Could terrorists use Twitter, the instant messaging and micro-blogging service? Presumably so, just as they could use credit cards and can openers.
The potential use of Twitter and other communications technologies by terrorists is considered in a new draft Army intelligence paper, based on a review of jihadist web sites and other public sources.
The Army paper on “al Qaida-Like Mobile Discussions & Potential Creative Uses” was dissected by Noah Shachtman in “Spy Fears: Twitter Terrorists, Cell Phone Jihadists,” Danger Room, October 24. A copy of the paper itself, which is more like a student exercise than a finished intelligence assessment, is available here (large pdf, for official use only).
Through investments in infrastructure for heat safety, Congress can save lives, protect the economy, and enhance resilience nationwide.
A shift toward more circular, transparent systems would not only reduce waste and increase efficiency, but also unlock new business models, strengthen supply chain resilience, and give consumers better, more reliable information about the products they choose.
Could the largest U.S. public-private critical minerals deal of the decade be a model for the future?
“My job is to make that space honest, human, and useful by always asking questions, listening longer, and following the science. So that our decisions are grounded in evidence and driven by care.”