| | F-16 Flight Manual [pdf] (publicintelligence.net) |
|
3 points by throwup238 on Jan 31, 2024 | past
|
| | Tactical Chat: How the U.S. Military Uses IRC to Wage War (publicintelligence.net) |
|
2 points by gaws on Aug 17, 2022 | past
|
| | Department of State OSAC Guide: Basic Evasive Driving Techniques (publicintelligence.net) |
|
1 point by DyslexicAtheist on Dec 6, 2019 | past | 1 comment
|
| | 2019 Bilderberg Meeting Participant List (publicintelligence.net) |
|
1 point by DyslexicAtheist on June 3, 2019 | past
|
| | Radicalization to Terrorism Occurs in the United States (publicintelligence.net) |
|
3 points by DyslexicAtheist on April 4, 2019 | past
|
| | Quantifying Law Enforcement’s “Going Dark” Problem (publicintelligence.net) |
|
1 point by DyslexicAtheist on Feb 28, 2019 | past
|
| | U.S. Army Future Warfare Division White Paper (publicintelligence.net) |
|
1 point by DyslexicAtheist on Feb 22, 2019 | past
|
| | Czech Republic National Cyber Security Agency Warning on Huawei and ZTE (publicintelligence.net) |
|
2 points by DyslexicAtheist on Feb 10, 2019 | past
|
| | DIA Study: Advanced Space Propulsion Based Оn Vacuum (Spacetime Metric) Engg (publicintelligence.net) |
|
2 points by godelmachine on Feb 4, 2019 | past
|
| | Warp Drive, Dark Energy and the Manipulation of Extra Dimensions [pdf] (publicintelligence.net) |
|
2 points by godelmachine on Feb 4, 2019 | past
|
| | DIA Study: Invisibility Cloaking Theory and Experiments (publicintelligence.net) |
|
35 points by DyslexicAtheist on Feb 2, 2019 | past | 3 comments
|
| | Restricted U.S. Army Space Operations Manual (publicintelligence.net) |
|
2 points by ericdanielski on Sept 6, 2018 | past
|
| | Office of the Director of National Intelligence Common Cyber Threat Framework (publicintelligence.net) |
|
2 points by raleighm on Sept 2, 2018 | past
|
| | DIA Study: Warp Drive, Dark Energy, and Manipulation of Extra Dimensions (2010) (publicintelligence.net) |
|
90 points by civilitty on July 9, 2018 | past | 75 comments
|
| | Warp Drive, Dark Energy, and the Manipulation of Extra Dimensions (publicintelligence.net) |
|
2 points by kawera on May 27, 2018 | past
|
| | DIA Study: Warp Drive, Dark Energy, and the Manipulation of Extra Dimensions (publicintelligence.net) |
|
1 point by civilitty on May 12, 2018 | past
|
| | How the US government decides when to release information on vulnerabilities (publicintelligence.net) |
|
1 point by anigbrowl on Dec 13, 2017 | past
|
| | DHS Assessment: Foreign Terrorist Organization-Inspired Vehicle-Ramming Attacks (publicintelligence.net) |
|
2 points by ericdanielski on Nov 1, 2017 | past
|
| | Criminals Targeting Medical FTP Servers Running in Anonymous Mode [pdf] (publicintelligence.net) |
|
2 points by wazanator on March 30, 2017 | past
|
| | How the U.S. Military Uses IRC to Wage War – Public Intelligence – 2013 (publicintelligence.net) |
|
25 points by omilu on Jan 16, 2017 | past
|
| | Cyber Threats and Vulnerabilities to US Election Infrastructure [pdf] (publicintelligence.net) |
|
2 points by adulau on Nov 6, 2016 | past
|
| | Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector (publicintelligence.net) |
|
1 point by T-A on April 5, 2016 | past
|
| | Radicalization: A Guide for the Perplexed (2009) [pdf] (publicintelligence.net) |
|
2 points by cmyr on June 15, 2015 | past
|
| | U.S. Army Techniques Publication 3-39.33: Civil Disturbances (publicintelligence.net) |
|
63 points by taivare on Aug 18, 2014 | past | 38 comments
|
| | Pentagon’s Cyberwarfare Dictionary (publicintelligence.net) |
|
2 points by vinnyglennon on July 16, 2014 | past
|
| | Tactical Chat: How the U.S. Military Uses IRC to Wage War (publicintelligence.net) |
|
2 points by WestCoastJustin on July 5, 2014 | past | 1 comment
|
| | Zero-Point Energy: Can We Get Something From Nothing? (publicintelligence.net) |
|
2 points by cinquemb on Aug 24, 2013 | past | 15 comments
|
| | 1,700 pages of leaked documentation on NSA "Sweet Tea" datacenter in Georgia (publicintelligence.net) |
|
3 points by dsl on June 8, 2013 | past
|
| | UE Offers Insight on Infrastructure Vulnerabilities for Terrorists (publicintelligence.net) |
|
1 point by nekojima on March 19, 2013 | past
|
| | How the U.S. Military Uses IRC to Wage War (publicintelligence.net) |
|
127 points by Jaigus on Jan 31, 2013 | past | 76 comments
|
|
|
More |