Transparency

Sources & Evidence

Where our information comes from and how we evaluate it.

Primary vs Secondary Sources

We distinguish between three tiers of sources. This matters because the type of source directly affects the confidence grade we assign to a facility claim. Not all evidence carries the same weight.

1 Primary Sources

Direct evidence from official government channels. These carry the highest evidentiary weight.

  • FOIA returns and releases
  • Declassified government documents
  • Official agency statements
  • Public Congressional records
  • Court filings and legal documents

Highest confidence weight

2 Secondary Sources

Professional analysis and reporting on primary materials. Valuable corroboration when multiple sources agree.

  • Credible news investigations
  • Peer-reviewed academic research
  • Documented expert analysis
  • GAO and CRS reports
  • Contractor public filings

Medium confidence weight

3 Tertiary Sources

Unverified accounts and anecdotal evidence. These are documented but always labeled Unverified.

  • Eyewitness personal accounts
  • Local community reports
  • Online forum discussions
  • Unverified social media claims
  • Historical anecdote

Cannot confirm alone

Key Public Records Sources

These are the primary databases and portals we use to research underground facilities. All are freely accessible to the public.

Understanding FOIA Documents

FOIA returns can look intimidating, but once you understand the common markings and patterns, they're readable. Here's what to look for.

What Redaction Marks Mean

Black bars (█) indicate removed text. When agencies redact information, they're required to indicate which exemption applies. Look for:

  • b(1) — Exemption 1: Classified information
  • b(2) — Internal personnel rules and practices
  • b(3) — Withheld under other statutory provisions
  • b(6) — Personal privacy
  • b(7) — Law enforcement records

Identifying Which Exemption Was Invoked

Most agencies use a cover letter or "Vaughn index" to explain their redactions. Key indicators:

  • Cover pages usually list exemptions with brief descriptions
  • Individual redaction markers like b(1), b(7) appear near each redaction
  • Heavy use of b(1) near "TOP SECRET" markings indicates classified programs
  • Frequent b(7) use in operational documents suggests law enforcement sensitivity

How to Read Contract Documents

Government contracts reveal construction and service activities. Key fields to examine:

  • NAICS codes — Industry classification indicating the type of work
  • Place of performance — Where work is actually being done
  • Contractor name — Identifies the company performing work
  • Description/PARS — Specific details about work scope

Interpreting Budget Line Items

Defense and military budgets use specific terminology. Look for:

  • Program Element codes — Budget line identifiers tied to specific programs
  • R-1 Exhibit — Detailed budget justification documents
  • "Construction" vs "O&M" — Capital investment versus operations and maintenance
  • Classified appendices — Often contain the actual funding levels for sensitive programs

Imagery and Digital Evidence

Photographs, satellite imagery, and web content require their own verification methods. Here's how we evaluate digital evidence.

Satellite Imagery Verification

  • Cross-reference coordinates against multiple mapping services
  • Use historical imagery to establish timeline of construction
  • Verify imagery source and resolution quality
  • Compare against independent analyst findings

Metadata Verification

  • Check EXIF data for original capture date and device
  • Verify GPS coordinates embedded in image metadata
  • Note any edits or modifications to original file
  • Reverse image search to find original source

Web Source Archiving

Web content can disappear or change. We archive sources to preserve evidence:

All web sources cited on this site include archived copies.

Chain of Custody

For submitted materials, we document the chain of custody:

  • Record submitter identity and contact information
  • Timestamp submission date and receipt confirmation
  • Preserve original file with integrity hash
  • Note any access restrictions or confidentiality