- Subscribe Now (Opens in new window)
- Air Force Times (Opens in new window)
- Marine Corps Times (Opens in new window)
- Navy Times (Opens in new window)
- Pentagon & Congress
- Defense News (Opens in new window)
- Flashpoints
- Benefits Guide (Opens in new window)
- Military Pay Center
- Military Retirement
- Military Benefits
- Discount Depot
- Gear Scout (Opens in new window)
- Military Culture
- Military Fitness
- Military Movies & Video Games
- Military Sports
- Transition Guide (Opens in new window)
- Pay It Forward (Opens in new window)
- Black Military History (Opens in new window)
- Congressional Veterans Caucus (Opens in new window)
- Military Appreciation Month (Opens in new window)
- Military History
- Vietnam Vets & Rolling Thunder (Opens in new window)
- Honor the Fallen (Opens in new window)
- Hall of Valor (Opens in new window)
- Service Members of the Year (Opens in new window)
- Create an Obituary (Opens in new window)
- Medals & Misfires
- Installation Guide (Opens in new window)
- Task Force Violent
- Battle Bracket
- CFC Givers Guide
- Photo Galleries
- Early Bird Brief
- Newsletters (Opens in new window)
- Long-Term Care Partners
- Navy Federal
- Digital Edition (Opens in new window)

