FAS

Information Operations: It Takes a Thief

01.06.17 | 1 min read | Text by Steven Aftergood

At a Senate Armed Services Committee hearing yesterday on foreign cyber threats to the U.S., there were several references to the saying that “people who live in glass houses should not throw stones.” The point, made by DNI James Clapper, was that the U.S. should not be too quick to penalize the very espionage practices that U.S. intelligence agencies rely upon, including clandestine collection of information from foreign computer networks.

But perhaps a more pertinent saying would be “It takes a thief to catch a thief.”

U.S. intelligence agencies should be well-equipped to recognize Russian cyber threats and political intervention since they have been tasked for decades to carry out comparable efforts.

A newly disclosed intelligence directive from 1999 addresses “information operations” (IO), which are defined as: “Actions taken to affect adversary information and information systems while defending one’s own information and information systems.”

“Although still evolving, the fundamental concept of IO is to integrate different activities to affect [adversary] decision making processes, information systems, and supporting information infrastructures to achieve specific objectives.”

The elements of information operations may include computer network attack, computer network exploitation, and covert action.

See Director of Central Intelligence Directive 7/3, Information Operations and Intelligence Community Related Activities, effective 01 July 1999.

The directive was declassified (in part) on December 2 by the Interagency Security Classification Appeals Panel, and was first obtained and published by GovernmentAttic.org.

publications
See all publications
FAS
Press release
The Federation of American Scientists (FAS) Voluntarily Recognizes First Employee Union in Organization’s Nearly 80 Year History

We are excited to engage in a productive and collaborative partnership with IAM, with the goal of fostering a positive and mutually beneficial working environment for all FAS employees.

08.30.24 | 2 min read
read more
Government Capacity
Report
Scaling Effective Methods across Federal Agencies: Looking Back at the Expanded Use of Incentive Prizes between 2010-2020

Incentive prizes moved from a tool used primarily outside of the federal government to one used commonly across federal agencies, due to a concerted, multi-pronged effort led by policy entrepreneurs and incentive prize practitioners in the EOP and across federal agencies, with bipartisan congressional support.

08.29.24 | 31 min read
read more
Emerging Technology
Issue Brief
Public Comment on the U.S. Artificial Intelligence Safety Institute’s Draft Document: NIST AI 800-1, Managing Misuse Risk for Dual-Use Foundation Models

NIST’s guidance on “Managing Misuse Risk for Dual-Use Foundation Models” represents a significant step forward in establishing robust practices for mitigating catastrophic risks associated with advanced AI systems.

08.28.24 | 13 min read
read more
Clean Energy
Blog
How Should FESI Work with DOE? Lessons Learned From Other Agency-Affiliated Foundations

If FESI is going to continue to receive Congressional appropriations through DOE, it should be structured from the start in a way that allows it to be as effective as possible while it receives both taxpayer dollars and private support.

08.21.24 | 14 min read
read more