We are facing a simple, unforgiving reality. The global drone industry is expanding at commercial speed and wartime scale at the same time. Production is surging, dual-use components are ubiquitous, and policy frameworks cannot keep pace. That mismatch is not academic. It is a practical vulnerability that adversaries and non-state actors are already exploiting, and it will get worse unless policymakers stop treating drones like a niche gadget and start treating them like a core national-security vector.

What is happening on the ground. Market analysts put the global drone market in the tens of billions of dollars in 2024 and project rapid growth into the rest of the decade. That growth fuels more factories, more supply chains, more low-cost airframes and sensors, and a steady stream of easier-to-modify systems for malicious use. Commercial scale now feeds conflict scale.

Where production is being concentrated. China and a handful of specialized manufacturers dominate global production of small and mid-size drones and many critical components. Beijing’s export rules moved in 2024, producing some tightening of controls for higher-end components while relaxing temporary curbs on certain consumer models. Those shifts change flows but do not eliminate the basic fact: cheap, capable aerial platforms and their parts are plentiful on global markets. Expect substitution, workarounds, and third-party reexports to fill any gaps markets or sanctions create.

Why that matters to conflict zones. The last two years have taught an ugly lesson. States and irregular forces have integrated commercial drones into reconnaissance, targeting, resupply and even strike roles. Ukraine’s push to scale domestic drone production has been dramatic; Kyiv explicitly prioritized mass-producible unmanned systems and saw private and public sector manufacturing rise quickly. That domestic surge reduces Western leverage and demonstrates how a dispersed industrial base can flood a battlefield with attritable, cheap platforms.

Why it matters to the rest of us. The same technologies that scale on the battlefield are being turned to other asymmetric missions: maritime strikes and harassment in the Red Sea, logistics and contraband drops across borders, and surveillance or attacks on critical infrastructure. The Houthi campaign against shipping in 2023–2024 is a clear example where unmanned systems disrupted global commerce and forced shipping reroutes. That is not a niche risk. It is a demonstrable economic and security shock that traces back to the easy availability of weaponizable drones and supporting systems.

Policy is lagging in three ways. First, regulation focused on safe integration into civil airspace has advanced but is not the same as managing malicious use. The FAA’s Remote ID rule and other airspace measures are steps forward on accountability and safety, but they were designed for safety and traffic management, not for preventing determined bad actors from weaponizing off-the-shelf systems or spoofing and jamming identification. Regulatory hygiene alone will not stop a determined illicit operator.

Second, export controls and industrial policy are reactive and fragmented. Governments are trying to thread a needle: restrict access to sensitive components while avoiding catastrophic disruption to legitimate commercial supply chains. Announcements in 2024 adjusted control lists and licensing thresholds, but the global market adapts quickly. Changes in Beijing’s export posture in 2024 reshaped flows and compliance burdens but did not remove the underlying industrial capacity. Expect re-routing and substitution.

Third, operational authorities and resourcing lag demand. Counter-UAS technologies exist in a range of capabilities, but legal authorities, interagency processes, and budgets to deploy them at scale for local law enforcement, prisons, ports and other critical sites remain limited. Federal tools and programs are not matched by a clear, governed model that allows trusted non-federal partners to detect, identify, and if necessary mitigate malicious systems without breaching privacy or airspace safety rules. That legal and operational gap is the exploit that criminal networks, insurgents and state proxies are already using.

Hard choices ahead. There is no single fix. Policymakers must accept three unpleasant truths and act accordingly:

  • Build a secure industrial base. If access to trusted platforms and components is a strategic necessity, then industrial policy is not optional. Investment, procurement preferences, and public-private partnerships are required to give government and critical infrastructure operators alternatives that are secure by design. Relying on wholesale market substitutions by ad hoc buyers will leave gaps and perverse incentives.

  • Harmonize export controls and interdiction. Export controls must be sharper, coordinated among allies, and coupled with interdiction and traceability measures for critical components. At the same time, governments must target enforcement at final users and reexport networks rather than simply squeezing legal civilian trade. Loose endpoints are what enable third-party reexports that feed conflict.

  • Close the operational-authority gap with guardrails. Give vetted state, local and private critical infrastructure operators time-limited, accountable authorities to deploy non-kinetic and kinetic counter-UAS tools where risks are demonstrable. Build standardized training, logging, and oversight. Without legal clarity and operational funding the tools will sit unused while incidents multiply.

Practical next steps for decision makers. Fund domestic, secure drone production lines tied to certification and supply-chain transparency. Stand up export-control cooperation among like-minded states to choke routes used by malign actors. Create a national accreditation program for counter-UAS vendors and interoperable detection networks for critical infrastructure. Finally, anchor any expansion of mitigation authorities with auditability, civil liberties protections, and sunset reviews. These are not bureaucratic niceties. They are the only way to scale defenses without creating new abuses.

Bottom line. The technology moved faster than the policy. Production can be scaled by market forces and wartime demand. Policy must match that velocity or we will continue to be reactive. That is not a theoretical risk. It is already a practical one. Stop waiting for another shock to justify action. Start aligning industrial strategy, export controls, and legal authorities now. The alternative is an expanding mirror of the battlefields overseas showing up at home in nights, ports, prisons and power plants.