Forbes has a report informing us that someone took a long and detailed look at the largest power plant in the United States with deliberation and undoubted malign intent.
Documents gained under the Freedom of Information Act show how a number of small drones flew around a restricted area at Palo Verde Nuclear Power Plant on two successive nights last September. Security forces watched, but were apparently helpless to act as the drones carried out their incursions before disappearing into the night. Details of the event gives some clues as to just what they were doing, but who sent them remains a mystery.
Details of the events were obtained from the Nuclear Regulatory Commission by Douglas D. Johnson on behalf of the Scientific Coalition for UAP Studies (SCU) using the Freedom of Information Act (FOIA). The SCUâ€™s main interest is in anomalous aerospace phenomena, what other people term UFOs. In this case though the flying objects were easily identifiable as drones, although their exact mission and origin are unknown. Johnson passed the information to The War Zone who give a detailed account.
Palo Verde Nuclear Power Plant is the largest in the U.S., producing over three gigawatts, 35% of Arizona’s total power capacity. It supplies electricity to Phoenix and Tucson, as well as San Diego and Los Angeles. It is a critical piece of strategic infrastructure; during the 2003 Iraq War, National Guard troops were deployed to Palo Verde to defend against a possible terrorist threat. In normal times, as with other nuclear installations, it is protected by armed security guards.
The armed guards, gates, fences and barriers were useless on the night of September 29th. According to the official report:
â€œOfficer noticed several drones (5 or 6) flying over the site. The drones are circling the 3 unit site inside and outside the Protected Area. The drones have flashing red and white rights [sic] and are estimated to be 200 to 300 hundred [sic] feet above the site. It was reported the drones had spotlights on while approaching the site that they turned off when they entered the Security Owner Controlled Area. Drones were first noticed at 20:50 MST and are still over the site as of 21:47 MST. Security Posture was normal, which was changed to elevated when the drones were noticed.â€
The drones departed at 22:30, eighty minutes after they were first spotted. The security officers estimated that they were over two feet in diameter. This indicates that they were not simply consumer drones like the popular DJI Phantom, which have a flight endurance of about half an hour and is about a foot across, but something larger and more capable. The Lockheed Martin Indago, a military-grade quadcopter recently sold to the Swiss Army, has a flight endurance of about seventy minutes and is more than two feet across. At several thousand dollars apiece minimum, these are far less expendable than consumer drones costing a few hundred. All of which suggests this was not just a prank.
The next night events were repeated:
â€œFour (4) drones were observed flying beginning at 20:51 MST and continuing through the time of this report (21:13 MST). As occurred last night, the drones are flying in, through, and around the owner-controlled area, the security owner-controlled area, and the protected area. Also, as last night, the drones are described as large with red and white flashing lights.â€
Local police from Maricopa County were dispatched to find the drone operators, but with no success. The site is reportedly due to receive drone detection gear, but not counter-drone jammers or other defensive equipment that might stop such incursions.
Despite this incident, two months later the NRC decided not to require drone defenses at nuclear plants, asserting that small drones could not damage a reactor or steal nuclear material. It is highly likely that such sites are still vulnerable to drone overflights.
David Harsanyi throws up his hands at watching voters in Republican primaries choosing Donald Trump as the conservative candidate in opposition to RINOs like Ted Cruz, Scott Walker, and Paul Ryan. We have to stop this kind of thing from happening again. We need some way to screen drunks and crazies out of the voting booth.
Never have so many people with so little knowledge made so many consequential decisions for the rest of us.
A person need only survey the inanity of the ongoing presidential race to comprehend that the most pressing problem facing the nation isnâ€™t Big Business, Big Labor, Big Media or even Big Money in politics.
Itâ€™s you, the American voter. And by weeding out millions of irresponsible voters who canâ€™t be bothered to learn the rudimentary workings of the Constitution, or their preferred candidateâ€™s proposals or even their history, we may be able to mitigate the recklessness of the electorate.
No, we shouldnâ€™t erect physical barriers to ballot access. Letâ€™s purchase more voting machines, hire additional poll workers, streamline the registration process, mail out more ballots for seniors and produce more â€œRock the Voteâ€ ads imploring apathetic millennials to embrace their civic duty.
