![]() Iris scans have been used in the commercial market for employee credentials and in transportation hubs such as airports to automate identity checks at document control points. The demand to make the system interoperable between agencies also likely created friction between the goals of easy and secure access to data. “Even back in 2016, it may have been the databases, rather than the devices themselves, that posed the greatest risk,” the MIT Technology Review notes. Even with recent cyber intrusions and hacks into US government databases, there was no known effort over the last few years to encrypt HIIDE data or, for that matter, any initiative to ensure the biometric data collected from Afghans was secure. The problem now is that the ABIS and HIIDE systems were designed for efficiency on the US government’s end, not data security. The Department of State also used HIIDE data in their hiring process to vet candidates for jobs at US embassies and in certain military operations. In 2011, the Government Accountability Office criticized the DOD for not sharing HIIDE data through the interagency process with the Department of Homeland Security and FBI - which would enable federal partners to identify potential criminals and terrorists. Information collected by HIIDE was considered valuable across the US government too. Senodja Sundiata-Walker, manager of the DOD’s biometrics program, called ABIS a quick way to “collect, identify, and neutralize the enemy.” Using HIIDE and other devices under the ABIS umbrella, DOD’s stated goal was to identify 80 percent of the Afghan population to help weed out terrorists and criminals. Investigative reporter and “First Platoon: A Story of Modern War in the Age of Identity Dominance” (Dutton, 2021) author Annie Jacobsen says ABIS was designed to track terrorists and other insurgents. (APPS collected around 40 pieces of data per individual, from eye scans to family trees and favorite foods.) In the Taliban’s hands, these two databases pose an equally grave threat to Afghans who worked for or assisted the US military. While the Taliban’s ability to access the HIIDE data remains in question, military experts say a potential Taliban ally - China, Pakistan, or Russia - may be able to do so.Įven worse, the MIT Technology Review reports that the US-backed Afghan government constructed two databases: its own database modeled after ABIS, and the Afghan Personnel and Pay System (APPS) - a US-funded biometric database used to pay the Afghan national army and police. The DOD also built a highly classified Automated Biometrics Identification System (ABIS), which hosted information from HIIDE and other data-collection devices.ĭue to the incredible capabilities brought about by the computing power of today’s technologies and the convenience of being able to use biometric identification in the field via HIIDE, all these data points can be cross-referenced to identify a person in minutes, if not seconds. ![]() One of the devices, known as Handheld Interagency Identity Detection Equipment (HIIDE), was deployed in 2016 to collect iris scans and fingerprints to enable quick identification of Afghan citizens and expand the aforementioned database of their information. Over the past 20 years, these devices collected information on Afghan citizens who assisted the US military, which was then sent to a Department of Defense (DOD) database. Following the United States’ withdrawal from Afghanistan, the Taliban have reportedly seized biometrics devices left behind by the US military. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |