The long shadow of WikiLeaks

Talk about a wake-up call. If federal officials needed a reminder about the downside of the Internet’s so-called democratization of information, WikiLeaks has provided it, big time.

The whistle-blowing website has also raised numerous questions that the federal government is just beginning to answer.

In the first days after WikiLeaks released thousands of sensitive and secret State Department documents late last year, much of the talk focused on the diplomatic, political and legal implications. What damage might have been done to foreign relations? Has U.S. national security been compromised? And how should Julian Assange and his inside source be prosecuted?

But now the federal government is confronting what many observers say are the more pressing questions: After all the recent advances in information and data security, how did this happen? How confident can agencies be about preventing such incidents in the future? And what are the ramifications for information sharing and government transparency?

Those questions are bigger than WikiLeaks, and the answers could reshape how government operates for years to come. With that in mind, Federal Computer Week contributing editor Brian Robinson asked four experts in relevant fields to discuss the fallout from WikiLeaks' document release and how to mitigate the potential for such incidents in the future.

Here is the lineup of experts.

  • Ambassador David Smith, a senior fellow at the Potomac Institute for Policy Studies in Arlington, Va., and the U.S. member of the International Security Advisory Board.
  • Shon Harris, a security consultant, founder of Logical Security and a former engineer at the Air Force’s Information Warfare unit.
  • Anthony Williams, co-author of the best-selling "Wikinomics" and its recent follow-up, "Macrowikinomics," and a visiting fellow at the Munk School of Global Affairs at the University of Toronto.
  • George Smith, a senior fellow at GlobalSecurity.org and a writer and commentator on the science and technology of national security.
Let us know what you think by posting comments.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group