Shadows in the Sky: Unidentified Drones and the New Jersey Mystery

Shadows in the Sky: Unidentified Drones and the New Jersey Mystery

Since mid-November 2024, a wave of mysterious drone sightings across New Jersey has sparked concern among residents and officials.  As no clear answer emerged, we propose a breaking down of the main hypothesis.

How to Profile the Unknown? A Breaking Down of the Hypothesis for an Aeronautical Theatrical Play

An Unexplained Public Phenomenon

Since mid-November 2024, a wave of mysterious drone sightings across New Jersey has sparked concern among residents and officials. 

The scenario is unsettling: these drones are flying over strategic areas for hours, with no apparent intervention from authorities. Their behavior appears deliberate, almost "theatrical," with intentional visibility through navigation lights. This display contrasts sharply with expectations for military or spy drones, which would normally seek to remain discreet. These events occur as the US Congress conducts an intense debate on Unidentified Anomalous Phenomena (UAP), following sworn testimony from former military officials claiming the existence of classified programs related to these phenomena.

These sightings, often involving multiple drones flying in formations at night, have been reported near residential areas, critical infrastructure, and even sensitive locations like the Picatinny Arsenal2, a military research facility, and former President Donald Trump's golf course in Bedminster3. This unusual activity has prompted investigations by local and federal agencies, including the FBI and the Department of Homeland Security (DHS), to determine the nature and origin of these drones4.

You can download the pdf version of this document for a more readable format.

The Phenomenon and Its Impact

The first reports of drone activity emerged on November 18th from Morris County in northwestern New Jersey. Local law enforcement responded to these reports, noting the growing concern on social media but initially stating there was no known threat to public safety5. A New Jersey county sheriff's office even released a heat map to illustrate the spread of these  sightings6. However, as sightings continued and spread across the state, including coastal areas and near military installations, public anxiety grew.

A Public Spectacle: Drone Activity and Characteristics 

The drones have become a nightly spectacle, with sightings occurring primarily after sunset and lasting into the early morning hours. 

While most sightings occur between sundown and 11 p.m., there is evidence suggesting they might be operating outside these hours as well, potentially employing tactics to avoid detection7. Furthermore, there have been reports of these drones following a Coast Guard lifeboat off the Jersey Shore8.

Witnesses have provided varying descriptions of the drones, further deepens the mystery. Some reports describe them as "the size of a small SUV," significantly larger than typical consumer drones9. Others described them as "large and loud," with unusual flight patterns and maneuvers not characteristic of conventional aircraft4. In one instance, a "hobby or toy type drone" crashed into the backyard of a home in Pequannock Township10

Public and Official Reactions

These diverse observations have fueled speculation about the drones' purpose and origin. Some theories suggest potential involvement in surveillance, smuggling, or even foreign interference7. Congressman Jeff Van Drew, citing sources, proposed that the drones might be launched from an Iranian "mothership" stationed off the coast, a claim later denied by the Pentagon11.

Public reaction to the drone sightings has been a mix of curiosity, concern, and frustration. Some residents expressed frustration with the lack of clear answers from authorities and even threatened to take matters into their own hands by shooting down the drones12. Adding to the concern, there were reports of drones malfunctioning, with one incident in Morris County where a drone "fell out of the sky."3

Social media platforms have been abuzz with discussions and speculation, with some residents expressing anxiety about the lack of clear answers from authorities. Some have even threatened to take matters into their own hands by shooting down the drones. This public unease has prompted local law enforcement to increase patrols and issue statements assuring residents that they are monitoring the situation.

Official Investigations and Statements

The FBI, working with New Jersey State Police and local law enforcement, initiated an investigation into the drone sightings. They received over 3,000 tips from the public and analyzed available imagery and electronic data2. However, the FBI stated that they were unable to corroborate any of the visual sightings with electronic detection, adding another layer of complexity to the investigation6. The Department of Homeland Security also joined the effort, briefing state and local officials on the situation. However, these briefings reportedly left many officials with more questions than answers, leading to calls for greater transparency and federal support. Senators from New Jersey and New York even sent a letter to the FBI, DHS, and FAA requesting a formal briefing on the sightings.

Adding to the investigative possibilities, Senator Richard Blumenthal highlighted that the drones would likely leave a radio frequency footprint that could be used to trace their origin. He also suggested that they should be shot down if necessary, moreover if they fly over sensitive sites.

On December 16th, 2024, the DHS, FBI, FAA & DoD issued a joint statement addressing the drone sightings14. They stated that, based on their investigation, there was no evidence of a national security or public safety threat or any foreign involvement. They also noted that many reported sightings appeared to be misidentified manned aircraft operating legally.

Exploring the Possible Explanations 

The abundance of unanswered questions is striking: why does the DoD, equipped with advanced technology, seem unable to intercept these drones? The first move, in every advanced country would be to launch an Aircraft or even a Drone to Intercept and get information about the intruders. Do they represent a threat to national security, an internal military operation, or a signal of non-human origin?

Despite technological familiarity, the repeated sightings of drones with unconventional behaviors continue to challenge our frameworks for Understanding Aerial Phenomena,

An Unidentified Drone is just another UAP.

In an attempt to, if not solve, at least frame this mystery, I propose we evaluate several hypotheses, through their arguments “against” and “for” which will be examined in detail, following a methodology similar to that used by GEIPAN15. The GEIPAN is a French government body under CNES (the French Space Agency) tasked with investigating and analyzing reports of Unidentified Aerospace Phenomena (UAP). 

It is crucial to consider all available evidence and perspectives before reaching a conclusion. Further investigation and information are needed to provide a definitive answer to this intriguing question.


Hyp. 1. Drones of US Military Origin: Tests, Training, or Deception? 

One of the leading hypothesis suggests that the drones may be part of a clandestine US military operation. This theory is supported by the advanced characteristics of the drones, including their extended flight times, precise maneuvers, and apparent resilience to adverse weather conditions. These capabilities, some argue, point to technology not readily available on the commercial market, suggesting a military or government origin.

Potential Military Objectives

If the US military were involved, potential motivations could include testing new technologies, assessing vulnerabilities, or gathering intelligence. 

Several potential military objectives could explain the drone activity if the US military were involved:

  • Training exercises : the US military might be using these drones to test new technologies or evaluate the effectiveness of existing counter-drone measures. The overflights near military installations could be part of these exercises16. The overflights could be simulated scenarios designed to evaluate defense capabilities against drone incursions. This would allow the military to identify vulnerabilities in security systems and refine protocols for protecting critical infrastructure. The drones could be used for training, to collect information on specific targets or activities in the area, potentially related to national security concerns17.
    • Surveillance and reconnaissance: the drones could be deployed for surveillance purposes, gathering intelligence on potential threats or monitoring activities in and around sensitive areas.
    • Assessing vulnerabilities: as a collateral of the previous, the drones could be used to assess the vulnerabilities of critical infrastructure and military installations to drone intrusions18.
    • Developing counter-drone strategies: the overflights could be part of an effort to develop and test new counter-drone technologies and strategies in response to the growing threat of drone technology.
  • Intentional deception: the drones could be a deliberate attempt to create confusion and distract from other activities. By leaving their origin ambiguous, the military could be testing the public's and the media's response to Unidentified Anomalous Phenomena, potentially laying the groundwork for future operations or narratives.

