FAS

Knowing the Enemy: DoD Identity Activities

08.23.16 | 3 min read | Text by Steven Aftergood

The Department of Defense is devoting increased attention to what it calls “identity activities,” which seek to identify individuals who may pose a threat on or off the battlefield.

“Identity activities are a collection of functions and actions that appropriately recognize and differentiate one person or persona from another person or persona to support decision making,” according to a new DoD publication on the subject.

“Establishing and characterizing the identity of persons of interest, known adversaries, and other relevant actors across time and space is an operational imperative that improves a commander’s full understanding of the OE [operational environment].” See Identity Activities, Joint Doctrine Note 2-16, August 3, 2016, Unclassified.

The growing need to identify individual adversaries corresponds to the rise of anonymous, dispersed and concealed threats, DoD said. “Global disorder is increasing while the comparative US military advantage has begun to erode.”

“Because VEOs [violent extremist organizations] and TCOs [transnational criminal organizations] prefer to conduct operations by, with and through the populace, while maintaining a level of anonymity by blending in, employment of identity activities to separate adversaries from civilians and assist in positively identifying threat actors and their networks increases in significance.”

Paradoxically, identity is not a constant. “Identity is not static…. [It] is the culmination of multiple aspects of an entity’s characteristics, attributes, activities, reputation, knowledge, and judgments — all of which are constantly evolving.”

Accordingly, collection of a range of identity-related data is desired, including biographical, biological, behavioral, and reputational information.

“The breadth of identity information, if analyzed and navigated expertly, can be used confidently to make positive identifications across time and space, identify and assess patterns and anomalies, and better anticipate the capability and intent of actors of interest,” the DoD document said.

Once acquired, such data is retained for future reference.

“While some identity information (e.g., attributes contained on an identity credential) can be used immediately at the point of collection, most collected data and materials are sent to authoritative data repositories or local, regional, or reachback facilities or laboratories for appropriate processing and exploitation.”

The potential for misuse of this data was not explicitly addressed, but identity activities are likely to encounter legal and policy barriers, DoD acknowledged.

These barriers include US statutory limitations on the collection of information regarding US persons, as well as foreign laws affecting DoD operations abroad. “HN [host nation] law governing an individual’s right to privacy could significantly affect how and what identity activities can be employed during a military operation; limiting certain uses, requiring specific handling conditions for identity information, and/or restricting the means of collection.”

“Identity activities” is a new term in the DoD lexicon, and it does not appear in the latest (February 2016) edition of the official DoD dictionary (although “identity intelligence,” one of its components, is listed).

The rise of identity activities is presented as a DoD response to the changing security threat environment.

“As conflicts continue to become more irregular and asymmetric in nature, the need to identify, deter, deny, and degrade an adversary’s mobility, anonymity, and access to the populace and enabling resources increases in significance,” the DoD document said.

publications
See all publications
Clean Energy
Report
Report: When Ambition Meets Reality — Lessons Learned in Federal Clean Energy Implementation, and a Path Forward

In a new report, we begin to address these fundamental implementation questions based on discussions with over 80 individuals – from senior political staff to individual project managers – involved in the execution of major clean energy programs through the Department of Energy (DOE).

11.19.25 | 6 min read
read more
Environment
Public Comment
Position on Regional Leadership in Wildland Fire Research Act

FAS supports the bipartisan Regional Leadership in Wildland Fire Research Act under review in the House, just as we supported the earlier Senate version. Rep. David Min (D-CA) and Rep. Gabe Evans (R-CO) are leading the bill.

11.19.25 | 1 min read
read more
Environment
Public Comment
Re: Request for Information on Technology Roadmap To Increase Wildfire Firefighting Capabilities

The current wildfire management system is inadequate in the face of increasingly severe and damaging wildfires. Change is urgently needed

11.18.25 | 7 min read
read more
Government Capacity
Blog
If We’ve Learned Anything It is that Learning Agendas Bring Evidence into Policymaking

While it seems that the current political climate may not incentivize the use of evidence-based data sources for decision making, those of us who are passionate about ensuring results for the American people will continue to firmly stand on the belief that learning agendas are a crucial component to successfully navigate a changing future.

11.17.25 | 9 min read
read more