Clay Johnson on key trends for Gov 2.0 and open government in 2011

As dozens of freshmen Representatives move into their second week of work as legislators here in the District of Columbia, they’re going to come up against a key truth that White House officials have long since discovered since the heady … Continue reading

White House deputy CTO for open government Beth Noveck returns to teaching

Beth Simone Noveck, director of the White House Open Government Initiative, and U.S. deputy chief technology officer, will return to academia as a professor of law at New York Law School on January 15th 2010.

Noveck is the author of “Wiki Government,” where she wrote about using social networking technology to connect people to policymakers.

People in the open government community began to thank her for her service today. “We’re lucky to have brilliant & dedicated leaders (& working moms!) like Beth Noveck serving our country. Thx, Beth & good luck!” tweeted Twitter’s Katie Stanton, a former colleague at the White House.

“Thanking Beth Noveck for 2 years of @OpenGov public service,” tweeted open government godfatherCarl Malamud. “Good luck on next gig, great job.”

More details will emerge on who will take on Noveck’s role at the White House in the coming weeks. For more on Noveck’s open government legacy, look back at her work on leveraging on the civic surplus, next steps for open government, the relaunch of the Federal Register and designing democracy with “ExpertNet,” a proposed a citizen consultation platform.

Also see coverage of Noveck’s resignation in NextGov, InformationWeek and FederalNewRadio.

UPDATEOn January 11, the John D. and Catherine T. MacArthur Foundation awarded Noveck a grant “to apply her expertise to developing a multi-year interdisciplinary research agenda to gauge the impact of digital networks on institutions,” including how society can use technology to strengthen democratic culture.

“The Foundation’s interest in public sector innovation as a potential longer term area for focused investment is testament to Beth’s success—through her research, writing, and public service—at putting the topic of 21st century democracy on the national agenda,” said Dean and President Richard A. Matasar. “We are delighted to have her back.”

According to the MacArthur Foundation, Noveck is now working with colleagues both inside and outside of government on the design for “IOPedia,” a platform for mashing up and visualizing public corporate accountability data and tracking the evolution of organizations.

“I am proud to have helped fulfill the president’s historic commitment to promoting an open and innovative government—one that uses openness and collaboration as core elements of governance and policy making,” Noveck said in a statemnt. “I look forward to working with students and the wider open government community to continue my research and advocacy to promote the adoption of public sector innovations.”

President Obama: Such a senseless and terrible act of violence has no place in a free society

Earlier today, Congresswoman Giffords was shot in Tucson, Arizona, along with over a dozen other people, at least two of whom have died. On this tragic day, many citizens and media alike are trying to filter fact from fiction. Both the president and the speaker of the House have issued statements condemning the violence.

President Barack Obama takes part in a conference call in the Situation Room of the White House concerning the shooting of Rep. Gabrielle Giffords and others in Tucson, Az., Saturday, Jan. 8, 2011. Pictured, left to right, National Security Advisor Tom Donilon, incoming Chief of Staff Bill Daley, Deputy Chief of Staff Jim Messina, Director of Communications Dan Pfeiffer, and Assistant to the President for Legislative Affairs Phil Schiliro. Also taking part in the call were Attorney General Eric H. Holder, Jr., Homeland Security Secretary Janet Napolitano, and FBI Director Robert Mueller (Official White House Photo by Pete Souza)

President Barack Obama takes part in a conference call in the Situation Room of the White House concerning the shooting of Rep. Gabrielle Giffords and others in Tucson, Az., Saturday, Jan. 8, 2011. Pictured, left to right, National Security Advisor Tom Donilon, incoming Chief of Staff Bill Daley, Deputy Chief of Staff Jim Messina, Director of Communications Dan Pfeiffer, and Assistant to the President for Legislative Affairs Phil Schiliro. Also taking part in the call were Attorney General Eric H. Holder, Jr., Homeland Security Secretary Janet Napolitano, and FBI Director Robert Mueller (Official White House Photo by Pete Souza)

From WhiteHouse.gov:

“This morning, in an unspeakable tragedy, a number of Americans were shot in Tucson, Arizona, at a constituent meeting with Congresswoman Gabrielle Giffords. And while we are continuing to receive information, we know that some have passed away, and that Representative Giffords is gravely wounded.