However, any of these aims and actions carry potential risks, including public safety concerns, privacy violations, and national security implications.

Table of Arguments for Hypothesis 1

The following table presents an evaluation of arguments related to a hypothesis. Each argument is scored on a scale from +1, indicating perfect alignment with the hypothesis, to -1, indicating complete contradiction. The lowest score within an argument highlights the weakest aspect of the argument and determines the overall evaluation. This methodology will be consistently applied to all argument tables.

Criteria or ElementArguments ForArguments AgainstScore
[-1, +1]
Access to Technology with Advanced CapabilitiesThe drones' capabilities, such as their size (>2 meters), flight patterns, and ability to avoid detection, may suggest military-grade technology19
Advanced drone technology is becoming increasingly accessible to non-military entities, including private companies and research institutions.0.95
Proximity to Sensitive or Strategic sitesDrones spotted near sensitive sites could indicate military testing or surveillance. Otherwise they are coming from the sea where the military could have naval support20.Military installations are potential targets for various actors, not just the US military. For example, foreign intelligence agencies or criminal organizations could be involved.  0.50
Public PerceptionThis protocol of Military action raises concerns about transparency and accountability, potentially damaging public trust and leading to questions about government oversight of drone operations.-0.10
Official Denials or minimizationIt is a perfectly normal defense to deny and minimize. This posture aligns with "plausible deniability": by maintaining a posture of denial, even if involvement exists, the military protects the confidentiality of sensitive programs and prevents the disclosure of technical or strategic informationIn a  mirror situation, the argument “For” is also an argument “Against”, The Pentagon has explicitly denied involvement in the drone activity, stating that the aircraft are not US military drones21. The lack of transparency and concrete evidence has led to public speculation, highlighting the challenges of addressing such phenomena.0.00
Lack of TransparencyThe reluctance to provide detailed information about the drones and their origin fuels suspicion and speculation. The focus on minimizing public concern could be seen as an attempt to downplay the significance of the events. The military may be withholding information to avoid compromising the investigation or to prevent public panic. Sharing sensitive details could also alert the perpetrators and hinder efforts to apprehend them.0.25
Apparent lack of will to Intercept, Reduction of InformationThe lack of will to intercept aligns with a deliberate strategy to preserve secrecy, maintain plausible deniability, and avoid compromising classified operations. It allows the military to continue their objectives (protect the narrative) without drawing unnecessary attention or prematurely ending the operation.The military's strategy of observation and information gathering, instead of immediate interception, suggests a coherent approach to understanding the drones' nature. The military follows stricts protocols to secure airspace: they cannot shot down aircrafts which represent no danger above civilians. Inaction risks eroding public trust and fueling conspiracy theories about their ability to secure airspace.+0.20

While the US military has denied involvement, speculation persists due to the drones' proximity to military installations, their sophisticated capabilities, and the lack of a clear explanation. The timing of these events, coinciding with the upcoming presidential election, adds another layer of complexity.

In this hypothesis, the weakest aspect is that his situation draws attention to the advanced technologies associated with Special Access Programs within the Department of Defense, which are currently under scrutiny by legislators as part of a broader effort to gain access to UAP data. In the current political environment, where the US Congress is demanding increased transparency regarding classified programs, such an operation would entail significant political risks for the Department of Defense.

Hypothesis value (from 0 to 1) : 0.45 → Not really Acceptable (almost).


Hyp. 2. Attention-Seeking Individuals: A Viral Phenomenon

While some incidents may be attributed to hobbyists unaware of airspace restrictions22, the possibility of coordinated efforts by private individuals to gain attention or disrupt operations cannot be ignored. It is based on the idea of a coordinated effort to draw media and public attention. 

According to drone expert Mike Innella and Hayley Connelly23, the initial drone sightings may have inspired copycats, leading to a wave of similar activity.

These initiatives could aim to provoke a reaction from the U.S. government on sensitive issues such as critical infrastructure security or ongoing legislation on Unidentified Anomalous Phenomena (UAP). 

This drone activity could also be intended to exploit public and media gullibility, orchestrated by those seeking attention or aiming to make a statement. The accessibility of advanced commercial drones has enabled individuals to carry out complex aerial operations. As an example, In November 2021, French comedian Rémi Gaillard staged a UFO hoax using a drone equipped with special lights over the Occitanie region in France24. During several nights, residents of several cities of the same region, observed and filmed the strange lights, sparking media and social media speculation. The hoax even made it to the national TV journal, triggering a national sensation. Gaillard later revealed the UFOs were a prank, highlighting the ease with which public opinion and media can be manipulated. Gaillard's hoax cleverly exposed how easily misinformation can spread in the digital age, particularly when it taps into existing anxieties and beliefs about the unknown25.

Adding another layer to the analysis, a former FBI supervisory special agent, Tom Adams, who helped establish the FBI's counter-drone program, suggests that these drones might be part of organized criminal activity, potentially used for smuggling contraband26. However, this idea is dismissed due to the patterns being too broadly visible.

In resume, several motivations could be driving these individuals:

  • Highlighting security flaws: they may be attempting to expose vulnerabilities in the security of sensitive sites, criticizing the perceived ineffectiveness of defense systems.
  • Pressuring the government on UAPs: the drone activity could be a direct response to the ongoing debate on Unidentified Anomalous Phenomena, seeking to force the government to take a more transparent stance on the issue.
  • Creating a viral phenomenon: the goal could simply be to generate a viral sensation, exploiting public fascination with drones and unexplained events.

Table of Arguments for Hypothesis 2 

Criteria or ElementArguments ForArguments AgainstScore
[-1, +1]
Access to Technology with Advanced CapabilitiesThe accessibility of advanced commercial drones has increased significantly, empowering individuals with sophisticated aerial capabilities27, enabling motivated groups or individuals to conduct sophisticated overflights. These drones boast features like high-definition cameras, thermal imaging, and extended flight ranges28

Some models can even operate beyond visual line of sight (BVLOS)29 and withstand challenging weather. This raises concerns about potential misuse, especially regarding overflights of sensitive areas. Notably, even small, relatively inexpensive drones can possess significant range and payload capabilities, amplifying the potential threat posed by readily available technology30.

A large-scale experiment coordinated by affluent individuals could be a possible explanation.
The drones observed in incidents like those in New Jersey exceed commercial capabilities in size, endurance, and flight patterns. Industrial or military drones seem more likely due to their advanced features.

Large dimensions: witnesses reported objects significantly larger than typical drones, with wingspans estimated at 2-3 meters, aligning more with industrial or military drones.