Ten projects driving modern Army combat
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EZDDKYV5IRFBBDFAVYAAJUPDUA.jpg)
The Army’s Combat Capabilities Development Command and its subordinate organizations, such as the Army Research Laboratory , work the science and technology behind everything that makes a modern force.
The command leads centers that focus on everything from chemical and biological threats, data and analysis, ground vehicle systems, aviation and armaments.
CCDC provided updates to a sample of programs and projects to Army Times before the Association of the U.S. Army’s annual conference.
War-fighter machine interface backpack controller for Project Origin vehicle
Project Origin is a testing and demonstration platform for emerging technologies, the data from which helps Army Combat Capabilities Development Command and cross-functional team partners inform the Robotic Combat Vehicle campaign of learning. As part of the Army modernization enterprise led by 31+4 signature modernization efforts, the technologies that Project Origin helps develop contribute to the breakthrough capabilities war fighters need.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/SKYYRB6QCBBLDAB5N2JWFT5YJU.jpg)
Not quite the Terminator, but ‘muscle-bound’ robots are coming for the Army, Marines
Muscle tissue added to robots will give them “never before seen mobility and agility.”.
MASTR-E wearables and display
DEVCOM’s Soldier Center completed the first baseline execution event for the MASTR-E program at Fort Campbell, Kentucky, in February. The Measuring and Advancing Soldier Tactical Readiness and Effectiveness, or MASTR-E, program is a large-scale effort that will measure, predict and enhance close-combat performance with predictive performance algorithms, sensors, data-driven decision aids, and targeted interventions to maximize soldier performance.
Portable chemical/biological detection and identification
Researchers at DEVCOM’s Chemical Biological Center have helped improve technology that could give soldiers a forensic advantage by detecting minuscule traces of chemicals left behind by adversaries in the field.
Stopping bleeding saves lives on the battlefield
A new medical technology stops traumatic bleeding without requiring wound compression for soldiers on the battlefield. Hemorrhaging is a leading cause of preventable death for soldiers in combat. The simplicity, potential for deploying, and proposed affordability of this technology under development allows soldiers to carry a life-saving solution in their pocket.
Army research enables robots to learn new concepts
Army researchers developed a novel computational model that allows robots to ask clarifying questions to soldiers, enabling them to be more effective teammates in tactical environments.
Army-funded research lays groundwork for future quantum networks
New Army-funded research could help lay the groundwork for future quantum communication networks and large-scale quantum computers. Researchers sent entangled qubit states through a communication cable linking one quantum network node to a second node.
Picatinny’s Extended Range Cannon Artillery autoloader begins testing
After a successful live-fire test of the Army’s Extended Range Cannon Artillery limited-capacity autoloader at Yuma Proving Ground, Arizona, in June 2019, the Picatinny engineers who developed it have refined a faster autoloader and have succeeded in conducting its initial trials.
New autonomous tech at Camp Grayling greatly reduces risks
Army engineers work hard to develop new autonomous vehicle capabilities for the war fighter. This summer, engineers and technicians from DEVCOM’s Ground Vehicle Systems Center are gathered at Camp Grayling Joint Maneuver Training Center in Michigan to perform tests on the new software before turning over vehicles to soldiers for their feedback. At the south forward-operating base, the focus is on the Expedient Leader Follower Program; at the 30 Complex, the focus is on robotic combat vehicles.
Army heads to field for final Project Convergence 2021 preparations
The Army took another key step on the road to Project Convergence 21 as it assessed network interoperability for emerging technologies from across the joint force. The service completed its third network risk-reduction effort for Project Convergence. Executed by Joint Modernization Command, the Network Cross-Functional Team and DEVCOM, these communications exercises are enabling the Army to address potential network integration challenges during the Project Convergence planning process as well as understand the data environment in a controlled, instrumented laboratory environment.
Soldier touchpoints guide autonomous leader demonstration
DEVCOM’s Aviation and Missile Center successfully demonstrated proof of concept for an autonomous multidomain launcher in a multi-round, live-fire demonstration at Fort Sill, Oklahoma. The demonstration was conducted on behalf of the Long Range Precision Fires Cross-Functional Team, in partnership with DEVCOM’s Ground Vehicle Systems Center and the 18th Field Artillery Brigade. A total of seven rockets were fired, showcasing the launcher’s lethality potential in anti-access, area denial multidomain operations, particularly in the Indo-Pacific theater — the focus of the demonstration’s simulation.
Todd South has written about crime, courts, government and the military for multiple publications since 2004 and was named a 2014 Pulitzer finalist for a co-written project on witness intimidation. Todd is a Marine veteran of the Iraq War.
In Other News
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DXVHQXGBQNG4RDW346ZUBUYSAY.jpg)
Rates for Tricare premium plans on the rise again
Increase in rates for tricare young adult prime is especially stunning, one advocate says..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/HWIRTM3BVFHO5IVENOAHE5EMTM.jpg)
Russia-led alliance holds military drills in Belarus
Belarus’ defense ministry said the exercises, lasting through wednesday, are to prepare for joint operations, including responses to a nuclear accident..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ZRLCGXDFN5CMPCWCFAHRSBK7ZQ.jpg)
Two ex-Proud Boys leaders get among longest sentences in Jan. 6 attack
The 17-year prison term for organizer joseph biggs and 15-year stint for leader zachary rehl were the second and third longest sentences handed down yet..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/IBZGCBT7Z5GYXJPCX6R4MRHPFQ.jpg)
World War II special operations veteran receives Special Forces tab
Ellsworth johnson is believed to be the last surviving member of the oss operational groups..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TFYWS5VN5NGGTLVMCBJW2V3GBE.jpg)
Vets jobless rate spikes in August, but experts note positive trends
The unemployment rate for veterans rose from 2.9% in july to 3.6% in august, according to federal researchers..
- Subscribe Now (Opens in new window)
- Your Military
- Army Times (Opens in new window)
- Navy Times (Opens in new window)
- Air Force Times (Opens in new window)
- Marine Corps Times (Opens in new window)
- Pentagon & Congress
- Defense News (Opens in new window)
- Extremism & Disinformation
- Afghanistan
- Benefits Guide (Opens in new window)
- Family Life
- Military Pay Center
- Military Retirement
- Military Benefits
- Discount Depot
- Gear Scout (Opens in new window)
- Military Culture
- Military Fitness
- Military Movies & Video Games
- Military Sports
- Transition Guide (Opens in new window)
- Pay It Forward (Opens in new window)
- Military History
- Salute to Veterans
- Black Military History
- Congressional Veterans Caucus (Opens in new window)
- Military Appreciation Month
- Vietnam Vets & Rolling Thunder
- Service Members of the Year (Opens in new window)
- World War I
- Honor the Fallen (Opens in new window)
- Hall of Valor (Opens in new window)
- Create an Obituary (Opens in new window)
- Medals & Misfires
- Installation Guide (Opens in new window)
- Battle Bracket
- America's Military
- Task Force Violent
CFC Givers Guide
- Newsletters (Opens in new window)
- Early Bird Brief
- Long-Term Care Partners
- Navy Federal
Special Projects
In-depth analysis, investigative series, features and reader engagement combine are all elements of military times' special projects..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/C3V5JPZLAFEF5IIWQTJILCD5FI.jpg)
Military Times Special Report: The Iraq War, 20 years later
The 2003 invasion of iraq continues to resonate in the lives of troops today; a special report on the 20th anniversary of that momentous event..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4WGRPF6PFJHTBGPAIF4KFWXTN4.jpg)
Federal giving sees a boost during the pandemic
Donations to the combined federal campaign this year are up over last year's numbers, even as campaign events have had to transition to virtual..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/A5DIEUP7XJFOHCIJ6GUNIUISJI.jpg)
CFC pledge deadline nears
Set up your cfc contribution by jan. 12..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/A5DIEUP7XJFOHCIJ6GUNIUISJI.jpg)
CFC givers have many military-friendly options. One expert suggests playing the long game
Health-related charities may not be known for military efforts, but they help thousands of veterans, young and old..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WZJKWZT2BBDCXCQIGILUKSDGG4.jpg)
Charities new to military CFC groups focus on scholarships, vet careers
Military charity groups saw campaign donations fall in 2016..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EHBPDPWSPJC53KCXI24JDYZ7QU.jpg)
CFC’s new online portal may lead more donors to military family, youth programs
Campaign participates can search by installation when choosing how to donate..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Q2XXZLUI4NBARP7KXIKXNQB53A.jpg)
2017 CFC kicks off with new fee setup, fewer charities ... and delays
A planned web portal isn't online, and a full list of charities isn't available..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/DT5PEOEEINDA3BKJ2AGWLOXUJA.jpg)
Five war dogs you'd want in your squad
One dog handler's first-person story, and five working dogs with tales of service above self..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/36CUACWQQ5C3RLDUEM62D3PRY4.jpg)
Clash of Characters: Gunny Hartman takes title, R. Lee Ermey thanks his fans
The drill instructor that made "full metal jacket" famous has claimed this year's battle bracket crown..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2NCE5AZBP5CORPF2LFPU5QOT2Y.jpg)
Clash of Characters final: Vote now as 'Full Metal Jacket,' 'Saving Private Ryan' stars square off
It's down to two as we select the greatest on-screen military movie character of all time..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TQ6EOEU3IRGETP7435OZ6SJHNQ.jpg)
Clash of Characters update: Your last chance to help set the final
The final four entrants in our search for the greatest on-screen fictional military character ever need your vote to compete for the championship..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WVEQGL7D2RCNXPVRGG27DXQDEU.jpg)
Clash of Characters update: Sprint to the finish for the final 4 entrants -- vote now
Officer. nco. colonial warrior. sith lord. all bets are off in the semifinals as you choose the greatest military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Y6WYVDRNY5EQFIOYZVGYOZ4X5U.jpg)
Clash of Characters update: Rambo needs a rally to reach semifinals
Star power, and 'star wars,' are on display as our search for the greatest on-screen fictional military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/THY63B5I3RBKLLUJP4KFJNEPHE.jpg)
Clash of Characters: Vote now to help choose the final 4
Eight greats remain as we search for the best on-screen fictional military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3PZZO6Z7HFCLPHWR7Q5ZWETBZA.jpg)
Clash of Characters update: Your vote could save, or sink, these icons
Well-known actors in well-known roles could be shown the door as we close in on our top on-screen fictional military character..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GK2NOWUFSVENDJYWXUSP4PJWNM.jpg)
Clash of Characters, Round 3: Familiar faces make up the round of 16. Help us choose the best
The search for the greatest fictional on-screen military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5FIYZPGF4RC23PKB4JDYOIT42Q.jpg)
Clash of Characters update: Big names near elimination -- vote now
Nobody's safe as battle bracket marches on. not even chuck norris..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YZ3BWQG4EFGEZNJRP2WUYC6GJQ.jpg)
Clash of Characters, Round 2: Vote now as we narrow the field
Familiar faces, and some surprises, after early voting — have your say in this year's battle bracket..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BGTTQRIC65HOJGGDTYOKRGR25Q.jpg)
Clash of Characters update: Jack Reacher, the battling Brad Pitts and more Round 1 matchups to watch
Vote and spread the word: the first round of this year's battle bracket closes thursday.
- Main content
14 Advanced Military Projects That Could Change The World Forever
The Defense Advanced Research Projects Agency (DARPA) gets a ton of funding to develop the science and technological future of the military.
This is the agency responsible for GPS, the internet and stealth planes. They're the real deal.
We looked at their active projects to find the ones that might have massive civilian implications if they eventually produce real-world tech.
The last few times we did this, we focused on the Defense Science Office, the Information Innovation Office and the Microsystems Technology Office. This time, we look at the Strategic Technologies Office, which is researching the weapons that will eventually define high-tech communications systems.
DARPA is more focused on biofuels than almost any other group
So far the federal government has shown that biofuel research is absolutely a political issue, suspect to wild sways in funding depending on who is in charge. Critics lambasted the biofuel program as speculative, implausible, and underdeveloped.
Conveniently, that's DARPA's specialty.
DARPA is researching the next phase of biofuel research. They're working with General Atomics and Logos Technologies to work on developing biofuels from algae and cellulose.
So far, they've made progress. They're aiming to develop a means of mass production, which could get difficult, but they're already making algae systems, ponds, fermented municipal solid waste (Yes, that's what you think it is), and alcohol into a gasoline equivalent.
A testing range, but for computers, not weapons.
The National Cyber Range is one of the cooler ideas that DARPA has come up with, even though it's conceptually somewhat simple.
Right now, it's not possible to replicate the complexity of a network of thousands and thousands of computers. There's (basically) only one internet. DARPA wants a testing range for cybersecurity solutions and offensive capabilities.
The idea is that, rather than merely releasing the test viruses onto the open web, this self contained network could be used to test the efficacy of defensive and offensive software. It should cut back significantly on the time spent testing new technologies.
One struggle is to make it so that a virulent piece of code can get on to the system without compromising the whole network.
Right now it's in beta testing.
The DARPA CORONET program takes a hard look at the future of the web
DARPA does an immense amount of research into Photonics, specifically fiber optics.
The CORONET program looks into ramping up internet speeds with the application of fiber optic cable technology as part of the core connecting hardware that makes up the physical "internet."
The idea is that a faster internet will expedite communications of military brass to forces on the ground. The civilian windfall, though, will be huge.
DARPA's ISIS system is a self-sustaining stratospheric military recon blimp
DARPA is developing a solar powered sensor of "unprecedented proportions" in their Integrated Sensor is Structure (ISIS) program .
It's a stratospheric airship that will conduct persistent wide area surveillance, tracking, and engagement of air and ground targets.
It's compressing antennae and high-density components into a single airship. A floating radar system could change the way that people perceive their world and weather.
Your 4G network won't run slowly when it's busy if this program goes through
For the military, soldiers typically operate through mobile "ad hoc" networks that relay communications back to a home network, and just like any other it bogs down when it's crowded .
DARPA's Fixed wireless at a distance program wants to make a new system that can be deployed and greatly expand the power of these networks. The hope is to develop communication devices and systems that has unlimited "scalability."
This means that the number of users on the network can steadily grow without disturbing high speed communications.
Were DARPA to make this work in the military, an eventual integration into civilian communication networks could change the way people electronically talk.
If this program works, the Military will never lose service again
One of the Military's biggest issues is getting a secure network to forward operating base in a war theater. By definition, these bases are in remote areas where it's difficult to maintain a consistent supply chain.
Sort of like all the areas in the U.S. that get terrible wireless coverage, only much more dangerous.
DARPA's Mobile Hotspots program wants to make air, mobile, and fixed assets that provide Gigabit per second tactical access to the network. They're developing advanced pointing, acquisition and tracking capabilities that go beyond what is commercially available in the market.
Once done, the military should be able to use UAVs as flying nodes on the network grid.
This program harvests energy from the motion of the Ocean.
The Renewable At-Sea Power program is developing the capability to harvest and store energy from ocean waves.
This science is crucial for the success of underwater drones. The ability to extract power from the natural forces of their surroundings could enable Automated Underwater Vehicles (AUVs) to run for significantly longer than they can today.
DARPA is specifically interested in establishing re-charging stations for AUVs using this tech.
DARPA is making materials that can handle immense amounts of heat
When a plane takes off from an aircraft carrier, the carrier is right up against the output of a jet engine. When that plane takes off vertically — as one version of the F-35 fighter are designed to do — immense heat is shot directly at the surface of the carrier runway, which over time leads to a misshapen and warped runway.
That's not good.
DARPA is developing new materials that can handle that immense level of direct heat through its Thermal Management System fo Ship Decking program.
A thermally powerful and non-skid surface that is highly resistant to heat could see use industrially or domestically.
Advance Radio Mapping could clear the airwaves
Radio signals all operate somewhere along the Radio Frequency spectrum. When you tune the radio in your car, you're telling the radio to adjust which frequency it is receiving.
The military uses radios constantly, and interference and jamming of these signals is a major worry.
DARPA's Advanced RF Mapping program seeks to map the airwaves, identifying which frequencies have high use and which have low. This will allow the Army to optimize the frequencies they communicate on to ensure reliability.
In civilian life, radio frequencies are in use everywhere, and there is a finite amount of real estate that can be used. Mapping this and optimizing this could prove very useful for those allocating the signal spectrum.
The Aero-Optic Beam Control program will put defense lasers in the skies
The Aero-Adaptive/Aero-Optic Beam Control program has a simple goal: arm aircraft with high energy lasers that can shoot backward.
It's difficult to contend with threats coming from behind an aircraft. Getting the timing and direction oriented for countermeasures is difficult for a single pilot. So, having an autonomous laser cannon that can shoot out incoming threats with a high intensity beam of light is a rather attractive option for pilots.
Once they complete wind tunnel testing, flight tests will be carried out.
DARPA wants to re-imagine how we share web content
The Military uses the internet in much the same way as civilians. Content must be transferred, replicated, and distributed across networks.
Right now, the exchange of data between ground forces and higher echelon command requires inefficient and comparatively slow communications. To find what other ground forces are producing, war fighters have to go up and down the chain of command, even if they are neighboring units.
DARPA's Content-Based Mobile Edge Networking program is trying to overcome that difficulty. It'll allow for content correlation and easier transfer of data.
Should DARPA solve the problem of direct communication on the Military's network, the civilian implications for work-around online could come too.
This project can find the locations of all people in a building just by looking at it
The Visibuilding program has a really ambitious goal: find everyone and every weapon inside a building from the outside.
Using radar signals, the Visibuilding program tried to visualize moving personnel within a building as well as a static floor plan and ventilation system map.
Eventually, they were able to provide 3D maps of target buildings and also find large concentrations of metal, like weapons cache.
All of this tech is headed to the Army and SOCOM, but if it eventually ends up in civilian hands it could be useful to civilian police and firefighters.
DARPA is figuring out a cheap way to police the Arctic
Through the Assured Arctic Awareness program, DARPA plans to dominate the far, frosty north.
According to DARPA, as ice retreats over the Arctic the region will gain significance as a commercial and military avenue of transit and operations.
They plan to be prepared for that possibility, and are developing new tech to ensure situational awareness and security. This tech entails a distributed sensor system beneath the ice and the plans for a possible station in the Arctic. The key is that the systems must be rugged enough to withstand Arctic conditions.
For civilian uses, the Arctic is a major area of scientific and commercial focus. As the ice recedes, it will become a major avenue for easy international shipping. Having complete awareness of the area only benefits the U.S. as a whole.
This is an offensive laser weapon mounted on an aircraft
DARPA has plans for a system that neutralizes surface-to-air threats to aircraft with its High Energy Liquid Area Defense System (HELLADS).
Since typically Surface to Air missiles are much, much faster than the plane they're attempting to hit, it's difficult for aircraft to take action against an incoming missile. However, using the speed of light and the power of a laser, multiple incoming threats can be neutralized in record time.
DARPA also believes that this system is powerful enough to take out ground targets. DARPA wants a laser that is lighter and more compact than the current state-of-the-art.
There is still more to come...
Check out the previous post in this series, 20 advanced military research projects that will change your life >
Official websites use .gov
Secure .gov websites use HTTPS

