The ungoverned sky: Drones and the domestic extremist threat
The combination of easy accessibility and payload potential, and the limitations of domestic counter-drone systems, presents a growing challenge.
- Domestic extremist actors are incorporating drone technology into operational capabilities and attack plots, taking inspiration from the battlefield. The number of violent plots utilising drones has increased sharply over the past five years.
- Domestic counter-drone frameworks are mismatched to the threat. Effective protection requires layered, multi-system approaches across potential civilian targets and critical infrastructure.
- Easy-to-access technologies, such as 3D printing, open-source design files, additive hardware, and AI-assisted navigation are lowering the barriers to modifying and weaponising drones.
What is the problem?
In the past two decades, drones have transformed from niche military tools into widely available “commercial off-the-shelf” technologies. What was once the exclusive domain of state actors now rests within reach of nearly anyone with a credit card and a data signal. With uncrewed aircraft systems — or drone platforms — becoming cheaper, smaller, and easier to operate, the number of drone plots by domestic extremist groups has increased rapidly. In the last two years alone, US law enforcement personnel thwarted two extremist plots involving drones, and the Australian Federal Police arrested seven individuals in connection with a plot to use an explosive-laden drone. Remote-controlled drones are a low-cost option for intelligence gathering, surveillance, reconnaissance, transport, and attack preparation. Drones are easily modified and weaponised, enhancing and expanding their capabilities. The combination of easy accessibility and payload potential, and the limitations of domestic counter-drone systems, presents a growing challenge.
What should be done?
This Policy Brief provides three recommendations to address this vulnerability. First, countries should establish domestic counter-drone task forces to tackle domestic actor exploitation of drones. International knowledge-sharing protocols should be developed among national task forces to guide national coordination mechanisms and help coordinate domestic counter-drone responses. Second, internationally coordinated safety-by-design regulations should be implemented to make it easier to identify and respond to malicious drone use. Third, specific policy attention and response should be directed towards the threat posed by 3D printing in the additive manufacturing ecosystem.
Extremist non-state actors and drone use
To understand the evolution of the threat posed by malign actor use of drone technologies in domestic settings, it is important to consider how terrorist and insurgent organisations have used uncrewed aircraft systems (UAS) — or drones — in conflict environments.
The Lebanese paramilitary group Hezbollah, through significant Iranian support, was the first known insurgent group to establish a UAS program. Hezbollah used Iranian-produced drones to conduct surveillance missions over Israeli territory as early as 2004 and later expanded its use of drones to carry explosive payloads against Israeli targets. [1] Palestinian Islamist organisation Hamas also exhibited an early interest in drones. Hamas’ program developed at a slower pace, but after eventually receiving Iranian support, and by reverse-engineering failed or shot-down Israeli drones, it too was able to conduct drone incursions into Israeli airspace. [2]
However, it was Islamic State that pioneered terrorist insurgent drone tactics. Its drone program demonstrated how commercially available technology could be adapted for asymmetric warfare, establishing an operational template that domestic extremists have sought to emulate. [3] Islamic State transformed commercial off-the-shelf quadcopters — drones with four rotors for vertical take-off, landing, and stable hovering — into a versatile capability that provided intelligence, surveillance, and reconnaissance (ISR), strike capability, and propaganda material at minimal cost and maximum effectiveness.
Islamic State has used uncrewed aircraft systems across a range of ISR missions. [4] In one of the earliest demonstrations of this capacity, drones were used to conduct reconnaissance prior to the movement’s 2014 takeover of Tabqa Air Base, a major Syrian military facility. [5] The group also used drones to coordinate battlefield operations by directing mortar and artillery fire and guiding vehicle-borne explosives. [6]
Islamic State weaponised consumer drones by developing release mechanisms for grenades, mortar shells, and improvised explosives. These flying artillery platforms required minimal technical expertise but generated disproportionate tactical impacts. [7] Drone-captured imagery became a core part of Islamic State’s pioneering strategic communications campaign. First-person aerial perspectives of attacks made propaganda videos more cinematic and compelling, projecting military competence that enhanced recruitment and publicity. [8]
While Islamic State was the first terrorist insurgent organisation to employ large-scale integration of drone technology, many others have since incorporated the capability, experimenting with advanced propulsion, fabrication, and supply-chain diversification.
