Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
While advanced Chinese language proficiency and cultural familiarity remain irreplaceable skills, they are neither necessary nor sufficient for successful open-source analysis on China’s nuclear forces.
To maximize clean energy deployment, we must address the project development and political barriers that have held us back from smart policymaking and implementation that can withstand political change. Here’s how.
While rural schools are used to being scrappy and doing more with less, without state and federal support, districts will be hard-pressed to close teacher workforce gaps on their own.
At a time when universities are already facing intense pressure to re-envision their role in the S&T ecosystem, we encourage NSF to ensure that the ambitious research acceleration remains compatible with their expertise.