Prolonged autonomy: the drones were observed flying for several hours, far exceeding the standard 30-40 minute range of commercial drones.

Weather resistance: overflights occurred under harsh weather conditions, including strong winds and rain, ruling out most amateur drones.

Precise and coordinated flight patterns: the drones appeared to execute carefully programmed trajectories, indicating advanced navigation and control systems typically inaccessible to the general public.
-0.25
Logistical FeasibilityIndividuals with strong motivations can orchestrate such flights. Greenpeace, for instance, has been accused multiple times of flying drones over nuclear plants. In 2018, the organization deliberately crashed a drone into a French nuclear power facility to highlight a security flaw31.Coordinating multiple overflights over an extended period, especially in sensitive and surveilled areas, requires advanced organization and significant technical resources. Here the extent (on many weeks) and importance of the demonstrations, sometimes with more than 50 drones together exceeds the capacity of amateur groups.   -0.20
Motivations (1) Ideological Pressure on the Government Regarding UAP: These overflights might directly respond to actual  legislative debates on UAP, aiming to force authorities to take a clearer stance or act more transparently.Exposing Security Flaws: Overflights could also aim to reveal vulnerabilities in sensitive infrastructure, serving as a critique of ineffective defense systems or as a warning about risks posed by potential foreign threats.+0.90
Motivations (2)* Hoaxing(Media and Public Manipulation)History offers examples of hoaxes that have successfully deceived uninformed populations. In this case, the goal could simply be to generate a viral event, leveraging the public’s fascination with drones and UAP. These actions could exploit public curiosity and the amplifying power of social media.  The media attention generated by these overflights creates a buzz, amplifying their implicit or explicit claims. Social networks intensify these events, enabling rapid coordination and aggregation of unrelated observations ("false positives").+0.90
Protocol Create a viral effect by this way Regarding significant media noise surrounding the New Jersey drone sightings it is a true success. It fosters a snowball effect, amplifying the events amidst heightened public anxiety and confusion. Misidentifications of airplanes, helicopters, or other conventional objects are increasingly merged into the narrative, further inflating the phenomenon.The chosen thematic is fantastic and evocative, inspiring not just fear and concern, but also a sense of fascination. The drones are intentionally made to be seen, turning the skies into a nightly spectacle—a light festival where their navigation lights are fully illuminated, drawing attention and awe.Witness confusion acts as a catalyst, drawing additional focus and creating a disproportionate sense of extraordinary activity. This is further magnified by media amplification and the viral nature of social media, which function like a socio-psychological contagion, spreading the narrative rapidly and uncontrollably.For any group seeking visibility or public attention, such an environment provides an ideal platform to achieve their objectives. By exploiting public curiosity and the media’s appetite for sensational stories, these groups can effectively insert themselves into the spotlight with minimal effort, leveraging this self-sustaining cycle of attention like a socio-psychological virus.The visibility of drones may lead witnesses to immediately conclude that they are just hobbyist or commercial drones, limiting the "unknown" factor necessary for viral spread.
Their identifiable nature will limit the extent to which the rumor becomes self-sustaining, as rational explanations may emerge quickly: professionals, authorities, and investigators will be quick to promote their own theories or opinions.
0.75
Legal risks Proximity to Sensitive or Strategic sitesFlying near military or nuclear facilities entails significant legal risks, deterring most private individuals. Potential consequences include severe penalties and equipment confiscation.0.75
Absence of revendication of the authors If we can convey that a “mass hysteria” is occurring, then most of the testimonies will be unrelated and due to misidentifications. So you will not have an airplane pilot who will tell you: “Hey that’s me!
Same for a hobbyist who will - for the fun - join the party, making a growing socio-psychological phenomena inflating but will cautiously remain anonymous because of the risk of legal consequences.
Finally, finding authors depends notably on the efforts made by the authorities to catch them. So it is symmetrical to the involvement of the justice to apply the law.
The fact that there is a mass hysteria connected to an objective phenomena is a point, but it does not tell us anything about the authors: the fact that authorities have not neutralized any author is disturbing.The FBI stated that they were unable to corroborate any of the visual sightings with electronic detection, adding another layer of complexity to the investigation6Advanced surveillance systems would have likely detected and intercepted such unauthorized activity. It is not the first time that no authors were catched during a similar “Wave of Drones”, like in the past in other countries, and that’s the most disturbing (see chap. VI) As time passes without any evidence of private involvement, this explanation becomes less and less credible.-0.15
Using commercial drones**Shape : in some cases, objects initially reported as drones were later identified as planes, indicating potential misidentification of shapes. Also, drones with custom designs (e.g., hobbyist modifications) could account for unique shapes.Shape : witnesses consistently report unusual shapes (e.g., triangular, spherical) that differ from conventional drones. Certain shapes, such as large triangular forms, align with reports of advanced military or experimental craft.-0.20
Angular size : observers often overestimate the size of objects in the sky, especially at night, leading to reports of larger-than-actual sizes.Angular size : witnesses have described the drones as "massive" and "as big as SUVs," suggesting shapes larger than typical commercial drones34
Trajectory : drones have been reported hovering over neighborhoods, which could be a misinterpretation due to the parallax effect35Trajectory : witnesses have observed drones hovering just above the trees, suggesting intentional stationary positions rather than parallax illusions. 
Coordinated movements: groups may conduct coordinated flights, leading to perceptions of formation flying.Coordinated movements: reports indicate sightings of multiple drones flying in clusters or formations, which could suggest organized activity beyond hobbyist capabilities.The precision and scale of formations over sensitive sites may indicate foreign or domestic surveillance programs.
Duration of flight: Continuous sightings might be due to multiple drones operating in succession, giving the impression of prolonged flight by a single drone.Duration of flight: many reports describe prolonged flights (hours), exceeding the battery life of most commercially available drones36.
Flight in adverse weather: high-end commercial drones, like those used for professional videography or industrial purposes, are designed to withstand wind, rain, and even snow to a certain extent. Flight in adverse weather :  Bad weather significantly drains drone batteries, reducing flight duration. 
Flight over sensitive sites :  The drones can be modified or they can use non commercial models;Flight over sensitive sites: nowadays  drones are restricted around critical infrastructure like those of DJI (geozones). It rules out certain drones being used near military installations.
* We have two entries for 'motivations' in the table: as they cover the same 'contextual axis', we keep the best of the two as the same value (+0.90). In another way, "motivations" should be on the same row, but for the sake of clarity we have split the rows.
** To simplify the analysis, the examination of the descriptive elements (shape, angular size, sound, duration of observation, flight formation, trajectory, etc.) is made directly in this table, instead of creating a separate table of arguments for each. The notation will be determined by the weakest of these descriptive elements, as they are orthogonal. I show only the result (-0.20)

Experts offer contrasting perspectives on the nature of these drone overflights. 

The idea of a concerted effort by individuals to orchestrate these overflights remains credible, especially for isolated incidents or less secure areas. 

