INFORMATION OPERATIONS AND INTELLIGENCE COMMUNITY RELATED ACTIVITIES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
00574967
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
9
Document Creation Date: 
March 9, 2023
Document Release Date: 
August 4, 2020
Sequence Number: 
Case Number: 
F-2014-02257
Publication Date: 
July 1, 1999
File: 
AttachmentSize
PDF icon INFORMATION OPERATIONS AN[15812647].pdf398.15 KB
Body: 
DIRECTOR O CENTRAL INTELLIGENCE DIRApprOVed for Release: 2020/08/03 C00574967 ' TOP SECRET!, WOFORNI/X1 (b)(3) L.DO� (b)(3) (b)(3) DIRECTOR OF CENTRAL INTELLIGENCE DI CTIVE 7/3 INFORMATION OPERATIONS AND INTELLIGENCE C MUNITY RELATED ACTIVITIES (U) (Effective 01 July 1999) 1. REFERENCES. a) (U) DCID 5/1, "Espionage and Counterintelligence ivities Abroad," 19 Dec 1984 b) (U) NSCID 5, "U.S. Espionage and Counterintell ence Activities Abroad," 19 Dec 1984 c) (U) NSCID 6, "Signals Intelligence," 17 Feb e72 d) (U) NSD 42, "National Policy for the Sec rity of National Security Telecommunications and Information Systems," 05 Jul 1990 e) (U) Presidential Decision Directive/SC-63 (PDD-63), "Critical Infrastructure Protection," 22 May 1998 f) (U) Memorandum of Agreeme ion Oversight Board for Private Sector Relationships, 05 Jun 1998 g) (U) Charter of the Nation Special Communications Working Group (NSCWG), 07 Jan 1997 h) (U) Memorandum of/Agreement concerning Deconfliction of Computer Network Operations (CNO), Olhul 1999 i) (U) Charter of th Bilateral Information Operations Steering Group (BIOSG), 14 Apr 1998 j) (U) DCID 5/ "Intelligence Disclosure Policy," 30 Jun 1998 k) (U) Natio 1 Security Act (NSA) of 1947, as amended 1) (U) Titl 10, U.S. Code (Armed Forces) m) (U) OA Between DoD and the IC Regarding the Information Operations Technology Center (IOTC), 04 Mar 1997 n) (U) Concept of Operations (CONOP) for the Information Operations Technology Center (IOTC), 04 Mar 1997 1 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 DIRECTOR OF CENTRAL INTELLIGENCE DmApproved for Release: 2020/08/03 C00574967 (b)(3) o) (U) Title 50, U.S. Code 2. PURPOSE. (U) This directive sets forth the responsibilities of Intelligence Community (IC) components in t conduct and coordination of: � (U) Information Operations (JO), � (U) Intelligence and related support to JO, and � (U//52e15) Deconfliction of specific computer network operations (CNO) co ucted by National Foreign Intelligence Program (NFIP) agencies. 3. AUTHORITIES. (SIAN?) This DCID does not affect the authorities, responsibilities, and r trictions relating to components of the IC and the Department of Defense (DoD) that are set out in exis)fig statutes, executive orders, and policy directives such as Presidential Decision Directives (PDDs), Itional Security Council Intelligence Directives (NSCIDs), and other DCIDs, in particular the requirem ts under reference (a) for coordination of espionage and counterintelligence activities abroad. This DC clarifies the DCI authorities under which IC elements may carry out computer network attack (CNA) a computer network exploitation (CNE) using NFIP funds. 4. DEFINITIONS. A. (U/T.,0140) The definition of information operati, ns (I0) is: "Actions taken to affect adversary information and information systems while defen tng one's own information and information systems." B. (UHEOWIT Information Operations is an integrating strategy. Although still evolving, the fundamental concept of JO is to integrate different activipes to affect decision making processes, information systems, and supporting information infrastructures4 achieve specific objectives, as well as to protect and defend friendly information and information inyastructures. IC JO-related activities include CNE and other supporting intelligence activities. 5. DISCUSSION. A. (UHF.C*115). The concept of)nformation Operations (JO) emerged against the backdrop of the explosive growth of information technojggy. JO has made use of electronic warfare (EW), psychological operations (PSYOP), military deceptiol, operational security (OPSEC), and physical destruction. The rapid spread of computers and computer *works has led to their inclusion as instruments for attacking and influencing information infrastructu B. (U//F-015.0) Comp 1 ter network operations (CNO) comprises computer network exploitation (CNE) -- denoting a broad r. ge of intelligence collection activity; computer network attack (CNA) -- denoting attacks on compu r systems and networks; and computer network defense (CND) -- denoting actions taken to protect U.S. c:mputer systems and networks and possibly those of allies and coalition partners. CNE is an intelligenc ollection activity and, while not viewed as an integral pillar of DoD JO doctrine, it is recognized as an 10-related activity that requires deconfliction with JO. There are interdependencies and relationships among CNE, CNA, CND, and other IC activities in support of JO which may require mechanisms to ensure proper deconfliction or coordination among those NFIP funded IC elements that engage in these activities. 