<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>defense - The Black Vault</title>
	<atom:link href="https://www.theblackvault.com/documentarchive/tag/defense/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblackvault.com/documentarchive</link>
	<description>Discover the Truth</description>
	<lastBuildDate>Wed, 18 Jun 2025 00:54:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.theblackvault.com/documentarchive/wp-content/uploads/2020/06/cropped-siteicon-2-150x150.jpg</url>
	<title>defense - The Black Vault</title>
	<link>https://www.theblackvault.com/documentarchive</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">87123917</site>	<item>
		<title>DoD Releases Previously Unseen Document Detailing &#8220;NIGHT TRAIN 84&#8221; Nuclear War Exercise Scenario</title>
		<link>https://www.theblackvault.com/documentarchive/dod-releases-previously-unseen-document-detailing-night-train-84-nuclear-war-exercise-scenario/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dod-releases-previously-unseen-document-detailing-night-train-84-nuclear-war-exercise-scenario</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 18 Jun 2025 00:54:05 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[iran]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[nuclear war]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=20626</guid>

					<description><![CDATA[<p>The Department of Defense (DoD) has released, through a Freedom of Information Act (FOIA) request filed by The Black Vault, a detailed briefing document outlining the classified scenario for &#8220;Exercise NIGHT TRAIN 84.&#8221; The document, which appears not to have been publicly released prior to this, provides an in-depth look at Cold War-era planning for [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/dod-releases-previously-unseen-document-detailing-night-train-84-nuclear-war-exercise-scenario/">DoD Releases Previously Unseen Document Detailing “NIGHT TRAIN 84” Nuclear War Exercise Scenario</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Department of Defense (DoD) has released, through a Freedom of Information Act (FOIA) request filed by The Black Vault, a detailed briefing document outlining the classified scenario for &#8220;Exercise NIGHT TRAIN 84.&#8221; The document, which appears not to have been publicly released prior to this, provides an in-depth look at Cold War-era planning for nuclear conflict and the associated military and civil defense operations.</p>
<p><a href="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39.jpg"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-20630" src="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39.jpg" alt="" width="949" height="433" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39.jpg 949w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39-300x137.jpg 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39-150x68.jpg 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39-450x205.jpg 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39-768x350.jpg 768w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-39-39-600x274.jpg 600w" sizes="(max-width: 949px) 100vw, 949px" /></a></p>
<p>According to the document, NIGHT TRAIN 84 was designed as a major biennial nuclear war exercise that included elements from previous exercises such as &#8220;GLOBAL SHIELD,&#8221; &#8220;AMALGAM CHIEF,&#8221; and FEMA’s &#8220;<a href="https://www.theblackvault.com/documentarchive/military-intervention-in-civil-disturbances/" target="_blank" rel="noopener">REX 84</a> ALPHA.&#8221; The exercise aimed to simulate coordinated responses to a global nuclear conflict, with live flying and the use of strategic weapon systems incorporated into the exercise play. The scenario was directly shaped by Cold War tensions and modeled on large-scale Soviet exercises reviewed in June 1982.</p>
<p>&#8220;The exercise is designed with two four-day phases,&#8221; the document states, &#8220;on the pre and trans-attack period&#8230; A 24-hour administrative break will simulate 15 days of survival and recovery activity. Phase II will begin on Day 6 of the exercise and will concentrate on activities in the post-nuclear attack period.&#8221;</p>
<p>A primary objective was to test U.S. <a href="https://www.theblackvault.com/documentarchive/continuity-of-government/" target="_blank" rel="noopener">continuity of government</a> plans following a nuclear exchange, as well as strategic and tactical military responses. &#8220;National participation is anticipated because of the desire to evaluate post-nuclear attack continuity of government plans,&#8221; the briefing notes.</p>
<figure id="attachment_20631" aria-describedby="caption-attachment-20631" style="width: 300px" class="wp-caption alignright"><a href="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35.jpg"><img decoding="async" class="wp-image-20631 size-medium" src="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-300x300.jpg" alt="" width="300" height="300" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-300x300.jpg 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-150x150.jpg 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-450x451.jpg 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-600x601.jpg 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35-336x336.jpg 336w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-42-35.jpg 677w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-20631" class="wp-caption-text">A breakdown of the simulated scenario</figcaption></figure>
<p>The simulated scenario begins with escalating global tensions, including Soviet inroads in the Caribbean, discovery of Soviet SA-5 missile site construction in Cuba, and Soviet opportunism in Ethiopia, Afghanistan, and Iran. The exercise projects events such as open civil war in Iran, increased Soviet military aid and presence in various regions, and NATO’s heightened military readiness in response to Soviet exercises perceived as cover for mobilization.</p>
<p>By 5 April 1984, the exercise posits that &#8220;Soviet and Warsaw Pact forces attacked in Central Europe and Turkish Thrace,&#8221; with chemical and nuclear weapons employed on 6 April in an attempt to break NATO resistance. The scenario culminates in &#8220;Soviet nuclear counterforce attacks against the United States and follow-on theater nuclear strikes on NATO&#8221; on 8 April.</p>
<p>In the wake of these simulated attacks, the United States shifted focus to survival and recovery operations during a compressed 15-day period. The exercise outlined that &#8220;unified and specified commands will operate at reduced strength from alternate command locations during this phase and will concentrate on reconstitution of their commands and redirection of their forces.&#8221; A major emphasis was placed on ensuring coordination between surviving national command authorities (NCA), reconstituted federal agencies, and state governments, with the Commander-in-Chief Readiness Command (CINCRED) playing a central role in civil defense support. This phase was described as &#8220;a first step toward defining, developing and evaluating procedures for coping with events which might occur in the aftermath of nuclear war,&#8221; highlighting the complexities of maintaining command connectivity and stabilizing the nation following a large-scale nuclear strike.</p>
<p>Meanwhile, the document describes the grim aftermath facing the Soviet Union. &#8220;While most of the Soviet and elements of Warsaw Pact leadership survived the U.S. retaliatory strike, they were not able to reconstitute their strategic arsenal as quickly as had been expected&#8230; Restoration of key production and services was inhibited by popular unwillingness to return to contaminated areas.&#8221;</p>
<p>The exercise also envisioned significant civil unrest within the Soviet bloc and a turn toward diplomatic resolution. &#8220;Faced with these problems, Soviet leaders began to seek a political solution to the crisis,&#8221; with both sides agreeing on a ceasefire in the European theater after 15 days.</p>
<p>Throughout, the document emphasizes the importance of testing the interaction between surviving national command authorities (NCA), reconstituted government agencies, and state governments. The scenario aimed to &#8220;provide study and better understanding of the complex issues involved in the trans- and post-nuclear attack periods.&#8221;</p>
<p><a href="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10.jpg"><img decoding="async" class="aligncenter size-full wp-image-20629" src="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10.jpg" alt="" width="955" height="577" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10.jpg 955w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10-300x181.jpg 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10-150x91.jpg 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10-450x272.jpg 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10-768x464.jpg 768w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2025/06/2025-06-17_17-37-10-600x363.jpg 600w" sizes="(max-width: 955px) 100vw, 955px" /></a></p>
<p>Portions of the document remain redacted, withheld under FOIA exemptions including 5 U.S.C. § 552(b)(1) for information classified in the interest of national security and 5 U.S.C. § 552(b)(3) under 50 U.S.C. 3605, protecting NSA functions and information.</p>
<p>The release of this document comes at a time when global tensions echo some of the very scenarios envisioned in NIGHT TRAIN 84. Today, Iran remains a focal point of international security concerns, with ongoing disputes over its nuclear program, regional influence, and relations with the United States and its allies. The fictional civil war and foreign interventions in Iran portrayed in the exercise underscore the enduring strategic significance of the region, as well as the risks posed by instability there.</p>
<p>Moreover, the exercise’s emphasis on rapid escalation, chemical and nuclear weapons use, and the struggle to maintain continuity of government after a large-scale nuclear exchange serves as a stark reminder of the catastrophic consequences that could arise from modern conflicts spiraling out of control. As nuclear-armed states continue to navigate strained relations, the lessons and planning embedded in Cold War exercises like NIGHT TRAIN 84 remain relevant, highlighting the need for diplomacy, crisis management, and updated continuity plans in an increasingly unpredictable world.</p>
<p>###</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/osd/18-F-1106.pdf">Exercise Night Train 84 Briefing, August 1983</a> [24 Pages, 5.5MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fosd%2F18-F-1106.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/osd/18-F-1106.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/osd/18-F-1106.pdf" download>Download [5.25 MB] </a></p></div><p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/dod-releases-previously-unseen-document-detailing-night-train-84-nuclear-war-exercise-scenario/">DoD Releases Previously Unseen Document Detailing “NIGHT TRAIN 84” Nuclear War Exercise Scenario</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20626</post-id>	</item>
		<item>
		<title>DOD Dictionary of Military and Associated Terms</title>
		<link>https://www.theblackvault.com/documentarchive/dod-dictionary-military-associated-terms/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dod-dictionary-military-associated-terms</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 22 Nov 2022 09:00:22 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[department of defense]]></category>
		<category><![CDATA[DOD]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[terms]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=3310</guid>

