Overview
- New guidance signed Dec. 8 and announced this week removes the perimeter constraint, lets commanders judge threats by the totality of circumstances, and treats unauthorized surveillance of designated sites as a threat.
- Service secretaries—and by delegation, service chiefs—can designate covered facilities based on risk, and installation commanders must issue site-specific procedures within 60 days with added drills and vulnerability assessments.
- The policy authorizes sharing drone track and sensor data with the Homeland Security and Justice departments and allows trained, certified contractors to operate counter‑UAS systems.
- The document does not specify how far outside a base boundary commanders may act, and the Army says commanders are expected to coordinate on any action taken beyond established fence lines.
- A DOD Inspector General report cited more than 20 conflicting policies and widespread gaps that left major installations without approval to use counter‑UAS tools, noting Luke Air Force Base as uncovered and reporting drone incursions rising to about 420 in a year.