Planning a Holistic Counterdrone Program

Preparedness and the right architecture can provide powerful defenses

The proliferation of uncrewed aerial systems (UAS), better known as drones, presents unique challenges for physical security. From nuisance incidents to deliberate malicious actions, the potential for drones to threaten privacy, safety and security is prompting many organizations to consider revising their physical security programs.
But where to start? A structured process like a drone vulnerability risk assessment can yield a clear sense of priorities based on exposure to drone-related threats and provide guidance for developing a multisensor counterdrone solution.
In addition to gauging and specifying the software and hardware components of a solution, however, there are various program-level aspects to consider. This article identifies some key considerations when assembling a counterdrone program, including:
- Program essentials
- Structural and architectural strategies for deterring drones
- Operational changes, including awareness, reporting, staffing and training
Understanding Counterdrone Program Essentials
Drone response can be thought of as four sequential activities. The security industry currently refers to this sequence as the counter-UAS processing chain. This approach helps drive counterdrone program development by outlining the key capabilities and requirements for systems and processes.
- Detect – Identify the presence of a drone within the operational area; effective detection systems minimize false positives while reliably identifying potential threats
- Locate/track – Determine the real-time location and movement trajectory of the drone and capture essential data for potential intervention
- Classify/identify – Assign the detected drone to relevant categories like type and manufacturer and identify any unique characteristics such as the type of payload
- Mitigate – Implement operations as needed to neutralize or reduce the threat posed by the drone; these actions can be manual or programmatic, such as the transmission of system alerts
Of these four activities, mitigation is the trickiest to address technologically, in part because such solutions are in a nascent state, constantly evolving to match the evolution of drones themselves. In addition, though, U.S. laws generally do not allow the use of mitigation techniques, other than by the military and certain other federal agencies.
In lieu of applied technology, organizations should think of this final activity (for now) as creating robust operational procedures that clarify how personnel should respond when a drone threat is assessed. That said, risk mitigation can also take the form of proactive measures that are deployed to ward off the threat of drones in the first place.
Deterring Drones Through Architectural Modifications
Imagine a critical facility under constant surveillance from the skies. What options are available for modifying the site’s exterior design to keep drone-based attacks and surveillance at bay? Specifically, what features can be added to the existing architecture that can prevent drones from coming too close? Here are some building design strategies that help shore up defenses against drone incursions before they happen:
- Nets – Retractable netting systems, strategically deployed during periods of heightened risk or alerts from counter-drone technology, can shield sensitive areas from unauthorized drone access; the flexibility of on-demand protection makes this a compelling drone defense option in some scenarios
- Canopies – Mesh canopies, either rigid or semirigid, offer a more permanent solution than netting; crafted from durable materials like metal or reinforced polymers, canopies are designed to prevent drones from descending into protected zones
- Barriers (permanent) – In addition to overhead solutions, vertical barriers such as tall fences with overhangs add another layer of defense; these barriers force drones to navigate more complex flight paths, making them easier to detect and intercept
- Barriers (modular) – For facilities with changing security needs, modular barriers offer a flexible solution; these portable barriers can be quickly assembled, relocated or removed, providing adaptable protection as required
- Fences – Layered fencing systems build on the barrier concept; barbed wire, electric fencing and anticlimb designs combine to create a formidable perimeter that significantly delays and complicates a drone’s attempts to breach it
- Facades – Anti-drone facades present another innovative approach, targeting the drones’ need for stable surfaces for landing or hovering; by retrofitting buildings with textured or angled facades, facilities can disrupt the smooth surfaces upon which drones rely
- Domes – For extreme areas, such as combat zones and sensitive national borders, protective dome structures provide comprehensive coverage; typically made from polycarbonate (either transparent or opaque), domes serve as the ultimate impenetrable barrier against drones
Whatever physical deterrent methods are selected, it is important to integrate them with drone detection systems. If a drone makes it past structural deterrents, sensors and video cameras will be needed for detection and real-time monitoring, with alarms and alerts triggered as appropriate. While this combination of physical and electronic defenses demands investment and carries the risk of false alarms if not properly calibrated, a thoughtfully designed and executed solution will offer heightened situational awareness at critical times.
Preparing for Operational Readiness
When planning a counterdrone strategy, the best solution only works if physical security operations are planned to accommodate and support it. The following operational areas should be considered:
- Technical training – When selecting the technology that will run a counterdrone system, find out who will need training, starting with the employees who will monitor the system. The training level of these employees typically falls within the range of a mid-level security professional or a technically proficient individual, with skills that include basic technical knowledge, attention to detail, decision-making abilities, and adaptability to future training. When investigating potential drone threats, they will need access to data systems about drones. The user will rely on this data for up-to-date reference information about drone threats, along with historical data about drones previously detected in the area.
- Process documentation – Develop an operations “run book” that guides system users and other stakeholders on exactly what to do at each step during a drone incursion response. An appendix to this document can include a detailed communications plan with links to the system database or other websites for purposes of investigation, along with contact links for notification and escalation. Response steps include:
- Detection – How will users receive notification of a potential incursion?
- Threat classification – How will users investigate to learn more about the threat?
- Notification – Who must be notified, and what events will trigger each notification?
- Escalation – Under what circumstances must the issue be escalated, and to whom?
- Recovery – What response must occur in the case of each potential outcome?
- Routine reporting – Build drone monitoring reports into the regular cadence of security briefings. Drone-related information in these reports can include the number of detections – including false positives or incursions determined not to be a threat – and what happened as a result of each detection, both on the physical security side and in terms of business operations.
- Operations plan maintenance – Over time, regularly revisit the operations plan to make sure it is up to date. Has any contact information changed? Does the system have new capabilities that require revising the run book or retraining employees? Are there opportunities to improve the process documentation to better align with new kinds of threats?
Once these operational basics have been discussed and planned for, an organization is prepared to move forward with identifying a specific counterdrone solution.