Fair, they could track it. I guess I meant they could extract any pre-programmed flight paths that they have as contingency plans, or mission data that might give some useful information which would be stored into the drone, instead of stuff remotely streamed to it while it has an active encrypted connnection. You could also get some kind of encryption keys or other chips, etc that might help decode their communications. As any hacker and IT professional knows, if you have hands-on the machine, you have a lot more access to things than trying to connect remotely.
Fair, they could track it. I guess I meant they could extract any pre-programmed flight paths that they have as contingency plans, or mission data that might give some useful information which would be stored into the drone, instead of stuff remotely streamed to it while it has an active encrypted connnection. You could also get some kind of encryption keys or other chips, etc that might help decode their communications. As any hacker and IT professional knows, if you have hands-on the machine, you have a lot more access to things than trying to connect remotely.