Stephenson: Web 2.0 and security

Social-networking technologies offer benefits that support a homeland security agenda

Editor's note: This story was updated at 10 a.m. Sept. 4, 2007. Please go to Corrections & Clarifications to see what has changed.

Some analysts are worried that the hype-to-reality ratio with Web 2.0 means we’re approaching the bursting of another technology bubble.

I’m less worried about the hype. I believe that Web 2.0 applications can address homeland security and national security concerns because the applications are resilient and well-suited to collaboration.

Web 2.0, as tech author Tim O’Reilly defined it, is the network as a platform spanning all connected devices. Technically, Web 2.0 applications reside on the Web, not on an employee’s desktop PC, so they’re constantly updated. More important, employees can still access programs and files, even if their computers are inaccessible, as they might be during a national security emergency.

Data portability poses serious security risks. But with an increasingly mobile government workforce, we must solve those problems by encrypting thumb drives, for example. Security risks aren’t a justification for resisting advances in data portability.

More important, however, is the collaboration that Web 2.0 fosters. O’Reilly said Web 2.0 allows “consuming and remixing data from multiple sources, including individual users.”

Collaboration is invaluable to homeland security and national security officials because they need to connect the dots and quickly respond to fast-changing situations. Circumstances may not allow for lengthy review and approval procedures. Letting everyone view a document simultaneously can hasten approvals.

Web 2.0 applications promote a phenomenon first observed in social insects, such as ants. Variously termed crowdsourcing, swarm intelligence or emergent behavior, the concept describes how groups can collectively produce thoughts and actions surpassing those of any single person. Perhaps the most relevant example for us would be the inspired actions of passengers who became heroes on United Flight 93.

Wikis, blogs and other Web 2.0 applications let junior analysts, who might be afraid to speak up in a private meeting with a boss, express critical insights and quickly gain support. By making decision-making more transparent, Web 2.0 applications can minimize the harm from individuals in the chain-of-command who squelch important ideas from below.

Swarm intelligence describes how ideas emerge through group dynamics: You suggest an idea, I react and a third person suggests an important variation after considering both our ideas and filtering them through his or her unique combination of skills and life experience. Such collaboration often produces better ideas than a single person can offer.

The resiliency and collaborative nature of Web 2.0 applications convince me that, although Web 2.0 might threaten command-and-control organizations and force us to redouble our efforts to improve mobile data security, those applications offer advantages for homeland and national security purposes that far outweigh the risks.

Stephenson of Stephenson Strategies in Medfield, Mass., is a homeland security, disaster management, and e-government theorist and strategist. Read his blog at
stephensonstrategies.com.

Featured

  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.