					<description><![CDATA[<p>Background The DOD Dictionary of Military and Associated Terms (or DOD Dictionary) sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/dod-dictionary-military-associated-terms/">DOD Dictionary of Military and Associated Terms</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The DOD Dictionary of Military and Associated Terms (or DOD Dictionary) sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components.</p>
<p>This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other US Government departments and agencies, and among the United States and its allies.</p>
<p>This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in the DOD Dictionary is enumerated in Department of Defense Instruction (DODI) 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology.</p>
<h3>DOD Dictionary of Military and Associated Terms</h3>
<p><em>Current as of May 2022 (released November 2022)</em></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/osd/22-F-1166.pdf">DOD Dictionary of Military and Associated Terms, May 2022</a> [361 Pages, 119MB]</p>
<h3>Archived Versions</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/dod/dictionary-nov2019.pdf">DOD Dictionary of Military and Associated Terms, November 2019</a> [376 Pages, 1.5MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dod/dictionary.pdf">DOD Dictionary of Military and Associated Terms, October 16, 2016 </a>[400 Pages, 1.7MB]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/dod-dictionary-military-associated-terms/">DOD Dictionary of Military and Associated Terms</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3310</post-id>	</item>
		<item>
		<title>Defense Airborne Reconnaissance Office (DARO) Unmanned Aerial Vehicles (UAV), Program Plan, April 1994</title>
		<link>https://www.theblackvault.com/documentarchive/defense-airborne-reconnaissance-office-daro-unmanned-aerial-vehicles-uav-program-plan-april-1994/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defense-airborne-reconnaissance-office-daro-unmanned-aerial-vehicles-uav-program-plan-april-1994</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 13 Nov 2021 14:45:00 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[DOD]]></category>
		<category><![CDATA[Drones]]></category>
		<category><![CDATA[UAV]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=15247</guid>

