memoment editorial

2025 11 20 16 35 01

Pentagon Calendar Lists an AATIP-Era Meeting — But All Supporting Records Are Missing

FOIA Response Letter
A newly released Freedom of Information Act (FOIA) response from the Office of the Secretary of Defense (OSD) has revealed that no records exist for an August 28, 2017, meeting listed on the official calendar of Neill Tipton, then Director for Defense Intelligence, Collection and Special Programs.
The finding stands in contrast to an earlier FOIA-released calendar showing the meeting was scheduled as an UNCLASSIFIED “SAP Coordination Meeting,” with a point-of-contact phone number matching one found on Luis Elizondo’s DD Form 1910 request to release three Navy UFO videos back in 2017.
OSD’s “no records” determination, issued today to The Black Vault under FOIA case 24-F-0839, asserts that a search of OUSD(I&S) systems “could reasonably be expected to produce the requested records if they existed,” but that none were identified when it came to seeking out records relating to the meeting.Continue scrolling for more…

The Black Vault immediately appealed the decision, arguing that the agency overlooked evidence already released under FOIA case 20-F-1026, as filed by Lt. Tim McMillan, co-founder of The Debrief, which documented the meeting on Tipton’s official schedule.
That release to McMillan showed:

“SAP Coordination Meeting (UNCLASSIFIED) — Luis, 571-2393.”

The same phone number appears on Elizondo’s DD Form 1910 as his Pentagon office line at the time he submitted UFO videos known today as “FLIR1,” “Gimbal,” and “GoFast.”

The presence of the phone number in both documents, combined with a claim in Elizondo’s DoD IG complaint that he briefed Tipton in the July–October 2017 period, has fueled long-standing questions about whether the meeting took place, what it was about, and now, why OSD says no records exist.

The Tipton calendar released in FOIA case 20-F-1026 spans August 2017 and includes a clear entry at 12:55 p.m. on August 28, 2017, indicating a meeting took place between Tipton, and likely Elizondo himself.
These types of calendar entries are government records typically retained within OUSD(I&S) systems, which generally indicate that related materials exist such as:

The FOIA appeal filed by The Black Vault argues that federal case law establishes that agencies must search all locations where related records are likely to be found, especially when an existing record points directly to their existence, like this calendar entry does.
OSD stated it could locate no responsive materials, even though this official calendar entry clearly confirms the meeting was at least scheduled at one time. Under normal circumstances, even a cancelled or preliminary meeting would generate minimal administrative records, all of which would be responsive to The Black Vault’s request.
In Elizondo’s May 2021 complaint to the Department of Defense Inspector General, he states that between July and 3 October 2017, senior Pentagon officials directed him and a colleague to brief Neill Tipton on the status of AATIP and to transition responsibilities to him. Elizondo states:

“From July to late September, Mr. [Brennan] McKernan and I had several personal meetings with Mr. Tipton to brief him on the nuances of AATIP.”“Mr. Tipton agreed to assume the management role of AATIP…”

The complaint frames these meetings as part of a coordinated handoff of AATIP responsibilities, which has become a central element in Elizondo’s public claim that he led the program. But the Pentagon has consistently stated:
“Luis Elizondo had no assigned responsibilities for AATIP.”
The Pentagon’s position has remained unchanged for years, and to date, no document has been released that places Elizondo within any official program titled, or nicknamed, the Advanced Aerospace Threat Identification Program (AATIP). The Tipton calendar entry has been one of the few government-generated materials cited as potential evidence of interaction between Elizondo and senior OUSD(I&S) leadership on UAP-related matters, but still does not definitively prove that the meeting was AATIP, or even UAP, related.
But additional context to this meeting may emerge from email exchanges between Tipton and Elizondo, as published in Elizondo’s DoD/IG complaint. These messages, dated August 22–25, 2017, fall just days before the August 28 calendar entry and depict active communication about a planned meeting, efforts to schedule it, and discussions of an unspecified portfolio Elizondo described as “nuanced.”
In a message sent on August 22, 2017, Elizondo informed a Navy counterpart that he had spoken with Tipton “about our collective efforts” and recommended an in-person meeting once staff returned from leave. Tipton was copied and described as “amicable for a discussion” in his role as Acting Director for Defense Intelligence, Technical Collection and Special Programs. This message, which explicitly references coordination among OUSD(I), the Navy, and others, demonstrates that meeting preparations were already underway.
Tipton replied the following morning, August 23, adding a staff member to assist with scheduling. Elizondo responded on August 25, thanking Tipton “as discussed” and asserting that Tipton, as the “principal SES” in his directorate, was the appropriate figure “to help take our effort to a new level.” Elizondo further stated he had been managing another “nuanced effort within the Department for some time,” and that he had already “laid the foundations with SECDEF’s front office” to transfer this portfolio under Tipton’s oversight. He referenced meetings at the “front office,” partners in industry and other agencies, and the need to analyze and exploit material, an apparent reference to ongoing technical or operational work. Tipton replied the same morning: “Thanks Lue. All good – although, at some point I need to know what this actually ‘is’…”
Additional insight comes from a September 11, 2017, email, where Elizondo informed Tipton that “the front office is aware that you are now part of this endeavor and they are happy with the decision,” then proposed meeting the following Wednesday for a one-hour discussion. He also referenced a colleague as “a friend of the program,” noting Tipton would be speaking with him the next day.
Tipton’s reply, positioned directly above Elizondo’s email in the FOIA release and evidently written within the same timeframe, stated: “Thanks Lue. I’m around next week… For specific date/time, just work with [redacted]. I’m not allowed to muck around with my calendar.” He added that he had “a discussion with [redacted]tomorrow,” which suggests he was already engaged on issues connected to the effort Elizondo was attempting to advance.
When read alongside the August emails, the September 11 exchange reflects a notable shift. In late August, Tipton had asked Elizondo, “at some point I need to know what this actually ‘is’…,” indicating uncertainty about the nature of the portfolio. By September, Elizondo was telling Tipton that senior leadership, aka the “front office”, supported his involvement. The progression documented in these emails does not identify AATIP explicitly, but it does show an evolving effort in which Tipton was being brought into a role with responsibilities Elizondo believed were being aligned under him.
Then, in a communication dated September 25, 2017, released via FOIA to The Black Vault, Elizondo sent Tipton a “DRAFT DepSECDEF letter” written “at the unclassified level” so Tipton could “better assume the new responsibilities for AATIP.”

Elizondo wrote that the memo had been drafted “per SECDEF’s Front Office guidance to you and me,” and asked Tipton for edits. Tipton replied on October 3, 2017, saying he would review and provide comments.
The attached draft memorandum, the now-public AATIP memo, is one of the only official DoD documents ever released that refers directly to AATIP. It outlines congressional funding for the program in 2008, describes its focus on “beyond next generation technologies,” and directs all DoD elements to provide reporting on “unexplained or unknown aerial systems” to the Director of Defense Intelligence for Technical Collection and Special Programs, the office Tipton held at the time.
Although the memo remains heavily debated in terms of its status and was clearly written by Elizondo and not the Deputy Secretary of Defense, the emails show that Elizondo was transmitting the draft to Tipton in late September 2017 as part of what he described as a transfer of responsibilities “to you and me” per guidance from senior leadership. Combined with Tipton’s acknowledgment on October 3 that he was “getting spun back up” and would review the document, the records finally demonstrate that AATIP was explicitly referenced in correspondence between the two men during this period.
Elizondo resigned later that same day.
Taken all together, these communications do not establish whether the August 28 meeting took place or what its precise subject was. They do, however, document an active dialogue from late August through early October, involving scheduling, follow-up discussions, and the transmission of a memo directly labeled “Advanced Aerospace Threat Identification Program.” The presence of these records strengthens the central question raised by the FOIA “no records” determination: if emails exist showing coordination between Elizondo and Tipton on a portfolio as directed by senior offices, why does the Department of Defense report that it can locate no material whatsoever associated with a meeting that appears on Tipton’s official calendar between him and Elizondo within that timeframe?
OSD’s letter states that its search would have found records “if they existed.” But the calendar entry, which the authenticity of is not in dispute, suggests they did, at one time, likely did exist. So where are they?
The documentation presents several possibilities about the August 28th meeting:
If the meeting occurredThen associated records should exist somewhere within OUSD(I&S) or SAP coordination channels.
If the meeting was cancelledThere is still no explanation for why no scheduling emails or cancellation notices were located during the search.
If the meeting occurred but involved no Elizondo-related contentResponsive materials would still be expected under a FOIA request for all records “pertaining to” the event.
If records once existed but were later deleted or misplacedThat issue is not addressed in the FOIA response, and the appeal argues that OSD must examine alternative systems or archives.
This calendar entry remains one of the few official documents linking Elizondo to a senior Pentagon intelligence official during the period when he says he was transitioning AATIP responsibilities. The government’s position, reiterated for years, is that he had no assigned role in AATIP. The calendar entry does not resolve that contradiction, but it does establish that a meeting involving “Luis” at Elizondo’s known office number was officially recorded at a time it is confirmed Elizondo was talking to Tipton about transferring a portfolio.
With OSD’s latest FOIA search producing no related documents, the question becomes not just whether the meeting occurred, but how an official record of a scheduled SAP-related meeting can exist with no underlying materials preserved in any system searched by the Department of Defense.
The Black Vault’s appeal seeks clarity on all this, and requests a new search based on evidence and established case law requiring a proper one be conducted. Until that search is fully completed, the August 28, 2017, “SAP Coordination Meeting” remains a documented but unexplained artifact in one of the most debated chapters of the Elizondo/AATIP saga.
###
Document Archive
FOIA Response Letter
FOIA Release of Calendar to Lt. Tim McMillan
Follow The Black Vault on Social Media:

