Saudi aggression forces carried out 19 airstrikes in Yemen

SANAA, (ST)_The Saudi forces have carried out 19 airstrikes on 4 governorates in Yemen over the past 24 hours.

According to a military source, the Saudi aggression forces committed 105 violations and fired over 35 artillery shells on the homes of residents in al-Jah and Derihmi areas.

There were also attacks on Rzakh and Daher areas.  

The Yemeni parties had reached an agreement during their talks in Sweden on the 13th of December 2018 to have a cease fire in Hodeidah and try to reach an understanding in the city of Taiz, but the Saudi forces and their mercenaries continue violating the agreement and escalating the targeting of residential areas, farms and housing intensively and daily.   

Basma Qaddour

You might also like
.. _copyright: Copyright ========= .. code-block:: none Copyright (C) 1998-2000 Tobias Ratschiller Copyright (C) 2001-2018 Marc Delisle Olivier Müller Robin Johnson Alexander M. Turek Michal Čihař Garvin Hicking Michael Keck Sebastian Mendel [check credits for more details] This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . Third party licenses ++++++++++++++++++++ phpMyAdmin includes several third-party libraries which come under their respective licenses. jQuery's license, which is where we got the files under js/vendor/jquery/ is (MIT|GPL), a copy of each license is available in this repository (GPL is available as LICENSE, MIT as js/vendor/jquery/MIT-LICENSE.txt). The download kit additionally includes several composer libraries. See their licensing information in the vendor/ directory.