Uxo report 2026

Get Form
uxo report Preview on Page 1

Here's how it works

01. Edit your uxo report online
Type text, add images, blackout confidential details, add comments, highlights and more.
02. Sign it in a few clicks
Draw your signature, type it, upload its image, or use your mobile device as a signature pad.
03. Share your form with others
Send uxo report army via email, link, or fax. You can also download it, export it or print it out.

How to use or fill out uxo report with our platform

Form edit decoration
9.5
Ease of Setup
DocHub User Ratings on G2
9.0
Ease of Use
DocHub User Ratings on G2
  1. Click ‘Get Form’ to open the uxo report in the editor.
  2. Begin with Line 1: Enter the date and time group when the UXO was discovered, following your command's policy for local or Zulu time.
  3. For Line 2, provide the reporting activity by entering your Unit Identification Code (UIC) or unit designation along with a mandatory 8-digit grid location, including landmarks or reference points.
  4. In Line 3, specify your contact method by entering either your radio frequency and call sign or a telephone number along with your name if applicable.
  5. Line 4 requires you to indicate the type of munition discovered—choose from dropped, projected, placed, or thrown.
  6. For Line 5, state whether there is known or suspected NBC contamination. If yes, detail the type of agent if identified.
  7. Continue filling out Lines 6 through 9 by detailing resources threatened, impact on mission, protective measures taken, and recommended priority based on urgency.

Start using our platform today to streamline your UXO reporting process for free!

See more uxo report versions

We've got more versions of the uxo report form. Select the right uxo report version from the list and start editing it straight away!
Versions Form popularity Fillable & printable
2010 4 Satisfied (55 Votes)
be ready to get more

Complete this form in 5 minutes or less

Get form

Security and compliance

At DocHub, your data security is our priority. We follow HIPAA, SOC2, GDPR, and other standards, so you can work on your documents with confidence.

Learn more
ccpa2
pci-dss
gdpr-compliance
hipaa
soc-compliance