Written by: David Heath | Published in: Government Tech Policy

Just what constitutes a legitimate military target? Does a tweeter qualify?