We do not yet have all the answers. What we do know is that such a senseless and terrible act of violence has no place in a free society. I ask all Americans to join me and Michelle in keeping Representative Giffords, the victims of this tragedy, and their families in our prayers.”-President Barack Obama

President Obama made a short statement to the nation from the White House in a live video address regarding the shooting in Tucson.

http://www.whitehouse.gov/sites/all/modules/swftools/shared/flash_media_player/player5x2.swf

The president confirmed the death of at least five people in the shooting in this tragedy, among them federal judge John Roll, and a nine year old girl. [Emphases that follow are mine-Ed.]

THE PRESIDENT: As many of you are aware, earlier today a number of people were shot in Tucson, Arizona, including several who were meeting at a supermarket with their congresswoman, Gabrielle Giffords. We are still assembling all the facts, but we know that Representative Giffords was one of the victims. She is currently at a hospital in the area, and she is battling for her life.

We also know that at least five people lost their lives in this tragedy. Among them were a federal judge, John Roll, who has served America’s legal system for almost 40 years; and a young girl who was barely nine years old.

I’ve spoken to Arizona governor Jan Brewer and offered the full resources of the federal government. A suspect is currently in custody, but we don’t yet know what provoked this unspeakable act. A comprehensive investigation is currently underway, and at my direction, Director Bob Mueller is en route to Arizona to help coordinate these efforts. I’ve also spoken to the Democratic and Republican leaders in the House.

Gabby Giffords was a friend of mine. She is not only an extraordinary public servant, but she is also somebody who is warm and caring. She is well liked by her colleagues and well liked by her constituents. Her husband, Mark Kelly, is a Navy captain and one of America’s valiant astronauts.

It’s not surprising that today Gabby was doing what she always does — listening to the hopes and concerns of her neighbors. That is the essence of what our democracy is all about. That is why this is more than a tragedy for those involved. It is a tragedy for Arizona and a tragedy for our entire country.

What Americans do at times of tragedy is to come together and support each other. So at this time I ask all Americans to join me and Michelle in keeping all the victims and their families, including Gabby, in our thoughts and prayers. Those who have been injured, we are rooting for them. And I know Gabby is as tough as they come, and I am hopeful that she’s going to pull through.

Obviously our hearts go out to the family members of those who have been slain. We are going to get to the bottom of this, and we’re going to get through this. But in the meantime, I think all of us need to make sure that we’re offering our thoughts and prayers to those concerned.

Thank you.

Today, the Speaker of the House, the President of the United States, and his opponent from the last election spoke from a united position. From Speaker.gov:

I am horrified by the senseless attack on Congresswoman Gabrielle Giffords and members of her staff. An attack on one who serves is an attack on all who serve. Acts and threats of violence against public officials have no place in our society. Our prayers are with Congresswoman Giffords, her staff, all who were injured, and their families. This is a sad day for our country.” – Speaker of the House John Boehner

U.S. Senator John McCain (R-AZ) made the following statement

“I am horrified by the violent attack on Representative Gabrielle Giffords and many other innocent people by a wicked person who has no sense of justice or compassion.  I pray for Gabby and the other victims, and for the repose of the souls of the dead and comfort for their families.  I beg our loving Creator to spare the lives of those who are still alive, heal them in body and spirit, and return them to their loved ones.

“Whoever did this; whatever their reason, they are a disgrace to Arizona, this country and the human race, and they deserve and will receive the contempt of all decent people and the strongest punishment of the law.” – Senator John McCain

Senator McCain also made the following statement regarding the passing of Chief Judge John Roll:

“I am deeply saddened to hear that Chief Judge John Roll was killed today during the senseless act of violence against Congresswoman Giffords and other Arizonans. Words are inadequate to express such a profound loss to his family, friends, state and country, but it is appropriate to note that a man of great qualities and character was struck down today, and the wickedness of this atrocity, which included the murder of a small child, has broken the hearts of many and will be mourned for years to come. I am proud to have recommended Judge Roll to President Bush for the federal bench in 1991 and have been extremely proud of his work on the bench since then. I am most proud to have called him a friend. Judge Roll dedicated his life to public service and was admired by many for his integrity, kindness and love for the law, for the state of Arizona and our country. He began his career as a bailiff in the Pima County Superior Court and was at his death the Chief Judge for the District of Arizona since 2006. He distinguished himself in every office he held. He will be missed very much. Cindy and I are praying for his soul and for his beloved wife and children and the families of all the victims in this terrible moment of sorrow. Our state has lost a good man, a true and able advocate for justice for all and a great Arizonan. May God grant him perpetual peace.”

The White House blog also linked to statements from Vice President Joe BidenHomeland Security Secretary Janet Napolitano, Attorney General Eric Holder, and NASA Administrator Charles Bolden.

