This article is interesting about thoughts of using flying networks to support military operations.
It is a complex system - and my sense is that they will screw it up with application specific protocols and APIs that evolve and change over time as as military events (the kind that go boom or are intentional forms of in-band attacks - think everything from hyper-phishing to spoofing to zero-day attacks).
But even if it were put together with the precision of a Swiss watch, my old bugbear of keeping it running - noticing problems, diagnosing and isolating them, and deploying repairs - is likely to be under-considered, or not really considered at all.
For instance, consider what I wrote about how computer/network security harms our ability to keep things alive (2nd URL below)