2 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 DIRECTOR 01E CENTRAL INTELLIGENCE DIRApprOved for Release: 2020/08/03 C00574967 (b)(3) C. (15//F.Gt70) IC JO activities include conducting, with proper authorization, covert action, including CNA. IC elements authorized to conduct CNA under DCI authorities in peacetime will be specified b a Presidential Finding. D. (W/E01165.IC JO-related activities include: � (U) Collecting, processing, analyzing, and disseminating foreign intelligence and c nterintelligence on JO. � OConducting CNE, in accordance with the authorities described in referenc (b) and (c). � (U) Supporting other U.S. government organizations in the conduct of their missions. � (U) Ensuring effective warning and defense against JO. � (U) Performing computer network defense (CND) activities commensur e with established legal statutes or the technical direction provided by NSA/CSS, as specified reference (d), or the National Infrastructure Protection Center (NIPC), as set forth in refe ence (e). 6. DECONFLICTION. A. (U) While this DCID does not address every contingency, JO an JO-related activities specified in paragraphs 6.0 and 6.D shall be deconflicted and mutually supp ing. Deconfliction mechanisms shall be established to guarantee compatibility within areas of commo oncern. B. (U) To support the establishment of deconfliction proceises, it is important to initially identify the applicable authority for an action so that activities can be conducted within an appropriate legal context and oversight requirements can be satisfied. The nature/and the context of an activity will determine the applicable legal authority for the activity (i.e., the au14rity under which an activity is conducted). The following guidelines shall apply: 1) (U) The criterion for identifying the a licable authority for a proposed activity shall be the "primary purpose" of the activity. For e ample, if the "primary purpose" of an activity is foreign intelligence (H) collection, Fyollection authorities shall prevail, notwithstanding the fact that the activity may have other urposes. 2) (U) The nature and context of/ he activity, and not the U.S. Government entity that conducts it, shall determine the applicabAauthority. C. (YS DIP) The Oversight Bogrd for Private Sector Relationships (reference f) and the National (b)(3) Special Communications Worki /g Group (NSCWG) (reference g) exist to deconflict JO-related industrial relations and special communi ations, respectively. They shall be expanded to include new membership as appropriate. D. �,S4414*-3 CNA/E Deconjliction process. CIA and NSA will jointly manage, as an IC service of common concern, an Interagency Target Register (ITR) to deconflict IC CNA and CNE operations. IC elements conducting CNA or C operations under DCI authorities shall deconflict their operations within the ITR structure according t TR procedures and appropriate access negotiated with the principal signatories to the MOA cited in rs erence (h). The IC recognizes a need to establish procedures for deconflicting CNE activities with ot r appropriate U.S. agencies. (b)(1) (b)(3) 3 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 DIRECTOR 01E CENTRAL INTELLIGENCE DIRApproved for Release: 2020/108/03 C00574967 (b)(3) (b)(1) (b)(3) 7. IMPLEMENTATION. SjSaitir Except where covered by existing policies, IC JO-related responsibilities are lis d below. A. (U) The Deputy Director of Central Intelligence for Community Manage nt (DDCl/CM) shall: 1) (U) Serve as the IC focal point for JO strategic planning and p icy coordination within the IC and with the Bilateral Information .erations Steering Group (BIOSG) (per reference i). 2) (U) Represent IC organizations that are not already re r. esented on the BIOSG. 3) (U) Provide administrative and staff support to the ecretariat of the BIOSG (per reference i). 4) (U) Oversee implementation of this DCID. B (U) The Assistant Secretary of State for Intellig nce and Research (I&R) shall: 1) (U) Support the Chiefs of Mission in t en- review of the implications of contemplated JO for foreign affairs and iplomatic relations pursuant to reference (a). 