The Arrival of the Weaponised Drone

In August 2018, two drones rigged with explosives detonated near Venezuelan President Nicolás Maduro. In September 2019, a swarm struck Saudi oil processing facilities, temporarily knocking out roughly five percent of the world’s daily oil supply. In 2023, Russian drone strikes on Ukrainian energy infrastructure caused widespread blackouts. Each event was significant in its own right. Taken together, they mark the arrival of the weaponised drone as a mainstream instrument of hostile action.

The implications for corporate security and critical infrastructure protection are substantial, and they are not adequately reflected in most organisations’ current threat assessments. The drone threat is no longer confined to conflict zones. It is present in industrial estates, at corporate headquarters, above power generation assets, and at major events.

How We Got Here

The hostile use of unmanned aerial systems evolved through a gradual process in which technology became cheaper, more capable, and more widely available faster than frameworks designed to govern it could adapt.

From around 2015, reports of drone drops carrying contraband into prisons appeared with regularity. By 2017, intelligence services began reporting state-sponsored actors using commercial drones for reconnaissance of sensitive facilities. Then came the airport incidents — London’s Gatwick was shut down for 33 hours, affecting over 100,000 passengers at an estimated cost of £50 million. No weapon was involved. The mere reported presence of drones near the runway brought one of Europe’s busiest airports to a halt.

The picture is not one of an emerging threat. It is one that is already here, already active, and still accelerating.

The Threat in Detail

Reconnaissance and surveillance is the most prevalent hostile application and in some ways the most insidious. A single surveillance flight can gather physical layout, security patrol routes, camera positions, vehicle movements, and the identification of assets and individuals — all without the target being aware.

Disruption operations require no payload. The confirmed or suspected presence of a drone in sensitive airspace is sufficient to trigger costly security protocols. The leverage available from a low-cost drone operated without authority in protected airspace is extraordinary relative to the investment and risk involved.

Payload delivery and attack represents a step-change in severity, but the technical distance from surveillance is smaller than it appears. FPV drones, originally developed for racing, have been used extensively in the Ukraine conflict as precision guided munitions.

Swarm operations — coordinated deployment of multiple drones simultaneously — multiplies all challenges while introducing the problem of triage: which drone carries a payload? How does a security team allocate resources across multiple simultaneous contacts?

Why Detection Is Hard

Small commercial drones are designed for convenience, not visibility. They have low radar cross-sections, operate in ground clutter, and in urban environments ambient noise degrades acoustic detection.

Radar requires purpose-built systems for low-level drone detection and faces performance challenges in complex environments. Radio frequency detection is currently the most reliable method for commercially manufactured UAS but is ineffective against autonomous drones on pre-programmed routes. Acoustic sensors degrade in high ambient noise. Electro-optical and thermal imaging provide positive identification at shorter ranges but are weather-sensitive.

Sensor fusion — integrating multiple detection technologies into a single operational picture — is the current best practice. No single technology addresses the full detection problem. The intelligence dimension deserves equal weight: technology tells you a drone is present; intelligence tells you what to expect.

The Legal Framework

In most Western jurisdictions, the active countermeasure options available to private organisations are severely constrained by law. The instinct to jam the signal, take control, or bring it down runs directly into aviation law, telecommunications regulation, and firearms legislation.

In the United Kingdom, a drone is legally an aircraft. Interfering with it is a criminal offence. Jamming radio frequencies is prohibited. The practical reality for the overwhelming majority of private organisations is that they have no lawful authority to actively counter a detected hostile drone. They can detect, document, report, and request assistance.

This is not an argument for dismissing the constraint. It is an argument for understanding the framework precisely, advocating for its reform, and building relationships with statutory authorities that do have the powers to respond.

Lawful Countermeasures

Detection baseline: An appropriately scaled sensor fusion solution should be the starting point for any serious UAS security programme, integrated into the wider security operations.

Airspace designation and authority engagement: Engaging with the CAA, police, and government departments to establish a site’s security sensitivity is a significant force multiplier.

Physical and operational countermeasures: Facility design that limits line-of-sight from altitude, concealment of sensitive activities, and varying security routines all degrade the utility of hostile reconnaissance.

Counter-UAS as a managed service has matured significantly. Specialist firms offer end-to-end UAS security programmes encompassing detection, monitoring, incident response, and legal navigation.

Incident reporting and evidence collection should be treated as a discipline in its own right, building the evidential record and intelligence picture over time.

A Threat That Demands a Response

The UAS threat will intensify before any meaningful stabilisation occurs. Autonomous operations will reduce the effectiveness of RF-based detection. AI-assisted target recognition will make autonomous attacks more precise. Miniaturisation will push detection beyond current sensor architectures. And commercial swarm coordination will change the resource calculus.

The regulatory response is evolving, but legislation moves on a cycle measured in years while technology moves in months. The gap is not closing quickly enough.

The sky above your operations is no longer empty. What you do about that is a question that demands a considered answer. The organisations that begin building their UAS security posture now will be significantly better positioned than those that wait for a serious incident to make the case.