Giffords online

Shortly before the shooting, Congresswoman Giffords tweeted that “My 1st Congress on Your Corner starts now. Please stop by to let me know what is on your mind or tweet me later.” The tweet will serve as a poignant reminder of the day. There will be a vigil at the Capitol and in Tucson for Giffords and other victims.

The first quote on Congresswoman Giffords’ Facebook page holds additional resonance today:

“With malice toward none, with charity for all, …let us strive on to finish the work we are in, …to do all which may achieve and cherish a just and lasting peace among ourselves and with all nations.” — President Abraham Lincoln

NPR’s Andy Carvin covered the emerging story using Storify:

http://storify.com/acarvin/rep-gifford.js

White House issues guidance on “technology neutral” IT acquisition

Victoria Espinel, the White House intellectual property enforcement coordinator, wrote a blog post providing guidance to federal agencies on making technology neutral IT procurement decisions.

Each year, the U.S. Government spends almost $80 billion dollars buying information technology (IT); the software, computer equipment and network devices that help the Government run efficiently. It is important that those purchases be fair, neutral and based on an objective assessment of relevant criteria. To ensure that the agencies and the public are aware of our policy, today U.S. Chief Information Officer Vivek Kundra, Administrator for Federal Procurement Policy Dan Gordon and I issued a statement to Senior Procurement Executives and Chief Information Officers reminding them to select IT based on appropriate criteria while analyzing available alternatives including proprietary, open source and mixed source technologies.

Aliya Sernstein, over at NextGov, extracted an interested headline from the guidance: “Kundra encourages open source.” Getting to that conclusion from the memo in question, embedded below, might be a stretch, though it is notable that a document signed by the United States chief information officer specifically said that agencies should “analyze alternatives” that include open source.

One key phrase in the memo gives a bit more insight here, in terms of the acquisition process: should “selecting suitable IT on a case-by-case basis to meet the particular operational needs of the agency by considering factors such as performance, cost, security, interoperability, ability to share or re-use, and availability of quality support.”

Open source software has both competitive advantages and disadvantages in those areas.

Here’s the memo from CIO.gov:

Technology Neutrality http://d1.scribdassets.com/ScribdViewer.swf

Possibly related: “Google wins: Interior forbidden to award noncompetitive contract to Microsoft” [Federal Computer Week]

And no, this isn’t the only outlet to wonder about that link: read Nancy Scola over at techPresident on the White House reminder to be technology neutral:

(So why the memo, and why today? It’s not entirely clear yet, but a smart source points out a related news item in the space: yesterday Google won a preliminary injunction in a case where it had argued that the U.S. Department of the Interior had inappropriately geared a nearly $60 million contract for cloud-based email and collaboration software tools to fit only Microsoft’s proprietary products. Again, though, we’re indulging in a bit of speculation here, and it’s worth pointing out that Google’s revelant products aren’t themselves open-source.)

By the way, if you’d like to stay instantly up on such developments, you might try following Kundra’s new Twitter feed. He’s only tweeted three times thus far, but once was an indeed a pointer to this memo. “Open source vs proprietary?,” he posted. Follow @VivekKundra here.

2011 Trends: National Strategy for Trusted Identities in Cyberspace highlights key online privacy, security challenges

Blackberrys, cell phones and communications devices are tagged with post-its during a briefing on Afghanistan and Pakistan in the Cabinet Room of the White House, March 26, 2009. (Official White House Photo by Pete Souza)

Blackberrys, cell phones and communications devices are tagged with post-its during a briefing on Afghanistan and Pakistan in the Cabinet Room of the White House, March 26, 2009. (Official White House Photo by Pete Souza)

The upcoming release of the final version of the White House “National Strategy for Trusted Identities in Cyberspace” highlights three key trends that face the world in 2011: online identity, privacy and security. Governments need ways to empower citizens to identify themselves online to realize both aspirational goals for citizen-to-government interaction and secure basic interactions for commercial purposes.

Earlier today, Stanford hosted an event today where U.S. Commerce Secretary Gary Locke and White House cybersecurity coordinator Howard Schmidt talked about the Obama administration’s efforts to improve online security and privacy at the Stanford Institute for Economic Policy Research (SIEPR). Here’s the NSTIC fact sheet the administration posted last year.

“As we look at the innovation engine that drives many of the things we’re doing, what does it mean to sit there as we’ve come together today,” asked Schmidt, “bringing these things together to overcome some of these risks associated with the technology we’ve deployed over the past 20 some odd years?”

