In some cases, you can request a list of classified records. This section contains some examples and lists.
Coalition Jets Shoot Down Iranian Drone Over Iraq
Title 22 of the US Code, Section 2656f (the "Act"), requires the Department of State to provide to Congress a annual report on terrorism
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
The following documents detail the use of Cryptology inside the United States Intelligence Community.
Congressional Correspondence (all members) with the Office of the Secretary of Defense and the Joint Staff
Cryptologic Almanac 50th Anniversary Series
Declassified issues of the Communicator - NSA's Employee Publication.
Collision between USS Hartford and the USS New Orleans
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
The Submarine Incident off Kildin Island was a collision between the US Navy nuclear submarine USS Baton Rouge and the Russian nuclear submarine K-276...
On the 2nd of September 1958, Soviet MiG-17 pilots shot down a U.S. Air Force reconnaissance-configured C-130 aircraft over Soviet Armenia
The following are uncategorized documents from the Cold War era. They are listed on this page until they are properly categorized.
The following documents relate to the combat units of World War II.
Central Intelligence Agency (CIA) UFO Collection
Corona Satellite / Discoverer Program
Critical Issues in the History of Spaceflight
The following are documents from the Cryptologic Quarterly, declassified by the NSA.
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.