JDN 2-16, Identity Activities
Total Page:16
File Type:pdf, Size:1020Kb
Joint Doctrine Note 2-16 Identity Activities 03 August 2016 Unclassified PREFACE 1. Scope The purpose of this joint doctrine note (JDN) is to provide guidance to plan, execute, and assess identity activities. 2. Purpose A JDN is a publication that is intended to facilitate information sharing on problems and potential solutions as a supporting effort of formal joint doctrine development and revision. It provides a short term bridging solution to potential doctrine gaps. This JDN specifically addresses how identity capabilities may be coordinated and integrated to generate effects across all phases of an operation or campaign. It supplements current joint doctrine and provides context for identity activities across the range of military operations. This document was developed using current joint doctrine, extant procedures, and existing policy guidance. This JDN does not necessarily describe a position of consensus across the joint force, but it does socialize identity activities-related information and procedures in a non- authoritative document that commanders and staffs can use, as appropriate. 3. Application The guidance in this JDN is not authoritative. If conflicts arise between the contents of this JDN and the contents of a JP, the JP will take precedence for the activities of joint forces, unless the Chairman of the Joint Chiefs of Staff provides more current and specific guidance. This JDN will, at a minimum, inform the development and revision of other JPs. KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development i Preface Intentionally Blank ii JDN X-XX TABLE OF CONTENTS EXECUTIVE SUMMARY .............................................................................................. vii CHAPTER I OVERVIEW • Introduction ................................................................................................................. I-1 • The Purpose of Identity Activities .............................................................................. I-3 • The Global Security Environment and National Security Challenges ........................ I-4 • Strategic Guidance ...................................................................................................... I-8 • The Definition Framework of Identity ...................................................................... I-11 • Identity Activities Operational Process .................................................................... I-14 CHAPTER II IDENTITY ACTIVITIES SUPPORT TO MILITARY OPERATIONS • General .......................................................................................................................II-1 • Identity Activities Throughout the Phases of Operations ..........................................II-3 • Identity Activities Support Across the Range of Military Operations .......................II-5 • Identity Activities in Operational Art and Operational Design ...............................II-12 • Intelligence Support .................................................................................................II-12 • Sharing of Identity Information, Identity Intelligence, and Department of Defense Law Enforcement Criminal Intelligence ...............................................II-16 CHAPTER III PLANNING AND ASSESSMENT • General ..................................................................................................................... III-1 • Planning Imperatives ............................................................................................... III-1 • Operational Approaches ........................................................................................... III-4 • Planning Identity Activities ..................................................................................... III-7 • Integrating Identity Activities into the Joint Planning Process .............................. III-10 • Assessment of Identity Activities .......................................................................... III-13 • Using Identity Activities to Support Operational Assessment .............................. III-15 • Organizing Identity Activities Within the Joint Force ........................................... III-16 CHAPTER IV ORGANIZATIONAL ROLES, RESPONSIBILITIES, AND COMMAND RELATIONSHIPS • General ..................................................................................................................... IV-1 • United States National Organization, Responsibilities, and Relationships ............. IV-1 • Department of Defense Organizations, Responsibilities, and Relationships ........... IV-5 • Nongovernmental Organizations ........................................................................... IV-12 • Indigenous and Surrogate Entities ......................................................................... IV-12 • Multinational Organizations .................................................................................. IV-13 iii Table of Contents CHAPTER V SPECIAL CONSIDERATIONS • General ...................................................................................................................... V-1 • Authorities................................................................................................................. V-1 • Legal and Policy Considerations .............................................................................. V-3 • Transnational and Regional Considerations ............................................................. V-9 • Multinational Operations ........................................................................................ V-12 APPENDIX A Identity Activities Support to Operational Missions ................................. A-1 B Identity Intelligence Specialized Products .................................................B-1 C Assessment Indicators for Identity Activities ............................................C-1 D Identity Attributes and Sub-Elements ....................................................... D-1 E References .................................................................................................. E-1 GLOSSARY Abbreviations and Acronyms ................................................................................ GL-1 FIGURE I-1 Categories of Identity Attributes ............................................................... I-13 I-2 Identity Activities Operational Cycle ........................................................ I-15 B-1 Sample Pre-Operation Identity Intelligence Tracking Intelligence Package ...................................................................B-2 B-2 Sample Pre-Operation Identity Intelligence Support Package ...................B-4 B-3 Sample Post-Operation Identity Intelligence Support Package .................B-5 B-4 Sample Person of Interest Packet ...............................................................B-6 B-5 Biometrics Focused Area Studies ..............................................................B-7 C-1 Example: Objective, Effects, and Indicators for Identity Information and Data (to Include Biometrics, Forensics, and Other Exploitation) .............................................................C-1 C-2 Example: Objective, Effects, and Indicators for Alien Migrant Interdiction Operations .......................................................C-3 C-3 Example: Objective, Effects, and Indicators for Base Access, Entry Control Points/Ports of Entry/Maritime Interception/ Checkpoints ................................................................................................C-3 C-4 Example: Objective, Effects, and Indicators for Census Operations .........C-4 C-5 Example: Objective, Effects, and Indicators for Civil Affairs ...................C-5 C-6 Example: Objective, Effects, and Indicators for Countering Weapons of Mass Destruction ....................................................................C-5 C-7 Example: Objective, Effects, and Indicators for Chemical, Biological, Radiological, and Nuclear Response Operations .......................................C-6 C-8 Example: Objective, Effects, and Indicators for Cordon Operations .........C-6 iv JDN X-XX Table of Contents C-9 Example: Objective, Effects, and Indicators for Counterdrug Operations .............................................................................C-7 C-10 Example: Objective, Effects, and Indicators for Counter-Improvised Explosive Device Operations .....................................................................C-7 C-11 Example: Objective, Effects, and Indicators for Combating Terrorism Operations ..................................................................................................C-8 C-12 Example: Objective, Effects, and Indicators for Counterinsurgency Operations ..................................................................................................C-8 C-13 Example: Objective, Effects, and Indicators for Countering Threat Networks ....................................................................................................C-8 C-14 Example: Objective, Effects, and Indicators for Cyberspace Operations ...............................................................................C-9 C-15 Example: Objective, Effects, and Indicators for Defense Operations ........C-9 C-16 Example: Objective, Effects, and Indicators for Detainee Operations.......C-9 C-17 Example: Objective, Effects, and Indicators for Counter-Threat Finance Operations .........................................................C-10 C-18 Example: Objective,