The Taliban's Mastery Of Information Warfare

The swift collapse of the 20-year western mission to Afghanistan took only a single day as Taliban gunmen entered , Kabul, on Sunday 15th August. President Ghani fled the country, and America abandoned its embassy in panic. The Taliban’s objective to seize control of Afghanistan and re-establish an Islamic Emirate has been achieved. 

For years, the Taliban has used social media to spread its messages. In fact, more than 70 percent of the Afghan population has access to cell phones, and the Taliban adapted to this, using modern, Russian-style information warfare to deploy fake accounts and bots to spread its messages and undermine the Afghan government.

This pragmatism reflects the Taliban’s understanding that the group cannot govern Afghanistan the same way it did in the 1990s and the Taliban will seek to keep the country connected to the world and the foreign aid flowing. The Taliban combines information operations, including appeals from tribal elders alongside text messages and Twitter, with decentralised orders that allow local commanders who know the terrain and politics in their areas to identify opportunities for taking the initiative. 

Social media is used as a significant platform for political engagement and is used for propaganda and has been used by the Taliban who have been engaged in strategic information warfare on multiple fronts.The rapidly unfolding crisis in Afghanistan, spearheaded by the fall of regional centres became a significant element in the Taliban narrative.

Facebook Ban On Taliban-related Content

Facebook has announced it will ban the Taliban and related content from its platforms as it says the group is a terrorist organisation. The company says it has a dedicated team of Afghan experts to monitor and remove content linked to the group. Its rapid takeover of Afghanistan raises fresh challenges for technology firms on how to deal with content related to the group. "The Taliban is sanctioned as a terrorist organisation under US law and we have banned them from our services under our Dangerous Organisation policies... This means we remove accounts maintained by or on behalf of the Taliban and prohibit praise, support, and representation of them," a Facebook spokesperson told the BBC.

Terrorism On The Internet

Technology is one of the strategic factors driving the increasing use of the Internet by terrorist organisations and their supporters for a wide range of purposes, including recruitment, financing, propaganda, training, incitement to commit acts of terrorism, and the gathering and dissemination of information for terrorist purposes. While the many benefits of the Internet are self-evident, it may also be used to facilitate communication within terrorist organisations and to transmit information on, as well as material support for, planned acts of terrorism, all of which require specific technical knowledge for the effective investigation of these offences. 

  • Like other modern insurgent groups, the Taliban use modern communication and as one of their most potent weapons, Now that Afghans have access to messaging services and apps such as WhatsApp, Telegram and others, the Taliban has an even stronger position to promote its narrative.
  • However, unlike insurgent groups like Islamic State (IS) and al-Qaeda, the Taliban does not operate in the shadows, but uses every media avenue possible to get its narrative out not just to the people of Afghanistan, but a worldwide audience.The Taliban’s propaganda has also focused on delivering messages to its soldiers and attempting to maintain unity amongst them. 

There is a significant difference in what the Taliban is able and capable to do online, using various platforms, compared to others such as IS and al-Qaeda. The Taliban’s digital footprint can be traced back to the 2005-06 period when parts of its website, named Alemara, went online. Today the website and its content is available in Dari, Pashto and English, much like most of the official and semi-official social media handles that are either run by or run in support of the Taliban. 

On social media, the Taliban has a very wide presence, led by its use of Twitter, although it is important to remember that the Taliban is not officially designated as a terrorist group by the US, giving it legitimacy to use Western social media tools without the threat of repercussion. 

The legitimacy the Taliban gained by online platforms and its violent and extremist methods raises significant questions over individual social media platforms and their own counter-extremist and counter-terrorism policies. 

Whether legal clearance given to an insurgency or terror group purely due to political strategy, or the wisdom of a state’s foreign policy is a good enough reason to allow such groups digital legitimacy, is a question that deserves the most serious consideration.

GNet Research:      Guardian:       World Bank:        IMGB:       Atlantic Council:       BBC:     United Nations:

JIfoWar:      Observer Research Foundataion:     Taylor & Francis:     US Congress:

You Might Also Read:

US Cyber Command Hacked ISIS:

 

« British Government Ministers Risk Being Hacked
Facebook Bans The Taliban »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Valeo Nertworks

Valeo Nertworks

Valeo Nertworks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.