They initially create a recognizable pattern on whatsoever topic—a window, say—another person may want to protect from likely surveillance. Then they remotely intercept a drone's radio signals to look for that pattern in the streaming movie the drone sends back again to its operator. Whenever they place it, they're able to identify the drone is