Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
By advocating for the integration of technology-focused green jobs within federal initiatives, there is an opportunity to broaden the talent pool and harness the potential of emerging technologies to tackle pressing environmental issues.
“We really wanted a range of perspectives – specifically from voices that have been traditionally left out of the conversation”
The joint advocacy effort calls for the establishment of an effective AI governance framework through NIST, including technical standards, test methods, and objective evaluation techniques for the emerging technology.
Understanding the implications of climate change in agriculture and forestry is crucial for our nation to forge ahead with effective strategies and outcomes.