The Taliban's Mastery Of Information Warfare

The swift collapse of the 20-year western mission to Afghanistan took only a single day as Taliban gunmen entered , Kabul, on Sunday 15th August. President Ghani fled the country, and America abandoned its embassy in panic. The Taliban’s objective to seize control of Afghanistan and re-establish an Islamic Emirate has been achieved. 

For years, the Taliban has used social media to spread its messages. In fact, more than 70 percent of the Afghan population has access to cell phones, and the Taliban adapted to this, using modern, Russian-style information warfare to deploy fake accounts and bots to spread its messages and undermine the Afghan government.

This pragmatism reflects the Taliban’s understanding that the group cannot govern Afghanistan the same way it did in the 1990s and the Taliban will seek to keep the country connected to the world and the foreign aid flowing. The Taliban combines information operations, including appeals from tribal elders alongside text messages and Twitter, with decentralised orders that allow local commanders who know the terrain and politics in their areas to identify opportunities for taking the initiative. 

Social media is used as a significant platform for political engagement and is used for propaganda and has been used by the Taliban who have been engaged in strategic information warfare on multiple fronts.The rapidly unfolding crisis in Afghanistan, spearheaded by the fall of regional centres became a significant element in the Taliban narrative.

Facebook Ban On Taliban-related Content

Facebook has announced it will ban the Taliban and related content from its platforms as it says the group is a terrorist organisation. The company says it has a dedicated team of Afghan experts to monitor and remove content linked to the group. Its rapid takeover of Afghanistan raises fresh challenges for technology firms on how to deal with content related to the group. "The Taliban is sanctioned as a terrorist organisation under US law and we have banned them from our services under our Dangerous Organisation policies... This means we remove accounts maintained by or on behalf of the Taliban and prohibit praise, support, and representation of them," a Facebook spokesperson told the BBC.

Terrorism On The Internet

Technology is one of the strategic factors driving the increasing use of the Internet by terrorist organisations and their supporters for a wide range of purposes, including recruitment, financing, propaganda, training, incitement to commit acts of terrorism, and the gathering and dissemination of information for terrorist purposes. While the many benefits of the Internet are self-evident, it may also be used to facilitate communication within terrorist organisations and to transmit information on, as well as material support for, planned acts of terrorism, all of which require specific technical knowledge for the effective investigation of these offences. 

  • Like other modern insurgent groups, the Taliban use modern communication and as one of their most potent weapons, Now that Afghans have access to messaging services and apps such as WhatsApp, Telegram and others, the Taliban has an even stronger position to promote its narrative.
  • However, unlike insurgent groups like Islamic State (IS) and al-Qaeda, the Taliban does not operate in the shadows, but uses every media avenue possible to get its narrative out not just to the people of Afghanistan, but a worldwide audience.The Taliban’s propaganda has also focused on delivering messages to its soldiers and attempting to maintain unity amongst them. 

There is a significant difference in what the Taliban is able and capable to do online, using various platforms, compared to others such as IS and al-Qaeda. The Taliban’s digital footprint can be traced back to the 2005-06 period when parts of its website, named Alemara, went online. Today the website and its content is available in Dari, Pashto and English, much like most of the official and semi-official social media handles that are either run by or run in support of the Taliban. 

On social media, the Taliban has a very wide presence, led by its use of Twitter, although it is important to remember that the Taliban is not officially designated as a terrorist group by the US, giving it legitimacy to use Western social media tools without the threat of repercussion. 

The legitimacy the Taliban gained by online platforms and its violent and extremist methods raises significant questions over individual social media platforms and their own counter-extremist and counter-terrorism policies. 

Whether legal clearance given to an insurgency or terror group purely due to political strategy, or the wisdom of a state’s foreign policy is a good enough reason to allow such groups digital legitimacy, is a question that deserves the most serious consideration.

GNet Research:      Guardian:       World Bank:        IMGB:       Atlantic Council:       BBC:     United Nations:

JIfoWar:      Observer Research Foundataion:     Taylor & Francis:     US Congress:

You Might Also Read:

US Cyber Command Hacked ISIS:

 

« British Government Ministers Risk Being Hacked
Facebook Bans The Taliban »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

MyTurn Career LLC

MyTurn Career LLC

Looking for a rewarding career in cybersecurity? Explore a wide range of cybersecurity jobs and opportunities in this rapidly evolving field.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.