Risk-based, Legally Compliant, Practicable
How We Support You
Unauthorized drone flights are on the rise – including espionage, operational disruptions, and cyberattacks from the air. Together with our partner AVB, we combine risk management & security with civil/electrical engineering services, enabling you to act quickly and reliably.
Our Approach
Drone Defense
Strategic. Neutral. Security-focused.
01
Assessment of Needs
- Determine the client’s risk level
- Identification of critical zones: Assessment of potential flight corridors and sensitive areas (e.g., production sites, infrastructure nodes).
- Evaluation of the drone threat: Analysis of potential scenarios (espionage, sabotage, smuggling).
- Result documentation: Consolidation of all vulnerabilities in a comprehensive risk report.
02
Concept
- Technology selection: Recommendation of suitable detection methods (radar, RF scanning, optical systems).
- Defense strategies: Development of appropriate countermeasures (e.g., jammers, net capture, lasers).
- Escalation levels: Definition of responsibilities and interventions at each stage (security services, police).
- Integration into security standards: Alignment with existing regulations (aviation security laws, site security guidelines).
- Strategic master plan: A documented concept that consolidates all measures into a coherent security approach.
03
Integration
- Technology selection: Recommendation of suitable detection methods (radar, RF scanning, optical systems).
- Defense strategies: Development of appropriate countermeasures (e.g., jammers, net capture, lasers).
- Escalation levels: Definition of who intervenes at which stage (security services, police).
- Integration into security standards: Alignment with existing regulations (aviation security laws, site security guidelines).
- Strategic master plan: A documented concept that integrates all measures into a coherent security approach.
04
Procurement Process
- Detailed specifications: Consolidation of technical parameters
- Performance and quality standards: Definition of minimum standards and tolerances for tendering
- Legal framework: Consideration of formal requirements (e.g., VgV/UVgO) and compliance
- Structured documentation: Preparation of requirement specifications
- Transparency & comparability: Ensuring that offers can be evaluated on the basis of identical requirements
05
Implementation Support
- Procurement support: Expert consulting in selecting the optimal provider
- Quality control: Ongoing verification that all systems comply with the agreed specifications
- Interface management: Coordination between suppliers, construction trades, and security authorities
- Project status & acceptance: Regular progress updates, final functional testing, and approval
06
Implementation of Training
- Training planning: Development of a needs-based training schedule
- Content and methods: Delivery of knowledge on drone detection and defense
- Role-specific training: Preparing security staff for defined procedures
- System introduction: Instruction on the operation and maintenance of new systems
- Training documentation: Provision of detailed materials for long-term use
Drohnenabwehr – Kompetenz
Threat Landscape
Movement Profiles & Imagery Intelligence
Unmanned systems enable the systematic collection of site activities. Movement patterns, object locations, and operational processes are precisely identified and can be exploited for espionage or operational sabotage.
IMSI-Catcher & Kommunikationsdaten
IMSI-Catcher-Drohnen erfassen eindeutige Gerätekennungen von Mobiltelefonen. So können Führungs-kräfte oder Entwicklungsingenieure gezielt identifiziert, lokalisiert und überwacht werden – bis hin zum Risiko unautorisierter Zugriffe auf Unternehmensdaten.
Cyberangriffe über Drohnenplattformen
Drohnen werden als Plattform für IT-Penetrationstechnik eingesetzt werden, etwa durch das Ausnutzen von WLAN- oder Bluetooth-Schnittstellen. Zudem besteht die Gefahr gezielter Manipulation oder physischer Beschädigung an Gebäudestrukturen. Ergänzend können Funkverbindungen und drahtlose Systeme gezielt gestört werden.
Drone Espionage –
The Invisible Threat
The number of unauthorized drone overflights above critical infrastructure and industrial facilities in Germany is skyrocketing — from around 120 documented cases in 2018 to more than 900 in 2024.
At the same time, incidents of espionage, operational disruptions, and security breaches are rising sharply.
High-profile cases — such as drone flights over the BMW plant in Munich or the Shell refinery in Hamburg — demonstrate how quickly drones can expose trade secrets and endanger vital assets.
Our Expertise
As a partnership between DRB Deutsche Risikoberatung (risk management & security consulting) and AVB Bauwerksdiagnostik (structural and electrotechnical engineering), we offer a unique combination of expertise in the field of drone defense – particularly for critical infrastructure, industrial production and logistics sites, and the defense sector.
