Taliban Have Control Of US Biometric Technology

The Taliban have taken US military biometrics devices that could aid in the identification of Afghans who assisted coalition forces, current and former military. 

The devices, known as HIIDE (Handheld Interagency Identity Detection Equipment) were seized during the Taliban’s rapid takeover of Kabul following the collapse of the national Government. HIIDE devices contain identifying biometric data such as iris scans and fingerprints, as well as biographical information and are used to access large centralised databases. 

The immediate concern is that the Taliban will be able to use the biometric equipment and data  to carry out reprisals against people who worked in the US / coalition-backed regime. 

The US military has been using biometric devices for a long time in the global war on terror. And after the US withdrawal from Afghanistan, there are concerns that sensitive biometric data might be used by the Taliban, although its unknown  how much of the biometric database on the Afghan population has been compromised.

Used as a means of tracking terrorists and other insurgents, biometric data on Afghan nationals who assisted the US was also widely collected and used in identification cards.

The US have been collecting biometric data from Afghans assisting their armed forces, despite knowing the risks entailed by maintaining large databases of personal information, especially given recent cyber attacks on government agencies and private companiesAccording to sources, the Taliban are already monitoring phone calls and conducting door-to-door searches for those who worked alongside the US.

The possibility of widespread abuse of the collected data makes evading biometric scanning for the numerous Afghans at risk of reprisals vitally important.  

The Intercept:   I-HLS:    New Scientist:   SCMP:     The Verge:   

You Might Also Read:

The Taliban's Mastery Of  Information Warfare:

 

« How to Protect Your Files From Ransomware
US Tech Giants To Spend Billions On National Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.