					<description><![CDATA[<p>The Congressional Authorization Conference in November 1993 sent a message that was clearly received by the Department of Defense (DoD). The report said that, in this new, post-Cold War era, &#8220;tactical reconnaissance is relatively more important to national security than at any other time in our history.&#8221; At the same time, a new approach was [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/defense-airborne-reconnaissance-office-daro-unmanned-aerial-vehicles-uav-program-plan-april-1994/">Defense Airborne Reconnaissance Office (DARO) Unmanned Aerial Vehicles (UAV), Program Plan, April 1994</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Congressional Authorization Conference in November 1993 sent a message that was clearly received by the Department of Defense (DoD). The report said that, in this new, post-Cold War era, &#8220;tactical reconnaissance is relatively more important to national security than at any other time in our history.&#8221; At the same time, a new approach was requested that would &#8220;bring management attention, order, and efficiency&#8221; to tactical airborne reconnaissance development and acquisition. On 6 November 1993, in response to Congressional concerns, the Deputy Secretary of Defense (DepSecDef) created the Defense Airborne Reconnaissance Office (DARO), under the Under Secretary of Defense (Acquisition and Technology) (USD(A&amp;T)).</p>
<p>The DARO has been charged with unifying existing reconnaissance architectures and enhancing the management and acquisition of all joint Service and Defense-wide manned and unmanned airborne reconnaissance/surveillance capabilities.</p>
<p>DARO is engaged in the task of benchmarking its fundamental responsibilities and resources. It will create the climate necessary for change by concentrating its energies in the following areas: (a) assessment and tradeoff of system level capabilities; (b) analysis of system requirements to ensure interoperability; (c) development of new and improved sensor technologies; (d) pursuit of Advanced Concept Technology Demonstrations; and (e) development of a unifying airborne reconnaissance architecture consistent with other reconnaissance related roadmaps. The architecture will be joint and integrated, address manned and unmanned systems, stress open and digital designs, be adaptable to changing threats and include multi-level secure communications linked into the global network.</p>
<p>In developing an effective unmanned aerial vehicle (UAV) program plan, an evolutionary approach is the most prudent course of action given the existing and forecast budgetary environment. An evolutionary approach to the migration of UAVs into the mainstream of tactical reconnaissance capabilities builds on mature technologies, while permitting a &#8220;phased&#8221; approach to architectural development, testing, and operational employment. A broad range of alternatives exists, and now is the time to make a commitment to a proper mix of UAVs and manned reconnaissance capabilities. These alternatives will be available as developments warrant and simulations validate the interoperability of UAVs and manned aircraft to meet mission needs. Figure ES-1 identifies the major UAV programs that are the primary focus of the DARO. Other UAV systems discussed in this document for completeness and context are shown in relation to the primary DARO programs in Figure ES-2. This initial UAV program plan embraces lessons learned from past UAV programs and builds on recommendations of the 1993 Defense Science Board (DSB) Summer Study on  global Surveillance and the DoD Deep Target Surveillance/Reconnaissance Study to integrate manned and UAV capabilities. Most importantly, this plan highlights the ultimate goal of any military system or plan — service to the warfighter.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/dod/readingroom/892.pdf">Defense Airborne Reconnaissance Office (DARO) Unmanned Aerial Vehicles (UAV), Program Plan, April 1994</a> [170 Pages, 10.6MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fdod%2Freadingroom%2F892.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/dod/readingroom/892.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/dod/readingroom/892.pdf" download>Download [10.70 MB] </a></p></div><p>The post <a href="https://www.theblackvault.com/documentarchive/defense-airborne-reconnaissance-office-daro-unmanned-aerial-vehicles-uav-program-plan-april-1994/">Defense Airborne Reconnaissance Office (DARO) Unmanned Aerial Vehicles (UAV), Program Plan, April 1994</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15247</post-id>	</item>
		<item>
		<title>Mobile Force Protection Program Concludes with Successful Demonstration</title>
		<link>https://www.theblackvault.com/documentarchive/mobile-force-protection-program-concludes-with-successful-demonstration/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mobile-force-protection-program-concludes-with-successful-demonstration</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 08 Jun 2021 22:35:52 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[DARPA]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Drones]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=14349</guid>

					<description><![CDATA[<p>On June 7, 2021, DARPA released the following press release, with the video above. In recent tests at Eglin Air Force Base, DARPA’s Mobile Force Protection (MFP) program demonstrated a Counter-Unmanned Air System (C-UAS) multilayer defense architecture to defeat unauthorized drone intrusions over military installations or operations. Development of this low-cost reusable drone interceptor system [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/mobile-force-protection-program-concludes-with-successful-demonstration/">Mobile Force Protection Program Concludes with Successful Demonstration</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/1MHahNcn8Pc" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p>On June 7, 2021, DARPA released the following press release, with the video above.</p>
<p style="padding-left: 40px;"><em>In recent tests at Eglin Air Force Base, DARPA’s Mobile Force Protection (MFP) program demonstrated a Counter-Unmanned Air System (C-UAS) multilayer defense architecture to defeat unauthorized drone intrusions over military installations or operations. Development of this low-cost reusable drone interceptor system approach began four years ago with the aim of creating an integrated system for thwarting attacks from self-guided small unmanned aircraft. The goal is to protect high value convoys moving through potentially populated regions where there is a requirement to avoid using explosive defensive weapons and mitigate collateral damage.</em></p>
<p style="padding-left: 40px;"><em>The technology demonstrator successfully neutralized tactically-relevant drones using a newly-developed X band radar that automatically senses and identifies unmanned aerial system threats. The radar then pairs targets to specific interceptors through an automated decision engine tied to a command and control system, launching and guiding rotary and fixed wing interceptors with two types of drone countermeasures while on the move and without operator intervention.</em></p>
<p style="padding-left: 40px;"><em>“Because we were focusing on protecting mobile assets, the program emphasized solutions with a small footprint in terms of size, weight, and power,” said MFP program manager <a href="https://www.darpa.mil/staff/dr-gregory-avicola">Gregory Avicola</a> in DARPA’s <a href="https://www.darpa.mil/about-us/offices/tto">Tactical Technology Office</a>. “This also allows for more affordable systems and less operators.”</em></p>
<p style="padding-left: 40px;"><em>The requirement that the system field non-kinetic solutions pushed concepts that could be employed in and around civilian areas. The primary drone negation mechanism <a class="external" href="https://www.youtube.com/watch?v=pXkBu8QSEYY" target="_blank" rel="noopener">shoots strong, stringy streamers</a> from reusable interceptors that foul propellers causing loss of propulsion. Additionally, other non-kinetic techniques were developed and demoed. The focus on defeating raids with multiple threats, rather than single unmanned aerial attackers, required the development of an integrated solution of sensors, autonomy, and mitigation solutions more robust than existing systems. Dynetics was the primary systems integrator.</em></p>
<p style="padding-left: 40px;"><em>DARPA is currently working with the military services to transition technology developed in the MFP project into various acquisition programs.</em></p>
<p style="padding-left: 40px;"><em><strong>Image Caption:</strong> Mobile Force Protection project vehicle launches drone interceptor in test at Eglin Air Force Base.</em></p>
<p style="padding-left: 40px;" align="center"><em># # #</em></p><p>The post <a href="https://www.theblackvault.com/documentarchive/mobile-force-protection-program-concludes-with-successful-demonstration/">Mobile Force Protection Program Concludes with Successful Demonstration</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14349</post-id>	</item>
		<item>
		<title>U.S. Army Lab Explores AI/ML Potential in Development of Chemical Biological Defense Solutions</title>
		<link>https://www.theblackvault.com/documentarchive/u-s-army-lab-explores-ai-ml-potential-in-development-of-chemical-biological-defense-solutions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=u-s-army-lab-explores-ai-ml-potential-in-development-of-chemical-biological-defense-solutions</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 22 Dec 2020 13:19:17 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[army]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[chemical weapons]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[machine learning]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=12695</guid>

					<description><![CDATA[<p>Background Artificial intelligence and machine learning (AI/ML) is a next-generation computer capability that holds the potential for changing everything from how people live and work to how wars are fought and won. The Combat Capabilities Development Command Chemical Biological Center (DEVCOM CBC) is keeping pace with this computing revolution through its Grand Challenge Program, beginning [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/u-s-army-lab-explores-ai-ml-potential-in-development-of-chemical-biological-defense-solutions/">U.S. Army Lab Explores AI/ML Potential in Development of Chemical Biological Defense Solutions</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>Artificial intelligence and machine learning (AI/ML) is a next-generation computer capability that holds the potential for changing everything from how people live and work to how wars are fought and won. The Combat Capabilities Development Command Chemical Biological Center (DEVCOM CBC) is keeping pace with this computing revolution through its Grand Challenge Program, beginning with three pilot projects and a workshop to recruit more.</p>
<h3>Video Archive</h3>
<p><iframe title="U.S. Army Lab Explores AI/ML Potential in Development of Chemical Biological Defense Solutions" width="788" height="443" src="https://www.youtube.com/embed/TSBSL6t55Fw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p><p>The post <a href="https://www.theblackvault.com/documentarchive/u-s-army-lab-explores-ai-ml-potential-in-development-of-chemical-biological-defense-solutions/">U.S. Army Lab Explores AI/ML Potential in Development of Chemical Biological Defense Solutions</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12695</post-id>	</item>
		<item>
		<title>Report 98-036, Intergovernmental Personnel Act Employees in the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs), December 11, 1997</title>
		<link>https://www.theblackvault.com/documentarchive/report-98-036-intergovernmental-personnel-act-employees-in-the-office-of-the-assistant-to-the-secretary-of-defense-nuclear-and-chemical-and-biological-defense-programs-december-11-1997/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-98-036-intergovernmental-personnel-act-employees-in-the-office-of-the-assistant-to-the-secretary-of-defense-nuclear-and-chemical-and-biological-defense-programs-december-11-1997</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Fri, 14 Feb 2020 15:07:47 +0000</pubDate>
				<category><![CDATA[Biological / Chemical Weapons]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[biological]]></category>
		<category><![CDATA[chemical]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[DOD]]></category>
		<category><![CDATA[DODIG]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=9160</guid>

					<description><![CDATA[<p>Background According to the introduction of the audit: &#8220;We performed the audit in response to allegations made to the Defense Hotline including the allegation that Sandia National Laboratory officials assigned to the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs) directed the Defense Special Weapons Agency to [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/report-98-036-intergovernmental-personnel-act-employees-in-the-office-of-the-assistant-to-the-secretary-of-defense-nuclear-and-chemical-and-biological-defense-programs-december-11-1997/">Report 98-036, Intergovernmental Personnel Act Employees in the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs), December 11, 1997</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>According to the introduction of the audit:</p>
<p style="padding-left: 40px;"><em><strong>&#8220;We performed the audit in response to allegations made to the Defense Hotline including the allegation that Sandia National Laboratory officials assigned to the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs) directed the Defense Special Weapons Agency to procure work from Department of Energy national laboratories. This is the second of two reports. The first report discusses two allegations related to Defense Special Weapons Agency procurements through the Department of Energy.&#8221;</strong></em></p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/dod/DODOIG-2020-000517.pdf">Report 98-036, Intergovernmental Personnel Act Employees in the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs), December 11, 1997</a> [55 Pages, 13MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fdod%2FDODOIG-2020-000517.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/dod/DODOIG-2020-000517.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/dod/DODOIG-2020-000517.pdf" download>Download [12.82 MB] </a></p></div><p>The post <a href="https://www.theblackvault.com/documentarchive/report-98-036-intergovernmental-personnel-act-employees-in-the-office-of-the-assistant-to-the-secretary-of-defense-nuclear-and-chemical-and-biological-defense-programs-december-11-1997/">Report 98-036, Intergovernmental Personnel Act Employees in the Office of the Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs), December 11, 1997</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9160</post-id>	</item>
		<item>
		<title>Leadership, Management, and Organization for National Security Space, July 2008</title>
		<link>https://www.theblackvault.com/documentarchive/leadership-management-and-organization-for-national-security-space-july-2008/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=leadership-management-and-organization-for-national-security-space-july-2008</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 02 May 2018 04:22:33 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[odni]]></category>
		<category><![CDATA[OSD/JS]]></category>
		<category><![CDATA[space]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=5964</guid>

					<description><![CDATA[<p>Background According to the document: &#8220;The Independent Assessment Panel (IAP) was chartered to review and assess the DoD management and organization of National Security in Space and make appropriate recommendations to strengthen the U.S. position. The IAP was supported in its efforts by a study team from the Institute for Defense Analyses (IDA). The IAP [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/leadership-management-and-organization-for-national-security-space-july-2008/">Leadership, Management, and Organization for National Security Space, July 2008</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>According to the document:</p>
<p style="padding-left: 30px;"><em><strong>&#8220;The Independent Assessment Panel (IAP) was chartered to review and assess the DoD management and organization of National Security in Space and make appropriate recommendations to strengthen the U.S. position. The IAP was supported in its efforts by a study team from the Institute for Defense Analyses (IDA). The IAP is grateful for the participation of liaison officers from the Department of Defense, the Office of the Director of National Intelligence, the National Reconnaissance Office, and the National Aeronautics and Space Administration (see Appendix C for the study team and liaison participants). This task was performed by IDA for the Director, Space Policy Office of Deputy Assistant Secretary of Defense for Strategic Capabilities under task entitled</strong></em><br />
<em><strong>&#8216;Department of Defense Organization and Management for National Security in Space.'&#8221;</strong></em></p>
<p>The document was requested by The Black Vault in September of 2017 and it was obtained in December of 2017, under NRO FOIA Case F-2017-00168.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dtic/ADA486551.pdf">Leadership, Management, and Organization for National Security Space, July 2008</a> [58 Pages, 0.4MB]</p>
<p>https://documents.theblackvault.com/documents/dtic/ADA486551.pdf</p><p>The post <a href="https://www.theblackvault.com/documentarchive/leadership-management-and-organization-for-national-security-space-july-2008/">Leadership, Management, and Organization for National Security Space, July 2008</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5964</post-id>	</item>
		<item>
		<title>A Revised Acquisition Program Baseline and Threat Assessment for the Chemical Demilitarization Program, October 2002</title>
		<link>https://www.theblackvault.com/documentarchive/revised-acquisition-program-baseline-threat-assessment-chemical-demilitarization-program-october-2002/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=revised-acquisition-program-baseline-threat-assessment-chemical-demilitarization-program-october-2002</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sun, 17 Sep 2017 19:43:34 +0000</pubDate>
				<category><![CDATA[Biological / Chemical Weapons]]></category>
		<category><![CDATA[Government Accountability & I.G. Reports]]></category>
		<category><![CDATA[chemical]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[department of defense]]></category>
		<category><![CDATA[DOD]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=5052</guid>

					<description><![CDATA[<p>Background This report is the first in a series of reports that discuss the acquisition of the Chemical Demilitarization Program (the Demilitarization Program). The mission of the Demilitarization Program is to destroy chemical munitions through incineration or other approved alternative technologies. In 1985, the Congress, in section 1521, title 50, United States Code, “Destruction of [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/revised-acquisition-program-baseline-threat-assessment-chemical-demilitarization-program-october-2002/">A Revised Acquisition Program Baseline and Threat Assessment for the Chemical Demilitarization Program, October 2002</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>This report is the first in a series of reports that discuss the acquisition of the Chemical Demilitarization Program (the Demilitarization Program). The mission of the Demilitarization Program is to destroy chemical munitions through incineration or other approved alternative technologies. In 1985, the Congress, in section 1521, title 50, United States Code, “Destruction of Existing Stockpile of Lethal Chemical Agents and Munitions,” (Public Law 99-145), directed DoD to oversee the destruction of the stockpile of lethal chemical agents and munitions because of concerns for the stockpile deterioration. The Army established the Program Manager for Chemical Demilitarization to manage the day-to-day operations of destroying the chemical weapons. In May 2001, the Under Secretary of Defense for Acquisition, Technology, and Logistics designated the Demilitarization Program as a major Defense acquisition program (Acquisition Category ID) and assigned the Army as the Executive Agent. Through July 2002, the U.S. Army Corps of Engineers awarded contracts for construction, systemization, operations, and closure of chemical destruction facilities at Johnston Atoll Chemical Agent Disposal System, Johnston Island, Hawaii, and Tooele Chemical Agent Disposal Facility, Tooele, Utah. The Office of the Secretary of Defense approved a cost estimate totaling $24 billion, of which the program office awarded $5.8 billion in contracts for the Demilitarization Program.</p>
<p><strong>Who Should Read This Report and Why?</strong> This report should be read by all who are interested in the Army’s demilitarization of its chemical munitions stockpile. This report discusses why the Army needs to update its acquisition program baseline agreement and to obtain a documented threat assessment.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dod/D-2003-015).pdf">A Revised Acquisition Program Baseline and Threat Assessment for the Chemical Demilitarization Program, October 2002</a> [34 Pages, 1.4MB]</p>
<p>https://documents.theblackvault.com/documents/dod/D-2003-015).pdf</p><p>The post <a href="https://www.theblackvault.com/documentarchive/revised-acquisition-program-baseline-threat-assessment-chemical-demilitarization-program-october-2002/">A Revised Acquisition Program Baseline and Threat Assessment for the Chemical Demilitarization Program, October 2002</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5052</post-id>	</item>
		<item>
		<title>Defense Intelligence Summary Archive</title>
		<link>https://www.theblackvault.com/documentarchive/defense-intelligence-summary-archive/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defense-intelligence-summary-archive</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 31 Aug 2016 21:49:34 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[civil defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Defense Intelligence Summary]]></category>
		<category><![CDATA[dia]]></category>
		<category><![CDATA[intelligence]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=2947</guid>

					<description><![CDATA[<p>Background The Defense Intelligence Summary is produced by the Director of the Defense Intelligence Agency (DIA). These are classified documents, published by the DIA, and utilized by those with proper clearances within the Department of Defense (DOD). Issues detail intelligence issues throughout the globe and most remain classified to this day. Below are some that have [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/defense-intelligence-summary-archive/">Defense Intelligence Summary Archive</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The Defense Intelligence Summary is produced by the Director of the Defense Intelligence Agency (DIA).</p>
<p>These are classified documents, published by the DIA, and utilized by those with proper clearances within the Department of Defense (DOD). Issues detail intelligence issues throughout the globe and most remain classified to this day.</p>
<p>Below are some that have been released under the Freedom of Information Act (FOIA).</p>
<h3>Declassified Defense Intelligence Summaries</h3>
<p>(From the most recent to the oldest)</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dia/DIA10-66.pdf">Defense Intelligence Summary #10-66, 13 January 1966</a> [33 Pages, 18.9MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dia/DIA1-66.pdf">Defense Intelligence Summary #1-66, 3 January 1966</a> [45 Pages, 33.9MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dia/DIA273-65.pdf">Defense Intelligence Summary #273-65, 19 November 1965</a> [46 Pages, 25.1MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dia/DIA271-85.pdf">Defense Intelligence Summary #271-85, 17 November 1965</a> [14 Pages, 7.4MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/dia/DIS-1.pdf">Defense Intelligence Summary #1,  9 November 1961</a> [6 Pages, 1.6MB] &#8211; One missing page, and 3 pages fully exempt from release.  That is the determination after waiting more than 7 YEARS for this document to be declassified.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/defense-intelligence-summary-archive/">Defense Intelligence Summary Archive</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2947</post-id>	</item>
		<item>
		<title>On Countering Strategic Deception, by William R. Harris, November 1973</title>
		<link>https://www.theblackvault.com/documentarchive/countering-strategic-deception-william-r-harris-november-1973/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=countering-strategic-deception-william-r-harris-november-1973</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 20 Jul 2016 22:12:55 +0000</pubDate>
				<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[intelligence]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=2722</guid>