2) (U) Pursuant to reference (j), rev ew the implications of contemplated sharing of intelligence on foreign JO pro ams with allies or other foreign entities. C. (U) The National Intelligence Off / ers (NI0s) for Warning and for Science & Technology shall jointly provide the DCI and otj1�IC elements with appropriate strategic warning against JO. D. (U) Consistent with the Nati nal Security Act of 1947 (reference k), the DCI has assigned the following tasks, which, pu,suant to 10 USC 113 (reference 1), the Secretary of Defense has directed the DoD componen listed below to execute. 1) (U) The Directo , National Security Agency/Chief Central Security Service (DIRNSA/CCSS i. Integrate CNA, CNE, and CND tools, techniques, and techno ogy into the SIGINT and INFOSEC communities. ) Train, equip, and organize the U.S. Cryptologic System to su eport the CNE, CNA, and CND requirements needs of its customers. iii.(U) Provide JO-related military targeting support. 4 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 DIRECTOR OF CENTRAL INTELLIGENCE DIRApproved for Release: 2020/08/03 C00574967 w (b)(3) iv. (81 Provide intelligence gain/loss assessments in response to CINC JO targeting. v. (81 Develop and support analytic modeling and simulation techniques to support CNA/CNE efforts. 2) The Director, Defense Intelligence Agency (D/DIA) shall: i. (U) Ensure that DIA is postured to support the full ra e of JO activities, both offensive and defensive, including psy ological operations, military deception, electronic warfare, c puter network operations, operations security, and physical dest hon. (U) Train and equip the Defense HUMINT &vice (DHS) to support the JO requirements of its customers. iii.(U) Provide 10-related military targetii support. iv. (U) Perform all-source analysis, pr uction, dissemination, and provision of military and military-rel ted intelligence on foreign information infrastructures and for gn information threats for the Secretary of Defense, Joint Chief of Staff, other defense components, and, as appropriate/non-defense agencies. v. reshitcr3 Pursuant to existin ,DoD directives, instructions and other guidance, conduct Human F ctors intelligence support for the full range of JO. vi. (U) Pursuant to DoD1fequirements, provide strategic indications and warning for 10. vii.(U) Provide polit cal-military assessments in response to CINC 10 targeting. 3) (U) The Director, N ional Imagery and Mapping Agency (D/NIMA) shall: i. (U) Conduct imagery and geospatial analysis to identify critical foreign info ation infrastructures and assess their interdepend cies. (U) In artnership with other IC elements, provide targeting support o 10. This includes identifying physical targets, developing targeti packages and preparing combat assessments. iii.(U With approved tasking, help identify vulnerabilities to key U.S nfrastructures (CONUS and OCONUS) in order to contribute to effective defensive JO practices. iv. (U) Provide other imagery and geospatial information support to IC and DoD JO efforts in a timely and effective manner. 5 of 9 12/6/00 3:53 PM pproved for Release: 2020/08/03 C00574967 DIRECTOR OF CENTRAL INTELLIGENCE DIRA pproved for Release: 2020/08/03 C00574967 � (b)(3) 4) v. (U) Ensure JO requirements are included in any delineation and assessment of future requirements. 5) (U) The Director of the Information 0 erations Technology Center (D/IOTC) shall execute responsibilities in accord ce with references (m) and (n). E. (U) The Director, Federal Bureau of In estigation (D/1-13I) shall: 1) (U) Provide available, releasa e information and operational support that may assist in the planning or execu on of an JO activity by IC and DoD. 2) (U) Assist other agencies14l assessing the risks of planned JO activities to the U.S. information infrastru ure. 3) (U) Keep the U.S. p ate sector and Government at all levels informed of threats to the U.S. inf ation infrastructure that may arise from JO activities without divulging U . plans or intentions. 4) (U) Develop a cf deploy tools to reduce the risk of penetration, corruption, and disruption of c ical U.S. information systems and networks. 5) (U) Invest ate JO intrusions and attacks against information networks and systems in t e United States. F. (U) All IC E ment Heads shall: 1) (U) rovide the DDCl/CM with the information required to assist the DCI in impl enting this directive. 2)8 Cooperate closely with the IOTC to ensure consistency between the CNA and dual purpose (CNE) techniques contained in the Toolbox and any other (b)(1) (b)(3) 6 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 + DIRECTOR OE CENTRAL INTELLIGENCE DIR ApprOVed for Release: 2020/08/03 C00574967 � 4 (b)(3) developing or employed capabilities. 3) (U) Take reasonable steps to protect their own systems from hostile CNA and CNE. 8. REVIEW. (U) The DDCl/CM shall coordinate the IC's annual review of this DCID for currency completeness. 