FCW Forum | Social media

Trust, but verify, Web 2.0 sources

Twitter, Facebook users can break news or spread lies

Have you ever thought about who controls popular applications such as Facebook and Twitter that facilitate informal social networking and information sharing? They belong to private companies, and the government does not always have contracts with them to govern their use of information. Their software resides outside of the government. Informal communications among government employees, or between these employees and contractors or ordinary citizens, can have many benefits. But there are also pitfalls, particularly for those relatively new to the culture of social technologies.

Inauthenticity is a huge concern in the Web 2.0 universe. To be sure, news of events such as natural disasters and celebrity deaths is often broken on Twitter before news organizations have it because people in proximity to the event share the information immediately. However, because services such as this largely depend on trusted social interactions over time and because of the obsession with exciting-sounding breaking news, false information can easily spread.

Most recently, after a spate of genuine celebrity deaths, rumors circulated online and even briefly on TV that actor Jeff Goldblum had also passed away. It was untrue. In a peak of Web 2.0 humor, satirist Stephen Colbert announced that he learned of Goldblum’s death from Twitter sources in New Zealand — where Goldblum allegedly fell off the roof of a building — only to have Goldblum himself appear on stage disputing that he was deceased. An argument ensued.

For the government, the falsely reported death of Goldblum was of no concern. But what happens when intelligence or law enforcement organizations are monitoring real-time online conversation streams and see potentially false information about a natural disaster, terrorist attack or other dramatic event? Between learning the unvetted information and confirming it, what actions should be taken? What if the information is from seemingly authentic persons from areas where we have no resources?

Mainstream media often doesn’t help. In the rush to publicize, news organizations sometimes run recent video from YouTube or bursts of Twitter chatter to get the break on a story in a strategy of asking for forgiveness later if the information was wrong. And unfortunately, because Web 2.0 companies want to maximize the number of users, sharing and page views, they take little responsibility for the inauthenticity of information. Rumors drive potential profits, and the more salacious the better.

At the Public Democracy Forum in New York, Facebook’s Randi Zuckerberg was asked about authenticity of profiles of politicians from the United States and other countries. Essentially, her answer was that although well-known U.S. people are verified, Facebook profiles for people such as Iranian opposition leader Hossein Mousavi were often not. Inconsistently, Zuckerberg also said that more than half of Facebook’s users were outside the United States. And with an increasing number of high-profile people using Twitter, including the Iraqi deputy prime minister, that company is going through similar growing pains.

The lesson is that not everything is as it seems in the Web 2.0 information-sharing environment. Often, the early information will be correct, and some sources will be more trusted by the community than others. But in an open system that depends on trust, there can be advantages to cheating. Being aware that it happens is the first step to guarding against it affecting the government’s work in a negative way.

About the Author

Mark Drapeau is director of public-sector social engagement at Microsoft. 

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.


  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Sat, Jul 18, 2009 transatlanticnomad Berlin

Very plausible, but I'm curious: How do you go about verifying?

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group