recommended reading

Kabul embassy seeks to build mobile social networks in Afghanistan

The State Departmemt wants to develop social networks in Afghanistan based on the simplest form of communications available to the population: mobile phone text messaging services.

The U.S. Embassy in Kabul issued a request for proposals on Monday for a contractor to develop text-based social networks in Afghanistan based on the country's existing mobile phone infrastructure. The embassy wants to use the services to connect groups such as farmers, educators, young people, women and community watchdog organizations.

Though Afghanistan lacks a sophisticated Internet infrastructure to support social networking sites such as Facebook, the Kabul Embassy said the country has seen an explosion in mobile phone use, from 10,000 phones in 2002 to 10 million today.

More than half of Afghan households have cell phones and a third of those who used a mobile phone in the past year sent text messages, according to the State Department's Office of Research.

Lindy Kyzer, an Army public affairs officer who helped spearhead the use of social media in the service, said she viewed the development of mobile text-based social networks in Afghanistan as a "no-brainer," noting that short message service is the most ubiquitous mobile data application in the world, with some 2.4 billion users.

Though Rear Adm. Greg Smith, strategic communications director for NATO and U.S. Forces in Afghanistan, has pushed the use of text messaging services as a means of communicating with the Afghanistan populace since he arrived in the country a year ago, Kyzer said the Kabul Embassy project is the largest text messaging project she knows of in Afghanistan.

Isaac Hazard, director of community consulting at Mzinga Inc., a Waltham, Mass-based company that sells social networking software to support marketing communications, said text messaging can serve as an effective means to build social networks in Afghanistan. He pointed to the success of Twitter, whose 140-character messages were designed to operate on mobile text message networks.

Hazard added the social networks developed in Afghanistan would allow the U.S. Embassy to gain a real breadth of knowledge of what is going on in the country and forums created as part of the networks could make it easier to resolve problems.

Embassy officials said they expect the mobile social networks to generate 80 million text messages in the first year of operation, a target Hazard viewed as somewhat ambitious. Typically, only 10 percent of any population taps into social networks, he noted. Based on the number of mobile phones in Afghanistan, achieving the embassy's goal would require social network users to send 800 text messages a year.

Paul Cegielski, spokesman for Sunnyvale, Calif-based mBlox, a text message aggregator, said the social networks the embassy wants to set up pose no technical challenge since all mobile networks have the hardware and software built in to handle text messages. Cegielski said the Afghanistan service could be run from the United States, with no need to install any hardware in Afghanistan.

The Kabul Embassy plans to hold a teleconference for interested vendors on July 12, with bids due July 30.

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.