000 02907nab a22001937a 4500
003 ES-MaBCA
005 20150219092920.0
008 120808t xxu||||| |||| 00| 0 eng d
040 _cES-MaBCA
100 _912860
_aBernatis, Vincent
245 _aThe Taliban and Twitter
_h[Recurso electrónico]PDF
_b: Tactical Reporting and Strategic Messaging
260 _bAlex P Schmid
_cDec. 2014
520 _aThe US military’s surge in Afghanistan from 2009 through 2012 was designed to blunt Taliban momentum and ultimately allow international forces to significantly reduce their presence and transition full responsibility for security to the Afghan government by 2015. In May of 2011, near the height of the surge, the Taliban leadership countered the international coalition by opening a distinct new front in their asymmetric battle; one waged not with bullets and bombs, but with regular English language posts on Twitter. This article utilizes public relations and communications theory to analyze a sample of these Tweets alongside Mullah Omar’s yearly Eid messages. In doing so, the argument is made that Taliban information operations on both the tactical and strategic levels promoted a narrative of the conflict designed to weaken the international public’s resolve to actively oppose the Taliban through a long-term deployment of primarily Western military forces to the country. For policymakers, the Taliban’s own chronicling of the war on social media indicates that insurgent forces are not nearly as capable of waging a jihad across all regions of the country as they might wish to be, nor are they in command of a large network of infiltrators willing and able to attack their international trainers and Afghan military partners on command. Academically, the Taliban’s use of Twitter reinforces other research showing that even in the more diffuse, less restrictive atmosphere of social media, the leadership of armed Islamist groups often attempt to exert control over internet-based information operations through the establishment of official social media accounts.
650 0 _92635
_aTalibán
650 0 _94602
_aRedes sociales
773 0 _6http://www.google.es/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CCEQFjAA&url=http%3A%2F%2Fwww.terrorismanalysts.com%2Fpt%2Findex.php%2Fpot%2Farticle%2Fdownload%2F397%2F780&ei=uZnlVKLYAYv4UKDjgKAJ&usg=AFQjCNEPqsB4Yj5wYmZLsKWXdw-r40ljyg&sig2=1CjlqUlHrKYYb2OP1hClHQ&bvm=bv.85970519,d.d24
_aPerspectives on Terrorism
_g. -- Vol. 8 No. 6 (Dec. 2014) p. 25-35
_iEn :
_tPerspectives on Terrorism
_w1101
_x2334-3745
856 4 _qPDF
_uhttp://www.google.es/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CCEQFjAA&url=http%3A%2F%2Fwww.terrorismanalysts.com%2Fpt%2Findex.php%2Fpot%2Farticle%2Fdownload%2F397%2F780&ei=uZnlVKLYAYv4UKDjgKAJ&usg=AFQjCNEPqsB4Yj5wYmZLsKWXdw-r40ljyg&sig2=1CjlqUlHrKYYb2OP1hClHQ&bvm=bv.85970519,d.d24
942 _2udc
_cAN
999 _c15645
_d15648