However, the scale and complexity of the drone activity, particularly around sensitive locations, raise doubts about the feasibility of this explanation. The logistical challenges and legal risks associated with such operations would likely deter most individuals37

For instance, Mike Innella points to the advanced capabilities of some observed drones, including their extended battery life and weather resistance, suggesting they are not typical hobbyist models. This highlights the uncertainty surrounding the motives behind these operations.

Here is a testimony which is very representative of many other observations:

I’m an Army veteran with some training on AAA weapons systems and aerial threat identification. I’ve seen the drones with my own eyes and they are in fact drones, as opposed to manned aircraft, -and they are very large with incredible flight times. It’s true that it’s hard to gauge size and distance, especially at night, but what I saw wasn’t any commercially available drone that I’m aware of. Just yesterday I saw about 10 large drones over the ocean off the coast on a windy night that were all clearly coordinating with each other and had flight times measured in hours, at the very least. They all slowly made their way onto shore over neighborhoods where it appeared they were up to something. Something is going on. I don’t know what, but this isn’t a case of people just flying their hobbyist drones. It’s either a large commercial enterprise with a fleet of some new/unique type of very large and expensive drones, or it’s military/government. If it’s a large commercial enterprise, we have a right to know what they are up to since they’re disturbing the peace at a minimum [...].”38

These characteristics suggest that private individuals, even with advanced equipment, would struggle to access the level of drones and technologies required for such sustained and complex operations. However, this does not entirely rule out their involvement. Private operators could potentially blend their activities with those of military or other entities, adding to the overall noise and confusion surrounding these events.

If you have doubts about the capacity of individuals to organize a phenomenon of this scale, there is a striking parallel that demonstrates how a well-funded, coordinated network of individuals can orchestrate large-scale hoaxes or activities. In November 2020, a mysterious metallic monolith was discovered in a remote area of the Utah desert. Shortly thereafter, similar monoliths began appearing in various parts of the world, including Romania, the United Kingdom, the United States, France, Australia, and across Europe39. These monoliths were beautiful pieces of design, fueling global speculation about their origin and purpose.

The monolith story is a compelling example of how a coordinated, well-funded network can execute a global hoax while maintaining anonymity. Through the use of NDAs (non-disclosure agreements) and contracts with local artists40, the organizers successfully orchestrated a viral, international event. This serves as a proof of concept for how similar efforts—whether artistic, activist, or mischief-driven—could be carried out at scale, requiring global coordination, anonymity, and substantial resources, all with a common goal: creating a viral impact.

That said, the complexity and risks associated with prolonged drone overflights, especially over sensitive sites, demand a far higher degree of organization, resources, and technical expertise. This raises significant questions about the feasibility of private individuals orchestrating such events without external support or advanced capabilities.

Hypothesis value (from 0 to 1) : 0.375 Not credible enough.


Hyp. 3. Foreign Powers at Play: Coordination, Provocation or Espionage? 

The possibility of foreign involvement has also been raised, with some suggesting that the drones could be part of espionage or surveillance operations by countries like China or Russia, both known for their advanced drone capabilities. The strategic importance of some of the overflight locations, including military bases and critical infrastructure, could make them attractive targets for intelligence gathering.

Representative Jeff Van Drew even suggested the drones could be launched from an Iranian "mothership" stationed off the coast41, though this claim was quickly dismissed by the Pentagon. Similar drone activity has been reported near US military bases in the UK, raising concerns about a broader pattern of foreign surveillance.

Adding another layer of complexity, these drone sightings could be part of a joint military exercise between the US and its allies. Such exercises could serve to test interoperability, evaluate responses to unconventional threats, or even send a subtle message to potential adversaries. This scenario could explain the advanced technology employed, the strategic locations targeted, and the lack of official acknowledgment.

However, the conspicuous nature of the drone activity, with their visible navigation lights, seems counterproductive for covert espionage. Foreign incursions into US airspace, particularly those attributed to China42, have typically involved stealthier methods, such as high-altitude balloons. Furthermore, no concrete evidence has emerged linking the New Jersey drones to any specific foreign power.

Table of Arguments for Hypothesis 3 

Criteria or ElementArguments ForArguments AgainstScore
[-1, +1]
Access to Technology with Advanced CapabilitiesCountries like China and Russia have well-documented, advanced drone technologies capable of precise surveillance operations.0.95
Logistical FeasibilityA Marine logistical platform could be used to launch drones of 2 to 3 meters size.  It even can be done through submarines, they are advanced enough to carry and deploy such systems. 

The Type 093 nuclear-powered attack submarine could theoretically be modified to launch drones*

The recent Chinese balloon incident suggests that they have the motivation to conduct such operations.
In the absence of concertation, such actions near U.S. sensitive sites would be extremely risky and could provoke significant geopolitical consequences, and other countries will certainly think twice before invading the US.  0.50
Motivations (1)**
Joint Military Exercises
Joint military exercises strengthen alliances, allow intelligence sharing, and demonstrate unity among nations, particularly among the “Five Eyes”.The lack of transparency about these operations fuels public anxiety and distrust, while adversaries might misinterpret this as disorganization or vulnerability.The fact that observations are near sensitive siteslike military bases, nuclear facilities, and critical infrastructure is doubtful: it could allow foreign entities access, even in the context of a joint exercise, would expose vulnerabilities and create potential for intelligence leaks.There are very few examples, if any, of joint military exercises with foreign nations being conducted over U.S. sensitive sites.-0.30
Motivations (2)
Espionnage
Military bases and critical infrastructure are high-priority targets for intelligence gathering, making them plausible targets for foreign espionage.Visible navigation lights are uncharacteristic of covert foreign espionage, casting doubt on the plausibility of foreign power involvement in this specific case. Standard espionage tactics, prioritize stealth and minimal visibility.-0.80
Motivations (3)
Provocation
Perhaps it is a signal for those who can decipher it, but in this case, it is a very special form of “communication”This pattern is occurring in multiple nations, but no foreign government has ever claimed responsibility. The duration of the incident appears inconsistent with a show of force.-0.50
Lack of Transparency 
with Motivations (1)
The military's reluctance to provide detailed information about the drones and their origin fuels suspicion and speculation. The focus on minimizing public concern could be seen as an attempt to downplay the significance of the events. The military may be withholding information to avoid compromising the investigation or to prevent public panic. Sharing sensitive details could also alert the perpetrators and hinder efforts to apprehend them.0.25
Lack of Transparency 
with Motivations (2) or (3)
Maybe it is too late to admit it is a foreign state: being unable to stop “enemy” drones would demonstrate the flagrant inability of the US to stop a foreign power. Is such an admission of weakness possible? Clearly not, at least not publicly.  Acknowledgment of an inability to defend airspace would be politically disastrous. In addition to domestic consequences, admitting this publicly could encourage foreign adversaries to exploit the weakness further or even provoke allies to question U.S. security commitments.
The official strategy of minimizing the phenomenon aligns with how governments often respond to situations where there is an inconvenient truth, deflecting attention to avoid further embarrassment or panic.
This is a strong counterargument. The absence of concrete evidence, despite investigations, weakens the hypothesis significantly.If these drones were truly part of foreign espionage, there would likely be:Signals intelligence (SIGINT) revealing their command sources.Physical evidence recovered from intercepted drones.Without such evidence, the hypothesis remains speculative.The absence of geopolitical reactions - which would be probably very quick in the case of China or Russia - leaves us to think that there is no concrete evidence.0.50
* In this example this could be one-way or recoverable drones.
** We have got 3 entries for the 'motivations' in the table: as they cover the same 'contextual axis', we keep the highest values of the three as the best possibility : -0.30. This is also the value which more generally constrains the hypothesis

