Why would they need to extract waypoints and return to home if there is "so much radar coverage" and theae things are "so easily tracked"? How exactly would they do that?
Fair, they could track it. I guess I meant they could extract any pre-programmed flight paths that they have as contingency plans, or mission data that might give some useful information which would be stored into the drone, instead of stuff remotely streamed to it while it has an active encrypted connnection. You could also get some kind of encryption keys or other chips, etc that might help decode their communications. As any hacker and IT professional knows, if you have hands-on the machine, you have a lot more access to things than trying to connect remotely.
Why would they need to extract waypoints and return to home if there is "so much radar coverage" and theae things are "so easily tracked"? How exactly would they do that?
Fair, they could track it. I guess I meant they could extract any pre-programmed flight paths that they have as contingency plans, or mission data that might give some useful information which would be stored into the drone, instead of stuff remotely streamed to it while it has an active encrypted connnection. You could also get some kind of encryption keys or other chips, etc that might help decode their communications. As any hacker and IT professional knows, if you have hands-on the machine, you have a lot more access to things than trying to connect remotely.