A career as a secrecy watchdog

Steven Aftergood condemns the abuses of overclassification, excessive secrecy

Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information (PDF)

Researcher Steven Aftergood’s shelves are crammed with books on government secrecy and thick binders filled with government documents. Daniel Ellsberg’s “Secrets: A Memoir of Vietnam and the Pentagon Papers” occupies a prominent position on one shelf.

One particular set of papers that came to him in 1991 caused him to question the criteria that the government used to classify documents. Someone whose identity Aftergood learned only later — and still won’t reveal — mailed him documents about a classified program code-named Timber Wind. At the time, he had been researching nuclear reactor safety for the Federation of American Scientists, a nonprofit think tank in Washington, D.C. He is now FAS’ director of the Project on Government Secrecy.

Timber Wind was a secret plan to develop a nuclear-powered rocket engine for missile defense. Aftergood began reading the documents and interviewing officials, including the Defense Department’s inspector general. Aftergood became convinced that the military was secretive about Timber Wind mostly because it wanted to avoid a public controversy.

An IG’s report later confirmed his suspicion that DOD had overclassified the program, which limited the debate about missile defense technology.

Aftergood’s investigation led DOD to increase its oversight of special access programs, which are the most restricted category of classified programs, and change its procedures for allowing and terminating such programs. It also set Aftergood on a new path of scrutinizing the U.S. government’s classification system. He wanted to learn more about what information gets classified, by whom and for how long. Although he takes the need for secrecy seriously, he said the government invokes it far too often.

“Secrecy has derailed U.S. policy on several major fronts, from the war in Iraq to the interrogation of detainees to energy policy,” he said. “All of them have been infected by secrecy to the detriment of national policy.”

That conviction is the basis for his e-mail newsletter, “Secrecy News,” which he publishes two to three times a week, or as events warrant. The newsletter covers topics such as information security and intelligence policies and contains links to hard-to-obtain documents that he publishes on the Web.

He files many Freedom of Information Act requests, cultivates sources, interviews policy-makers and fields contributions from an informal network of informants — all without an office assistant.

Privacy and, in some respects, secrecy are at the heart of Aftergood’s work.

He is aware of that irony. Aftergood said he believes that public access to information is the basis of a free government. On the other hand, he said, he knows that offering public access to all such information might impede legitimate government activity or weaken national security.

Aftergood said he considers himself rather conservative about disclosing information. “I tend to err on the side of caution,” he said.

One of the popular items on the Project on Government Secrecy’s Web site is the Congressional Research Service’s report on warrantless surveillance by the National Security Agency. People have downloaded that document, not written for public consumption, as often as 40,000 times in a 24-hour period.

Aftergood said he would prefer that the government choose to post its records rather than waiting to be compelled to.

“The attitude needs to be that the release of public information should be a function of the government,” he said.

Aftergood’s work sometimes causes the government to change its policies, and that’s what motivates him to spend hours poring over the materials.

“He doesn’t just rely on continuous schmoozing but reads tedious government documents,” said Henry Kelly, president of FAS.

Even some officials inside the Bush administration who don’t always agree with Aftergood’s actions say they respect what he is trying to accomplish.

“Even though he and I may disagree on specifics at times, I find him to be an informed voice that has valuable insights,” said J. William Leonard, director of the Information Security Oversight Office at the National Archives and Records Administration. “I also recognize that there is information that has been inappropriately classified at times.”

The Steven Aftergood fileJob title: Director of the Project on Government Secrecy at the Federation of American Scientists.

Born: 1956 in Los Angeles.

Work history: In 1980, he went to Haifa, Israel, to work as a research assistant at the Solid State Institute in the Physics Department at the Israel Institute of Technology. He worked as executive director of the Committee to Bridge the Gap, a Los Angeles-based nuclear watchdog group, from 1981 to 1989. He became a senior research analystat FAS in 1989.

Education: Graduated cum laude with a bachelor’s degree in engineering from the University of California at Los Angeles.

Hobbies: Keeping up with his two-and-a-half-year-old son. Occasionally, he picks up his violin, an instrument he started playing about 40 years ago.

Family: Married, with one son.

Favorite declassified document: 1997 CIA total intelligence budget. That year, he successfully sued the CIA to declassify the budget, which was $26.6 billion.

Awards: James Madison Award from the American Library Association in 2006, the Public Access to Government Information Award from the American Association of Law Libraries in 2006 and the Hugh M. Hefner First Amendment Award from the Playboy Foundation in 2004.


  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Congratulations to the 2020 Rising Stars

    These early-career leaders already are having an outsized impact on government IT.

  • Cybersecurity
    cybersecurity (Rawpixel/Shutterstock.com)

    CMMC clears key regulatory hurdle

    The White House approved an interim rule to mandate defense contractors prove they adhere to existing cybersecurity standards from the National Institute of Standards and Technology.

Stay Connected