Social Media Tries To Protect Afghan Users

Facebook has brought in new safety measures for users worried for their safety in Afghanistan, as the Taliban continue to cement their grip on power. Many people in the country have been trying to make their digital footprints disappear as they are concerned about being watched  and fear Taliban reprisals. 

In a move aimed to help their users, Facebook, Twitter and LinkedIn have moved to secure the accounts of those who may be at risk.

Facebook has launched a one-click tool for people in Afghanistan to quickly lock down their account. Facebook says it has "removed the ability to view and search the 'Friends' list for Facebook accounts in Afghanistan" to protect people from being targeted. 

Human rights groups have voiced concerns that the Taliban could use online platforms to track Afghans' digital histories or social connections and  Amnesty International said this week that thousands of Afghans, including academics, journalists and human rights defenders, were at serious risk of Taliban reprisals.

The additional safety measures were announced by Facebook's head of security policy, Nathaniel Gleicher. "We've launched a one-click tool for people in Afghanistan to quickly lock down their account. When their profile is locked, people who aren't their friends can't download or share their profile photo or see posts on their timeline," Gleicher tweeted. He said that on Facebook-owned Instagram "we're rolling out pop-up alerts in Afghanistan with specific steps on how to protect your account".

LinkedIn has taken similar measures by hiding the connections of anyone known to be located in Afgahnistan.

Twitter has said that it would ban Taliban content from its platform as it considers the group to be a terrorist organisation.
Meanwhile, Twitter said in a statement this week that its "top priority is keeping people safe, and we remain vigilant... The situation in Afghanistan is rapidly evolving. We're also witnessing people in the country using Twitter to seek help and assistance."

Twitter has come under particular scrutiny for its handling of Taliban-related content since various Taliban spokesmen have been using the platform to update hundreds of thousands of their followers as the militant group retook control of Afghanistan. 

According to its rules, Twitter does not allow groups that promote terrorism or violence against civilians.

Nathaniel Gleicher / Twitter:       Zawya:    Gadgets Now:     Hindustan Times:   

Business Standard:   VOA:     Yahoo:    BBC:    

You Might Also Read: 

The Taliban's Mastery Of  Information Warfare:

 

« China Has A 3-Year Plan For Cyber Security
AWS Marketplace presents: How to integrate security into the DevOps pipeline »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.