We argue that the one potential solution is creating a drone or quadcopter that could be used to detect the network hacking attempts and even have the capability to disconnect illegal drones from their user's jamming signals, or de-authenticate them from networks. This could be used as a direct countermeasure, or would at least provide monitoring capacities, for these criminally-purposed drones. In this paper, we focus on implementing the device that can detect intrusion.