The Times Australia
Fisher and Paykel Appliances
The Times World News

.

The Taliban reportedly have control of US biometric devices – a lesson in life-and-death consequences of data privacy

  • Written by Margaret Hu, Professor of Law and of International Affairs, Penn State

In the wake of the Taliban’s takeover of Kabul and the ouster of the Afghan national government, alarming reports[1] indicate that the insurgents could potentially access biometric data collected by the U.S. to track Afghans, including people who worked for U.S. and coalition forces.

Afghans who once supported the U.S. have been attempting to hide[2] or destroy[3] physical and digital evidence of their identities. Many Afghans fear that the identity documents[4] and databases[5] storing personally identifiable data could be transformed into death warrants[6] in the hands of the Taliban.

This potential data breach underscores that data protection in zones of conflict[7], especially biometric data and databases that connect online activity to physical locations, can be a matter of life and death. My research[8] and the work of journalists[9] and privacy advocates[10] who study biometric cybersurveillance anticipated these data privacy and security risks.

Biometric-driven warfare

Book cover showing a fingerprint superimposed over the title and an image of four soldiers ‘First Platoon’ documents the U.S. Department of Defense’s effort to identify, monitor, catalog and police people in Afghanistan. courtesy Penguin Random House[11]

Investigative journalist Annie Jacobson documented the birth of biometric-driven warfare in Afghanistan following the terrorist attacks on Sept. 11, 2001, in her book “First Platoon[12].” The Department of Defense quickly viewed biometric data and what it called “identity dominance” as the cornerstone of multiple counterterrorism and counterinsurgency strategies. Identity dominance means being able to keep track of people the military considers a potential threat regardless of aliases, and ultimately denying organizations the ability to use anonymity to hide their activities.

By 2004, thousands of U.S. military personnel had been trained to collect biometric data to support the wars in Afghanistan and Iraq. By 2007, U.S. forces were collecting biometric data primarily through mobile devices such as the Biometric Automated Toolset[13] (BAT) and Handheld Interagency Identity Detection Equipment[14] (HIIDE). BAT includes a laptop, fingerprint reader, iris scanner and camera. HIIDE is a single small device that incorporates a fingerprint reader, iris scanner and camera. Users of these devices can collect iris and fingerprint scans and facial photos, and match them to entries in military databases and biometric watchlists.

In addition to biometric data, the system includes biographic and contextual data such as criminal and terrorist watchlist records, enabling users to determine if an individual is flagged in the system as a suspect. Intelligence analysts can also use the system to monitor people’s movements and activities by tracking biometric data recorded by troops in the field.

By 2011, a decade after 9/11, the Department of Defense maintained approximately 4.8 million biometric records[15] of people in Afghanistan and Iraq, with about 630,000 of the records collected using HIIDE devices. Also by that time, the U.S. Army and its military partners in the Afghan government were using biometric-enabled intelligence[16] or biometric cyberintelligence[17] on the battlefield to identify and track insurgents.

In 2013, the U.S. Army and Marine Corps used the Biometric Enrollment and Screening Device[18], which enrolled the iris scans, fingerprints and digital face photos of “persons of interest” in Afghanistan. That device was replaced by the Identity Dominance System-Marine Corps[19] in 2017, which uses a laptop with biometric data collection sensors, known as the Secure Electronic Enrollment Kit[20].

Over the years, to support these military objectives, the Department of Defense aimed to create a biometric database on 80% of the Afghan population[21], approximately 32 million people at today’s population level. It is unclear how close the military came to this goal.

More data equals more people at risk

In addition to the use of biometric data by the U.S. and Afghan military for security purposes, the Department of Defense and the Afghan government eventually adopted the technologies for a range of day-to-day governmental uses. These included evidence[22] for criminal prosecution, clearing[23] Afghan workers for employment and election security[24].

In addition, the Afghan National ID system and voter registration databases contained sensitive data, including ethnicity data[25]. The Afghan ID, the e-Tazkira[26], is an electronic identification document that includes biometric data[27], which increases the privacy risks posed by Taliban access to the National ID system.

The Taliban reportedly have control of US biometric devices – a lesson in life-and-death consequences of data privacy Before falling to the Taliban, the Afghan government made extensive use of biometric security, including scanning the irises of people like this woman who applied for passports. AP Photo/Rahmat Gul[28]

It’s too soon after the Taliban’s return to power to know whether and to what extent the Taliban will be able to commandeer the biometric data once held by the U.S. military. One report suggested that the Taliban may not be able to access the biometric data collected through HIIDE because they lack the technical capacity to do so[29]. However, it’s possible the Taliban could turn to longtime ally Inter-Services Intelligence, Pakistan’s intelligence agency, for help getting at the data. Like many national intelligence services, ISI likely has the necessary technology.

Another report indicated that the Taliban have already started to deploy a “biometrics machine”[30] to conduct “house-to-house inspections” to identify former Afghan officials and security forces. This is consistent with prior Afghan news reports that described the Taliban subjecting bus passengers[31] to biometric screening and using biometric data to target[32] Afghan security forces for kidnapping and assassination.

[Get our best science, health and technology stories. Sign up for The Conversation’s science newsletter[33].]

Concerns about collecting biometric data

For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights[34] and human rights[35]. Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military’s biometric systems. In particular, the situation raises questions about the security of the mobile biometric data collection devices used in Afghanistan.

The data privacy and cybersecurity concerns surrounding Taliban access to U.S. and former Afghan government databases are a warning for the future. In building biometric-driven warfare technologies and protocols, it appears that the U.S. Department of Defense assumed[36] the Afghan government would have the minimum level of stability needed to protect the data.