Pentagon Calendar Lists an AATIP-Era Meeting — But All Supporting Records Are Missing Read More »

craigslist car scam

Craigslist car report scam targets vehicle sellers

NEWYou can now listen to Fox News articles!
Selling your car online should be simple. Lately, though, more sellers are running into fake “vehicle report” demands from so-called buyers. The pitch looks routine, yet it leads straight to a payment page on a site you don’t know. We heard from Nick K. of Washington, who spotted the pattern in real time.”In trying to sell a car, it has become apparent that there is a scam related to CarFax-type reports,” Nick wrote in an email to us. “The way it works is a guy texts or emails saying they are interested in your car, but they say they must have a car report from a specific service. At first, I thought it was just a way for a guy to sell more reports, but after thinking about it for a while, it seems like it could be a great way to harvest credit card numbers, etc. I have not been a victim of this, but in the course of selling a car recently, I had several instances of this. There are several warning signs: ‘Will you accept cash?’ Questions indicating they have not read the ad. Offering more than the ad asks for. Short nonsensical first contact. These are just the usual signs I am looking for when I am trying to decide if someone responding to a Craigslist or FB ad is legit.”Nick’s instincts are spot on. This Craigslist car report scam has been spreading across Craigslist, Facebook Marketplace and other online classifieds.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.CONNECTICUT MAN LOSES LIFE SAVINGS IN CRYPTO SCAM Scammers posing as buyers on Craigslist are asking sellers to buy fake “vehicle history reports” from fraudulent sites.  (Kurt “CyberGuy” Knutsson)How the Craigslist car report scam worksThis scam often starts with a message that looks completely normal. A supposed buyer texts asking something like, “1985 F150 Available?” and quickly follows up with friendly but vague questions such as, “OK, I’m interested in seeing it. When and where would be good for you?”Once you respond, the “buyer” develops just enough rapport to sound legitimate. Then comes the setup. The “buyer” says he is serious about purchasing but wants to see a detailed ASR report first, something most sellers have never heard of.That’s exactly what happened to Nick K. After he shared the Craigslist link and vehicle details, the fake buyer sent this reply:”Auto Smart Report, here’s the link you can get the papers from. Oh, I forgot to ask for your name? I’m Richard. Will you accept a cash payment? Let me know.”It sounds harmless, even reassuring. But the scam hinges on getting you to click that link. The site looks professional, promising a “Complete Vehicle History at Your Fingertips.” Yet once you enter your information, you’re not buying a report; you’re handing over your credit card details and personal data to criminals.When the seller, in this case, pushed back, the scammer doubled down with more pressure tactics.”If you can show me the Auto Smart Report, that would be great, as it’s the most reliable and complete report. My offer to you is $7,000. I have no issue with that.” Notice the scammer just increased the amount that he is willing to pay for the vehicle by $500.They’ll say anything to keep you engaged and make the transaction sound routine. But the moment you pay for the fake report, the buyer disappears. His only goal is to harvest your financial information, not purchase your vehicle.INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU Behind the friendly text messages, these fake buyers are after your payment info, not your vehicle. (Kurt “CyberGuy” Knutsson)Warning signs to watch forRequests for unknown report names like “ASR”Messages that ignore your ad detailsOffers above your asking pricePhrases like “will you accept cash?” or “I just need to see a report first”Demands for a specific site instead of accepting a Carfax, AutoCheck or NMVTIS reportGeneric greetings like “dear,” “brother” or “friend”If you see two or more of these at once, treat the lead as suspicious.TOP 5 OVERPAYMENT SCAMS TO AVOID These convincing messages often include phrases like “I just need to see an ASR report first” or “will you accept cash?” to appear legitimate. (Kurt “CyberGuy” Knutsson)How to stay safe from Craigslist car report scamsEven the most convincing buyer could turn out to be a scammer, but these smart moves can help you stay safe, protect your money and keep your personal data out of the wrong hands.1) Do not click buyer-sent links, and use strong antivirus softwareAvoid clicking any link sent through text, email or messaging apps. These often lead to phishing sites or hidden malware downloads. Keep your devices protected with strong antivirus software. Run regular scans and keep your software updated to block new threats.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Never enter payment info on unfamiliar sitesIf a buyer insists you use a website you’ve never heard of, stop immediately. Always verify a site’s legitimacy before sharing any financial or personal details.3) Use a data removal serviceConsider a data removal service to remove your personal details from data broker sites. This limits how easily scammers can find and target you.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.4) Use trusted report servicesStick to established names like Carfax, AutoCheck or NMVTIS. These are widely recognized and accepted by real buyers.5) Share your VIN in the adIncluding your vehicle’s VIN lets genuine buyers run their own reports safely without needing your involvement.6) Block and report scammersReport suspicious messages directly to the platform and to the FTC at reportfraud.ftc.gov. Sharing details helps others stay safe.7) If you paid on a fake siteContact your bank right away, cancel the card and monitor your account for unauthorized charges. Quick action can prevent further loss.8) Meet smart and stay cautiousWhen meeting a buyer, choose a public place with security cameras. Bring a friend, keep your phone charged and document all communication.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThis scam works because a vehicle report sounds routine. A fake buyer pushes you to a site you’ve never heard of, then applies pressure to act fast. Slow down, verify and stick to well-known services. Real buyers will accept a report you provide or will run one themselves. You can still sell safely on marketplaces by following a few simple rules. Control the process, choose the report source and avoid links sent by strangers. Thanks to readers like Nick, more sellers can spot the trap before any money or data is at risk.Have you seen buyers pushing odd report sites when you sell online? What tipped you off first?  Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Craigslist car report scam targets vehicle sellers Read More »

soyuz

NASA Sets Coverage for Crew Launch to Join Station Expedition

NASA astronaut Chris Williams will launch aboard the Roscosmos Soyuz MS-28 spacecraft to the International Space Station on Thursday, Nov. 27, accompanied by cosmonauts Sergey Kud-Sverchkov and Sergei Mikaev, where they will join the Expedition 73 crew advancing scientific research.
Williams, Kud-Sverchkov, and Mikaev will lift off at 4:27 a.m. EST (2:27 p.m. Baikonur time) from the Baikonur Cosmodrome in Kazakhstan. Live launch and docking coverage will be available on NASA+, Amazon Prime, and the agency’s YouTube channel. Learn how to watch NASA content through a variety of platforms, including social media.
After a two-orbit, three-hour trip to the orbital complex, the spacecraft will automatically dock to the station’s Rassvet module at approximately 7:38 a.m. Shortly after, hatches will open between Soyuz and the space station.
Once aboard, the trio will join NASA astronauts Mike Fincke, Zena Cardman, and Jonny Kim, JAXA (Japan Aerospace Exploration Agency) astronaut Kimiya Yui, and Roscosmos cosmonauts Sergei Ryzhikov, Alexey Zubritsky, and Oleg Platonov.
NASA’s coverage is as follows (all times Eastern and subject to change based on real-time operations):
Thursday, Nov. 27
3:30 a.m. – Launch coverage begins on NASA+, Amazon Prime, and YouTube.
4:27 a.m. – Launch
6:45 a.m. – Rendezvous and docking coverage begins on NASA+, Amazon Prime, and YouTube.
7:38 a.m. – Docking to the space station
9:50 a.m. – Hatch opening and welcome remarks coverage begins on NASA+, Amazon Prime, and YouTube.
10:10 a.m. – Hatch opening
Williams, Kud-Sverchkov, and Mikaev will spend approximately eight months aboard the space station as Expedition 73/74 crew members, before returning to Earth in summer 2026. This will be the first spaceflight for Williams and Mikaev, and the second for Kud-Sverchkov.
During his stay aboard station, Williams will conduct scientific research and technology demonstrations aimed at advancing human space exploration and benefiting life on Earth. He will help install and test a new modular workout system for long-duration missions, support experiments to improve cryogenic fuel efficiency and grow semiconductor crystals in space, and assist NASA in designing new re-entry safety protocols to protect crews during future missions.
For more than 25 years, people have lived and worked continuously aboard the International Space Station, advancing scientific knowledge and making research breakthroughs that are not possible on Earth. The station is a critical testbed for NASA to understand and overcome the challenges of long-duration spaceflight and to expand commercial opportunities in low Earth orbit. As commercial companies concentrate on providing human space transportation services and destinations as part of a robust low Earth orbit economy, NASA is focusing its resources on deep space missions to the Moon as part of the Artemis campaign in preparation for future human missions to Mars.
Learn more about International Space Station research and operations at:
https://www.nasa.gov/station
-end-
Joshua Finch / Jimi RussellHeadquarters, Washington202-358-1100joshua.a.finch@nasa.gov / james.j.russell@nasa.gov
Sandra Jones / Joseph Zakrzewski Johnson Space Center, Houston 281-483-5111 sandra.p.jones@nasa.gov / joseph.a.zakrzewski@nasa.gov 

