Back to Resources
Field Note March 2026 7 min read

Drone Reconnaissance at Industrial Sites: Threat Assessment and Detection

Unmanned aircraft provide attackers with aerial surveillance of facilities. We examine the threat and how to detect reconnaissance drones before mapping becomes attack planning.

C

Cascadia OT Security

Physical Security

WAORIDSeattlePortlandHillsboroSalemEugeneKennewickSpokaneBoiseTacomaPNW COVERAGEPORTLAND METRO

Drone reconnaissance of industrial facilities provides attackers with detailed aerial imagery of site layout, security infrastructure, and equipment placement. A single flight can yield information that would take weeks of physical reconnaissance to gather. Detection of reconnaissance drones is challenging because legitimate civilian and commercial drone activity is increasing, making hostile drones difficult to distinguish from benign flights.

We have worked with industrial clients who discovered drone flights over their facilities only after data about site layout, security camera placement, and power infrastructure began circulating in underground forums. In each case, the reconnaissance preceded attempted intrusion attempts and physical attacks on facility infrastructure.

Reconnaissance Capabilities and Threat Model

Modern commercial drones can capture high-resolution video and imagery, map geolocation, and document thermal signatures that reveal active equipment and power distribution. An attacker conducting drone reconnaissance can identify blind spots in physical security, locate power substations and transformer locations, and document access points and security infrastructure positioning.

Detection is complicated by the legitimate use of drones for site surveys, infrastructure inspections, and construction monitoring. A malicious flight may be visually indistinguishable from a contractor conducting an authorized aerial survey.

Detection and Response Strategies

Coordination and Response

Drone reconnaissance is often the precursor to physical or cyber attacks. If you suspect hostile reconnaissance, coordinate with local law enforcement and document the incident for threat intelligence purposes. If you'd like to discuss facility perimeter security, RF detection implementation, or drone threat assessment for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call