It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: mirageman
a reply to: IsaacKoi
1) What were your motivations for pursuing and seeking the identities of people potentially involved in illegally removing and leaking US military files. Especially when investigations seem to have taken place in 2007, 2009 and 2016?
2) Have the US authorities (or any other interested parties) been in contact regarding your pursuit of these persons?
originally posted by: mirageman
a reply to: IsaacKoi
I and everyone else can see how that your response avoids answering the questions posed. I think they are very valid questions too.
1) What were your motivations for pursuing and seeking the identities of people potentially involved in illegally removing and leaking US military files. Especially when investigations seem to have taken place in 2007, 2009 and 2016?
2) Have the US authorities (or any other interested parties) been in contact regarding your pursuit of these persons?
originally posted by: spiritualarchitect
a reply to: mirageman
What are YOUR motivations for pursuing and seeking the identities of people potentially involved in illegally removing and leaking US military files?
Do you want to punish them for leaking a UFO to the public?
Or do you want to reward them for leaking a UFO to the public?
What are YOUR motivations for pursuing and seeking the identities of people potentially involved in illegally removing and leaking US military files?
Do you want to punish them for leaking a UFO to the public?
Or do you want to reward them for leaking a UFO to the public?
originally posted by: PHDIKOULAS
a reply to: pigsy2400
.... Mcmillan instead of tweeting why dont you answer straight to what was said?
originally posted by: mirageman
If someone advertises the fact that they are pursuing persons leaking potentially sensitive information then you would expect the US authorities to contact said person.
If they haven't then it suggests something else is afoot.
If someone advertises the fact that they are pursuing persons leaking potentially sensitive information then you would expect the US authorities to contact said person.
If they haven't then it suggests something else is afoot.
A German UFO researcher has kindly agreed to call the two telephone numbers I have for two people in Germany with the same name as Cometa. Fingers crossed.
Also, in another positive development, it appears that the Powerpoint presentation in relation to Nimitz incident(s) may _not_ only have been held by Cometa (and TheFinalTheory). It turns out that Cometa arranged to share some of the material with at least one other member of ATS, SeenTooMuch. SeenTooMuch has kindly answered a number of questions from me during the last week and SeenTooMuch has confirmed that a doc file and a Powerpoint file were included in material that Cometa shared. Unfortunately, SeenTooMuch has not retained either file and was not able to open the Powerpoint file, despite seeking some help from engineer friends. But this suggests that some others involved with me, SeenTooMuch, Cometa and TheFinalTheory in the discussion in 2007 may have at least the Powerpoint file - if not the longer version of the Nimitz video reported by TheFinalTheory. (SeenTooMuch does not recall any other version of the video being included in the material that Cometa shared in 2007).
So, I remain optimistic (particularly if TFTR responds to the questions I posed last week, in this thread and on Facebook) that it may be possible to obtain the longer version of the video and/or the Powerpoint presentation (i.e. UFO 5 Anomaly brief.ppt).
www.abovetopsecret.com...
If they haven't then it suggests something else is afoot.