The Times Real Estate


.

  • Written by Margaret Hu, Professor of Law and of International Affairs, Penn State

In the wake of the Taliban’s takeover of Kabul and the ouster of the Afghan national government, alarming reports[1] indicate that the insurgents could potentially access biometric data collected by the U.S. to track Afghans, including people who worked for U.S. and coalition forces.

Afghans who once supported the U.S. have been attempting to hide[2] or destroy[3] physical and digital evidence of their identities. Many Afghans fear that the identity documents[4] and databases[5] storing personally identifiable data could be transformed into death warrants[6] in the hands of the Taliban.

This potential data breach underscores that data protection in zones of conflict[7], especially biometric data and databases that connect online activity to physical locations, can be a matter of life and death. My research[8] and the work of journalists[9] and privacy advocates[10] who study biometric cybersurveillance anticipated these data privacy and security risks.

Biometric-driven warfare

Book cover showing a fingerprint superimposed over the title and an image of four soldiers ‘First Platoon’ documents the U.S. Department of Defense’s effort to identify, monitor, catalog and police people in Afghanistan. courtesy Penguin Random House[11]

Investigative journalist Annie Jacobson documented the birth of biometric-driven warfare in Afghanistan following the terrorist attacks on Sept. 11, 2001, in her book “First Platoon[12].” The Department of Defense quickly viewed biometric data and what it called “identity dominance” as the cornerstone of multiple counterterrorism and counterinsurgency strategies. Identity dominance means being able to keep track of people the military considers a potential threat regardless of aliases, and ultimately denying organizations the ability to use anonymity to hide their activities.

By 2004, thousands of U.S. military personnel had been trained to collect biometric data to support the wars in Afghanistan and Iraq. By 2007, U.S. forces were collecting biometric data primarily through mobile devices such as the Biometric Automated Toolset[13] (BAT) and Handheld Interagency Identity Detection Equipment[14] (HIIDE). BAT includes a laptop, fingerprint reader, iris scanner and camera. HIIDE is a single small device that incorporates a fingerprint reader, iris scanner and camera. Users of these devices can collect iris and fingerprint scans and facial photos, and match them to entries in military databases and biometric watchlists.

In addition to biometric data, the system includes biographic and contextual data such as criminal and terrorist watchlist records, enabling users to determine if an individual is flagged in the system as a suspect. Intelligence analysts can also use the system to monitor people’s movements and activities by tracking biometric data recorded by troops in the field.

By 2011, a decade after 9/11, the Department of Defense maintained approximately 4.8 million biometric records[15] of people in Afghanistan and Iraq, with about 630,000 of the records collected using HIIDE devices. Also by that time, the U.S. Army and its military partners in the Afghan government were using biometric-enabled intelligence[16] or biometric cyberintelligence[17] on the battlefield to identify and track insurgents.

In 2013, the U.S. Army and Marine Corps used the Biometric Enrollment and Screening Device[18], which enrolled the iris scans, fingerprints and digital face photos of “persons of interest” in Afghanistan. That device was replaced by the Identity Dominance System-Marine Corps[19] in 2017, which uses a laptop with biometric data collection sensors, known as the Secure Electronic Enrollment Kit[20].

Over the years, to support these military objectives, the Department of Defense aimed to create a biometric database on 80% of the Afghan population[21], approximately 32 million people at today’s population level. It is unclear how close the military came to this goal.

More data equals more people at risk

In addition to the use of biometric data by the U.S. and Afghan military for security purposes, the Department of Defense and the Afghan government eventually adopted the technologies for a range of day-to-day governmental uses. These included evidence[22] for criminal prosecution, clearing[23] Afghan workers for employment and election security[24].

In addition, the Afghan National ID system and voter registration databases contained sensitive data, including ethnicity data[25]. The Afghan ID, the e-Tazkira[26], is an electronic identification document that includes biometric data[27], which increases the privacy risks posed by Taliban access to the National ID system.

The Taliban reportedly have control of US biometric devices – a lesson in life-and-death consequences of data privacy Before falling to the Taliban, the Afghan government made extensive use of biometric security, including scanning the irises of people like this woman who applied for passports. AP Photo/Rahmat Gul[28]

It’s too soon after the Taliban’s return to power to know whether and to what extent the Taliban will be able to commandeer the biometric data once held by the U.S. military. One report suggested that the Taliban may not be able to access the biometric data collected through HIIDE because they lack the technical capacity to do so[29]. However, it’s possible the Taliban could turn to longtime ally Inter-Services Intelligence, Pakistan’s intelligence agency, for help getting at the data. Like many national intelligence services, ISI likely has the necessary technology.