For example, groups such as the Pakistan-based Islamist terrorist organisation Lashkar-e-Taiba have trialled drone use for human transport. [9] The Chin National Army in Myanmar has a dedicated UAS unit, modifying commercial off-the-shelf drones to incorporate anti-jamming technology into its arsenal. [10] Hayat Tahrir al-Sham has instituted a similar unit and even established its own drone production facilities, using 3D printing to manufacture components. Its drone program played an important role in bolstering the organisation’s advance on, and eventual overthrow of, the Assad regime in December 2024. [11]
The Houthis, a Yemen-based Islamist military organisation that has received technical and logistical support from Iran, developed a long-range drone program that surpasses Islamic State’s arsenal in both range and complexity. [12] Houthi drones have been instrumental in attacks on targets in Saudi Arabia, the United Arab Emirates, and Israel. [13] The organisation has even attempted to develop hydrogen-powered drones that could enable greater endurance and range than conventional battery configurations. [14]
The additive power of drones was most recently highlighted in the attacks on Israel on 7 October 2023, where more than 100 modified commercial drones played a role in Hamas’ day-long assault. [15] Hamas targeted Israeli surveillance infrastructure using explosive-laden commercial drones, reducing the situational awareness of the Israel Defence Forces and delaying the Israeli response to the preliminary incursion. [16] Hamas also used drones to carry aerial munitions to target Israeli tanks, armoured vehicles, infantry, first responders, and civilians, not only to maximise physical destruction but also to erode the perception that Israeli defences were invulnerable. [17]
The Ukraine addition
The Russia–Ukraine conflict, dubbed the first large-scale “drone war”, [18] has revolutionised the range, speed, scale, and autonomy of drones [19] and has allowed Ukraine to surpass its conventional military capabilities. [20]
One significant innovation has been the emergence of fibre-optic tethered drones, first deployed by Russia. [21] This development was driven by the need to circumvent jamming capabilities. Another innovation has been in automation, with autonomous drones now better able to track and strike targets through the incorporation of artificial intelligence (AI). [22] Both reflect how technological adaptation and iteration have become key measures of combat strength. [23]
Insurgent and terrorist groups have consistently borrowed from and adapted battlefield innovations. [24] Aerial hijacking, for instance, a tactic first used by Peruvian revolutionaries in 1931, was later seized upon, refined, and expanded on by numerous non-state actors. [25] The Japanese kamikaze pilots of the Second World War represent one of the most organised and systematic uses of suicide tactics in modern warfare. Suicide attacks were later deployed by various other non-state militant groups, ultimately becoming a hallmark of modern terrorism. Extremist instruction material, such as Abu Bakr Naji’s seminal jihadist work Management of Savagery, often references military strategies, seeking to repurpose military doctrine into insurgent operations. [26]
The conflict in Ukraine is no different. [27] While the hurdles for the development and deployment of drone capabilities by domestic extremist actors are of course higher, and domestic actors will not be able to replicate battlefield-grade capabilities, the Ukraine war has shown that the significant modification of commercially available drones using off-the-shelf components and open-source software is possible. Innovations such as Operation Spiderweb, a covert attack carried out by Ukrainian forces in which drones concealed in trucks were transported into and launched from deep inside Russian territory causing significant damage to military installations, offer a blueprint for attacks in both conflict and non-conflict environments. [28]
The domestic warning signs
Although many of the most notable incidents of non-state actor drone use have been on the battlefield, the growing ease with which uncrewed aircraft systems can be accessed by domestic extremist actors outside of conflict zones has corresponded with a rise in their use over the years. [29] Members of Aum Shinrikyo, the doomsday cult that carried out the 1995 Tokyo subway sarin nerve agent attack, explored the use of a remotely controlled helicopter in their pursuit of a deployable chemical and biological weapons program. [30] In 2011, US citizen and homegrown extremist Rezwan Ferdaus was arrested for plotting in support of al-Qaeda to fly three explosive-laden drones into the Pentagon and US Capitol. [31] In a 2018 attack linked to defectors from the Venezuelan military, two explosive-laden drones were deployed in a failed assassination attempt on Venezuelan President Nicolás Maduro. [32] In 2021, Iraqi insurgents attempted to assassinate then prime minister Mustafa Al-Kadhimi using drones to target his residence with explosives, bypassing on-the-ground security. [33] Brenton Tarrant, the perpetrator of the 2019 Christchurch mosque shootings in New Zealand, used a drone to surveil the targets prior to his attack. [34] Since then, domestic extremist interest in drones has only accelerated.
In 2023, a PhD student in the United Kingdom was arrested for using a 3D printer to build “kamikaze” drones for Islamic State. [35] In November 2025, a Queensland counter-terrorism operation arrested seven individuals possessing 20 kilograms of explosive material, alongside homemade guns and one drone-mounted improvised explosive device (IED). [36] One month earlier, an attempted jihadist plot involving the use of a drone-powered IED against Belgian elected officials was foiled. [37] US authorities thwarted two separate plots by domestic extremists that involved the use of drones in 2024. In the first, an Arizona teen was arrested for planning an Islamic State-inspired assault, during which he intended to use an explosive-laden drone to attack the Phoenix Pride parade. [38] Another individual was arrested in Tennessee for plotting to destroy an electric power station in Nashville with a homemade drone strapped with explosives. [39] A drone was used for reconnaissance in one of the two assassination attempts on Donald Trump during his 2024 presidential campaign. [40]
These incidents follow a 2022 warning from the FBI that it was tracking several domestic plots that sought to “weaponize drones with homemade IEDs” [41] and a previous instance in 2020 involving the targeting of a power station in Pennsylvania by far-right accelerationists using drones. [42] Extremists with military backgrounds have talked openly online of the advantages of drones, especially “cheap, 3D-printed drones with a [high-explosive] round zip tied to it” and referenced innovations in Ukraine and by drug cartels. [43]
The vulnerability is also highlighted by several cases that do not have a clear link to an extremist agenda. Between 2015 and 2019, there were at least 57 drone incursions over two dozen US nuclear sites. [44] In 2018 and 2019, drone incursions shut down major airports in London. [45] In 2023, Sydney airport reported a significant increase in the level of drone activity in its no-fly zone. The same year, drones repeatedly breached restricted airspace above Langley Air Force Base in the United States. [46] Some 350 intrusions across 100 different US domestic military installations were reported in 2024, and despite weeks of investigation, authorities were unable to identify the operators. [47] In Europe, numerous airports had to ground flights in 2025 after repeated drone incursions. [48]
Threat recognition and response
In response to these incursions, many jurisdictions and authorities are working to harden national critical infrastructure and develop domestic counter-drone strategies. The United Kingdom has arguably been the most proactive, driven by the high-profile drone disruption at Gatwick Airport in 2018, which exposed critical vulnerabilities in airport security. As a result, the United Kingdom closed a number of legal gaps and developed a coordinated Counter-Unmanned Aircraft Strategy. [49] The Unmanned Aircraft Act 2021 expanded police powers to counter drones and established drone flight restriction zones across a number of critical infrastructure and sensitive sites.
Following the initial efforts of the Biden administration, the Trump administration issued an executive order in 2025 that tasked the Federal Aviation Administration with establishing long delayed rules to restrict drone flights over critical infrastructure and mandated increased enforcement of criminal violations relating to drones. Joint Interagency Task Force 401 was also established to synchronise and coordinate efforts across agencies. [50] In December 2025, the Safer Skies Act was passed, granting new authority for state and local law enforcement agencies to protect certain sites from drones, and significantly expanding the legal authority to take down drones in the United States.
