Georgetown University: Center on National Security and the Law Launches Online, Searchable Database of Foreign Intelligence Law Collection

Georgetown University: Center on National Security and the Law Launches Online, Searchable Database of Foreign Intelligence Law Collection. “On May 23, Georgetown Law’s Center on National Security and the Law launched the Foreign Intelligence Law Collection — a publicly available, online searchable database of all declassified and redacted U.S. Foreign Intelligence Surveillance Court and Court of Review opinions; all Foreign Intelligence Surveillance Act (FISA) statutes; legislative history; associated regulations, guidelines, executive orders, and presidential directives; all publicly available reports on FISA implementation, and more.”

University of Texas at San Antonio: UTSA political scientist is analyzing the UN’s Twitter feed to improve diplomatic relations

University of Texas at San Antonio: UTSA political scientist is analyzing the UN’s Twitter feed to improve diplomatic relations. “Through research by a political scientist at UTSA, there is potential to see diplomacy between nations improve through the use of Twitter. UTSA researcher, Matthias Hofferberth, is exploring how the United Nations (UN) uses Twitter as a diplomacy tool, an approach that has been discussed as Twiplomacy.”

Radio New Zealand: World leaders, social media heads to gather for summit on terrorism

Radio New Zealand: World leaders, social media heads to gather for summit on terrorism. “On Wednesday, the heads of state from Canada, the United Kingdom, Ireland, Norway, Jordan, Senegal, Indonesia and the European Union will descend on Paris for the Christchurch Call summit chaired by Prime Minister Jacinda Ardern and French President Emmanuel Macron. There the world leaders will sign up to an agreement on how to try to end the use of social media to organise and promote terrorism.”

The National: Treasure trove of priceless UAE archives now online

The National: Treasure trove of priceless UAE archives now online. I mentioned the initiative for this archive back in 2017. “The online portal contains 250,000 priceless archives. The majority are text documents and come from British foreign office files about the Gulf but photographs and video footage from the UAE are also included…. Work on digitising the documents began two years ago and the collection that has gone online is vast. Letters, treaties, maps and telegrams chart 200 years of intrigue, political strife, war, independence and progress. It would take researchers months to go through them all but some catch the eye immediately.”

World Leaders a-Twitter: Communication Platforms and Agenda-Building During the 2018 NATO Summit (U of Colorado Boulder Thesis)

University of Colorado Boulder thesis: World Leaders a-Twitter: Communication Platforms and Agenda-Building During the 2018 NATO Summit. “Twitter is a thriving microblogging service with growing prominence in the political sphere. In this study, I examine the differences between Twitter communications and verbal communications by three heads of state and government in relation to the most recent NATO Summit in July 2018. Through a three-step analysis, including descriptive statistics, content and tone analysis, and comparative analysis, the study investigates Twitter’s influence on content and tone and its agenda-building capacity for face-to-face summits.”

Quartz: A cyber-attack in Japan could now bring the US into war

Quartz: A cyber-attack in Japan could now bring the US into war. “In a briefing yesterday in Washington, DC, US secretary of state Mike Pompeo declared that ‘a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.’ The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.”

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments (New York Times)

New York Times: A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments. “The man in charge of Saudi Arabia’s ruthless campaign to stifle dissent went searching for ways to spy on people he saw as threats to the kingdom. He knew where to go: a secretive Israeli company offering technology developed by former intelligence operatives.”