recommended reading

#Whoa: CIA Launches Twitter, Facebook Accounts

Gil C/

The CIA joined Twitter and Facebook Friday, and if its first tweet is any indication, the agency has put some serious thought into how to explain itself in 140 characters or less.

“We can neither confirm nor deny that this is our first tweet,” the agency tweeted. 

The move is part of the agency’s effort to improve its public engagement and increase its online presence. The CIA’s newest social platforms join its public website and YouTube and Flickr accounts.

“By expanding to these platforms, CIA will be able to more directly engage with the public and provide information on CIA’s mission, history and other developments,” CIA Director John Brennan said in a statement. “We have important insights to share, and we want to make sure that unclassified information about the agency is more accessible to the American public that we serve, consistent with our national security mission."

The agency said it will post the “latest news, statements and career information from the CIA,” as well as feature artifacts and other information from the CIA’s Museum, which it described as “the best museum most people never get to see.” The agency also plans to publish unclassified intelligence history and updates from its World Factbook.

The CIA is the latest intelligence agency to jump to Facebook and Twitter, but not the first -- the FBI, Office of Director of National Intelligence, National Security Agency and several others already have social media presences. Most recently, the Obama administration launched the IC on the Record Twitter account following last year’s intelligence surveillance leaks by former NSA contractor Edward Snowden.

While the CIA is undoubtedly a social media newbie compared to some of its federal brethren -- the State Department, for example, joined Twitter in October 2007 -- it does have the advantage of learning from those agencies’ past mistakes. The agency spent significant time discussing its social strategy and what the its presence on Twitter and Facebook would look like, so expect an active, engaging and quick-responding presence – on both platforms. The agency knows that anything but a stellar social showing will ensure significant criticism, and it won’t want to trend on either platform for the wrong reasons.

(Image via Gil C/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.