples, inexpensive recreational drones have been used to facilitate criminal activity. 


In October 2021, U.S. authorities from the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and National Counterterrorism Center (NCTC) published advisories for law enforcement warning of the increased threat drones pose to critical infrastructure. This warning from U.S. authorities echoes concerns raised by Marine General Kenneth McKenzie, then the head of U.S. Central Command, who saw the threat of inexpensive “Costco” drones early on. In July 2020, at an event hosted by the Middle East Institute, General McKenzie said, “I’m not talking about large, unmanned platforms which are the size of a conventional fighter jet that we can see and deal with, as we would any other platform. I’m talking about the one you can go out and buy at Costco right now in the United States for a thousand dollars, four quad, rotorcraft or something like that that can be launched and flown. And with straightforward modifications, it can be made into something that can drop a weapon like a hand grenade or something else.”

 

“Drone” is a broad term that includes toys for kids, recreational drones for hobbyists, professional drones for agriculture, e-commerce, entertainment, emergency management and research and weaponized devices for military use. Military drones have been used for surveillance and direct action to destroy enemy personnel and property for more than 20 years. During this time, drones have become more advanced, more networked, and now fly faster and farther with more sophisticated capabilities. Like many technologies, drones have become more capable, but they have also become less expensive. Today’s abundance of low-cost recreational drones provides extremists, criminals, drug cartels, and anyone interested in sowing discord with the ability to assassinate people, destroy property, and deliver military-style attacks anywhere in the world. 


How Drones Work

The most common type of drone is an unmanned aerial vehicle, or UAV for short, which is typically constructed of lightweight composite materials, so they are easy to fly and maneuver. While most aerial drones are controlled using radio waves, recent developments in wireless connectivity have made it possible to pilot a drone using a smartphone or tablet. This makes it easier for a pilot to use the drone’s camera to see from the drone’s perspective. A drone’s built-in cameras are arguably its most valuable feature. Not only do cameras make it easier for a pilot to navigate a drone, but they allow people to do anything from shooting video to shooting a gun. 


When we think of drones, we typically imagine a small, remotely piloted aircraft. Unmanned aerial vehicles span from microdrones, which are as small as the nail on your pinky finger, to larger drones that could conceivably carry a person. Increasingly, aerial drones are being deployed in swarms where multiple drones, networked with each other, fly in unison. Swarms of microdrones are particularly worrisome because they are more challenging to detect. But drones aren’t always aerial.


Unmanned marine vehicles, or UMVs, are submersible devices that can “swim” in water. While their buoyancy limits their weight capacity, they threaten submerged infrastructure. On land, we come across unmanned ground vehicles (UGVs), like NASA’s Mars rovers. These drones can climb, walk and crawl over rugged terrain while carrying significant payloads. With Tesla and other auto manufacturers creating self-driving technology, we aren’t far off from a future with self-driving UGVs on the road with manned vehicles.


All unmanned vehicles could pose a threat whether a drone is in the air, in the water or on land. With a drone, someone can disrupt an entire facility without ever setting foot on the property.


Drones and Hostile Reconnaissance

Incidents with hostile drones have increased significantly over the last two years. The Federal Aviation Administration (FAA), which tracks unmanned aircraft sightings (UAS), now receives more than 100 UAS reports each month. Most of the UAS incidents tracked by the FAA are reported near airports by commercial pilots. A cursory review of recent drone incidents underscores the problem.


On January 28, 2022, two people were injured when a drone fell on them at a stadium in Jabalpur, India. On January 24, 2022, an English Premier League soccer match was stopped because of an illegal drone overflight. On January 15, 2022, an invasive drone was seen above the NFL playoff game between the Cincinnati Bengals and the Las Vegas Raiders. In March of last year, the police arrested a man in Simi Valley, California for allegedly using a drone to deliver heroin. A man was arrested for flying a drone in temporarily restricted airspace in Miami Beach, Florida, in the week leading up to last year’s Super Bowl. We also see a lot of drone activity around airports, such as when the Piedmont Triad International Airport in Greensboro, North Carolina, had to divert, suspend and hold flights due to illegal drone activity over the airfield. 


As IoT (Internet of Things) capabilities expand, we have many more devices connected to a wireless network in government facilities, hospitals and commercial and financial buildings. Because these IoT networks can be accessed with proximity connections, drones can get close enough to connect to the network, hack into IoT devices, and potentially gain access to sensitive information. A hacker could even use a drone to set up jammers that block the network and render IoT devices useless, interrupting operations that rely on the network.


As more manufacturers enter the drone market and develop faster ways to produce these machines, there are more drones in the world than ever before. While drones are not inherently hostile, the greater issue is that most organizations do not pay attention to their airspace and are unequipped to deal with a drone incident, hostile or not.


How to Protect Airspaces from Drones

In the U.S., it is illegal in most places to use brute force, like guns or nets, to take down a drone, even if it’s near your property. While the Federal Aviation Administration (FAA) has put restrictions in place to regulate drone flights, these regulations will not stop bad actors’ intent on damaging property or harming people.