At the same time, letâ€™s also remember that checking a box for the candidate whose campaign ads you like best is one of the most overrated obligations of the self-governed. If you have no clue what the hell is going on, you also have a civic duty to avoid subjecting the rest of us to your ignorance.
Unfortunately, we canâ€™t trust you.
Now, if voting is a consecrated rite of democracy, as liberals often argue, surely society can have certain minimal expectations for those participating. And if citizenship itself is as hallowed as Republicans argue, then surely the prospective voter can be asked to know just as much as the prospective citizen. Letâ€™s give voters a test. The citizenship civics test will do just fine.
â€¢ Psychometric meta-analysis reveals a decline in g of âˆ’ 1.16 points per decade.
â€¢ The decline between 1889 and 2004 is âˆ’ 13.35 points.
â€¢ The decline between 1889 and 2004 is âˆ’ 12.45 points.
â€¢ This is the first direct measurement of a probable dysgenic trend in IQ.
The Victorian era was marked by an explosion of innovation and genius, per capita rates of which appear to have declined subsequently. The presence of dysgenic fertility for IQ amongst Western nations, starting in the 19th century, suggests that these trends might be related to declining IQ. This is because high-IQ people are more productive and more creative. We tested the hypothesis that the Victorians were cleverer than modern populations, using high-quality instruments, namely measures of simple visual reaction time in a meta-analytic study. Simple reaction time measures correlate substantially with measures of general intelligence (g) and are considered elementary measures of cognition. In this study we used the data on the secular slowing of simple reaction time described in a meta-analysis of 14 age-matched studies from Western countries conducted between 1889 and 2004 to estimate the decline in g that may have resulted from the presence of dysgenic fertility. Using psychometric meta-analysis we computed the true correlation between simple reaction time and g, yielding a decline of âˆ’ 1.16 IQ points per decade or âˆ’ 13.35 IQ points since Victorian times. These findings strongly indicate that with respect to g the Victorians were substantially cleverer than modern Western populations.
In this political ad, a variety of retired military and intelligence officers and special forces operatives go after Barack Obama and the Obama Administration for leaking sensitive national security information for political gain.
Iranians gloat over US RQ-170 Sentinel drone downed last week
The Christian Science Monitor has an exclusive story which must be causing some serious embarrassment in parts of the US military and intelligence community.
Iran guided the CIA’s “lost” stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, according to an Iranian engineer now working on the captured drone’s systems inside Iran.
Iranian electronic warfare specialists were able to cut off communications links of the American bat-wing RQ-170 Sentinel, says the engineer, who works for one of many Iranian military and civilian teams currently trying to unravel the droneâ€™s stealth and intelligence secrets, and who could not be named for his safety.
Using knowledge gleaned from previous downed American drones and a technique proudly claimed by Iranian commanders in September, the Iranian specialists then reconfigured the drone’s GPS coordinates to make it land in Iran at what the drone thought was its actual home base in Afghanistan.
“The GPS navigation is the weakest point,” the Iranian engineer told the Monitor, giving the most detailed description yet published of Iran’s “electronic ambush” of the highly classified US drone. “By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain.”
The â€œspoofingâ€ technique that the Iranians used â€“ which took into account precise landing altitudes, as well as latitudinal and longitudinal data â€“ made the drone â€œland on its own where we wanted it to, without having to crack the remote-control signals and communicationsâ€ from the US control center, says the engineer.In 2009, Iran-backed Shiite militants in Iraq were found to have downloaded live, unencrypted video streams from American Predator drones with inexpensive, off-the-shelf software. But Iranâ€™s apparent ability now to actually take control of a drone is far more significant.
Iran asserted its ability to do this in September, as pressure mounted over its nuclear program.
Gen. Moharam Gholizadeh, the deputy for electronic warfare at the air defense headquarters of the Islamic Revolutionary Guard Corps (IRGC), described to Fars News how Iran could alter the path of a GPS-guided missile â€“ a tactic more easily applied to a slower-moving drone.
