The Times Australia
The Times World News

.

The Taliban reportedly have control of US biometric devices – a lesson in life-and-death consequences of data privacy

  • Written by Margaret Hu, Professor of Law and of International Affairs, Penn State

In the wake of the Taliban’s takeover of Kabul and the ouster of the Afghan national government, alarming reports[1] indicate that the insurgents could potentially access biometric data collected by the U.S. to track Afghans, including people who worked for U.S. and coalition forces.

Afghans who once supported the U.S. have been attempting to hide[2] or destroy[3] physical and digital evidence of their identities. Many Afghans fear that the identity documents[4] and databases[5] storing personally identifiable data could be transformed into death warrants[6] in the hands of the Taliban.

This potential data breach underscores that data protection in zones of conflict[7], especially biometric data and databases that connect online activity to physical locations, can be a matter of life and death. My research[8] and the work of journalists[9] and privacy advocates[10] who study biometric cybersurveillance anticipated these data privacy and security risks.

Biometric-driven warfare

Book cover showing a fingerprint superimposed over the title and an image of four soldiers ‘First Platoon’ documents the U.S. Department of Defense’s effort to identify, monitor, catalog and police people in Afghanistan. courtesy Penguin Random House[11]

Investigative journalist Annie Jacobson documented the birth of biometric-driven warfare in Afghanistan following the terrorist attacks on Sept. 11, 2001, in her book “First Platoon[12].” The Department of Defense quickly viewed biometric data and what it called “identity dominance” as the cornerstone of multiple counterterrorism and counterinsurgency strategies. Identity dominance means being able to keep track of people the military considers a potential threat regardless of aliases, and ultimately denying organizations the ability to use anonymity to hide their activities.

By 2004, thousands of U.S. military personnel had been trained to collect biometric data to support the wars in Afghanistan and Iraq. By 2007, U.S. forces were collecting biometric data primarily through mobile devices such as the Biometric Automated Toolset[13] (BAT) and Handheld Interagency Identity Detection Equipment[14] (HIIDE). BAT includes a laptop, fingerprint reader, iris scanner and camera. HIIDE is a single small device that incorporates a fingerprint reader, iris scanner and camera. Users of these devices can collect iris and fingerprint scans and facial photos, and match them to entries in military databases and biometric watchlists.

In addition to biometric data, the system includes biographic and contextual data such as criminal and terrorist watchlist records, enabling users to determine if an individual is flagged in the system as a suspect. Intelligence analysts can also use the system to monitor people’s movements and activities by tracking biometric data recorded by troops in the field.

By 2011, a decade after 9/11, the Department of Defense maintained approximately 4.8 million biometric records[15] of people in Afghanistan and Iraq, with about 630,000 of the records collected using HIIDE devices. Also by that time, the U.S. Army and its military partners in the Afghan government were using biometric-enabled intelligence[16] or biometric cyberintelligence[17] on the battlefield to identify and track insurgents.

In 2013, the U.S. Army and Marine Corps used the Biometric Enrollment and Screening Device[18], which enrolled the iris scans, fingerprints and digital face photos of “persons of interest” in Afghanistan. That device was replaced by the Identity Dominance System-Marine Corps[19] in 2017, which uses a laptop with biometric data collection sensors, known as the Secure Electronic Enrollment Kit[20].

Over the years, to support these military objectives, the Department of Defense aimed to create a biometric database on 80% of the Afghan population[21], approximately 32 million people at today’s population level. It is unclear how close the military came to this goal.

More data equals more people at risk

In addition to the use of biometric data by the U.S. and Afghan military for security purposes, the Department of Defense and the Afghan government eventually adopted the technologies for a range of day-to-day governmental uses. These included evidence[22] for criminal prosecution, clearing[23] Afghan workers for employment and election security[24].

In addition, the Afghan National ID system and voter registration databases contained sensitive data, including ethnicity data[25]. The Afghan ID, the e-Tazkira[26], is an electronic identification document that includes biometric data[27], which increases the privacy risks posed by Taliban access to the National ID system.

The Taliban reportedly have control of US biometric devices – a lesson in life-and-death consequences of data privacy Before falling to the Taliban, the Afghan government made extensive use of biometric security, including scanning the irises of people like this woman who applied for passports. AP Photo/Rahmat Gul[28]

It’s too soon after the Taliban’s return to power to know whether and to what extent the Taliban will be able to commandeer the biometric data once held by the U.S. military. One report suggested that the Taliban may not be able to access the biometric data collected through HIIDE because they lack the technical capacity to do so[29]. However, it’s possible the Taliban could turn to longtime ally Inter-Services Intelligence, Pakistan’s intelligence agency, for help getting at the data. Like many national intelligence services, ISI likely has the necessary technology.

Another report indicated that the Taliban have already started to deploy a “biometrics machine”[30] to conduct “house-to-house inspections” to identify former Afghan officials and security forces. This is consistent with prior Afghan news reports that described the Taliban subjecting bus passengers[31] to biometric screening and using biometric data to target[32] Afghan security forces for kidnapping and assassination.

[Get our best science, health and technology stories. Sign up for The Conversation’s science newsletter[33].]

Concerns about collecting biometric data

For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights[34] and human rights[35]. Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military’s biometric systems. In particular, the situation raises questions about the security of the mobile biometric data collection devices used in Afghanistan.