Contracts valued at $7.5 million or more are announced each business day at 5 p.m.
- News Stories
- From the Services
Press Products
- Live Events
List of Contracts
Search contracts.
- Today in DOD
- Transcripts
- Publications
- Casualty Status
Recent Press Products
Readout of secretary of defense lloyd j. austin iii's call with french minister of the armed forces sébastien lecornu, readout of secretary of defense lloyd j. austin iii's phone call with jamaican prime minister andrew holness, army maj. gen. kenneth hara off-camera, on-the-record press briefing on the defense department's ongoing response to the maui wildfires, stay updated.
Subscribe now to get Defense.gov products delivered to your inbox.
Defense.gov
Helpful links.
- For the Media
- DOD Resources
- DOD Social Media Policy
- Help Center
- DOD / Military Websites
- Agency Financial Report
- Value of Service
- Taking Care of Our People
- FY 2024 Defense Budget
- National Defense Strategy

The Department of Defense provides the military forces needed to deter war and ensure our nation's security.
- Subscribe Now (Opens in new window)
- Your Air Force
- Pentagon & Congress
- Army Times (Opens in new window)
- Marine Corps Times (Opens in new window)
- Navy Times (Opens in new window)
- Defense News (Opens in new window)
- Flashpoints
- Benefits Guide (Opens in new window)
- Military Pay Center
- Military Retirement
- VA Loan Center (Opens in new window)
- Military Benefits
- Discount Depot
- Military Culture
- Military Fitness
- Gear Scout (Opens in new window)
- Military Movies & Video Games
- Military Sports
- Transition Guide (Opens in new window)
- Military History
- Black Military History (Opens in new window)
- Congressional Veterans Caucus (Opens in new window)
- Military Appreciation Month (Opens in new window)
- Vietnam Vets & Rolling Thunder (Opens in new window)
- Hall of Valor (Opens in new window)
- Service Members of the Year (Opens in new window)
- Create an Obituary (Opens in new window)
- Pay It Forward (Opens in new window)
- Medals & Misfires
- Installation Guide (Opens in new window)
- Battle Bracket
- Task Force Violent
CFC Givers Guide
- Photo Galleries
- Early Bird Brief
- Long-Term Care Partners
- Navy Federal
- Newsletters (Opens in new window)
- Digital Edition (Opens in new window)
Special Projects
In-depth analysis, investigative series, features and reader engagement combine are all elements of military times' special projects..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/C3V5JPZLAFEF5IIWQTJILCD5FI.jpg)
Military Times Special Report: The Iraq War, 20 years later
The 2003 invasion of iraq continues to resonate in the lives of troops today; a special report on the 20th anniversary of that momentous event..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4WGRPF6PFJHTBGPAIF4KFWXTN4.jpg)
Federal giving sees a boost during the pandemic
Donations to the combined federal campaign this year are up over last year's numbers, even as campaign events have had to transition to virtual..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/A5DIEUP7XJFOHCIJ6GUNIUISJI.jpg)
CFC pledge deadline nears
Set up your cfc contribution by jan. 12..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/A5DIEUP7XJFOHCIJ6GUNIUISJI.jpg)
CFC givers have many military-friendly options. One expert suggests playing the long game
Health-related charities may not be known for military efforts, but they help thousands of veterans, young and old..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WZJKWZT2BBDCXCQIGILUKSDGG4.jpg)
Charities new to military CFC groups focus on scholarships, vet careers
Military charity groups saw campaign donations fall in 2016..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EHBPDPWSPJC53KCXI24JDYZ7QU.jpg)
CFC’s new online portal may lead more donors to military family, youth programs
Campaign participates can search by installation when choosing how to donate..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Q2XXZLUI4NBARP7KXIKXNQB53A.jpg)
2017 CFC kicks off with new fee setup, fewer charities ... and delays
A planned web portal isn't online, and a full list of charities isn't available..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/AG52XAKDSRFD3B7ANDXKIUHP4Y.jpg)

Crew chiefs in a galaxy far, far away? Maintainer joins the Resistance in new Star Wars
Over the years, more than a few air force pilots have imagined themselves in the cockpit of an x-wing fighter. but this december, maintainers will get their own counterpart in a galaxy far, far away..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/36CUACWQQ5C3RLDUEM62D3PRY4.jpg)
Clash of Characters: Gunny Hartman takes title, R. Lee Ermey thanks his fans
The drill instructor that made "full metal jacket" famous has claimed this year's battle bracket crown..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2NCE5AZBP5CORPF2LFPU5QOT2Y.jpg)
Clash of Characters final: Vote now as 'Full Metal Jacket,' 'Saving Private Ryan' stars square off
It's down to two as we select the greatest on-screen military movie character of all time..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TQ6EOEU3IRGETP7435OZ6SJHNQ.jpg)
Clash of Characters update: Your last chance to help set the final
The final four entrants in our search for the greatest on-screen fictional military character ever need your vote to compete for the championship..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WVEQGL7D2RCNXPVRGG27DXQDEU.jpg)
Clash of Characters update: Sprint to the finish for the final 4 entrants -- vote now
Officer. nco. colonial warrior. sith lord. all bets are off in the semifinals as you choose the greatest military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Y6WYVDRNY5EQFIOYZVGYOZ4X5U.jpg)
Clash of Characters update: Rambo needs a rally to reach semifinals
Star power, and 'star wars,' are on display as our search for the greatest on-screen fictional military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/THY63B5I3RBKLLUJP4KFJNEPHE.jpg)
Clash of Characters: Vote now to help choose the final 4
Eight greats remain as we search for the best on-screen fictional military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3PZZO6Z7HFCLPHWR7Q5ZWETBZA.jpg)
Clash of Characters update: Your vote could save, or sink, these icons
Well-known actors in well-known roles could be shown the door as we close in on our top on-screen fictional military character..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GK2NOWUFSVENDJYWXUSP4PJWNM.jpg)
Clash of Characters, Round 3: Familiar faces make up the round of 16. Help us choose the best
The search for the greatest fictional on-screen military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5FIYZPGF4RC23PKB4JDYOIT42Q.jpg)
Clash of Characters update: Big names near elimination -- vote now
Nobody's safe as battle bracket marches on. not even chuck norris..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YZ3BWQG4EFGEZNJRP2WUYC6GJQ.jpg)
Clash of Characters, Round 2: Vote now as we narrow the field
Familiar faces, and some surprises, after early voting — have your say in this year's battle bracket..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BGTTQRIC65HOJGGDTYOKRGR25Q.jpg)
Clash of Characters update: Jack Reacher, the battling Brad Pitts and more Round 1 matchups to watch
Vote and spread the word: the first round of this year's battle bracket closes thursday.
- Subscribe Now (Opens in new window)
- Your Marine Corps
- Air Force Times (Opens in new window)
- Army Times (Opens in new window)
- Navy Times (Opens in new window)
- Pentagon & Congress
- Defense News (Opens in new window)
- Flashpoints
- Benefits Guide (Opens in new window)
- Military Pay Center
- Military Retirement
- Military Benefits
- VA Loan Center (Opens in new window)
- Discount Depot
- GearScout (Opens in new window)
- Military Culture
- Military Fitness
- Military Movies & Video Games
- Military Sports
- Transition Guide (Opens in new window)
- Pay It Forward (Opens in new window)
- Black Military History (Opens in new window)
- Congressional Veterans Caucus (Opens in new window)
- Military Appreciation Month (Opens in new window)
- Vietnam Vets & Rolling Thunder (Opens in new window)
- Military History
- Honor the Fallen (Opens in new window)
- Hall of Valor (Opens in new window)
- Service Members of the Year (Opens in new window)
- Create an Obituary (Opens in new window)
- Medals & Misfires
- Installation Guide (Opens in new window)
- Battle Bracket
CFC Givers Guide
- Task Force Violent
- Photo Galleries
- Newsletters (Opens in new window)
- Early Bird Brief
- Long-Term Care Partners
- Navy Federal
- Digital Edition (Opens in new window)
Special Projects
In-depth analysis, investigative series, features and reader engagement combine are all elements of military times' special projects..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/C3V5JPZLAFEF5IIWQTJILCD5FI.jpg)
Military Times Special Report: The Iraq War, 20 years later
The 2003 invasion of iraq continues to resonate in the lives of troops today; a special report on the 20th anniversary of that momentous event..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4WGRPF6PFJHTBGPAIF4KFWXTN4.jpg)
Federal giving sees a boost during the pandemic
Donations to the combined federal campaign this year are up over last year's numbers, even as campaign events have had to transition to virtual..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/A5DIEUP7XJFOHCIJ6GUNIUISJI.jpg)
CFC pledge deadline nears
Set up your cfc contribution by jan. 12..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WZJKWZT2BBDCXCQIGILUKSDGG4.jpg)
Charities new to military CFC groups focus on scholarships, vet careers
Military charity groups saw campaign donations fall in 2016..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/EHBPDPWSPJC53KCXI24JDYZ7QU.jpg)
CFC’s new online portal may lead more donors to military family, youth programs
Campaign participates can search by installation when choosing how to donate..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Q2XXZLUI4NBARP7KXIKXNQB53A.jpg)
2017 CFC kicks off with new fee setup, fewer charities ... and delays
A planned web portal isn't online, and a full list of charities isn't available..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/36CUACWQQ5C3RLDUEM62D3PRY4.jpg)
Clash of Characters: Gunny Hartman takes title, R. Lee Ermey thanks his fans
The drill instructor that made "full metal jacket" famous has claimed this year's battle bracket crown..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/2NCE5AZBP5CORPF2LFPU5QOT2Y.jpg)
Clash of Characters final: Vote now as 'Full Metal Jacket,' 'Saving Private Ryan' stars square off
It's down to two as we select the greatest on-screen military movie character of all time..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/TQ6EOEU3IRGETP7435OZ6SJHNQ.jpg)
Clash of Characters update: Your last chance to help set the final
The final four entrants in our search for the greatest on-screen fictional military character ever need your vote to compete for the championship..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/WVEQGL7D2RCNXPVRGG27DXQDEU.jpg)
Clash of Characters update: Sprint to the finish for the final 4 entrants -- vote now
Officer. nco. colonial warrior. sith lord. all bets are off in the semifinals as you choose the greatest military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/Y6WYVDRNY5EQFIOYZVGYOZ4X5U.jpg)
Clash of Characters update: Rambo needs a rally to reach semifinals
Star power, and 'star wars,' are on display as our search for the greatest on-screen fictional military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/THY63B5I3RBKLLUJP4KFJNEPHE.jpg)
Clash of Characters: Vote now to help choose the final 4
Eight greats remain as we search for the best on-screen fictional military character ever..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/3PZZO6Z7HFCLPHWR7Q5ZWETBZA.jpg)
Clash of Characters update: Your vote could save, or sink, these icons
Well-known actors in well-known roles could be shown the door as we close in on our top on-screen fictional military character..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/GK2NOWUFSVENDJYWXUSP4PJWNM.jpg)
Clash of Characters, Round 3: Familiar faces make up the round of 16. Help us choose the best
The search for the greatest fictional on-screen military character continues..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/5FIYZPGF4RC23PKB4JDYOIT42Q.jpg)
Clash of Characters update: Big names near elimination -- vote now
Nobody's safe as battle bracket marches on. not even chuck norris..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/YZ3BWQG4EFGEZNJRP2WUYC6GJQ.jpg)
Clash of Characters, Round 2: Vote now as we narrow the field
Familiar faces, and some surprises, after early voting — have your say in this year's battle bracket..
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/BGTTQRIC65HOJGGDTYOKRGR25Q.jpg)
Clash of Characters update: Jack Reacher, the battling Brad Pitts and more Round 1 matchups to watch
Vote and spread the word: the first round of this year's battle bracket closes thursday.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/OGEZUZI76RGGRBUMHQUAJIZ5PI.png)
Battle Bracket 2017: Help us choose our field of 64 great military characters
It's not quite march, but that's no reason to delay the madness of our annual audience-participation tournament.
:quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/ML3ZHL7FGNH4VLZCISFHPNT5WY.jpg)
Military-connected charities are popular during CFC but still see decline in contributions
Participation in the giving program for federal employees was its lowest ever last year..
Special Access Programs And The Pentagon’s Ecosystem Of Secrecy
We shed light on the dark realm of the Department Of Defense’s often misunderstood classified apparatus in this comprehensive explainer.