Germany has paved the way for the amendment of its Aviation Security Act to grant German armed forces the authority to neutralise drones over domestic critical infrastructure. Germany is also drafting reforms to provide police forces with counter-drone tools. [51] Through Project Land 156, the Australian Defence Force will acquire a suite of counter-drone systems, some of which will be deployed for domestic site security. [52] Australia is also seeking to develop its domestic drone security framework and coordinate drone detection efforts across jurisdictions and sectors. Like Germany, it too is considering counter-drone capabilities for domestic law enforcement. [53]
Remaining vulnerabilities
These are important initiatives but vulnerabilities remain that these strategies and frameworks do not address.
First is the issue of target proliferation. Although the equipment needed to detect and shoot down small drones is cheap compared with high-end air defence systems, each system covers only a small area that requires constant monitoring. There is no one system that could cover multiple potential targets. Domestic terrorist attack targets could include a vast array of civilian infrastructure and mass gatherings and events, extending well beyond traditional high-value targets such as government buildings or military facilities, which the aforementioned counter-drone systems are designed to protect. [54]
Second, no single counter-UAS mechanism provides comprehensive protection against the full spectrum of vulnerabilities. Radio frequency detection can struggle to identify modified or custom-built drones. Radar systems may be able to detect larger drones but may fail to detect smaller platforms. This means that robust site protection requires the integration of multiple complementary and layered systems, each with their own procurement, maintenance, and operational costs. Authorities must make difficult decisions on not only which sites to protect but which threat profile to defend against at each site.
For example, the European Drone Defence Initiative, also known as the Drone Wall, is an attempt by the European Union to establish a continent-wide defence to counter hostile drones. Not yet realised, and currently stalled due to lack of coordination and political backing, it is a planned interoperable system to detect, locate, and neutralise hostile drones. The Drone Wall is itself vulnerable to malign and extremist actor disruption, either by jamming the wall’s sensor systems, interfering with command-and-control systems, or attacking the wall’s hardware elements. Because it is primarily intended as a response to Russian drone incursions, it is not clear if it would function effectively against drones deployed by domestic actors internally, or by adversaries from outside Europe. [55]
Third, while there have been legislative changes made to address domestic drone threats across a number of jurisdictions, challenges remain. For example, the Australian Communications and Media Authority prohibits the possession or use of jamming devices except under narrowly defined exemptions. This means that while domestic law enforcement can deploy counter-drone tools in exceptional circumstances, most electronic countermeasures remain legally constrained and subject to strict oversight. In jurisdictions where there is expanded authority to use jamming devices, malicious actors may deliberately exploit frequencies that authorities are reluctant to jam, such as those used by emergency or cellular networks. And there remains the risk of collateral damage should a drone be brought down in a populated area or over critical infrastructure.
Fourth, governments have attempted to address drone threats through preventive regulation, requiring manufacturers to embed location-based safety features such as geofencing and remote identification into drone design. The EU’s Regulation 2019/945, various UK regulations, US Remote ID requirements, and Japan's comparable regulations all mandate geofencing features to prevent unauthorised drone flights near sensitive locations. However, these systems can be disabled or circumvented by malign actors, a process known as “jailbreaking”.
The largest commercial drone manufacturer, Chinese company DJI, which accounts for around 70 per cent of the global consumer drone market, announced in November 2025 that it would remove hard geofencing restrictions globally. [56] Instead, DJI will offer advisory warnings and rely on user compliance rather than preventing take-off and flight in restricted areas. This reveals a fundamental limitation of regulatory approaches that depend on manufacturer cooperation. In December 2025, the US Federal Communications Commission added DJI to its covered list, meaning it will ban the sale of its new products in the United States. While this will mitigate concerns around DJI in the United States, it does not extend to other jurisdictions and may have unintended consequences for US domestic law enforcement and first responders who currently depend on DJI drones for their operations. [57]
Lastly, the contemporary drone threat environment is shaped by the convergence of multiple enabling technologies. Advances in AI reduce operator skill requirements through assisted navigation and object recognition. [58] Improvements in lithium-polymer and emerging solid-state batteries extend potential range and endurance. [59] Encrypted communication, such as software-defined radio, creates complications for signals-based countermeasures. This additive ecosystem undermines detection and mitigation systems that rely on predictable performance profiles of commercially standardised systems.