â€œWe have a project on hand that is one step ahead of jamming, meaning â€˜deceptionâ€™ of the aggressive systems,â€ said Gholizadeh, such that â€œwe can define our own desired information for it so the path of the missile would change to our desired destination.â€
Gholizadeh said that â€œall the movements of these [enemy drones]â€ were being watched, and â€œobstructingâ€ their work was â€œalways on our agenda.â€
That interview has since been pulled from Farsâ€™ Persian-language website. And last month, the relatively young Gholizadeh died of a heart attack, which some Iranian news sites called suspicious â€“ suggesting the electronic warfare expert may have been a casualty in the covert war against Iran. …
Secretary of Defense Leon Panetta told Fox News on Dec. 13 that the US will “absolutely” continue the drone campaign over Iran, looking for evidence of any nuclear weapons work. But the stakes are higher for such surveillance, now that Iran can apparently disrupt the work of US drones.
US officials skeptical of Iranâ€™s capabilities blame a malfunction, but so far can’t explain how Iran acquired the drone intact. One American analyst ridiculed Iranâ€™s capability, telling Defense News that the loss was â€œlike dropping a Ferrari into an ox-cart technology culture.â€
Yet Iranâ€™s claims to the contrary resonate more in light of new details about how it brought down the drone â€“ and other markers that signal growing electronic expertise.
A former senior Iranian official who asked not to be named said: “There are a lot of human resources in Iran…. Iran is not like Pakistan.”
Wired wonders aloud what the rulers of Red China can possibly be building in one of the world’s most remote locations.
It is probably not going to be a recreational theme park.
New photos have appeared in Google Maps showing unidentified titanic structures in the middle of the Chinese desert. The first one is an intricate network of what appears to be huge metallic stripes. Is this a military experiment?
They seem to be wide lines drawn with some white material. Or maybe the dust have been dug by machinery.
Itâ€™s located in Dunhuang, Jiuquan, Gansu, north of the Shule River, which crosses the Tibetan Plateau to the west into the Kumtag Desert. It covers an area approximately one mile long by more than 3,000 feet wide.
The tracks are perfectly executed, and they seem to be designed to be seen from orbit.
See comments: Reliapundit thinks he knows what it is.
Nov. 15: The Daily Mail has more pictures of more things.
Anonymous official sources have spilled enough to the New York Times to allow it to put the pieces together (and to give an opportunity to US and Israeli Intelligence to take a few public bows and indulge in a bit of gloating at Iran’s expense). And, what do you know! it was another of those George W. Bush policies that Barack Obama decided to continue, just like detentions at Guantanamo.
The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israelâ€™s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal.
Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role â€” as a critical testing ground in a joint American and Israeli effort to undermine Iranâ€™s efforts to make a bomb of its own.
Behind Dimonaâ€™s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iranâ€™s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iranâ€™s nuclear centrifuges and helped delay, though not destroy, Tehranâ€™s ability to make its first nuclear arms.
â€œTo check out the worm, you have to know the machines,â€ said an American expert on nuclear intelligence. â€œThe reason the worm has been effective is that the Israelis tried it out.â€
Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program. …
Many mysteries remain, chief among them, exactly who constructed a computer worm that appears to have several authors on several continents. But the digital trail is littered with intriguing bits of evidence.
In early 2008 the German company Siemens cooperated with one of the United Statesâ€™ premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world â€” and that American intelligence agencies have identified as key equipment in Iranâ€™s enrichment facilities.
Siemens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory â€” which is part of the Energy Department, responsible for Americaâ€™s nuclear arms â€” the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet.
The worm itself now appears to have included two major components. One was designed to send Iranâ€™s nuclear centrifuges spinning wildly out of control. Another seems right out of the movies: The computer program also secretly recorded what normal operations at the nuclear plant looked like, then played those readings back to plant operators, like a pre-recorded security tape in a bank heist, so that it would appear that everything was operating normally while the centrifuges were actually tearing themselves apart.
The attacks were not fully successful: Some parts of Iranâ€™s operations ground to a halt, while others survived, according to the reports of international nuclear inspectors. Nor is it clear the attacks are over: Some experts who have examined the code believe it contains the seeds for yet more versions and assaults. …
Israeli officials grin widely when asked about its effects. Mr. Obamaâ€™s chief strategist for combating weapons of mass destruction, Gary Samore, sidestepped a Stuxnet question at a recent conference about Iran, but added with a smile: â€œIâ€™m glad to hear they are having troubles with their centrifuge machines, and the U.S. and its allies are doing everything we can to make it more complicated.â€
In recent days, American officials who spoke on the condition of anonymity have said in interviews that they believe Iranâ€™s setbacks have been underreported. That may explain why Mrs. Clinton provided her public assessment while traveling in the Middle East last week.