View tim mcmillan and tyler rogoway's Articles
To a lot of people, terms like "black budget," or "black projects," inspire dark imagery of government figures operating in contrast to the principles of a free and open society. Indeed, with tens of billions set aside every year for classified Pentagon programs and operations, it would be reckless of the public not to be willing to question that which they pay for, but lack the privilege of knowing anything about.
Inherently enigmatic and often grossly misunderstood, The War Zone set out to shed light on the obscure processes that are involved in maintaining the highly intricate ecosystem that works to guard the Pentagon’s most closely held secrets.
Special Access Programs—A Hidden World Most Will Never See
For the better part of the last twenty-five years, the manner in which the U.S. government safeguards and restricts access of highly classified information is through a set of compartmentalization protocols termed "Special Access Programs." Thanks to the government's love affair with condensing words, most people are likely familiar with this formalized system of security's acronym—"SAP."
For most of us stuck on the outside trying to get an idea of what’s inside, the term "Special Access Program" is often misunderstood as being itself a classification level. In truth, SAPs are merely a set of security protocols limiting access of sensitive information to only authorized and necessary individuals. Cue the cliché, "That information is need to know, and you don't have a need to know!”
Now, before one can gain a real appreciation for how Special Access Programs operate, like any scholar of history will tell you, "To understand the present, one must first appreciate the past."

How National Security Information Is Classified
The early origins of Special Access Programs can be traced to March 22, 1940, when President Franklin D. Roosevelt signed Executive Order 8381, creating for the first time, three security designations for America's most crucial information—restricted, confidential, and secret.
In the ensuing years, various presidential executive orders have tweaked how the government designates classified information. The current levels of classification are confidential, secret, and top secret. The determining factor for how information is classified depends on how much damage an unauthorized disclosure would reasonably be expected to cause.
- Top Secret: “Exceptionally grave damage to national security.”
- Secret: “Serious damage to national security.”
- Confidential: "Damage to national security.”
Important to note, established through the Atomic Energy Act of 1954, the Department of Energy (DOE) uses two differing equivalent levels of security clearance.
- Q-Clearance: Equivalent to a Top-Secret level clearance.
- L-Clearance: Equivalent to a Secret level clearance.
For clarity’s sake, at times misrepresented by the entertainment industry, a “Yankee White clearance” is not an actual security clearance. “Yankee White” is an administrative nickname for the background check performed for persons who will work within close proximity to the President or Vice President. According to Department of Defense instructions , to obtain a Yankee White clearance one must pass the same Single Scope Background Investigation (SSBI) necessary for a top secret clearance, and establish “unquestionable loyalty to the United States.”
Within the world of SAPs, a program can involve information from any one of these official classification levels. Further adding to the confusion, in many cases, a single Special Access Program will contain multiple components, each with differing classification levels.
The Dubious Origins Of Special Access Programs
The incredulous mystique surrounding SAPs likely comes from the unofficial, ad hoc nature of their origins. In 1953, when President Dwight D. Eisenhower issued Executive order 10501 , he eliminated classification authority from 28 government entities, limiting only departments and agencies of the executive branch the ability to classify materials. More importantly, President Eisenhower's directive removed the previously approved "restricted" designation.

Up to this point, “restricted" classifications functioned as a means of limiting certain information from people who may indeed have held an active security clearance, however, they didn’t have a "need to know.”
In light of being given a formal order by the Commander and Chief, some departments within the Pentagon weren't all that keen on being unable to limit access to their secrets. In response, many agencies began to unofficially use "special access.” Albeit, with no official authority, these informal "special access" classifications would allow for the continuance of closely guarded, tight-knit programs, to be hidden within the government.
Now, it's hard to argue that the flagrant rejection of national directives wasn't a recipe for disaster waiting to happen. In fact, it's likely no coincidence some of the darkest times in government secrecy went on during these unofficial "special access" years. For example, the CIA's infamous Project MKULtra began in 1953 and remained active until 1973. Coincidently, 1973 was the same year that during an oversight hearing, a report by the Committee on Government Operations brought to light that dozens of unauthorized "special access, distribution, control labels, stamps, or markings" were being used, by "many executive agencies having classification authority and dozens of other agencies who do not possess such authority."
In all fairness, by the time of their discovery, the precedent of unofficial special access programs was primarily a moot point. Either intentionally or by ironic happenstance, three months prior to five men being caught breaking into the Democratic party headquarters at the Watergate complex in Washington D.C., on March 8, 1972, President Richard Nixon signed Executive order 11652 , legitimatizing and establishing the overall framework for what would eventually become the "Special Access Program" of today.

Still not thoroughly having worked the kinks out, according to the Center for Development of Security Excellence’s (CDSE) Special Access Programs Training Course, from the early 1970s to 1980s, SAPs—referenced even within the government as "black programs,”—were almost exclusively restricted to safeguarding DoD acquisition programs. In fact, the existence of "black programs” wasn't publicly known until the mid-1980s, when the controversial "Project Yellow Fruit" unceremoniously thrust government secrecy programs in the limelight.
More on "Project Yellow Fruit" to come.
By the mid-1990s, these enigmatic workshops shed the "black program" moniker, opting to go by the more contemporarily familiar "Special Access Program." In addition to the more dexterously sleek title, intelligence, operations, and support programs were added to the SAP repertoire, establishing the Special Access Program regime we've come to know today.
Armed with some history on SAP's, let’s take a look at how they operate.
Enter the Bureaucratic Jungle of SAPs
When considering the term "special access program," typically, people envision one of the three categories that go on within the Department of Defense, as outlined by DoD 5205.07. Acquisition, intelligence, and operations and support. Breaking these categories down to gain a sense of what they entail:
- Acquisition SAPs: Programs that involve research, development, testing, modification, evaluation or procurement of new technologies. (According to the CDSE, Acquisition SAPs make up 75-80% of all DoD SAPs)
- Intelligence SAPs: Planning and execution of, especially sensitive, intelligence or counter-intelligence operations.
- Operations and Support SAPs: Planning, implementation, and support of sensitive military activities.
It's important to note, though the DoD's three main categories are the most well-known, Special Access Programs are inherently just a procedure within the government. In fact, there are many other categories of SAPs that go on outside the DoD. For example, the Secret Service's Presidential travel support detail is technically a SAP. Additionally, within the intelligence services, these similar sets of protocols are termed, "Sensitive Compartmented Information” (SCI) and not "Special Access Programs."
Additionally, separate from an objective category, all special access programs fall under one of two distinctive protection levels—"acknowledged" and "unacknowledged."
- Acknowledged SAPs - Programs that's existence and purpose can be openly recognized. With Acknowledged SAPs, typically only intimate details, such as technologies, materials or techniques are kept secret. Funding for Acknowledged SAPs is mostly unclassified and can be readily seen in the government's fiscal budget.
With its existence well known, yet its inner details still remaining mysterious, Northrop Grumman’s B-21 Raider is an excellent example of an Acknowledged Special Access Program actively going on today.
On the other end of the spectrum, serving as the inspiration for much spy fiction or conspiracy theories of secret space forces, there is the “Unacknowledged” SAP.
- Unacknowledged SAPs or “USAPs”: The shy sibling of the SAP family. When a SAP is designated as "unacknowledged" not only is a program's purpose carefully guarded, as the name implies, USAPs mere existence may be denied to everyone but a spare few who aren't a part of the program. Given their shadowy presence, it should come as no surprise, the funding for unacknowledged SAPs is either classified or is intentionally hidden within the Federal budget.
An example of an Unacknowledged SAP would be the RQ-170 before it was officially disclosed to the public.
In rare instances, when information is considered to be of the most extremely sensitive in nature, the Secretary of Defense can formally exempt a program from federal reporting requirements and establish the pinnacle of the secrecy—the "Waived Unacknowledged SAP.”
Due to their ultra-secretive nature, Unacknowledged or Waived-Unacknowledged SAPs, serve as fertile breeding grounds for conspiracies of hidden crashed UFO technology or veiled government "carve-outs" whereby the general public's benefit is an afterthought. In truth, USAPs or Waived USAPs, like anything else that lacks accessibly verifiable fact, is likely very mythicized. With that said, like any good myth, there’s some truth and historical precedent that give legitimate reasons to be concerned with these deeply hidden programs.
With that in mind, let's take a quick journey back to the not-to-distant past. To a time that shows Special Access Programs have, and can, operate in a manner opposed to public interest.
“Yellow Fruit," The Rogue SAP The Government Wants To Forget
In 1983, an arbitrary internal audit turned up enormous inconsistencies in an unacknowledged, covert SAP being run out of the newly formed Special Operations Division of the DoD. Code named, "Yellow Fruit," the program was established to provide additional operational security and counter-intelligence assistance for missions in Central American. Yellow Fruit was a genuine "deep cover" USAP, with the program's director, former Assistant Chief of Staff for Intelligence, Lt. Col. Dale Duncan outwardly appearing to have "retired" from the Army to start a private consulting firm called Business Security International.
The discovery of financial discrepancies in Yellow Fruit sparked a formal investigation by the FBI. The inquiry into Yellow Fruit would result in Lt. Col. Duncan, Special Operation Division Commander Lt. Col. James E. Longhofer, and several other members of SOD being court-martialed for a hodgepodge of varying crimes. In addition, many never-fully proven allegations, such as millions of stolen dollars hidden in Swiss bank accounts , set-ups of other U.S. military officials with prostitutes and hidden cameras, and even ties to the Iran-Contra affair, still loom over Yellow Fruit.

