Taliban Have Control Of US Biometric Technology

The Taliban have taken US military biometrics devices that could aid in the identification of Afghans who assisted coalition forces, current and former military. 

The devices, known as HIIDE (Handheld Interagency Identity Detection Equipment) were seized during the Taliban’s rapid takeover of Kabul following the collapse of the national Government. HIIDE devices contain identifying biometric data such as iris scans and fingerprints, as well as biographical information and are used to access large centralised databases. 

The immediate concern is that the Taliban will be able to use the biometric equipment and data  to carry out reprisals against people who worked in the US / coalition-backed regime. 

The US military has been using biometric devices for a long time in the global war on terror. And after the US withdrawal from Afghanistan, there are concerns that sensitive biometric data might be used by the Taliban, although its unknown  how much of the biometric database on the Afghan population has been compromised.

Used as a means of tracking terrorists and other insurgents, biometric data on Afghan nationals who assisted the US was also widely collected and used in identification cards.

The US have been collecting biometric data from Afghans assisting their armed forces, despite knowing the risks entailed by maintaining large databases of personal information, especially given recent cyber attacks on government agencies and private companiesAccording to sources, the Taliban are already monitoring phone calls and conducting door-to-door searches for those who worked alongside the US.

The possibility of widespread abuse of the collected data makes evading biometric scanning for the numerous Afghans at risk of reprisals vitally important.  

The Intercept:   I-HLS:    New Scientist:   SCMP:     The Verge:   

You Might Also Read:

The Taliban's Mastery Of  Information Warfare:

 

« How to Protect Your Files From Ransomware
US Tech Giants To Spend Billions On National Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.