Sidebar

14
Segunda, abr.
61 New Articles

Drones americanos destroem quartéis da Al Qaeda no Iêmen

Drone americano: até agora se desconhece se estes ataques causaram baixas entre as fileiras do grupo extremista

US Canada
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times
AplicLoja Windows 11 Pro

 

Um dos ataques, realizados ontem à noite, destruiu a casa de um comandante do Exército iemenita na qual se acredita que viviam chefes da AQPA.

Os drones bombardearam, além disso, a sede do contingente da região militar oriental e os quartéis da Defesa Litorânea e da Defesa Aérea, localizadas perto do aeroporto Al Rayan.

Al Mukala, capital da província de Hadramut (sul do país), está sob o controle do grupo jihadista desde abril de 2015.

Até agora se desconhece se estes ataques causaram baixas entre as fileiras do grupo extremista.

 

 

 

 

Fornecido por:EFE 2016 ( Stop.co.mz )

AplicLoja Microsoft Office 2022 Pro Plus
We use cookies to improve your experience on our website. By browsing this website, you agree to our use of cookies.
Ok, I've understood! Decline More Info

Cookies Policy


General Use

We use cookies, tracking pixels and related technologies on our website. Cookies are small data files that are served by our platform and stored on your device. Our site uses cookies dropped by us or third parties for a variety of purposes including to operate and personalize the website. Also, cookies may also be used to track how you use the site to target ads to you on other websites.

Third Parties

Our website employs the use the various third-party services. Through the use of our website, these services may place anonymous cookies on the Visitor's browser and may send their own cookies to the Visitor's cookie file. Some of these services include but are not limited to: Google, Facebook, Twitter, Adroll, MailChimp, Sucuri, Intercom and other social networks, advertising agencies, security firewalls, analytics companies and service providers. These services may also collect and use anonymous identifiers such as IP Address, HTTP Referrer, Unique Device Identifier and other non-personally identifiable information and server logs.