While most drones are operated by hobbyists who just want an open space to try out their new toy, drones have increasingly become a tool to perform hostile acts against people, critical infrastructure, and vulnerable property. Today, most drones are used just for reconnaissance. But organizations need to prepare for the inevitable future where drones are used to drop poisons or explosives and bypass typical security to fly into buildings, transmit video, jam electronic signals, or leave something behind.


Virtually no one is paying attention to their airspace, and that is a gap organizations need to close quickly to defend against hostile drones. Here are the steps enterprise security can take to protect their airspace from drone overflights:


Understand the Scope of the Problem

First and foremost, organizations and their security leaders need to be able to conduct surveillance of the airspace of the site. Most buildings include about 100 feet of airspace; the FAA controls anything above that. Without surveillance capabilities of the airspace, organizations won’t have eyes to tell if there is a drone nearby.


With today’s technology, organizations have many ways to track drones. The most common method is using radar to identify drones by their motors, which emit a frequency that can be tracked, allowing leaders to figure out the type of drone, its speed and direction of travel. Recent advancements in data analytics have led to optical sensors that use analytics to identify drones in the sky and track them. Organizations can even use radio frequency detection to detect drones, usually controlled by RF signals on varying bandwidths.


The most important information a business needs to determine about a drone is its direction of travel. Drones have a short flying time because they run on batteries, while their range is limited to around 1,500 meters for those that operate on the typical 2.4 GHz frequency. If leaders can find out a drone’s direction of travel, they can discover where it came from and potential places where a pilot could control the drone.


Create an Action Plan for Drone Overflights

Although both people and businesses are prohibited from taking offensive action against drones, organizations should still plan what to do if a drone does enter their airspace. Many enterprises have clearly displayed signals banning unauthorized drone flights near their facility; while this won’t prevent all incidents, it can deter hobbyists from unintentionally flying their drones too close to a property.


I highly recommend establishing clear policies and response procedures for a facility, so everyone knows what to do if they observe a drone. These responses should help organizations find out information such as where the drone went and if the drone did anything, such as take photos or drop something. Because drones can be really small, they can be used to drop explosives in areas that are difficult to access. In January 2019, Greenpeace activists in France flew a drone over a nuclear facility and dropped a harmless smoke bomb on a building housing “the largest amount of radioactive material in the world” to prove that nuclear plants were not sufficiently protected.


Because of the potential of drones to cause significant damage to life and property, an organization’s drone response protocol should be similar to a bomb threat response. The goal is to move people to safety, search the facility and secure the site.


Make Contact with the Drone Pilot

If organizations do come across a drone in the airspace and track its direction of travel, that information can be used to find the pilot. Drone pilots are often far enough away, which makes seeing them difficult, but pilots still need to be in range to control the drone, typically within 2,000 to 3,000 meters of the drone.


To make it easier to locate drone pilots, organizations can use intelligence preparation of a facility and the surrounding areas to help identify likely areas where pilots would be. This includes outlining potential launch-and-recovery sites, like open spaces without power lines or other structures that could interfere with a drone’s flight.


Along with pinpointing these potential areas, organizations should also establish clear lines of communication with local law enforcement, so they are involved in the response. In December 2020, the FAA fined a man $182,000 for multiple unauthorized drone flights in the Philadelphia area, which was only possible because they found the drone pilot in the first place. Although organizations do not have the authority to take action against the pilot of an unauthorized drone flight, they can provide law enforcement with information about the drone to support their investigation.


What’s Next for Hostile Drones

Isolated drone incidents happen frequently, but many people do not recognize that these events are part of a greater issue. The drone problem is only increasing now, and it’s likely to worsen quickly. We have already seen drones used to commit violent crimes, like the assassination attempt on Venezuelan President Nicolás Maduro in 2018. Soon more bad actors will realize the potential of drones as a new way to attack people and businesses.


The most effective security strategies focus on preventing problems before they happen, and this approach is critical when defending your business from hostile drones. Without any clear regulation that allows businesses to take down hostile drones in their airspace, organizations must ensure they have full surveillance capabilities of their airspace, plan for potential drone overflights and partner with local law enforcement in the event a drone does enter their airspace.

KEYWORDS: drones emergency response facility security law enforcement perimeter security public private partnerships Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dodd

Dane Dodd is the senior vice president of operations of Prosegur Services Group. He has over 25 years of experience working on security and resilience with private security firms, law enforcement, the military, and other organizations. Prior to entering the private sector, Dane was an infantry officer in the United States Marine Corps for 10 years. He is a University of Florida graduate and also received a certificate of readiness from Harvard Business School.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drones-freepik

    Drones: Security threats from above

    See More
  • factory worker

    Defending manufacturing facilities from security threats

    See More
  • UAV Drone Security

    Sen. Feinstein Asks DoJ to Prevent Drones From Interfering With Firefighting Efforts

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing