recommended reading

Social Engagement Shouldn't Wait Until After a Crisis Hits

Robert Connolly and his wife Laura embrace has they survey the remains of a home in Breezy Point, New York, following Hurricane Sandy.

Robert Connolly and his wife Laura embrace has they survey the remains of a home in Breezy Point, New York, following Hurricane Sandy. // Mark Lennihan/AP File Photo

One of the greatest challenges social media emergency managers face is that the public isn’t very interested in hearing from them unless and until a disaster strikes, they told lawmakers on Tuesday.

That can make it more difficult to communicate effectively and efficiently with citizens during a crisis, Albert Ashwood, director of Oklahoma’s Department of Emergency Management, said during a hearing led by the House Homeland Security Subcommittee on Emergency Preparedness, Response and Communications.

Emergency managers have tried to be more visible before crisis hits by launching Web and mobile services that offer helpful tips.

“In any disaster, if you do…an after action [report], the No. 1 issue is going to be communications,” Ashwood said. “Information is the silver bullet that takes care of disaster victims afterwards. If they have the proper information they can make proper decisions for themselves and their families, so we have to constantly strive to resource that need during nondisaster times.”

There’s a concerted effort among emergency managers to offer people more guidance through social media about where they can seek shelter and find supplies should the need arise. Officials also are gathering more information about where residents might need the most help and are working to counter false rumors online.

When Hurricane Sandy battered the East Coast in October 2012, the American Red Cross deployed 50 trained digital volunteers to analyze 2.5 million pieces of social data, the organization’s chief public affairs officer, Suzanne DeFrancis, told lawmakers. The Red Cross forwarded more than 300 pieces of social information to its teams during the Sandy response, and in 88 cases those teams changed their plans to get help to people who’d posted social requests, DeFrancis said.

“When residents of Sayreville, N.J., had not received assistance five days after landfall, they used Facebook to let us know,” she said. “We were able to route this information to our operations on the ground and get some service delivery going in an area we just hadn’t identified.”

Citizens’ expectations for social media has generally outpaced government’s ability to use it during disasters. According to an August 2012 Red Cross survey, more than 75 percent of people would expect help to arrive within three hours if they posted to a social media site during an emergency and 40 percent would use social media to let others know they’re OK.

Emergency responders also must focus on nondigital communication during disasters in case Internet service and electricity are knocked out and to serve elderly and low-income people who might not be online or use mobile phones, panelists at the hearing said.

This is the second post-Hurricane Sandy hearing the homeland security panel has held on social media in emergency management. During the first hearing in June, officials from Google and other Internet giants urged agencies to post more information in open machine-readable formats during disasters so they can make it broadly available to people who don’t visit government websites.  

The Federal Emergency Management Agency is working on complying with that request, Shayne Adamski, FEMA's senior manager of digital engagement, told lawmakers Tuesday.

Google received about 15 million queries for Sandy-related information in the days before, during and after the storm, according to Matthew Stepka, vice president of the tech giant’s social impact programs. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.