Trickle Down Technology

There are lots of technologies that we have in our daily lives that originated from a military application.  GPS, for instance, was developed by the military and then approved for use by civilians.  And that’s great – I use GPS all the time, and am thankful to have it.

Another example of this technology trickle-down is cellular phones – something that I’m sure most of us wouldn’t want to live without.  The HMMWV, on the other hand (Hummer for civilians) I could easily give up.  There was even a short-lived show on the History Channel about this stuff, “Tactical to Practical.”

Now, we’re seeing another technology trickle down from the military to civilians – but in an interesting way.  With props to BoingBoing, the Houston Police Department unveiled, though apparently unwillingly, a new Unmanned Aerial Vehicle – also known as a drone.  Check out a great piece of reporting on the incident in the following video:

This same drone made a great splash when it debuted with the United States Marine Corps in Fallujah, Iraq:

The UAV is small and tough to see, said Marine officials. The contractors put the mufflers pointing up so that the enemy couldn’t track the aircraft by sound. The Marines operate the aircraft at a very low altitude.

The cameras — either for day or night — have enough definition to identify individuals and show if they are carrying weapons.

Houston Police representatives said that they are not “ruling anything out” about the potential applications for the drone.

While this video may be making its rounds now – it is actually from a report done in 2007.  I haven’t been able to find any information to follow up on the report, and can’t confirm whether or not the Houston Police Department is actively using these drones or not.

Like this week’s earlier post about the threat of cyber espionage, items like this make it easier to simply adjust your actions on the assumption that you are always being watched.  This pains me, to be sure, but I suspect that it is much closer to the reality than not.

As we continue to see the expanded use of military technologies in civilian settings, and as our global military engagements continue, America will be faced with some very tough issues about what is acceptable domestically and what is not.

My only hope is that these issues are discussed openly, in public, and with full disclosure about their applications and intended uses.  There’s nothing wrong with employing technology to fight crime and serve the public good, but let’s remember Kyllo v. US,

Where, as here, the Government uses a device that is not in general public use, to explore details of a private home that would previously have been unknowable without physical intrusion, the surveillance is a Fourth Amendment“search,” and is presumptively unreasonable without a warrant.

For the record, infrared cameras are readily available for the ScanEagle mentioned in the video.


Spies Inside Your Computer

Some interesting articles lately about the threat of cyber espionage coming through the supply chain.

Essentially, this amounts to the threat that Chinese-made computer equipment could have holes (or Trojans, or backdoors, or malware, or whatever) that would either allow a malicious (assumedly Chinese) user to access the compromised computer or that would automatically exfiltrate data back to a location the malicious user can access.

Problems like this strike at the heart of the issue of all national security (or corporate security, for that matter) issues: trust.  How do you know that the computer you just bought won’t send all your data to China?  You have to trust the manufacturer when they say it won’t.  Can you trust them?  Maybe.  Maybe not.  After all, another Chinese spy was just convicted this week – these things are happening.  Combine that with the fact that some of the most popular machines on the market today are all made in China, and you can see how this could happen.

For the record, the Mac mini, Macbook Air, Macbook, iMac and Macbook Pro are all manufactured in China, as are the latest netbooks from Dell.

Lest we jump to conclusions, or grow overly paranoid, let’s think rationally about ways to prevent our data from heading overseas.  One industry writer suggests that the best way to avoid this is to

stop buying Chinese computer products today. Until this issue of Chinese cyber-espionage has been cleared up and cleaned up, I simply couldn’t justify buying or using hardware that might be working against me. If you consider it for a minute, I think you’ll agree.

This is a great theory, but extremely difficult to do in practice.  Can you buy an entirely American made computer?  Sort of: ZTSystems assembles and services their computers in the United States.  Their systems are fast, and would be great machines, no doubt.  But the parts?  They’re all from China or Taiwan.  The graphics card? Made in Canada, with parts sourced from China.  The network card?  Made in Taiwan.  The other parts are not listed as being any particular brand, indicating that they, too, are made in China.