The administration took public feedback on the document at NSTIC IdeaScale, which is now closed. (For a screenshot, see the story on IdeaScale on MSNBC.com.) “Every day at the end of the day. I would go back and read some of those comments,” said Schmidt today. “Some of them quite honestly were pretty silly. Other of them were very insight full and gave us some good thoughts about how can we do this right? How can we create a document that really does those things the secretary mentioned such as privacy enhancing but also giving us better trust?”

Schmidt took to the White House blog again today to announce a “National Program Office for Enhancing Online Trust and Privacy.”

Today, at Stanford University, Commerce Secretary Gary Locke and I were pleased to announce that the Commerce Department will host a National Program Office (NPO) in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC).  As I’ve written previously, the NSTIC fulfills one of the action items in theCyberspace Policy Review (pdf) and is a key building block in our efforts to secure cyberspace.

This holiday season, consumers spent a record $30.81 billion in online retail spending, an increase of 13 percent over the same period the previous year.  This striking growth outshines even the notable 3.3-5.5 percent overall increase in holiday spending this past year.  While clearly a positive sign for our economy, losses from online fraud and identity theft eat away at these gains, not to mention the harm that identity crime causes directly to millions of victims.  We have a major problem in cyberspace, because when we are online we do not really know if people, businesses, and organizations are who they say they are. Moreover, we now have to remember dozens of user names and passwords. This multiplicity is so inconvenient that most people re-use their passwords for different accounts, which gives the criminal who compromises their password the “keys to the kingdom.”

We need a cyber world that enables people to validate their identities securely, but with minimal disclosure of information when they’re doing sensitive transactions (like banking) – and lets them stay anonymous when they’re not (like blogging). We need a vibrant marketplace that provides people with choices among multiple accredited identity providers – both private and public – and choices among multiple credentials. For example, imagine that a student could get a digital credential from her cell phone provider and another one from her university and use either of them to log-in to her bank, her e-mail, her social networking site, and so on, all without having to remember dozens of passwords. Such a marketplace will ensure that no single credential or centralized database can emerge. In this world, we can cut losses from fraud and identity theft, as well as cut costs for businesses and government by reducing inefficient identification procedures. We can put in-person services online without security trade-offs, thereby providing greater convenience for everyone.

This is the world envisioned in the NSTIC.  We call it the Identity Ecosystem.  We will be working to finalize the NSTIC in the coming months, but that is only the beginning of the process. I’m excited to be working with Secretary Locke. The Commerce Department is perfectly suited to work with the private sector to implement the NSTIC. In addition, there are other departments and agencies with strategic roles to play as well. Above all though, we look to the leadership of the private sector. Therein lies the key to success. Now is the time to move forward with our shared vision of a better, more secure cyberspace.

Why NSTIC Matters

The policy that the United States government makes towards the Internet has the potential to affect every person online in 2011, as advocates know, so how this is carried out bears close watching. The Center for Democracy and Technology filed key comments on NSTIC last year, including a key issue: “We alerted the Commerce Department to our concern about NSTIC’s current focus on the use of government credentials for private transactions: A pervasive government-run online authentication scheme is incompatible with fundamental American values,” wrote Heather West regarding the cybersecurity policy proposal.

The issue is at once simple and enormously complex, as Jim Dempsey from the Center for Democracy and Technology highlighted today. Government needs a better online identity infrastructure to improve IT security, online privacy, and support ecommerce but can’t create it itself, said Dempsey, outlining the key tension present. Dempsey advocated for a solution for online identity that lies within a broader trust framework and that is codified within a baseline federal consumer privacy law.

Some of the answers to the immense challenge of securing online privacy and identity won’t be technical or legislative at all. They lie in improving the digital literacy of for online citizens. That very human reality was highlighted after the massive Gawker database breach last year, when the number of weak passwords used online became clear. Schmidt highlighted the root caused of passwords today:

The reason most people do that is because we have to worry about remembering so many different passwords and then there’s so many layers of complexity and, complexity that we have to worry about, we have different time frame. We replace them every 30-day, 60 days, 90 days and it becomes really cumbersome. And recent survey found that 46% of the people surveyed never ever have changed their passwords and 71% use the same password with over and over and over again. From reading an on-line blog to doing sensitive financial transactions.

Others answers may be founded in creating online trust frameworks, which were a key initiative in 2010 for the federal government. Multifactor authentication, where more than one forms of identity are used in transactions, will be part of that vision. Schmidt described, loosely, what that might look like.