The U.S. military should assume that any sensitive data[37] – biometric and biographical data, wiretap data and communications, geolocation data, government records – could potentially fall into enemy hands. In addition to building robust security to protect against unauthorized access, the Pentagon should use this as an opportunity to question whether it was necessary to collect the biometric data in the first instance.

Understanding the unintended consequences of the U.S. experiment in biometric-driven warfare and biometric cyberintelligence is critically important for determining whether and how[38] the military should collect biometric information. In the case of Afghanistan, the biometric data that the U.S. military and the Afghan government had been using to track the Taliban could one day soon – if it’s not already – be used by the Taliban to track Afghans who supported the U.S.

References

  1. ^ alarming reports (www.reuters.com)
  2. ^ hide (www.theguardian.com)
  3. ^ destroy (timesofindia.indiatimes.com)
  4. ^ documents (www.bbc.com)
  5. ^ databases (www.politico.com)
  6. ^ death warrants (www.wsj.com)
  7. ^ conflict (theconversation.com)
  8. ^ research (pennstatelaw.psu.edu)
  9. ^ journalists (anniejacobsen.com)
  10. ^ privacy advocates (dx.doi.org)
  11. ^ courtesy Penguin Random House (images4.penguinrandomhouse.com)
  12. ^ First Platoon (www.penguinrandomhouse.com)
  13. ^ Biometric Automated Toolset (www.nist.gov)
  14. ^ Handheld Interagency Identity Detection Equipment (www.nist.gov)
  15. ^ maintained approximately 4.8 million biometric records (www.gao.gov)
  16. ^ biometric-enabled intelligence (info.publicintelligence.net)
  17. ^ biometric cyberintelligence (dx.doi.org)
  18. ^ Biometric Enrollment and Screening Device (www.marcorsyscom.marines.mil)
  19. ^ Identity Dominance System-Marine Corps (www.marines.mil)
  20. ^ known as the Secure Electronic Enrollment Kit (arstechnica.com)
  21. ^ 80% of the Afghan population (www.npr.org)
  22. ^ evidence (www.fbi.gov)
  23. ^ clearing (www.afcea.org)
  24. ^ election security (www.reuters.com)
  25. ^ ethnicity data (www.politico.com)
  26. ^ e-Tazkira (www.loc.gov)
  27. ^ electronic identification document that includes biometric data (www.justice.gov)
  28. ^ AP Photo/Rahmat Gul (newsroom.ap.org)
  29. ^ lack the technical capacity to do so (theintercept.com)
  30. ^ have already started to deploy a “biometrics machine” (www.reuters.com)
  31. ^ bus passengers (pajhwok.com)
  32. ^ target (tolonews.com)
  33. ^ Sign up for The Conversation’s science newsletter (theconversation.com)
  34. ^ privacy rights (ssrn.com)
  35. ^ human rights (www.humanrightsfirst.org)
  36. ^ U.S. Department of Defense assumed (nsarchive.gwu.edu)
  37. ^ sensitive data (www.politico.com)
  38. ^ whether and how (privacyinternational.org)

Read more https://theconversation.com/the-taliban-reportedly-have-control-of-us-biometric-devices-a-lesson-in-life-and-death-consequences-of-data-privacy-166465

Times Magazine

Can bigger-is-better ‘scaling laws’ keep AI improving forever? History says we can’t be too sure

OpenAI chief executive Sam Altman – perhaps the most prominent face of the artificial intellig...

A backlash against AI imagery in ads may have begun as brands promote ‘human-made’

In a wave of new ads, brands like Heineken, Polaroid and Cadbury have started hating on artifici...

Home batteries now four times the size as new installers enter the market

Australians are investing in larger home battery set ups than ever before with data showing the ...

Q&A with Freya Alexander – the young artist transforming co-working spaces into creative galleries

As the current Artist in Residence at Hub Australia, Freya Alexander is bringing colour and creativi...

This Christmas, Give the Navman Gift That Never Stops Giving – Safety

Protect your loved one’s drives with a Navman Dash Cam.  This Christmas don’t just give – prote...

Yoto now available in Kmart and The Memo, bringing screen-free storytelling to Australian families

Yoto, the kids’ audio platform inspiring creativity and imagination around the world, has launched i...

The Times Features

Why the Mortgage Industry Needs More Women (And What We're Actually Doing About It)

I've been in fintech and the mortgage industry for about a year and a half now. My background is i...

Inflation jumps in October, adding to pressure on government to make budget savings

Annual inflation rose[1] to a 16-month high of 3.8% in October, adding to pressure on the govern...

Transforming Addiction Treatment Marketing Across Australasia & Southeast Asia

In a competitive and highly regulated space like addiction treatment, standing out online is no sm...

Aiper Scuba X1 Robotic Pool Cleaner Review: Powerful Cleaning, Smart Design

If you’re anything like me, the dream is a pool that always looks swimmable without you having to ha...

YepAI Emerges as AI Dark Horse, Launches V3 SuperAgent to Revolutionize E-commerce

November 24, 2025 – YepAI today announced the launch of its V3 SuperAgent, an enhanced AI platf...

What SMEs Should Look For When Choosing a Shared Office in 2026

Small and medium-sized enterprises remain the backbone of Australia’s economy. As of mid-2024, sma...

Anthony Albanese Probably Won’t Lead Labor Into the Next Federal Election — So Who Will?

As Australia edges closer to the next federal election, a quiet but unmistakable shift is rippli...

Top doctors tip into AI medtech capital raise a second time as Aussie start up expands globally

Medow Health AI, an Australian start up developing AI native tools for specialist doctors to  auto...

Record-breaking prize home draw offers Aussies a shot at luxury living

With home ownership slipping out of reach for many Australians, a growing number are snapping up...