NASA Sets Coverage for Crew Launch to Join Station Expedition Read More »

70702

The Last Stand Dilemma in Ukraine

When should Ukraine commit more forces to a perhaps desperate stand to hold ground it will likely lose? And when is it the difficult but correct choice to preserve the force and pull back to the next defensive line? This is the real, agonizing strategic dilemma shaping the war, now highlighted in the fight for Pokrovsk.Distinguished strategist Lawrence Freedman joins Ryan at a cafe in Vilnius, where they were both speaking at a conference, to dissect this critical question. They also sort through how this relates to each side’s theory of victory and the shifting realities of the battlefield.

The Last Stand Dilemma in Ukraine Read More »

android uninstall app google play

Manage Android apps with the new ‘Uninstall’ button

NEWYou can now listen to Fox News articles!
If you use more than one Android device with the same Google account, you know how messy things can get.Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.That’s changing now, thanks to Google’s latest Play Store update.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)The new uninstall button rolls outGoogle is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.Why this update mattersFor anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.How to use the new uninstall button on Android Settings may vary depending on your Android phone’s manufacturer. Open the Play Store app on your device.Navigate to the listing of an app that you know is installed on another device signed in to your account.Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.Tap Uninstall next to the one you want to remove from your Android.Then click This Device.GOOGLE CHROME AUTOFILL NOW HANDLES IDS Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)How to uninstall Android apps when the new Play Store button isn’t showingWait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:Settings may vary depending on your Android phone’s manufacturer.Click Profile.Tap Manage apps & devices.Click Manage.Use the device filter to select the target device.Press the app you want to uninstall.Click uninstall.CLICK HERE TO DOWNLOAD THE FOX NEWS APP The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)What this means to youThis feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThe new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Manage Android apps with the new ‘Uninstall’ button Read More »

blobid1763428242343

Strange Cases of Mysterious UFO Documents

In the world of UFO phenomena, there have always been conspiracies swirling around that run the range from the merely odd to the downright ludicrous. One corner of these UFO conspiracies is the existence of top-secret documents towards which all manner of conspiracies gravitate. These documents might outline UFO secrets, cover-ups, information on alien tech or aliens, and who whole bunch of other secretive things concerning UFOs, but they have always drawn intrigue and mysteries to them, and here we will look at some of these. 
Our first story here revolves around a Russian scientist by the name of Genrikh Mavrikiyevich Ludvig, who was supposedly also an architect, philosopher, and scholar of ancient languages. He was also apparently very at odds with the Stalin regime, which landed him in trouble on more than one occasion, and he was also known for his extensive knowledge of the occult and for his considerable esoteric knowledge. He had a vast knowledge of ancient Sumerian and Etruscan civilizations, and also of medicinal herbs. During World War II, he was purportedly the designer of military technology and also an invaluable pioneer of architectural plans for military bases in marshy environments. Yet, a very curious chapter of this mysterious man’s life was the time when he was allegedly allowed access to the secret Vatican archives and purportedly found all manner of documents and evidence of ancient aliens within.
It is perhaps first important to understand just what the Vatican secret archives actually are. Comprised of approximately 53 miles of labyrinthine aisles of shelving harboring rows upon countless rows of texts, books, and scrolls ranging from the more modern to fragile, time-worn manuscripts reaching back 12 centuries into the shadows of time, the Vatican Archives, officially known as the Archivum Secretum Apostolicum Vaticanum, was originally constructed in 1612 by Pope Paul V and is a truly a huge treasure trove of information collected by the Church over hundreds of years. This vast repository of knowledge holds state papers, Holy See paperwork, papal correspondence and personal letters, and countless historical records, documents and texts accumulated by the Vatican from every corner of the known world that date back to the 8th century, all housed within a massive, carefully climate-controlled structure adjacent to the Vatican Library that is designed more like a fortress than a library, replete with impenetrable underground bunkers and with only one known heavily guarded entrance.
The list of known contents of the archives is far too long to completely cover here, but includes a wealth of historical documents including handwritten letters to the Pope from such important figures such as Mary Queen of Scotts asking for a pardon before her execution, King Henry VIII, Michelangelo asking to be paid for his work on the Sistine Chapel, Abraham Lincoln, Jefferson Davis, Grand Empress Dowager Helena Wang of China in the 17th century, one written on birch bark by the Canadian Ojibwe tribe in 1887, and many, many others. Here, there are official edicts by Popes through the centuries, including excommunications such as that of German religious heretic and founder of Lutheranism, Martin Luther, official papal decrees such as the one made in 1493 by Pope Alexander VI that split the entire known world among Spain and Portugal, as well as personal communications from popes throughout history. Here one can also find such gems as a nearly 200-foot long scroll containing details of the trials of the Knights Templar for heresy and blasphemy dating to 1307, as well as a handwritten transcript detailing the trial of astronomer Galileo Galilei in the 17th century, as well as the doctrine of the Immaculate Conception, which states that Mary was conceived without sin, scrawled out on a piece of parchment dating to 1854.

The Vatican Archives are often referred to as the Vatican Secret Archives, mostly due to a mistranslation of the Latin word secretum, which is actually closer in meaning to “personal” or “private” rather than “secret” or “confidential” as many think, but it could also have to do with the archive’s history of strict inaccessibility and reclusiveness from the outside world. They had been for centuries practically completely forbidden and closed off from nearly everyone, even Church officials, with not even Cardinals allowed access to their treasure trove of information, and it was not until 1881 that Pope Leo XIII allowed limited access to outsiders, yet this does little to dispel the secrecy surrounding the archives and it is still no small feat to enter this inner sanctum of all of the Vatican’s knowledge.
To gain access to these isolated archives and islands of knowledge, one must be a qualified, recognized scholar or researcher who has been thoroughly vetted by the Holy See, a process that can take years. Amateur historians, journalists, students, or armchair researchers need not apply and are strictly forbidden. If one is lucky enough to be granted access, they enter through the sole entrance, the well-guarded Porta Sant’Anna, after which they are required to state exactly what it is they are looking for among the voluminous collection. Once entering the rows of dusty old texts, there is no browsing allowed, and you can only retrieve three documents listed in one of the thick, intimidatingly massive catalogs that are meticulously handwritten in Latin or Italian. If you cannot decide what you want to look at within a set amount of time under strict supervision, you are ushered out of the archives and must wait until the following day to try again. Even if you do know what you want to look at, there are still oppressive limitations on what is available for perusal. All materials in the archives are only released for public viewing after a full 75 years have passed, meaning newer documents are restricted, and even then, there are large swaths of archived content that are totally off limits and probably forever will be.
In other words, this isn’t a library open to just anyone, yet in the 1920s, Ludvig was somehow granted access for reasons still left unclear. While there, he supposedly was free to peruse the vast stores of manuscripts on offer, and came across some very bizarre things indeed. He would claim to have come across numerous texts on alchemy and ancient codes, and even stranger still, manuscripts on UFOs and ancient aliens. According to Ludvig, there were texts outlining in detail how aliens had visited Earth many millennia ago and had managed to influence ancient civilizations such as the Egyptians, the Mayans, and the Mesopotamians. Some of the information he claimed to have gotten was about how the Egyptian pyramids were ancient energy machines, and he even said he had found historical records on nuclear weapons being used in ancient times, which had resulted in the melting of the fortress walls of Babylon, as well as plans for alien spacecraft.
None of this was allowed out of the Vatican archives, but Ludvig would apparently somehow get his hands on photographs of some of these documents, and the rest he would commit to memory and later write out as much as he could remember. He would show these to his own students, and apparently, this was enough to get him accused of being a Vatican spy and imprisoned in a gulag concentration camp in 1938. He would eventually be released and continue his work throughout World War II, keeping most of what he had seen in the Vatican to himself during these years, before taking most of it with him to his grave in 1973.

