Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    payment methods
    How Data Analytics Is Transforming eCommerce Payments
    10 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Want a new information superiority idea? Read an old book
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Want a new information superiority idea? Read an old book
Uncategorized

Want a new information superiority idea? Read an old book

BobGourley
BobGourley
7 Min Read
SHARE

Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected …



Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).” 

More Read

Here to Stay
Data Quality Predictions for 2015
Why count on the brain for truth?
A note to people who subscribe to this site via e-mail
The Statistics of Everyday Talk

As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke). This short story, written in 1951, is such a great read because it captures some key, apparently enduring qualities of militaries that become seduced by their technological superiority. The result: Even though the story was written almost six decades ago Clarke gave us all a lens to view technological arrogance through. And he gave us warnings that apply across the full spectrum of technologies, not just UAVs.

From the book:

“The situation was now both serious and infuriating. With stubborn conservatism and complete lack of imagination the enemy continued to advances with his old-fashioned and inefficient but now vastly more numerous ships.”

More on the story:

  • The setting is a SciFi future, where battles occur in space. But the human drama was actually based on Clarke’s observations of Allied victory in Europe in WWII.
  • In the story, a losing Admiral has a request of his captors. He hopes to clear up the record on a few things, and especially wants to be sure he is not forces to share a cell with the CTO-type person who got them into the mess he is in (Professor Norden, Chief of the Research Staff) .
  • Failures were not due to lack of bravery or the fault of operational decisions. Failure was due to the inferior science of the enemy. Clarke reveals how in a way that is laughable but also causes anyone with military service pause (I believe most veterans have seen situations that the story will remind them of).

My big hope in sharing this is to get you to read this short story and think about it in a context of today’s military. The lessons from this story are the same lessons which should be learned from Thucydides and Sun Tzu and countless others. It is the same lesson driven home in modern combat and made popular in movies like “Black Hawk Down.” If you start relying too heavily on your technology and allow arrogance to set in, you open yourself up to defeat by a technologically inferior force.

Some of the worse problems arise when leaders start to think their technology is so superior it can have no flaws. When you start assuming you are superior to a thinking, creative adversary it is time to question assumptions before it is too late.

And, another point that should not be a shock to anyone in uniform or out:  The bad guys want to steal our secrets, and we should want to prevent them from doing so. It is hard to accomplish this goal, but one think we should not be doing is making it easy for them to steal our data.

Related posts:

  1. Working with Adobe Flex: From idea to application in very short order
  2. Admiral Stavridis: Think, Read, Write and Publish, and Blog Too
  3. Information Discovery and Sharing



Link to original post

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

payment methods
How Data Analytics Is Transforming eCommerce Payments
Analytics Big Data Exclusive
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Good-bye, Washington!

4 Min Read

Banks and the New Amazon Bank

7 Min Read

Poor Quality Data Sucks

9 Min Read

The Simple Minded Effects of Social Media

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?