recommended reading

State Department adviser lays out pros and cons of Internet diplomacy

Alex Ross at an event in 2009

Alex Ross at an event in 2009 // Flickr user poptech

The Wikileaks scandal has inspired State Department officials to be more active online rather than less, says a senior adviser to Secretary of State Hillary Clinton.

“[Wikileaks] is largely made up of members and followers rather than paid staff,” Clinton’s Senior Adviser for Innovation, Alec Ross, said in an interview taped for C-SPAN’s Communicators program. “It has a Web address rather than a street address. It’s truly transnational and virtual in nature.”

“When you recognize that an organization like that can so disrupt the conduct of foreign policy you can do one of two things,” Ross continued. “You can either curl into the fetal position or you can say, ‘you know what, these networks are of great power and great consequence in our foreign policy, so we need to be as strong as possible.’ Secretary Clinton is not one to curl into the fetal position. Nor are any of the rest of us at the State Department. So if anything, it’s affirmed the need for us to be Internet smart.”

Nextgov correspondent Joseph Marks was the episode’s guest reporter. He interviewed Ross with Communicators host Peter Slen.

Ross has encouraged senior diplomats and Foreign Service officers to integrate social media and other new technology into diplomacy as a method to speak directly to citizens rather than through often state-run media.

During the Communicators interview he called Secretary Clinton “the most innovation friendly American diplomat since Benjamin Franklin” and credited her with pushing the State Department bureaucracy to embrace new technology.

Check out the full interview here.

It will air at 6:30 p.m. Saturday on C-SPAN and at 8 a.m. and 8 p.m. Monday on C-SPAN 2.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.