Afghanistan's Taliban Reportedly Have Control Of US Biometric Devices -- A Lesson In Life-And-Death Consequences Of Data Privacy


(MENAFN- The Conversation)

In the wake of the Taliban's takeover of Kabul and the ouster of the Afghan national government in August 2021, alarming reports indicated that the insurgents had potentially accessed biometric data collected by the U.S. to track Afghans, including people who worked for U.S. and coalition forces.

Afghans who once supported the U.S. have been attempting to hide or destroy physical and digital evidence of their identities. Many Afghans fear that the identity documents and databases storing personally identifiable data could be transformed into death warrants in the hands of the Taliban, and a March 30, 2022, report from Human Rights Watch indicated the Taliban have been collecting biometric data to potentially match against captured U.S. and Afghan government databases. U.S. military devices and the data they contain have since turned up on the open market .

This data breach underscores that data protection in zones of conflict , especially biometric data and databases that connect online activity to physical locations, can be a matter of life and death. My research and the work of journalists and privacy advocates who study biometric cybersurveillance anticipated these data privacy and security risks.

Biometric-driven warfare
'First Platoon' documents the U.S. Department of Defense's effort to identify, monitor, catalog and police people in Afghanistan. courtesy penguin random house

Investigative journalist Annie Jacobsen documented the birth of biometric-driven warfare in Afghanistan following the terrorist attacks on Sept. 11, 2001, in her book“first platoon .” The U.S. Department of Defense quickly viewed biometric data and what it called“identity dominance” as the cornerstone of multiple counterterrorism and counterinsurgency strategies. Identity dominance means being able to keep track of people the military considers a potential threat regardless of aliases, and ultimately denying organizations the ability to use anonymity to hide their activities.

By 2004, thousands of U.S. military personnel had been trained to collect biometric data to support the wars in Afghanistan and Iraq. By 2007, U.S. forces were collecting biometric data primarily through mobile devices such as the biometric automated toolset (BAT) and handheld interagency identity detection equipment (HIIDE). BAT includes a laptop, fingerprint reader, iris scanner and camera. HIIDE is a single small device that incorporates a fingerprint reader, iris scanner and camera. Users of these devices can collect iris and fingerprint scans and facial photos, and match them to entries in military databases and biometric watchlists.

In addition to biometric data, the system includes biographic and contextual data such as criminal and terrorist watchlist records, enabling users to determine if an individual is flagged in the system as a suspect. Intelligence analysts can also use the system to monitor people's movements and activities by tracking biometric data recorded by troops in the field.

By 2011, a decade after 9/11, the Department of Defense maintained approximately 4.8 million biometric records of people in Afghanistan and Iraq, with about 630,000 of the records collected using HIIDE devices. Also by that time, the U.S. Army and its military partners in the Afghan government were using biometric-enabled intelligence or biometric cyberintelligence on the battlefield to identify and track insurgents.

In 2013, the U.S. Army and Marine Corps used the biometric enrollment and screening device , which enrolled the iris scans, fingerprints and digital face photos of“persons of interest” in Afghanistan. That device was replaced by the identity dominance system-marine corps in 2017, which uses a laptop with biometric data-collection sensors, known as the secure electronic enrollment kit .

Over the years, to support these military objectives, the Department of Defense aimed to create a biometric database on 80% of the afghan population , approximately 32 million people at today's population level. It is unclear how close the military came to this goal.

More data equals more people at risk

In addition to the use of biometric data by the U.S. and Afghan military for security purposes, the Department of Defense and the Afghan government eventually adopted the technologies for a range of day-to-day governmental uses. These included evidence for criminal prosecution, clearing Afghan workers for employment and election security .

In addition, the Afghan National ID system and voter registration databases contained sensitive data, including ethnicity data . The Afghan ID, the e-tazkira , is an electronic identification document that includes biometric data , which increases the privacy risks posed by Taliban access to the National ID system.


Before falling to the Taliban, the Afghan government made extensive use of biometric security, including scanning the irises of people like this woman who applied for passports. ap photo/rahmat gul

We do not yet know the extent to which the Taliban have been able to commandeer the biometric data once held by the U.S. military. One report suggested that the Taliban may not be able to access the biometric data collected through HIIDE because they lack the technical capacity to do so . However, it's possible the Taliban could turn to longtime ally Inter-Services Intelligence, Pakistan's intelligence agency, for help getting at the data. Like many national intelligence services, ISI likely has the necessary technology.

Another report indicated that the Taliban have already started to deploy a“biometrics machine” to conduct“house-to-house inspections” to identify former Afghan officials and security forces. This is consistent with prior Afghan news reports that described the Taliban subjecting bus passengers to biometric screening and using biometric data to target Afghan security forces for kidnapping and assassination.

Concerns about collecting biometric data

For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights and human rights . Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military's biometric systems. In particular, the situation raises questions about the security of the mobile biometric data-collection devices used in Afghanistan.

The data privacy and cybersecurity concerns surrounding Taliban access to U.S. and former Afghan government databases are a warning for the future. In building biometric-driven warfare technologies and protocols, it appears that the department of defense assumed the Afghan government would have the minimum level of stability needed to protect the data.

The U.S. military should assume that any sensitive data – biometric and biographical data, wiretap data and communications, geolocation data, government records – could potentially fall into enemy hands. In addition to building robust security to protect against unauthorized access, the Pentagon should use this as an opportunity to question whether it was necessary to collect the biometric data in the first instance.

Understanding the unintended consequences of the U.S. experiment in biometric-driven warfare and biometric cyberintelligence is critically important for determining whether and how the military should collect biometric information. In the case of Afghanistan, the biometric data that the U.S. military and the Afghan government had been using to track the Taliban could one day soon – if it's not already – be used by the Taliban to track Afghans who supported the U.S.

This article has been updated to include news that biometric data from Afghanistan has been sold on the open market.


The Conversation

MENAFN09012023000199003603ID1105403654


The Conversation

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Newsletter