The story of Genrikh Mavrikiyevich Ludvig might have very well been forgotten and confined to the mists of time forever if it had not been discussed by Soviet mathematician Matest M. Agrest in the 1950s, and then later mentioned in the Russian publication Sovershenno Sekretno, in an article by writer and journalist Vladimir Kucharyants. It has since been picked up and much discussed among UFOlogists and ancient astronaut theorists, but one is left to wonder just how real any of this is. It is certain that he indeed was a real person, and was indeed an architect and occultist, but that is about all we know for sure. There is little corroborating evidence and very few sources available on his life, so who was Ludvig really, and did he really gain access to the secret Vatican archives and find all of this amazing information? If so, how did he manage to get photographs out of this veritable fortress of secrecy? One does not just waltz into this place and take photographs of these secretive tomes. How much of this is true and how much is possibly urban legend? There has certainly been some skepticism of the claims, and skeptic Jason Colavito has said of it all:

“Ludvig doesn’t seem to actually have been an ancient astronaut theorist in the 1920s and 1930s. Instead, the article talks about his belief in lost civilizations (the Sumerians, he said, were like a book whose first pages had been pulled out) and that ancient monuments had esoteric spiritual energy. The Pyramids, he said, could be activated with meditation. He spoke of astral projection and ascending to meet God in the spheres beyond earth. In other words, he sounds more like a Theosophist rather than a nuts-and-bolts ancient astronaut theorist, much like his contemporary, the émigré occultist Nicholas Roerich.
The only evidence that he believed in spacemen or that there was a nuclear bombing of Babylon comes from one of his former students, who recalled Ludvig talking of such issues much, much later—in the 1960s, the height of the Soviet ancient astronaut craze, when Matest M. Agrest, Alexander Kasantsev, and I. S. Shklovskii had popularized the idea. So, if I take the evidence at face value, it sounds like Ludvig had typical Theosophical-style esoteric ideas about ancient history in the 1930s and later converted to ancient astronaut beliefs in the 1960s, like many of his generation who saw parallels between the esoteric and ancient astronauts. As for the Vatican material, that is probably a combination of exaggeration, secondhand memory, and wishful thinking based on “interpretations” that the Russian scholar imposed on the source materials—source materials that are conveniently not cited by the only person to claim they existed, a student of his 50 years ago.”

He does make a good point, and considering there are precious few sources for this story and it mostly revolves around the recollections of that one guy, it is left open to speculation as to whether Ludvig ever did make it into the catacombs of the Vatican archives and if so, what he really found there. It is all rather mysterious, and although both the man and the archives are wreathed in myth and legend, it is hard to know on this one where reality and fantasy lie and at what point they merge. It is all a rather interesting tale, nevertheless, and with a lack of any further information, will probably remain lost to history.
Moving along, what has become known as one of the earliest official UFO reports from a commercial airline crew began as a normal flight. On July 23, 1948, chief pilot Clarence Chiles and co-pilot John Whitted took off for a routine 7-hour flight from Houston, Texas, to Atlanta, Georgia, aboard their Eastern Air Lines Douglas DC-3 passenger plane along with twenty passengers. The weather was clear and calm, and both pilots were very experienced, with distinguished flying careers during World War II, so there would have been no reason to think that this would be anything more than a typical, uneventful flight, but this would soon prove not to be the case at all, and it would propel itself into the realm of great UFO mysteries, including a major investigation and lost secret documents.
At approximately 2:45 AM on July 24, the plane was in the skies near Montgomery, Alabama, at an altitude of 5,000 feet when Chiles’ attention was drawn to what he would describe as “a dull red glow above and ahead of the aircraft,” and he mentioned it to Whitted, who also saw it. They at first took it to be a military plane, but it would soon prove to be anything but, as it rapidly closed in on their position with astonishing speed in a horizontal path and silently whizzed by before shooting straight up into the sky while belching forth “a tremendous burst of flame out of its rear.” The proximity of the strange craft had been such that they had been forced to bank in an evasive maneuver, and Chiles would say of the encounter:

“We veered to the left and it veered to its left, and passed us about 700 feet to our right and about 700 feet above us. Then, as if the pilot had seen us and wanted to avoid us, it pulled up with a tremendous burst of flame out of its rear and zoomed up into the clouds.”

Both men would get a good look at it, describing it as having been a cigar-shaped metallic object 100 feet long and 25-30 feet in diameter, with no noticeable wings or tail section, and they would explain that they had seen two rows of brightly lit windows along its side. It would turn out that only one of the passengers, most of whom had slept through it all, had seen anything unusual, saying that he had seen an eerie red glow pass the plane. Other witnesses would later turn out to be personnel from Robbins Air Base, near Macon, Georgia, who would claim to have seen the same object shoot through the sky a half an hour before Chiles and Whitted’s encounter.
The plane made it to its destination on schedule, and the pilots wasted no time in reporting what they had seen to the US Air Force, who in turn called in investigators from Project Sign, which was an early Air Force group for studying UFO sightings and sort of a precursor to the more famous Project Blue Book. The pilots were extensively interviewed, and they provided sketches of what they had observed. and it was found that their descriptions were remarkably similar except that Chiles claimed to have seen an actual cockpit on the craft, whereas Whitted had observed no such feature. Project Sign also meticulously mapped every known aircraft in the air for the entire southeastern United States in an effort to see if the object could have perhaps been another plane, but there was nothing else officially in the air at the time that could really explain the bizarre sighting. This, combined with the fact that the two pilot witnesses were seasoned professionals and had gotten a good, close look at the anomalous object, made this a very exciting, albeit alarming incident.
The idea that some large, unidentified flying object of this type had invaded U.S. airspace was a sensitive issue at the time, and so the Air Force was scrambling for answers. It was suggested that this could have possibly been some sort of advanced aircraft from a foreign nation, but this was problematic because the technology was seen as far beyond what anyone was capable of at the time, and nothing like it had been seen before. The detail of the flame shooting out of the rear of the craft was important in this regard because in those days, few aircraft had afterburners, and none of that magnitude. This was more like a rocket, but there was thought to be no conceivable way that such a massive low low-flying, horizontal rocket had been traveling through the area with the technology available at the time and with no discernible launching point.
Other ideas were suggested at the time as well, such as that the pilots had simply misidentified a particularly brilliant meteor, but this does not explain the object’s ability to make a sudden vertical ascent, nor details like the double rows of windows. Project Sign also briefly entertained the idea that this could have been a brush with a Navy plane called the RV6 Constitution, which could have been on a classified mission and was top-of-the-line cutting edge stuff at the time, and also just happened to be cigar shaped, with the characteristic feature of two rows of windows, but it did not spew long jets of flame and certainly could not perform the radical vertical maneuver that was observed. The Navy, for its part, would also deny that this sort of plane had been anywhere near the area at the time.

By all accounts, Project Sign was utterly meticulous and thorough with every aspect of the investigation, leaving no stone unturned and at every turn seeking to exhaust every possible option. In the end, they had completely ruled out the meteor theory and had considered the notion that this had been some experimental aircraft, highly improbable. In light of this, the Air Technical Intelligence Center (ATIC) compiled all of its findings into an “Estimate of the Situation” report, which allegedly came to the conclusion that the Chiles-Whitted object was an “interplanetary spaceship.” The top secret and highly classified report itself has become almost legendary, partly because it would have been the first time a government had ever conceded that UFOs were actually aliens, but also partly because it would shortly after disappear off the face of the earth and into history and the annals of great conspiracies.
The first head of The Air Force’s famous Project Blue Book study of UFO phenomena, Edward J. Ruppelt, would insist that the report did in fact exist, that it was sent all the way up through the chain of command, to land on the desk of General Hoyt S. Vandenberg, the chief of staff. The result? Well, Vandenberg apparently was skeptical of the estimate that the UFO was of alien origin and doubted the evidence used to back that case up. Rather, he was a proponent of the idea held by another faction within the Air Force that believed that the object, and indeed UFOs in general, were the result of top-secret aircraft being developed by the Soviet Union, which fit in perfectly with the Cold War paranoia at the time. According to Ruppelt, the report would then be totally dismissed and destroyed, saying:

“The general wouldn’t buy interplanetary vehicles. A group from ATIC went to the Pentagon to bolster their position but had no luck, the Chief of Staff couldn’t be convinced. The estimate died a quick death. Some months later it was completely declassified and relegated to the incinerator.”

