Intelligence: Fingerprinting Good

Archives

October 1, 2010: Another powerful intelligence weapon has been moved to Afghanistan from Iraq. In the next seven months, U.S. and NATO forces will help collect biometric (fingerprints, iris scan and photo) data on 1.65 million Afghans, and provide that data to the Afghan government for new ID cards. For the government, this will make it more difficult for criminals, Taliban and Islamic radicals in general to infiltrate the government, or just operate freely. The U.S. has already been collecting biometric from those they arrest, or otherwise encounter and want to positively identify. This database already has over 400,000 people in it. This data makes it easier to figure who is naughty and who is not.

All this began during the war in Iraq. Early on in the war on terror, the Department of Defense adopted many practices that major police departments had long employed. One of the more useful techniques is biometrics. That is, every time the troops encounter a "person of interest", they don't just take their name and address, they also use portable electronic tools to take fingerprints, a eye (iris) scan and photos. All this is stored in a database, which eventually contained hundreds of thousands of records for Iraqis, Afghans, and other "persons of interest".

The fingerprints are particularly useful, because when they are stored electronically, you can search and find out immediately if the print you have just lifted from somewhere else, like off the fragment of a car bomb, is in there or not. The digital photos, from several angles, are also useful, because these pictures are run through software that creates a numeric "ID" that can be used by security cameras to look for some one specific, or for finding someone from a witness description. Other nations are digitizing their mug shots, and this enables these people to be quickly checked against those in the American database.

For decades, the U.S. military has regularly collected huge amounts of information from accidents, or even combat encounters. So now, it's no surprise that forensics teams examine each bombing (car or roadside) and combat scene, to see if they can get fingerprints. Often bomb makers are found this way, because raids frequently encounter suspicious characters, but no evidence that can lock them up.

It only takes about two minutes per subject to take the biometric data, so any suspicious characters are added to the database. Now, after several years of this, raiding parties know to grab any guy who seems to panic at the sight of the biometrics equipment coming out. The terrorists know that biometrics is bad news for them, and they fear it.

Combat troops now get training on how to use the biometrics gear, and everyone now accepts that this stuff is a powerful weapon in the war against terrorists. Shifting this expertise to creating very difficult-to-fake Ids is not a large leap.

 

 

 

X

ad

Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close