The Definitive Guide to protective surveillance
They 1st deliver a recognizable pattern on whatever issue—a window, say—another person might want to protect from potential surveillance. Then they remotely intercept a drone's radio alerts to look for that pattern in the streaming online video the drone sends back again to its operator. If they spot it, they are able to establish that the dron