We provide manufacturer-independent and holistic project support – from risk assessment and concept development through tendering, system integration, acceptance testing, and staff training. Thanks to our extensive experience in working with law enforcement and regulatory authorities (e.g. aviation supervision, the Federal Network Agency, data protection officers, works councils), we ensure that all solutions are legally compliant and practically integrated. Our in-depth expertise in structural and load-bearing design, cable routing, electromagnetic compatibility (EMC), and IT/OT interfaces guarantees a robust and technically sound implementation.
Dual Expertise
DRB provides risk and security consulting, while AVB contributes structural and electrical engineering services – delivering analytical capability combined with structural, EMC, and interface expertise from a single source.
Operational Experience
Law enforcement expertise and extensive experience at regulatory and institutional interfaces (aviation authorities, Federal Network Agency, data protection officers, works councils) ensure practical and legally compliant integration.
Critical Infrastructure Focus
Specialized experience across industry, logistics, utilities, and data centers throughout Germany, delivering measurable and verifiable results.
Manufacturer-Independent
We provide impartial consulting and select the most economically efficient solution for your site – with no ties to specific vendors or systems.
Construction & EMC
AVB designs the structural framework for masts and rooftop installations, including cable routing, electromagnetic compatibility (EMC), and lightning and surge protection – ensuring that all external systems are built to last and perform reliably.
IT/OT Integration
We seamlessly integrate sensor systems into control rooms, video management systems (VMS), and IT/OT environments – with fully documented interfaces and auditable processes for long-term reliability and compliance.
1. Industriespionage
Mehr als 320 dokumentierte Fälle von Spionage und Ausforschung allein 2024 - Firmengeheimnisse sind leicht angreifbar
Betriebsunterbrechungen
Mehr als 320 dokumentierte Fälle von Spionage und Ausforschung allein 2024 - Firmengeheimnisse sind leicht angreifbar
Betriebsunterbrechungen
Rund 180 Mal wurden Produktionsabläufe durch Drohnen unterbrochen mit direkten Umsatzeinbußen.
Begleitung der Umsetzung
• Unterstützung bei der Vergabe: Fachliche Beratung bei der Auswahl des optimalen Anbieters. • Qualitätskontrolle: Laufende Überprüfung, ob alle Systeme den vereinbarten Spezifikationen entsprechen. • Schnittstellenmanagement: Koordination zwischen Lieferanten, Baugewerken und Sicherheitsbehörden. • Projektstatus & Abnahme: Regelmäßige Updates über Fortschritt, abschließende Funktionsprüfung und Freigabe.
Sicherheitsverletzungen
Über 240 Vorfälle an Kraftwerken und Militärstandorten, weitgehend ungeschützte Anlagen.
Datenschutzverstöße
Mindestens 130 dokumentierte Datenschutzverletzungen, die hohe Bußgelder und Reputationsschäden nach sich ziehen.
Implementierung der Schulungen
• Schulungsplanung: Erstellung eines bedarfsgerechten Schulungsplans. • Inhalte und Methoden: Vermittlung von Wissen zur Drohnenerkennung und -abwehr. • Rollenspezifische Trainings: Vorbereitung des Sicherheitspersonals auf definierte Abläufe. • Systemeinweisung: Einweisung in Bedienung und Wartung neuer Systeme. • Schulungsdokumentation: Übergabe detaillierter Unterlagen für langfristige Nutzung.
Trusted
porttitor dapibus. Proin urna neque, mattis volutpat aliquam eu, ullamcorper quis tellus. Donec nisl nulla, semper condimentum justo quis, consequat blandit orci.
helping you in family court
Family matters & domestic relations
civil unions & domestic partnerships
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Fames ac turpis egestas integer eget. A scelerisque purus semper eget duis at tellus at urna. Pellentesque nec nam aliquam sem et tortor consequat iytd.
Ante in nibh mauris cursus. Tellus at urna condimentum mattis Non tellus orci ac auctor augue mauris augue neque. Egestas odio ut sem. Nunc lobortis mattis aliquam faucibus purus in massa olat you all the ekolor tolos years of joll ewop drty old.
