Israeli warplanes renew violation of Lebanese airspace

BEIRUT, (ST)- The Israeli enemy on Tuesday renewed its violation of the Lebanese airspace and sovereignty by carrying out flights over several Lebanese areas.

According to the Lebanese  National news Agency (NNA), the Israeli warplanes violated the Lebanese airspace today and flew at medium altitude over south Lebanon, Jezzine, Marjeoun, Hasbeyya, Jabal Burgul, al-Orqoub and the Litani riverbed in Western Bekaa area in addition to Keserwan and al-Metn to the northeast of Beirut.

 The agency also reported that the Israeli enemy forces today started digging works and removed the barriers off al-Wazzani parks, while the Israeli warplanes and reconnaissance aircrafts were flying over that area.

Hamda Mustafa

You might also like
.. _copyright: Copyright ========= .. code-block:: none Copyright (C) 1998-2000 Tobias Ratschiller Copyright (C) 2001-2018 Marc Delisle Olivier Müller Robin Johnson Alexander M. Turek Michal Čihař Garvin Hicking Michael Keck Sebastian Mendel [check credits for more details] This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Third party licenses ++++++++++++++++++++ phpMyAdmin includes several third-party libraries which come under their respective licenses. jQuery's license, which is where we got the files under js/vendor/jquery/ is (MIT|GPL), a copy of each license is available in this repository (GPL is available as LICENSE, MIT as js/vendor/jquery/MIT-LICENSE.txt). The download kit additionally includes several composer libraries. See their licensing information in the vendor/ directory.