Panel raises questions about government data sharing

A group of experts in technology policy and civil liberties pondered the problem of government information sharing Tuesday and raised more questions than they answered. The panelists included Jim Dempsey, executive director of the Center for Democracy and Technology, Tim Edgar of the American Civil Liberties Union, and Kim Taipale of the Center for Advanced Studies in Science and Technology Policy. Dan Gallington of the Potomac Institute for Policy Studies moderated the panel discussion which was hosted by the Potomac Institute. Aside from the current congressional debate about naming a national intelligence director and giving that person budgetary authority, one of the big elements of efforts to overhaul the intelligence system involves how information on terrorism-related activity can be collected, stored, accessed and shared across all levels of government. In August, President Bush issued an executive order that aimed to improve the information-sharing practices of the intelligence and homeland security communities. The order directs the attorney general, Homeland Security secretary and director of central intelligence to recommend "executive-branch-wide collection and sharing requirements, procedures, and guidelines for terrorism information" from both publicly available sources and non-governmental databases. At the forum, Dempsey said the recommendations should focus on particular suspicions that the government may have about individuals. For example, he suggested that law enforcement agencies and investigators should only have access to the identities of people in government databases if their investigations if they have probable cause to suspect those people of crimes. Gallington said he rejected the idea that the executive order focuses on narrow solutions. Rather, he said he hopes the recommendations will involve some creative thinking and solutions to the issue of government-wide information sharing. The ACLU's Edgar agreed with Dempsey on the need for the government to base its investigations and use of shared data on particular suspicions. He cited former FBI Director J. Edgar Hoover's wiretapping of Martin Luther King in the past as an example of how the process of unchecked surveillance can be abused. Edgar also posed various questions about current efforts to change information-sharing practices, including questions about the scope of the information collected and the limits of sharing it over government-wide networks. He also questioned how individuals would be able to correct mistakes and how much access private data companies would have to government-collected data. "To me, that's one of the biggest potential areas of greatest abuse," he said.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.