National Security Letters
Australia has declassified and released THOUSANDS of pages of official UFO reports and research. This archived contains them all.
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information.
The first major foreign crisis for the United States after the end of the Cold War
Timothy McVeigh was an American who detonated a truck bomb in front of a Federal Building in Oklahoma City on April 19, 1995.
Shootdown of KAL (Korean Air Lines) 007
It is hard to avoid the feeling that something very fundamental has happened in world history.
Operation Enduring Freedom" (OEF) is the official name used by the U.S. government for the War in Afghanistan
Collision between USS Hartford and the USS New Orleans
Agencies amass an amazing amount of information of terrorist organizations and their capabilities. Below, you will find many of the reports obtained through the FOIA and available publically.
Human cloning is the creation of a genetically identical copy of a human.
Agencies periodically conduct their own special investigations and produce reports about certain allegations against their respective departments.
Corona Satellite / Discoverer Program
The Northrop Grumman B-2 Spirit is a multirole heavy bomber with "low observable" stealth technology...
The Mikoyan-Gurevich MiG-23 is a swing-wing fighter aircraft, designed by the Mikoyan-Gurevich bureau in the Soviet Union.
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.
Nuclear Weapons Surety Reports
The following documents relate to the combat units of World War II.
On 8 January 2005 at 02:43 GMT, San Francisco collided with an undersea mountain
"Obamacare", is a United States federal statute signed into law by President Barack Obama on March 23, 2010.
A photo shoot involving a 747 used as Air Force One and one fighter jet flying at low altitude led to hundreds of frightened calls from residents and workers in Lower Manhattan
As the world population grows, many problems and questions arise. This section archives documents dealing with these world issues.
Miscellaneous Records on Spy Satellites
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
Cryptologic Almanac 50th Anniversary Series
N71MC - Hudson Mid-Air Collision
Somali Pirate Takeover &
April of 2009
The following documents relate to the Army Air Force history during the World War II era.
Agency Records Retention Schedules and Records Management
How "Bruno" Gains Access -
Documents Reveal Inside Look at Tactics
History of US Marine Corps Operations in World War II
Link to The Black Vault and/or
Get FREE Radio on YOUR SITE!
Have a website? Want to link to The Black Vault? Help spread the word about discovering the truth, right here on The Black Vault! You…
A parasite aircraft is an aircraft which is carried, and air launched by, a mother ship aircraft.
Abu Ghraib Prison Scandal (Taguba Report)
Videos Produced & Created by NASA
A guided missile is a self-propelled projectile used as a weapon. Missiles are typically propelled by rockets or jet engines.
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent.
FBI Domestic Investigations and Operations Guide (DIOG)
History of Satellite Reconnaissance
Jessica Dawn Lynch (born April 26, 1983) is a former Private First Class (PFC) in the United States Army Quartermaster Corps.
A controversial medical study carried out at Willowbrook State School in Staten Island, New York.
Anthrax Threat, Savannah River Site, Aiken, S.C.
The Democratic People’s Republic of Korea, commonly known as North Korea, is a country in East Asia
3/11 Madrid, Spain Train Bombings (2004)
The following are documents pertaining to warfare intellinge from different conflicts.
The Jeremiah Panel - An NRO Review
An effort to recover radioactive material from a downed satellite was dubbed Operation Morning Light.
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.