Social Media Tries To Protect Afghan Users

Facebook has brought in new safety measures for users worried for their safety in Afghanistan, as the Taliban continue to cement their grip on power. Many people in the country have been trying to make their digital footprints disappear as they are concerned about being watched  and fear Taliban reprisals. 

In a move aimed to help their users, Facebook, Twitter and LinkedIn have moved to secure the accounts of those who may be at risk.

Facebook has launched a one-click tool for people in Afghanistan to quickly lock down their account. Facebook says it has "removed the ability to view and search the 'Friends' list for Facebook accounts in Afghanistan" to protect people from being targeted. 

Human rights groups have voiced concerns that the Taliban could use online platforms to track Afghans' digital histories or social connections and  Amnesty International said this week that thousands of Afghans, including academics, journalists and human rights defenders, were at serious risk of Taliban reprisals.

The additional safety measures were announced by Facebook's head of security policy, Nathaniel Gleicher. "We've launched a one-click tool for people in Afghanistan to quickly lock down their account. When their profile is locked, people who aren't their friends can't download or share their profile photo or see posts on their timeline," Gleicher tweeted. He said that on Facebook-owned Instagram "we're rolling out pop-up alerts in Afghanistan with specific steps on how to protect your account".

LinkedIn has taken similar measures by hiding the connections of anyone known to be located in Afgahnistan.

Twitter has said that it would ban Taliban content from its platform as it considers the group to be a terrorist organisation.
Meanwhile, Twitter said in a statement this week that its "top priority is keeping people safe, and we remain vigilant... The situation in Afghanistan is rapidly evolving. We're also witnessing people in the country using Twitter to seek help and assistance."

Twitter has come under particular scrutiny for its handling of Taliban-related content since various Taliban spokesmen have been using the platform to update hundreds of thousands of their followers as the militant group retook control of Afghanistan. 

According to its rules, Twitter does not allow groups that promote terrorism or violence against civilians.

Nathaniel Gleicher / Twitter:       Zawya:    Gadgets Now:     Hindustan Times:   

Business Standard:   VOA:     Yahoo:    BBC:    

You Might Also Read: 

The Taliban's Mastery Of  Information Warfare:

 

« China Has A 3-Year Plan For Cyber Security
AWS Marketplace presents: How to integrate security into the DevOps pipeline »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.