Juvenile law
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Fames ac turpis egestas integer eget. A scelerisque purus semper eget duis at tellus at urna. Pellentesque nec nam aliquam sem et tortor consequat iytd.
Ante in nibh mauris cursus. Tellus at urna condimentum mattis pellentesque id. Non tellus orci ac auctor augue mauris augue neque. Egestas dui id ornare arcu odio ut sem.
we will do it together
Family Law
“Liberty is the right to do what the law permits.”
plan of action
know your rights
Lorem ipsum dolor sit amet, conetur adiping elit Lorem ipsum dolor sit amet, cons ectetur adipiscing elit Lorem ipsum dolor sit altmet, conse ctetur adipiscing elit aloma lomiur off silder tolos. Lorem ipsum dolor sitlor amet, conetur adiping elit Lorem ipsum dolor sit amet, consetur adipisg elit aloma alor tolos.
we are part of the family. all the way through.
Further Sources & News
Videos on Drone Espionage & Sabotage
you are not alone
our professional services Include:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
Issues that may arise in family law
- Lorem ipsum dolor sit amet the old con ectetur
- Lorem ipsum dolor sit amet the old con ectetur
- Lorem ipsum dolor sit amet the old con ectetur
- Lorem ipsum dolor sit amet the old con ectetur
Our Contact Details
office@deutsche-risikoberatung.de
+49 (0) 30 20 65 38 34
DRB Deutsche-Risikoberatung GmbH
Am Kleinen Wannsee 31
14109 Berlin
Get in touch now:
FAQ
Drone defense (Counter-UAS) encompasses all organizational and technical measures that enable companies to detect, verify, and appropriately respond to unmanned aerial systems at an early stage.
The main risks include industrial espionage, operational disruptions, sabotage, and cyberattacks from the air (e.g., rogue access points or IMSI catchers).
For companies, the need for action is increasing as inexpensive consumer drones become ever more powerful, payloads are easier to integrate, and legal as well as reputational damage can occur without any visible warning.
Our drone defense consulting provides a site-specific risk profile, a manufacturer-independent detection and response concept (RF/Radar/Optical), and clear escalation levels including authority coordination and reporting paths.
It also ensures integration into existing IT/OT and security processes.
The result: a solid decision-making basis for budgeting, tendering, and implementation – complete with KPIs for operations, audits, and reporting.
- Critical Infrastructure (Energy, Chemical, Water, Transport)
– Facilities essential to national supply and safety require continuous monitoring and reliable airspace protection. - Production (Automotive, High-Tech, Pharmaceutical) and Defense Sites – Industrial and defense manufacturers face heightened risks from espionage, sabotage, and operational disruptions.
- Logistics Hubs and Airport Vicinity – Warehouses, ports, and transport nodes are highly exposed to drone-related interference and must maintain operational continuity.
- Data Centers / Cloud Facilities and Corporate Headquarters – Data integrity and business continuity demand the highest level of airspace security and rapid response mechanisms.
Wherever intellectual property, operational availability, sensitive areas, or gatherings of people need protection, professional drone defense delivers measurable value.
- Site Risk Assessment: Analysis of flight paths, lines of sight, blind spots, asset mapping, and IT/OT attack surfaces.
- Detection & Response Concept: Multi-sensor architecture (RF/Radar/Optical), alarm definition, escalation levels, and coordination with authorities.
- Proof of Concept (PoC): Test setup, radio and line-of-sight measurements, fine-tuning to reduce false alarms, and zone-based coverage validation.
- Integration & Specification: Technical specifications, interfaces (VMS/Control Center/Alarm Systems), and evaluation matrix for tendering
- Implementation & Acceptance: Quality control, range testing, and full documentation.
- Playbooks & Training: Definition of roles and reporting paths, exercises, and handover into regular operations.
RF Detection: Identifies control and telemetry signals and often locates the pilot – highly valuable in urban and industrial environments.
Radar: Provides strong range and altitude data on open terrain, but requires clear lines of sight.
Optical/IR: Enables visual verification (evidence images, payload identification), though dependent on lighting and line of sight.
Acoustic: Serves as a complementary tool in quiet areas; short-range only.
Best Practice: A multi-sensor approach with intelligent data fusion minimizes false alarms and significantly increases reliability.
