Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
Don’t like the Chinese-backed EVs that are undercutting your market? Start with a well-designed statute to strengthen market oversight and competition while also providing American companies with support.
Cities and states are best positioned to design policies to accelerate clean energy, innovation, and economic development because they can design approaches that work in different social, political, and economic contexts.
Outcome-Based Contracting reframes procurement around the staged achievement of measurable mission outcomes rather than the delivery of predefined technical artifacts.
The real opportunity of AI lies not just in the tools, but in an educator workforce prepared to wield them. When done right, this investment in human infrastructure ensures AI accelerates learning outcomes for all students, closing the “digital design divide.”