By the accounts of a number of computer scientists, nuclear enrichment experts and former officials, the covert race to create Stuxnet was a joint project between the Americans and the Israelis, with some help, knowing or unknowing, from the Germans and the British.
The projectâ€™s political origins can be found in the last months of the Bush administration. In January 2009, The New York Times reported that Mr. Bush authorized a covert program to undermine the electrical and computer systems around Natanz, Iranâ€™s major enrichment center. President Obama, first briefed on the program even before taking office, sped it up, according to officials familiar with the administrationâ€™s Iran strategy. So did the Israelis, other officials said.
You can hear the champagne corks popping at Langley all the way out here in Fauquier County.
Multiple terrorist teams have arrived and are in position in Europe and are believed to have received go-ahead commands to carry out “Mumbai-style” attacks in Germany, France or other locations. Pre-security areas in airports are thought to be likely targets.
Mounting ‘Chatter’ by Jihadi Extremists Has Law Enforcement Nervous
Among the possible targets in the suspected European terror plot are pre-security areas in at least five major European airports, a law enforcement official told ABC News. Authorities believe terror teams are preparing to mount a commando like attack featuring small units and small firearms modeled after the Mumbai attack two years ago.
The State Department issued a highly unusual “Travel Alert” Sunday for “potential terrorist attacks in Europe,” saying U.S. citizens are “reminded of the potential for terrorists to attack public transportation systems and other tourist infrastructure.”
One scenario authorities fear is a repeat of the 1985 attack on the Rome and Vienna airports, when Palestinian extremists threw grenades and opened fire on travelers waiting at ticket counters injuring 140 and killing 19, including a small child. …
Authorities have detected a dramatic increase in online chatter among jihadist websites the last week, in what experts believe could be other terrorists banning together in anticipation of terror attack plans in Europe and hoping to engage themselves in prospective plots.
The escalating discussions in the virtual meeting rooms for al Qaeda supporters have praised terror attacks plan and suggested targets, communicating with fellow believers just as the terrorist teams at the center of the current suspected plots likely did, experts said.
Newsweek Declassified explains that the Times of London story (behind subscription firewall) rocked the Wikileaks team of activists back on their heels. They expect major prizes for investigative journalism, not criticism for exposing informants to reprisals.
Apparently stung by complaints that publishing uncensored U.S. military reports could get people killed, the folks behind WikiLeaks are said to be postponing any further release of such documents.
After the site posted thousands of raw field reports from Afghanistan last week, fears arose that the material might include names or other details that might identify individuals who had collaborated with the Americans. Now, according to two sources familiar with WikiLeaksâ€™ holdings, activists associated with the site are combing through still unreleased material in its possession, trying to â€œredactâ€ potentially life-threatening information. The sources, requesting anonymity when discussing sensitive information, say itâ€™s not clear how long the review process will take. …
Meanwhile, WikiLeaks has posted a link to something it calls an â€œInsurance fileâ€ of 1.4 gigabytes on its Afghan documents page. News reports suggest that this file is heavily encrypted, and the challenge of downloading has certainly proved to be well beyond Declassifiedâ€™s primitive data-processing skills. Connoisseurs of paranoia will enjoy a warning from Iranâ€™s Fars News Agency that the â€œinsuranceâ€ posting may be an American trap to find out whoâ€™s interested in uncovering U.S. government secrets.
As Newsweek Declassified explained (July 27) Wikileaks is sitting on an even larger load of stolen reports, focused on Iraq.
The cache of classified U.S. military reports on the Iraq War as yet unreleased by WikiLeaks may be more than three times as large as the set of roughly 76,000 similar reports on the war in Afghanistan made public by the whistle-blower Web site earlier this week, Declassified has learned.