The mysterious report has gone on to become the stuff of legend in UFOlogy, with occasional witnesses saying that they have seen a copy, but no concrete evidence that it ever even existed at all. There are no photographs of it, no known pages remaining from it; it is a specter lost to the mists of time, only reports of having seen the report up close. In the aftermath of this, the official Air Force verdict was and has remained that what Chiles and Whitted saw was a meteor. Case closed. Of course, in light of the other evidence of Project Sign’s findings on the case, this explanation has been scoffed at and accused of being a weak attempt to obfuscate and blur the real truth, as has the fact that the actual report was apparently disposed of to leave us with nothing.

For their part, Chiles and Whitted would always stand by their account, never once faltering from what they believed was a truly anomalous situation and some sort of unknown craft. To this day, the case is discussed heavily, and it remains a very credible one considering the pedigree of its pilots and the very thorough investigation that came to the conclusion that this might actually be something not of this earth. Yet not everyone obviously agrees, and so we are left with questions. If this wasn’t extraterrestrial in origin, then what was it? A meteor, an experimental aircraft, what? Why would this remarkable and mysterious report make it all the way up through the upper echelons of the Air Force brass to merely be brushed aside and destroyed? Doesn’t incinerating it suggest they were merely trying to get rid of it? In the end, we don’t know what it was, and it is all an intriguing mystery that we very well may never have the true answer to.
Our next case here revolves around the French astronomer, computer scientist, and UFO researcher Jacques Fabrice Vallée, who is one of the important figures in the study of unidentified flying objects, long a proponent of pushing the legitimacy of ufology as a viable scientific pursuit. A legendary icon in the field, he not only increased the legitimacy of the study of UFOs but also pushed at its boundaries, introducing many ideas that were considered groundbreaking in their time, notably the idea of extraterrestrials as interdimensional travelers. He is so important that he was the inspiration for one of the main characters in Stephen Spielberg’s Close Encounters of the Third Kind, and his contributions to the field are innumerable. He is also known for uncovering a mysterious lost top-secret document that pointed to a grand conspiracy of the government controlling, twisting, and even fabricating the output of information on the UFO phenomenon.
In the summer of 1967, Vallée was living in the United States, and at the time was tasked with helping astronomer J. Allen Hynek get his documents in order. This is notable in that Hynek was then one of the most recognizable authorities on the UFO subject and had been the top scientific advisor to three UFO studies carried out by the U.S. Air Force, with those being Project Sign (1947–1949), Project Grudge (1949–1951), and Project Blue Book, which he was then overseeing. Indeed, the documents that Vallée was helping to organize were composed of UFO reports under investigation by Project Blue Book. It was apparently quite the task, since Hynek was notoriously disorganized with his files, something Vallée complained about profusely. One day, he unloaded some boxes of Hynek’s files, and as he went through them trying to make some sense of the chaotic mess, he came across a document that was dated 9 January 1953, stamped in red ink “SECRET – Security Information” and signed by a person he would later only refer to as “Pentacle.” What he would find within would change his whole outlook on the UFO phenomenon, shake him to his core, and inspire debate and discussion that has continued to this day.

Jacques Vallée on the right

Among the many revelations allegedly held within what would be called “The Pentacle Memorandum,” perhaps the most shocking had to do with what was called the Robertson Panel. Headed by Howard P. Robertson, a physicist from the California Institute of Technology, and organized in response to a recommendation to the Intelligence Advisory Committee following the Central Intelligence Agency’s own review of Project Blue Book, the Robertson Panel was convened in January, 1953, by a committee of expert scientists who had been asked to consider the UFO phenomenon for the purpose of weighing the threat that such objects might present to national security. These experts included Luis Alvarez, Nobel prize in physics; Lloyd Berkner, space scientist; Sam Goudsmit, nuclear physicist at Brookhaven National Laboratory, and astronomer Thornton Page. Although the Robertson Panel was meant to be an impartial, open discussion on the matter that considered all angles and held nothing back, and this was what the public had been told about it, what Vallée supposedly discovered in this mysterious file cast a sinister light on it all.
According to the Pentacle Memorandum, which was addressed to Miles E. Coll at Wright Patterson Air Force Base and meant for transmittal to Captain Edward J. Ruppelt, the panel of scientists convening for the Robertson Panel was being manipulated and not told the whole story. Not only had a secret study of thousands of UFO reports carried out on behalf of the United States government by an organization called the Battelle Memorial Institute been withheld from them, but under what was referred to as “Project Stork” they were also told in no uncertain terms that, far from an impartial discussion, there were certain things they were not allowed to talk about. This was basically cherry picking and preselecting evidence, which would guide the conclusion the scientists would reach, and they even suggested postponing the Robertson Panel until it could be decided how much information would be made available to the committee. Vallée would write of this to UFO researcher Barry Greenwood:
The greatest implication, which is perhaps not obvious on first reading but which amounts to a scandal of major proportions in the eyes of any scientist, has to do with the outright manipulation of the Robertson panel. Here is a special meeting of the five most eminent scientists in the land, assembled by the government to discuss a matter of national security. Not only are they not made aware of all the data, but another group has already decided “what can and cannot be discussed (Pentacle’s own words!)” when they meet. Dr. Hynek categorically stated to me that the panel was not briefed about the Pentacle proposals.
Vallée found that this mysterious Project Stork extended beyond merely manipulating and guiding the Robertson Panel. There was also a plan to exploit areas of supposed high UFO activity to carry out an experiment to secretly and purposefully manufacture UFO phenomena to gather reliable physical data on eyewitness testimony, essentially creating what Vallée would call “a carefully calibrated and monitored simulation of an entire UFO wave.” A portion of the document explains this project:

“We expect that our analysis will show that certain areas in the United States have had an abnormally high number of reported incidents of unidentified flying objects.  Assuming that, from our analysis, several definite areas productive of reports can be selected, we recommend that one or two of theses areas be set up as experimental areas. This area, or areas, should have observation posts with complete visual skywatch, with radar and photographic coverage, plus all other instruments necessary or helpful in obtaining positive and reliable data on everything in the air over the area. A very complete record of the weather should also be kept during the time of the experiment.  Coverage should be so complete that any object in the air could be tracked, and information as to its altitude, velocity, size, shape, color, time of day, etc. could be recorded. All balloon releases or known balloon paths, aircraft flights, and flights of rockets in the test area should be known to those in charge of the experiment. Many different types of aerial activity should be secretly and purposefully scheduled within the area. We recognize that this proposed experiment would amount to a large-scale military maneuver, or operation, and that it would require extensive preparation and fine coordination, plus maximum security. Although it would be a major operation, and expensive, there are many extra benefits to be derived besides the data on unidentified aerial objects.
The question of just what would be accomplished by the proposed experiment occurs. Just how could the problem of these unidentified objects be solved? From this test area, during the time of the experiment, it can be assumed that there would be a steady flow of reports from ordinary civilian observers, in addition to those by military or other official observers. It should be possible by such a controlled experiment to prove the identity of all objects reported, or to determine positively that there were objects present of unknown identity. Any hoaxes under a set-up such as this could almost certainly be exposed, perhaps not publicly, but at least to the military. In addition, by having resulting data from the controlled experiment, reports for the last five years could be re-evaluated, in the light of similar but positive information. This should make possible reasonably certain conclusions concerning the importance of the problem of “flying saucers”. Results of an experiment such as described could assist the Air Force to determine how much attention to pay to future situations when, as in the past summer, there were thousands of sightings reported. In the future, then, the Air Force should be able to make positive statements, reassuring to the public, and to the effect that everything is well under control.”

None of this had been revealed to the Robertson panel. Vallée saw all of this as an insidious government plan to spread misinformation and manipulate the truth, to obfuscate the honest search for true answers and mislead the public. He also wondered why the panel hadn’t been briefed on this and whether this was just one small part of a greater conspiracy to obfuscate the truth and construct just what the public knew about UFOs. In his opinion, this revelation potentially posed the threat of causing huge shockwaves in the UFO field and beyond into society itself. Vallée was quite alarmed by all of this and would write:

“Perhaps the Pentacle memo only proves that scientific studies of UFOs (and even their classified components) have been manipulated since the fifties. But it also suggests several avenues of research which are vital to the future of this field: why were Pentacle’s proposals kept from the panel? Were his plans for a secret simulation of UFO waves implemented? If so, when, where and how? What was discovered as a result? Are these simulations still going on? Hynek once assured me that if it ever turned out that a secret study had been conducted, the American public would raise an unbelievable stink against the military and Intelligence community. It would be an outrage, he said, an insult to the whole country, not to mention a violation of the most cherished American principles of democracy. There would be an uproar in Congress, editorials in major scientific magazines, immediate demands for sanctions.”