By ensuring accurate sensor placement (optimized lines of sight, avoiding blind spots and reflections), sensor fusion (e.g., RF alert → optical verification), and PoC fine-tuning under real operating conditions.
Defined alarm logic (e.g., thresholds, time windows) and regular maintenance and calibration further enhance system reliability.
Clear playbooks guarantee short response times (MTTD/MTTR) and consistent decision-making across all operational levels.
In Germany, active radio interference—such as jamming signals—is generally prohibited and reserved for sovereign authorities.
For operators, the legally compliant measures include detection, documentation, alerting, and organizational response—always in coordination with the aviation authorities, police, and the Federal Network Agency (BNetzA).
Our drone defense consulting is designed to be fully compliant with legal and regulatory requirements.
Aviation and Regulatory Law: Define reporting and cooperation channels with authorities and ensure compliance when operating near airfields or restricted areas.
GDPR / Privacy by Design: Align cameras to company premises only, implement data storage and access concepts, define deletion periods, and establish works council agreements.
Involve the works council or employee representatives early in the process.
We provide practical templates and integrate legal and data protection experts systematically into every project.
IMSI catchers (cell-site simulators) mimic mobile network base stations to trick nearby devices into connecting.
The resulting risks include de-anonymization and location tracking, forced 2G fallback enabling SMS and voice interception, and local denial-of-service (DoS) disruptions.
Such airborne threats underscore the need for RF/Cell anomaly monitoring and secure communication protocols in corporate environments.
Extremely serious. Drones can carry rogue access points, Wi-Fi Pineapple devices, or cellular payloads to scan radio signals, exploit vulnerabilities, or intercept sensitive data.
We integrate drone detection with IT/OT monitoring, establish forensic and evidence-preservation processes, and define protective measures such as network segmentation, security policies, and two-factor authentication without SMS.
Companies are legally allowed to protect themselves passively against unauthorized drones. The following measures are considered compliant under current German regulations:
Early Detection and Monitoring:
The use of detection systems (e.g., RF scanners, radar, optical sensors) for early drone identification is permitted.
Modern sensor combinations can determine a drone’s position and often even the pilot’s location—as long as they do not intercept protected communications.
Example: Drones weighing over 250 g must transmit a Remote ID, enabling security personnel to view data such as position, altitude, and operator ID in real time. This allows them to distinguish between authorized and unauthorized flights.Documentation and Alerting:
Upon sighting a drone, companies may document the incident (e.g., video recordings of the drone) and immediately notify the competent authorities (police or aviation authority).
A defined alert protocol with reporting paths ensures fast coordination. Establishing cooperation agreements with local authorities in advance is recommended for rapid response.Organizational Countermeasures:
Within company premises, firms may take organizational steps to minimize risk.
This includes evacuating sensitive areas, shutting down critical systems, or initiating emergency procedures if a drone poses a direct threat (e.g., suspected payload or explosive device).
Passive structural measures such as canopies or protective netting over exposed facilities can prevent reconnaissance or physical impact damage.Training and Procedures:
Regular staff training and clear response procedures are both legal and essential.
Security personnel should be trained to identify drones quickly, assess the threat level, and follow established escalation steps.
Rapid detection, verification, and coordination remain the most effective and legally compliant protection.
- Use of Jammers:
Emitting radio signals to disrupt a drone’s control link or GPS signal is strictly prohibited for companies.
Operating a jammer without authorization constitutes illegal frequency use under the Telecommunications Act (TKG).
Only state authorities (e.g., police, military, or correctional facilities) may use such devices in narrowly defined cases.
For private entities, jammers are not an option and may result in fines of up to €500,000 or criminal prosecution. - Hijacking Drone Controls (Spoofing/Hacking):
Technically possible but illegal. Taking over or manipulating a foreign drone—via GPS spoofing or radio protocol hacking—violates the telecommunications secrecy and criminal law.
Intercepting or reading control or video signals is punishable under § 88 TKG.
Such actions may also qualify as computer crime or property damage.
Even manufacturers of drone defense systems note in their disclaimers that certain functions are restricted under current law. - Shooting Down or Physically Capturing Drones:
Using firearms, water cannons, nets, or interceptor drones to neutralize UAVs is forbidden for companies.
