Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
Extreme heat is the leading weather-related cause of injury and death and innovations in the built environment can save money and lives.
By requiring all states to conduct flood infrastructure vulnerability assessments (FIVAs), the federal government can limit its financial liability while advancing a more efficient and effective model of flood resilience that puts states and localities at the fore.
FAS is invested in seeing more students gain science and technology skills and enter STEM careers, both for students and for our country’s competitive advantage.
To sustain America’s leadership in AI innovation, accelerate adoption across the economy, and guarantee that AI systems remain secure and trustworthy, we offer a set of policy recommendations.