I go to a store. I go to a grocery store in some cases. I do some level of proofing, whatever I want to wind up doing, whether it’s the lowest level or the highest level to get an online identity stored on a token. A digital identity. Whether it’s on a USB drive or whether it’s on a smart card, I have the ability to do something beyond what I’m doing now. I go to log-in to these accounts. I use the USB device, I use a smart card. I use a one time password on my mobile device that no longer puts me in a position where I’ve been in the past where I can wind up making one small mistake and paying for it for years. But then I also get the log-in to my web mail account. That credential is passed on as well. So I have the ability to do these things seamlessly without all the baggage and overhead that goes with it. But then here comes the true test – this web mail – this phishing e-mail – comes in, and working together between the token and my digital identity and the browser, it stops me from doing things that are going to be harmful. And I had the ability to control that. I have the ability to set this up. And then it keeps me from becoming a victim of fraud.

That combination of physical tokens that interface with commercial and communications infrastructure to authenticate a consumer or online user are one vision of an identity ecosystem. Given the commercial needs of the moment, it should not be a surprise that the Department of Commerce is a key player. Secretary Locke offered perspective on the challenges that face the nation in 2011. [Full unedited transcript]

Let’s flash forward to today to 2011. Nowadays the world does an estimated $10 trillion of business online. Nearly every transaction you can think of is being done over the Internet. Consumers paying their utility bills, even from smartphones. People downloading music, movies and books online. Companies from the smallest local store to bed and breakfasts, to multinational corporations, ordering goods, paying vendors, selling to customers, all around the world. All over the Internet. E-commerce sales for the third quarter of 2010 were estimated at over $41 billion, up almost 14% over last year. And early reports indicate that the recent holiday buying season saw similar growth with year over year sales up by over 13%.

But despite these ongoing successes, the reality that the Internet still faces something of a trust issue. And it will not retch its full potential until users and consumers feel more secure than they do today when they go on-line. The threats on the Internet seem to be proliferating just as fast as the opportunities. Data breaches, malware, ID theft and spam are just some of the most commonly known invasions of a user’s privacy and security. And people are worried about their personal information going out and parents, like me, are worried about unwarranted sexually explicit material coming in before their children. And the landscape is getting more complex as dedicated hackers undertake persistent targeted attacks and develop ever more sophisticated frauds.

The approach that Locke outlined will apparently be housed within the Department of Commerce, a choice that is likely relevant to the scale and growth of e-commerce online:

The end game of course, is to create an identity ecosystem where individuals and organizations can complete online transactions with greater confidence, putting greater trust in the online identities of each other, and greater trust in the infrastructure that the transactions run over. Let’s be clear, we’re not talking about a national ID card. We’re talking about a government controlled system. But what we are talking about is enhancing online security and privacy, and reducing, and perhaps even eliminating, the need to memorize a dozen password through the creation and use of more trusted digital identities. To accomplish this, we’re going to need your help. And we need the private sector’s expertise and involvement in designing, building and implementing this identity ecosystem. To succeed we’ll also need a national program office at the Department of Commerce focused on implementing our trusted identities strategy.

For more context, look back to Schmidt’s introduction of the NSTIC at the WhiteHouse.gov blog last year:

Cyberspace has become an indispensable component of everyday life for all Americans. We have all witnessed how the application and use of this technology has increased exponentially over the years. Cyberspace includes the networks in our homes, businesses, schools, and our Nation’s critical infrastructure. It is where we exchange information, buy and sell products and services, and enable many other types of transactions across a wide range of sectors. But not all components of this technology have kept up with the pace of growth. Privacy and security require greater emphasis moving forward; and because of this, the technology that has brought many benefits to our society and has empowered us to do so much — has also empowered those who are driven to cause harm.

Today, I am pleased to announce the latest step in moving our Nation forward in securing our cyberspace with the release of the draft National Strategy for Trusted Identities in Cyberspace (NSTIC). This first draft of NSTIC was developed in collaboration with key government agencies, business leaders and privacy advocates. What has emerged is a blueprint to reduce cybersecurity vulnerabilities and improve online privacy protections through the use of trusted digital identities.

The NSTIC, which is in response to one of the near term action items in the President’s Cyberspace Policy Review, calls for the creation of an online environment, or an Identity Ecosystem as we refer to it in the strategy, where individuals and organizations can complete online transactions with confidence, trusting the identities of each other and the identities of the infrastructure that the transaction runs on. For example, no longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services. Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential (e.g., a smart identity card, a digital certificate on their cell phone, etc) from a variety of service providers – both public and private – to authenticate themselves online for different types of transactions (e.g., online banking, accessing electronic health records, sending email, etc.). Another key concept in the strategy is that the Identity Ecosystem is user-centric – that means you, as a user, will be able to have more control of the private information you use to authenticate yourself on-line, and generally will not have to reveal more than is necessary to do so.

