The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
Original Wizards of Langley
FAA Office of Aviation Research Report Index
Piers Morgan Tonight on CNN FCC Complaints
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
This is the only place on the internet where you can find all 89,901 pages of the CIA's Stargate Collection.
The RECON - National Reconnaissance Office (NRO) Publication
The Glenn Beck Program on Fox News
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
USS Minneapolis St. Paul, Four Sailor Deaths
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
The following documents were received that pertain to research into the development and use of Autonomous Robots.
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
FOIA Policy, Changes and Handbooks
Anderson Cooper 360 on CNN
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
In some cases, you can request a list of classified records. This section contains some examples and lists.
European Axis Signal Intelligence in World War II
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
Nash is the subject of the Hollywood movie A Beautiful Mind.
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
A controversial medical study carried out at Willowbrook State School in Staten Island, New York.
This release consists of the FBI's 1991 background investigation of Jobs for that position and a 1985 investigation of a bomb threat against Apple.
STS-51 - Challenger Disaster - January 28, 1986
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
STS-107 - Columbia Disaster - February 1, 2003
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
FBI Domestic Investigations and Operations Guide (DIOG)
Untangling the Web - A Guide to Internet Research NSA Publication
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
UKUSA Agreement marked the reaffirmation of the vital WWII cooperation between the United Kingdom and United States
Human cloning is the creation of a genetically identical copy of a human.
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate