Author: John Greenewald

Since the dawn of our intelligence and military agencies, soldiers, strategists, think tanks and others have spent an extensive amount of money, and devoted an amazing amount of time to developing wartime tactics and strategies. The below reports were received from multiple agencies on the topics, and are provided here for research. Declassified Documents Advanced Modeling and Simulation for Analyzing Combat Concepts in the 21st Century [69 Pages] Allied Contributions to the Common Defense [133 Pages] THE CADRE PAPERS: Does the United States Need Space-Based Weapons? [127 Pages] Defense against Ballistic Missiles [15 Pages] Defense Science and Technology Base in…

Read More

Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. COG was developed by the British government before and during World War II to counter the threat of Luftwaffe bombing during the Battle of Britain. The need for continuity-of-government plans gained new urgency with nuclear proliferation. Countries during the Cold War and afterwards developed such plans to avoid (or minimize) confusion and disorder in a power vacuum in the aftermath of a nuclear attack. In the US at least, COG is…

Read More

National Intelligence Estimates (NIEs) are United States federal government documents that are the authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue. NIEs are produced by the National Intelligence Council and express the coordinated judgments of the United States Intelligence Community, the group of 16 U.S. intelligence agencies. NIEs are classified documents prepared for policymakers. The following pages have been released, when asking for all NIE’s during a certain year. They are highly classified and are very hard to get. Declassified Documents  National Intelligence Estimates (NIEs) for Calendar Year 2012, Office…

Read More

The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion. Military Cryptanalysis Part I Military Cryptanalysis Part II Military Cryptanalysis Part III Military Cryptanalysis Part IV

Read More

The following are documents from the Cryptologic Quarterly, declassified by the NSA. Disclaimer John H. Tiltman: A Reminiscence – Summer/Fall 1982-Vol. 1, Nos. 2-3 Computer Virus Infections: Is NSA Vulnerable? – Fall 1985-Vol. 4, No. 3 The Origination and Evolution of Radio Traffic Analysis: The World War I Era – Spring 1987-Vol. 6, No. 1 What Every Cryptologist Should Know About Pearl Harbor – Summer 1987 – Vol. 6, No. 2 Influence of US Cryptologic Organizations on the Digital Computer Industry – Fall/Winter 1987-1988 Vol. 8, Nos. 3-4 Third Party Nations: Partners and Targets – Winter 1989 – Vol. 7,…

Read More