Click here to close now.

Welcome!

Government Cloud Authors: Ruxit Blog, Elizabeth White, Kevin Jackson, Yeshim Deniz, Carmen Gonzalez

Related Topics: CloudExpo® Blog, Containers Expo Blog, Government Cloud

CloudExpo® Blog: Article

Julian Assange, Cloud Computing, and the Decline of Skill

Just Because You Can Do Something, Should You? Should He? Should We?

Julian Assange: was this the face that launched a thousand probes? Apparently so, as the Australian's threatened release of hundreds of thousands of documents (about 15,000 of them marked "secret") from within the United States government regarding the wars in Afghanistan and Iraq has made him some very powerful enemies and sparked a global debate on government transparency and journalistic responsibility.

As many others, including my colleague Jeremy Geelan, have reported, the Assange/WikiLeaks leaks raise very serious questions about governance and security within the US federal IT infrastructure. The US government simply must answer, and answer soon, if one low-level soldier really did have access to all this information; if so, why; and in any case, what will be done to tighten things up about two dozen notches.

Newly Found Power
This case also reveals the power of the Web, and the power of Cloud Computing. The WikiLeaks site can continue to be relocated almost anywhere in the world. This may be inconvenient to Mr. Assange, but who said taking on powerful governments was ever convenient?

Surely, even if WikiLeaks wears out its welcome in the Western world, there will be somebody, somewhere willing to host the site and deliver its information from the clouds to the desktops, notebooks, and smartphones of the world.

Also most assuredly, Mr. Assange's antics will encourage others to leak and reveal previously hidden communications on a scale unimagined a generation ago.

But should it? Are we really launching into a new era of heroic whistle-blowers, unprecedented revelation, and therefore, governmental transparency?

Start with the fact that the leaks have, so far, revealed nothing earthshaking. That diplomats obscure the truth in their public statements, that even close allies snoop on each other, and that perceived societal pressures cause country leaders to, uh, lie now and then are well-understood realities.

One little subtext also involves the rather indiscriminate use of secrecy classifications for many government documents. It reminds me of grade inflation or clothing sizes. Yesterday's 3.5 GPA is today 4.2, that women's size 4 is more like an 8, and you can fit into those 36-inch pants because they're really 38.5 inches around. Confidential often isn't really anymore, and numerous investigations have noted that the use of Top Secret is often inappropriate, sometimes comically so. The inconsistencies and labyrinthian nature of the US government's classification and compartmentalization programs are numerous and profound.

Computance and Skil
But to me, the big, overriding issue here is one of competence, or rather, a lack of such by Mr. Assange. His quest is admittedly driven by ideology, and he has brought the wrath of governments upon his shoulders in unskillful, inept fashion. Although his WikiLeaks releases have been compared to the Pentagon Papers and Watergate revelations, there are critical differences that beg to be outlined.

The first difference is that Neil Sheehan of the New York Times (with the Pentagon Papers), then a few years later, Bob Woodward and Carl Bernstein of the Washington Post (with Watergate) were journalists first and foremost. They were skilled in their craft, careful with their source material, and committed only to weaving together stories of substance based on what their training and skill told them was important.

In the Pentagon Papers case, the whistle-blower, Daniel Ellsburg, was privy to policies and documents that outlined a long-term, massive web of lies by the Lyndon Johnson administration regarding the Vietnam War. The Times coverage, and later coverage by the Washington Post, focused on specific aspects of the papers that revealed the government deception that led to untold deaths of American soldiers and Vietnamese soldiers and citizens.

The Times was also provided some cover by the reading of many of the documents into the public record by a United States senator who also felt there was a compelling story to be told. These revelations were a bit more serious than whether Angela Merkel is cautious (you don't say?) or Vlad Putin is bossy.

Watergate was an equally serious story, one in which an infamous "third-rate burglary" turned into a massive cover-up headed by President Richard Nixon and which eventually led to a near-constitutional crisis and finally, to Nixon's resignation.

Although both of these famous cases eventually led to the release of voluminous information for reporters and historians to pick through for the next few hundred years, in neither case was the source material itself the entire story.

