Latest Posts

Stay in Touch With Us

For Advertising, media partnerships, sponsorship, associations, and alliances, please connect to us below


+91 40 230 552 15

540/6, 3rd Floor, Geetanjali Towers,
KPHB-6, Hyderabad 500072

Follow us on social

Enacting Counter-Drone Security Guidance to End Surveillance Misuse

  /  Latest News   /  Enacting Counter-Drone Security Guidance to End Surveillance Misuse
drones security

Enacting Counter-Drone Security Guidance to End Surveillance Misuse

Drones pose a threat to the security of high-risk facilities, locations, and events in an inexpensive way

Airborne drones are an exciting technology in the world. The localization of technology to laymen has increased the use of drones. However, the spike in lingering drones has introduced a ray of menace to privacy.

They pose a threat to the security of high-risk facilities, locations, and events in an inexpensive way. Recently, a drone almost struck Air Force One with Donald Trump aboard. The news gathered a wide-range of attention. This is not the first time that a political leader’s life is put under crisis due to airborne drones. In 2018, Venezuelan President Nicolas Maduro said that he survived an assassination attempt involving explosive drones. When technology has reached this extent, it will take no time for drones to spy on confidential state matters like a nuclear power facility.

There are several factors to consider when assessing, planning, designing, deploying, and operating any airspace surveillance. Even though when regulations mandate sensor requirements, some of the sensor provided functionality itself is illegal. Any mitigation efforts by non-federal public agencies or private entities are also illegal. Customers, integrators, and security professionals are left with a vague but complicated framework to operate within.


Implying counter-drone security

The recent data published by the Federal Aviation Administration (FAA) in September 2020, shows that nearly 1.7 million drones and 200,000 certified drone pilots are present in the United States. The number of home-built or unregistered drones pilots is unknown. However, the barrier for either is very few.

As flying drones are not technologically challenging, and remote operations and autonomous flights are becoming even simpler, the corporate risk from drone spying, eavesdropping, or remote hacking is turning lively. Even though when people are aware of the threat that they pose, commoners can’t do anything to go against it. But as a relief, the solution framework is being tightened in the US. As a baseline, only four federal agencies namely Defense, Energy, Justice, and Homeland security have any authority to mitigate a drone threat. However, for all public agencies and private entities, the full weight of federal law prohibits more than it allows.

A recent interagency ‘advisory guidance document’ released by the US Department of Justice in discussion with other government agencies clarifies the legal ramifications of counter-drone security. Some of the key points from the document are,

  • Any flying device is regulated by the Federal Aviation Administration (FAA), and interference of an aircraft is illegal in all cases.
  • The law makes no distinction between manned and unmanned aircraft. If it is illegal to fire a shotgun at a small manned airplane, it is equally illegal to shoot at a drone.
  • In planning activities, the exception should be that attempts to interfere with an aircraft by kinetic or non-kinetic means will remain broadly illegal.

However, when the prohibition on aircraft interface is combined with laws and regulations regarding privacy and electronic security, the result is a tangled web of laws obstructing security practices. Breaking the barriers and preparing for a secure drone sage involves building a new ecosystem of trusted sensors and system suppliers. Security professionals and their organizations should be investing in acquiring the knowledge and technical competencies to build comprehensive security solutions. Suppliers should be pressed for transparency to sensor and system test data to validate performance claims. By following these protocols, illegal surveillance and misuse of drones can be brought under control.