The hypothesis that foreign powers are involved in drone overflights has weak to moderate plausibility

Advanced capabilities and the strategic value of the targeted locations offer some support. However, the conspicuous nature of the drones and the lack of concrete evidence undermine the credibility of this explanation. Additionally, the disorganization observed in these events makes the possibility of joint military exercises less likely, though not impossible.

While joint military exercises can serve as a motivation for drone overflights, their use over highly sensitive U.S. sites remains improbable due to security concerns, public perception risks, and legal constraints. However, if such exercises did occur, they would likely be carefully planned and involve close allies like the Five Eyes nations, focusing on testing advanced capabilities or responses to unconventional threats.

Hypothesis value (from 0 to 1) : 0.35 Not credible. (for a Joint Military Exercise)

Note: this hypothesis is built upon hypothesis (1), so it is also limited by it*

* In this case, 0.375 < 0.45 so there is no reduction of the final value of this hypothesis


Hyp. 4. Psychological Operations (PSY-OPS): Controlled Chaos and Manipulation

The persistent drone activity over New Jersey has sparked numerous theories, including the possibility of a psychological operation (PSYOP) orchestrated by the US military or other agencies. This report delves into this hypothesis, examining the potential motivations, historical precedents, and arguments for and against such an operation.

Controlled Confusion

Full-scale “stress tests” involving crisis simulations or controlled events to observe the reactions of the population and institutions are not unprecedented:

  • Controlled confusion: by deliberately leaving the origin and purpose of the drones ambiguous, authorities could observe the reactions of the population and institutions under conditions of uncertainty and potential threat. This could be seen as a "stress test" to assess public resilience and preparedness in the face of an unknown aerial phenomenon.
  • Intentional manipulation of perceptions: the ambiguity surrounding the drones could be used to manipulate public perceptions and narratives. By blurring the lines between natural phenomena, advanced technology, and foreign intervention, authorities could gauge how different groups interpret and respond to the events . This could also involve amplifying the perceived inability of authorities to provide clear answers, potentially impacting the credibility of institutions and fostering a sense of dependence on government pronouncements46.  
  • Exploiting existing paradigms: the "military" yet "unidentified" nature of the drones could be a deliberate attempt to tap into existing paradigms surrounding UFOs and UAPs. This could serve to either divert attention from other activities or to shape public perception of future events involving advanced aerial technology.

Historical Precedents:

  • Cold war secret operations: governments, particularly the United States and the USSR, frequently conducted psychological experiments, including on threat perception. For instance, Project Blue Book and other UFO investigations were sometimes suspected of being used to divert or downplay public attention regarding unidentified events47.
  • Large-scale social experiments: military exercises such as Operation Sea-Spray48 (where bacteria were released into San Francisco Bay in 1950) or Project SHAD49 (testing chemical agents on naval ships) demonstrate that governments have used civilian populations as study subjects without prior consent50.

Possible Objectives:

If the New Jersey drone overflights were indeed a PSYOP, several potential objectives could be at play:

  • Testing defense infrastructures: the drone activity could be designed to evaluate the ability of local and federal security forces to detect, track, and respond to unconventional aerial incursions . This could involve assessing the effectiveness of existing surveillance systems, communication protocols, and counter-drone measures51.
  • Studying social reactions: the incidents could be used to analyze the reactions of media outlets, local authorities, and the general population to an ambiguous and potentially threatening situation. This could involve monitoring how fear and misinformation spread through social media, how citizens organize themselves in response to perceived threats, and how public trust in institutions is affected52.
  • Preparing public opinion for a narrative: repeated occurrences of similar events, coupled with controlled information releases, could be used to shape public opinion and prepare the ground for the adoption of new laws, policies, or technologies. This could include justifying increased surveillance measures, stricter drone regulations, or the deployment of anti-drone defense systems in civilian areas.

Command Chain and Decision-Making of PSYOP Program

While specific details about the command chain and decision-making process for a PSYOP program are likely classified, some general information can be gleaned from publicly available sources:

  • Initiation: the decision would typically originate from the Office of the Secretary of Defense (OSD) or an intelligence agency like the CIA, NSA, or DIA. The National Security Council (NSC) might also weigh in if the program has broader implications for national security or foreign policy. 
  • Execution, military oversight: PSYOPs within the US military fall under the purview of the United States Army Civil Affairs and Psychological Operations Command (Airborne) (USACAPOC(A)). As the USACAPOC(A) is foreign oriented it should require an extraordinary authorization to ensure compliance with U.S. laws, particularly those limiting propaganda directed at U.S. citizens.
  • Interagency coordination: depending on the objectives and scope of the operation, other agencies, such as the Department of Homeland Security, the FBI, and the National Security Council, might be involved in planning and execution .   
  • Authorization and approval: a PSYOP program of this nature would likely require high-level authorization and approval, potentially involving the Secretary of Defense, the President, or other senior officials.   

It's important to note that this is a general overview, and the specific details of any potential PSYOP program related to the New Jersey drone overflights would be subject to strict secrecy and compartmentalization.

Table of Arguments for Hypothesis 4

Criteria or ElementArguments ForArguments AgainstScore
[-1, +1]
Plausibility of emergence of PSYOP of this scale in the actual contextHistorical precedent: Governments have conducted psychological experiments on populations to study responses to perceived threats, such as Cold War-era tests (e.g., Operation Sea-Spray, the MKUltra program53).

Aligns with potential PSY-OPS objectives like shaping public perception or gauging responses to ambiguous threats like UAPs maybe.Proponents might argue that a PSYOP is necessary to protect national security by controlling the narrative surrounding UAPs, preventing panic, and deterring potential future risks.
Approving a PSYOP focused on UAPs while simultaneously claiming to pursue transparency and truth in the same domain would be inherently contradictory. 
Such a program would contradict the stated goals of transparency and truth-seeking in the UAP domain, potentially leading to accusations of hypocrisy and a further erosion of public trust in government institutions.
This could be perceived as disingenuous and manipulative, potentially causing significant damage to public trust and government credibility.
                                                   
The legislative focus on SAPs makes it less likely that a covert program involving public manipulation would be initiated now, as such actions could easily escalate into a political scandal.
Moreover, the USACAPOC(A) is foreign oriented and it should require an extraordinary authorization to ensure compliance with US Law.
Ultimately, the implementation of this program would necessitate extensive inter-agency collaboration, a complex undertaking given the required level of secrecy.
-0.5
Motivations (1)*
Testing Defense Infrastructures
The drone overflights align with potential PSYOP objectives, such as testing defense infrastructure, studying social reactions, and shaping public opinion.These arguments apply for all Motivations (1), (2) and (3):

Ethical concerns and potential backlash
Conducting psychological operations (PSYOPs) that manipulate public fear to study social responses raises ethical concerns about potential psychological harm and the violation of public trust. Such actions could be perceived as exploiting public vulnerability for research purposes, potentially eroding democratic values and leading to government overreach.


