recommended reading

Poetry, radio and Web 2.0 tools part of the battle in Afghanistan

Rear Adm. Greg Smith, the strategic communications director for NATO and U.S. Forces in Afghanistan, knows how he can help that nation's government communicate better with its citizens: poetry, FM radio and Web 2.0 technologies.

Smith, a career Navy public affairs officer, said in a phone interview from Kabul with Nextgov on Tuesday that he uses a variety of communications tools to counter insurgents' messages delivered through coercion and intimidation.

For example, insurgents groups including the Taliban buy low-cost, battery-powered radio transmitters, position them near a village to broadcast messages to residents that include threats to kill them of they do not follow their policies and teachings. Smith said he wants to help the Afghan government counter the messages by using more powerful transmitters that can overwhelm stations operated by insurgent groups.

Smith said FM radio stations can deliver the programming that villagers want to hear, including poetry, a key component of the area's Pashtu culture, which dates back 400 years.

Broadcasting poetry to an audience that appreciates verse meets the key requirement of any strategic communications campaign: "Audience-focused communications. You need to meet the audience where they are at," said Bill Salvan, a reserve Navy public affairs officer and president of Signal Bridge Communications, a public relations firm in Phoenix.

Good content will attract a radio audience hungry for news and information, Smith said. The United States plans to work with businesses and international partners to build networks and stations that reach the entire country.

Smith is also trying to provide better protection for towers and switching centers. About 17 million Afghans out of the total population of 22 million own a cell phone. But the Taliban tries to interrupt the free flow of mobile communications by destroying the towers and switching centers in that country, he said.

Internet access in Afghanistan is limited and primarily serves a pool of educated users who can afford the technology. But Smith said cell phones present an opportunity to use Web 2.0 tools to reach younger audiences. Seventy-five percent of the Afghan population is 22 years old and younger.

U.S. Forces Afghanistan set up this year social networking accounts on Twitter and Facebook, which have begun to "gain some traction," though growth will be "in baby steps" because of limits on usage and connectivity in Afghanistan, Smith said.

Smith said he plans to set up a strategic communications fusion center in Kabul in 60 days that will collect and analyze data on what communications tools work and which ones don't in an effort to reach the population. The State Department and the U.S. Agency for International Development are also aiding with efforts to communicate with the Afghan population, he added.

Smith characterized the strategic communications campaign as a long-term project, but said the United States also needs to show in the one to two years "that we have started to make a real difference here."

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.