This is all wonky stuff that may seem a bit dry to some readers, but it’s important. The intertwined issues of identify, security and online privacy are increasingly relevant to every citizens as more commerce, education, communication and elements of everyday life move onto the Internet and mobile infrastructure. This strategy is central to how the United States government will work with industry, nonprofits, citizens and other states to improve the status quo. On that count, Bob Gourley, CTO of Crucial Point, commented extensively on the NSTIC at CTOVision.

It won’t be easy. Supporting the creation of identity infrastructure and improvements to online privacy in the private sector has the potential to make the Internet more secure and convenient for users and consumers but could have unintended consequences if not carefully pursued. There’s a lot at stake. As the Stanford event organizers highlighted, “e-commerce worldwide is estimated at $10 trillion of business online annually.”

Wired’s Ryan Singel highlighted a key issue for the White House plan for online identity, perhaps even the fundamental one in today’s online identity landscape: Facebook.

Philip Kaplan, the outspoken founder of Blippy, AdBrite and Fucked Company, added a Silicon Valley developer voice to event’s panel, arguing that any system has to be simple to implement, so that developers working in their living room making a website can concentrate on building new features, not worrying about security.

The closest thing to that currently is Facebook Connect, which lets you use your Facebook credentials to login you in around the net and on mobile apps..

“I can put in one line of JavaScript and I have a login system,” Kaplan said. “But that doesn’t I’m not going to pay my taxes using Facebook Connect.”

Which is another way of it might be as dangerous for a single company to be the world’s online ID vault as it would for the government to handle that task.

And right now, with Facebook at 600 million users and $50 billion in valuation, that future seems much more likely than a standards-based, interoperative system built by geeks at the behest of the feds.

Whether an online trust framework can be a viable alternative to Facebook’s play to be the identity provider online is a first-order question, and one that deserved examination. Kudos to Singel for putting the event in that context.

Weekend Reading: The most recent version of the NSTIC follows. Look for more reporting, both here or at another outlet, once the final version is released.

National Strategy for Trusted Identities in Cyberspace http://d1.scribdassets.com/ScribdViewer.swf

Extended thoughts on Twitter and the White House from the first @PressSec

Today, news that White House press secretary Robert Gibbs will be leaving to become an outside political adviser to the president and his re-election campaign. In the White House press briefing today, Gibbs reflected upon several ways that his role has changed as the speed of reporting has increased, particularly in the context of Twitter. Gibbs was the first White House press secretary to tweet, at @PressSec.

The two questions Gibbs answered today for #1Q centered on exactly the question: what’s next for Gibbs – and for his @PressSec account?

“None of these tools were developed for me,” said Gibbs. “They were developed for you.”

He implied that @PressSec will continue, though it’s not immediately clear whether he’ll transition the account. For more on his thinking on social networking, relevant excerpts from the transcript from the briefing follow.

Q: Thank you. Having been at this for two years, can you talk to us a bit about the value of the daily briefing? Do you think it’s helpful to the general public? Is it helpful to reporters? Is it helpful to the White House? Would you make any changes? Would you take it off camera? Do you like it being on camera?

MR. GIBBS: Look, we’ve experimented with a couple different things like — I do think there’s a great utility in doing some off-camera gaggles. We probably, truth be told, haven’t done enough of those. I think there’s an ability to talk about things slightly differently without all these fancy lights.

I think it’s important, though, as I said — I alluded to earlier, it’s important to, as a government, to come out here and talk about and answer the — talk about the policies and decisions that are being made and to answer the questions surrounding those.

Like I said, there are days in which — my guess is it will happen again this week — where you pick up that newspaper or you turn on your computer at 4:30 a.m. in the morning while your coffee is still brewing and you groan and, oh, God, what — you know, great, this is going — and then you get on your BlackBerry.

But I think there’s a usefulness to that. I think there’s a reason that this has been an enduring quality. I do think there is — look, I think there has to be — I think there should continue to be experimentation, again, with gaggles. We’ve tried more stuff on social networking that I think will continue long past my existence inside this building because that, too, is important.

You now have the ability to — look, I got on something like Twitter largely from watching you guys tweet while the President was standing right here. And it’s a fascinating concept. All this stuff moves much faster. I think that will endure. And I think the briefing will endure. And I think what gets added to and what complements the briefing in terms of breaking down any walls that exist between the people and their government will only accelerate.

