recommended reading

Defense leaders stress importance of social networking

The widespread use of social networking technologies by Iranians frustrated with election results shows "it is increasingly difficult for an authoritarian government to maintain control of all the means of communication that are available to its citizens," Secretary of Defense Robert Gates told reporters during a Pentagon news briefing on Thursday.

Gates said the use of advanced communication technology by average citizens worldwide is one of the "more significant developments in the last 20 years" and added "freedom of communication and the nature of it is a huge strategic asset for the United States."

The Defense chief said tools such as Twitter are "a huge win for freedom around the world because this monopoly of information is no longer in the hands of the government."

In response to a question about Twitter, Gates noted, "there are clearly a number of governments, around the world, that try to control these communications ... [they] try to control the Internet and so on. "

But, he said, these governments "can't draw the net tight enough to stop everything.... If you can't text, then you Twitter.... My guess is, in some of these countries, that the leadership is kind of like me. They don't have a clue what it's about."

Gates said he did not use Twitter nor did he have a Facebook page. But Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, said he does Twitter. In a Tweet after the news conference he said Twitter is "critical and meets needs for flexibility and adaptability."

He added he used Twitter to stay in touch with the 2 million troops whose average age is in the 20s and who grew up with Internet-based communications. The 63-year-old Mullen said even though he might not be as facile using Twitter as the young troops he commands, it was important for senior leaders to understand and use social networks. "I think communicating that way and moving information around that way, whether it's administrative information or information in warfare, is absolutely critical," he said.

Gates concurred, saying Defense needs to use social networking tools to "get better plugged in to what [troops] are thinking."

Besides using social networks for internal communications, Defense has adopted them to gets its message across to the population in Afghanistan. In May, U.S. Forces Afghanistan launched Facebook, Twitter and YouTube sites to speed the pace at which "commanders can get information to the public, allowing them to preempt extremist propaganda."

The Navy does not have a Twitter site, but the Army and the Air Force have embraced the technology. Gates said he believes Defense needs to do more in the social networking arena. "This department, I think, is way behind the power curve," he said during the news briefing. "It's an area where I think we have a lot of room for improvement."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.