The long shadow of WikiLeaks

Talk about a wake-up call. If federal officials needed a reminder about the downside of the Internet’s so-called democratization of information, WikiLeaks has provided it, big time.

The whistle-blowing website has also raised numerous questions that the federal government is just beginning to answer.

In the first days after WikiLeaks released thousands of sensitive and secret State Department documents late last year, much of the talk focused on the diplomatic, political and legal implications. What damage might have been done to foreign relations? Has U.S. national security been compromised? And how should Julian Assange and his inside source be prosecuted?

But now the federal government is confronting what many observers say are the more pressing questions: After all the recent advances in information and data security, how did this happen? How confident can agencies be about preventing such incidents in the future? And what are the ramifications for information sharing and government transparency?

Those questions are bigger than WikiLeaks, and the answers could reshape how government operates for years to come. With that in mind, Federal Computer Week contributing editor Brian Robinson asked four experts in relevant fields to discuss the fallout from WikiLeaks' document release and how to mitigate the potential for such incidents in the future.

Here is the lineup of experts.

  • Ambassador David Smith, a senior fellow at the Potomac Institute for Policy Studies in Arlington, Va., and the U.S. member of the International Security Advisory Board.
  • Shon Harris, a security consultant, founder of Logical Security and a former engineer at the Air Force’s Information Warfare unit.
  • Anthony Williams, co-author of the best-selling "Wikinomics" and its recent follow-up, "Macrowikinomics," and a visiting fellow at the Munk School of Global Affairs at the University of Toronto.
  • George Smith, a senior fellow at GlobalSecurity.org and a writer and commentator on the science and technology of national security.
Let us know what you think by posting comments.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group