Other devices, like USB Picture Frames, have already been verified as containing Chinese malware.  What makes anyone think that other devices wouldn’t also do this?  It’s low hanging fruit, difficult to spot, and easy to maintain plausible deniability.

I’ve heard from several professionals that this is a very real concern for US businesses and government entities, with no apparent solution on the horizon.

Where does that leave us?  With the need to be careful and conscious about the data we put on our computers.  It’s often easier to assume that anything you put on a computer is compromised and operate from that standpoint.  You’ll find yourself being more careful, something that never hurts in today’s day and age.  There are some tools that can help you along the way, but ultimately a solution to this problem will have to come in the form of data-centric, or even built-in, security.  We must move towards a model where our data is intrinsically protected, as it is created, regardless of location – this would eliminate the worry when it becomes compromised in ways like this.  We’re not there yet, but I suspect there are those who are working on it.

In the meantime, give some thought to what your data means to you and what you might do if it were lost, breached, or compromised.  It’s an enlightening experiment.

Crowdsourcing National Defense

Several very interesting articles have come out lately discussing various attempts to crowdsource national defense functions, both in the United States and in the United Kingdom.  While crowdsourcing is a very interesting and powerful technique, applications like this run an enormous risk and must proceed with extreme caution.

What is crowdsourcing?  Crowdsourcing, a combination of “crowd” and “outsourcing,” is the method by which an organization tries to harness the collective knowledge of many individuals.  This is usually done through some sort of online facilitation (in order to increase the reach and size of the “crowd”), and has been referred to as a number of things, including community-based design, distributed participatory design, and human-based computation.

Essentially, the idea is that the more eyes and brains you have looking at something or working on something, the faster and better it will be done.  Lots of people like this idea, including Netflix, Wikipedia, and the Democratic National Committee.

Two recent converts to the crowdsourcing movement are DARPA and the UK’s Home Office.  Both of these new projects have the possibility to go disastrously wrong, and quickly. Here’s the rundown:


According to WIRED, DARPA’s new budget includes a

$13 million dollar project, called “Deep ISR Processing by Crowds,” looks “to harness the unique cognitive and creative abilities of large numbers of people to enhance dramatically the knowledge derived from ISR systems.”

As we have already seen, information sharing is already a  real challenge for the Department of Defense.  Intuitively, does it make sense to further distribute the information collection and analysis process?  The National Security Agency is already building a separate facility simply to store the data that they collect but cannot process.  Do DARPA and the NSA believe that an infrastructure is in place to distribute, analyze, and collect sensitive information and hope to achieve actionable results?  Doubtful.

Furthermore, the hardest part about intelligence work is providing the appropriate context to any particular piece of information.  By further distributing this data, we make the challenge of building appropriate contexts exponentially more difficult, thereby increasing the time and cost to turn data into information, and information into meaningful action.

Home Office

In a pilot program that makes DARPA’s look like child’s play, the Home Office announced a new website that will allow individuals to anonymously report online activities that “spread hate and violent extremism.”

According to officials,

The reports are anonymous and are then reviewed by police officers who are part of the new Counter Terrorism Internet Referral Unit, run by the Association of Chief Police Officers (ACPO). A Home Office spokeswoman said that unit would be responsible for determining the intent of the content posted, which would determine whether it is in fact illegal.

In a country where you can be prosecuted for “owning information useful to terrorism,” this seems like Big Brother’s dream.  Now people will be able to report their neighborhood terrorists, or neighbors, without ever having to leave their home.  Conveniently, the form provides a button at the end of the form to immediately start a new form.  Perhaps the next version will include the ability to submit a batch of terrorists at once, thus saving everyone time.

Have someone to report?  Here’s the Home Office site.  If you need help determining who may or may not be a terrorist – the National Counterterrorism Center has an absolutely fantastic 2010 Counterterrorism Calendar (seriously), featuring terrorist groups, methods and tactics, and terrorist profiles.

No word on whether the 2010 calendar features any beach or bikini shots.


If we are going to be serious about fighting terrorism or increasing our national security, then we need to move beyond cliche and dangerous proposals like this, or the National Threat Advisory, and put serious effort into a societal-level change in how we conduct our lives, balance liberty and security, and envision our collective future.

