Joint Military Intelligence College Theses and Dissertations

JPat Brown filed this request with the Defense Intelligence Agency of the United States of America.
Tracking # 0374-2015
Due April 15, 2016
Est. Completion None
Status
Awaiting Response

Communications

From: JPat Brown

To Whom It May Concern:

This is a request under the Freedom of Information Act. I hereby request the following records:

Copies of the following theses and dissertations, provided on a rolling basis if possible:

---

Venezuela: Reliable Supplier of Oil to the United States, July 31, 2008

Terrorist Group Genesis: Role of Creation Myth, July 3, 2005

Foreign Laser Weapons: Questions MASINT Can Answer, June 29, 2010

Thorns Among the Roses: The Frozen conflicts in Georgia, July 30, 2008

Insurgency in Iraq: A Failure to Warn, July 27, 2007

Postmodern Trojan Horse, Franchised Radicalization or Six Degrees of Separation? Assessing Current Detainee Communication Trends at Guantanamo Bay and the Effect of Domestic Detainment on the Intelligence Community, July 6, 2010

India’s Search for Energy Supplies and Potential Impact on U.S. Interests, June 25, 2009

If it’s so Easy, Why Hasn’t the U.S. Been Attacked: Al-Qaeda and Agroterror, July 20, 2009.

Data Mining: Approaches and Methods for Counterterrorism, July 7, 2005.

National Geospatial-Intelligence Agency Support to International Athletic Events: A Case for Centralized control and Execution, September 30, 2009

Germany: A Terrorist Haven or Headache?, August 7, 2005

Strategic Influence and Persuasion: Semantic Infiltration and the Latest War of Ideas, August 19, 2008

The National Security Implications of Southeast Asian Human Trafficking, July 16, 2009

An Unwarned, Unexpected, and Unconventional Approach to Uncover Foreign Denial and Deception: Filling Gaps in National Coverage with Ad Hoc Constellations of Commercial and Foreign Space Platforms, July 17, 2006

Waypoints for a Sanctuary in Concert: The Interactive Characteristics of the Global Terrorist Safe Haven, July 5, 2006

Controversial Interrogation Techniques: Must Use Tradecraft or Counterproductive Methods?, June 26, 2009

Classified Information Leaks, February 4, 2007

Understanding Al Qaeda as a Global Revolution, July 21, 2009

Mitigating Cognitive Quagmires in Strategic Intelligence Analysis, July 11, 2006

Rearming the OPSEC Arsenal in the Cyber Age, July 30, 2008

Denial and Deception in Support of North Korea’s Integrated Air Defense System, July 4, 2007

Alternative Analysis: The Role of Red Teaming in the Intelligence Community, July 1, 2010

Why the United States Needs a Domestic Intelligence Service and How to Make it Work, July 13, 2010

Failed Nation-States and Terrorist Safe-Havens: Assessing the Prospects of State Failure in Nigeria, March 3, 2005

Training the Enemy: Terrorist Exploitation of privately owned third-party paramilitary training courses in the United States, August 9, 2007

Iran’s Plan for Iraq, July 30, 2008

The Posse Comitatus Act and Disaster Relief: Time to Loosen up on Military and Intelligence Restrictions, August 11, 2008

An Application of Technology Roadmapping to Forecasting Disruptive Technology in Electronic Warfare Development by the People’s Republic of china, June 26, 2009

Perspective on a Modern Monarchy – Outlasting the Oil in Bahrain, November 2, 2005

The Relevancy of Patent Secrecy Orders in the 21st Century, July 14, 2010.

Deconstructing Al-Qaeda in Iraq: Using Contemporary Analytical Models to Examine the Failure of Al-Qaeda in Iraq’s Al-Anbar Province, July 29, 2008

Immunizing America from Economic Espionage: A Team Effort Between the United States Government and the Private Sector, July 9, 2007

Ayatollahs and Atoms: A Nuclear Iran in Context, July 16, 2009

Blackbird Reborn: A Cautionary Tale of Missed Opportunity, December 4, 2006

Chinese Commercial Vessels and their Threat to the port of Beaumont, Texas, Jun3 27, 2007

Targeted Killing and Assassination: Effective Tools in the War on Terror, July 29, 2008

