private event security for Dummies
They initially crank out a recognizable pattern on what ever subject—a window, say—someone could possibly want to guard from potential surveillance. Then they remotely intercept a drone's radio alerts to look for that sample while in the streaming video the drone sends back to its operator. Should they place it, they're able to identify the dro