Failing that, we’ll all soon be reporting each other with one screen and processing that same information on another.  How long until you see yourself in the information you’ve been crowdsourced?  What will you do then?

Space, the Private Frontier

The New Astronauts

Take a close look at the above picture – because these are America’s new astronauts.  Sort of.  At least one of them is technically a former astronaut, but now they all work for private firms who are developing their own spacecraft and other intergalactic capabilities.

How can they afford to develop these capabilities when the return on investment is so low, and the risk so high?  Tax dollars, of course.  It was announced yesterday that

NASA has awarded $50 million through funded agreements to further the commercial sector’s capability to support transport of crew to and from low Earth orbit.

Rather than rekindling the national support for the space program, or even working on some sort of collaborative arrangement between NASA and the private entities (much like happens with other methods of transportation – see railroads, for an example), NASA has decided that it will just outsource this process entirely, and then when the occasion arises that they need to send people to the International Space Station, they’ll just buy them a seat like everyone else.

NASA Administrator Charles Bolden characterized these moves in the following way:

We’re departing from the model of the past, in which the government funded all human space activities. This represents the entrance of the entrepreneurial mindset into a field that is poised for rapid growth and new jobs. And NASA will be driving competition, opening new markets and access to space, and catalyzing the potential of American industry. This is a good investment for America.

A good investment?  Perhaps – but only at the $50 million price tag that was announced at this particular event.  A little more investigation reveals that the actual “investment” is going to be much larger than $50 million. is reporting that Obama’s new 2011 budget includes

a $6 billion boost over five years to support commercial spaceflight development, but scrapped NASA’s Constellation program to build new Orion spacecraft and Ares rockets aimed at returning astronauts to the moon.

For the math impaired (myself included) that is 120 times as much money as the “investment” that NASA announced today.  NASA also failed to announce that this meant the scrapping of both the Constellation program and the Orion and Ares programs.

Essentially, this budget is saying that the powers that be do not feel that we can build a successful low-earth-orbiting craft and return to the moon for less than $6 billion.  Does that make sense?  On it’s face – no.  Not at all.  In context, it makes fantastic sense.

The Apollo mission cost $150 billion to $175 billion in 2003 dollars – more in 2010 dollars.  Now the privatization looks like a bargain, provided they can deliver what NASA seems to be promising.

The danger here, of course, is that NASA wasn’t motivated by profit in 1968 and they’re not motivated by profit in 2010.  Each of these new partners, however, is motivated by nothing but profit, always has been, and always will be.  Profit can be a great motivator, and there is much value in allowing the free market to determine progress, costs, and supply.  There are some things, however, that we, as a society, have decided should not be subjected to the whims of the free market.  These things include military and law enforcement forces, and the entirety of the judicial system.  Other things that were formerly sacrosanct have been recently unleashed to the aforementioned market forces – I’m looking at you, Supreme Court of the United States.

Coming on the heels of such a landmark ruling, perhaps citizens should prepare for a continued onslaught of market-based life.  Institutions that used to be the bedrock of American society – space dominance, corporate/political separation, and even military supremacy – have been privatized, outsourced, and sold.  Meanwhile, more money that people can seem to count is flying out the door to banks and insurance companies who turn around and give it out as bonuses:

America runs the risk of very literally selling the ground out from under itself.  We must change our direction – drastically, and soon.  Otherwise, we will quickly find ourselves in the Privatized States of America, which is a place that I do not want to be.

Who Needs a Convention When You’ve Got YouTube?

NPR has a story from today’s Morning Edition chronicling the rise of Liberty Belle, a blogger otherwise known as Keli Carender.

A member of the Tea Party movement, this story serves as a very interesting exploration of the new media in our national dialogue.  According to the story, Keli became so popular from her blogging and viral videos, that she has been invited to become a spokesperson for this new movement:

Republican party leaders would very much like to harness the Tea Party energy. Just last week, former Congressman Dick Armey’s organization “Freedom Works” invited Carender and dozens of other Tea Party organizers to Washington for training and networking sessions.

