About: 2014 Latakia offensive     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:PsychologicalFeature100023100, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2F2014_Latakia_offensive

The 2014 Latakia offensive was a rebel offensive in the Latakia Governorate of Syria launched on 21 March 2014 by rebel Islamist groups including Al-Nusra Front, which called the offensive "Anfal", while a coalition of Supreme Military Council rebel groups called the offensive "The Martyrs Mothers". The objectives of the offensive have been stated to be the taking over of all strategic observatories, government villages and the Mediterranean coast. Observers have stated a strategic aim was to force the Syrian army to redeploy forces to Latakia, which would relieve pressure on other rebels elsewhere in Syria. They reportedly succeeded in this with government forces being sent from Idlib, Hama and Aleppo to bolster defenses.

AttributesValues
rdf:type
rdfs:label
  • هجوم اللاذقية 2014
  • 2014 Latakia offensive
  • Ofensiva de Latakia de 2014
  • Bataille de Kassab
  • Battaglia di Kesab
  • Bitwa pod Kassabem
rdfs:comment
  • La bataille de Kassab, appelée l'offensive al-Anfal par les rebelles, a lieu lors de la guerre civile syrienne. Le 21 mars 2014, les rebelles lancent depuis la Turquie une offensive sur la ville de Lattaquié. Ils s'emparent de Kessab, située sur la frontière, les loyalistes contre-attaquent et après des combats longtemps indécis, ils reprennent la ville le 15 juin.
  • كان هجوم اللاذقية 2014 هجوماً للمعارضة في محافظة اللاذقية السورية وتم إطلاقه في 21 مارس 2014 من قبل مجماعات إسلامية معارضة بما فيها جبهة النصرة التي أسمته هجوم «الأنفال»، بينما أسماه ائتلاف مكون من جماعات معارضة تنتمي إلى المجلس العسكري الأعلى ب«أمهات الشهداء». وقد ذكر أن أهداف الهجوم هي السيطرة على جميع المراصد الاستراتيجية والقرى الواقعة في أيدي الحكومة بالإضافة إلى ساحل البحر الأبيض المتوسط. وقد ذكر مراقبين أن هدفاً استراتيجياً كان إرغام الجيش السوري على إعادة نشر قواته في اللاذقية، مما سيخفف الضغط على متمردين آخرين في مناطق أخرى من سوريا. وأفادت مصادر أنهم نجحوا في تحقيق ذلك الهدف مع إرسال قوات حكومية من إدلب وحماة وحلب لتعزيز الدفاعات.
  • The 2014 Latakia offensive was a rebel offensive in the Latakia Governorate of Syria launched on 21 March 2014 by rebel Islamist groups including Al-Nusra Front, which called the offensive "Anfal", while a coalition of Supreme Military Council rebel groups called the offensive "The Martyrs Mothers". The objectives of the offensive have been stated to be the taking over of all strategic observatories, government villages and the Mediterranean coast. Observers have stated a strategic aim was to force the Syrian army to redeploy forces to Latakia, which would relieve pressure on other rebels elsewhere in Syria. They reportedly succeeded in this with government forces being sent from Idlib, Hama and Aleppo to bolster defenses.
  • La Ofensiva de Latakia de 2014, también llamada simplemente Batalla de Kasab fue una ofensiva de la Guerra Civil Siria, iniciada el 21 de marzo de 2014 en la Gobernación de Latakia por grupos rebeldes. El bando rebelde estaba liderado por los grupos islamistas Ansar al-Sham, perteneciente al Frente Islámico, y Frente al-Nusra, afiliado a Al-Qaeda.​
  • La battaglia di Kesab, denominata anche operazione Al-Anfal, è una battaglia occorsa durante la guerra civile siriana, iniziata il 21 marzo 2014. L'offensiva, guidata dalle milizie islamiste Fronte al-Nusra e Fronte Islamico ha avuto come obiettivi la conquista dell'ultimo valico di frontiera tra Siria e Turchia rimasto sotto il controllo governativo e la riduzione della pressione dell'esercito siriano nelle zone dove i ribelli si trovano più in difficoltà, come nel Qalamoun, costringendolo a spostare parte delle truppe.
  • Bitwa pod Kassabem – starcie zbrojne toczone od 21 marca do 15 kwietnia 2014 przez Dżabhat an-Nusra oraz ugrupowania wchodzące w skład Frontu Islamskiego i Wolnej Armii Syrii przeciwko oddziałom wojska syryjskiego i lojalnym mu milicjom na kontrolowanych przez syryjski rząd terenach pod miastem Kassab, leżącym w mufahazie Latakia, podczas wojny domowej.
foaf:name
  • 2014 Latakia offensive
geo:lat
geo:long
foaf:depiction
  • http://commons.wikimedia.org/wiki/Special:FilePath/Kesab_gen._view_2010.jpg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Ansar_al-Sham_Flag.png
  • http://commons.wikimedia.org/wiki/Special:FilePath/2014_Latakia_Offensive_Map.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_Harakat_Sham_al-Islam.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_Jabhat_al-Nusra.jpg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_Jihad.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_the_Ba'ath_Party.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_the_Islamic_Front_(Syria).svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_the_Syrian_Arab_Armed_Forces.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Flag_of_Ahrar_ash-Sham.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/Syrian_Resistance_Flag.svg
  • http://commons.wikimedia.org/wiki/Special:FilePath/InfoboxHez.png
  • http://commons.wikimedia.org/wiki/Special:FilePath/InfoboxNDF.png
Relates an entity ...ch it is located.
dct:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Faceted Search & Find service v1.17_git115 as of Sep 09 2022


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3326 as of Nov 15 2022, on Linux (x86_64-generic-linux-glibc25), Single-Server Edition (378 GB total memory, 48 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2022 OpenLink Software