Department of Defense FOIA offices are prohibited from responding to “significant” FOIA requests having “departmental level interest” without approval from the Pentagon.
Federal Bureau of Investigation (FBI) File No. 62-HQ-21440, Informational Brochure Concerning the FBI, 1929-1946
Various FBI files on prominent scientists & Medical Professionals.
Technology and Intelligence Gatheringcontains various files from the FBI and various agencies on intelligence gathering methods and technology.
The following are FBI files of important people throughout history and important events.
Mohamed Mohamed el-Amir Awad el-Sayed Atta was an Egyptian hijacker and Islamic terrorist and one of the ringleaders of the September 11 attacks.
9/11 Terrorist Attacks (2001)
Ebola virus disease (EVD), Ebola hemorrhagic fever (EHF) or simply Ebola is a disease of humans and other mammals caused by an ebolavirus.
Aaron H. Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, writer, political organizer, and Internet activist.
Defense Related Space Reports
U.S. taxpayers have to foot the bill $486 million dollars worth of aircraft the Defense Department decided to destroy, according to interim research conducted by the inspector general.
Domestic espionage projects carried out by the CIA.
A serial killer is, traditionally, a person who has murdered three or more people over a period of more than a month.
Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC).
Noah's Ark is the vessel in the Genesis flood narrative (Genesis chapters 6–9) by which God saves Noah, his family, and a remnant of all the world's animals.
Extra Sensory Perception (ESP)
Tor is free software and an open network that helps you defend against traffic analysis.
HAARP is an ionospheric research program jointly funded by the U.S. Air Force, the U.S. Navy, the University of Alaska, and the Defense Advanced Research Projects Agency (DARPA).
The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their defense and offensive strategies.
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
National Reconnaissance Office (NRO) Directives
Area 51 is a nickname for a military base located in the southern portion of Nevada in the western United States
Good intelligence depends in large measure on clear, concise writing.
Kryptos is an encrypted sculpture by American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia.
On September 11, 2012 in Libya, a heavily armed group executed an attack on the U.S. diplomatic mission in Benghazi.
$334,135,534 spent to save $1,600,000 a year, for a system that will only last 25 years?
Journalists have long been watched by the FBI. Here are a list of prominent journalists over the decades.
It comes as no surprise, as celebrities and gangsters were being watched -- so were the politicians. The following is a list of released records.
Acoustic Kitty was a CIA project launched by the Directorate of Science & Technology in the 1960s attempting to use cats in spy missions.
Iraq & Weapons of Mass Destruction
The primary goal of the Stardust mission was to collect samples of a comet and return them to Earth for laboratory analysis.
FOIA Policy, Changes and Handbooks
These files were released and obtained by the FBI, all in relation to the Paranormal.
The actual, classified, mission of the MOL program was to place a manned surveillance satellite into orbit.
Five NATO troops and an Afghan soldier were killed in a friendly-fire airstrike in southern Afghanistan in June of 2014.
All UFO records from the NSA.
Bowe Robert Bergdahl (born March 28, 1986) is a United States Army soldier who was held captive by the Taliban-aligned Haqqani network in Afghanistan.
In June of 2014, Region 8 of the EPA in Denver, Colorado, was forced to write a memorandum to their employees regarding their bathroom behavior and etiquette.
Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID).
Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event.
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
National Security Letters
As Congress is looking into the U.S. Government surveillance programs, the intelligence agencies ironically declassified multiple documents
Operation Northwoods was a series of false flag proposals that originated within the United States government in 1962, but were rejected by the Kennedy administration.
Various CIA Historical Publications
There are a total of 23,973 personnel files from the Office of Strategic Services (OSS) between 1941 and 1945. Here is a sampling of a few.
FBI files on famous, and well known, American military men and women.
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
Below, you will find various reports regarding foreign intelligence on Russia. This will primarily consist of records after the Cold War.
For fun, I thought it would be interesting to see if, at all, the United States Government or Military references or uses The Black Vault.