Keli is also scheduled to speak at the National Tea Party Convention on Thursday – but hasn’t decided if she’s going to go.  She would share speaking duties with Sarah Palin, amongst others.

What makes Keli’s situation so interesting is the fact that her largest claim to fame is her ability to share her ideas through new media outlets, particularly blogs and YouTube.  According to the NPR article, Keli’s most popular video features her speaking to Rep. Norm Dicks, culminating in her offering Rep. Dicks a $20 bill as “down payment for the health care plan”:

While new media is an incredibly powerful tool, and I am clearly in favor of exercising its potential, the thing that makes it so unique is the ability for it to cut both ways.  From the traditional perspective, individuals aren’t able to “talk back” to traditional media outlets.  Now, however, one YouTube video can beget another, and another, and another.

To juxtapose Ms. Carender’s video, take a look at two filmmakers who made the trip to the 9/12 “DC Tea Party” and spoke with attendees about their feelings on the various issues:

This video provides some insight into why the organizers of the National Tea Party Convention are facing considerable difficulty.

Tea Partiers don’t want to be harnessed. They’ve shown a willingness to reject Republican candidates they don’t like. On the other hand, they’re not about to start their own national political party, as evidenced by the backlash within the Tea Party against the Nashville convention. It’s a movement without a central organization.

Like new media, this lack of central organization also cuts both ways.  While Ms. Carender may have a clear grasp of those issues on which she feels strongly, other YouTube videos would suggest that many people who call themselves Tea Partiers do not share Ms. Carender’s mastery.

And that’s okay – because in the world of new media, you don’t have to know what you’re talking about, you just have to be able to talk.

Cyber SOTU Redux

Wednesday has come and gone, and we have now all had a chance to hear President Obama’s remarks in the 2010 State of the Union Address.  Before the address, I was hopeful that we might hear something – anything – relating to the situation we face in the cyber realm.  With all of the pressing political issues, we heard lots about jobs, lots about healthcare, and lots about the need for reform and new directions.  We heard a lot, in general – this was Obama’s longest address to date.

One thing we didn’t hear about was cyber.

Sure – there were mentions of National Security, including the fact that the National Security budget wouldn’t be frozen as part of President Obama’s debt-reduction plan, but nothing having to do with our online capabilities, critical infrastructure needs, or cyber defense of any shape or sort.  The closest comment to this issue was Obama’s discussion of the fact that there

are simply philosophical differences that will always cause us to part ways. These disagreements, about the role of government in our lives, about our national priorities and our national security, they’ve been taking place for over 200 years.  They’re the very essence of our democracy.

Unfortunately, comments like this do not make me hopeful that the cyber issue will be addressed appropriately (both in time and in scope).  If we have difficulties wrangling solutions concerning things that nearly every American is familiar with (jobs and healthcare), it is hard to be hopeful for quality policy regarding issues that very few truly understand.

As I mentioned before, Cyber Coordinator Howard Schmidt has been given the challenge of leading this charge.  Today, a piece appeared in NextGov, a site about technology and government.  The article seems to be a fluff piece aimed at quelling the issue that some have about Schmidt’s lack of authority and inability to control a budget in order to engender change.  Does it quell these fears?  Hardly.

The piece, “New cybersecurity coordinator says he has Obama’s ear,” comes out of the National Journal‘s CongressDaily.  The bulk of the short article is spent attempting to give the impression that Schmidt has enough authority to achieve meaningful change:

Schmidt said he doesn’t believe he has to have control over a budget to make change.  “If the president, the national security adviser, the national economic adviser says, ‘Hey, we need these things,’ things will happen,” he said.

I would read this as Schmidt needs to convince the President, the National Security Adviser, and the National Economic Adviser that something is needed before he can move forward on a large scale project.  For the smaller stuff, Schmidt says that he will be working with

Vivek Kundra, the federal chief information officer who works in OMB and will have input into budgetary decisions.

Unfortunately, this budgetary-based approach to security will render only those solutions which are least expensive, not those that are most effective.  Especially without a budget of his own to control, Schmidt faces the monumental task of convincing others that the projects are worth funding with their own money – money that now cannot be spent on projects of their own.