Though career military officers allowing their moral compasses to diverge from pointing ethically north is somberly disappointing, it's regrettably far from unprecedented. Instead, what made Yellow Fruit such a significant turning point in the formative growth of current classified operations came from the embarrassing lack of DoD control and oversight that was revealed.
As the rotting stench of Yellow Fruit made its way up the military hierarchy, top Army leadership, including Army Chief of Staff John Wickham and his Vice Maxwell Thurman, were stunned. The level of shock conveyed from the Pentagon’s leadership was understandable when you consider that in "The Dilemma of Covert Action,” published by the U.S. Army War College in 1989, it’s said none of the DoD brass had ever been briefed on the program and literally had no clue that a mere 15-minute drive from the Pentagon, tucked amongst a suite of commercial offices, a multi-million-dollar clandestine military operation was being run.
Determining exactly what all went on within Project Yellow Fruit can prove to be a rather difficult task. Spare a few newspaper articles from the 1980s, publicly available information is extremely limited. With that said, the required CDSE’s training course for all persons participating in DoD SAPs, repeatedly mentions “Yellow Fruit” as being an inspiration for a wave of oversight and controls put in place to stem off the ability for a small group within government to literally go rogue.
The Inner Workings of Special Access Programs
In the Department of Defense's mind-numbing behemoth of formal policies and directives, five volumes totaling 151 pages are now dedicated solely to Special Access Programs. Of course, if a light book's worth of reading wasn't enough, there are also specialized manuals for many divisions within the Pentagon that also provide their own expansive volume of rules and regulations.
For example, there’s a Joint Army-Navy-Air Force SAP manual , offering service members of these three branches an extra 129 pages of supplemental reading. Lest we forget, since a significant amount of secret government activity is farmed out to private industry, government contractors who are involved with SAPs get their own 131 pages of "National Industrial Security Program" operating manual to peruse.
Needless to say, though a considerable amount of government's covert goings-on are indeed hidden from prying eyes, substantially more regulation and control have been implemented since the days when Project Yellow Fruit was turning in $56,000 receipts for desk calculators .
A word of note before proceeding, for all those fans of flowcharts, this would be an excellent time to break out the markers and whiteboard, because as promised, no matter how "unconventional" SAPs may be, at the end of the day, they're still subject to all of the customary administrative confusion that's characteristic of civil service.

Special Access Program Central Offices
Within the DoD, The Secretary or Under Secretary of Defense are the principal authorities for all Special Access Programs. Assisting the military's Chief Executives in this endeavor involves a vast complex of ministerial powers.
Serving on the front lines of the secrecy mosaic is the "Special Access Program Central Offices" (SAPCO). With a process that thrives on compartmentalization, it should come as no surprise, by "central" the DoD actually means there are three different types of SAP Central Offices residing in the corridors of the Pentagon—Component-Level SAPCOs, OSD-Level SAPCO, and DoD-Level SAPCO.
- Component-Level SAP Central Office (SAPCO): They can be found within each branch of the military, The Joint Chiefs of Staff, The Defense Advanced Research Projects Agency (DARPA), and The Missile Defense Agency (MDA). The Component-Level SAPCOs are responsible for initiating the prospective process for accessing the need for a Special Access Program. Once a SAP has been established, a Component-Level SAP Central Office serves as the hands-on manager for the SAPs that fall under their purview.
- Office of the Secretary of Defense-Level SAP Central Office (OSD SAPCO): Specifically established to assist the Deputy Secretary of Defense, The Office of the Secretary of Defense-Level Central Office serves as the oversight authority for all SAPs.
- Department of Defense SAP Central Office (DOD SAPCO): Serving to help streamline this entire fragmented and confusing process, the Department of Defense SAP Central Office functions as an ambassador by communicating and advising agencies of the executive branch and Congress on all issues relating to SAPs.
Now if that wasn't enough delegated authority for you, have no fear, because roaring alongside the SAP Central Offices like forking whitewater rapids of procedural hierarchy, comes the "SAP governance structure."
The Special Access Program Governance Structure
Spearheading the SAP governance structure is the SAP Oversight Committee (SAPOC). Made up of a who's who of Pentagon Under Secretaries, Vice Chiefs, and Assistant Directors, the Oversight Committee's primary role is to advise and assist the Secretary and Deputy Secretary of Defense in the governance, management, and oversight of all DoD Special Access Programs.
Ensuring that the limitation of secrecy to only a select few isn't a decision made in a vacuum, assisting the SAP Oversight Committee is:
- Senior Review Group (SRG): The principle working-level body who governs the process of SAP oversight.
- SAP Senior Working Group (SWG): Provides recommendations to the Senior Review Group and serves as a senior program protection forum coordinating, deconflicting, and integrating special programs.
Pausing for a moment to take a breath, don't put down those markers and flowchart just yet. As twisting and turning as all the aforementioned regulatory authorities might be, we're far from having the whole picture of the Special Access Program process.
The Importance Of Maintaining Secrecy
In the late 1970's NASA began operating an extensively modified Boeing 747 airliner to ferry the Space Shuttle around. By the late 1980s, two were in operation. Unimaginatively, these modified jumbo jets were called the "Shuttle Carrier Aircraft" (SCA) .

A decade after NASA began toting around the Space Shuttle Orbiter on the back of a wide-body plane, Russia started soaring through the skies in their brand new Antonov An-225 Mriya (meaning "dream" in English).
Powered by six turbofan engines, the Mriya, to date, is the heaviest aircraft ever built. Oh, and as it happens, the Mriya was built to offer piggyback rides to Russia's own space shuttle, the Buran. In case you don't see where this is going, according to the Center For Development Security Excellence ( CDSE ), it was later determined Russia had "borrowed" technical information on the SCA to help develop their own massive orbiter transport aircraft.
Protecting technological advancement isn't just about maintaining military dominance. Instead, in terms of time and developmental dollars, the cost associated with the loss of industrial secrets can be enormous. When Russia "acquired" the fine technological details to develop the An-225 to carry their version of the Space Shuttle Orbiter, the Soviet Union effectively saved themselves considerable time and money at America's expense. Noting only one Mriya has ever been built, the argument can be made, without the unwilling help of the U.S. aerospace industry, Russia's shuttle ferry may never have entered operation.

Ultimately, examples like Russia's An-225 serve as distinct reminders that the most vital part of protecting national secrets doesn't necessarily occur at desks and in boardrooms of the Pentagon. Instead, it goes on within the Special Access Programs themselves.
Securing Special Access Programs
In all fairness, with the intelligence field supposedly being one of the last bastions of "gentleman warfare," it's safe to assume America has its fair share of hush-hush programs geared at "borrowing" other nation's research and development. In fact, known past and present Foreign Materiel Exploitation (FME) programs alone are shining examples of this.
That aside, in the span of SAP controls, the Office for the Under Secretary of Defense for Intelligence (OUSDi) SAP Control Office fills the very vital role of monitoring and investigating counter-intelligence matters, security violations, or infractions within all DoD SAPS.
Assisting OSDi's Central SAP Office in this effort is the Office of the Director of National Intelligence and the powerful 17 individual agencies which make up the United States intelligence community. Bolstering this mighty SAP Central Office, the U.S. Defense Security Service (DSS) helps provide operational support and security oversight for all DoD SAPs.
Of course, the first line of defense in protecting the integrity of SAP secrecy starts with who is granted access to a program. Regardless, if a person is in the military, a federal-civilian employee, or a private contractor, several prerequisites must be met before one can work within a SAP.
Working Inside A SAP
The path to working in a SAP begins with a currently accessed person nominating a potential candidate to the "access approval authority," or the central office that the SAP emerges out of. If a candidate does not presently possess an active secret or top secret clearance, the appropriate clearance must be obtained before one can be considered for involvement.
Finally, all persons who will be involved in a SAP must agree to be subject to random "counter-intelligence scope" polygraph examinations and sign a DoD-approved SAP indoctrination and non-disclosure agreement.

Once inside a special access program, there are yet still several vital roles that help ensure the secure integrity of each individual program. Some of these are:
- The Government Program Manager (GPM), and their private industry equivalent, the Contractor Program Manager (CPM): The person who manages all overall aspects of a specific program.
- Program Security Officer: The person responsible for all aspects of security in the program. Every SAP has a PSO, however, large or complex SAPS can also have additional Government SAP security officers or contractor program security officers to assist the Program Security Officer.
Further protecting who knows what, a SAP’s overarching scope and purpose can fall under one program "umbrella." However, multiple compartments, which can further breakdown into separate sub-compartments, and finally, numerous projects, can all emerge out from under a single SAP umbrella.
It's entirely possible for a compartment, sub-compartment, or project not to have access, or even to be aware of the work that's going on in other sections of the same SAP.
When it comes to the extreme isolation of work, it's not just about keeping information out of the hands of foreign adversaries. Sometimes components are cordoned off from each other because you may have two different contract partners from the same industry working on different aspects of a SAP. In essence, caution must also be taken to ensure industrial partners don't "borrow" each other's trade secrets.

