Skip to main content

043 · EP-04 Modern-Military

DOW-UAP-D25-_Mission_Report-_Greece-_January_2024

Modern military UAP encountersContemporary AARO/DOW/USCENTCOM/INDOPACOM reports. 2010s–2020s.

Open on war.gov (7 pp)Text-only (Akamai blocked binary)

◆ Key facts

Theme
Modern military UAP encounters
Era
Modern
OCR pages
7

◆ Opening pages

Declassified by MG Richard A. Harrison USCENTCOM Chief of Staff Declassified on: 24 October 2025 ~~SECRET//REL TO USA, FVET~~ ~~SECRET//REL TO USA, FVET~~ AT 0109Z, (b)(1)1.4a CONDUCTED SLR TAKE OFF FROM LGLR. (b)(1)1.4a PROCEEDED TO FRAGGED TASKING TO SUPPORT (b)(1)1.4a AT 0509Z, (b)(1)1.4a OBSERVED AN UNIDENTIFIED AERIAL PHENOMENON (SEE UAP 1). AT 0135Z, (b)(1)1.4a WAS 7-LINED TO SUPPORT (b)(1)1.4a (b)(1)1.4a ARRIVED ON-STATION AT 0635Z, CHECKED IN WITH (b)(1)1.4a AND PERFORMED FMV/SIGINT COLLECTION AT 36R XV 19(b)(1)1.4a 63(b)(1)1.4a (SEE ISR 1). AT 1504Z, (b)(1)1.4a RETURNED TO BASE. AT 2149Z, (b)(1)1.4a LANDED AT LGLR. FULL MOTION VIDEO WAS EXPLOITED BY GET. 20:40 MISSION HOURS, 08:29 FMV HOURS, 1X FMV TASKINGS PROSECUTED, 08:27 SIGINT HOURS, 1X SIGINT TASKINGS. ~~SECRET//REL TO USA, FVET~~ ~~S/RELIDO~~ Mission Narrative * **Classification:** ~~SECRET~~ * **Associated Caveats:** ~~REL TO USA, FVET~~ * **Classification Source (MS or Classification Guide ID):** MS * **Declassification Date (YYYYMMDD):** 20490125 * **Operation:** [redacted] * **Domain:** AIR * **Operations Center:** 603rd * **Major Command (MAJCOM):** AFSOC * **Combatant Command (COCOM):** USCENTCOM | 3.5c, FOIA Exemption (b)(6) | | :--- | ~~SECRET//REL TO USA, FVET~~ USCENTCOM MDR 25-0100 thru 25-0103 / JS-250710-TM8S | Approved for Release to AARO | 10/28/25 001

Extracted from page 1 of 7. Read the full document on war.gov →

◆ Why this matters

This file is one of 77 in the Modern military UAP encounters cluster. It is part of the post-AARO modern reporting record. Only the OCR text is held locally — the original PDF binary is blocked from this network by Akamai. The text is verbatim from the prior Gemini/NotebookLM extraction pass.