While cybersecurity is certainly an issue that affects us all, when the basis for decisions is dollars, you’re going to get whatever is cheapest.  And that’s generally not good in any arena, much less with technology.

One positive element of the article and Schmidt’s comments is his idea that we must

stop looking to end-users to be the “policemen of the desktops.”

I couldn’t agree more.  We currently force those with the least security knowledge to navigate the bulk of the security problems.  This is an untenable situation, and likely one of the main reasons that we are so vulnerable to cyber attacks.  While Schmidt and I agree on what must be done, it seems that we differ substantially on how.  Schmidt will look to the private sector

to ensure security is a key part of products and that vulnerabilities are fixed.

I would offer that this market-driven solution will yield results approximately as effective as Schmidt’s OMB/National Security Council/National Economic Council budget meetings do – not very.

Instead, we need to invest in some very serious policy changes in which security responsibilities are directly addressed.  We must determine, as a democracy and as a society, how we wish to divvy up cyber control between industry, military, intelligence, and the general public.  Schmidt notes that

several cybersecurity bills have been introduced. But he did not say whether he supported any particular measures.

In the future, we can only hope that Schmidt would seize on leadership opportunities like this – a chance to publicly support some of the pending legislation, or to suggest changes that would make us all more secure.

In the words of President Obama,

Let’s reject the false choice between protecting our people and upholding our values.  Let’s leave behind the fear and division, and do what it takes to defend our nation and forge a more hopeful future — for America and for the world.

Technological State of the Union

There are many pressing issues that President Obama will address in tonight’s State of the Union address.  One of the issues that has seen some press, but mostly been relegated to the back burner, is the technological policies of the new administration.

You may recall the Cyberspace Policy Review, released earlier this year.  This work, and the resulting document, were badly needed, and also decently well-received amongst the tech sphere.  Some, including Purdue University’s CERIAS head Gene Spafford, took issue with a few things, namely the creation of the “Cybersecurity Coordinator”:

First of all, the new position is rather like a glorified cheerleader: there is no authority for budget or policy, and the seniority is such that it may be difficult to get the attention of cabinet secretaries, agency heads and CEOs.

Second, the position reports to the National Economic Council and OMB. […] Given the current stress in the economy I don’t expect any meaningful actions to be put forth that cost anything; we will still have the mindset that “cheapest must be best.”

Third, there was no mention of new resources.

Fourth, there was absolutely no mention made of bolstering our law enforcement community efforts.

This position was finally filled on December 21, 2009 by Howard Schmidt – who had previously served as a cyber advisor to President George W. Bush.  Like Dr. Spafford has said, it seems that there is nothing but more of the same in regards to America’s official stance on the digital world.  As they say, if you do what you’ve always done, you’ll get what you always got.

Where does that leave us for tonight’s address?  Ed Felten suggests there are 4 areas which must be improved to make a meaningful difference, and I would tend to agree:

  1. Improving Cybersecurity
  2. Making Government More Transparent
  3. Bringing the Benefits of Technology to All
  4. Bridging the Culture Gap Between Techies and Policymakers

The real challenge here is that each of these four pillars depend on one another, and must all be advanced simultaneously.  If we can bridge the gap between techies and policymakers, surely that will improve cybersecurity.  If we are able to make government more transparent, then that will work towards bringing the benefits of technology to all.  Can we simultaneously make government more transparent, and also improve cybersecurity – especially when so many of our cybersecurity initiatives are led by classified organizations?  Where do we begin?

I hesitate to think that Mr. Schmidt will be the catalyst for this change.  I also hesitate to think that President Obama will have the political capital to drive a meaningful shift in policy or practice – especially with the current struggles over healthcare, jobs, the bailout, or any number of issues.

Does this, then, mean that we must sit and wait for positive change to happen?  What happens in the meantime when Google and China seem to be racing towards the boiling point?  As individuals, who are often left responsible for their own security online, what recourse do we have?