Oversight Of Special Access Programs
All Special Access Programs are subject to federal and defense acquisition regulations. As such, all SAPs can be audited and inspected by a host of oversight entities, including the Government Accountability Office or the DoD Inspector General.
Equally, oversight of SAPs isn't merely left to agency policies and directives. Instead, it's a matter of federal law, as defined by Section 119, Title 10 United States Code.
By federal statute, all active acknowledged, and non-waived unacknowledged Special Access Programs must submit reports to the House and Senate Authorization, Appropriations, and Intelligence Committees annually. These yearly reports provide committee members with an estimated total budget request for the upcoming fiscal year, a brief description of the program, including the number of persons involved, the status of significant milestones or current issues, and the actual cost of the program for each previous fiscal year.
Any member not assigned to one of the defense or intelligence committees may be granted access to non-waived SAPs, provided they receive permission by the ranking and minority member from each of the respective committees and with approval by the Secretary or Deputy Secretary of Defense.
But What About Those Waived-Unacknowledged SAPs?
As mentioned earlier, in rare instances, when a SAP's purpose and scope are deemed so sensitive that standard reporting procedures could pose a risk to national security, the Secretary of Defense can authorize the darkest of "black programs,” the waived-unacknowledged special access program.
According to the Center for Development of Security Excellence, "Waived SAPs have more restrictive reporting requirements and access controls." Determining what precisely the CDSE means by this statement is a little tricky.
In the book, Strategic Intelligence : Covert Action, Behind the Veils of Secret Foreign Policy , author Lock K. Johnson notes, "Waived SAPs are only orally briefed to the so-called Gang of Eight, this is, the chair and ranking (minority) members of both the Senate and House intelligence (or Armed Services) committees, and House and Senate Majority and Minority Leaders." Sure to raise a few eyebrows, Johnson mentions that the National Security Agency's controversial "warrantless surveillance" program, which ran from 2001-2007, was a waived SAP.
According to the very limited information provided by the Department of Defense's Directive 5205.07, the "Access Approval Authority" for waived SAPs is narrowed down to the Deputy Secretary of Defense, Under Secretaries of Defense, or a component head with "cognizant authority."
Beyond this, even after combing through hundreds of pages of DoD directives, policies, and federal Title 10 and Title 50 laws, it's hard to pin down exactly how waived-USAPs are governed.
Indeed, since the self-indulgent days of Project Yellow Fruit, the DoD has piled a sizable number of regulations and policies governing the Special Access Program process. However, given the obscurity of even being able to determine how checks and balances are maintained with waived-USAPs, one cannot help considering risks may still lurk within the very murky waters of this bureaucratic swamp.
As we twist further down the spiral of sanctioned secrecy, let’s take a look at some of the concerns with intensive secrecy that’s governed by a mere few individuals.
The Dark Side Of An Already Dark World
Taking a glance at the DoD’s mind-numbing number of rules, regulations, and directives pertaining to SAPs, it’s not hard to see why the CDSE can make the claim that modern Special Access Programs have significantly more scrutiny and oversight than those of the past that may have been marked by somewhat laissez faire attitudes. However, it would not be objectively fair to not point out, even since the mid-1990s, there have been examples of mismanagement or corruption involving SAPs.
When it comes to the corruptibility of SAPs, leading the charge is the biblical “root of all evil,” and the cold hard fact that these programs of isolated secrecy can involve enormous amounts of money.
Just how enormous?
Well, according to the Stockholm International Peace Research Institute , the United States’ $81.1 billion dollar budget request for classified intelligence programs alone in 2019, is larger than nine of the next top-ten foreign nations total military expenditures . Only China, with an estimated total defense budget of $250 billion U.S. dollars, exceeds the budgetary sum of America’s intelligence community’s classified budget. This does not include the tens of billions of dollars spent on the Pentagon’s non-intelligence related classified programs every year.
As staggering as having a classified budget that exceeds many countries entire GDP might be, it still doesn’t account for all the money being spent on secret programs.
A 2016 Office of Inspector General (OIG) report indicated the DoD couldn’t account for $21 trillion dollars in transactions and adjustments from 1998 to 2015. It's important to note that this movement of funds, an average of $1.2 trillion annually during this 17 year period, which was "unsupported" by accounting documentation, does not reflect any actual "missing" money that could have gotten funneled into “black programs” or SAPs. OIG also did not suggest that any of these funds had gotten categorically lost, stolen, or otherwise burned in ritual sacrifice.
At the same time, the U.S. military's apparent inability to properly record trillions of dollars worth of transactions calls into question how well it is monitoring even its most basic financial activities to prevent money from ending up diverted or simply misspent. Historically, black programs have exploited the nebulous nature of U.S. government budgets to fund their efforts through complex arrangements involving multiple agencies, making a full accounting, or even any accounting, of their costs difficult.
So going back to that initial question, just how large is the sum of the money involved in these black programs?
We really don’t know because it’s seemingly uncountable. But it’s safe to say that it is very large.
Considering how much of public politics is dominated by relentless bickering over the allocation of government funds, the potential for classified programs to have uncountable, perhaps even undefined, streams of cash is almost incomprehensible.
Corruption Breeds In Shadowy, Cash-Packed Environments
Access to large sums of difficult-to-track cash can have the unfortunate, yet all too common side-effect of tempting seemingly moral persons to engage in very immoral acts. Such was the case with former CIA executive Kyle “Dusty” Foggo, who was indicted in 2007 by the Department of Justice for accepting bribes in return for steering millions of taxpayer dollars towards his friend’s private contract company, ADCS Inc. In the same case against Foggo, former California Congressman and Navy ace fighter pilot Randy “Duke” Cunningham was sentenced to 8 years in federal prison for his part in the procurement scam.
Absent any malicious intent, there are still areas within the SAP process that provide a safe haven for poor decision making and insufficient oversight.
Chiefly, when it comes America’s elected leaders who are tasked with approving or disapproving clandestine programs. How many of them actually possess the technical prowess to adequately assess a program’s feasibility or need? Out of the members of the “The Gang of Eight”—the only eight members of Congress who are authorized to have knowledge of Waived-Unacknowledged SAPs—presently, none have any background in the military or technological and scientific research sectors.
This reality is somewhat remarkable, considering one must possess the technical requisites necessary to work within a SAP, however, a significant number of the precious few who ultimately pull the strings of this hidden world outside of the Pentagon and the industrial complex that support it, need only to be popular among their constituencies.
There are other potentially adverse aspects of secrecy that get very little attention. For instance, it costs exponentially more money to run a classified program than one that is unclassified. The deeper you get into the shadows, the more expensive that secrecy costs and declassifying something can be extremely expensive, problematic, and time-consuming. This has likely resulted in throngs of programs that pose little to no risk when it comes to disclosure, but will never see the light of day regardless.
In addition, there have been accusations that some programs get classified at least in part so as not to compete with existing and in some cases inferior high-profile capabilities or operations that are already in production or underway. It's possible that this could be to hide the program from those who would otherwise work to destroy it—especially the pork rollers on Capitol Hill and the highly territorial services that occupy the Pentagon. On the other hand, even a service itself could fear that its own clandestine emerging capability could threaten an existing one that it has already bet heavily on.
Bad Ideas, Big Classified Budgets
An argument can certainly be made that putting reclusive, highly complex, and expensive defense programs in the hands of elected leaders who lack any subject matter expertise makes for ideal conditions that result in costly and entirely avoidable failures. One example is the proposed nuclear-powered rocket system “Project Timber Wind.”
Once considered a key component of President Reagan’s Strategic Defense Initiative—better known as “Star Wars”—Timber Wind also offers a peek at how deep secrecy can lend a hand to quietly crossing the line of what the public is likely willing to find acceptable in the name of national security.
The aim of the once Unacknowledged SAP, Timber Wind, was to develop nuclear thermal rockets capable of reaching space to support ballistic missile defense. Outwardly unreasonable as it sounds, with America no longer facing the Cold War threat of the Soviet Union, in 1992 when details about the program were declassified, many in the scientific community were stunned to discover the grand plan behind Timber Wind involved a two-stage rocket process whereby, immense tanks of liquid hydrogen attached to a nuclear reactor would be fired off into the atmosphere.
Serving as the inspiration behind the founding of the Federation for American Scientists' (FAS) “Project on Government Secrecy,” current FAS director Steven Aftergood would describe Timber Wind as “Just about as dangerous a machine as any I can imagine,” adding the SAP was “Sheer scientific adventurism.”
When all was said and done, the government shelled out $139 million dollars before finally canceling Project Timber Wind. Though the loss of money may be significant, the potential costs for “pumping liquid hydrogen across a “bed” of uranium at 5,000 degrees Fahrenheit” a mere stone's throw from an unwitting Nevada or Utah populous, could have resulted in far more catastrophic public health and ecological consequences.
Intriguingly, (in a macabre kind of way) a willingness to take extreme risk in order to maintain the vanguard defensive capabilities, isn’t merely an isolated event. Instead, as many former Area-51 employees have come to discover, secrecy with minimal oversight can have very personal and disturbing consequences.

Area 51: A Place That Is Literally Above The Law
In the mid-1990s, several former employees of the Air Force’s infamous Area 51 flight test facility—the developmental home of so many SAPs and a place that is itself a massive SAP—sought the help of legal scholar and attorney Jonathan Turley.
Riddled with various serious illnesses, the former Area 51 workers told Turley that officials had, for years, been burning classified equipment and materials in large trenches for disposal at the secret military facility located seventy-five miles north of Las Vegas, Nevada. The plumes of thick toxic smoke that would billow and linger across the installation would come to be known as “London fog,” by Area 51 employees, Turley later recounted .
Armed with tales of ecological catastrophe and a zeal for justice, Jonathan Turley and the Area 51 veterans would launch an epic legal battle to define the line between national security and basic civil liberties.
The chief aim of the Area 51 employees’ lawsuit was to discover what exactly they had been exposed to, in hopes it might help them receive medical care. As reasonable as this request might have been, sanctioned secrecy protecting Area 51, not only allowed for the government to refuse information that might save the workers lives, it also allowed for the government to repeatedly insist that no such place even existed.
Only after Turley provided satellite pictures he purchased from Russia, did the government finally admit Area 51’s existence to the courts. As a result, U.S. District Judge Phillip Pro would reject the government’s claim of “state secrets privilege” and declare the government was required to disclose what hazardous chemicals employees had been exposed to.
In a tragic twist, in light of the federal court judge’s ruling, no one would get the opportunity to ever find out exactly what types of toxic substances had been allowed to permeate the secret facility. Instead, in an 11th-hour intervention, President Bill Clinton issued a Presidential Determination that exempted installation from environmental disclosure laws.

