Search results
Air Defense: The Russian Solution
Strategy Page· 6 days agoJanuary 23, 2018: Russia admits to a missing link in its air defense systems. This was made clear at the end of 2017 when the Russian controlled Hmeimim (or “Khmeimim”) airbase in northwest ...
Artillery: Acrobatic Guided Shells
Strategy Page· 5 days agoIn effect, the Excalibur is programmed to carry out a high-speed U-turn so that it comes down behind a ridge next to a bridge. Artillerymen have mentioned that they are often asked to hit Islamic ...
Space: Russia Surrenders To SpaceX
Strategy Page· 2 days agoMay 11, 2018: In mid-April 2018 Russia confirmed the obvious and admitted they had lost their huge market share of commercial satellite launches. As recently as 2013 Russia had half that market ...
These are the four hostages rescued by Israeli forces from militants in Gaza
Elko Daily Free Press· 5 days agoThe four captives Israeli forces rescued Saturday in the Gaza Strip were abducted from a desert rave...
Space: Good Swarm/Bad Swarm
Strategy Page· 5 days agoNovember 13, 2020: It is getting crowded in orbital space and it is critical in LEO (low earth orbit) space. Higher orbits are also suffering from crowding but the situation there is much less ...
MORGAN MURPHY: Lessons From Normandy
IJR· 4 days agoThursday’s 80th anniversary of D-Day likely marked the final major ceremony to be attended by survivors of the Juno, Omaha, Gold, Utah, and Sword beach landings. It took guts to invade Hitler ...
These are the four hostages rescued by Israeli forces from militants in Gaza
The Journal Times· 5 days agoThe four captives Israeli forces rescued Saturday in the Gaza Strip were abducted from a desert rave...
These are the four hostages rescued by Israeli forces from militants in Gaza
Kenosha News· 5 days agoThe four captives Israeli forces rescued Saturday in the Gaza Strip were abducted from a desert rave...
Information Warfare: Hackers for Hamas
Strategy Page· 6 days agoThe group used fake LinkedIn profiles and posed as software developers or project managers to send malware to employees at those targets and install back doors for later communications. Before ...