Drones are classified as aircraft (§ 1 (2) LuftVG); interfering with them can be deemed a dangerous interference with air traffic (§ 315 StGB)—punishable by up to 10 years in prison.
Even “soft-kill” methods such as net guns are risky: a damaged drone can crash uncontrollably, posing serious injury hazards. - Electromagnetic or High-Energy Systems:
Technologies such as high-energy lasers, EMP generators, or microwave disruptors are likewise prohibited for civilian use.
They are considered weapons or jamming devices and may only be operated by authorized authorities.
Possession or deployment by private companies violates weapons and radio regulations.
Die Abwehr und Verfolgung illegaler Drohnen obliegt in Deutschland primär staatlichen Stellen – für Unternehmen heißt das, im Ernstfall die richtigen Behörden einzubinden. Die Zuständigkeiten im „Anti-Drohnen-Dschungel“ lassen sich wie folgt skizzieren:
Landespolizei: Die Gefahrenabwehr bei Bedrohungen durch Drohnen auf dem Boden obliegt grundsätzlich der Polizei des Bundeslandes. Dringt eine Drohne in ein Firmengelände ein oder gefährdet Personen/Anlagen, ist die örtliche Polizei der erste Ansprechpartner. Sie kann Maßnahmen nach den Polizei- und Ordnungsgesetzen ergreifen (etwa Platzverweise, Beschlagnahme der Drohne oder Festnahme des Piloten). Allerdings haben viele Landespolizeien bisher wenig technische Ausstattung, um Drohnen effektiv abzufangen. Einige Länder bauen spezielle Drohnenabwehr-Einheiten auf, oft bei den Polizeifliegerstaffeln, doch flächendeckend ist diese Fähigkeit noch nicht vorhanden.
Bundespolizei: An bestimmten Schutzobjekten des Bundes übernimmt die Bundespolizei die Aufgabe. So ist auf größeren Verkehrsflughäfen die Bundespolizei für die Luftsicherheit zuständig – sie würde bei Drohnensichtungen am Airport eingreifen. Ähnliches gilt für den Bahnverkehr und Bundesgrenzen. Die Bundespolizei rüstet derzeit auf: Eine geplante Änderung des Bundespolizeigesetzes schafft explizite Befugnisse zur Drohnenabwehr mit modernster Technik, einschließlich elektromagnetischer Impulse, Funkstörung und physischer Einwirkung. Dieser Gesetzentwurf befindet sich 2025 im Gesetzgebungsverfahren. Bis zur Verabschiedung greifen Bundespolizisten im Ernstfall auf allgemeine polizeiliche Befugnisse zurück, stets unter Abwägung der Verhältnismäßigkeit.
Militär (Bundeswehr): Die Bundeswehr darf im Inland nur ausnahmsweise tätig werden. Nach aktuellem Luftsicherheitsgesetz (LuftSiG) können die Streitkräfte bei einer drohenden besonderen Schadenslage im Luftraum eingreifen. § 14 LuftSiG erlaubt es den Streitkräften, Luftfahrzeuge (dazu zählen auch Drohnen) z. B. abzudrängen, zur Landung zu zwingen, Warnschüsse abzugeben und – nach derzeitiger Planung – im Extremfall auch abzuschießen. Voraussetzung ist u.a., dass von der Drohne eine akute Lebensgefahr oder Gefahr für kritische Anlagen ausgeht und die zuständige Landespolizei nicht über ausreichende Mittel verfügt. Das Bundeskabinett hat im Januar 2025 eine Gesetzesänderung auf den Weg gebracht, um der Bundeswehr in solchen Worst-Case-Szenarien explizit die Befugnis zum Abschuss illegaler Drohnen zu geben. In der Praxis käme die Bundeswehr also nur bei Terror- oder Sabotageakten mit Drohnen zum Einsatz – und auch nur auf Anforderung der Polizei.