The U.S. Effort in Neutralizing the Financing of Terrorism, July 30, 2008

The State of the FBI-CIA Partnership in the Global War on Terrorism, July 6, 2007

Iraq’s Biological Warfare Program: Truth or Mirage in the Desert?, September 19, 2005

Use of Private Security Companies by Diplomatic Security in Support of Operation Iraqi Freedom: Lessons Learned, July 12, 2006

Pipe Drams: proposed Gas Pipeline Projects and Their Effect on Eurasian Pipeline Politics, June 26, 2009

Non-Lethal Weapons: Weapons of Mass Disruption, June 24, 2004

Ex-officio: The Intelligence Community’s Role in the CFIUS Process, July 28, 2009

Suspicious Neighbors: Saudi Arabia’s Future Iraq Policy, June 30, 2009

Spies on the Silver Screen: How Hollywood has Influenced the Public’s Perception of the National Security Agency, July 12, 2005

Challenges and Opportunities that Await DEA as it Considers Membership in the Intelligence Community, December 16, 2004

Sympathetic Ears: the Proliferation of Radical Islam in Kyrgyzstan, Tajikistan and Uzbekistan, July 12, 2007

Prediction Markets: A Revolution in Analytical Affairs?, July 29, 2008

Where the Wild Things Are: A Spatial Meta-analysis of the National Defense Intelligence College’s Production of Knowledge, July 1, 2010

Security Threat of Bank Collapse in China, July 21, 2004

Gender Bomb: Is China’s Gender Imbalance a Threat to its Stability, June 23, 2010

Mother Nature’s Silent War: United States National Security Implications of Climate Change in Hawaii, July 1, 2010

Investigating the War on Terror: Intelligence Community Support to Criminal Investigations of Terrorists in DoD Custody, July 17, 2009

Cyber Intelligence Preparation of the Battlespace: the Key to Overwhelming Information Dominance in the Cyber Domain of War, July 7, 2004

Is Mexico a Failing State? The Influence of Drug Trafficking Organizations on Mexican Political Stability, June 25, 2009

Sino Nano: The Export of Micro Technologies to China, June 30, 2005

Mass Media Effects on National Defense Policymakers, July 7, 2006

Forensic Entomology and Intelligence: Entomology/Explosive E2 Project and its Utilization to Help Solve Heinous Crimes Against Humanity, July 12, 2004

Domestic Extremist Groups Targeting the U.S. Military, September 8, 2005

The Nexus of Crime and Terrorism: An Analysis of Islamic Extremist Organizatio in the American Prison System, July 14, 2006

The Eyes of Katrina: A Case Study of Incident Command System (ICS) Intelligence Support During Hurricane Katrina, July 31, 2009

Surveillance, Information Sharing and the Great Influenza of 1918: Identifying and Applying Lessons from the Worst Pandemic in American History, June 28, 2006

The UAV Threat to the United States, July 8, 2007

Be Careful What you Eat: The Threat of Agroterrorism and Combating it through Increased Collaboration within the United States Intelligence Community, July 15, 2010

Wall of Ignorance: Media Manipulation by Islamic Terrorists, July 16, 2007

The State of Vulnerability Regarding U.S. Railroads and Mobilization, July 2, 2006

Jihadist Threats in Cyberspace: Is the US CI Community Postured to Detect, Neutralize and Exploit the Threat, June 28, 2010

Transforming Domestic Counterterrorism Intelligence after 9/11, August 8, 2005

Impact that U.S. Laws and Policies Governing Intelligence Activities within the U.S. or against U.S. Persons Have on Signals Intelligence Collection, March 1, 2005

Was the Rwandan Genocide, in Part, the Result of Intelligence Failure, June 28, 2010

The Great Chip Heist: An Analysis of Foreign Microelectronic Reverse Engineering Capabilities, July 6, 2010

Women at DIA: A Data-Driven Snapshot, July 28, 2006

Sudan and Iran: Expansion of the Islamic Caliphate, July 1, 2010

North Korean Negotiation Behavior, July 13, 2004

Medical Warning and the Surveillance of Pandemic Influenza: Does the United States Government have an Integrated and Comprehensive Surveillance Plan?, July 8, 2010

The Analyst Guide to the Social Science Universe: Using Social Science Methodology to Analyze, Explain and Forecast Phenomena, July 29, 2009