Gibbs then took a question on his use of social media platforms, which, as the questioner pointed out, he used to call “the Twitter” and YouTube. Gibbs said that was “a joke.” Take a look at WhiteHouse.gov/1Q for an archive of his use of the two platforms.

Q: The use of these kind of platforms, to what degree can you gauge its effectiveness in terms of sort of bypassing us, who are filters —

MR. GIBBS: Well, here’s I think a great misnomer, because I think it’s important — social networking and the use of those type of tools I think — I don’t look at it as, boy, I can now talk to people and you guys — I’m going to go around you. I’ve neversaid that. Because, quite frankly, I subscribe to what you write; youguys subscribe to what I write. And I think what’s unique is we’ve done recently — and I’ve greatly enjoyed them, though I realize that — and I know you all agree — that very few of my answers conform to 140 characters. But I think it’s interesting that you can have a dialogue with people who are going about their daily lives, who have questions for the administration about what it’s doing, and you guys have written off of that.

And I think that’s — I just don’t think people should look at the increased transparency in their government, a greater explanation of the decisions that we’re making, as an effort to move around and go around you guys.

Food for thought. Hat tip to Nancy Scola at techPresident, who offers additional analysis. If you’re at all interested in what happens next to @PressSec, or how the new media aspects of today’s transition were handled, Scola’s post on the 112th Congress’ great Twitter handover is an absolute must-read.

If you missed the first two rounds of Gibbs taking extended questions from the public over Twitter, they’re captured here, along with analysis of what transparency really means in this context.

Christmas Eve Twitter Q&A with @WhiteHouse @PressSec features plenty of holiday cheer

http://storify.com/digiphile/second-twitter-qa-with-the-white-house-press-secre.js

#1Q grows to many: The @WhiteHouse @PressSec takes questions live on Twitter, makes @AP news

http://storify.com/digiphile/live-twitter-qa-with-the-us-press-secretary.js

A President and his BlackBerry

President Barack Obama checks his BlackBerry en route to the Oval Office, Dec. 13, 2010. (Official White House Photo by Pete Souza)

President Barack Obama checks his BlackBerry en route to the Oval Office, Dec. 13, 2010. (Official White House Photo by Pete Souza)

White House photographer Pete Souza captured this striking nighttime silhouette of President Obama and his “ObamaBerry this week. Despite the connection this image implies, don’t expect to get a reply from questions directed to BHO44@whitehouse.gov answered any time soon. President Obama is less reachable than, say, Steve Jobs, as several people who have written to sjobs@apple.com have found. As Engadget reported earlier this year, after President Obama said that presidential BlackBerry ownership is no fun, he probably not exchanging email with more than a dozen other people on Earth.

If you’ll recall, Obama fought hard early on for the privilege of maintaining his prized BlackBerry, and while he eventually won out, we learned today that a grand total of ten individuals are authorized to ping it. Yeah, ten. Needless to say, he described that depressing fact as “no fun,” and even the folks that are cleared to make contact with it won’t send over anything juicy. Why? They know that messages sent to it “will probably be subject to the presidential records act,” so those lucky enough to have the digits are also smart enough to divert their ramblings to Texts From Last Night.

While President Obama tweeted once on the Red Cross acount, it’s also a safe bet that he’s not having any fun tweeting as @BarackObama either, nor that it will be replacing the Red Phone to Russia. That said, the vision of a more digitally connected president fits the moment in history, with nearly 30 % of Americans toting smartphones at the end of 2010, with 50% penetration estimated for 2011.

Despite the potential IT security risks for the president and other government workers that smartphones present, as Chris Soghioan pointed out last year at CNET,  that hasn’t stopped them from making their way into the hands of tens of thousands of Washingtonians in the District of Columbia. Last night, I watched and smiled as new hires at the local startup agency poked and prodded at their new BlackBerrys, getting comfortable with the functions of one what has become an important communication tools for their trade.

President Barack Obama answers questions about the economy from local families as, from left, Senior Advisor David Axelrod, Deputy Press Secretary Bill Burton, Director of Speechwriting Jon Favreau, and Trip Director Marvin Nicholson wait in a hallway of the Southhampton Recreation Association in Richmond, Va., Sept. 29, 2010. (Official White House Photo by Pete Souza)

President Barack Obama answers questions about the economy from local families as, from left, Senior Advisor David Axelrod, Deputy Press Secretary Bill Burton, Director of Speechwriting Jon Favreau, and Trip Director Marvin Nicholson wait in a hallway of the Southhampton Recreation Association in Richmond, Va., Sept. 29, 2010. (Official White House Photo by Pete Souza)

As I observed at O’Reilly Answers earlier this year, when it comes smartphone market share, the BlackBerry still rules Washington.