Ultimately, by a stroke of the pen, secrecy overrode the federal law, defeated basic civil liberties, and largely sealed the fates of those impacted by the open-air burnings at the base. Also, President Clinton put a definitive stop to any appeals for government accountability at the reclusive military test site.
Sadly, former Area 51 employees Wally Kasza and Bob Frost would lose their own personal battles with debilitating skin and respiratory illnesses. Analysis of tissue samples from the autopsy of Bob Frost showed , “unidentifiable and exotic substances that one of the nation’s premier scientists could not recognize,” Jonathan Turley later told the L.A. Times . Described by Turley as “deeply patriotic guys,” both men are assumed causalities of the government’s war to maintain secrecy at Area 51.
Since the legal battles of the 1990s, more employees have continued to come forward complaining of serious and life-threatening ailments as a result of working at Area 51. Instead of making amends for the wanton risk placed on the very people who helped usher in some most remarkable advances in military technology the world’s ever known, every U.S. president has annually reissued President Clinton’s initial 1995 executive order declaring Area 51 to above environmental laws.
While the potential for Special Access Programs to serve as hidden conduits for costly government waste can and should spark formal debate and even dinner table discussions, for the families of Wally Kasza, Bob Frost, and others who’ve found themselves dealing with the effects of extreme government secrecy, the price for that secrecy can come with significant and dramatically personal costs.
Dark Nights Can Equal Bright Stars
Now, as ominous as they may feel at the moment, Special Access Programs are far from being all doom and gloom. Conversely, as bestselling author Richard Paul Evans puts it, “It is often in the darkest skies that we see the brightest stars.”
When it comes to bright stars set against a dark sky of secrecy, one must consider, arguably the forefather example of the modern SAP— Lockheed’s U-2 Dragon Lady high-altitude reconnaissance aircraft.
The minimal interference of working in the shadows allowed Kelly Johnson and his team of just 28 Lockheed special projects engineers to design, build, and fly a spy plane capable of flying at 70,000 feet in only 8 months. Ironically, the U-2 program also gave birth to Area 51 .

Employing many of the same techniques used by SAPs today, the extreme secrecy reduced external meddling from the powers that be in and around Washington D.C., the potential of competing interests from the military services, from the very entity the program is being executed for, and from multiple outside contractors. The latter of which allowed 87% of the U-2’s development to be performed in a single building in Burbank, California, then the Skunk Works’ headquarters.
Ultimately, deep secrecy can allow for wasteful “scientific adventurism,” the bottom-line truth is that this same risky inspiration can equally allow for incredible technological breakthroughs. In fact, without the breathing room of secrecy and minimal external interference, some remarkable and game-changing technologies may never have come to fruition.
For instance, the F-117 Nighthawk and even the framework for the modern internet emerged from the dark shadows of Special Access Programs.
Whereas disclosed defense programs that fail after a bunch of money was spent can have major repercussions, even though some would say not major enough, secrecy allows for risks to be taken without the fear of becoming a headline news story.
Yes, this is a major concern for potential abuse and waste, but at the same time it has become somewhat essential to making huge qualitative leaps in defense-related technologies. Lockheed’s Skunk Works largely defined this reality and has built a hugely successful operational model around it that has been knocked off by many contractors and businesses entities.
To put it another way, making it ok to fail by classifying a program can be an incredibly powerful tool for promoting major innovation.
With all this in mind, it is simply impossible to ever say that that innovation shrouded by secrecy is inherently a bad thing.

Final Thoughts on Special Access Programs
It’s important to note, we’ve almost entirely focused on the Department of Defense’s secrecy ecosystem and the Special Access Programs and “clandestine” operations that spring forth from it. Though briefly mentioned early on, when it comes to secrets stemming from the intelligence community and “covert” activities, that’s a whole other sprawling government maze, complete with entirely different regulations, policies, and federal laws. We’ll likely don our secret decoder ring and try to untangle that surreptitious web in the future.
But for now…
When it comes to Special Access Programs, like virtually all government operations, they are mostly cumbersome bureaucratic affairs.
Though visions of a powerful shadow government of sorts may tantalize our imaginations, within the dense procedural jungle of SAPs, these programs are not inherently good or bad. Instead, SAPs are merely institutions made up of people, and like any group people, the inner sanctums of SAPs can be comprised of good and bad individuals and good and bad ideas.
Few would competently argue against the fact that some defense programs and operations need to be tightly classified. That’s not to say there aren’t real concerns associated with deep black programs very few people even know exist. Notably, the designed exclusivity and compartmentalization of SAPs doesn’t just help protect national secrets, it allows for considerably impactful information to be secured to a minute number of defense officials, legislators, and industry insiders. With such a substantial vacuum of power and influence, self-interest can easily become national interest, and suddenly SAPs can become safe houses for careless, wasteful, or even illegal activities.
Confidentiality may indeed be an unavoidable byproduct of ensuring national defense and we cannot reasonably expect to be able to eradicate the secrecy Special Access Programs protect. However, we can, and should, be willing to know how the underlying secrecy processes work. If for no other reason than to ensure secrecy is always maintained with a laser focus on the greater good for us all and a reasonable balance is being maintained between the need for secrecy and the public’s right to know.
Contact the editor: [email protected]

CNN values your feedback
Fear & Greed Index
Latest Market News
Maui conspiracy theories are spreading on social media. Why this always happens after a disaster

A slew of viral conspiracy videos on social media have made baseless claims that the Maui wildfires were started intentionally as part of a land grab, highlighting how quickly misinformation spreads after a disaster.
While the cause of the fires hasn’t been determined, Hawaiian Electric — the major power company on Maui — is under scrutiny for not shutting down power lines when high winds created dangerous fire conditions. (Hawaiian Electric previously said both the company and the state are conducting investigations into what happened). Maui experienced high winds from Hurricane Dora in the south while it was also grappling with a drought. Wildfires across the region have long been a concern .
Still, conspiracy theories continue to circulate as nearly 400 people are still unaccounted for.
It’s not uncommon for conspiracy theories to make the rounds after a national crisis. According to Renee DiResta, a research manager at Stanford University who studies misinformation, people often look for a way to make sense of the world when they are anxious or have a feeling of powerlessness.
“Theories that attribute the cause of a crisis to a specific bad actor offer a villain to blame, someone to potentially hold responsible,” DiResta said. “The conspiracy theories that are the most effective and plausible are usually based on some grain of truth and connect to some existing set of beliefs about the world.”
For example, someone who distrusts the government may be more inclined to believe someone who posts negatively about a government agency.
Conspiracy theorists on varying platforms claim the fires, which killed at least 114 people earlier this month, were planned as part of a strategic effort to weed out less wealthy residents on Maui and make room for multi-million dollar developments.
In one video, a user claims a friend sent him a video of a laser beam “coming out of the sky, directly targeting the city.” “This was a direct energy weapon assault,” he said. The video remains posted but now includes a label from Instagram listing it as “false information.” The imagery appears to be from a previous SpaceX launch in California.
Related far-fetched theories say the alleged “laser beams” were programmed not to hit anything blue, explaining why so many blue beach umbrellas were left unscathed by the fires.
Other social media users allege elite Maui residents were behind the fires so they could buy the destroyed land at a discounted price and rebuild potentially a “smart city.”
“You’re telling me that these cheaper lower middle class houses burnt down directly across the street and all of the mansions are still standing?” one YouTube user posted, referencing aerial imagery taken of the destruction.

Schools are teaching ChatGPT, so students aren't left behind
One tweet about a celebrity purchasing hundreds of acres across Maui over the past few years has received more than 12 million views on X, the platform formerly known as Twitter.
When a conspiracy theory gains traction online, others may chime in and offer explanations for details not discussed in the original post. Social media algorithms can amplify these theories based on user attention and interactions.
“Social media is incredibly valuable in crisis events as people on the ground can report the facts directly, but that usefulness is tempered, and can be dangerous, if misleading claims proliferate particularly in the immediate aftermath,” DiResta said.
How social media networks are cracking down
Social media platforms like Instagram, TikTok and YouTube have taken steps to curb the spread of conspiracy theories and misinformation, but some videos can slip through the cracks. Many platforms use a mix of tech monitoring tools and human reviewers to enforce their community guidelines .
Ahead of the publishing of this article, TikTok removed several conspiracy theory videos sent by CNN that were in violation of its community guidelines, which it characterizes as “inaccurate, misleading, or false content that may cause significant harm to individuals or society, regardless of intent” on the platform. A company spokesperson said more than 40,000 trust and safety professionals around the world review and moderate content at all hours of the day.
Meanwhile, in a statement provided to CNN, YouTube spokesperson Elena Hernandez said the platform uses different sections, such as top news , developing news and a fact-check panel, to provide users with as much context and background information as possible on certain trending topics, and will remove content when necessary.
“During major news events, such as the horrific fires in Hawaii, our systems are designed to raise up content from authoritative sources in search results and recommendations,” Hernandez said.
Instagram also employs third-party fact-checkers to contact sources, check public data and work to verify images and videos on questionable content. They then rate and provide labels to the content in question, such as “false,” “altered” or “missing context,” to encourage viewers to think critically about what they’re about to see.
As a result, those posts show up far less often in users’ feeds and repeat offenders can face varying risks, such as losing monetization on their pages.
Social media platform X did not immediately respond to a request for comment.
Michael Inouye, a principal analyst at market research firm ABI Research, said social media companies are in a challenging spot because they want to uphold freedom of speech, but do so in an environment where posts that receive the most shares and likes often rise to the top of user feeds. That means posts sharing conspiracy theories that spark fear and emotion may perform better in a crisis than those sharing straightforward, accurate information.
“Ultimately, social media will have to decide if it wants to be a better news organization or remain this ‘open’ platform for expression that can run counter to the ethics and standards that is required by news reporting,” Inouye said. “The problem is, even if something isn’t labeled as ‘news,’ some will still interpret personal opinion as truth, which puts us back in the same position.”
More from CNN Business

