windowsvista.club
windowsvista.club
A 🧵
Sen. Chuck Schumer (D-NY), the Senate minority leader, on July 29, 2025, filed the "Unidentified Anomalous Phenomena Disclosure Act of 2025" (UAPDA) as a proposed amendment (SA 3111) to the FY 2026 National Defense Authorization Act (NDAA, S. 2296).
A 🧵
Sen. Chuck Schumer (D-NY), the Senate minority leader, on July 29, 2025, filed the "Unidentified Anomalous Phenomena Disclosure Act of 2025" (UAPDA) as a proposed amendment (SA 3111) to the FY 2026 National Defense Authorization Act (NDAA, S. 2296).
irp.fas.org/congress/199...
irp.fas.org/congress/199...
en.wikipedia.org/wiki/Mathew_...
en.wikipedia.org/wiki/Mathew_...
medium.com/on-the-trail...
medium.com/on-the-trail...
www.independent.co.uk/news/court-f...
www.independent.co.uk/news/court-f...
“2d Briton Is Charged in Computer Spying,” New York Times, June 24, 1996, p. A9;
“2d Briton Is Charged in Computer Spying,” New York Times, June 24, 1996, p. A9;
Today in UFO History - UFO Hacker Mathew Bevan
June 21, 1996 —
1/British hacker Mathew Bevan is arrested in connection with hacking into sensitive USAF, NASA, and NATO data facilities.
Today in UFO History - UFO Hacker Mathew Bevan
June 21, 1996 —
1/British hacker Mathew Bevan is arrested in connection with hacking into sensitive USAF, NASA, and NATO data facilities.
I will release the info I have at that time also. Thank you for the support.
From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
I will release the info I have at that time also. Thank you for the support.
From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
Can cybersecurity tactics unlock UAP secrets? Senior Security Engineer Thom Hastings joins us to explore the intersection of hacking, data analysis & UAP.
www.youtube.com/watch?v=q_ib...
Can cybersecurity tactics unlock UAP secrets? Senior Security Engineer Thom Hastings joins us to explore the intersection of hacking, data analysis & UAP.
www.youtube.com/watch?v=q_ib...
Can cybersecurity tactics unlock UAP secrets? Senior Security Engineer Thom Hastings joins us to explore the intersection of hacking, data analysis & UAP.
www.youtube.com/watch?v=q_ib...
Can cybersecurity tactics unlock UAP secrets? Senior Security Engineer Thom Hastings joins us to explore the intersection of hacking, data analysis & UAP.
www.youtube.com/watch?v=q_ib...
#pugetmesh #meshtastic #emcomm #lora #ham
#pugetmesh #meshtastic #emcomm #lora #ham
@tinyklaus.com and @libertybirb.bsky.social explore the implications of the scalar technologies discussed by Hal Puthoff in a recent episode of a podcast affiliated with NASA.
Apple: podcasts.apple.com/us/podcast/s...
Spotify: open.spotify.com/episode/3Rzg...
#ufosky #ufos #ufo
@tinyklaus.com and @libertybirb.bsky.social explore the implications of the scalar technologies discussed by Hal Puthoff in a recent episode of a podcast affiliated with NASA.
Apple: podcasts.apple.com/us/podcast/s...
Spotify: open.spotify.com/episode/3Rzg...
#ufosky #ufos #ufo