Taliban Have Control Of US Biometric Technology

The Taliban have taken US military biometrics devices that could aid in the identification of Afghans who assisted coalition forces, current and former military. 

The devices, known as HIIDE (Handheld Interagency Identity Detection Equipment) were seized during the Taliban’s rapid takeover of Kabul following the collapse of the national Government. HIIDE devices contain identifying biometric data such as iris scans and fingerprints, as well as biographical information and are used to access large centralised databases. 

The immediate concern is that the Taliban will be able to use the biometric equipment and data  to carry out reprisals against people who worked in the US / coalition-backed regime. 

The US military has been using biometric devices for a long time in the global war on terror. And after the US withdrawal from Afghanistan, there are concerns that sensitive biometric data might be used by the Taliban, although its unknown  how much of the biometric database on the Afghan population has been compromised.

Used as a means of tracking terrorists and other insurgents, biometric data on Afghan nationals who assisted the US was also widely collected and used in identification cards.

The US have been collecting biometric data from Afghans assisting their armed forces, despite knowing the risks entailed by maintaining large databases of personal information, especially given recent cyber attacks on government agencies and private companiesAccording to sources, the Taliban are already monitoring phone calls and conducting door-to-door searches for those who worked alongside the US.

The possibility of widespread abuse of the collected data makes evading biometric scanning for the numerous Afghans at risk of reprisals vitally important.  

The Intercept:   I-HLS:    New Scientist:   SCMP:     The Verge:   

You Might Also Read:

The Taliban's Mastery Of  Information Warfare:

 

« How to Protect Your Files From Ransomware
US Tech Giants To Spend Billions On National Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.