Over the Horizon: Preparing the Intelligence Community for the Next Generation of Self-Propelled Semi-Submersible Narcotics Smuggling Vessel, July 28, 2009

Hollywood Soldier: Intelligence Support for SOFTWAR Operations, July 1, 2010

Effects of Micro Aerial Vehicles on Intelligence Community Processes, August 5, 2004

Erysichthon Factor: Policy Implications of US Counter Measures to North Korea’s Criminal Enterprise, August 15, 2008

Intelligence Support to Counter Terrorist-Linked U.S. Contraband Cigarette Trafficking, July 1, 2010

Nanotechnology use for Biological Weapons, July 11, 2007

China’s Tranformational Strategy for North Korea, July 13, 2007

A Solution for the Failure of Imagination: The Applicability and Utilization of Complexity Theory and the Complex Adaptive System Framework to Combat Terrorism, July 29, 2006.

Ending the North Korean Threat, April 28, 2009

Bungle in the Jungle: The Use and Abuse of U.S. Counterterrorism Intelligence in the Philippines, June 15, 2004

Cognitive Warfare, July 29, 2008

To Catch a Terrorist: The Application of Structured Analytic Methodologies to the Counter-Terrorism Problem, July 11, 2007

Collecting and Analyzing Geographic Place-Name Intelligence in a Collaborative Wiki-Environment – This is not your Grandfather’s Gazetteer, February 25, 2008

French Intelligence Operations in Post-Revolutionary America: the Genet Intrigues Against Louisiana and Florida, 1793-1794, July 1, 2007

Measurement and Signatures Intelligence (MASINT) Technologies – Enhancing Law Enforcement, June 25, 2007

The Department of State and Department of Defense Counter-Terrorism Rewards Programs: A Comparative Analysis, August 12, 2008

Indicators and Warnings of State Sponsored Biological Antimaterial Weapons Proliferation, July 1, 2010

Intelligence and Anthropology: The Cultural Knowledge Gap, July 31, 2008

Japanese Measures to Counter North Korean Illicit Activities in Japan, January 5, 2007

Iran’s Emerging Nuclear Doctrine: A Persian New Look?, July 15, 2007

Outsourcing War: An Analysis of Proxy Warfare, July 29, 2008

Corruption in the Philippine Government; A Force Multiplier for Terrorists, August 12, 2005

Improving GEOINT Efforts Against the Radiofrequency Weapon Intelligence Problem, August 12, 2008

Smoke Out: Integrated Intelligence to Combat Contraband Tobacco Smuggling Across the Akwesasne Mohawk Territory, July 10, 2009

The People’s Republic of China’s (PRC) Space Policy, Strategy and Intentions, June 29, 2009

Stony Beach: Past, Present and Future of the Sole U.S. Intelligence Program Dedicated to Resolving the Fate of POW/MIAs from the Vietnam War, July 28, 2009

The Scarcity of Resources: India’s Missing Women, July 29, 2008

Video Exploitation and the YouTube Generation: A Pandora’s Box of Oversight in a Free Media World, July 29, 2009

Standarized Training for Interpreters Supporting Polygraph Examinations: The Time has Come, January 6, 2009

Chinese Anti-Satellites: Intent, Capabilities, Advances, and Indications, June 24, 2010

Saudi Arabia’s War on Terror, July 7, 2006

Uncivil from the Start: The Threat of Radical Islam to Indonesia, July 29, 2008

Sub-Saharan Africa: Impact of Laboratory Capabilities on Medical Intelligence Collection and Bioterrorism, July 7, 2010.