					<description><![CDATA[<p>Background Abstract: When the blind seek to leak the blind, a cautionary note is in order. This report is written in blissful ignorance of whatever systematic efforts the United States Government has made to construct a counter-deception capability, designed to detect, neutralize and undermine those foreign deception operations that degrade governmental performance through U.S. intelligence [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/countering-strategic-deception-william-r-harris-november-1973/">On Countering Strategic Deception, by William R. Harris, November 1973</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3><strong>Background</strong></h3>
<p><strong>Abstract:</strong></p>
<p style="padding-left: 30px;"><em><strong>When the blind seek to leak the blind, a cautionary note is in order. This report is written in blissful ignorance of whatever systematic efforts the United States Government has made to construct a counter-deception capability, designed to detect, neutralize and undermine those foreign deception operations that degrade governmental performance through U.S. intelligence channels. To the extent that such a  capability exists, what follows may be superfluous. Neither the public literature on intelligence activities nor the public record of intelligence predictions confirms the existence of such a counter-deception capability, but the public record is notoriously murky and subject to correction.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>This report explores the effects of deception upon strategic warning systems, and possible protective efforts for the detection of strategic foreign deception. The report excludes from consideration evaluation of organizational alternatives for counter-deception systems. Drawing only upon public sources, this report is designed to serve as a background reference for readers interested in methodologies for coping with deception, or in references to the literature of deception and cognition.</strong></em></p>
<p>This report was obtained from the CIA CREST system, and the National Archives and Records Administration (NARA).</p>
<h3>Download the Document</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/defenseissues/OnCounteringStrategicDeception.pdf">On Countering Strategic Deception, by William R. Harris, November 1973</a> [100 Pages, 41.5MB]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/countering-strategic-deception-william-r-harris-november-1973/">On Countering Strategic Deception, by William R. Harris, November 1973</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2722</post-id>	</item>
		<item>
		<title>Situation Awareness and Decision Support System for Defensive Counterspace</title>
		<link>https://www.theblackvault.com/documentarchive/situation-awareness-and-decision-support-system-for-defensive-counterspace/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=situation-awareness-and-decision-support-system-for-defensive-counterspace</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 27 Oct 2015 22:53:40 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[counterspace]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[military]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=1927</guid>

					<description><![CDATA[<p>The following document was first requested in April of 2015, under the Freedom of Information Act (FOIA). The following was all I knew about the document: Title: ( U ) Situation Awareness and Decision Support System for Defensive Counterspace PDF URL: (pdf) &#8211; 2 MB &#8211; Accession Number: ADB339747 Personal Author(s): Bowman, Christopher ;  DeSieno, [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/situation-awareness-and-decision-support-system-for-defensive-counterspace/">Situation Awareness and Decision Support System for Defensive Counterspace</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following document was first requested in April of 2015, under the Freedom of Information Act (FOIA). The following was all I knew about the document:</p>
<p style="padding-left: 30px;"><em><strong>Title: ( U ) Situation Awareness and Decision Support System for Defensive Counterspace </strong></em><br />
<em><strong>PDF URL: (pdf) &#8211; 2 MB &#8211; </strong></em><br />
<em><strong>Accession Number: ADB339747 </strong></em><br />
<em><strong>Personal Author(s): Bowman, Christopher ;  DeSieno, Duane </strong></em><br />
<em><strong>Corporate Author: DATA FUSION AND NEURAL NETWORKS BROOMFIELD CO </strong></em><br />
<em><strong>Report Date: 10 Apr 2008 </strong></em><br />
<em><strong>Descriptive Note: Final rept. 10 Apr 2007-10 Apr 2008 </strong></em><br />
<em><strong>Pages:77 Page(s) </strong></em><br />
<em><strong>Report Number: FA9453-07-M-0109FR   ( FA945307M0109FR )  ,  AFRL-RV-PS &#8211; TR-2008-1026 AFRL-RV-PS   ( AFRLRVPSTR20081026 AFRLRVPS )  ,  XC &#8211; TR-2008-1026 AFRL-RV-PS   ( XCTR20081026 AFRLRVPS ) </strong></em><br />
<em><strong>Monitor Series: TR-2008-1026     ( TR20081026 )  ,  AFRL-RV-PS     ( AFRLRVPS ) </strong></em><br />
<em><strong>Contract/Grant/Transfer Number: FA9453-07-M-0109     ( FA945307M0109 ) </strong></em></p>
<p>After waiting many months, I was denied, in full, access to the record.  I quickly filed an appeal. Whenever a document is fully denied, I do wonder if they truly reviewed the document, or if they simply denied access.</p>
<p>After a couple more months of waiting, I partially won my appeal &#8211; and they released a portion of the document. Although still primarily redacted, it does give some insight with the &#8220;Executive Summary&#8221; being partially released.</p>
<h3>Download Situation Awareness and Decision Support System for Defensive Counterspace</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/F-2015-00120-A.pdf">Situation Awareness and Decision Support System for Defensive Counterspace</a> [79 Pages, 5.2MB]</p>
<h3>Excerpt:</h3>
<p>The fundamental deficiency with operational automated situation assessment and response software systems is that in too many cases they deliver the answer to the problem they were designed to solve rather than the current mission context problem. What the AF needs is a context assessment (CA)<br />
capability that interprets the situation assessment and response outputs using all the available current mission contextual knowledge.</p>
<p>This DF&amp;NN SBIR Phase 1 effort is the first to provide a technical architecture for the development of Context Assessment (CA) software for Data Fusion &amp; Resource Management (DF&amp;RM) systems. CA software provides an interpretation (i.e., explanation and evaluation) of the DF&amp;RM system outputs based upon the current mission context data base. As such CA improves the user situation awareness and the utility of his supporting DF&amp;RM svstem.</p>
<p>&nbsp;</p>
<p>https://documents.theblackvault.com/documents/defenseissues/F-2015-00120-A.pdf</p><p>The post <a href="https://www.theblackvault.com/documentarchive/situation-awareness-and-decision-support-system-for-defensive-counterspace/">Situation Awareness and Decision Support System for Defensive Counterspace</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1927</post-id>	</item>
		<item>
		<title>Homeland Security</title>
		<link>https://www.theblackvault.com/documentarchive/homeland-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=homeland-security</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 00:49:05 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[national defense]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=500</guid>

					<description><![CDATA[<p>The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat. Analysis of the Homeland Security Act [16 Pages] The National Strategy For Homeland Security: Office of Homeland Security [90 Pages] President&#8217;s Homeland Security Department Proposal [35 Pages]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/homeland-security/">Homeland Security</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The term homeland security refers to a security effort by a government to protect a nation against perceived external or internal threat.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/hsl-bill-analysis.pdf">Analysis of the Homeland Security Act [16 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/nat_strat_hls.pdf">The National Strategy For Homeland Security: Office of Homeland Security [90 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/hsl-bill.pdf">President&#8217;s Homeland Security Department Proposal [35 Pages]</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/homeland-security/">Homeland Security</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">500</post-id>	</item>
		<item>
		<title>International Security Environment to the Year 2020</title>
		<link>https://www.theblackvault.com/documentarchive/international-security-environment-to-the-year-2020/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=international-security-environment-to-the-year-2020</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 00:47:47 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[intelligence]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=497</guid>

