Senator Barack Obama (Pre-Presidency)
This series documents important aspects of the war in Southeast Asia.
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
Misc Documents on Iraq & Afghanistan
This series of analytical summaries attempts to identify and analyze trends
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
Original Wizards of Langley
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
In some cases, you can request a list of classified records. This section contains some examples and lists.
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
STS-107 - Columbia Disaster - February 1, 2003
Piers Morgan Tonight on CNN FCC Complaints
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
The following documents were received that pertain to research into the development and use of Autonomous Robots.
Anderson Cooper 360 on CNN
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
FAA Office of Aviation Research Report Index
USS Minneapolis St. Paul, Four Sailor Deaths
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
The RECON - National Reconnaissance Office (NRO) Publication
Nash is the subject of the Hollywood movie A Beautiful Mind.
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
Learn how the Army made their food back in the 1800's and check out their cooking procedures for Beef, chicken, fish and so much more.
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
The Glenn Beck Program on Fox News
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
FOIA Policy, Changes and Handbooks
European Axis Signal Intelligence in World War II
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate
This release consists of the FBI's 1991 background investigation of Jobs for that position and a 1985 investigation of a bomb threat against Apple.
Osama bin Laden, the founder and head of the Islamist militant group al-Qaeda, was killed in Pakistan on May 2, 2011
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
STS-51 - Challenger Disaster - January 28, 1986