CNN Business Videos

- Investigates
- Houston Life
- Newsletters
AI project imagines adult faces of children who disappeared during Argentina's military dictatorship
Almudena Calatrava
Associated Press
Copyright 2023 The Associated Press. All rights reserved
The computer screen of Santiago Barros shows old photographs of couple Maria Eugenia Gonzalez and Nestor Oscar Junquera, who disappeared during the 1976-1983 dictatorship, above AI-generated images, using an app called Midjourney, of what their stolen son might look like today, in Buenos Aires, Argentina, Thursday, Aug. 2, 2023. Barros using artificial intelligence to create images of what the children of parents who disappeared during the dictatorship might look like as adults and uploads them to an Instagram account called iabuelas, which is a portmanteau in Spanish for artificial intelligence, or IA, and grandmother, or abuela taken from the well-known activist group Grandmothers of Plaza de Mayo, who search for missing children. (AP Photo/Natacha Pisarenko)
BUENOS AIRES – If a baby was taken from their parents four decades ago during Argentina's military dictatorship, what would that person look like today?
Argentine publicist Santiago Barros has been trying to answer that question using artificial intelligence to create images of what the children of parents who disappeared during the dictatorship might look like as adults.
Almost every day, Barros uploads these images to an Instagram account called iabuelas, which is a portmanteau in Spanish for artificial intelligence, or IA, and grandmother, or abuela — taken from the well-known activist group Grandmothers of Plaza de Mayo that searches for missing children.
“We have seen the photos of most of the disappeared, but we don’t have photos of their children, of those children who were stolen," Barros told The Associated Press. "It struck me that these people did not have a face.”
During Argentina's bloody dictatorship from 1976 to 1983, military officials carried out the systematic theft of babies from political dissidents who were detained or often executed and disposed of without a trace. The babies were often raised by families linked to the dictatorship, or those ideologically aligned with it, as if they were their own.
Using an app called Midjourney, Barros combines photos of the disappeared fathers and mothers from the public archive of the Grandmothers website, creating images of what the faces of their children might look like as adults today. For each combination, the app shows two female and two male possibilities. Barros then chooses the image of each gender that seems most realistic.
The project does not intend to replace efforts headed by the Grandmothers group of identifying grandchildren through DNA testing . Instead, Barros says, the goal is to stir the conscience of those over 46 who may have doubts about their origin and to serve as a reminder of the more than four decades the grandmothers have spent trying to locate these children.
The Grandmothers of the Plaza de Mayo estimates around 500 children were snatched from their parents during the dictatorship. The group has located 133 grandchildren through genetic analysis.
The group appreciates Barros' initiative as a way to raise awareness about the children who were stolen or kidnapped during the dictatorship. But they warn that the only infallible tool to link these people with their families of origin is DNA testing that continues to be carried out by the National Genetic Data Bank, whose creation they promoted in 1987.
In addition to working with photos from the Grandmothers' archives, Barros uses photographic material provided by interested parties.
In some cases, those who have accessed iabuelas have noticed in the images a tendency towards standardization, raising questions about their approximation to reality. But in others, families searching for a lost relative have been shocked by the resemblance they found in those faces to blood relatives.
Such was the case for Matías Ayastuy, who contacted Barros and provided him with photos of his disappeared parents to see what a possible brother or sister would look like. His mother, Marta Bugnone, was kidnapped in 1977 when she was pregnant. By combining the image of her and that of his father, Jorge Ayastuy, the AI tool was able to come up with some impressive results.
“A lot of people see the masculine image as similar to me. But what generated something very, very strong for me was the feminine one. I found a very striking resemblance to a cousin of mine," Ayastuy said.
In the month since Barros' initiative launched, there have not yet been any known cases of an adult seeing themselves as similar to one of his images and then starting a formal process of identification.
All the images of the disappeared parents and their possible children are uploaded to the Instagram account with a note specifying that iabuelas is an “unofficial artistic project” and that results generated by artificial intelligence can be inaccurate.
Pedro Sandoval, a grandson who was identified in 2006, embraced Barros’ initiative at first, but later decided it was imperfect because it seems to rely too much on “standardized patterns” of people with European features. His mother, Liliana Fontana, and his father, Pedro Sandoval, are among the 30,000 missing persons counted by humanitarian organizations.
Barros acknowledged the app might be skewed, but noted that many of the disappeared people had European ancestors, in a country with strong European immigration.
As for the grandmothers, they don't want the AI campaign to create false expectations for those who find similarities with the generated images, so they have urged it to be taken with a grain of salt.
“It is a campaign that shows simulations about possible faces of sons and daughters of the disappeared, but we know that people are much more than 50 percent of each of their parents and that foreign applications are set with genotypes of their populations," the group said in a statement at the end of July. “Therefore, the results are not accurate.”
Associated Press video journalist Victor Caivano contributed to this report.
Copyright 2023 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.

IMAGES
COMMENTS
By Todd South. Oct 11, 2021. The Army's Ground Vehicle Systems Center works on Project Origin at Fort Polk, Louisiana. (Army) The Army's Combat Capabilities Development Command and its ...
In-depth analysis, investigative series, features and reader engagement combine are all elements of Military Times' special projects. Installation Guide • Battle Bracket • America's Military...
August 22-24, 2023 The Electronics Resurgence Initiative (ERI), DARPA's response to national-level microelectronics concerns, is designed to ensure U.S. leadership in cross-functional, next-generation microelectronics research, development, and manufacturing. More
Manhattan Project (6 C, 23 P) N Nuclear weapons program of the United States (9 C, 28 P) P Project Nike (2 C, 17 P) Projects of the United States Air Force (22 P) U United States Army projects (5 C, 37 P) United States biological weapons program (1 C, 30 P) United States Marine Corps projects (11 P)
The military uses radios constantly, and interference and jamming of these signals is a major worry. DARPA's Advanced RF Mapping program seeks to map the airwaves, identifying which frequencies ...
The Special Projects Branch assembles project delivery teams to support the nation through homeland security/ defense, disaster and infrastructure work within the Omaha District's Area of...
Army Special Operations Forces use Project Origin systems in latest Soldier experiment By Jerome Aliotta March 9, 2022 1 / 2 Show Caption + Army Green Berets from the 1st Special Forces...
U.S. Department of Defense contracts valued at $7.5 million or more are announced each business day at 5 p.m.
In-depth analysis, investigative series, features and reader engagement combine are all elements of Military Times' special projects. Installation Guide • Battle Bracket • Task Force Violent •...
The Special Projects Program (SPP) at Huntsville Center provides the right tools and resources to ensure customers special requirements are met. This program is an incubator for new programs as well as a resource within the U.S. Army Corps of Engineers or, ... Military Support Division - Special Projects Program Program Manager: 256-895-1766 ...
In-depth analysis, investigative series, features and reader engagement combine are all elements of Military Times' special projects.
The minimal interference of working in the shadows allowed Kelly Johnson and his team of just 28 Lockheed special projects engineers to design, build, and fly a spy plane capable of flying at ...
The Special Projects Program (SPP) at Huntsville Center provides the right tools and resources to ensure customers special requirements are met. This program is an incubator for new programs as well as a resource within the U.S. Army Corps of Engineers or, The Special Projects Program (SPP) at Huntsville Center provides the right tools and ...
United States Navy Special Projects Office (SPO) is a former research and design office of the United States Navy, responsible for the coordination of the development and design of the US Navy Fleet Ballistic Missiles (FBM) Polaris and Poseidon .
Military Construction Projects.....102 Host Nation Funded Construction February 2020 4. DEPARTMENT OF THE AIR FORCE MILITARY FAMILY HOUSING PROGRAM FISCAL YEAR 2021 ... Tab - SPECIAL PROGRAM CONSIDERATIONS. DEPARTMENT OF THE AIR FORCE . MILITARY CONSTRUCTION PROGRAM FISCAL YEAR 2021 .
Special Projects Patrol Squadron Two, which operates the mysterious P-8s, takes pains to blend in with regular forces. To most people, the Florida-based unit's aircraft look like the roughly 100 ...
The Special Projects Branch consists of three sections to manage Interagency & International Support/ Rapid Response (IIS); Facilities, Sustainment, Restoration, and Modernization (FSRM); and...
MILCON includes construction projects for all types of buildings, facilities, roads, airfield pavements, and utility systems costing more than $750,000. While there are other funding mechanisms...
The Special Projects Section continues to grow as the district's ERI workload increases in 2016 and beyond —about $210 million in military construction and FSRM [facilities, sustainment, restoration and modernization] projects for the Army and Air Force are currently under construction or design in Poland, Estonia, Latvia, Lithuania ...
SPECIAL PROJECT DEVGROUP, is the parent company of a portfolio recognized solutions in the international military services marketplace, employs a variety of highly trained quite professionals that assist clients with specialized business continuity needs in high risk environments.
The Armed Forces Special Weapons Project ( AFSWP) was a United States military agency responsible for those aspects of nuclear weapons remaining under military control after the Manhattan Project was succeeded by the Atomic Energy Commission on 1 January 1947.
Bremont Military and Special Projects, Henley on Thames. 12,633 likes · 60 talking about this. The Bremont Military Facebook page is a dedicated forum for the unique work that Bremont carries out
A slew of viral conspiracy videos on social media have made baseless claims that the Maui wildfires were started intentionally as part of a land grab, highlighting how quickly misinformation ...
The computer screen of Santiago Barros shows old photographs of couple Maria Eugenia Gonzalez and Nestor Oscar Junquera, who disappeared during the 1976-1983 dictatorship, above AI-generated ...
The Special Projects Section continues to grow as the district's ERI workload increases in 2016 and beyond --about $210 million in military construction and FSRM [facilities, sustainment ...