FOIA Document Sections in this Category
RSS
 
Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID).
10 days ago · From Administrator
Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event.
12 days ago · From Administrator
Civil defense or civil protection is an effort to protect the citizens of a state (generally non-combatants) from military attack.
12 days ago · From Administrator
National Security Letters
12 days ago · From
As Congress is looking into the U.S. Government surveillance programs, the intelligence agencies ironically declassified multiple documents
15 days ago · From Administrator
Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC).
66 days ago · From Administrator
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent.
133 days ago · From
The aim of the initiative is to use sockpuppets to spread pro-American propaganda on social networking sites based outside of the US.
135 days ago · From Administrator
Agencies periodically conduct their own special investigations and produce reports about certain allegations against their respective departments.
145 days ago · From
Teetering on Martial Law, these documents describe how the military and government can get involved in civil disturbances.
154 days ago · From
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act
163 days ago · From Administrator
Iran has sent six warships to international waters, including the Gulf of Aden in 2009.
280 days ago · From Administrator
Many government agencies use MoUs to define a relationship between departments and agencies.
284 days ago · From
The following documents chronicle the breaches of White House airspace, as received from the FAA.
326 days ago · From Administrator
An unmanned combat air vehicle (UCAV), also known as a combat drone or drone, is an unmanned aerial vehicle (UAV) that is armed
333 days ago · From Administrator
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information.
405 days ago · From
Coalition Jets Shoot Down Iranian Drone Over Iraq
417 days ago · From Administrator
The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) ran a series of "gunwalking" sting operations between 2006 and 2011.
585 days ago · From Administrator
Wartime Tactics and Strategies
589 days ago · From
The Jeremiah Panel - An NRO Review
892 days ago · From
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States.
1268 days ago · From
US Intelligence Report: Iran with Capability to Strike US by 2014
1418 days ago · From
Y2K
1618 days ago · From
The following are documents pertaining to warfare intellinge from different conflicts.
1618 days ago · From
The Raven Rock Mountain Complex (RRMC) is a United States government facility on Raven Rock, a mountain in the U.S. state of Pennsylvania.
1618 days ago · From
The following are useful and informative references on defense related issues.
1618 days ago · From
Miscellaneous Records
1618 days ago · From
This series of analytical summaries attempts to identify and analyze trends
1618 days ago · From
The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.
1618 days ago · From