Unfortunately, these are not questions to which I have an answer.  Like the rest of America, I will be tuning in at 9 PM (EST), and listening intently to see if President Obama mentions the state of US Cyber initiatives, and any plans for the future.  If progress on the issues is made as slowly as progress on the selection of the Cybersecurity Coordinator, it would seem that our cyber future may be bleak.  On the other hand, I truly believe that a concerted national effort, not unlike those that created the Space Program, could produce some very real, very positive, and very impactful results.

The floor is now yours, Mr. President.  We’re listening.

This essay originally appeared at Information Space.

Walking Away, Part 3

NPR ran a story this morning about a homeowner who is considering walking away from their mortgage because they are so far underwater.  Regular readers will recall my recent entries (here and here) about my feelings on this issue.

What I found most interesting in today’s NPR piece is not that the bank’s renegotiation of the mortgage includes a $107,000 balloon payment (though it does), or that the new terms of the mortgage are more favorable on paper (40 years @ 2%).  What I found most interesting is that the person the bank referred NPR to for comment, Mr. Scott Talbott, Senior Vice President of Governmental Affairs at the Financial Services Roundtable, had to say about this particular homeowners obligation:

Talbott says that homeowners who get modifications have an obligation to stay — and pay.

“The borrowers have signed a contract,” he said. “They have signed a promissory note, which says, ‘I promise to repay.’ So in addition to a legal obligation, you can argue there’s a moral obligation to repay.”

Fortunately, University of Arizona Professor Brent White was quick to point out that this is not exactly the case.  You may recall Prof. White as being mentioned here before, as he has become the face of the non-morality argument for walking away.  He responds:

“A contract is not a moral document, it’s a legal document,” White said. “So all this language about moral obligation and contractual obligations rest upon homeowners not knowing what a contract is.”

In reality, these contracts are built with clauses that define the course of action should the homeowner walkaway (essentially a default).  These are known by both parties, and agreed upon, when they initially enter the agreement.  There’s no trick, no subterfuge, and nothing untoward – it’s simply business.

However, there may be consequences, as Mr. Talbott from the Financial Services Roundtable reminds us:

walking away from a mortgage would bring down the Salters’ [the homeowner] credit rating. And, he says, if everyone did it, home values would go down even more.

Both of these consequences seem appropriate for the situation – especially the reduction in value of other homes.  That’s the point of the market: to adjust the value in accordance with the supply and demand in such a way that the item in question is valued accurately.  If that means that these homes are suddenly “worth less,” it’s not because of the homeowner’s walking away.  It’s because their initial valuation was inflated (through many means, likely) and this adjustment was due.

There has been much discussion that the integrity of individuals has been on the decline, and that people in previous decades or generations would never have walked away from their home.  While individual integrity may have changed, walking away from your home is not an issue of individual integrity.  It is a business decision.  Those who criticize homeowners for walking away would surely laud a businessman who shed a losing investment or big liability.

Don’t get me wrong – there are consequences for walking away from a mortgage.  But, there are (usually far worse) consequences for paying on an underwater home for the next 40 years – even if it’s only at a 2% interest rate.  The contract will detail how to handle this situation, should it occur, and following an agreed-upon protocol will see the situation through.

Ultimately, if individuals act in their own best financial interests, the market and the financial institutions will adjust accordingly.  If that means walking away from an underwater mortgage, so be it.

If you feel like sharing your feelings on this issue, I suggest you send a note to Mr. Talbott –  I’m sure he’d be glad to hear from you.

More on Individual Market Freedom

It appears that the New York Times has finally caught on to what I’ve been saying since December: Homeowners – think like your bank.

Some homeowners may keep paying because they think it’s immoral to default.

The problem here, is something called “norm asymmetry.”

In other words, they think they are obligated to repay their loans even if it is not in their financial interest to do so, while their lenders are free to do whatever maximizes profits. It’s as if borrowers are playing in a poker game in which they are the only ones who think bluffing is unethical.

One very interesting (dare I say, great?) way to combat this problem is nonrecourse loans.

That means the mortgage is secured by the home itself; in a default, the lender has no claim on a borrower’s other possessions. Nonrecourse mortgages may be viewed as financial transactions in which the borrower has the explicit option of giving the lender the keys to the house and walking away. Under these circumstances, deciding whether to default might be no more controversial than deciding whether to claim insurance after your house burns down.