3ot XBITELLIGENCE TE APPEND! A 1 Definitions of Terms se / d in this Directive Computer Network Attack (CNA): (U) Operatio s to manipulate, disrupt, deny, degrade, or destroy information resident in computers and computer iletworks, or the computers and networks themselves. Computer Network Defense (CND): (U) Eff&rts to defend against the CNO of others, especially that directed against U.S. and allied computers a d networks. Computer Network Exploitation (CNE. : (U) Intelligence collection and enabling operations to gather data from target or adversary automate/Information systems (AIS) or networks. (b)(1) (b)(3) Computer Network 0 Crations (CNO): (U) CNE, CNA, and CND collectively. Covert Action: (U) efer to Section 503 of the National Security Act of 1947, Title V (50 U.S.C. 413-413b) (referen s k and o) and related legislation. [Related legislation includes the 1991 Intelligence Authorization Ac nd 102d Congress Report SENATE First Session 102-85 and House Conference Report 102-166.] Secti 503 refers to covert action as, ". . . an activity or activities of the United States Government t nfluence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include-- 7f 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 4 DIRECTOR OF CENTRAL INTELLIGENCE DIRApproved for Release: 2020/08/03 C00574967 (b)(3) (U) . . . activities the primary purpose of which is to acquire intelligence, traditional counterintelligence activities, traditional activities to improve or maintain the security of United States Government programs, or administrative activities; . . . traditional diplomatic or military activities or routine support to such activities; . . . traditional law enforcement activities conducted by United St es Government law enforcement agencies or routine support to such activiti ; or. . activities to provide routine support to the overt activities . . . of other nited States Government agencies abroad." (Special Activities is a euphe t, sm for covert action; as such it is redundant to include it here.) Deception: (U) Those measures designed to mislead an adversary by ma Dulation, distortion, or falsification of evidence to induce him to react in a manner prejudicial t ,his interests. (b)(1) (b)(3) Electronic Warfare: (U) The use of electromagnetic and,�rected energy to control the electromagnetic spectrum or to attack an adversary. Human Factors: (U) The psychological, cultural, beriavioral, and other human attributes that influence decision making, the flow of information, and the terpretation of information by individuals or groups at any level in a state or organization. Information Operations (I0): (U) Actions en to affect adversary information and information systems while defending one's own information and nformation systems. Information System: (U) The organizatIOns, personnel, and components that collect, process, store, transmit, display, disseminate and act linformation. Operations Security (OPSEC): ( "A process of identifying critical information and subsequently analyzing friendly actions attend t to military operations and other activities to: a. Identify those actions that can be observed by advers /intelligence systems; b. Determine indicators hostile intelligence systems might obtain that could be inte reted or pieced together to derive critical information in time to be useful to adversaries; c. Select and ecute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly tions to adversary exploitation. Physical Destruction: ) Referred to in Joint military doctrine as one of the core disciplines of JO. Note: Not all physical destruction is 10 nor related to it. Physical destruction can be used to further tactical, operational, and/or s ategic JO objectives. Examples include destroying command and control facilities, communications li /s, and components supplying energy to power communications. Psychological perations: (U) Planned operations to convey selected information and indicators to foreign audie es to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign gov ments, organizations, groups, and individuals. The purpose of psychological operations or PSY0Ps is to induce or reinforce foreign attitudes and behavior favorable to the originator's objectives. Special Communications: (U//e11) The relay of U.S. government or allied signals from or into areas 8 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967 � DIRECTOR OF CENTRAL INTELLIGENCE DIRApproved for Release: 2020/08/03 C00574967 (b)(3) typically characterized by an intense counterintelligence or operational security environmentTnsuallrin support of covert or clandestine intelligence or military operations, orsengifive overseas law enforcement activities. ToP OFORNiau 9 of 9 12/6/00 3:53 PM Approved for Release: 2020/08/03 C00574967