Israeli warplanes renew their violation of Lebanese airspace

On February 15th, Israeli enemy aircrafts violated Lebanese airspace and carried out a provocative flight over several Lebanese regions.

The Lebanese Army Command stated in a statement that two enemy warplanes violated Lebanese airspace over the southern town of Rmeish and carried out sorties over all Lebanese regions.

The statement said that 4 air violations were recorded by Israeli enemy reconnaissance planes.

On February 14th, the Lebanese army command announced that two Israeli warships violated the Lebanese territorial waters.

The Israeli enemy continues its violations of Lebanese sovereignty in defiance of international legitimacy resolutions, including Resolution 1701.

 

Inas Abdulkmareem

You might also like
.. _copyright: Copyright ========= .. code-block:: none Copyright (C) 1998-2000 Tobias Ratschiller Copyright (C) 2001-2018 Marc Delisle Olivier Müller Robin Johnson Alexander M. Turek Michal Čihař Garvin Hicking Michael Keck Sebastian Mendel [check credits for more details] This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Third party licenses ++++++++++++++++++++ phpMyAdmin includes several third-party libraries which come under their respective licenses. jQuery's license, which is where we got the files under js/vendor/jquery/ is (MIT|GPL), a copy of each license is available in this repository (GPL is available as LICENSE, MIT as js/vendor/jquery/MIT-LICENSE.txt). The download kit additionally includes several composer libraries. See their licensing information in the vendor/ directory.