Indicators and Warnings of Foreign Military Innovation: A Conceptual Framework for Analysis, June 21, 2010

Faster Intelligence Community Acquisitions: Applying the Lessons of the CORONA Program, July 7, 2007

Improving OSINT: How Public Affairs and Intelligence Can Support Each Other, August 12, 2008

Patterns of Proliferation: Open Source Indicators of Japanese Technology Proliferation to Iran, July 21, 2009

A New Terrorist Threat in the Philippines: The Merging of the Abu Sayyaf Group and the Jemaah Islamiyah, July 6, 2007

Red Leaf Rising: Vulnerabilities to Canada’s Emerging Oil Sector, June 27, 2007

Back to Basics: Educating the General Public to Prevent Terrorist Attacks within the United States, August 11, 2006

National Security Division of the Department of Justice: Assessment of Intelligence Community membership, July 29, 2008

Asad’s Legacy and the Future of Baathism in Syria, July 8, 2005

Dragons in the Newest Frontier: China’s Use of Media Warfare to Manipulate and Control the International Information Environment, July 1, 2010

Attacking U.S. Economic Strength: The Threat of Foreign Espionage, July 10, 2007

The Use of Non-Traditional Partners to Achieve Counterterrorism Objectives: A Case for the U.S. Fire Service, June 29, 2010

Pandemic Influenza: Warning Against a Threat to National Security that Poses as a Menace to Public Health, May 5, 2009

Courting a Continent: China’s Influence in Africa and the Implications for the United States, July 1, 2010

Iran’s Pending Acquisition of Nuclear Arms, August 1, 2005

Practical Applications of Holistic Systems Analysis: Al-Qaeda in the Islamic Lands of the Maghreb, July 31, 2008

The People’s Republic of China: The Strategem Link to the Information Warfare Strategy, July 31, 2009

Contemporary Urban Environment: Developing Intelligence Techniques for the 21st Century, July 21, 2004

No Genius for War: German Military Intelligence and the United States in World War II, June 13, 2004

Gender and Terrorism: Motivations of Female Terrorists, June 27, 2005

China’s Cyber Nukes: The Modern Sino Strategic Deterrent, June 30, 2010

Semiconductor Industry in China: Drivers and Risks Associated with China Interfering with the U.S. Semiconductor Supply Chain, June 24, 2010

National Security Implications Arising from the High Latitude Ice Melt, June 23, 2010

Role of Propaganda in Covert Action Campaigns: Successes, Failures and Implications, July 29, 2009

American Right-Wing Extremism and WMD Terrorism: How Significant a Threat, August 20, 2005

On Today’s Menu Foodborne Bioterrorism, July 1, 2010

Intelligence Community Integration of Non-Traditional Partners: Intelligence Analysis in Non-Title 50 Agencies, June 24, 2010

Sopranos on the Volga: organized Crime and Corruption in Russia, July 11, 2007

Burma: to Pursue a Nuclear Weapons Program?, July 10, 2009

USCG Intelligence and Influence Operations in Haiti, June 23, 2010

Is My Water Safe to Drink? Bioterrorism’s Threat to Community Water Systems, July 13, 2005

A Retrospective Psychological Vulnerability Assessment of James Angleton: Lessons for Counterintelligence Officers, July 30, 2009

Human Factors Analysis: A Quantitative Study Measuring Associations Between Cognitive Traits of World Leaders, July 2, 2007

China’s Rising Power and Strategy in the Pacific Islands Region – PIR, July 31, 2008

Yellow Fruit Anatomy of an Intelligence Scandal, August 3, 2005

Rise of China within the International Financial Institutions, August 5, 2005

Freedom’s Paradox: Protecting National Security Information in a Right-to-Know Environment, July 12, 2005

The Transfer of U.S Commercial Dual-Use Space Related Technologies to the People’s Republic of China, July 16, 2007

In Over Our Heads Under Our Waters: the Asymmetric Submersible and Semi-Submersible Threat to Homeland Security, August 12, 2008

Loch Ness Monster, the CNN Effect and other Mythical Creatures, July 7, 2004

Economic Espionage and the Technology Gap, July 7, 2006

Drugs and Bugs: Narco-Terrorists, Bioattacks and the Lesson’s of Anthrax, June 23, 2010

Syria and Weapons of Mass Destruction, August 13, 2008

Assessing the Technology Readiness Level of the Radio Frequency Bioweapons Threat Posed by Russia and China, July 1, 2009

To Be or Not to Be? Fusion Centers, Domestic Intelligence and Coordinating Intelligence Sharing to Counter Radicalization and Extremism Post 9/11, July 8, 2010

Federal Bureau of Investigation’s Counterintelligence Program: Options for Change, June 25, 2004

The Counterintelligence Long Tail: Why the Future of Counterintelligence is in Knowing a Little about a Lot, June 3, 2009