Another report indicated that the Taliban have already started to deploy a “biometrics machine”[30] to conduct “house-to-house inspections” to identify former Afghan officials and security forces. This is consistent with prior Afghan news reports that described the Taliban subjecting bus passengers[31] to biometric screening and using biometric data to target[32] Afghan security forces for kidnapping and assassination.

[Get our best science, health and technology stories. Sign up for The Conversation’s science newsletter[33].]

Concerns about collecting biometric data

For years following 9/11, researchers, activists and policymakers raised concerns that the mass collection, storage and analysis of sensitive biometric data posed dangers to privacy rights[34] and human rights[35]. Reports of the Taliban potentially accessing U.S. biometric data stored by the military show that those concerns were not unfounded. They reveal potential cybersecurity vulnerabilities in the U.S. military’s biometric systems. In particular, the situation raises questions about the security of the mobile biometric data collection devices used in Afghanistan.

The data privacy and cybersecurity concerns surrounding Taliban access to U.S. and former Afghan government databases are a warning for the future. In building biometric-driven warfare technologies and protocols, it appears that the U.S. Department of Defense assumed[36] the Afghan government would have the minimum level of stability needed to protect the data.

The U.S. military should assume that any sensitive data[37] – biometric and biographical data, wiretap data and communications, geolocation data, government records – could potentially fall into enemy hands. In addition to building robust security to protect against unauthorized access, the Pentagon should use this as an opportunity to question whether it was necessary to collect the biometric data in the first instance.

Understanding the unintended consequences of the U.S. experiment in biometric-driven warfare and biometric cyberintelligence is critically important for determining whether and how[38] the military should collect biometric information. In the case of Afghanistan, the biometric data that the U.S. military and the Afghan government had been using to track the Taliban could one day soon – if it’s not already – be used by the Taliban to track Afghans who supported the U.S.

References

  1. ^ alarming reports (www.reuters.com)
  2. ^ hide (www.theguardian.com)
  3. ^ destroy (timesofindia.indiatimes.com)
  4. ^ documents (www.bbc.com)
  5. ^ databases (www.politico.com)
  6. ^ death warrants (www.wsj.com)
  7. ^ conflict (theconversation.com)
  8. ^ research (pennstatelaw.psu.edu)
  9. ^ journalists (anniejacobsen.com)
  10. ^ privacy advocates (dx.doi.org)
  11. ^ courtesy Penguin Random House (images4.penguinrandomhouse.com)
  12. ^ First Platoon (www.penguinrandomhouse.com)
  13. ^ Biometric Automated Toolset (www.nist.gov)
  14. ^ Handheld Interagency Identity Detection Equipment (www.nist.gov)
  15. ^ maintained approximately 4.8 million biometric records (www.gao.gov)
  16. ^ biometric-enabled intelligence (info.publicintelligence.net)
  17. ^ biometric cyberintelligence (dx.doi.org)
  18. ^ Biometric Enrollment and Screening Device (www.marcorsyscom.marines.mil)
  19. ^ Identity Dominance System-Marine Corps (www.marines.mil)
  20. ^ known as the Secure Electronic Enrollment Kit (arstechnica.com)
  21. ^ 80% of the Afghan population (www.npr.org)
  22. ^ evidence (www.fbi.gov)
  23. ^ clearing (www.afcea.org)
  24. ^ election security (www.reuters.com)
  25. ^ ethnicity data (www.politico.com)
  26. ^ e-Tazkira (www.loc.gov)
  27. ^ electronic identification document that includes biometric data (www.justice.gov)
  28. ^ AP Photo/Rahmat Gul (newsroom.ap.org)
  29. ^ lack the technical capacity to do so (theintercept.com)
  30. ^ have already started to deploy a “biometrics machine” (www.reuters.com)
  31. ^ bus passengers (pajhwok.com)
  32. ^ target (tolonews.com)
  33. ^ Sign up for The Conversation’s science newsletter (theconversation.com)
  34. ^ privacy rights (ssrn.com)
  35. ^ human rights (www.humanrightsfirst.org)
  36. ^ U.S. Department of Defense assumed (nsarchive.gwu.edu)
  37. ^ sensitive data (www.politico.com)
  38. ^ whether and how (privacyinternational.org)

Authors: Margaret Hu, Professor of Law and of International Affairs, Penn State

Read more https://theconversation.com/the-taliban-reportedly-have-control-of-us-biometric-devices-a-lesson-in-life-and-death-consequences-of-data-privacy-166465

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more