This will serve to keep everyone honest about the transaction taking place.  For the bank, do they feel like they are giving an appropriately sized loan to a person who is adequately likely to repay, for a property that is fairly valued and poised to hold or gain value?  If so, grant the loan.

For the consumer, they are no longer worried about the extremely negative impacts that could result from these actions today – detrimental notes on their credit reports, legal proceedings (and the associated costs), etc.

But, these sorts of mortgages do come with a cost – about $800 in closing fees for every $100,000 loaned – a small price to pay, in my opinion.  Will these sorts of things become common?  Not likely any time soon:

So far, lenders have been reluctant to renegotiate mortgages, and government programs to stimulate renegotiation have not gained much traction.

So where does this leave the consumer?  Looking out for themselves, as usual.  If you are in this situation, and your financial institution is unwilling to work with you, I would offer that the ethical considerations of walking away should be just about the last thing on your list, if at all.

Would your bank think twice about foreclosing?

Professional Bloggers

In a stroke of fate straight out of The Secret, I’ve been meaning to post about the unique situations that professional bloggers are faced with.  What’s the stroke of fate, you might ask?  I, myself, have now become a professional blogger.

That’s right – someone will be paying me to blog for them.  You can read my debut entry over at Information Space, the Official Blog of the School of Information Studies at Syracuse University.  Look for at least one entry a week in that space.  I’m also pursuing some other opportunities that may result in more blog exposure, so stay tuned for those.

Back to the issue at hand – professional bloggers.  The idea behind this post grows out of the recent kerfuffle between the family of 8 year old Mikey Hicks, who can’t get off of the Terrorist Watch List and the TSA’s Official Blogger, Bob.

In a recent post, just two days after Mikey was featured in the above-linked New York Times article, Bob wrote:

It’s inevitable that every several months or so, some cute kid gets their mug posted on a major news publication with a headline reading something like: “Does this look like a terrorist to you?” Anything involving kids or cats gets tons of mileage and everybody starts tweeting and retweeting that there’s an 8 year old on the no fly list.

Bob.  This is not good.  This is not the way to endear the TSA to the American citizens that they are supposed to serve.  Especially not good considering that your fellow TSA employees are busy putting baggies of white powder in traveler’s bags.

The blog should be your chance to generate some goodwill, to show us another side of the TSA and its employees.  Instead, Bob, you used the blog (and taxpayer dollars – your salary, remember?) to add insult to injury to the Hicks family.

Now, the story keeps getting interesting.  After an absolute firestorm in the comments section, 199 at the time of this writing, Bob posted an update:

I want to clarify that my post wasn’t directed at this or any family who have been inconvenienced in situations such as this, but more at the perpetual reporting that there are children on the No Fly list.

Unfortunately, I’m not buying Bob’s story about his post not being “directed at this or any family.”  But Bob also said something that I found very interesting:

For anybody who is new to the TSA Blog, please know that I’m a blogger and not an official TSA media spokesperson.  The way I write and address issues is different than a spokesperson would address issues with traditional media.

So – Bob is not an “official TSA media spokesperson,” but he is employed full time a blog that “is sponsored by the Transportation Security Administration.”  How, then, are we supposed to interpret Bob’s commentary?

Should we picture Bob the same way we might picture the grocery check-out clerk – someone who is employed at the firm, engages daily with the public and customers, but is not the spokesperson?  If that’s the case, how are we to interpret Bob’s comments about the attempted Christmas Day bombing?  Is this more like water-cooler gossip?  Or does it carry some weight?

The point here is that official bloggers (typically denoted by the fact that they’re paid, which puts them amongst the rare minority of bloggers as a whole) must blog as if their comments are official comments.  If you don’t want your comments to portray the official position of the agency, then don’t post them on the official blog.

For most industries, this is the standard practice.  In fact, many organizations are using blogs and Twitter to make product announcements, or other official confirmations – see Sprint, for example.  In my own, albeit new, professional role, I will be conscious of my posts and their content.

My only hope is that the TSA do the same — I’m looking at you, Bob.