Loopholes of the Nuclear Nonproliferation Regime, July 29, 2005

Anomalous Human Cognition: A Possible Role within the Crucible of Intelligence Collection, July 15, 2010

Anthrax: Indicators of Terrorist Use, August 9, 2005

Climate Change and United States National Security: Northern China’s Water Crisis – A Case Study, July 1, 2009

No Need for Another MI-5: Countering the Homegrown Terrorist Threat through a Regulated Domestic Intelligence Surveillance Act, July 29, 2009

The Office of the Inspector General fo the Office of the Director of National Intelligence, Gasping for A.I.R.E. or Alive and Thriving?, July 9, 2007

Assessing the Effectiveness of the Department of State Surveillance Detection Program, July 29, 2009

Chasing Technological Autonomy, July 11, 2007

Apocalypse Not: An Examination of a Nuclear Iran, July 20, 2009

Global Reach: Renditions in U.S. Counterterrorism Operations, July 20, 2009

Finding Normal: Deriving Indications and Warning from Statistical Examination of DoD, July 22, 2004

Intelligence Support to the Life Science Community: mitigating Threats Posed by Bioterrorism, July 7, 2004

China’s Computer Network Attack Capabilities, Sampling Experts’ Perspectives on Intelligence Collection Gaps, June 24, 2004

North Korean Prison System, July 24, 2004

Cultural Intelligence and International Marketing: A Link Between Miller Lite and the Air Force Intelligence, Surveillance and Reconnaissance Process, April 29, 2005

Playing Nice and Saving the World: The Security Implications of Global Climate Change for the United States and the European Union, July 31, 2008

The Race to the Stratosphere: the Operational State of Worldwide High-Altitude Long Endurance Lighter-than-Air Systems for Communications and Surveillance by 2020, July 27, 2009

Rationing the IC: The Impact of Private American Citizens on the Intelligence Community, June 24, 2010

Intelligence Support to Strategic Communication: The Strategic Communication Tactic of Paid Television Advertising and the Role of Intelligence, July 7, 2006

The Dragon’s Black Hats: A Historical and Future Look at China’s Use of Non-State Cyber Actors, June 30, 2010

U.S. Proliferation of Nuclear Weapons, July 31, 2008

Unlawful Disclosure in the New Information Sharing Era, June 24, 2004

Political Dissent in Saudi Arabia: Effects on the Stability of the Ruling Family, August 18, 2004

Social Engineering: Another Tool in the Fight Against Terrorism, June 8, 2004

From Russia With Love: The Intelligence Effects of Russia’s Demographic Crisis, July 8, 2010

Chinese information Operations Against the Tibetan Rights Movement, June 28, 2007

Outerspace Weigi – China’s Secret Weapon to Develop Its Counterspace Capabilities, August 15, 2008

Castro Goes to College: Cuban Intelligence Targets American Academia, June 28, 2010

Compromising National Security in the Media: How to Do a Better Job of Plugging the Leaks, July 31, 2008

Wildcats and Tigers: China’s Oil Acquisition Strategy and Potential Outcomes, July 7, 2006

The Role of the Intelligence Community Concerning the Emergence of Closed Circuit Surveillance within the United States, June 28, 2010

Covert Ops in the 1800s: The Acquisition of East Florida from Spain and the Seminoles, June 28, 2007

Chinese Psychological Warfare: the manned space program, July 30, 2007

Forthcoming Revolution in Saudi Arabia, July 6, 2004

Chasing Demons: The Potential for Nuclear Proliferation in Latin America, June 11, 2007

The Outsourcing of America’s Military Secrets, July 20, 2009

Conversations with Charlie: Case Studies of U.S. Interrogators in Vietnam, July 16, 2007

In the Public Interest: Preventing and Prosecuting Unauthorized Disclosures of Classified Information in the Media, June 28, 2010.

