What if hackers were able interrupt military airplanes or tanks? Such platforms present their own challenges for data gathering and protection.