Making it all even more ominous was that when Hynek found out about the document, he had known nothing of any of this, meaning that Project Bluebook itself was being manipulated. Hynek went to directly confront members of the Battelle study about it, and their reaction was quite volatile. Vallée would say of the incident, “The man I have called Pentacle snatched his notes away and told him in no uncertain terms that the contents of the memo were not to be discussed, under any circumstances. Why should Pentacle worry so much about a simple letter written fifteen years ago?” Indeed, why would they have such a reaction, and what did this mean? All of this disturbed Vallée greatly, and he would later say of the document’s profound effect on him:

“The discovery of the Pentacle document had a major impact on me. It gave me an uncomfortable insight into the practices of government agencies and the high-powered consultants who serve them. It was the main reason for my return to Europe in 1967. It made obvious some unsavoury aspects of scientific policy at the highest level. It provided quite an education for an idealistic young astronomer.”

It would not be until 1992 that word of this secret document came to light for the public, with the release of Valee’s four-volume series titled Forbidden Science. Not long after this, a purported leaked copy of the Pentacle Memorandum came into the possession of UFO researchers, and Vallee would confirm that this was the very same document he had seen back in 1967. The document would ultimately end up hitting the public with a whimper, not creating nearly the sort of uproar that Vallée had been expecting. Most people just didn’t really seem to care all that much. Even within UFO circles, it got a mixed response, with some sharing Vallée’s alarmist and paranoid interpretation, while others said the document was not particularly significant in the grand scheme of things. Still others took the more extreme stance that the document “proved” that the government was behind the whole UFO phenomenon, and that there were no aliens or spaceships, just a large-scale psi-ops scheme. All of these various interpretations have managed to make the Pentacle Memorandum a controversial and much-debated document right up to the present, with no general agreement on what it all means or what implications it might have. It remains an odd footnote in the history of ufology that we may never truly understand for certain, its ultimate implications unknown to us.

In our last case here, we delve into the world of hacking and stumble across strange documents. Born in 1966, from an early age, Scottish-born Gary McKinnon had been interested in computers, getting his first computer and learning to use it on his own at the age of 14. Later, inspired by movies such as WarGames and the book The Hacker’s Handbook by Hugo Cornwall, McKinnon began to become more and more enthralled with the world of hacking, to the point that he became absolutely obsessed with it. He found himself spending more and more time shirking his duties as a systems administrator for a small business in order to pursue his passion for hacking, and this obsession led to him losing his job. It did not bother him much at the time, as this just allowed him to devote more time to what he really wanted to do, all while he crashed at the house of his girlfriend’s aunt in London and delved deeper into what he was capable of. Calling himself by the hacker name “Solo,” for a while, it was all sort of a hobby and addictive game for him, but then it would careen into what has been called “the biggest military computer hack of all time,” leading McKinnon down a dark rabbit hole of secret military projects, documents, aliens, and UFOs.
By the late 1990s, McKinnon had been drawn more and more towards looking for evidence of government cover-ups of all kinds, and decided to use his hacking skills to look for it, once saying, “I hate conspiracy theories, so I thought I’d find out for myself.” He became utterly devoted and further obsessed with this mission, spending all of his time snooping through government and military files and systems, to the point that it absolutely consumed him. Additionally, this was all far from legal. He said of this crusade to throw the veil off of secrecy:

“I am not blind to criminality, but I was on a moral crusade. I was convinced, and there was good evidence to show, that certain secretive parts of the American government intelligence agencies did have access to crashed extra-terrestrial technology which could, in these days, save us in the form of a free, clean, pollution-free energy. I thought if someone is holding onto that, that is unconstitutional under American law. I didn’t think about jail sentences at the time. I’d stopped washing at one point. I wasn’t looking after myself. I wasn’t eating properly. I was sitting around the house in my dressing gown, doing this all night.”

According to him, he was digging up all manner of weirdness in the process, and one of the weirdest of these was evidence of what he describes as some sort of secret space force. He stumbled across this while looking into NASA and U.S. Space Command files after hearing of a conspiracy that they were holding UFOs at the Johnson Space Center. Not content to just discuss conspiracies about it, he began hacking into NASA to see for himself, and it would turn out to be shocking and very weird. McKinnon would say of this in an interview with Wired:

“A NASA photographic expert said that there was a Building 8 at Johnson Space Center where they regularly airbrushed out images of UFOs from the high-resolution satellite imaging. I logged on to NASA and was able to access this department. They had huge, high-resolution images stored in their picture files. They had filtered and unfiltered, or processed and unprocessed, files. My dialup 56K connection was very slow trying to download one of these picture files. As this was happening, I had remote control of their desktop, and by adjusting it to 4-bit color and low screen resolution, I was able to briefly see one of these pictures. It was a silvery, cigar-shaped object with geodesic spheres on either side. There were no visible seams or riveting. 
There was no reference to the size of the object, and the picture was taken presumably by a satellite looking down on it. The object didn’t look manmade or anything like what we have created. Because I was using a Java application, I could only get a screenshot of the picture — it did not go into my temporary internet files. At my crowning moment, someone at NASA discovered what I was doing and I was disconnected. I also got access to Excel spreadsheets. One was titled “Non-Terrestrial Officers.” Yeah, I looked it up and it’s nowhere. It doesn’t mean little green men. What I think it means is not earth-based. I found a list of ‘fleet-to-fleet transfers’, and a list of ship names. I looked them up. They weren’t US navy ships. What I saw made me believe they have some kind of spaceship, off-planet. It contained names and ranks of U.S. Air Force personnel who are not registered anywhere else. It also contained information about ship-to-ship transfers, but I’ve never seen the names of these ships noted anywhere else.”

McKinnon claims that this space program is called “Solar Warden,” in operation since 1980, and every bit as bizarre as you might imagine. He says that it acts as a sort of interplanetary border control to protect against aliens that would do us harm, and that it is under control of the US Naval Network and Space Operations Command (NNSOC),  and through his snooping around, he was able to glean a surprising amount of detail on the program. He claims that Solar Warden has at its disposal eight massive cigar-shaped motherships longer than several football fields, 43 small “scout ships” and various other flying objects, as well as advanced beam weaponry, all of it derived from reverse-engineered alien technology tested at secret bases, including the infamous Area 51 in Nevada. It sounds absurd, but McKinnon swears it is true and has never backed down from his story. In addition to Solar Warden, he also uncovered images of UFOs in the atmosphere and various other information on aliens and UFOs, as well as documents called “The Disclosure Project,” which supposedly contain reams of testimony from high-level sources on the existence of such things, and of which he has said:

“There is The Disclosure Project. This is a book with 400 testimonials from everyone from air traffic controllers to those responsible for launching nuclear missiles. Very credible witnesses. They talk about reverse-engineered technology taken from captured or destroyed alien craft. There are some very credible, relied-upon people, all saying yes, there is UFO technology, there’s anti-gravity, there’s free energy, and it’s extraterrestrial in origin and they’ve captured spacecraft and reverse engineered it.”

Unfortunately, he was never able to get too far into it, as all of this was highly illegal, and it eventually caught up with him. In 2002, McKinnon was arrested at his flat in Wood Green, north London, and accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, much of it allegedly causing a lot of damage in the process. For instance, he is accused of altering or deleting critical files from operating systems, rendering important systems inoperable, copying data, account files, and passwords, interfering with military operations, compromising sensitive and classified data, and leaving threatening messages, all of which was according to officials “intentional and calculated to influence and affect the US government by intimidation and coercion.” Considering that this all happened directly after the 9/11 terrorist attacks, the U.S. government took this very seriously and made aggressive moves to have him extradited to face trial there, something which could mean up to 70 years in prison for McKinnon. So far, there have been endless appeals and judicial reviews, meaning that he has yet to face these charges on American soil, and likely never will, although extradition efforts have been ongoing.
We are left to wonder just what he really found while breaking all sorts of laws. Did he really see top-secret government files pertaining to aliens and UFOs, and more importantly, did he really uncover evidence of some space force using alien technology? There have been plenty of people and so-called “whistleblowers” making similar claims, so what are we to make of this? He has not provided one shred of concrete evidence, and his detractors have pointed out that he was high on weed most of the time he was hacking, so is this all just tall tales? McKinnon is definitely in deep doo doo with the American government, but whether any of that has anything to do with aliens and UFO space programs remains to be seen.
This has only been a sampling of the many mysterious, classified documents swirling about the UFO field, and there have been many other purported documents just like them. We are left to wonder, do they really exist, and if so, just what is the extent of the secret information contained within them? We may never know for sure, their secrets locked away from the public eye, but that will never stop the conspiracies from coming, or people digging around to find the true answers. 