Radiological Devices: Measuring the Threat, July 13, 2007

Interrogation of Japanese POWs in WWII: U.S. Response to a Formidable Challenge, July 7, 2007

Polygraph Theory and Practice: Creating a False Sense of Security, July 14, 2014

Iranian Acquisition of Electromagnetic Pulse Technology: National Security Implications for the United States, June 23, 2010

Improving Contemporary Interrogations: What is the Impact of Gender, July 30, 2009

Lone Wolf Domestic Terrorism: Identifying Predictive Behaviors, July 31, 2008

The Games They Play: Russian Strategic Political Deceptions, July 30, 2008

Swine-Origin Influenza: Defining the Threat of H1N1 to National Security and the role of the Intelligence Community, July 6, 2010

Inside the Loop: Terrorist Insider Trading as an Attack Indicator, August 2, 2005

---

I am a journalist, who has written about government transparency in a variety of publications, such as a the Boston Herald.
http://www.bostonherald.com/news_opinion/opinion/op_ed/2014/10/op_ed_let_s_put_more_light_in_sunshine_law
In addition, in my capacity as editor of MuckRock, I have both written articles concerning FOIA/Public Records,
https://www.muckrock.com/news/archives/2015/mar/19/amtrak-lounge-car-complaints/
and directly overseen/commissioned articles on the topic from other journalists,
https://www.muckrock.com/news/archives/2015/feb/26/fbi-files-congressman-dickstein-show-close-relatio/
which have in turn been written about in national publications such as the Washington Post.
http://www.washingtonpost.com/blogs/in-the-loop/wp/2014/07/14/russian-menus-grapeless-jazz-salad-and-other-top-secret-cafeteria-complaints-from-inside-the-cia/

The requested documents will be made available to the general public, and this request is not being made for commercial purposes.

In the event that fees cannot be waived, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM if not.

Thank you in advance for your anticipated cooperation in this matter. I look forward to receiving your response to this request within 20 business days, as the statute requires.

Sincerely,

JPat Brown

From: Defense Intelligence Agency

An acknowledgement letter, stating the request is being processed.

From: MuckRock.com

To Whom It May Concern:

I wanted to follow up on the following Freedom of Information request, copied below, and originally submitted on June 5, 2015. Please let me know when I can expect to receive a response, or if further clarification is needed. You had assigned it reference number #0374-2015.

Thank you for your help.

From: FOIA

Your request is currently in Queue; Number 516 of 813. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: FOIA

Your request is currently in Queue; Number 516 of 813. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: MuckRock.com

To Whom It May Concern:

I wanted to follow up on the following Freedom of Information request, copied below, and originally submitted on June 5, 2015. Please let me know when I can expect to receive a response, or if further clarification is needed. You had assigned it reference number #0374-2015.

Thank you for your help.

From: FOIA

Your request is currently in Queue; Number 757 of 820. Please be advised, the previous queue number was incorrect. On July 10, 2015, your queue number was 781 of 813. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: MuckRock.com

To Whom It May Concern:

I wanted to follow up on the following Freedom of Information request, copied below, and originally submitted on June 5, 2015. Please let me know when I can expect to receive a response, or if further clarification is needed. You had assigned it reference number #0374-2015.

Thanks for your help, and let me know if further clarification is needed.

From: FOIA

Your request is currently in Queue; Number 731 of 824. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: Defense Intelligence Agency

An interim response, stating the request is being processed.

From: FOIA

Your request is currently in Queue; Number 689 of 865. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: FOIA

Please reference the aforementioned case number when seeking status updates on this request.

Your request is currently in Queue; Number 668 of 898. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch
301.394.5587
301.394.5356 (Fax)
FOIA@dodiis.mil

From: FOIA

Your request has been assigned the aforementioned case number; please reference that number when inquiring about the status of your request. Your request is currently in Queue; Number 655 of 896. Please be assured that the DIA is actively working on your request, and is committed to processing your request as soon as possible. We appreciate your patience.

DIA, FOIA Document Review & Analysis Branch

From: FOIA

To better serve you, please provide the DIA Case number that was assigned to this request.

DIA, FOIA Document Review & Analysis Branch

From: FOIA

Your request is currently in Queue; Number 540 of 1061. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 532 of 1065. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 511 of 1047. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 489 of 1039. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 462 of 1023. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 440 of 1053. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 431 of 1050. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 421 of 1057. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

From: FOIA

Your request is currently in Queue; Number 411 of 1081. Please be assured that the DIA is actively working on your case, and is committed to processing your request as soon as possible. We appreciate your patience.

V/r
DIA, FOIA Document Review & Analysis Branch
FOIA and Declassification Services

Files

pages

Close