Pentagon opens up about its database of 400 smudges that may or may not be UFOs

'We're open to all hypotheses, we're open to any conclusions' says official

A US House of Representatives subcommittee on Tuesday heard from Pentagon officials on reports of and investigations into unidentified aerial phenomena (UAP) – a category that encompasses unidentified flying objects (UFO) and saves room for optical illusions, lens flare, smudges in photos, and other possibilities like meteorological events.

The US military has researched UFOs in the past through initiatives like Project Blue Book (1947-1969), and the Pentagon’s Advanced Aerospace Threat Identification Program (AATIP) (2007-2012).

Following a New York Times report in 2017 about the shutdown of the classified $22m AATIP program, public pressure and Congressional interest led the Office of the Director of National Intelligence last June to release a preliminary report on UAP [PDF] dating back to 2004.

The dossier identified 144 UAP reports from US government sources, 14 of which exhibited unusual flight characteristics. Over the past twenty years, around 400 still-unidentified phenomena had been reported, the House was told.

"Some UAP appeared to remain stationary in winds aloft, move against the wind, maneuver abruptly, or move at considerable speed, without discernible means of propulsion," the report stated. "In a small number of cases, military aircraft systems processed radio frequency (RF) energy associated with UAP sightings."

The report's primary conclusion is that the limited amount of high-quality data on UAP "hampers our ability to draw firm conclusions about the nature or intent of UAP."

Hence, it recommended consolidating and streamlining the reporting of UAP across the US government to develop a better understanding of such incidents. And why not, since such inquiries will be funded by US taxpayers.

It's official, the search is on

The US Congress's $770bn National Defense Authorization Act for fiscal 2022 calls for the creation of a permanent federal office within the Department of Defense to investigate and report on UAPs.

The as-yet-unnamed office looks likely to replace or perhaps refurbish and rename the Airborne Object Identification and Management Synchronization Group (AOIMSG), formed in November to replace the Navy's Unidentified Aerial Phenomena Task Force (UAPTF), formed in 2020.

At the hearing this week, Scott Bray, the Deputy Director of Naval Intelligence, revealed that the Pentagon's UAP task force database currently contains about 400 reports. The primary concern about unidentified flying things is that they may pose a risk to aviators or threaten national security.

Bray said since the early 2000s, the military has seen an increasing number of unauthorized and or identified aircraft or objects in US airspace. He attributed the increase to several factors, including the military's work to destigmatize reporting, the proliferation of drones, detection of "air trash" like Mylar balloons, and sensor improvements.

A still from the Open C3 Subcommittee Hearing on Unidentified Aerial Phenomena

An incredible still from the subcommittee hearing showing an example of an unidentified aerial phenomena soaring past an aircraft ... Click to enlarge (Source)

The stigma Bray referred to reflects the reluctance of serious scientists to respond to unsupported claims that UAPs may be extraterrestrial spacecraft – a common conclusion in popular culture and mass media, but not something that's been backed by evidence.

Bray at the hearing made an effort to distance the government's inquiry from the sort of investigations depicted in shows like The X-Files. "We have detected no emanations within the UAP task force that would suggest it’s anything non-terrestrial in origin," he said.

Eric Crawford, (R-AR), ranking member of the House Counterterrorism, Counterintelligence, and Counterproliferation (C3) Subcommittee, offered similar sentiment.

"It's not about finding alien spacecraft. It's about delivering dominant intelligence across the tactical, operational, and strategic spectrum," he said.

There's still hope

Nonetheless, Pentagon officials faced pressure to address public concerns about and interest in UAPs and public mistrust of past attempts to explain unidentified aerial objects.

"One of Congress's concerns is that the executive branch [under both parties] has been sweeping concerns about UAPs under the rug by focusing on events that can be explained and avoiding events that cannot be explained," said Rep André Carson (D-IN), chairman of the C3 subcommittee.

"What can you say to give the American people confidence that you aren't just focusing our attention on low-hanging fruit with easy explanations?"

Ronald Moultrie, Under Secretary of Defense for Intelligence and Security, responded by asserting the military is taking a more rigorous, methodical approach at the behest of the Secretary of Defense.

Asked to provide assurances the military will follow the facts wherever they lead, Moultrie responded, "We're open to all hypotheses, we're open to any conclusions that we may encounter."

Then, as if to pander those disinclined toward science, reality, data, and the possibility that some things may not be easily explained, Carson then asked if Moultrie was a science-fiction fan. Moultrie said he was, like many who grew up watching the Apollo space program.

"I have mentioned to you that, yes, I have followed science fiction," he said. "I have gone to conventions, even, I'll say it on the record. Gotta break the ice somehow," he said.

"I have done that, but there's nothing wrong with that. I don't necessarily dress up, but I do believe it's important to show that the Department of Defense, we have character. And we're people just like you, just like the American people. We have our inquisitiveness. We have our questions.

"We want to know what's out there just as much as you want to know what's out there." ®

Other stories you might like

  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    Updated India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • CISA and friends raise alarm on critical flaws in industrial equipment, infrastructure
    Nearly 60 holes found affecting 'more than 30,000' machines worldwide

    Updated Fifty-six vulnerabilities – some deemed critical – have been found in industrial operational technology (OT) systems from ten global manufacturers including Honeywell, Ericsson, Motorola, and Siemens, putting more than 30,000 devices worldwide at risk, according to private security researchers. 

    Some of these vulnerabilities received CVSS severity scores as high as 9.8 out of 10. That is particularly bad, considering these devices are used in critical infrastructure across the oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining and building and automation industries. 

    The most serious security flaws include remote code execution (RCE) and firmware vulnerabilities. If exploited, these holes could potentially allow miscreants to shut down electrical and water systems, disrupt the food supply, change the ratio of ingredients to result in toxic mixtures, and … OK, you get the idea.

    Continue reading
  • Google said to be taking steps to keep political campaign emails out of Gmail spam bin
    Just after Big Tech comes under fire for left and right-leaning message filters

    Google has reportedly asked the US Federal Election Commission for its blessing to exempt political campaign solicitations from spam filtering.

    The elections watchdog declined to confirm receiving the supposed Google filing, obtained by Axios, though a spokesperson said the FEC can be expected to publish an advisory opinion upon review if Google made such a submission.

    Google did not immediately respond to a request for comment. If the web giant's alleged plan gets approved, political campaign emails that aren't deemed malicious or illegal will arrive in Gmail users' inboxes with a notice asking recipients to approve continued delivery.

    Continue reading
  • China is trolling rare-earth miners online and the Pentagon isn't happy
    Beijing-linked Dragonbridge flames biz building Texas plant for Uncle Sam

    The US Department of Defense said it's investigating Chinese disinformation campaigns against rare earth mining and processing companies — including one targeting Lynas Rare Earths, which has a $30 million contract with the Pentagon to build a plant in Texas.

    Earlier today, Mandiant published research that analyzed a Beijing-linked influence operation, dubbed Dragonbridge, that used thousands of fake accounts across dozens of social media platforms, including Facebook, TikTok and Twitter, to spread misinformation about rare earth companies seeking to expand production in the US to the detriment of China, which wants to maintain its global dominance in that industry. 

    "The Department of Defense is aware of the recent disinformation campaign, first reported by Mandiant, against Lynas Rare Earth Ltd., a rare earth element firm seeking to establish production capacity in the United States and partner nations, as well as other rare earth mining companies," according to a statement by Uncle Sam. "The department has engaged the relevant interagency stakeholders and partner nations to assist in reviewing the matter.

    Continue reading

Biting the hand that feeds IT © 1998–2022