"Folks are not going to stop at merely listening and watching," he said. "They'll also start to conduct battles or persuasion, and disrupt or change the content or persuade the system to do its bidding."
If this group of insurgents was able to exploit an old security hole with cheap software, what about adversaries with access to a bigger bank account?
"This was a relatively old security opening that wasn't fixed because we assumed it couldn't be exploited by insurgents or groups in the Middle East," he said. "They did, using $30 software downloadable off the Internet. What are your assumptions then about sophisticated, large-scale efforts funded by certain state powers on Eurasian landmass 'that shalt not be named'?"
As the military continues to increase the number of drones in operation -- from a handful in 2003 to several thousand now (and more on the way) -- it needs to realize the new security threats that go hand in hand with this new realm of battle.
"What we're going through is the equivalent of a technologic revolution," he said. "The story doesn't end there. It's rather the start of a new chapter."