Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
    data analytics for trademark registration
    Optimizing Trademark Registration with Data Analytics
    6 Min Read
    data analytics for finding zip codes
    Unlocking Zip Code Insights with Data Analytics
    6 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Want a new information superiority idea? Read an old book
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Want a new information superiority idea? Read an old book
Uncategorized

Want a new information superiority idea? Read an old book

BobGourley
BobGourley
7 Min Read
SHARE

Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected …



Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

More Read

Are Links A Distraction?
A Recap of the 2009 DoDIIS Worldwide Conference
What’s strategic for Google?
What Data Governance leaders have in common around the world
5 of the Most Common IT Security Mistakes to Watch Out For

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke). This short story, written in 1951, is such a great read because it captures some key, apparently enduring qualities of militaries that become seduced by their technological superiority. The result: Even though the story was written almost six decades ago Clarke gave us all a lens to view technological arrogance through. And he gave us warnings that apply across the full spectrum of technologies, not just UAVs.

From the book:

“The situation was now both serious and infuriating. With stubborn conservatism and complete lack of imagination the enemy continued to advances with his old-fashioned and inefficient but now vastly more numerous ships.”

More on the story:

  • The setting is a SciFi future, where battles occur in space. But the human drama was actually based on Clarke’s observations of Allied victory in Europe in WWII.
  • In the story, a losing Admiral has a request of his captors. He hopes to clear up the record on a few things, and especially wants to be sure he is not forces to share a cell with the CTO-type person who got them into the mess he is in (Professor Norden, Chief of the Research Staff) .
  • Failures were not due to lack of bravery or the fault of operational decisions. Failure was due to the inferior science of the enemy. Clarke reveals how in a way that is laughable but also causes anyone with military service pause (I believe most veterans have seen situations that the story will remind them of).

My big hope in sharing this is to get you to read this short story and think about it in a context of today’s military. The lessons from this story are the same lessons which should be learned from Thucydides and Sun Tzu and countless others. It is the same lesson driven home in modern combat and made popular in movies like “Black Hawk Down.” If you start relying too heavily on your technology and allow arrogance to set in, you open yourself up to defeat by a technologically inferior force.

Some of the worse problems arise when leaders start to think their technology is so superior it can have no flaws. When you start assuming you are superior to a thinking, creative adversary it is time to question assumptions before it is too late.

And, another point that should not be a shock to anyone in uniform or out:  The bad guys want to steal our secrets, and we should want to prevent them from doing so. It is hard to accomplish this goal, but one think we should not be doing is making it easy for them to steal our data.

Related posts:

  1. Working with Adobe Flex: From idea to application in very short order
  2. Admiral Stavridis: Think, Read, Write and Publish, and Blog Too
  3. Information Discovery and Sharing



Link to original post

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

langgraph and genai
LangGraph Orchestrator Agents: Streamlining AI Workflow Automation
Artificial Intelligence Exclusive
ai fitness app
Will AI Replace Personal Trainers? A Data-Driven Look at the Future of Fitness Careers
Artificial Intelligence Big Data Exclusive
crypto marketing
How a Crypto Marketing Agency Can Use AI to Create Powerful Native Advertising Strategies
Blockchain Exclusive Marketing
data driven insights
How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

NIEMNTE – Vivek Kundra, US CIO on Data Sharing and Quality Issues

4 Min Read

Can Cloud IP Address Be Damaged Goods?

3 Min Read
Image
Uncategorized

The 6 Things Everyone Needs to Know About the Big Data Economy

10 Min Read

The Missing Pieces of Master Data Management Services

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?