As drones become more common in commercial and recreational use, critical infrastructure teams must learn to distinguish routine flights from activity that signals potential security concerns. This guidance outlines how to map normal UAS patterns, assess drone capabilities and vulnerabilities, and recognize indicators—such as unusual flight paths, payloads, or operator behavior—that may suggest criminal or malicious intent. It also walks organizations through appropriate response steps, from documenting low-risk encounters to engaging law enforcement when a threat is suspected. Together, these practices help facilities maintain awareness, strengthen preparedness, and safeguard sensitive operations from emerging aerial risks.

| Format: |
|
| Topics: | |
| Website: | Visit Publisher Website |
| Publisher: | Cybersecurity and Infrastructure Security Agency (CISA) |
| Published: | July 31, 2025 |
| License: | Public Domain |