An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

News | Aug. 20, 2025

Internet of Behavior has implications for DLA supply chain security

DLA Public Affairs

A Defense Logistics Agency paper warns that while the "Internet of Behavior" offers potential for supply chain security, its use must be exercised with intention.

In “Internet of Behavior and Digital Dust: Implications for Supply Chain Security and Mission Assurance,” Katherine Meadows, who recently departed the agency, details how collection and analysis of data about human or company behavior can identify risks and provide early warning signals in contested logistics environments. (The link above requires a DLA common access card to view)

The Internet of Behavior draws from social media, internet-connected devices, communication patterns and purchasing behaviors to identify patterns of concern, such as financial stress or foreign influence. Meadows argues that this data can enable preemptive decisions and dynamic adaptation in operational theaters.

The paper highlights potential risks, as Meadows cautions against excessive monitoring of trusted partners. She notes there is ultimately a threshold crossed that could lead to misuse or misinterpretation of commercial data. Adversarial targeting and behavioral spoofing could also lead to adversaries using the same techniques and data as DLA.

The paper stresses the importance of addressing ethical implications related to personally identifiable information and the need for clear leadership to integrate strategic information.

"Leaders are left overwhelmed by data that merely informs but does not provide the necessary knowledge or perception for practical decisions," Meadows writes.

The paper emphasizes that national defense depends on the principles guiding the collection and use of data, advocating for policies that balance threat detection with civil liberties and constitutional norms.

Editor’s Note: NIPRGPT contributed to this story before a formal editorial review.