Intel Officials Alert Police to Unpreparedness of US Cities for Hostile Drones

Concerns Grow Over Drone Threats as DHS Seeks Expanded Countermeasures

Recent revelations from a Department of Homeland Security (DHS) memo highlight increasing unease regarding the ability to monitor and control drones that may pose risks to public safety. The internal document, acquired by WIRED, indicates that DHS officials are less certain about their capacity to detect potentially dangerous drones. It underscores a troubling trend: “tactics and technology to evade counter-UAS capabilities are circulated and sold online with little to no regulation.” The memo outlines several evolving technologies that complicate drone tracking for law enforcement, including autonomous flight capabilities, jamming protection technologies, swarming behaviors, and software that bypasses geofencing restrictions.

This growing uncertainty about drone threats has been exacerbated by incidents in New Jersey and surrounding states like Pennsylvania, New York, and Maryland. These occurrences have prompted both state and federal legislators to push for enhanced access to counter-drone technology. During a recent press briefing, DHS officials communicated their intent to Congress to “extend and expand existing counter-drone authorities.” They stressed the necessity for state and local agencies to be equipped with adequate resources to deal with such evolving threats.

At present, only a select number of federal agencies—including DHS, the Departments of Energy, Justice, and Defense—are legally authorized to disable drones operating within U.S. airspace. This limited jurisdiction raises questions about the preparedness of local enforcement agencies to respond to potential drone-related incidents.

Ryan Shapiro, executive director of the advocacy group Property of the People, noted that the August memo indicates ongoing DHS efforts to acquire new technologies and legal frameworks for enforcement. However, he cautioned that infringement on civil liberties should not be rationalized by vague and potentially misleading descriptions of threats. He highlighted that government designations of “violent extremists” have been used not just against domestic terror groups but also against animal rights activists, a tactic he associates with corporate interests attempting to suppress dissent.

Activists have increasingly utilized drones over the last decade, leveraging aerial surveillance to document suspected animal cruelty on factory farms, especially in light of aggressive laws like “ag-gag” that criminalize undercover reporting. This trend underscores the crucial intersection of technology and advocacy.

In the context of a significant number of drone-related reports—around 5,000 tips received by the FBI pertaining to East Coast sightings—officials have discerned about 100 actionable leads. Many of these reports stem from misidentified drone activity connected to regular flight patterns at major airports, further complicating the issue of rogue drone identification.

While the FBI aims to mitigate public alarm regarding these sightings, the agency remains vigilant, indicating that illicit drone use can indeed support criminal activities. An FBI representative remarked on the reality of criminals employing drones, while also recognizing that many sightings may not represent imminent threats.

In a formal statement, a DHS spokesperson advised that both federal and local authorities continue to be alert to potential threats and recommended reporting any suspicious drone activity to local law enforcement. As drone technology rapidly evolves, so too does the need for rigorous monitoring and adequate legal frameworks to safeguard public safety without overstepping civil liberties.

As business owners navigate this increasingly complex cybersecurity landscape, the potential for drone technology to intersect with adversarial tactics remains a pressing concern. Techniques that may be relevant, according to the MITRE ATT&CK framework, include initial access and persistence. Such frameworks provide tools for understanding how modern threats can exploit emerging technologies, assuring that organizations remain informed and prepared to face evolving risk landscapes.

Source