Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
At a time when universities are already facing intense pressure to re-envision their role in the S&T ecosystem, we encourage NSF to ensure that the ambitious research acceleration remains compatible with their expertise.
FAS CEO Daniel Correa recently spoke with Adam Marblestone and Sam Rodriques, former FAS fellows who developed the idea for FROs and advocated for their use in a 2020 policy memo.
In a year when management issues like human capital, IT modernization, and improper payments have received greater attention from the public, examining this PMA tells us a lot about where the Administration’s policy is going to be focused through its last three years.
Congress must enact a Digital Public Infrastructure Act, a recognition that the government’s most fundamental responsibility in the digital era is to provide a solid, trustworthy foundation upon which people, businesses, and communities can build.