Critical Engagement’, the apex of the joint Tri-service mega Field Training Exercise (FTX) of the Army, 'Cormorant Strike IX - 2018’ dominated largely by Special Force and Commando Regiment troops and backed by sailors, airmen, mechanized infantrymen and foreign troops got off the ground at Kuchchaveli, Trincomalee on Wednesday (26), before a mammoth gathering of state officials, commanders, tri-servicemen, invitees, media personnel, onlookers and local civilians, Army media unit said.
The final phase of this annual FTX, technically defined as the ‘Critical Engagement’ vividly displayed how a simulated multi-pronged joint amphibious attack on enemy hideouts could be carried out with precision and short notice in a setting, considered hostile, most challenging and exciting.
Along with 2500 troops, infantrymen and mechanized infantrymen, inclusive of 400 Sailors and 200 Airmen, the FTX was made up largely of Army Commandos and Special Forces. To the credit of the Sri Lanka Army, the FTX has attracted a total of 64 foreign service personnel, representing 19 countries, either as participants or observers in the Operation proper.
Foreign participants and observers from China, India, Pakistan, Bangladesh, Turkey, Indonesia, Nigeria, Nepal, Sudan and Zambia contributed productively to the consecutive 9th FTX in close cooperation with fellow service personnel participating in the FTX during the three-week long training.
Today’s simulated lightening attack of ferocious magnitude, headed by Commandos and Special Forces, where they were simultaneously joined by MI 24 and MIG fighter jets and Naval fighter craft at sea struck enemy positions in a convincing manner, identical to that of a real battlefield scenario.
The FTX is aimed at enhancing the military cohesion, combat preparedness, operational readiness and efficiency of Special Operational Forces and is on par with similar Exercises at international levels.
https://casite-790485.cloudaccess.net/news/2432-daring-final-mock-attack-in-kuchchaveli-smashes-enemy-hideouts#sigProId1f9459e3e1
Leave your comments
Login to post a comment
Post comment as a guest