Policy

Top tech group adds the Taliban to list of terrorist organizations

Tech Against Terrorism, a UN-backed initiative, will compile Taliban content in its database and alert tech companies when it appears on their platforms.

A large growd of people facing away from the camera, heading toward high cement walls with barbed whire on them.

Afghans on a roadside near the military part of the airport in Kabul on August 20, 2021, hoping to flee from the country.

Wakil Kohsar/AFP via Getty Images

A key UN-backed group that advises the tech industry on dealing with terrorist groups online has added the Afghan Taliban to its list of terrorist organizations, sending a signal to tech companies that are grappling with how to handle the Taliban's takeover of the Afghan government.


Since last November, Tech Against Terrorism, a group launched by the UN Counterterrorism Executive Directorate, has been assembling a database of known terrorist content called the Terrorist Content Analytics Platform, or TCAP. The TCAP was designed in part to alert tech companies when content from its database appears on their platforms. But until now, that database has included content from only a small subset of terrorist organizations, including ISIS and Al Qaeda, as well as far-right violent extremist groups, including the Proud Boys.

"The Taliban was one of the groups that we have considered adding to the TCAP for a long time, however in light of recent events in Afghanistan and to provide clarity for the tech companies we work with on this (admittedly challenging) content moderation issue, we have decided to accelerate inclusion of official Taliban content," Tech Against Terrorism wrote in a statement. "This decision is supported by designation in some jurisdictions, notably the EU, Canada, and the US Treasury."

Since the Taliban seized power in Afghanistan, questions have mounted for tech companies about how they plan to treat content associated with the Taliban, now that they have control of the government. The TCAP designation could provide some clarity, particularly for smaller companies with less capacity and expertise to make the decisions themselves.

The Global Internet Forum to Counter Terrorism, which was founded by Facebook, Microsoft, YouTube and Twitter, also recently said it would begin relying on the TCAP for its own database of hashed URLs, which tech companies can use to automatically prevent known terrorist URLs from being posted on their platforms.

Both Tech Against Terrorism and the Global Forum have tiptoed into expanding their terrorist designations over the years, wary of stifling speech or bending too much to any single government's list of terrorist organizations. That makes Tech Against Terrorism's decision to include the Afghan Taliban in its database particularly swift. "Whilst we appreciate that this is a challenging moderation issue, the fact that the Taliban now effectively constitutes the Afghan government should not prevent platforms from implementing their rules in this area and from removing material produced by a designated terrorist organisation," Tech Against Terrorism said in its statement.

Fintech

Kraken CEO defends his ‘back to dictatorship’ crackdown

Jesse Powell says the crypto exchange’s cultural revolution was necessary.

"Some people feel they should be able to be whatever they want to be in the workplace. But there's a line," Powell told Protocol.

Photo: David Paul Morris/Bloomberg via Getty Images

Kraken CEO Jesse Powell found himself under fire last month for provocative remarks he made that kicked off a contentious workplace battle and shined a light on the crypto exchange’s distinctive corporate culture.

A New York Times report based on leaked Slack messages and employee interviews accused Powell of making insensitive comments on gender and race, sparking heated conversations within Kraken. Powell responded forcefully, laying out new ground rules and principles in an attempt to define the way he wanted the company to operate — sharply at odds in some aspects with the tech industry’s standard practices.

Keep Reading Show less
Benjamin Pimentel

Benjamin Pimentel ( @benpimentel) covers crypto and fintech from San Francisco. He has reported on many of the biggest tech stories over the past 20 years for the San Francisco Chronicle, Dow Jones MarketWatch and Business Insider, from the dot-com crash, the rise of cloud computing, social networking and AI to the impact of the Great Recession and the COVID crisis on Silicon Valley and beyond. He can be reached at bpimentel@protocol.com or via Google Voice at (925) 307-9342.