Luftfahrtbehörden und Flugsicherung: Zivile Luftfahrtbehörden (z. B. das Luftfahrt-Bundesamt (LBA) und die Landesluftfahrtbehörden) sind für die Regulierung und Überwachung des Drohnenbetriebs zuständig. Sie erteilen Aufstiegserlaubnisse in Sonderfällen und ahnden Ordnungswidrigkeiten gegen Luftverkehrsregeln (gemäß LuftVG/LuftVO, Bußgelder bis 50.000 €). Im Ereignisfall unterstützen sie die Polizei vor allem administrativ: Über die zentrale Drohnenregistrierung beim LBA können Halter identifiziert werden (jeder Drohnenbetreiber muss sich registrieren, erhält eine e-ID und diese ist auf der Drohne angebracht oder elektronisch auslesbar)protector.de. Die DFS (Deutsche Flugsicherung) wiederum überwacht den Flugverkehr – Sichtungen von Drohnen nahe Flughäfen werden oft aus dem Tower gemeldet. Flugleitstellen können bei Gefahr An- und Abflüge unterbrechen, um Unfälle zu vermeiden. So sind Drohnenflüge in Sperrzonen (z. B. <1,5 km um Flughäfen) strikt verboten; ein Verstoß kann als Straftat geahndet werden. Für Unternehmen bedeutet das: In der Nähe von Flughäfen oder Flugplätzen ist die Luftsicherheitsbehörde einzuschalten, sobald eine Drohne auftaucht.
Bundesnetzagentur (BNetzA): Die BNetzA ist für das Frequenzspektrum und Funkanlagen zuständig. Sie wacht darüber, dass keine unerlaubten Funksender betrieben werden. Kommerzielle Drohnenabwehr-Systeme müssen ggf. mit der BNetzA abgestimmt werden – z. B. wenn Radaranlagen oder Funkscanner verwendet werden, ist sicherzustellen, dass sie den Zulassungsbestimmungen entsprechen. Insbesondere bei Störfällen wird die BNetzA aktiv: Sie kann illegale Störsender orten und stilllegen. Unternehmen sollten im Vorfeld mit der BNetzA klären, welche sensorischen Abwehrtechniken zulässig sind und was im Fall eines Funkstör-Vorfalls zu tun ist. Praktisch wichtig: Jeder Einsatz von Jammern oder ähnlichen Sendern durch Privatfirmen würde von der BNetzA verfolgt – daher ist hier Zurückhaltung geboten. Umgekehrt kann die BNetzA helfen, den Piloten einer unerlaubten Drohne ausfindig zu machen (beispielsweise über Funkpeilung, sofern die Polizei dies anfordert
Even though many active countermeasures are prohibited, companies — especially critical infrastructure (KRITIS) operators — cannot remain passive. They are expected to take preventive action to fulfill their duty of care and limit potential risks.
Duty of Care and Risk Management:
While there is currently no explicit legal requirement to implement drone defense systems, companies are obligated under general traffic safety duties to mitigate foreseeable risks to third parties and operations.
Upcoming KRITIS legislation will reinforce this expectation, requiring a comprehensive “all-hazards” approach, resilience plans that include drone scenarios, and mandatory reporting of significant security incidents to federal authorities. Regulators and insurers already expect companies to integrate the drone threat into their security concepts.Reporting and Cooperation Duties:
Although there is no formal reporting obligation (except in aviation or under specific industrial regulations), KRITIS operators are expected to inform police or security authorities immediately in the event of drone incidents.
If there is a suspicion of criminal activity (espionage, sabotage, terrorism), evidence should be secured and charges filed. Future regulations will likely mandate reporting drone sightings to the BSI or BBK to build national situational awareness.
Failing to act could be considered organizational negligence in case of damage.Data Protection and Privacy:
Drone detection systems must comply with the General Data Protection Regulation (GDPR) and respect privacy rights. Sensors such as cameras, microphones, and RF scanners may collect personal data.
Implement Privacy by Design: cameras should cover only company premises, not public areas or neighboring properties.
Define storage limits, access rights, and deletion periods, and involve the works council early when employee data could be affected.
Intercepting third-party communication (e.g., a drone’s camera feed or pilot commands) is strictly prohibited under both GDPR and § 88 of the Telecommunications Act (TKG). A data protection impact assessment should be conducted before deploying any new system.Liability Risks of Inaction:
If a company ignores known drone risks and an incident causes damage, it may be held liable for violating its safety obligations.
Example: A drone crash on a factory site causes injuries or fire — and no preventive measures were in place. Courts, especially for KRITIS sites, could apply strict standards.
