English | دری

Afghanistan to begin electronic ID card distribution next month

in Afghan Business

Afghanistan to begin electronic ID card distribution next month

 ID-cardsAfghan officials have announced that the distribution of electronic ID cards would begin next month.

The purpose of the electronic ID cards is to ensure transparency in the voting process, as all voters would be legitimately registered.

According to the Deputy Interior Minister Gen. Abdul Rahman Rahman, 400 teams are appointed nationwide to manage the distribution of the cards.

Currently Afghan identity cards are issued on a piece of paper which can easily be forged.

According to reports a number of foreign nationals specifically from the neighboring countries have been given Afghan identity cards; however, Afghan officials say that act of forgery and distribution of identity cards to foreigners will be prevented once the distribution of electronic identity cards are implemented.

Officials said that the new ID cards are expected to be distributed over a period of three years, a process that will cost $121 million and employ thousands of people.

“The registration process starts next month. We are fully prepared to distribute electronic ID cards to an estimated 30 million people,” said Masoom Farhad, head of the Computerized ID Card Distribution Department at the Ministry of Interior.

But Farhad said only $5 million has been allocated for his department in the 1392 (2013-14) budget, which is not enough.

“For next year, only $5 million has been allocated for distribution of ID cards, while nearly $121 million is required to distribute ID cards for 28 million people,” he added.

Some of the current election challenges and a lack of precise demographic stats are expected to be tackled after the distribution of these ID cards.

Tags assigned to this article:
Afghan electionAfghan ID cards

Related Articles

IMF to release $6.2mn under Extended Credit Facility for Afghanistan

The Executive Board of the International Monetary Fund (IMF) completed the first review of the arrangement under the Extended Credit

Herat hosts conference on saffron cultivation

Afghanistan’s leading province in saffron cultivation, Herat, is currently hosting a 3-day conference on saffron cultivation. The conference is attended

Uplift projects to be launched soon in Helmand

Work on the construction of three projects that had been delayed several times would be launched soon in southern Helmand

1 comment

Write a comment
  1. jawid baktash
    jawid baktash 5 March, 2013, 18:43

    2. eID Process

    E-authentication begins with registration. An applicant applies to a Registration Authority (RA) to become a subscriber of a Credential Service Provider (CSP) and, as a subscriber, is issued or registers a secret, called a token (password, cryptographic key) , and a credential that binds the token to a name and possibly other attributes that the RA has verified. The token and credential may be used in subsequent authentication events.
    To authenticate a user with eID, an online service triggers the client software through a browser plugin and hands over to the eID server to execute the process depicted in
    Figure 2:

    1. Authentication request: The service requests eID data of the user from its associated eID server.
    2. Display of authorization: The eID client receives and displays information about the service and its authorization certificate.
    3. PIN entry: After reviewing the service information and optionally, further restricting the authorization, the user enters her eID PIN to express con-sent. This PIN is used locally to execute the PACE protocol
    4. Extended Access Control: Mediated by the client, the eID server and the ID card authenticate each other and establish a trusted channel.
    5. Use of eID function: The eID server reads the subset eID data according to the effective authorization.
    6. Authentication response: The eID server forwards the received eID data to the service provider.
    After this process, control returns to the service, which uses the authentication result for its purpos

    Reply this comment

Write a Comment

Your e-mail address will not be published.
Required fields are marked*