The Taliban's Mastery Of Information Warfare

The swift collapse of the 20-year western mission to Afghanistan took only a single day as Taliban gunmen entered , Kabul, on Sunday 15th August. President Ghani fled the country, and America abandoned its embassy in panic. The Taliban’s objective to seize control of Afghanistan and re-establish an Islamic Emirate has been achieved. 

For years, the Taliban has used social media to spread its messages. In fact, more than 70 percent of the Afghan population has access to cell phones, and the Taliban adapted to this, using modern, Russian-style information warfare to deploy fake accounts and bots to spread its messages and undermine the Afghan government.

This pragmatism reflects the Taliban’s understanding that the group cannot govern Afghanistan the same way it did in the 1990s and the Taliban will seek to keep the country connected to the world and the foreign aid flowing. The Taliban combines information operations, including appeals from tribal elders alongside text messages and Twitter, with decentralised orders that allow local commanders who know the terrain and politics in their areas to identify opportunities for taking the initiative. 

Social media is used as a significant platform for political engagement and is used for propaganda and has been used by the Taliban who have been engaged in strategic information warfare on multiple fronts.The rapidly unfolding crisis in Afghanistan, spearheaded by the fall of regional centres became a significant element in the Taliban narrative.

Facebook Ban On Taliban-related Content

Facebook has announced it will ban the Taliban and related content from its platforms as it says the group is a terrorist organisation. The company says it has a dedicated team of Afghan experts to monitor and remove content linked to the group. Its rapid takeover of Afghanistan raises fresh challenges for technology firms on how to deal with content related to the group. "The Taliban is sanctioned as a terrorist organisation under US law and we have banned them from our services under our Dangerous Organisation policies... This means we remove accounts maintained by or on behalf of the Taliban and prohibit praise, support, and representation of them," a Facebook spokesperson told the BBC.

Terrorism On The Internet

Technology is one of the strategic factors driving the increasing use of the Internet by terrorist organisations and their supporters for a wide range of purposes, including recruitment, financing, propaganda, training, incitement to commit acts of terrorism, and the gathering and dissemination of information for terrorist purposes. While the many benefits of the Internet are self-evident, it may also be used to facilitate communication within terrorist organisations and to transmit information on, as well as material support for, planned acts of terrorism, all of which require specific technical knowledge for the effective investigation of these offences. 

  • Like other modern insurgent groups, the Taliban use modern communication and as one of their most potent weapons, Now that Afghans have access to messaging services and apps such as WhatsApp, Telegram and others, the Taliban has an even stronger position to promote its narrative.
  • However, unlike insurgent groups like Islamic State (IS) and al-Qaeda, the Taliban does not operate in the shadows, but uses every media avenue possible to get its narrative out not just to the people of Afghanistan, but a worldwide audience.The Taliban’s propaganda has also focused on delivering messages to its soldiers and attempting to maintain unity amongst them. 

There is a significant difference in what the Taliban is able and capable to do online, using various platforms, compared to others such as IS and al-Qaeda. The Taliban’s digital footprint can be traced back to the 2005-06 period when parts of its website, named Alemara, went online. Today the website and its content is available in Dari, Pashto and English, much like most of the official and semi-official social media handles that are either run by or run in support of the Taliban. 

On social media, the Taliban has a very wide presence, led by its use of Twitter, although it is important to remember that the Taliban is not officially designated as a terrorist group by the US, giving it legitimacy to use Western social media tools without the threat of repercussion. 

The legitimacy the Taliban gained by online platforms and its violent and extremist methods raises significant questions over individual social media platforms and their own counter-extremist and counter-terrorism policies. 

Whether legal clearance given to an insurgency or terror group purely due to political strategy, or the wisdom of a state’s foreign policy is a good enough reason to allow such groups digital legitimacy, is a question that deserves the most serious consideration.

GNet Research:      Guardian:       World Bank:        IMGB:       Atlantic Council:       BBC:     United Nations:

JIfoWar:      Observer Research Foundataion:     Taylor & Francis:     US Congress:

You Might Also Read:

US Cyber Command Hacked ISIS:

 

« British Government Ministers Risk Being Hacked
Facebook Bans The Taliban »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Terbium Labs

Terbium Labs

By offering continuous, proactive monitoring of critical data and rapid breach detection, we enable companies to better manage risk and keep high-value data safe.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.