Information Warfare

February 24, 2015

Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare…

National Security Letters

February 24, 2015

A National Security Letter (NSL) is a form of administrative subpoena used by the United States Federal Bureau of Investigation…

Operation Ghost Dancer – U.S. Army Assists in Drug Enforcement

February 24, 2015

Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID). The…

Cyber Attacks Against the U.S. Government – July 2009

February 24, 2015

The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites…

Strategic Gaming

February 24, 2015

The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their…

Blackwater / Academi / Constellis Holdings Contracts & Records

February 24, 2015

Blackwater has a deep and dark history with the United States military and government. It has been renamed a few…

Wartime/Defense Tactics and Strategies

February 24, 2015

Since the dawn of our intelligence and military agencies, soldiers, strategists, think tanks and others have spent an extensive amount…

Continuity of Government

February 24, 2015

Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations…

National Intelligence Estimates

February 24, 2015

National Intelligence Estimates (NIEs) are United States federal government documents that are the authoritative assessment of the Director of National…

Cryptanalysis

February 24, 2015

The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or…