Instead of 2:1 ratio of BlackBerry to iPhone users, it’s more like 106 to 1. As a recent story in the Washington Post that explored whether iPhones will edge out BlackBerrys in Washington reported, there are currently 86 iPhone users at work amongst the aides, staff and officials in the House of Representatives, versus some 9,140 BlackBerry users. There are tens of thousands more spread among the other federal agencies.

That’s changing, albeit more slowly in official Washington than it is in the rest of the country. “This quarter saw Apple and Android drive record smartphone sales. Apple’s share of the smartphone market surpassed Research In Motion (RIM) in North America to put it second behind Android while Android volumes also grew rapidly making it the No. 2 operating system worldwide,” said  Carolina Milanesi, research vice president at Gartner.

Over the course of the past year, this correspondent has seen many more iPhones in evidence here in Washington, along with a surge of Android devices in the falll. As Politico reported earlier this month, a tech overhaul may allow both iPads, iPhones and BlackBerrys on to the floor of the Senate. This summer, Rep. Charles Djou made history when he tweeted that “The House Parliamentarian told me that I’m the first Member of Congress to ever use an iPad” during a floor speech.” There are reports that the iPad is popular with White House staff and in the Cabinet is using iPads. In the judicial branch of government, the competition is between iPad and the Kindle in the Supreme Court, with Justice Kagan leaning Kindle and Justice Scalia leaning iPad for reading their briefs.

One point of clarity exists with respect to Washington and smartphones: it’s generally not an “either/or” proposition in this city. Most of official Washington travels with both a work BlackBerry and another device for personal use, for any number of pragmatic records and security reasons.

It’s likely that a paperless Congress is still a few years away, but who knows: maybe the increase of smartphones will be a boon to get more Washingtonians shifting their thinking from “there’s a form for that” to “there’s an app for that” in 2011.

[Hat tip to Nancy Scola for the image and caption. This may have been one the most apt finds ever for at blog named “techPresident.”]

White House hosts online webchat on anniversary of Open Government Directive

Tomorrow, December 8, is the one year anniversary of the White House Open Government Directive, which which required federal agencies to take steps to achieve key milestones in transparency, participation, and collaboration. At 2:00 PM EST, the first United States chief technology officer, Aneesh Chopra, will join OMB chief information officer Vivek Kundra and Cass Sunstein, administrator of the Office of Information and Regulatory Affairs, in a live web chat at WhiteHouse.gov/live. Video of the webcast is embedded below:

The @OpenGov account and White House solicited questions through an online form tool at WhiteHouse.gov and through the White House Facebook page. The chat itself will be hosted using the White House Live Facebook app and streamed live online through WhiteHouse.gov/live or, presumably, the White House iPhone app. Watch for whether any three of the White House officials answer questions on Wikileaks and open government. (UPDATE: They didn’t.) President Obama’s press conference on a tax deal with the GOP superseded the original chat on Tuesday, which the @WhiteHouseOSTP account confirmed.

I’ll be liveblogging the chat here using CoverItLive, embedded below:

White House Open Government Live Chat

The Sunlight Foundation released the following statement on the one year anniversary of the open government directive:

“In its first year, the Open Government Directive made government transparency a priority and encouraged federal agencies to put important information online. While more government information is now available online, the Directive’s limitations have also become clearer. Simply put, the president’s commitment to transparency is not yet living up to its full potential. The Open Government Directive is a great starting point, but the hard work that is needed to create a truly open government is still ahead of us.

“Agencies such as the Department of Labor, Health and Human Services and NASA have led the way in releasing data, and the working groups created among key staff have brought about real cultural change within agencies. But all of these initiatives need a steady hand and a clear commitment from the White House to mature into permanent, reliable, effective policies that result in meaningful data online.

“More concentrated work is needed to move beyond the easy wins. The administration has to give stronger direction and urge the agencies to move forward if the promise of an open government is to be realized.”

Sunlight’s recommendations for a more open government are available online at http://sunlightfoundation.com/policy/documents/agenda/.

John Wonderlich of the Sunlight Foundation is also liveblogging.

For more context on White House open government innovation, review the following pieces:

The open government community will likely be discussing the chat on Twitter.  Embedded below is a curated list of open government accounts:

//