					<description><![CDATA[<p>This series of analytical summaries attempts to identify and analyze trends which will influence international security policy through the next three decades. An assessment of the changed world that these trends will produce is vital for Army planners. In this survey, we discuss underlying trends driving change and predict realities ten and thirty years hence. [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/international-security-environment-to-the-year-2020/">International Security Environment to the Year 2020</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This series of analytical summaries attempts to identify and analyze trends which will influence international security policy through the next three decades. An assessment of the changed world that these trends will produce is vital for Army planners. In this survey, we discuss underlying trends driving change and predict realities ten and thirty years hence.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/2020.pdf">International Security Environment to the Year 2020: Global Trends Analysis (Full Report)</a> [84 Pages, 5mb]</p>
<p><a href="https://documents.theblackvault.com/documents/defenseissues/2020.pdf">https://documents.theblackvault.com/documents/defenseissues/2020.pdf</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/international-security-environment-to-the-year-2020/">International Security Environment to the Year 2020</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">497</post-id>	</item>
		<item>
		<title>Miscellaneous Defense Records</title>
		<link>https://www.theblackvault.com/documentarchive/miscellaneous-defense-records/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=miscellaneous-defense-records</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 00:37:14 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=494</guid>

					<description><![CDATA[<p>The following documents are currently uncategorized in a proper sub-category in the Defense Issues section.  Until they are, they will be listed here. A Comparison of the Defense Acquisition Systems of France, Great Britain, Germany and the United States [304 Pages] A Comparison of U.S. Navy Sea Air Land (SEAL) Teams and U.S. Army Special [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/miscellaneous-defense-records/">Miscellaneous Defense Records</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following documents are currently uncategorized in a proper sub-category in the Defense Issues section.  Until they are, they will be listed here.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA369794.pdf">A Comparison of the Defense Acquisition Systems of France, Great Britain, Germany and the United States [304 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA381194.pdf">A Comparison of U.S. Navy Sea Air Land (SEAL) Teams and U.S. Army Special Forces [301 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/one.pdf">Army Annual Financial Report (2001) [20 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/basestructure2002.pdf">Base Structure Report (Listing of Facilities) &#8211; FY 2002 &#8211; 117 Pages</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/d20010626m2m.pdf">China &#8211; Military to Military Exchanges in 2000 [7 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/20030730chinaex.pdf">Chinese Military Power [52 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/basestructure2001.pdf">Department of Defense Base Structure Report [68 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA344805.pdf">DOE Needs Better Controls to Identify Contractors Having Foreign Interests [21 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA354415.pdf">Executive Office of the President &#8211; Procedures for Acquiring Access to and Safeguarding Intelligence Information [19 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA377354.pdf">Feasibility of Third World Advanced Ballistic and Cruise Missile Threat.Volume 1: Long Range Ballistic Missile Threat [49 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA377356.pdf">Feasibility of Third World Advanced Ballistic and Cruise Missile Threat. Volume 2: Emerging Cruise Missile Threat [49 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/problemsolving.pdf">Handbook of Problem Solving Techniques for Intelligence Analysts &#8211; November 21, 1986 [350 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA393362.pdf">High Power Radio Frequency Weapons: A Potential Counter to U.S. Stealth and Cruise Missile Technology [43 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA391134.pdf">Homeland Security: A Canadian Perspective [41 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA394536.pdf">HOMELAND SECURITY: A Framework for Addressing the Nation&#8217;s Efforts [21 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA346513.pdf">How to Get It: A Guide to Defense &#8211; Related Information Resources [400 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/jv2010.pdf">Joint Vision 2010 publication [39 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/kaar02072000.pdf">Kosovo/Operation Allied Force After-Action Report [194 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/AD259635.pdf">Manhigh III. USAF Manned Balloon Flight Into The Stratosphere</a> [246 Pages, 11.85mb] &#8211; This report covers the manned balloon flight MANHIGH III, the third, and last, of a series of flights into the stratosphere directed by the Aeromedical Field Laboratory. Twelve sections prepared by the pilot and the task scientists, describe the vehicle and its performance, selection and preparation of prospective pilots, the principal psychological and physiological parameters of the subject before, during and after the flight, the operation of a sealed environment under space equivalent conditions, cosmic radiation studies, and related problems such as pilot&#8217;s nutrition.</p>
<p>.doc <a href="http://www.theblackvault.com/documents/31-102.doc">Munitions Storage Area Security [13 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA364220.pdf">Secure Database Data Transfer with Starlight [26 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/2003_2004_sof_posture_statement.pdf">Special Operations Forces Posture Statement [118 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/eurostrategy2000.pdf">Strengthening Transatlantic Security: A U.S. Strategy for the 21st Century [68 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/ADA363988.pdf">Trends in Background Issues of Applicants for Access to Classified Information [6 Pages]</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/miscellaneous-defense-records/">Miscellaneous Defense Records</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">494</post-id>	</item>
		<item>
		<title>Strategic Gaming</title>
		<link>https://www.theblackvault.com/documentarchive/strategic-gaming/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=strategic-gaming</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 06:12:28 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[tactics]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=427</guid>

					<description><![CDATA[<p>The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their defense and offensive strategies.  Unintended Consequences of Strategic Gaming, 02 May 1977 [ 50 Pages, 7.8MB ] &#8211; Strategic planning is an essential element of modern defense. It synthesizes the doctrine, politics, weapons and occasionally even the philosophy of [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/strategic-gaming/">Strategic Gaming</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following documents pertain to Strategic Gaming, the war game scenarios carried out by the military to further enhance their defense and offensive strategies.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/14-F-1263.pdf">Unintended Consequences of Strategic Gaming, 02 May 1977</a> [ 50 Pages, 7.8MB ] &#8211; Strategic planning is an essential element of modern defense. It synthesizes the doctrine, politics, weapons and occasionally even the philosophy of the nation state. Because a country embodies its program for continued existence and the destruction of its opposition in it, strategic planning can directly affect many hundreds of millions of people.</p>
<p><a href="https://documents.theblackvault.com/documents/defenseissues/14-F-1263.pdf">https://documents.theblackvault.com/documents/defenseissues/14-F-1263.pdf</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/strategic-gaming/">Strategic Gaming</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">427</post-id>	</item>
		<item>
		<title>Wartime/Defense Tactics and Strategies</title>
		<link>https://www.theblackvault.com/documentarchive/wartimedefense-tactics-and-strategies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wartimedefense-tactics-and-strategies</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 06:01:31 +0000</pubDate>
				<category><![CDATA[Defense Issues]]></category>
		<category><![CDATA[Military / Defense]]></category>
		<category><![CDATA[Wartime]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[tactics]]></category>
		<category><![CDATA[war]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=418</guid>

