Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).”
As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”
Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected …
Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Secure Are US Spy Planes?(ABC)”, “Insurgents Hack Into US Spy Drone Videos“(AP), and “Officers Warned of Drones Flaw in 04 (WSJ).”
As worrisome as those articles are, perhaps the more scary one was titled “Adm. Mullen says hacked drones caused no damage” (AP). That article indicates he cares about cybersecurity, but he seems to be taking this all rather nonchalantly. If he is leaping to the conclusion that everything is ok without a real assessment then that is cause for us all to be concerned. And it sends a horrible message to his enterprise. It is like saying “well, try not to screw up, but don’t worry, there is no way our technologically superior force can be defeated, and I don’t understand how this stuff works so the bad guys certainly can’t.”
Reminds me, sadly, of an incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke
From the book:
“The situation was now both serious and infuriating. With stubborn conservatism and complete lack of imagination the enemy continued to advances with his old-fashioned and inefficient but now vastly more numerous ships.”
More on the story:
- The setting is a SciFi future, where battles occur in space. But the human drama was actually based on Clarke’s observations of Allied victory in Europe in WWII.
- In the story, a losing Admiral has a request of his captors. He hopes to clear up the record on a few things, and especially wants to be sure he is not forces to share a cell with the CTO-type person who got them into the mess he is in (Professor Norden, Chief of the Research Staff) .
- Failures were not due to lack of bravery or the fault of operational decisions. Failure was due to the inferior science of the enemy. Clarke reveals how in a way that is laughable but also causes anyone with military service pause (I believe most veterans have seen situations that the story will remind them of).
My big hope in sharing this is to get you to read this short story and think about it in a context of today’s military. The lessons from this story are the same lessons which should be learned from Thucydides and Sun Tzu and countless others. It is the same lesson driven home in modern combat and made popular in movies like “Black Hawk Down
Some of the worse problems arise when leaders start to think their technology is so superior it can have no flaws. When you start assuming you are superior to a thinking, creative adversary it is time to question assumptions before it is too late.
And, another point that should not be a shock to anyone in uniform or out: The bad guys want to steal our secrets, and we should want to prevent them from doing so. It is hard to accomplish this goal, but one think we should not be doing is making it easy for them to steal our data.
Related posts: