So to get this straight...
The intruder used one of the drone nodes, navigated our network structure, got past my firewall, took my encryption keys, and used it to hack our network?
I'm thinking on how mouse will respond to this beyond what is posted. How long will it take to correct and what has to be done? I'm assume that was what the security roll was for.