Three sources familiar with the Iraq material in WikiLeaks hands, requesting anonymity to discuss what they described as highly sensitive information, say itâ€™s similar to this weekâ€™s Afghanistan material, consisting largely of field reports from U.S. military personnel and classified no higher than the “secret” level. According to one of the sources, the Iraq material portrays U.S. forces being involved in a “bloodbath,” but some of the most disturbing material relates to the abusive treatment of detainees not by Americans but by Iraqi security forces, the source says.
Although WikiLeaks founder and principal operative, Julian Assange, provided three news organizationsâ€”The New York Times, London newspaper The Guardian, and the German weekly magazine Der Spiegelâ€”with weeks of advance access to the Afghan War material before making it public himself, heâ€™s apparently being more coy in his handling of the Iraq War material, the source indicates. Assange is keeping tighter personal control over the Iraq material than he maintained over the Afghan material, the source says, adding that itâ€™s not clear whether any media organizations have had advance access to it or when it might be made public.
A second source says there are indications that WikiLeaks has been receiving leaked material from sources besides Bradley Manning, a U.S. Army private who recently was charged by military authorities with illegally handling classified information.
Thomas G. Mahnken, Professor of Strategy, U.S. Naval War College and former Deputy Assistant Secretary of Defense for Policy Planning, harshly criticizes the Washington Post’s “Top Secret America” in Foreign Policy.
I’ve just finished Dana Priest and William Arkin’s “Top Secret America,” The Washington Post’s two-year, three-part “investigation” into U.S. classified activities. If one of my graduate students handed this in as a term paper, I’d have a hard time giving it a passing grade. …
[T]he authors have, at best, a weak thesis. That’s actually giving them the benefit of the doubt, because the series as a whole doesn’t really have a thesis. Instead, it is a series of strung-together facts and assertions. Many of these facts are misleading. For example, the authors point to the fact that large numbers of Americans hold top-secret security clearances, but fail to distinguish between those who are genuinely involved in intelligence work and those who require the clearances for other reasons — such as maintaining classified computer equipment or, for that matter, serving as janitors or food service workers in organizations that do classified work. Similarly, they point to the large number of contractors involved in top-secret work without differentiating those who actually perform analysis and those who develop hardware and software.
Second, the authors fail to provide context. They make much of the fact that the U.S. intelligence community consists of many organizations with overlapping jurisdiction. True enough. But what they fail to point out is that this has been a key design feature of the U.S. intelligence community since its founding in the wake of World War II. The architects of the U.S. intelligence system wanted different eyes to look at the same data from diverse perspectives because they wanted to avoid another surprise attack like Pearl Harbor. …
In emphasizing the growth of the intelligence community since the Sept. 11, 2001 terrorist attacks, the authors are at the same time accurate and misleading. They accurately note that the size of intelligence agencies grew rapidly after 9/11, but that’s like saying that the scale of U.S. warship construction ballooned in the months after Pearl Harbor. It’s true but misses the larger point. …
During the 1990s the size of the U.S. intelligence community declined significantly because both the Clinton administration and leaders in Congress believed that we were headed for a more peaceful world. Indeed, the Clinton administration made trimming the size of the intelligence community a priority through its Reinventing Government initiative. Many intelligence analysts took offers of early retirement and became contractors — contractors that the U.S. government hired back after 9/11. A good deal of the post-9/11 intelligence buildup thus involved trying to buy back capacity and capability that had been eliminated during the 1990s.
The Washington Post’s sexy new multimedia web-site adversarially reporting on the US Intelligence Community’s components, contractors, facilities, size, and expenditures is, as was predicted, up and running today.
The introductory 1:47 video and a lengthy article by Dana Priest and William Arkin take a downright conservative-sounding tone of skepticism of big government, complaining about massive growth, duplication of effort, paralysis and confusion stemming from over-large bureaucracy, and an excessive cult of secrecy leading to a lack of accountability.
After nine years of unprecedented spending and growth, the result is that the system put in place to keep the United States safe is so massive that its effectiveness is impossible to determine. …
An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances. …
Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.
Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year – a volume so large that many are routinely ignored. …
The U.S. intelligence budget is vast, publicly announced last year as $75 billion, 21/2 times the size it was on Sept. 10, 2001. But the figure doesn’t include many military activities or domestic counterterrorism programs.