Strange Cases of Mysterious UFO Documents Read More »

nasa perseverance rover

Perseverance rover spots mysterious ‘visitor from outer space’ rock on Mars surface after 4 years

NEWYou can now listen to Fox News articles!
NASA’s Perseverance rover may have stumbled on a visitor from outer space – a strange, shiny rock on Mars that scientists think could be a meteorite forged in the heart of an ancient asteroid.According to a new blog post on the rover’s mission page, the rock – nicknamed “Phippsaksla” – stood out from the flat, broken terrain around it, prompting NASA scientists to take a closer look.Tests revealed high levels of iron and nickel, the same elements found in meteorites that have crashed onto both Mars and Earth.While this isn’t the first time a rover has spotted a metallic rock on Mars, it could be the first for Perseverance. Earlier missions – including Curiosity, Opportunity, and Spirit – discovered iron-nickel meteorites scattered across the Martian surface, making it all the more surprising that Perseverance hadn’t seen one until now, NASA said.MASSIVE ASTEROID BIGGER THAN A SKYSCRAPER HEADING TOWARD EARTH AT 24,000 MPH NASA’s Perseverance rover discovered a shiny metallic rock that scientists believe could be a meteorite forged in the heart of an ancient asteroid. (NASA via Getty Images)Now, just beyond the crater’s rim, the rover may have finally found one – a metallic rock perched on ancient impact-formed bedrock. If confirmed, the discovery would place Perseverance alongside the other Mars rovers that have examined fragments of cosmic visitors to the red planet.To learn more about the rock, the team aimed Perseverance’s SuperCam – an instrument that fires a laser to analyze a target’s chemical makeup – at Phippsaksla. The readings showed unusually high levels of iron and nickel, a combination NASA said strongly suggests a meteorite origin.Mounted atop the rover’s mast, SuperCam uses its laser to vaporize tiny bits of material, so sensors can detect the elements inside from several meters away.SCIENTISTS SPOT SKYSCRAPER-SIZED ASTEROID RACING THROUGH SOLAR SYSTEM The shiny rock nicknamed “Phippsaksla,” discovered by NASA’s Perseverance rover, showed high levels of iron and nickel consistent with meteorites found on Mars and Earth. (NASA)The finding is significant, NASA noted, because iron and nickel are typically found together only in meteorites formed deep within ancient asteroids – not in native Martian rocks.If confirmed, Phippsaksla would join a long list of meteorites identified by earlier missions, including Curiosity’s “Lebanon” and “Cacao” finds, as well as metallic fragments spotted by Opportunity and Spirit. NASA said each discovery has helped scientists better understand how meteorites interact with the Martian surface over time.Because Phippsaksla sits atop impact-formed bedrock outside Jezero crater, NASA scientists said its location could offer clues about how the rock formed and how it ended up there.MASSIVE COMET ZOOMING THROUGH SOLAR SYSTEM COULD BE ALIEN TECHNOLOGY, HARVARD ASTROPHYSICIST SAYS NASA scientists say the metallic rock spotted by Perseverance may be a meteorite formed deep within an ancient asteroid before crashing onto Mars. (NASA)For now, the agency said its team is continuing to study Phippsaksla’s unusual makeup to confirm whether it truly came from beyond Mars.If proven to be a meteorite, the find would mark a long-awaited milestone for Perseverance – and another reminder that even on a planet 140 million miles away, there are still surprises waiting in the dust.Perseverance, NASA’s most advanced robot to date, traveled 293 million miles to reach Mars after launching on a United Launch Alliance Atlas V rocket from Cape Canaveral Space Station in Florida on July 30, 2020. It touched down in Jezero crater on Feb. 18, 2021, where it has spent nearly four years searching for signs of ancient microbial life and exploring the planet’s surface.CLICK HERE TO DOWNLOAD THE FOX NEWS APPBuilt at NASA’s Jet Propulsion Laboratory in Pasadena, California, the $2.7 billion rover is about 10 feet long, 9 feet wide, and 7 feet tall – roughly 278 pounds heavier than its predecessor, Curiosity. Powered by a plutonium generator, Perseverance carries seven scientific instruments, a seven-foot robotic arm, and a rock drill that allows it to collect samples that could one day return to Earth. The mission will also help NASA prepare for future human exploration of Mars in the 2030s.

Perseverance rover spots mysterious ‘visitor from outer space’ rock on Mars surface after 4 years Read More »

iss073e0420732large

Celebrating 25 Years of Humanity in Space 

In 2025, NASA and its international partners celebrate 25 years of continuous human presence aboard the International Space Station. Since November 2, 2000, more than 290 people from 26 countries have lived and worked aboard the orbiting laboratory, conducting thousands of experiments that have advanced science and technology on Earth and paved the way for Artemis missions to the Moon and future journeys to Mars. 
Beyond its role as a science platform, the station has been a bridge—connecting cultures, sparking creativity, and inspiring generations. The memories of Johnson Space Center employees reflect how the orbiting laboratory is not only an engineering marvel but also a deeply human endeavor.  
Christopher Brown – Advancing Life Support Systems for Future Exploration 

As a space station Environmental Control and Life Support System (ECLSS) integrator, Christopher Brown’s role has been ensuring astronauts have clean air and water. ECLSS removes carbon dioxide from the air, supplies oxygen for breathing, and recycles wastewater—turning yesterday’s coffee into tomorrow’s coffee. Today, these systems can recover nearly 98% of the water brought to the station.  
His proudest memory was commissioning regenerative life support systems and raising a symbolic toast with the crew while on console in mission control. He also helped activate the Water Storage System, saving crew time and improving operations on station. For Brown, these milestones were vital steps toward future long-duration missions beyond Earth. 
Stephanie Sipila – The Heart of Microgravity Research  

Stephanie Sipila, now integration manager for NASA’s Extravehicular Activity and Human Surface Mobility Program, began her career as a mechanical and robotic systems instructor for the orbital outpost. Her favorite experiment, Engineered Heart Tissues, studies microgravity’s effect on the human heart to help develop new treatments for cardiovascular disease. She recalls NASA astronaut Sunita Williams running the Boston Marathon on a treadmill aboard station, becoming the first person to complete the race in space and showing how astronauts stay connected to Earth while living on orbit.  
Sipila also highlights the Spacesuit Art Project, an initiative that turned artwork from children with cancer into spacesuits flown to and worn aboard the orbital outpost during live downlinks, connecting science, art, and hope — and raising awareness of cancer research conducted aboard the orbital outpost.  
Liz Warren – Where Exploration Meets Humanity 

Space station Associate Chief Scientist Liz Warren has seen firsthand how the Spacesuit Art Project uplifted children on Earth. During Expedition 52, she watched astronaut Jack Fischer wear a suit covered in artwork created by young cancer patients, including his own daughter, a survivor. “It was incredibly touching to note the power of art and inspiration. Human spaceflight requires fortitude, resilience, and teamwork—so does fighting childhood cancer,” Warren said. 
Her memories also extend to her time as an operations lead for NASA’s Human Research Program, which uses research to develop methods to protect the health and performance of astronauts in space to prepare for long-duration missions. While out for a weekend run, Warren received a call from the Payload Operations and Integration Center in Huntsville, Alabama. An astronaut on station, following a prescribed diet for a research study, wanted to swap out a food item. Warren coordinated with her support team and relayed the decision back to orbit—all while continuing her run. The moment, she recalls, underscored the constant, real-time connection between astronauts in space and teams on the ground. 
Adam Baker – Checkmate: Space Debris Cleanup 

As an aerospace engineer, Adam Baker helped track experiments and spacecraft operations from mission control. Baker remembers when mission control played a live chess match with astronaut Greg Chamitoff during Expedition 17, a moment that showed the unique ways the station connects crews in orbit with people on Earth. His favorite technical project, though, was the RemoveDebris small satellite, deployed from the station in 2018 to test technologies for cleaning up space junk. “Knowing these experiments could one day help keep the orbital environment safe made it even more meaningful,” he said.   
Michael McFarlane – Training for Success 

As chief of the Simulation and Graphics Branch, Michael McFarlane prepared astronauts for space station assembly missions using high-fidelity simulators. “My greatest memory is seeing the station grow as we successfully executed assembly missions that looked very much like what we analyzed and trained for in our ground-based simulations,” he said. 
A Legacy of Ingenuity and Community 

In the Mission Evaluation Room, engineers not only troubleshoot in real time but also celebrate milestones with traditions like “MERloween,” where controllers dress in space-themed costumes to honor the year’s lessons learned. 

