This article is interesting about thoughts of using flying networks to support military operations.

It is a complex system - and my sense is that they will screw it up with application specific protocols and APIs that evolve and change over time as as military events (the kind that go boom or are intentional forms of in-band attacks - think everything from hyper-phishing to spoofing to zero-day attacks).

But even if it were put together with the precision of a Swiss watch, my old bugbear of keeping it running - noticing problems, diagnosing and isolating them, and deploying repairs - is likely to be under-considered, or not really considered at all.

For instance, consider what I wrote about how computer/network security harms our ability to keep things alive (2nd URL below)

https://www.twz.com/39882/how-the-rq-180-drone-will-emerge-from-the-shadows-as-the-centerpiece-of-a-warfighting-revolution

https://www.cavebear.com/cavebear-blog/netsecurity/

The RQ-180 Drone Will Emerge From The Shadows As The Centerpiece Of An Air Combat Revolution

The Air Force's secretive, very stealthy, and high-flying drone won't be just a better spy aircraft, it will be a deeply networked game-changer.

The War Zone
@karlauerbach I agree. KISS and my god Murphy rules.