The US has now collected 510 reports of unidentified flying objects, many of which are flying in sensitive military airspace, the government said in a declassified report.
While there is no evidence of extraterrestrials, they still pose a threat, said the report, which was released on Thursday.
Last year, the Pentagon opened an office called the All-domain Anomaly Resolution Office, solely focused on receiving and analysing all reports of unidentified phenomena, many of which have been reported by military pilots.
It works with the intelligence agencies to further assess those incidents.
The events “continue to occur in restricted or sensitive airspace, highlighting possible concerns for safety of flight or adversary collection activity”, the Office of the Director of National Intelligence (ODNI) said in its 2022 report.
The classified version of the report addresses how many of those objects were found near locations where nuclear power plants operate or nuclear weapons are stored.
The 510 objects include 144 objects previously reported and 366 new reports. In both the old and new cases, after analysis, the majority have been determined to exhibit “unremarkable characteristics,” and could be characterised as unmanned aircraft systems, or balloon-like objects, the report said.
But the office is also tasked with reporting any movements or reports of objects that may indicate that a potential adversary has a new technology or capability.
The Pentagon's anomaly office is also to include any unidentified objects moving under water, in the air or in space, or something that moves between those domains, which could pose a new threat.
The ODNI said in its report that efforts to destigmatise reporting and emphasise that the objects may pose a threat probably contributed to the additional reports.
Five strange space mysteries from ‘UFOs’ to a ‘door on Mars’ — in pictures
ANDROID%20VERSION%20NAMES%2C%20IN%20ORDER
%3Cp%3EAndroid%20Alpha%3C%2Fp%3E%0A%3Cp%3EAndroid%20Beta%3C%2Fp%3E%0A%3Cp%3EAndroid%20Cupcake%3C%2Fp%3E%0A%3Cp%3EAndroid%20Donut%3C%2Fp%3E%0A%3Cp%3EAndroid%20Eclair%3C%2Fp%3E%0A%3Cp%3EAndroid%20Froyo%3C%2Fp%3E%0A%3Cp%3EAndroid%20Gingerbread%3C%2Fp%3E%0A%3Cp%3EAndroid%20Honeycomb%3C%2Fp%3E%0A%3Cp%3EAndroid%20Ice%20Cream%20Sandwich%3C%2Fp%3E%0A%3Cp%3EAndroid%20Jelly%20Bean%3C%2Fp%3E%0A%3Cp%3EAndroid%20KitKat%3C%2Fp%3E%0A%3Cp%3EAndroid%20Lollipop%3C%2Fp%3E%0A%3Cp%3EAndroid%20Marshmallow%3C%2Fp%3E%0A%3Cp%3EAndroid%20Nougat%3C%2Fp%3E%0A%3Cp%3EAndroid%20Oreo%3C%2Fp%3E%0A%3Cp%3EAndroid%20Pie%3C%2Fp%3E%0A%3Cp%3EAndroid%2010%20(Quince%20Tart*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2011%20(Red%20Velvet%20Cake*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2012%20(Snow%20Cone*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2013%20(Tiramisu*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2014%20(Upside%20Down%20Cake*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2015%20(Vanilla%20Ice%20Cream*)%3C%2Fp%3E%0A%3Cp%3E%3Cem%3E*%20internal%20codenames%3C%2Fem%3E%3C%2Fp%3E%0A
SNAPSHOT
While Huawei did launch the first smartphone with a 50MP image sensor in its P40 series in 2020, Oppo in 2014 introduced the Find 7, which was capable of taking 50MP images: this was done using a combination of a 13MP sensor and software that resulted in shots seemingly taken from a 50MP camera.
Mohammed bin Zayed Majlis
Read more from Kareem Shaheen
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.