Challenges in drawing conclusions
The uncontrolled nature of real-world events like the drone overflights limits the ability to draw definitive conclusions about social reactions. The complexity of human behavior and the influence of various external factors make it difficult to isolate the specific effects of the PSYOP55.

Risk of exposure and damage to credibility
If the operation were exposed, it could severely damage the credibility of the Department of Defense and other involved agencies, particularly at a time when public trust in government institutions is already under scrutiny.

Potential for increased oversight and transparency
A potential consequence of exposure could be tighter control of the Department of Defense and increased transparency regarding UAP activities.
0.00
Motivations (2)
Studying Social Reactions
Understanding public behavior: observing how the public reacts to ambiguous threats can provide valuable insights into behavior patterns, information dissemination, and the formation of public opinion. This knowledge can be used to improve communication strategies, crisis management protocols, and public safety measures in future events56.
 
Assessing media influence: analyzing media coverage and social media discussions can reveal how information spreads, how narratives are shaped, and how public perception is influenced by different sources. This can help authorities understand the role of media in shaping public opinion and develop strategies to counter misinformation or manage public perception during crises57.

Identifying vulnerabilities: observing how individuals and communities respond to drone overflights can expose vulnerabilities in social structures, communication networks, and emergency preparedness. This information can be used to strengthen community resilience and improve responses to future threats
+0.2
Motivations (3)
Preparing Public Opinion for a Narrative
Shaping public discourse: by controlling the information flow and manipulating perceptions, authorities could steer public discourse towards a desired narrative. This could involve creating a sense of urgency or fear to justify increased security measures, stricter regulations, or the acceptance of new technologies58.

Manufacturing consent: the drone overflights could be used to gradually acclimate the public to the presence of drones in civilian airspace, paving the way for the normalization of drone surveillance or other applications that might otherwise face public resistance. More speculatively, it could also pave the way for the existence of NHI (Non Human Intelligence). By shaping public opinion, authorities could create a favorable environment for the adoption of specific policies or legislation related to drone technology, national security, or public safety .
+0.3
Motivations (4)
Spy & Commercial War
U.S. government is using this event to stoke  fear of drones to push a Chinese drone ban (e.g., targeting DJI and Autel) and push fear as a political tool to create a new legislationIt is speculative. While governments have historically used fear for political gain, this claim lacks supporting evidence. It leans toward conjecture and requires more context or corroboration. 
Why use large drones in this case? It is complicated for nothing. In this case, you will use commercial drones to create an event.
Moreover, it does not explain why the same pattern of events occurred in other countries?
-0.5
* The score selected for the Motivations criteria is: max(0.0, 0.2, 0.3, -0.5) = 0.3

While the PSYOP hypothesis cannot be definitively proven or disproven without concrete evidence, it presents a plausible explanation for the New Jersey drone overflights. The potential motivations, historical precedents, and observed behaviors of authorities all contribute to the plausibility of this theory. However, the potential risks and ethical concerns associated with such an operation should not be overlooked. 

In this case, it could align with the objective to gauge responses to ambiguous threats like UAPs maybe.

Further investigation and information are needed to determine the true nature of these events and the intentions of those involved.

Hypothesis value (from 0 to 1) : 0.25 Not Credible. (for any kind of motivations)

Note: this hypothesis is built upon hypothesis (1), so it is also limited by it*.

*In this case, 0.25 < 0.45 so there is no reduction of the value

Summary of the previous hypothesis evaluated

We are now going to merge the previous results obtained from each table of arguments into a table with all the hypothesis:

Hypothesis DescriptionScore [0, 1]
Drones of U.S. Military OriginAdvanced technology testing or operational exercises conducted by the U.S. military0.450
Attention-Seeking IndividualsCoordinated efforts by private individuals or groups to generate media buzz, provoke institutions, or expose vulnerabilities0.375
Foreign Powers at PlayEspionage, surveillance, or coordinated exercises with other nations0.350
Psychological Operations (PSYOPS)Deliberate manipulation to study societal reactions, test defenses, or prepare the public for strategic narratives0.250
Strangeness Value (provisional)0.550

We observe that none of our four hypotheses, based on the information currently available, exceeds a score of 0.50. Therefore, no hypothesis is credible enough to be fully accepted at this stage. This underscores the need for further investigation.

The provisional Strangeness value of 0.550—complement to 1 of the best hypothesis—suggests that the phenomena fall into a moderately high level of ambiguity—neither entirely unknown nor easily explainable with current hypotheses. 

This initial assessment, based on preliminary analysis rather than a conclusive determination, likely stems from insufficient information:

  1. First, it necessitates further substantiation through concrete evidence and on-site investigation of specific instances
  2. Then, if no single, clear hypothesis still emerges, the results and analyses should undergo review by a panel of transdisciplinary experts. Ideally, this would involve a blind evaluation process to minimize bias, with the panel critically evaluating each argument to further refine the findings.

The Strangeness Concept

The Strangeness value (S = 0.550) measures the distance of the observed phenomena from ALL what is currently known or accepted as part of our reality. It is calculated as the complement to 1 of the best-scoring hypothesis (in this case, 0.450). It is defined between 0 and 1:

  • S = 0 indicates something perfectly explainable and well-documented, with all necessary information and knowledge available to classify it conclusively.
  • S = 1 represents something entirely indescribable, so far removed from existing knowledge and understanding that it defies any categorization.

Importantly, the strangeness evaluation does not follow a linear progression. Small increases in the strangeness value may represent disproportionately larger gaps in understanding, particularly as the value approaches 1. This non-linear behavior reflects the increasing difficulty of explaining phenomena as they deviate further from known frameworks.

The GEIPAN's methodology incorporates this concept for several reasons60:

It bridges known and unknown realms

By defining strangeness as the complement to the best available hypothesis, we provide a quantitative framework to measure how far a phenomenon deviates from established knowledge.

This helps frame the unknown in a systematic way, offering a starting point for further investigation while avoiding premature conclusions.

It scales the uncertainty

The use of a non-linear progression in the strangeness metric is particularly important, as it captures the exponential challenges of explaining phenomena as they move farther from known parameters.

This approach aligns well with how human understanding tends to work—where small gaps in knowledge are easier to close, but larger gaps require exponentially more effort, resources, and breakthroughs.

