Popular FOIA Documents
All Time · Today · Week · Month · RSS
 
Executive Office of the President (EOP) Employee Manual
1365 days ago · From
The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.
401 days ago · From Administrator
Prisoners of War (POWs)
1590 days ago · From
The Future of Money
1590 days ago · From
Misc Documents on Iraq & Afghanistan
1590 days ago · From
This series of analytical summaries attempts to identify and analyze trends
1590 days ago · From
Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress. The Black Vault has archived the nearly 20,000 pages released to Bloomberg after their FOIA Lawsuit.
955 days ago · From
Miscellaneous Records
1590 days ago · From
Under Article I Section 8 of the United States Constitution, Congress has the sole power to borrow money on the credit of the United States.
610 days ago · From Administrator
Original Wizards of Langley
1590 days ago · From
Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.”
477 days ago · From Administrator
In some cases, you can request a list of classified records. This section contains some examples and lists.
379 days ago · From Administrator
Operation Gladio is the codename for a clandestine NATO "stay-behind" operation in Europe during the Cold War.
256 days ago · From Administrator
In 1951 the US Army Chemical Corps and Ordnance Corps initiated a joint program to develop a 115mm chemical rocket.
1365 days ago · From
STS-107 - Columbia Disaster - February 1, 2003
1590 days ago · From
Piers Morgan Tonight on CNN FCC Complaints
484 days ago · From Administrator
Operation Redwing was a United States series of 17 nuclear test detonations from May to July 1956.
121 days ago · From
Soviet Capabilities and Probable Courses of Action Against North America in a Major War
670 days ago · From Administrator
The following documents were received that pertain to research into the development and use of Autonomous Robots.
687 days ago · From Administrator
Anderson Cooper 360 on CNN
1590 days ago · From
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
305 days ago · From Administrator
USS Minneapolis St. Paul, Four Sailor Deaths
1590 days ago · From
Operation Blowdown was designed to simulate the effects of a nuclear weapon on tropical rainforest, using 50 tons of conventional explosive (TNT)
649 days ago · From Administrator
FAA Office of Aviation Research Report Index
1590 days ago · From
The RECON - National Reconnaissance Office (NRO) Publication
1512 days ago · From
Nash is the subject of the Hollywood movie A Beautiful Mind.
477 days ago · From Administrator
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
102 days ago · From Administrator
Learn how the Army made their food back in the 1800's and check out their cooking procedures for Beef, chicken, fish and so much more.
212 days ago · From Administrator
Amerithrax Investigation (Anthrax Attacks via U.S. Postal Mail)
1490 days ago · From
Detainee Related Records
306 days ago · From
More than 4,000 tons of shells exploded near a military testing ground some 40 kilometers from the city of Orenburg in Central Russia
279 days ago · From Administrator
The Glenn Beck Program on Fox News
1590 days ago · From
The Lockheed F-117 Nighthawk is a stealth ground attack aircraft formerly operated by the United States Air Force.
1590 days ago · From
FOIA Policy, Changes and Handbooks
1240 days ago · From
OTA Reports, 1993 - 1995
1583 days ago · From
European Axis Signal Intelligence in World War II
1496 days ago · From
Hubble Space Telescope
1590 days ago · From
Mission of monitoring and controlling airspace south of the 32nd Parallel in Iraq.
668 days ago · From Administrator
OTA Reports, 1972 - 1979
1583 days ago · From
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
1590 days ago · From
Innovation is a constant feature of terrorism, yet little is known about how terrorists innovate
536 days ago · From Administrator
Y2K
1590 days ago · From
Osama bin Laden, the founder and head of the Islamist militant group al-Qaeda, was killed in Pakistan on May 2, 2011
91 days ago · From Administrator
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
1240 days ago · From
Larry King Live on CNN
1590 days ago · From
Presents a case study of one air-ground team's experience with the theory and practice of tactical air power employed during the climactic Word War 2 campaigns against the forces of Nazi Germany.
1590 days ago · From
STS-51 - Challenger Disaster - January 28, 1986
1590 days ago · From
The Navy Bumblebee program was created at the end of WW-II to develop a defense against the Japanese kamikaze threat.
1026 days ago · From
The Phoenix Lights (sometimes called the "Lights over Phoenix") were a series of widely sighted unidentified flying objects observed in the skies over Arizon
306 days ago · From Administrator
201-250 of 354
Per page: 
Popular FOIA Files