Of note here is 3D printing, which is especially appealing for domestic threat actors operating under resource constraints. While it does not independently transform drone capability in the way automation software or new power systems might, it nonetheless lowers the cost, time, and expertise required to modify physical components to cheaply augment capabilities. Developing AI-enabled autonomous navigation or encrypted command architectures requires advanced coding capability, testing infrastructure, and specialist knowledge. By contrast, consumer-grade 3D printers are widely available, computer-aided design software is easily accessible, and maker communities openly share modifiable designs. Additive manufacturing is a low-barrier pathway for hardware enhancement and payload increase. While other additive technologies may offer a higher ceiling of capability, 3D printing represents a lower floor of entry.
Policy recommendations
Although the threat of drone use by domestic extremist actors is growing, countries still have an opportunity to act and minimise vulnerabilities. The key elements of that action should be to: (1) establish national counter-drone coordination units whose primary goal is the oversight of domestic counter systems; (2) harmonise and coordinate safety-by-design regulations to achieve international consistency; and (3) formulate and implement specific policies and interventions to address the threat posed by additive manufacturing. These recommendations are designed to be country agnostic while highlighting the need for international engagement and coordination among partner countries.
Counter-drone coordination and international information sharing
Current national counter-drone responses tend to fall awkwardly between multiple agencies with unclear authority hierarchies and no single point of coordination. To begin to address the challenge of domestic extremist and malign actor use of drones, jurisdictions should establish dedicated national counter-drone coordination units, operating as joint task forces, responsible for testing, standardising, and evaluating domestic counter-drone tactics within legal and ethical constraints. The task forces would comprehensively bring together law enforcement operational expertise, aviation regulatory authority, and intelligence service threat assessment capabilities.
The United States has recently established such a coordination unit, the Joint Interagency Task Force 401, which spearheads the acquisition and integration of air defence systems aimed at taking down small uncrewed aerial systems. [60] Similar coordination units could be established to ensure the efficacy of country-specific counter-drone strategies and platforms.
These units would be responsible for evaluating counter-drone technologies suitable for civilian environments. Military counter-drone systems rely heavily on kinetic interdiction or broad-spectrum jamming that create unacceptable risks in populated areas outside conflict zones. Domestic settings require different approaches. Domestic counter-drone defence requires iterative testing and regular recalibration as both commercial platforms and additive and modification techniques from areas such as 3D printing and AI evolve. The coordination unit would establish testing protocols that evaluate each technology against effectiveness in real-world conditions and work to match those capabilities against known and likely future threats.
National coordination units will be most effective when supported by broader international cooperation. Each country operates under its own distinct regulatory framework; what is legally permissible in one may violate the law in another, forcing nations to develop capabilities in isolation. However, international knowledge sharing can enable countries to identify solutions compatible with their own regulatory constraints while benefiting from collective learning without requiring regulatory harmonisation.
International coordination of safety-by-design regulation
Governments should also focus on preventive approaches that mandate embedded safety features directly into drone design and production. If geofencing and remote identification become standard across legitimate drone operations, unauthorised activity becomes more visible. By making hobbyist and commercial drones easier to identify, and barring them from sensitive areas, authorities will be able to more rapidly distinguish inadvertent disruptions from nefarious threats. Security personnel can treat unidentified drones operating near sensitive sites as potentially hostile rather than spending time sorting genuine threats from casual rule violations.
Regulatory compliance should be a condition of market access, enforced through government verification rather than manufacturer cooperation. This requires prohibiting the import and sale of drones lacking functional safety features, treating non-compliant equipment as contraband at customs, and imposing substantial penalties on distributors selling uncertified products.
Several countries have pursued such a regulatory approach. The United States now requires most registered drones to broadcast Remote ID signals that transmit identifying and location data during flight, while the European Union introduced mandatory remote identification for many drones in 2024 and enforces geofenced airspace restrictions around sensitive locations. Japan similarly mandates remote identification for drones over 100 grams.
