Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
At a period where the federal government is undergoing significant changes in how it hires, buys, collects and organizes data, and delivers, deeper exploration of trust in these facets as worthwhile.
Moving postsecondary education data collection to the states is the best way to ensure that the U.S. Department of Education can meet its legislative mandates in an era of constrained federal resources.
Supporting children’s development through health, nutrition, education, and protection programs helps the U.S. achieve its national security and economic interests, including the Administration’s priorities to make America “safer, stronger, and more prosperous.”
To strengthen federal–state alignment, upcoming AI initiatives should include three practical measures: readiness assessments before fund distribution, outcomes-based contracting tied to student progress, and tiered implementation support reflecting district capacity.