FAS

Information Operations: It Takes a Thief

01.06.17 | 1 min read | Text by Steven Aftergood

At a Senate Armed Services Committee hearing yesterday on foreign cyber threats to the U.S., there were several references to the saying that “people who live in glass houses should not throw stones.” The point, made by DNI James Clapper, was that the U.S. should not be too quick to penalize the very espionage practices that U.S. intelligence agencies rely upon, including clandestine collection of information from foreign computer networks.

But perhaps a more pertinent saying would be “It takes a thief to catch a thief.”

U.S. intelligence agencies should be well-equipped to recognize Russian cyber threats and political intervention since they have been tasked for decades to carry out comparable efforts.

A newly disclosed intelligence directive from 1999 addresses “information operations” (IO), which are defined as: “Actions taken to affect adversary information and information systems while defending one’s own information and information systems.”

“Although still evolving, the fundamental concept of IO is to integrate different activities to affect [adversary] decision making processes, information systems, and supporting information infrastructures to achieve specific objectives.”

The elements of information operations may include computer network attack, computer network exploitation, and covert action.

See Director of Central Intelligence Directive 7/3, Information Operations and Intelligence Community Related Activities, effective 01 July 1999.

The directive was declassified (in part) on December 2 by the Interagency Security Classification Appeals Panel, and was first obtained and published by GovernmentAttic.org.

publications
See all publications
Government Capacity
day one project
Policy Memo
A Digital Public Infrastructure Act Should Be America’s Next Public Works Project

Congress must enact a Digital Public Infrastructure Act, a recognition that the government’s most fundamental responsibility in the digital era is to provide a solid, trustworthy foundation upon which people, businesses, and communities can build.

12.08.25 | 18 min read
read more
Government Capacity
day one project
Policy Memo
Increasing the Value of Federal Investigator-Initiated Research through Agency Impact Goals

To increase the real and perceived benefit of research funding, funding agencies should develop challenge goals for their extramural research programs focused on the impact portion of their mission.

12.04.25 | 11 min read
read more
Education & Workforce
day one project
Policy Memo
Privacy-Preserving Research Models Essential for Large Scale Education R&D Infrastructure

Without trusted mechanisms to ensure privacy while enabling secure data access, essential R&D stalls, educational innovation stalls, and U.S. global competitiveness suffers.

12.02.25 | 6 min read
read more
Global Risk
Report
A Guide to Satellite Imagery Analysis for the Nuclear Age – Assessing China’s CFR-600 Reactor Facility

Satellite imagery has long served as a tool for observing on-the-ground activity worldwide, and offers especially valuable insights into the operation, development, and physical features related to nuclear technology.

12.01.25 | 1 min read
read more