A Filterless Environment
But with WikiLeaks, Mr. Assange placed himself in the simultaneous position of whistleblower and publisher. Although he has apparently sent the documents he's leaked so far to several leading news organizations, it seems he's holding onto the possibility of having no filter between what he has been given and what he will release. In that case, he would exercise no editorial judgment in the matter. This may be seen as the point of the whole exercise; after all, we're entering our second decade of the decline of mainstream media and the rise of citizen journalism.

To me, this is the huge flaw in Mr. Assange's approach. Citizen journalism is no better than the citizens who report it. It is just another function of Warhol's "15 minutes of fame" dictum, in which there are precious few arbiters of taste or talent in deciding who or what is of consequence. So, during the present era, we've migrated from Marilyn Monroe to Kim Kardashian, from Robert Culp and Bill Cosby to Snooki and The Situation, from Tammy Wynette to Miley Cyrus, and from Sheehan and Woodward and Bernstein to Julian Assange.

There are certainly any number of very strong, even marvelous writers out there, reporting with craft and passion on politics, business, music, film, sports, etc. And there are certainly any number of mainstream media companies pounding out dreck--from Yahoo's groundbreaking coverage of topics such as "pitfalls of watching shopping channels" to the San Francisco Chronicle's "reports" on high-end real estate, to the present-day Washington Post's obsession with "narrative" and "arc" rather than, you know, reporting.

All of this, the good and the less good, have been driven by the insatiable appetite of the Web for more information every second of every day. What Mr. Assange has done is a manifestation of this.

Let Me Ask You This...
But I would ask the civil libertarians in the crowd--the folks who are heaping unadorned praise on Mr. Assange and unvarnished scorn on the US government and its allies--has WikiLeaks really accomplished anything positive? Are governments going to be more likely or less likely to be transparent? Setting aside the strident rantings of the Joe Liebermans of the world, has there been damage done?

Would you enjoy it if every email you have sent out for the past five years was suddenly subject to public scrutiny? Even if you've committed no crime and are the world's most loyal and productive worker bee, have you ever passed along a dirty joke or a nice boob shot? Do you think you might be unfairly judged if you have and this information was suddenly in public circulation?

The leaker Daniel Ellsburg was prosecuted in the wake of the Pentagon Papers crisis. As is known to happen, the prosecutors overshot their mark, did some bungling, and he was not convicted of anything. The Nixon administration further rattled its saber at the media during the Pentagon Papers and the Watergate episodes. Nothing came of it. The First Amendment ruled, as it should today.

Again, these two cases revealed true government malfeasance, the kind that brings entire administrations down. The WikiLeaks case has done no such thing. If Mr. Assange were to have combed through the materials he received, found a great story that simply must be brought to light, then reported on it, he would be on much steadier ground today.

As things stand, Reporters Without Borders is among the organizations that are critical of his approach. Even if he has not yet endangered national security (and I think most people doubt he has), his approach does have the potential to endanger the lives of many people doing deadly work. To argue that all war-related information should be available to everyone is very naive. To be deadset against war is honorable, and to uncover its abuses honorable.

But it seems that Mr. Assange's actions are neither. Although his site says it is committed to keeping governments open, his actions will no doubt lead to further government attempts to control the Internet and Web, yet add no value to body politic. We should never underestimate the inherent potential of fascism within any society. There had already been a lot of hot-and-heavy talk of an "Internet kill switch" in the US (by the egregious Sen. Lieberman, among others). Skillful, useful reporting will not hand any victories to those in favor of such mad ideas; unskilled, random leakage of any and all things will.

More Stories By Roger Strukhoff

Roger Strukhoff (@IoT2040) is Executive Director of the Tau Institute for Global ICT Research, with offices in Illinois and Manila. He is Conference Chair of @CloudExpo & @ThingsExpo, and Editor of SYS-CON Media's CloudComputing BigData & IoT Journals. He holds a BA from Knox College & conducted MBA studies at CSU-East Bay.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, connected, and small. If your ambitions are big, so are ours. In his session at @ThingsExpo, Jack Hu, D...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
We’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems – call it what you want, but it’s happening, and its potential is huge. IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” thi...
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust IT industrialization – allowing customers to provide amazing user experiences with optimized IT per...
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal Systems Group, discussed how key attributes of mobile technology – touch input, sensors, social, and ...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.