It is objective but flexible

Tying the strangeness value to the complement of the best hypothesis score creates an objective baseline for evaluating phenomena.

At the same time, the methodology remains adaptive, allowing for refinement as new hypotheses or data become available.

It supports multidisciplinary analysis

This approach can facilitate discussions across disciplines, providing a common language for scientists, sociologists, engineers, and policymakers to evaluate the "distance" of phenomena from what is known in their respective domains.

It encourages humility and open-mindedness

Acknowledging a high strangeness value reflects intellectual humility—it recognizes the limits of current knowledge while maintaining an openness to explore new possibilities. This is particularly important in UAP research, where preconceived notions can often skew analyses.

The Robustness Concept: The Need for Reliable Evidence

While Strangeness is an essential dimension for evaluating a case, it is not sufficient on its own to draw conclusions. Strangeness measures how far a phenomenon deviates from known frameworks, but without corroborating evidence, it remains speculative. Equally important is the dimension of Robustness, which quantifies the Quantity of Reliable information available. Robustness can be expressed as:

R = λ . ρ

where R represents Robustness, λ is the Quantity of useful Information collected, and ρ is the Reliability of that information, both ranging from 0 to 1. The product illustrates a key principle:

  • Collecting large amounts of data is meaningless if it is unreliable (ρ = 0, so R = 0).
  • Conversely, even the most reliable source (ρ = 1) is useless if it provides no meaningful or credible data (λ = 0, so R = 0).

Like Strangeness, Robustness is also ranging from 0 to 1, with a non-linear progression. This balance ensures that robustness reflects both the extent and the reliability of the available evidence. 

Unlike a mathematical proof, where conclusions are absolute, evaluating unexplained phenomena resembles a judicial process: a convergence of facts must collectively align to form the most plausible explanation, while uncertainties inevitably remain due to the complexity of the real world.

As Carl Sagan famously stated,

Extraordinary claims require extraordinary evidence

and so to classify a case—to ensure we got enough evidence—we need to ensure that:

R > S

Thus, while plausible explanations are explored, the unresolved aspect of robustness—due to incomplete or unsourced testimonies—should remain a key focus to complete this work. Evaluating robustness demands access to sourced evidence, such as direct testimonies, imagery, or physical data. Without it, even the most striking phenomena risk falling into conjecture.

In this sense, as Strangeness increases, so too must Robustness be reinforced proportionally to maintain a grounded and rigorous analysis.


IV. The “Impossible” Hypothesis: What About “Non-Human Intelligences”? 

A Theatrical Display for a Greater Purpose?

When conventional explanations fall short, it can be interesting to explore the possibility of the so-called “Non-Human Intelligences” (NHI). Its inclusion in recent U.S. legislative efforts and through the National Defense Authorization Act (NDAA) for Fiscal Year 202461, highlights the need to approach this hypothesis with scientific rigor and institutional accountability.

Although speculative, this idea has been voiced by residents of New-Jersey and officials alike, reflecting the mystery surrounding the observed drone activity. The central premise suggests that these drones—highly visible yet non-aggressive—are deliberate manifestations orchestrated. 

This idea aligns with my previous spatial and temporal analysis of UAP data62, 63, which reveal consistent patterns across generations of witness reports. These patterns suggest a calculated effort to conduct what can be described as a theatrical display, gradually accustoming humanity to the presence of something beyond our current understanding and potentially culminating around 203564. The multi-level communication approach embedded in these phenomena combines ecological, observable, and psychological dimensions.

[63] For Spatial patterns the GEIPAN Database was used, and for Temporal patterns the Larry Hatch U*Database, each database having its own unique qualities and limitations.

Symptomatology

These manifestations appear to operate as well in the case of the New Jersey drones, on two distinct yet interrelated levels of communication:

  1. One at the military level, to pressure sensitive levels in the chain of command:  UAPs have historically been observed near nuclear and military forces. These sites may serve as symbolic or practical focal points for these manifestations, drawing the attention of human authorities. Notably, this pattern has been documented in numerous reports, where Unidentified Anomalous Phenomena were reported in close proximity to nuclear and military installations65, including the famous Minuteman missile base incidents of the 1970s66

And here, the message behind these manifestations may extend beyond nuclear risk, potentially serving as a warning about Environmental Systemic Risks (“Eco-Systemology”), including overwatch of long-term environmental degradation and pollution.

  1. One at the public level : the concept of an "aerial theater" posits that these phenomena aim to attract attention while subtly acclimating humanity to the idea of Exogenous Phenomena. 

In this view, the phenomenon acts as the marionettist, orchestrating the timing and targeting of its appearances. By appearing in visible yet ambiguous forms—such as navigation lights or non-aggressive maneuvers—these manifestations might prepare the groundwork for more direct contact while simultaneously testing human reactions.

A prominent hypothesis suggests that this process could mitigate the shock of future global contact, reducing the risk of cultural ethnocide like stated by Robert Jaulin67—the loss of cultural identity resulting from overwhelming external influence.

Strategic Timing and Legislative Context

The hypothesis of an "aerial theater" posits that these phenomena are not merely coincidental but part of a larger, long-term strategy. By targeting both the military chain of command and public awareness, these manifestations could simultaneously probe human institutions’ readiness and shape societal perceptions.

While speculative, this idea gains traction from the timing of these events, which coincides with intense legislative debates on UAP transparency. The visibility and ambiguity of these drones compel governments to confront the issue, fueling public and institutional discussions. 

However, and again, I must insist that the absence of direct evidence and the plausibility of human-made explanations call for caution in drawing conclusions. While the observed technical characteristics appear advanced, they remain consistent with existing human technologies and closely resemble military drones.

For now, these phenomena remain enigmatic, requiring thorough investigation and an open-minded yet critical approach to all possible explanations.

V. A Global Pattern: Drone Sightings Beyond New Jersey 

The drone sightings in New Jersey are not isolated incidents. Similar drone activity has been reported near US airbases in the UK and military facilities in Virginia around the same period. This raises the possibility of a broader pattern of drone activity with potentially wider implications.

