Popular FOIA Documents
All Time · Today · Week · Month · RSS
 
Executive Office of the President (EOP) Employee Manual
1367 days ago · From
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
402 days ago · From Administrator
Prisoners of War (POWs)
1591 days ago · From
The Future of Money
1591 days ago · From
This series of analytical summaries attempts to identify and analyze trends
1592 days ago · From
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
956 days ago · From
Miscellaneous Records
1592 days ago · From
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
611 days ago · From Administrator
Original Wizards of Langley
1592 days ago · From
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
478 days ago · From Administrator
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
258 days ago · From Administrator
In some cases, you can request a list of classified records. This section contains some examples and lists.
381 days ago · From Administrator
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
1367 days ago · From
STS-107 - Columbia Disaster - February 1, 2003
1592 days ago · From
The following documents were received that pertain to research into the development and use of Autonomous Robots.
688 days ago · From Administrator
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
672 days ago · From Administrator
Piers Morgan Tonight on CNN FCC Complaints
485 days ago · From Administrator
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
123 days ago · From
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
307 days ago · From Administrator
Anderson Cooper 360 on CNN
1592 days ago · From
USS Minneapolis St. Paul, Four Sailor Deaths
1592 days ago · From
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
651 days ago · From Administrator
FAA Office of Aviation Research Report Index
1592 days ago · From
The RECON - National Reconnaissance Office (NRO) Publication
1514 days ago · From
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
104 days ago · From Administrator
Nash is the subject of the Hollywood movie A Beautiful Mind.
478 days ago · From Administrator
Learn how the Army made their food back in the 1800's and check out their cooking procedures for Beef, chicken, fish and so much more.
214 days ago · From Administrator
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
1491 days ago · From
Detainee Related Records
308 days ago · From
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
281 days ago · From Administrator
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
1592 days ago · From
The Glenn Beck Program on Fox News
1592 days ago · From
FOIA Policy, Changes and Handbooks
1242 days ago · From
OTA Reports, 1993 - 1995
1585 days ago · From
European Axis Signal Intelligence in World War II
1498 days ago · From
Hubble Space Telescope
1592 days ago · From
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
670 days ago · From Administrator
OTA Reports, 1972 - 1979
1585 days ago · From
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
1592 days ago · From
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate
538 days ago · From Administrator
Osama bin Laden, the founder and head of the Islamist militant group al-Qaeda, was killed in Pakistan on May 2, 2011
92 days ago · From Administrator
This release consists of the FBI's 1991 background investigation of Jobs for that position and a 1985 investigation of a bomb threat against Apple.
697 days ago · From
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
1242 days ago · From
Larry King Live on CNN
1592 days ago · From
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
1591 days ago · From
STS-51 - Challenger Disaster - January 28, 1986
1592 days ago · From
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
1028 days ago · From
The Phoenix Lights (sometimes called the "Lights over Phoenix") were a series of widely sighted unidentified flying objects observed in the skies over Arizon
307 days ago · From Administrator
UKUSA Agreement marked the reaffirmation of the vital WWII cooperation between the United Kingdom and United States
1076 days ago · From
201-250 of 355
Per page: 
Popular FOIA Files