However, this approach only succeeds through international coordination among major markets. If countries establish common technical standards and mutual recognition of certification, manufacturers face genuine pressure to comply or forfeit market access. Without coordination, manufacturers optimise for the least restrictive market and circumvent stricter jurisdictions through e-commerce. The international cooperation framework should therefore include common drone certification standards as a central pillar, transforming fragmented national regulations into unified requirements. There will be challenges including enforcement costs for customs inspection and market surveillance, and political obstacles to achieving genuine regulatory harmonisation rather than lowest-common-denominator standards.
DJI’s dominance, and its recent shift from manufacturer-reliant to user-reliant safety compliance represents a substantial hurdle to an integrated and robust safety-by-design framework. However, this is precisely why an internationally coordinated regulatory approach is needed. If major markets such as the United States and the European Union, and smaller markets like Australia and Japan, adopt common certification standards, manufacturers will face strong commercial incentives to comply despite regulatory divergence in their home markets.
Similar dynamics are already visible in other areas. Australia’s recently enacted regulation of social media use places responsibility on platforms to implement age assurance measures as a condition of operating within the Australian market, regardless of where those platforms are headquartered. A comparable logic can underpin safety-by-design drone regulation. Even when major manufacturers based outside participating jurisdictions do not adopt safety-by-design features, regulatory obligations will require them to comply with certification rules if they wish to sell products in those jurisdictions.
Addressing the threat of additive technology
Even the most comprehensive safety-by-design frameworks cannot account for the growing threat posed by additive technology. While the additive ecosystem includes several threats, the ease of access to 3D printing for domestic malign actors is particularly concerning. Similar challenges have been highlighted in the space of 3D-printed firearms, where so-called “ghost guns” have provided malicious actors with untraceable weapons that circumvent black-market supply chains. [61] Here, several countries, including Australia and the United Kingdom, have responded by criminalising the manufacture and possession of both the products and their digital blueprints. [62]
However, unlike firearms, which are already heavily restricted in most countries, many 3D-printed drone components serve legitimate recreational and commercial purposes. Over-regulation risks alienating hobbyists and stifling innovation. Rather than sweeping restrictions, policymakers should pursue a more targeted response.
A database of prohibited 3D-printed drone component schematics should be established, regularly updated, and accessible to partner states through existing counter-terrorism cooperation frameworks. Establishing such a database would contribute to internationally coordinated prevention efforts focused on this narrow class of schematics. It would also avoid fragmented national efforts and mitigate the risk of over-regulation.
By establishing this shared list of prohibited blueprints, countries can work with file-sharing platforms and printer manufacturers to target restrictions. AI algorithms can now detect prohibited design files and block their production. Multiple systems have been developed to detect 3D-printed guns. Print&Go's “3D GUN’T” uses AI-driven filters embedded in printer firmware to help prevent manufacture of restricted items. [63] Following US government pressure, Thingiverse, the world's largest platform for 3D printing files, implemented AI-powered detection that scans uploads to flag and remove prohibited designs. [64] These interventions occur at multiple points in the process, including on file-sharing platforms, in slicer software that prepares models for printing, and in printer firmware itself.
The effectiveness of such a framework relies on widespread industry participation. Printer manufacturers unwilling to implement detection systems or embed identifying protocols would face market access restrictions in participating countries, similar to the internationally coordinated manufacturer enforcement approaches suggested above for commercial off-the-shelf drones.
Conclusion
For a threat to pose real danger, it requires intent, capability, and opportunity. Domestic extremists have all three. They have already demonstrated the will to deploy drones as weapons, and while their attempts have so far fallen short, that record of failure should not be mistaken for the ceiling of their ambitions. The capabilities of the technology and those intent on using it for extremist ends are becoming more sophisticated. The opportunity presented by this convergence means it is not a matter of whether domestic extremists will accelerate their use of drones, but whether governments will have done enough to stop them.