Categories: SJA Exclusives, Drones
Tags: Echodyne

Smarter perimeter security for a new era of threats posed by drones

Drones: Smarter perimeter security for a new era of threats

Share this content

Facebook
Twitter
LinkedIn

Kara Quesada, Senior Director, Marketing at Echodyne and William Edwards, Director of C-UAS Training – ENSCO discuss how to effectively manage the risk to critical infrastructure posed by drones.

The drone surge

About 15 years ago, seemingly harmless ‘toys’ went on sale: drones.

Back in the early days, security professionals might not have seen the flimsy, hobby aircraft as anything more than a radio-controlled (RC) car taking flight.

However, today’s drone, or unmanned aerial vehicle (UAV)/unmanned aircraft system (UAS), is much more sophisticated and has opened an entirely new threat domain.

Since the start of the commercial drone market with the Parrot AR.Drone, a lot has changed.

UAVs are increasingly able to carry higher payloads and can be easily modified to skirt traditional security systems.

The proliferation of drones for crime and terror has forced security professionals to “look up,” adding to their long-established responsibilities to secure critical sites from traditional perimeter security threats, as well as the last decade’s surge in cyber-attacks.

The focus on drones as a threat is illustrated in everything from the increased use of drones to smuggle contraband into prisons to unauthorized UAVs obstructing first responder efforts during the recent Texas floods and Palisades Fires.

Whether the intention of the drone operator is malicious or not, the possibility for harm and damage cannot be underestimated.

As drones become more accessible and alarmingly capable, security professionals are facing the hard truth of their weaponization – from illicit surveillance and smuggling to direct kinetic threats.

The surge in unauthorized drone incursions has made one thing clear: the air domain is now a critical vector of risk.

Forward-leaning teams are already rethinking vulnerability assessments to account for aerial threats.

Those who aren’t? They’re already behind.

Drone vulnerability and risk assessment

In security and risk management, “duty of care” refers to the legal and ethical obligation security professionals must abide by to take reasonable measures to protect people, assets and information from foreseeable harm.

As unauthorized drones become commonplace sightings at mass gatherings like football games, concerts and beyond, they are changing the very nature of how duty of care needs to be approached.

According to FBI counter-UAS experts, traditional security models, long reliant on guns, gates and guards, are no longer sufficient.

Drones have revealed a critical vulnerability in legacy systems, easily bypassing physical barriers to deliver payloads, conduct surveillance or infiltrate protected zones.

To uphold their mission to protect, security teams must now adopt a three-dimensional mindset.

Ground-based defenses alone are no longer adequate and drones offer adversaries creative and asymmetric means to subvert even the most sophisticated security programs.

Addressing this challenge requires integrated strategies that extend beyond the perimeter fence – into the airspace above.

Drone vulnerability and risk assessment of critical infrastructure

Understanding the potential damage drones can cause requires understanding what kind of assets need to be protected.

Every critical infrastructure site is different, but the following steps serve as a high-level guide to carrying out a comprehensive drone vulnerability and risk assessment.

  1. Identify the threat: Not all drone threats are created equal. For this reason, it’s critical that a security professional identify all variations. This includes drones strapped with a bomb (as seen in the recent attempted attack on a Nashville power plant) to drones that can conduct a cyber-attack (such as fixing a raspberry pi or a pineapple Wi-Fi hacking tool to a drone)
  • Identify the critical assets: Next, the security team must identify the critical assets that need protection at their site. Across personnel, visitors, data, operationally critical machinery and command-and-control centers, each asset can be impacted in a unique way by unauthorized drones
  • Identify the vulnerabilities: Once the critical assets are determined, the security team must take a hard look at each asset’s unique vulnerabilities. Considering an airport as an example, is the area where jet fuel stored particularly vulnerable to aerial threats? If so, a drone could enter the airspace with a lethal payload and explosion capability
  • Determine the consequences: Then, it’s imperative that security examine the consequences if each critical asset is lost due to a drone attack. If that jet fuel storage site is hit with a rogue drone, how far would the blast site be and is there typically a high volume of pedestrians and personnel nearby?
  • Determine risk mitigation: Once the team has racked its collective brain against the above, it’s time to think about how to mitigate the risk of each asset being attacked. This is where a layered sensor package becomes critical to securing the aerial domain

The sensors you need on your side to secure against drones

While no single sensor can adequately defend a critical site from the full spectrum of drone threats, a modern and resilient counter-UAS solution relies on a layered sensor package approach, where multiple technologies work in concert to detect, track and assess aerial incursions of all sizes, signatures and tactics.

Below are several sensors commonly deployed in layered detection systems, listed in general order of criticality:

Radar: The foundation of any strong detection setup, able to track drones of all shapes, sizes and speeds without relying on their communication signals, including “dark drones” that skirt legacy radio frequency (RF) sensors. It works day or night, in all weather and filters out irrelevant objects like birds to reduce false alarms.

Optical sensors: Typically pan-tilt-zoom (PTZ) cameras, these let security teams put eyes on the target, confirming details like whether the drone is filming or carrying a payload.

While valuable, these cameras rely on radar to guide them and can lose effectiveness in poor weather or low-light conditions.

Radio Frequency (RF) sensors: RF sensors detect and analyze the radio communications between drones and their controllers, helping locate both the aircraft and, at times, its operator.

Not all drones emit RF, so radar is critical as a “catch all” layer for varying drone types.

Acoustic sensors: Acoustic sensors use specialized microphones to pick up the unique sound signature of drone rotors, even when visibility is low or signals are jammed.

They’re not foolproof on their own but add another valuable layer of detection.

Any credible layered sensor package must, at minimum, integrate precision radar and optical systems for reliable detection and visual confirmation.

When augmented by RF and acoustic sensors, they form a multi-modal detection net that significantly reduces undetected drone incursions.

In high-risk environments, this layered configuration isn’t just recommended, it is essential.

“Looking up” and mitigating the drone threat

Drones are no longer a novelty but a fast-evolving threat capable of bypassing traditional defenses and exposing critical infrastructure to new risks.

Staying ahead demands a proactive, three-dimensional approach to perimeter security, where aerial vulnerabilities are addressed as seriously as those on the ground.

A comprehensive drone risk and vulnerability assessment, supported by a layered sensor architecture, enables security teams to shift from reactive measures to anticipatory defense.

The threats are real, and the consequences are high – but with the right mix of strategy, technology and foresight, security professionals can maintain control of their airspace.

This article was originally published in the September edition of Security Journal Americas. To read your FREE digital edition, click here.