Protocol Analytics and Drone Threats

Kind of a garbage article, but the central idea is at least interesting. Drone flocks will “swarm” according to some protocol, which will be intentionally illegible. Making that protocol explicit makes it easier to hack.

What are some methods that could be used to reveal the protocols driving a swarm’s behavior?

Something related to that question would make for a great short research essay. Lots of potential applications – defense, music festival crowd safety, biology