An international Context: Nuclear Sites Under Scrutiny

It is worth noting that similar incidents of unidentified drones overflying nuclear sites have been reported in several countries, highlighting the persistent vulnerability of these sensitive installations:

  • USA: in December 2023, U.S. military personnel observed drones in restricted airspace above Langley Air Force Base in Virginia for over two weeks68. This activity triggered investigations and heightened concerns about potential security breaches. Similar incidents have been reported at other military bases, including RAF Mildenhall in England, where British troops were deployed amid concerns of potential deception or sabotage69, and Ramstein Air Base in Germany70. The U.S. military has reported hundreds of drone flights over its installations in recent years, raising significant alarm71.
  • UK: between November 20 and 26, 202472 a series of unauthorized drone activities was detected over and near four US Air Force bases in the United Kingdom: RAF Lakenheath, RAF Mildenhall, RAF Feltwell, and RAF Fairford73, 74 These installations, located in Suffolk, Norfolk, and Gloucestershire, are critical to US military operations in Europe75. The drone activity persisted for several days, raising concerns about the coordination and intent behind the incursions76
  • France: between October 2014 and January 2015, more than 50 drone overflights77 were recorded over 19 French nuclear sites, including 14 power plants operated by EDF. These overflights exposed flaws in the aerial security of nuclear facilities78, raising concerns about their protection against malicious acts.
    • A public hearing was held on November 24, 2014: The Parliamentary Office for Scientific and Technological Assessment (OPECST)79 to examine the security issues posed by drone overflights of nuclear power plants. The session brought together public authorities, industry representatives, and laboratories to discuss potential threats and countermeasures.
  • Belgium: in December 201480, the Doel nuclear power plant in the north of the country was overflown by a drone. This incident raised questions about the security of Belgian nuclear facilities against unauthorized aerial intrusions.
  • Germany: beyond military installations, drones have been sighted over sensitive industrial sites like the BASF chemical plant in Ludwigshafen, Germany81, underscoring the vulnerability of critical infrastructure to drone surveillance and potential attacks.
  • Sweden: in January 2022, unidentified drones simultaneously overflew at least two Swedish nuclear sites82. These events led to investigations to determine the origin and intentions behind the overflights, reflecting growing concerns about the security of nuclear facilities in Sweden.

A list of UAV (Unmanned Aerial Vehicle) related incidents is updated on Wikipedia83.

On the security level, these incidents demonstrate a worrying trend of unauthorized overflights of nuclear sites by drones, underscoring the need to strengthen security measures to protect these critical installations from potential threats.

At the investigatory level, it was observed in the past that “UAPs” have regularly followed "archetypal trends": from airships, to flying saucers, robotic humanoids, black triangles, and now, for at least the past decade, we are in a rather specific trend involving the overflight of sensitive sites by what appear to be high-tech drones.

VI. A Troubling Trail of Clues

The mystery of the New Jersey drones remains unsolved. To date, none of the proposed hypotheses have been confirmed, and investigations by the FBI and other federal agencies are ongoing to determine the origin and intent of these drones.

While military authorities and the Department of Defense (DoD) continue to deny their involvement, this stance raises important questions about the complexities of monitoring airspace and the potential need for enhanced collaboration and/or resources. The proposed hypotheses—military, foreign, psychological, or non-human—highlight inconsistencies and paradoxes that only fuel further speculation.

If these drones are designed to be seen, with their navigation lights and prolonged presence, it resembles more of a staged display than a genuine stealth threat.

Yet, this very visibility invites questions—and possibly challenges—institutions. Whether the intent is to test defenses, highlight vulnerabilities, or simply spark broader public and political discourse, these events mark a turning point in how we perceive Unidentified Anomalous Phenomena.

The Difficulty of the Military's Role: Transparency vs. Security

The role of the military in addressing the New Jersey drone mystery is inherently complex, as it must navigate the fine line between ensuring national security and maintaining public trust. On one hand, the military is tasked with protecting sensitive airspace, anticipating risks, and preparing for potential threats. This requires a certain level of discretion to avoid revealing vulnerabilities or operational capabilities that could be exploited by adversaries.

On the other hand, the public and legislative scrutiny surrounding Unidentified Anomalous Phenomena places increasing pressure on the military to demonstrate transparency. Balancing the need for discretion in classified operations with public expectations for transparency is a challenge that risks fueling speculation and public concern about airspace security.

This tension creates a paradox: too much transparency could compromise security by revealing detection capabilities, response protocols, or other strategic assets. At the same time, excessive secrecy could undermine trust and lead to heightened public anxiety, particularly when visible phenomena like the New Jersey drones challenge institutional credibility.

Striking this balance is no easy task. The military must manage public and political expectations while safeguarding its ability to operate effectively in an increasingly complex and contested airspace. This balancing act underscores the difficulty of its role and highlights why the military’s response to incidents like these often appears cautious or ambiguous.

The Future of the Mystery: What Lies Ahead?

The wave of drone sightings in New Jersey has brought to light the growing challenges associated with unmanned aircraft systems. 

The need for clear regulations and robust enforcement regarding drone usage is a world-scale problem, concerning all the countries. In New Jersey, both recreational and commercial drone operations are permitted, but operators must be FAA-certified and adhere to federal and local regulations. These regulations include restrictions on flying near airports, over populated areas, and above certain altitudes84. However, the recent incidents have exposed potential gaps in these regulations and the need for enhanced monitoring and enforcement capabilities85.

While official investigations have not found evidence of malicious intent, the incidents have raised concerns about airspace safety, surveillance, and the need for greater transparency and public awareness. As drone technology continues to evolve and become more accessible, it is crucial for authorities to develop effective strategies for monitoring and regulating drone activity to ensure public safety and address potential security risks.

 Some key concerns include:

  • Airspace safety: the possibility of drones sharing airspace with commercial airlines raises concerns about potential collisions and disruptions to air traffic.
  • Surveillance and data collection: the drones' unknown origin and purpose raise questions about their potential for gathering sensitive information or conducting unauthorized surveillance.
  • Lack of transparency: the perceived lack of clear and timely information from authorities is fueling public distrust and anxiety, with some believing the government may be withholding crucial details. This erosion of trust can hinder public cooperation and create further challenges in addressing the situation effectively.
  • Escalating drone activity: the increasing frequency of drone sightings across multiple states raises concerns about the potential for similar incidents in the future and the need for effective countermeasures.

To move forward, potential solutions include investing in advanced drone detection technologies, implementing community awareness programs to educate the public about drone regulations and safety, and fostering international collaboration on aeronautical regulations to address the global nature of this challenge. Equally important is the need to leave doors open for scientific access to high-quality data, which could help decipher the unknown phenomena.

Progress in understanding such events requires rigorous, on-site investigations, prioritizing the collection of firsthand evidence. This involves interviewing direct witnesses, thoroughly documenting their observations, and, whenever possible, obtaining original, uncompressed photos and videos. Each piece of evidence should be accompanied by detailed information about the observer and the context of the sighting (through a questionnaire), ensuring a robust and verifiable foundation for analysis. Reliance on low-quality, highly compressed media, such as YouTube videos, should be avoided wherever possible, as such sources often lack the resolution and reliability necessary for credible evaluation.

By proactively addressing these issues and continuously refining drone regulations, authorities can mitigate risks and ensure the responsible use of drone technology for the benefit of society. 

The events in New Jersey serve as a valuable reminder of the need for ongoing dialogue and collaboration between government agencies, law enforcement, the scientific community, and the public to navigate the complex landscape of drone technology and its implications.

For now, this mystery reflects the tensions between transparency and secrecy, security and control, and human curiosity versus institutional limitations. Whether it is a staged theater or a signal from elsewhere, the stage remains set, and the next acts may well redefine our understanding of what flies over our world.