Popular FOIA Documents
All Time · Today · Week · Month · RSS
 
The Future of Money
1493 days ago · From
Misc Documents on Iraq & Afghanistan
1493 days ago · From
This series of analytical summaries attempts to identify and analyze trends
1493 days ago · From
Executive Office of the President (EOP) Employee Manual
1268 days ago · From
A controversial medical study carried out at Willowbrook State School in Staten Island, New York.
467 days ago · From Administrator
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
304 days ago · From Administrator
FBI Domestic Investigations and Operations Guide (DIOG)
36 days ago · From
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
858 days ago · From
Original Wizards of Langley
1493 days ago · From
Piers Morgan Tonight on CNN FCC Complaints
387 days ago · From Administrator
FAA Office of Aviation Research Report Index
1493 days ago · From
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
513 days ago · From Administrator
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
208 days ago · From Administrator
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
573 days ago · From Administrator
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
1268 days ago · From
The RECON - National Reconnaissance Office (NRO) Publication
1415 days ago · From
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
380 days ago · From Administrator
USS Minneapolis St. Paul, Four Sailor Deaths
1493 days ago · From
The following documents were received that pertain to research into the development and use of Autonomous Robots.
590 days ago · From Administrator
The Glenn Beck Program on Fox News
1493 days ago · From
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
1393 days ago · From
In some cases, you can request a list of classified records. This section contains some examples and lists.
282 days ago · From Administrator
Detainee Related Records
209 days ago · From
OTA Reports, 1993 - 1995
1486 days ago · From
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
182 days ago · From Administrator
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
552 days ago · From Administrator
FOIA Policy, Changes and Handbooks
1143 days ago · From
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
1493 days ago · From
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
24 days ago · From
European Axis Signal Intelligence in World War II
1399 days ago · From
Miscellaneous Records
1493 days ago · From
Human cloning is the creation of a genetically identical copy of a human.
141 days ago · From Administrator
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
159 days ago · From Administrator
Hubble Space Telescope
1493 days ago · From
Anderson Cooper 360 on CNN
1493 days ago · From
Nash is the subject of the Hollywood movie A Beautiful Mind.
380 days ago · From Administrator
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
1493 days ago · From
OTA Reports, 1972 - 1979
1486 days ago · From
Larry King Live on CNN
1493 days ago · From
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
1493 days ago · From
This release consists of the FBI's 1991 background investigation of Jobs for that position and a 1985 investigation of a bomb threat against Apple.
599 days ago · From
Learn how the Army made their food back in the 1800's and check out their cooking procedures for Beef, chicken, fish and so much more.
115 days ago · From Administrator
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
929 days ago · From
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
1143 days ago · From
STS-51 - Challenger Disaster - January 28, 1986
1493 days ago · From
STS-107 - Columbia Disaster - February 1, 2003
1493 days ago · From
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
571 days ago · From Administrator
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate
439 days ago · From Administrator
UKUSA Agreement marked the reaffirmation of the vital WWII cooperation between the United Kingdom and United States
977 days ago · From
201-250 of 358
Per page: 
Popular FOIA Files