For social media consultant Mark Garcia, sharing the station story with the public has been the highlight of his career. His favorite moment was watching NASA’s SpaceX Crew-9 splash down in 2025, greeted by dolphins in the Gulf of America. “I love writing about the science aboard the station that benefits people on Earth,” he said. 
For 25 years, the International Space Station has shown what humanity can accomplish together. The lessons learned aboard will guide Artemis missions to the Moon and future journeys to Mars—ensuring the next 25 years are built on innovation, resilience, and the human spirit. 

Celebrating 25 Years of Humanity in Space  Read More »

holiday shopping

Protect your data before holiday shopping scams strike

NEWYou can now listen to Fox News articles!
The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITYSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)Why scammers love the holiday seasonNovember through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of. Phantom storesThe surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.Delivery scamsAccording to recent research, some of the most popular shopping apps like Temu are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts. Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACHReal-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information. That’s why Temu warns its users about the couriers they partner with.What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.Fake order emailsSome scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.What to do? Never click on any suspicious links and always check the sender’s contact information.Unwanted data exposureWhen you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOXHow scammers find youImagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.The “holiday cleanup” your data needsMost people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.Practical steps before you shopTo make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU1) Run a privacy scan with a data removal serviceBefore the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late. Take control by removing personal data from broker databases before you shop. (iStock)2) Secure your emailUse strong, unique passwords for each online store or service. Consider a password manager to simplify this.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Check for fake storesBefore clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.4) Avoid public Wi-FiDon’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.5) Use credit cards or PayPal – not debit cardsHACKERS TARGET ONLINE STORES WITH NEW ATTACKCredit cards have stronger fraud protection and make it easier to dispute unauthorized charges.6) Enable two-factor authentication (2FA)Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.7) Keep your software and apps updatedCybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.8) Monitor your bank and credit statementsCheck your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.Kurt’s key takeawaysBlack Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.CLICK HERE TO DOWNLOAD THE FOX NEWS APPHow confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.  

Protect your data before holiday shopping scams strike Read More »

Popular TP-Link routers could be banned after risks exposed

NEWYou can now listen to Fox News articles!
A major national security debate is unfolding, and it affects more than government networks. It touches your home, your devices, and the Wi-Fi your family uses every day. The Commerce Department has proposed blocking new sales of TP-Link products after a months-long review into the company’s ties to China, citing a growing TP-Link security risk.Multiple agencies, including Homeland Security and Defense, supported that proposal. They believe the company’s connections could expose American networks to foreign influence.Security experts warn that foreign-backed hackers have targeted home and office routers for years. These devices often act as silent stepping stones that help attackers move deeper into sensitive systems. When compromised, they can expose everything connected to them, including computers, smart home gear, military devices used on base and more.This potential ban would be one of the biggest consumer tech actions in U.S. history. It comes as lawmakers raise fresh alarms about Chinese-made cameras, routers and connected home products sold on military exchanges and in homes across the country.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.CHINESE HACKERS BREACH US NUCLEAR SECURITY AGENCY IN CYBERATTACK OPERATION, OFFICIALS SAY The proposed TP-Link ban stems from growing concerns that foreign-linked routers and cameras could expose American homes and networks to outside influence. (Kurt “CyberGuy” Knutsson)Why military families are even more vulnerableLawmakers from both parties say military households face extra risk. Sen. Joni Ernst (R-Iowa), who leads a bipartisan group of 23 lawmakers, warns that TP-Link cameras and networking devices sold on Army, Navy and Air Force exchange sites could expose sensitive footage from base housing and dorms. Rep. Ashley Hinson (R-Iowa) echoed that concern, saying these devices could act as a backdoor for Chinese intelligence to collect information on service members and their families. Even when products appear out of stock, officials worry they remain popular in military communities.These lawmakers say Chinese laws could force companies to share data or push hidden software changes that weaken U.S. networks. They argue that this creates a real risk for households on or near military installations. While TP-Link disputes every allegation and states that it stores U.S. data inside America, lawmakers want a deeper investigation.”China will use any way to infiltrate us, and we must ensure they cannot access our homeland or military bases,” said Ernst. “High-tech security cameras sending video and audio directly back to Beijing must be treated like the grave threat that they are. We have seen this playbook from China before, with Huawei Technologies, and need the Trump administration to investigate and determine if TP-Link is a trojan horse compromising our national security.”10M AMERICANS HIT IN GOVERNMENT CONTRACTOR DATA BREACHHow Congress is responding to TP-Link security risksSen. Ernst is pressing the Commerce Department to finish its investigation by November 30. Sen. Tom Cotton (R-Arkansas), who chairs the Senate Intelligence Committee, says TP-Link could give the Chinese government access to American networks and wants faster action. Their concerns reflect past decisions involving Huawei and Kaspersky, which lost access to the U.S. market due to national security risks.Congressional leaders say foreign-made smart home devices sold on military bases should face strict scrutiny. They see routers, cameras and other connected home gear as critical targets in a time when cyberthreats continue to grow.We reached out to TP-Link Systems Inc., and a spokesperson provided CyberGuy with the following statement:”TP-Link Systems Inc. (TP-Link), an American company based in California, refutes the claims in this letter. This letter repeats false and misleading media reports and attacks that have been thoroughly debunked.””TP-Link emphatically objects to any allegation it is tied to the Communist Party of China, dependent on the Chinese government, or otherwise subject to interference under Chinese national security laws,” the TP-Link spokesperson said. “The company is not controlled by any government, foreign or domestic. TP-Link has split from and has no affiliation with the China-based TP-LINK Technologies Co. Ltd., which is separately owned and operated. Lawmakers warn that TP-Link devices sold on military bases may put service members and their families at greater risk, especially inside base housing. (John Moore/Getty Images)This letter has nothing to do with security and everything to do with a competitor trying to remove TP-Link Systems’ products from the marketplace. The “open source information” the members reference is actually a manufactured echo chamber of false and misleading attacks that the media has parroted over the past year. Instead of directly engaging with TP-Link Systems, these members essentially pressed “copy and paste” on unsubstantiated claims about our American company.TP-Link has not been contacted by policymakers to discuss the alleged concerns, but if we were to meet with them, they would learn that TP-Link has located its core security functions and data infrastructure in the United States. U.S. user data is securely stored on Amazon Web Services infrastructure in Virginia, under the full control of the company’s U.S. operations.TP-Link Systems currently holds a very small share of the U.S. security camera market, representing approximately 3% of the consumer market segment according to Circana checkout data. The company has virtually no business presence in the enterprise segment. Additionally, TP-Link Systems’ router market share in the U.S. has been inaccurately reported as being much higher than it actually is. Recent market research from Dell’Oro Group, Inc., found that TP-Link Systems’ market share of residential Wi-Fi router sales in North America is under 10%.TP-Link does not enable foreign surveillance of U.S. networks or users. The company’s operations are built to prevent potential attempts to subvert its business by outside influence. TP-Link’s substantial security investments cover its entire product portfolio, including security cameras and routers.TP-Link continually monitors its products and services and takes timely and appropriate action to address vulnerabilities it becomes aware of. TP-Link has not identified any reliable information regarding new vulnerabilities in its products in connection with this letter.”FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOWSteps to protect yourself from this growing threatEven as the debate continues, you can take simple steps to secure your home. These easy moves help defend against threats tied to any router brand.1) Check your router and update itLook at the brand on your router. Then update the firmware through the official app or web dashboard. If your device is several years old or no longer supported, replace it. Check out our article on the top routers for the best security at Cyberguy.com.2) Change your Wi-Fi and admin passwordsDefault passwords are dangerous. Create strong, unique passwords for both your Wi-Fi and the router’s admin panel. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 atCyberguy.com Congress is pressing for a fast investigation amid fears that foreign-made smart home gear could become a gateway for cyberthreats across the country. (Cyberguy.com)3) Use strong antivirus protection on every deviceThreats like this continue to grow. Install strong, real-time antivirus protection on every computer, phone, and tablet in your home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.4) Turn off any of these features you do not needDisable remote access, WPS and extra features you never use. These settings can open doors for attackers.5) Put smart home devices on a guest networkKeep laptops and phones on your main network. Put cameras, plugs, TVs and IoT devices on a separate guest network so they cannot reach your sensitive devices.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThe debate around TP-Link shows how something as routine as a home router can become part of a broader security conversation. Whether or not the government issues a ban, this moment is a clear reminder that cybersecurity starts at home. Small steps make a meaningful difference in how well your devices stand up against foreign-backed hacking groups.Should the government ban router brands linked to foreign influence or should consumers decide for themselves? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Popular TP-Link routers could be banned after risks exposed Read More »