FAS

Information Operations: It Takes a Thief

01.06.17 | 1 min read | Text by Steven Aftergood

At a Senate Armed Services Committee hearing yesterday on foreign cyber threats to the U.S., there were several references to the saying that “people who live in glass houses should not throw stones.” The point, made by DNI James Clapper, was that the U.S. should not be too quick to penalize the very espionage practices that U.S. intelligence agencies rely upon, including clandestine collection of information from foreign computer networks.

But perhaps a more pertinent saying would be “It takes a thief to catch a thief.”

U.S. intelligence agencies should be well-equipped to recognize Russian cyber threats and political intervention since they have been tasked for decades to carry out comparable efforts.

A newly disclosed intelligence directive from 1999 addresses “information operations” (IO), which are defined as: “Actions taken to affect adversary information and information systems while defending one’s own information and information systems.”

“Although still evolving, the fundamental concept of IO is to integrate different activities to affect [adversary] decision making processes, information systems, and supporting information infrastructures to achieve specific objectives.”

The elements of information operations may include computer network attack, computer network exploitation, and covert action.

See Director of Central Intelligence Directive 7/3, Information Operations and Intelligence Community Related Activities, effective 01 July 1999.

The directive was declassified (in part) on December 2 by the Interagency Security Classification Appeals Panel, and was first obtained and published by GovernmentAttic.org.

publications
See all publications
Emerging Technology
day one project
Policy Memo
Ready for the Next Threat: Creating a Commercial Public Health Emergency Payment System

In anticipation of future known and unknown health security threats, including new pandemics, biothreats, and climate-related health emergencies, our answers need to be much faster, cheaper, and less disruptive to other operations.

12.23.24 | 5 min read
read more
Emerging Technology
day one project
Policy Memo
From Strategy to Impact: Establishing an AI Corps to Accelerate HHS Transformation

To unlock the full potential of artificial intelligence within the Department of Health and Human Services, an AI Corps should be established, embedding specialized AI experts within each of the department’s 10 agencies.

12.23.24 | 10 min read
read more
Government Capacity
day one project
Policy Memo
Transforming the Carceral Experience: Leveraging Technology for Rehabilitation

Investing in interventions behind the walls is not just a matter of improving conditions for incarcerated individuals—it is a public safety and economic imperative. By reducing recidivism through education and family contact, we can improve reentry outcomes and save billions in taxpayer dollars.

12.20.24 | 7 min read
read more
Emerging Technology
day one project
Policy Memo
Creating a National Exposome Project

The U.S. government should establish a public-private National Exposome Project (NEP) to generate benchmark human exposure levels for the ~80,000 chemicals to which Americans are regularly exposed.

12.20.24 | 7 min read
read more