The data privacy and cybersecurity concerns surrounding Taliban access to U.S. and former Afghan government databases are a warning for the future. In building biometric-driven warfare technologies and protocols, it appears that the U.S. Department of Defense assumed[36] the Afghan government would have the minimum level of stability needed to protect the data.

The U.S. military should assume that any sensitive data[37] – biometric and biographical data, wiretap data and communications, geolocation data, government records – could potentially fall into enemy hands. In addition to building robust security to protect against unauthorized access, the Pentagon should use this as an opportunity to question whether it was necessary to collect the biometric data in the first instance.

Understanding the unintended consequences of the U.S. experiment in biometric-driven warfare and biometric cyberintelligence is critically important for determining whether and how[38] the military should collect biometric information. In the case of Afghanistan, the biometric data that the U.S. military and the Afghan government had been using to track the Taliban could one day soon – if it’s not already – be used by the Taliban to track Afghans who supported the U.S.

References

  1. ^ alarming reports (www.reuters.com)
  2. ^ hide (www.theguardian.com)
  3. ^ destroy (timesofindia.indiatimes.com)
  4. ^ documents (www.bbc.com)
  5. ^ databases (www.politico.com)
  6. ^ death warrants (www.wsj.com)
  7. ^ conflict (theconversation.com)
  8. ^ research (pennstatelaw.psu.edu)
  9. ^ journalists (anniejacobsen.com)
  10. ^ privacy advocates (dx.doi.org)
  11. ^ courtesy Penguin Random House (images4.penguinrandomhouse.com)
  12. ^ First Platoon (www.penguinrandomhouse.com)
  13. ^ Biometric Automated Toolset (www.nist.gov)
  14. ^ Handheld Interagency Identity Detection Equipment (www.nist.gov)
  15. ^ maintained approximately 4.8 million biometric records (www.gao.gov)
  16. ^ biometric-enabled intelligence (info.publicintelligence.net)
  17. ^ biometric cyberintelligence (dx.doi.org)
  18. ^ Biometric Enrollment and Screening Device (www.marcorsyscom.marines.mil)
  19. ^ Identity Dominance System-Marine Corps (www.marines.mil)
  20. ^ known as the Secure Electronic Enrollment Kit (arstechnica.com)
  21. ^ 80% of the Afghan population (www.npr.org)
  22. ^ evidence (www.fbi.gov)
  23. ^ clearing (www.afcea.org)
  24. ^ election security (www.reuters.com)
  25. ^ ethnicity data (www.politico.com)
  26. ^ e-Tazkira (www.loc.gov)
  27. ^ electronic identification document that includes biometric data (www.justice.gov)
  28. ^ AP Photo/Rahmat Gul (newsroom.ap.org)
  29. ^ lack the technical capacity to do so (theintercept.com)
  30. ^ have already started to deploy a “biometrics machine” (www.reuters.com)
  31. ^ bus passengers (pajhwok.com)
  32. ^ target (tolonews.com)
  33. ^ Sign up for The Conversation’s science newsletter (theconversation.com)
  34. ^ privacy rights (ssrn.com)
  35. ^ human rights (www.humanrightsfirst.org)
  36. ^ U.S. Department of Defense assumed (nsarchive.gwu.edu)
  37. ^ sensitive data (www.politico.com)
  38. ^ whether and how (privacyinternational.org)

Read more https://theconversation.com/the-taliban-reportedly-have-control-of-us-biometric-devices-a-lesson-in-life-and-death-consequences-of-data-privacy-166465

Times Magazine

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

From Beach Bops to Alpine Anthems: Your Sonos Survival Guide for a Long Weekend Escape

Alright, fellow adventurers and relaxation enthusiasts! So, you've packed your bags, charged your devices, and mentally prepared for that glorious King's Birthday long weekend. But hold on, are you really ready? Because a true long weekend warrior kn...

Effective Commercial Pest Control Solutions for a Safer Workplace

Keeping a workplace clean, safe, and free from pests is essential for maintaining productivity, protecting employee health, and upholding a company's reputation. Pests pose health risks, can cause structural damage, and can lead to serious legal an...

The Times Features

Duke of Dural to Get Rooftop Bar as New Owners Invest in Venue Upgrade

The Duke of Dural, in Sydney’s north-west, is set for a major uplift under new ownership, following its acquisition by hospitality group Good Beer Company this week. Led by resp...

Prefab’s Second Life: Why Australia’s Backyard Boom Needs a Circular Makeover

The humble granny flat is being reimagined not just as a fix for housing shortages, but as a cornerstone of circular, factory-built architecture. But are our systems ready to s...

Melbourne’s Burglary Boom: Break-Ins Surge Nearly 25%

Victorian homeowners are being warned to act now, as rising break-ins and falling arrest rates paint a worrying picture for suburban safety. Melbourne residents are facing an ...

Exploring the Curriculum at a Modern Junior School in Melbourne

Key Highlights The curriculum at junior schools emphasises whole-person development, catering to children’s physical, emotional, and intellectual needs. It ensures early year...

Distressed by all the bad news? Here’s how to stay informed but still look after yourself

If you’re feeling like the news is particularly bad at the moment, you’re not alone. But many of us can’t look away – and don’t want to. Engaging with news can help us make ...

The Role of Your GP in Creating a Chronic Disease Management Plan That Works

Living with a long-term condition, whether that is diabetes, asthma, arthritis or heart disease, means making hundreds of small decisions every day. You plan your diet against m...