Taliban Have Control Of US Biometric Technology

The Taliban have taken US military biometrics devices that could aid in the identification of Afghans who assisted coalition forces, current and former military. 

The devices, known as HIIDE (Handheld Interagency Identity Detection Equipment) were seized during the Taliban’s rapid takeover of Kabul following the collapse of the national Government. HIIDE devices contain identifying biometric data such as iris scans and fingerprints, as well as biographical information and are used to access large centralised databases. 

The immediate concern is that the Taliban will be able to use the biometric equipment and data  to carry out reprisals against people who worked in the US / coalition-backed regime. 

The US military has been using biometric devices for a long time in the global war on terror. And after the US withdrawal from Afghanistan, there are concerns that sensitive biometric data might be used by the Taliban, although its unknown  how much of the biometric database on the Afghan population has been compromised.

Used as a means of tracking terrorists and other insurgents, biometric data on Afghan nationals who assisted the US was also widely collected and used in identification cards.

The US have been collecting biometric data from Afghans assisting their armed forces, despite knowing the risks entailed by maintaining large databases of personal information, especially given recent cyber attacks on government agencies and private companiesAccording to sources, the Taliban are already monitoring phone calls and conducting door-to-door searches for those who worked alongside the US.

The possibility of widespread abuse of the collected data makes evading biometric scanning for the numerous Afghans at risk of reprisals vitally important.  

The Intercept:   I-HLS:    New Scientist:   SCMP:     The Verge:   

You Might Also Read:

The Taliban's Mastery Of  Information Warfare:

 

« How to Protect Your Files From Ransomware
US Tech Giants To Spend Billions On National Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

E-CQURITY (ECQ)

E-CQURITY (ECQ)

ECQ is a network security company offering offensive security services and solutions focused on active offensive and defensive positioning.