Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
For International Year of the Woman Farmer and International Women’s Month, we spoke to five women farmers in America about planting the next generation.
It’s a busy time and you have things to do. Here are three things worth tracking in science policy as Fiscal Year 2026 (FY26) wraps and we head into FY27.
We’re asking the U.S. government to release holds on Congressionally-appropriated funding for scientific research, education, and critical activities at the earliest possible time.
It is in the interests of the United States to appropriately protect information that needs to be protected while maintaining our participation in new discoveries to maintain our competitive advantage.