About: Raid on Yakla     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : dbo:MilitaryConflict, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FRaid_on_Yakla&graph=http%3A%2F%2Fdbpedia.org&graph=http%3A%2F%2Fdbpedia.org

The Raid on Yakla was a United States/United Arab Emirates military operation carried out on January 29, 2017 in , a village in the area of the Al Bayda Governorate of central Yemen, during the Yemeni Civil War (2014–present). Authorized by US President Donald Trump, its ostensible goal was to gather intelligence on al-Qaeda in the Arabian Peninsula but also to target the group's leader, Qasim al-Raymi. The operation was the first high-level raid of the Trump administration. United States Central Command (CENTCOM) was involved with the Special Operations Command, which oversees US special forces operations, and the CIA.

AttributesValues
rdf:type
rdfs:label
  • معركة يكلا (ar)
  • Incursión de Yakla (es)
  • Raid de Yakla (fr)
  • Raid on Yakla (en)
rdfs:comment
  • معركة يكلا في فجر 29 يناير 2017 هاجمت طائرات أمريكية دون طيار منطقة يكلا في ريف محافظة البيضاء وسط اليمن، وهبطت طائرات هليكوبتر تحمل عناصر من الكوماندوز في المنطقة عقب الغارة الجوية التي استهدفت عددا من المنازل في القرية. ونتج عن الاشتباكات مقتل 14 من القاعدة بينهم ثلاثة من قادة القاعدة حسب إعلان القيادة المركزية الأمريكية. أسقط المسلحون مروحيتان أباتشي وتم إنقاذ طياري تلك المروحيات، ومن ثم قامت القوات الأمريكية بتدميرها بالصواريخ. (ar)
  • El 28 de enero de 2017 tuvo lugar en , Al Bayda', Yemen una incursión militar liderada por las fuerzas especiales estadounidenses dentro del marco de la Guerra Civil Yemení.​​ Dicha operación fue autorizada por el Presidente de los Estados Unidos, Donald Trump.​ El objetivo marcado de la misión fue dar con el líder de Al-Qaeda en la Península arábiga: .​​ (es)
  • Le raid de Yakla est une opération conjointe des États-Unis et des Émirats arabes unis menée 29 janvier 2017 dans le village de , dans le gouvernorat d'Al-Bayda au Yémen. L'opération, décidée par le président américain Donald Trump avait initialement pour but de cibler le chef d'AQPA . Entre 10 et 30 civils (dont Nawar al-Awlaki) ont été abattus lors du raid, ainsi qu'un Navy SEAL. Un Bell Boeing MV-22B Osprey a été détruit pendant l'opération à la suite d'un dysfonctionnement. Ce raid a été décrit comme très "risqué dès le début et coûteux à la fin" et que l'opération a été "bâclée". (fr)
  • The Raid on Yakla was a United States/United Arab Emirates military operation carried out on January 29, 2017 in , a village in the area of the Al Bayda Governorate of central Yemen, during the Yemeni Civil War (2014–present). Authorized by US President Donald Trump, its ostensible goal was to gather intelligence on al-Qaeda in the Arabian Peninsula but also to target the group's leader, Qasim al-Raymi. The operation was the first high-level raid of the Trump administration. United States Central Command (CENTCOM) was involved with the Special Operations Command, which oversees US special forces operations, and the CIA. (en)
geo:lat
geo:long
foaf:depiction
  • http://commons.wikimedia.org/wiki/Special:FilePath/ShababFlag.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/MV-22_Ospreys_takeoff_on_USS_Makin_Island.jpg
Relates an entity ...ch it is located.
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 59 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software