At least 20 percent of the government organizations that exist to fend off terrorist threats were established or refashioned in the wake of 9/11. Many that existed before the attacks grew to historic proportions as the Bush administration and Congress gave agencies more money than they were capable of responsibly spending. …
Beyond redundancy, secrecy within the intelligence world hampers effectiveness… say defense and intelligence officers. For the Defense Department, the root of this problem goes back to an ultra-secret group of programs for which access is extremely limited and monitored by specially trained security officers.
These are called Special Access Programs – or SAPs – and the Pentagon’s list of code names for them runs 300 pages. The intelligence community has hundreds more of its own, and those hundreds have thousands of sub-programs with their own limits on the number of people authorized to know anything about them. All this means that very few people have a complete sense of what’s going on.
“There’s only one entity in the entire universe that has visibility on all SAPs – that’s God,” said James R. Clapper, undersecretary of defense for intelligence and the Obama administration’s nominee to be the next director of national intelligence.
Such secrecy can undermine the normal chain of command when senior officials use it to cut out rivals or when subordinates are ordered to keep secrets from their commanders.
One military officer involved in one such program said he was ordered to sign a document prohibiting him from disclosing it to his four-star commander, with whom he worked closely every day, because the commander was not authorized to know about it. Another senior defense official recalls the day he tried to find out about a program in his budget, only to be rebuffed by a peer. “What do you mean you can’t tell me? I pay for the program,” he recalled saying in a heated exchange.
These contentions sound reasonable, though the idea of top secret government functions and processes being reformed by even more unaccountable journalists with a record of personal career advancement via damaging leaks of highly classified intelligence operations strikes me as a case of the local foxes putting on efficiency expert Halloween costumes and volunteering to improve operations in the chicken house.
I’m not in the least persuaded that the Post really needed to publish a cool interactive map of government facility and contractor company locations and a searchable database of companies working on top secret contracting assignments. Why do Washington Post readers need such detailed information? Couldn’t foreign intelligence services do their own research?
It is also far from clear to me that Dana Priest and the Washington Post have not knowingly again violated the Espionage Act of 1917 by publishing that map and database. This time, who knows? It is much easier for a leftwing administration to undertake prosecutions of these kinds of offenses. The Obama Administration has already demonstrated more willingness to enforce the law in National Security cases than the Bush Administration ever did. It will be interesting to see how the government reacts.
Will Dana Priest go to jail or will she just collect one more Pulitzer Prize?
Fox News says the Obama Administration is expecting some absurd spending stories and quotes Intelligence Community sources talking about what a great resource for America’s enemies that Post website is going to be.
The Obama administration is bracing for the first in a series of Washington Post articles said to focus in unprecedented detail on the government’s spending on intelligence contractors.
The intelligence community is warning that the article could blow the cover of contract companies doing top-secret work for the government. At the same time, a senior administration official acknowledged that the kind of wasteful spending expected to be spotlighted in the series is “troubling” and something the administration is trying to address.
“There will be examples of money being wasted in the series that seem egregious and we are just as offended as the readers by those examples,” the official said. The official said some of the information in the story is “explainable,” in that some “redundancy” is necessary in the intelligence community. But the official said the administration has been working to reduce “waste” and that “it’s something we’ve been on top of.”
Other sectors of the administration were on high alert over the piece. A source told Fox News that the series amounts to a “significant targeting document” in that it will apparently bring together unclassified information from the public domain in a single location, making it a one-stop shop for this level of detail. The official said “few intelligence groups have the assets and resources to pool” this kind of information.
This has led to warnings about how the information could be used. The Office of the Director of National Intelligence sent out a memo saying that “foreign intelligence services, terrorist organizations and criminal elements will have potential interest in this kind of information.”
Quinn Hillyer is breaking the story that the Office of the Director of National Intelligence is warning federal contractors that a potentially disastrous leak of classified information by a major news outlet is on the way and is urging companies to remind their employees of their duty to protect classified information and relationships and their contractual obligation of confidentiality.
“Early next week, the Washington Post is expected to publish articles and an interactive website that will likely contain a compendium of government agencies and contractors allegedly conducting Top Secret work.”
The WaPo is expected to start the new leak site and associated coverage on Monday, July 19th.