Promising Practices Promising PracticesPromising Practices
A forum for government's best ideas and most innovative leaders.

Clandestine to Clever: Tweets Reveal Government's Human Side

ARCHIVES
Quka/Shutterstock.com

On June 6, the Twitter world was rocked by the entrance of a new player: the CIA.

Its first tweet went viral, cropping up more than 300,000 retweets and garnering the agency more than 200,000 followers on the first day. I think we can all agree, at least from the government perspective, that the CIA won the Internet for the day.

Since then, the CIA has put out a mere 82 tweets to a crowd of more than 700,000 followers. For the most part, the content has adhered to CIA Director John Brennan’s original intent “to more directly engage with the public and provide information on CIA’s mission, history and other developments.” The agency has tweeted about things like George Bush’s 90th birthday, the U-2 spy plane from the 1950s, and other cool gadgets you can find in the CIA’s museum of artifacts. On the whole: fairly tame, standard government tweets.

But on July 7, the CIA jumped into the spotlight again when it decided to celebrate its one-month #twitterversary by answering the top five most asked questions the agency had received. Depending on who you talk to, you’ll either hear that the tweets were hilarious or a mistake.

While others criticize, I applaud the CIA’s communications department. Officials are confronting the jokes, rumors and distrust that surround their agency, and in doing so, they are showing that the CIA has a personality. They are reminding the public that the agency is populated by real people—people who have a surprisingly sharp sense of humor. That’s not an easy hurdle to overcome when you’re as controversial as the CIA.

This approach has won the agency a slew of new followers. As a result, officials can now reach hundreds of thousands of people with the content they really want to share. If you sift through the CIA’s Twitter page, you’ll find that for every “funny” tweet, there are about 10 that stick to the traditional government content we’d expect. And amazingly—the public is responding to that content as well. Each tweet boasts hundreds, if not thousands of retweets, favorites and replies. Not bad for a government Twitter account that’s less than two months old.

In the end, by showing a little personality, the CIA has managed to achieve its original goal: to start a conversation with the public about its work.

Lindsey Backhaus is a senior consultant at Corner Alliance who specializes in strategic communications and social media for federal, state and local agencies.

(Image via Quka/Shutterstock.com)

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.