Every day, millions of us press the “order” button on our favorite coffee store's mobile application: Our chosen brew will be on the counter when we arrive. It’s a personalized, seamless experience that we have all come to expect. What we don’t know is what’s happening behind the scenes. The mobile application is sourcing data from a database that stores information about each customer and what their favorite coffee drinks are. It is also leveraging event-streaming data in real time to ensure the ingredients for your personal coffee are in supply at your local store.

Applications like this power our daily lives, and if they can’t access massive amounts of data stored in a database as well as stream data “in motion” instantaneously, you — and millions of customers — won’t have these in-the-moment experiences.

Keep Reading Show less
Jennifer Goforth Gregory
Jennifer Goforth Gregory has worked in the B2B technology industry for over 20 years. As a freelance writer she writes for top technology brands, including IBM, HPE, Adobe, AT&T, Verizon, Epson, Oracle, Intel and Square. She specializes in a wide range of technology, such as AI, IoT, cloud, cybersecurity, and CX. Jennifer also wrote a bestselling book The Freelance Content Marketing Writer to help other writers launch a high earning freelance business.
Enterprise

GitHub’s CEO wants to go passwordless by 2025

Thomas Dohmke sat down with Protocol to talk about what the open-source code hosting site is doing to address security vulnerabilities, including an aim to go passwordless by 2025.

GitHub CEO Thomas Dohmke spoke to Protocol about its plan to go passwordless.

Photo: Vaughn Ridley/Sportsfile for Collision via Getty Images

GitHub CEO Thomas Dohmke wants to get rid of passwords.

Open-source software has been plagued with cybersecurity issues for years, and GitHub and other companies in the space have been taking steps to bolster security. Dohmke knows, however, that to get to the root of the industrywide problem will take more than just corporate action: It will ultimately require a sea change and cultural shift in how developers work.

Keep Reading Show less
Michelle Ma

Michelle Ma (@himichellema) is a reporter at Protocol, where she writes about management, leadership and workplace issues in tech. Previously, she was a news editor of live journalism and special coverage for The Wall Street Journal. Prior to that, she worked as a staff writer at Wirecutter. She can be reached at mma@protocol.com.

Enterprise

Why foundation models in AI need to be released responsibly

Foundation models like GPT-3 and DALL-E are changing AI forever. We urgently need to develop community norms that guarantee research access and help guide the future of AI responsibly.

Releasing new foundation models doesn’t have to be an all or nothing proposition.

Illustration: sorbetto/DigitalVision Vectors

Percy Liang is director of the Center for Research on Foundation Models, a faculty affiliate at the Stanford Institute for Human-Centered AI and an associate professor of Computer Science at Stanford University.

Humans are not very good at forecasting the future, especially when it comes to technology.

Keep Reading Show less
Percy Liang
Percy Liang is Director of the Center for Research on Foundation Models, a Faculty Affiliate at the Stanford Institute for Human-Centered AI, and an Associate Professor of Computer Science at Stanford University.
Climate

The West’s drought could bring about a data center reckoning

When it comes to water use, data centers are the tech industry’s secret water hogs — and they could soon come under increased scrutiny.

Lake Mead, North America's largest artificial reservoir, has dropped to about 1,052 feet above sea level, the lowest it's been since being filled in 1937.

Photo: Mario Tama/Getty Images

The West is parched, and getting more so by the day. Lake Mead — the country’s largest reservoir — is nearing “dead pool” levels, meaning it may soon be too low to flow downstream. The entirety of the Four Corners plus California is mired in megadrought.

Amid this desiccation, hundreds of the country’s data centers use vast amounts of water to hum along. Dozens cluster around major metro centers, including those with mandatory or voluntary water restrictions in place to curtail residential and agricultural use.

Keep Reading Show less
Lisa Martine Jenkins

Lisa Martine Jenkins is a senior reporter at Protocol covering climate. Lisa previously wrote for Morning Consult, Chemical Watch and the Associated Press. Lisa is currently based in Brooklyn, and is originally from the Bay Area. Find her on Twitter ( @l_m_j_) or reach out via email (ljenkins@protocol.com).

Latest Stories
Bulletins