Conversely, proactive measures — detection systems, alarm procedures — can mitigate liability and are increasingly required by insurers.Risks from Illegal Countermeasures:
Using banned defenses (e.g., jammers or physical interception) can result in fines, criminal charges, and civil claims.
A jammer could disrupt emergency services, air traffic control, or mobile networks, causing large-scale damage and liability.
A downed drone that crashes on third-party property could trigger injury or property claims.
Illegal countermeasures also pose reputation risks, particularly for KRITIS operators expected to act lawfully and responsibly.Operational Disruptions and Emergency Planning:
Drone incidents can cause major operational interruptions — even without direct attacks.
Between January and August 2024, German airports recorded 81 disruptions and 7 temporary shutdowns due to drones (DFS data).
Similar disruptions at industrial or KRITIS sites could lead to evacuations, production halts, and supply chain delays.
Companies should develop contingency and restart plans (e.g., controlled shutdowns, rerouting, client communication) and review each incident afterward to close security gaps — a requirement emphasized in the upcoming KRITIS framework.
To conclude, here is a brief overview of the key legal frameworks governing drone defense for companies in Germany:
Aviation Law (Luftverkehrsgesetz – LuftVG)
Regulates the operation of aircraft in Germany. Drones are classified as unmanned aerial systems and therefore as aircraft (§ 1 (2) LuftVG).
They are subject to aviation law, including mandatory liability insurance (§ 43 (2) LuftVG).
The Federal Ministry of Transport is authorized to issue implementing regulations, such as altitude limits and flight restrictions.
Violations (e.g., flights in restricted zones, missing identification) can result in fines of up to €50,000.
For companies, LuftVG and LuftVO define the operational framework—but grant no authority for active drone defense, which remains reserved for state authorities.
Aviation Security Act (Luftsicherheitsgesetz – LuftSiG)
Aims to prevent threats to civil aviation and regulate the powers of police and security authorities in cases of aerial threats.
Section 14 authorizes military intervention in extreme threat scenarios.
The 2025 amendment will explicitly empower the Bundeswehr to shoot down illegal drones threatening lives or critical infrastructure.
Simultaneously, the Federal Police Act has been expanded to allow technical countermeasures (e.g., electromagnetic pulses, jammers, kinetic interceptors).
Only state authorities hold these enforcement powers.
Companies cannot derive any independent right to act under LuftSiG but should be familiar with the framework—who may intervene and when.
Telecommunications Act (Telekommunikationsgesetz – TKG)
Regulates frequency use and protects the integrity of communications. Two key aspects for drone defense:
Ban on Jammers: Unauthorized transmission of radio signals to disrupt communication is illegal (§ 149 (1) No. 10 TKG).
Only certain authorized agencies (e.g., police, correctional facilities with BNetzA approval) may operate jammers.
→ For companies, jamming technology is strictly prohibited.Telecommunications Secrecy (§ 88 TKG): Intercepting or decoding communications data from third parties (e.g., drone video feeds or control signals) is criminally punishable.
Only technical detection data (signal strength, anonymous frequency scans) are permitted, provided they do not include personal data or content.
Criminal Code (Strafgesetzbuch – StGB)
Several criminal provisions apply to drone incidents:
Illegal Defense: Destroying or disabling a foreign drone may constitute property damage (§ 303 StGB) or a dangerous interference with air traffic (§ 315 StGB), punishable by up to 10 years imprisonment.
Drone Misuse: Drone pilots can be prosecuted for espionage (§ 202a StGB) or endangering air traffic (§ 315 StGB).
Self-Defense Exception (§ 32 StGB): Active defense may only be justified if a drone poses an imminent threat to life or limb—a rare scenario in practice.
Data Protection (GDPR / BDSG)
When using detection systems, companies must comply with data protection law.
Video, audio, or RF data may qualify as personal data.
Processing is permissible under legitimate interest (Art. 6 GDPR / § 4 BDSG) to protect property and security.
Requirements:
Data minimization & purpose limitation (no permanent recording of public areas).
Transparency: Inform employees and visitors about monitoring.
Retention & deletion: Store data only as long as necessary for incident analysis.
Remote ID: Its collection is allowed but considered personal data; sharing is limited to authorized authorities (e.g., police, LBA).
By maintaining privacy documentation and using technical anonymization (e.g., masking areas outside company property), organizations can minimize legal risks.
