They initial create a recognizable pattern on whichever subject matter—a window, say—a person may want to guard from opportunity surveillance. Then they remotely intercept a drone's radio alerts to search for that pattern in the streaming video clip the drone sends back to its operator. If they place it, they might ascertain the drone is consid… Read More