Feeds

No more UFO reports please, says MoD

'No evidence aliens are any threat to Blighty'

High performance access to file storage

The UK Ministry of Defence (MoD) has decided to close down its UFO reporting service, saying that it is an "inappropriate use of defence resources". The Ministry has closed down the voicemail and email addresses formerly available for reporting sightings.

The MoD's page, How to report a UFO sighting, was modified last week to reflect the changes. A statement was issued, saying:

The MOD has no opinion on the existence or otherwise of extra-terrestrial life. However, in over fifty years, no UFO report has revealed any evidence of a potential threat to the United Kingdom. The MOD has no specific capability for identifying the nature of such sightings. There is no defence benefit in such investigation and it would be an inappropriate use of defence resources.

Furthermore, responding to reported UFO sightings diverts MOD resources from tasks that are relevant to Defence.

Accordingly, in order to make best use of defence resources, we have decided that from 1 December 2009 the dedicated UFO hotline answer-phone service and e-mail address will be withdrawn. The MOD will no longer respond to reported UFO sightings or investigate them.

It's well known that the quest for efficiency savings in the Ministry has become very searching. Many efficiency drives and cuts have already taken place over the last decade: and there's still a war to fight, plus various politically-untouchable and wildly overbudget programmes to pay for and big funding reductions expected next year.

In this case a single desk officer has been reassigned and savings in the region of £40k pa are expected.

The MoD will, however, continue its rolling programme of publicly releasing all the UFO files it has built up over many decades - largely free of real information though most of them are.

It would seem likely that some other branch of government - or other public-spirited body - will now need to take on the task of maintaining the national UFO archives into the future. Otherwise, what will harassed policemen do to close their incident files? ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.