How Bad Was Trump's Reported Disclosure of Classified Information?

President Donald Trump meets with Russian Foreign Minister Sergey Lavrov, left, next to Russian Ambassador to the U.S. Sergei Kislyak at the White House in Washington, Wednesday, May 10. President Donald Trump meets with Russian Foreign Minister Sergey Lavrov, left, next to Russian Ambassador to the U.S. Sergei Kislyak at the White House in Washington, Wednesday, May 10. Russian Foreign Ministry Photo via AP

Monday The Washington Post dropped the bombshell that President Donald Trump had revealed classified information about the Islamic State to Russian Foreign Minister Sergei Lavrov and Russian ambassador Sergey Kislyak when the three of them met at the White House last week. You know a story is big when it gets as many concurrent visitors as the story about the infamous Access Hollywood video. There was no hiding near bushes in the dark this time to walk back the damage. Deputy National-Security Advisor Dina Powell declared the story “false,” and the administration also called out the big guns, with Secretary of State Rex Tillerson and National Security Advisor H.R. McMaster dutifully rushing into the breach to discuss the breach, using oh-so-carefully worded statements about how the president did not reveal “sources or methods” or any “military operations” that were not already known publicly.

So just how bad is the damage? On a scale of 1 to 10—and I’m just ball parking here—it’s about a billion. The story, which has since been confirmed by The Wall Street JournalThe New York Times, Reuters, Buzzfeed, and CNN, notes that the president could have jeopardized a critical source of intelligence on the Islamic State. Not America’s source. Somebody else’s. Presumably from an allied intelligence service who now knows that the American president cannot be trusted with sensitive information.

The type of information Trump cavalierly shared fell under a classification known as “code word,” according to the Post. There are three basic levels of classified information. Confidential information is defined as anything that could reasonably be expected to “cause damage” to American national security if shared without authorization. Secret information is one step up, considered to have the potential to cause “serious damage” if revealed. Top Secret information is a higher classification level still, comprising anything that could reasonably be expected to cause “exceptionally grave damage” to U.S. national security if revealed.

Code word is beyond Top Secret. It limits access to classified information to a much narrower pool of people to provide an extra layer of security. Many secrets are super-secrets—Harry Truman, as vice president, didn’t know about the Manhattan project. He learned of it only after Franklin Delano Roosevelt died and Truman was sworn in as president. Code word classification is so far off the scale, even fake spies rarely refer to it in the movies. Technically, the president can "declassify" anything he wants, so he did not violate any laws. But as Lawfarenotes, if the president tweeted out the nuclear codes, he also wouldn't violate the law—but he would rightly be considered unfit for office.

Did Trump reveal intelligence crown jewels or just boast about the fact that he liked diamonds? According to the Post he revealed information about a purported ISIS plot involving laptops. It’s likely, however, that Tillerson, McMaster, the Post and the Times are ALL correct: The president did not reveal sources or methods or military operations. But that doesn’t matter much if he gave away information that will enable the Russians to identify the source or the methods. It looks like he did, since according to the Post’s account he talked about the content of a specific plot, the potential harm, and the location of the city in the Islamic State’s territory where the allied state’s intelligence service detected it. It was almost everything except the GPS coordinates. The denials by Tillerson and McMaster are a classic case of intelligence super-parsing—saying things that are technically and narrowly true but may not be accurate at all. No spin can hide the fact that the breach was deadly serious and reckless in the extreme.

Then there’s the impact on America’s unnamed ally, whom the Post reported was already nervous about sharing such sensitive intelligence with the United States. It is difficult to penetrate the Islamic State, and there is a major risk that this breach will close down a vital source. It’s an even bigger deal in the big picture, potentially jeopardizing intelligence cooperation with other U.S. allies around the world. Trump already raised intelligence eyebrows when he turned his Mar-a-Lago dining area into an impromptu Situation Room after the North Koreans decided to launch a ballistic missile. The president and his aides used the lights on cell phones to illuminate field reports, in full view of resort dinner guests snapping photos. If you’re known as someone who cannot keep a secret, the world’s secret-keepers are not going to tell you much.

“Can you believe the world we live in today?” President Trump said, according to one official in the two Sergeis meeting. “Isn’t it crazy?”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.