Popular FOIA Documents
All Time · Today · Week · Month · RSS
 
This series documents important aspects of the war in Southeast Asia.
1586 days ago · From
Prisoners of War (POWs)
1586 days ago · From
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
397 days ago · From Administrator
The Future of Money
1586 days ago · From
Misc Documents on Iraq & Afghanistan
1586 days ago · From
This series of analytical summaries attempts to identify and analyze trends
1586 days ago · From
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
951 days ago · From
Miscellaneous Records
1586 days ago · From
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
605 days ago · From Administrator
Original Wizards of Langley
1586 days ago · From
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
473 days ago · From Administrator
In some cases, you can request a list of classified records. This section contains some examples and lists.
375 days ago · From Administrator
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
252 days ago · From Administrator
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
1361 days ago · From
Piers Morgan Tonight on CNN FCC Complaints
480 days ago · From Administrator
STS-107 - Columbia Disaster - February 1, 2003
1586 days ago · From
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
117 days ago · From
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
666 days ago · From Administrator
The following documents were received that pertain to research into the development and use of Autonomous Robots.
683 days ago · From Administrator
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
301 days ago · From Administrator
Anderson Cooper 360 on CNN
1586 days ago · From
FAA Office of Aviation Research Report Index
1586 days ago · From
USS Minneapolis St. Paul, Four Sailor Deaths
1586 days ago · From
The RECON - National Reconnaissance Office (NRO) Publication
1508 days ago · From
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
645 days ago · From Administrator
Nash is the subject of the Hollywood movie A Beautiful Mind.
473 days ago · From Administrator
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
1485 days ago · From
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
98 days ago · From Administrator
Learn how the Army made their food back in the 1800's and check out their cooking procedures for Beef, chicken, fish and so much more.
208 days ago · From Administrator
Detainee Related Records
302 days ago · From
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
275 days ago · From Administrator
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
1586 days ago · From
FOIA Policy, Changes and Handbooks
1236 days ago · From
OTA Reports, 1993 - 1995
1579 days ago · From
European Axis Signal Intelligence in World War II
1492 days ago · From
Hubble Space Telescope
1586 days ago · From
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
664 days ago · From Administrator
OTA Reports, 1972 - 1979
1579 days ago · From
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
1586 days ago · From
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate
532 days ago · From Administrator
Y2K
1586 days ago · From
This release consists of the FBI's 1991 background investigation of Jobs for that position and a 1985 investigation of a bomb threat against Apple.
692 days ago · From
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
1236 days ago · From
Osama bin Laden, the founder and head of the Islamist militant group al-Qaeda, was killed in Pakistan on May 2, 2011
87 days ago · From Administrator
Larry King Live on CNN
1586 days ago · From
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
1586 days ago · From
STS-51 - Challenger Disaster - January 28, 1986
1586 days ago · From
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
1022 days ago · From
The Phoenix Lights (sometimes called the "Lights over Phoenix") were a series of widely sighted unidentified flying objects observed in the skies over Arizon
301 days ago · From Administrator
UKUSA Agreement marked the reaffirmation of the vital WWII cooperation between the United Kingdom and United States
1070 days ago · From
201-250 of 353
Per page: 
Popular FOIA Files