					<description><![CDATA[<p>Since the dawn of our intelligence and military agencies, soldiers, strategists, think tanks and others have spent an extensive amount of money, and devoted an amazing amount of time to developing wartime tactics and strategies. The below reports were received from multiple agencies on the topics, and are provided here for research. Declassified Documents Advanced [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/wartimedefense-tactics-and-strategies/">Wartime/Defense Tactics and Strategies</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Since the dawn of our intelligence and military agencies, soldiers, strategists, think tanks and others have spent an extensive amount of money, and devoted an amazing amount of time to developing wartime tactics and strategies.</p>
<p>The below reports were received from multiple agencies on the topics, and are provided here for research.</p>
<h3>Declassified Documents</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/advancedmodeling.pdf">Advanced Modeling and Simulation for Analyzing Combat Concepts in the 21st Century [69 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/allied2001.pdf">Allied Contributions to the Common Defense [133 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/ADA369913.pdf">THE CADRE PAPERS: Does the United States Need Space-Based Weapons? [127 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/ADA345011.pdf">Defense against Ballistic Missiles [15 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/sandt21.pdf">Defense Science and Technology Base in the 21st Century [64 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/populationtargeting.pdf">Feasibility of Population Targeting [126 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/ADA395752.pdf">In Front of the Threat: Evolving the Department of Defense Strategic Organizational Structure to Prepare for The Challenges Of Weapons Of Mass Destruction [94 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/ADA281692.pdf">Personality Profiles of U.S. Navy Sea-Air-Land (SEAL) Personnel </a>[18 Pages, 900k] &#8211; One hundred thirty-nine U.S. Navy Sea-Air-Land (SEAL) personnel completed the NEO Personality Inventory (NEO-PI) . The average profiles were compared to adult male norms for five broadly defined domains. SEALs scored lower in Neuroticism and Agreeableness, average in Openness, and higher in Extraversion and Conscientiousness compared to these two populations. High Extraversion and conscientiousness scores have been shown to predict job performance in other professions. SEALs seek excitement and dangerous environments, but are otherwise stable, calm, and rarely reckless or impulsive. Although this average profile may not characterize any individual SEAL, we believe this study provides the most comprehensive personality profile of Navy SEALs to date. Navy SEAL, NEO Personality Inventory, Personality, Profile.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a name="politicalinfluence"></a><a href="https://documents.theblackvault.com/documents/defenseissues/ADA464090.pdf">Political Influence and the Commander in Chief: Congress, the President, and War Powers, 2006 Doctoral Thesis</a>[216 Pages, 10.7MB] &#8211; This project examines war powers politics between the president and Congress. Congress is supposed to declare or authorize wars; the president is supposed to direct the overall war effort and protect the nation from attack. Yet, armed attacks against the United States are historically rare, as are declarations of war and congressional authorizations for the use of force. What is not rare, however, is the actual use of military force. American troops have been deployed into combat situations hundreds of times in the nation&#8217;s history. Thus emerges a basic puzzle: given the constitutional framework and institutional incentives of the executive and legislative branches, does war powers control in fact reside with Congress? More directly, does Congress have any meaningful war powers? The author frames the congressional-presidential relationship in principal-agent terms, and suggests that the president&#8217;s unilateral authority and ability to control the war powers agenda largely relegates Congress to a position of indirect influence. The author tests for evidence of congressional influence in two areas: the initial decision to employ military force and the factors affecting the duration of military operations. He then examines the political and situational factors that influence Congress to confront the president through war-related hearings. While evidence does not point to a direct congressional role in the war powers arena, results indicate that a long-term, more indirect form of congressional influence may exist in such areas as economic aid, permanent troop deployments, and potential presidential consultation with congressional leaders. Framed against the background of the 2006 midterm elections, this study suggests that scholars and other observers may do well to focus less on direct constraint, and instead turn their attention to the broader ways in which Congress responds and influences the president.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/ADA387852.pdf">Preparing the U.S. Army for Homeland Security Concepts, Issues, and Options [328 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/ADA331957.pdf">Surface Warfare, Concept to Reality November/December 1997 [49 Pages, 5.8mb]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/FullDoc2.pdf">Transforming Defense: National Security in the 21st Century [108 Pages]</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/defenseissues/ADA494659.pdf">The US Army and the Interagency Process: Historical Perspectives. The Proceedings of the Combat Studies Institute 2008 Military History Symposium (6th) Held at Fort Leavenworth, Kansas on 16-18 September 2008</a> [439 Pages, 6.7 MB] &#8211; These proceedings represent the sixth volume to be published in a series generated by the Combat Studies Institute&#8217;s annual Military History Symposium. These symposia provide a forum for the interchange of ideas on historical topics pertinent to the current doctrinal concerns of the United States Army. Every year, in pursuit of this goal, the Combat Studies Institute brings together a diverse group of military personnel, government historians, and civilian academicians in a forum that promotes the exchange of ideas and information on a pressing topic of national significance. This year&#8217;s symposium, hosted by the Combat Studies Institute, was held 16-18 September 2008 at Fort Leavenworth, Kansas. The 2008 symposium&#8217;s theme, The US Army and the Interagency Process: Historical Perspectives, was designed to explore the partnership between the US Army and government agencies in attaining national goals and objectives in peace and war within a historical context. The symposium also examined current issues, dilemmas, problems, trends, and practices associated with US Army operations requiring interagency cooperation. In the midst of two wars and Army engagement in numerous other parts of a troubled world, this topic is of tremendous importance to the US Army and the nation.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/wartimedefense-tactics-and-strategies/">Wartime/Defense Tactics and Strategies</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">418</post-id>	</item>
	</channel>
</rss>
