recommended reading

House Dems battle for social media supremacy

Rep. Jared Polis, D-Colo.

Rep. Jared Polis, D-Colo. // David Zalubowski/AP file photo

For the third year in a row, House Democrats held a competition to pull themselves into the social media age. For three weeks, Democratic representatives tried to pile up as many new followers as possible across various social media platforms. Rep. Jared Polis of Colorado took home MVP, compiling 31,578 new Facebook fans, Twitter followers and YouTube subscribers combined. 

House Democratic Whip Steny Hoyer organized the battle for social media supremacy, which also included head-to-head competitions between Democrats in each house committee and caucus. The House Oversight and Government Reform Committee took its category, while the Congressional Black Caucus outpaced its competition. All together, the entire Democratic field gained over 139,000 new followers, according to a press release

Perhaps the subtle humor of Polis' Twitter feed helped him take home gold in the competition. The feed includes occasional non-political tweets -- "Practice your #olympics pommel horse routine on the coffin #ThingsNotToDoDuringAFuneral" -- and tongue-in-cheek political commentary -- "I've never been to a #CFA Chick-fil-A... does that mean that I was boycotting them before it became cool? #lgbt."

Polis topped several other social media savvy members, including Rep. Bruce Braley of Iowa, who gained 12,904 followers, and Rep. Karen Bass of California, who accumulated 12,879 new followers. While Bass and Braley's Twitter feeds might not be filled with Polis-level humor, they do best Polis in the visual category. Braley has a recent series of pics of him on a biking trip. Bass frequently posts snapshots of her speaking appearances around the country.

The Congressional Black Caucus crushed the second-place Congressional Asian Pacific American Caucus. The CBC boasts 39,128 "likes" on Facebook, CAPAC has a mere 1,037 "likes." The CBC's most recent post, about President Barack Obama's Education Excellence for African Americans initiative, was shared 103 times. 

The House Oversight and Government Reform Committee Democrats stepped up their game during the competition, tweeting up to eight times a day this past week. The second place House Foreign Affairs Committee Democrats apparently had better things to do, only tweeting once all of July.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.