Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Want a new information superiority idea? Read an old book
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Want a new information superiority idea? Read an old book
Uncategorized

Want a new information superiority idea? Read an old book

BobGourley
BobGourley
7 Min Read
SHARE

Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected …



Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

More Read

Trillium Software News Items
Change.gov
Big Data Ingestion… or Indigestion?
Left Behind
World’s Smallest LED Is a Single Molecule

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke). This short story, written in 1951, is such a great read because it captures some key, apparently enduring qualities of militaries that become seduced by their technological superiority. The result: Even though the story was written almost six decades ago Clarke gave us all a lens to view technological arrogance through. And he gave us warnings that apply across the full spectrum of technologies, not just UAVs.

From the book:

“The situation was now both serious and infuriating. With stubborn conservatism and complete lack of imagination the enemy continued to advances with his old-fashioned and inefficient but now vastly more numerous ships.”

More on the story:

  • The setting is a SciFi future, where battles occur in space. But the human drama was actually based on Clarke’s observations of Allied victory in Europe in WWII.
  • In the story, a losing Admiral has a request of his captors. He hopes to clear up the record on a few things, and especially wants to be sure he is not forces to share a cell with the CTO-type person who got them into the mess he is in (Professor Norden, Chief of the Research Staff) .
  • Failures were not due to lack of bravery or the fault of operational decisions. Failure was due to the inferior science of the enemy. Clarke reveals how in a way that is laughable but also causes anyone with military service pause (I believe most veterans have seen situations that the story will remind them of).

My big hope in sharing this is to get you to read this short story and think about it in a context of today’s military. The lessons from this story are the same lessons which should be learned from Thucydides and Sun Tzu and countless others. It is the same lesson driven home in modern combat and made popular in movies like “Black Hawk Down.” If you start relying too heavily on your technology and allow arrogance to set in, you open yourself up to defeat by a technologically inferior force.

Some of the worse problems arise when leaders start to think their technology is so superior it can have no flaws. When you start assuming you are superior to a thinking, creative adversary it is time to question assumptions before it is too late.

And, another point that should not be a shock to anyone in uniform or out:  The bad guys want to steal our secrets, and we should want to prevent them from doing so. It is hard to accomplish this goal, but one think we should not be doing is making it easy for them to steal our data.

Related posts:

  1. Working with Adobe Flex: From idea to application in very short order
  2. Admiral Stavridis: Think, Read, Write and Publish, and Blog Too
  3. Information Discovery and Sharing



Link to original post

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

4 Types of Data That Will Boost Your Marketing ROI

7 Min Read

The Importance of a Social Media Support System

5 Min Read

Microsoft OneDrive Nixes Unlimited Storage Offerings

3 Min Read

CES Showcases Content Anywhere. Here’s a Real-World Reality Check.

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?