Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: Enterprise IT: Moving CapEx to OpEx , Security Journal, Government Cloud Computing, Government News, Government Information Technology, Government Innovation Journal, CTOvision Journal, CIO/CTO Update

Blog Feed Post

Want a New Information Superiority Idea?

Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance from US intelligence

Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. 

We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), “Officers Warned of Drones Flaw in 04 (WSJ).”  As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). 

That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly.

If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned.  And it sends a horrible message to his enterprise.

It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”

Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke).

This short story, written in 1951, is such a great read because it captures some key, apparently enduring qualities of militaries that become seduced by their technological superiority.

The result: Even though the story was written almost six decades ago Clarke gave us all a lens to view technological arrogance through.  And he gave us warnings that apply across the full spectrum of technologies, not just UAVs.

From the book:

“The situation was now both serious and infuriating.  With stubborn conservatism and complete lack of imagination the enemy continued to advances with his old-fashioned and inefficient but now vastly more numerous ships.”

More on the story:

  • The setting is a SciFi future, where battles occur in space. But the human drama was actually based on Clarke’s observations of Allied victory in Europe in WWII.
  • In the story, A losing Admiral has a request of his captors.  He hopes to clear up the record on a few things, and especially wants to be sure he is not forces to share a cell with the CTO-type person who got them into the mess he is in (Professor Norden, Chief of the Research Staff) .
  • Failures were not due to lack of bravery or the fault of operational decisions.  Failure was due to the inferior science of the enemy.  Clarke reveals how in a way that is laughable but also causes anyone with military service pause (I believe most veterans have seen situations that the story will remind them of).

My big hope in sharing this is to get you to read this short story and think about it in a context of today’s military.  The lessons from this story are the same lessons which should be learned from Thucydides and Sun Tzu and countless others.   It is the same lesson driven home in modern combat and made popular in movies like “Black Hawk Down“  If you start relying too heavily on your technology and allow arrogance to set in, you open yourself up to defeat by a technologically inferior force.

Some of the worse problems arise when leaders start to think their technology is so superior it can have no flaws. When you start assuming you are superior to a thinking, creative adversary it is time to question assumptions before it is too late.

And, another point that should not be a shock to anyone in uniform or out:  The bad guys want to steal our secrets, and we should want to prevent them from doing so.  It is hard to accomplish this goal, but one think we should not be doing is making it easy for them to steal our data.

Related posts:

  1. Working with Adobe Flex: From idea to application in very short order
  2. Admiral Stavridis: Think, Read, Write and Publish, and Blog Too
  3. Information Discovery and Sharing 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com