Operation 'Protective Edge' will be remembered as one of the first military operations where a modern army had to face an irregular enemy mostly in the subterranean operational environment. While irregular forces have exploited the underground dimension in the past, in Gaza, Lebanon, Iraq, Pakistan and Afghanistan, the Palestinians in Gaza relied on their subterranean tunnel network as a battlespace - gaining mobility, communications, force protection and survivability, and denying the enemy from its main advantage - dominance in intelligence and firepower.
Underground warfare is not new. Since ancient and medical times warfighters have often used subterranean passages, natural or man made, to gain access into enemy fortifications and escape siege. In modern times, underground warfare has been utilised primarily in guerrilla, enabling a weaker side to combat militarily superior opponent, taking advantage of tunnels, caves and other underground infrastructures prepared in advance as part of an orderly military strategy.
By Riki Ellison Sunday at high noon out of Vandenberg AFB, California provides a window of opportunity to test and demonstrate the reliability of the...
Recent incursions of civil and military aircraft into neighboring airspace has highlighted the state of alert maintained by different nations, and raised once again the validity of the huge investments countries are spending in acquiring military capabilities, if they do not provide the means to maintain these capabilities at reasonable state of readiness
"By the end of 2014 the Israel Air Force will be able to do in less than 24 hours what it did in three days of fighting during the Second Lebanon War of 2006". IAF commander Maj. General Amir Eshel
The Chinese DF-3 missile is powered by liquid fuel. Towering to a height of 24 meters, the missile is fuelled before launch, at...
Probable KN-08 stages and vehicles prior to movement to the test stand. Photo: Digital Globe via 38North. Recent commercial satellite imagery indicates that North...
Terrorists have long exploited the Internet as a means to try and attract recruits to their cause. During the attack on Mumbai in November 2008 the terrorists made extensive use of mobile phones they picked up from those they had killed to look at how the events were being portrayed by the international media. It became a way of emboldening them to continue the fight over the sixty-two hours it lasted. Those involved knew through social media they were having a dramatic impact on the world stage.
Tension along the Israel-Gaza border has mounted in recent days, after a series of attacks from the Gaza Strip, On Sunday April 20th an IED was activated against Israel Defense Forces (IDF) soldiers patrolling the security fence along the southern Gaza Strip. 12 hours later; on 07:15 Monday, Palestinian militants fired a Rocket Propelled Grenade (RPG) at an IDF patrol along the security fence in the same area.
Standing back at looking at the deteriorating situation across the Middle East and North Africa it is difficult not to conclude that with so many places now available for Al Qaeda to offer training to its adherents that soon its operating model may change yet again.