Breakthrough UFO Photo Revealed: Closure for Abductee at Last
Nathan, the host of the Strange Mysteries channel, recently released “UPDATE #4: ‘I Received a Creepy E-mail w/ Leaked UFO Footage,'” as part of his ongoing investigation into a series of anonymous emails containing alleged leaked UFO footage. This video directly follows his earlier coverage, including the article titled “Whistleblower Answers Questions and Shares New UFO Photos“, where a whistleblower provided previously unseen UFO images and details. In the latest update, Nathan examines additional photographs provided by the same anonymous source, expanding on the earlier claims and discussing their potential implications.
This is a continuation of the questions that were compiled and presented by Nathan, while the answers were provided by the whistleblower.
- Given the nature of the phenomena and your experience with it, which do you believe is more likely? That the entities are benevolent, malevolent, or indifferent towards us? What do you believe their motives may be?
Indifferent, unclear for now. Their behavior doesn’t suggest overt hostility, but their technological superiority means that if that stance shifts, the consequences would be catastrophic. The motives of these entities remain unclear, ranging from simple observation and data collection to potential reconnaissance for future strategic actions.
- I have been asked to “re-draw” the images you asked me to blur out. I responded by saying I’d need permission first. My drawings would be rather elementary, and I’d pass them by you first before showing them. Would you be comfortable with this? If not, I understand.
No. Even simplified recreations can compromise operational security. Nathan has been more than respectful by following my wishes, and I deeply appreciate that. His integrity should be respected. If he were to backtrack now, what would that say about his character? Maybe the government does want certain things released to lay the groundwork for transparency, but you can’t push too far without provoking consequences.
- How much does the program know about these entities, no need to go into any specifics, but is their origin and purpose known? Or are there just theories?
The legacy program operates like a series of nested Matryoshka dolls, with each layer concealing the next, built on a strict “need-to-know” basis. Even within the program, personnel are compartmentalized to the point that many remain unaware of the full scope or details of its operations. Some suggest interdimensional origins, while others lean toward off-world factions. Might need to go further upstairs.
- Why do you believe there appear to be so many different types of UAPs?…regarding shapes etc. Just a difference in functionality or perhaps different factions?
Functionality appears to be the driving factor. Orbs seem specifically designed for ISR (Intelligence, Surveillance, and Reconnaissance) missions, while Cruciform-Class entities are built for high-energy tactical engagements. There’s credible speculation that these different forms may represent distinct factions or entities, each with its own technology and objectives. One incident stands out: a Cruciform-Class entity was observed pursuing a different class of UAP at extremely high speeds, displaying behavior that I can only describe as highly aggressive. They remind me of orcas in the way they operate, and to be honest, they’re downright unsettling. (See attachment)
Even the seemingly passive orbs, which primarily gather data, tend to assert dominance subtly. Pilots frequently report an overwhelming sensation of being watched on their return flights, often without these entities appearing on radar or sensor systems.
Imagine you’re flying in pitch-black conditions, relying solely on your targeting systems and avionics, yet you visually spot one of these objects shadowing you at a distance. It doesn’t display aggression, but the implication is clear—it could easily bypass every defensive system on your $100M aircraft and render it obsolete in moments. That presence alone is enough to remind our pilots just how far beyond us these entities truly are.
- When do you think open contact will occur?…If it will ever occur?
Safe to say based on observations, if… when it happens, it will be on their terms, not ours.
- Did the sender crop the images to make the UAP all the same size in the images? Or is there a way to gauge the size in the redacted data?
The cropping was deliberate to ensure consistency. However, size estimates are possible using telemetry and radar data, which were included in the redacted metadata.
- Can he/she describe in detail the physical characteristics, behavior, and origin of the beings associated with these UAPs, and how their technology fundamentally differs from anything on Earth?
🙂
- Have you had any personal 1st hand experience with extraterrestrials or UAPs?
Yes, I have. It was during my tenure within ISR operations under USINDOPACOM. One particular case involved an object detected at high altitude, displaying erratic, non-ballistic flight patterns that defied conventional understanding of physics. Despite the use of state-of-the-art sensors, data collection was hindered by the object’s counter-surveillance measures.
- If non-human intelligence were already embedded within our society, what would be the first signs the public might notice?
🙂
- How does the technology studied in UAP programs compare to the most advanced technologies we see emerging in the private sector?
UAPs operate beyond TRL-9, suggesting technology at least centuries ahead. Even the most advanced private-sector technologies, like those emerging from DARPA or Skunk Works, don’t approach the capabilities observed in these crafts.
- Have you worked with any of the public figures in regards to UAPs? Like any of the whistleblowers that are known?
Nope.
- Is the legacy programme strictly concerned with the current situation and is their aim strictly to increase current capabilities to counter the threat?
Primarily, yes. The main aim is to understand, monitor, and respond to potential threats posed by UAPs. However, there are elements within the program that see the potential for scientific and technological advancements if a clear threat is not evident. This dual-purpose approach allows for the integration of R&D initiatives focused on applying new findings to defense and technology.
- Would you be able to tell me what the original resolution of the images were (or just a few of them)?
Depends on what ISR platform the images were taken with. Hell, even the infamous Tic Tac video looks low-res. As platforms approach UAPs, systems often experience failure. Targeting pods and sensors go haywire due to radiation or whatever counter-surveillance capabilities these objects have. ISR platforms are forced to keep their distance, and we’re lucky to capture anything at all. Occasionally, there’s an opportunity for close-up footage, but that proximity comes with risks; these objects can become very aggressive.
- Are UAPs a threat?
Potentially. Their capabilities suggest that, if hostile, they could bypass all known defenses. However, no direct aggression has been observed on a large scale.
I understand that some may be frustrated if this is my final communication, expecting me to release everything at once. However, as I’ve mentioned before, I rushed into the decision to become a whistleblower and have since realized the need to prioritize a secure and peaceful future. I’d rather live comfortably than risk everything. Perhaps our paths will cross again someday, only time will tell.
To any future whistleblowers watching, I encourage you to reach out to Nathan. He’s proven his integrity, and his community offers strong support, exactly what you need in this process.
Previously, the “Confidential IR Picture Set of UAPs from the Legacy Program” discusses a whistleblower’s disclosure of infrared images depicting unidentified aerial phenomena (UAPs), including “orbs” and “motherships,” allegedly surveilling sensitive sites like nuclear deterrent bases. These images were shared with the Strange Mysteries YouTube channel, accompanied by claims of a covert program named “Immaculate Constellation.”
Previously, the “Official Pentagon Report on Immaculate Constellation” article details a 12-page document introduced into the Congressional Record by Rep. Nancy Mace during a session titled “UAP – Exposing the Truth.” This report outlines an unacknowledged Special Access Program, “Immaculate Constellation,” allegedly initiated in 2017 to consolidate and analyze UAP data across the Department of Defense and the Intelligence Community. The program reportedly includes high-quality imagery and intelligence on UAPs. Written witness testimony was also provided.
The whistleblower’s release, aiming to provide tangible photographic evidence of UAPs and to substantiate claims about the “Immaculate Constellation” program. This aligns with the information in the official Pentagon report, which discusses the program’s role in collecting and analyzing UAP data. The hearing where the 12-page report was released serves as a platform to bring these covert activities to public attention, with the disclosed images and accompanying Q&A offering specific examples of the phenomena under investigation. The official 12-page report on Immaculate Constellation entered into the Congressional Record is missing its first page, commonly referred to as the ‘12th page.’