The following documents chronicle the breaches of White House airspace, as received from the FAA. Breaches of White House Air…
The following was reported by the Reuters news agency, on 05/25/2009: Iran has sent six warships to international waters, including…
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare…
A National Security Letter (NSL) is a form of administrative subpoena used by the United States Federal Bureau of Investigation…
Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID). The…
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites…
The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their…
Blackwater has a deep and dark history with the United States military and government. It has been renamed a few…
Since the dawn of our intelligence and military agencies, soldiers, strategists, think tanks and others have spent an extensive amount…
Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations…