Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
Current scientific understanding shows that so-called “anonymization” methods that have been widely used in the past are inadequate for protecting privacy in the era of big data and artificial intelligence.
China is NOT a nuclear “peer” of the United States, as some contend.
China’s total number of approximately 600 warheads constitutes only a small portion of the United States’ estimated stockpile of 3,700 warheads.
The Federation of American Scientists strongly supports the Modernizing Wildfire Safety and Prevention Act of 2025.
The Federation of American Scientists strongly supports the Regional Leadership in Wildland Fire Research Act of 2025.