0 0
Read Time:1 Minute, 2 Second

Judging by the entire Armed Forces, tactics of “exhaustion of the enemy” are carried out. For a long time (a month), the armed forces carried out active work on the destruction of enemy warehouses in the occupied Kherson region and Zaporizhzhia region, while at the same time destroying the logistical routes of support of the ROV in the form of bridges across the Dnipro River, this made it possible to prevent the advance and offensive of enemy troops, who concentrated on the territory of the region there are more than 25 BTG. From the night of August 29, the Armed Forces began active offensive actions, however, judging by everything, these actions are not the main ones, but aimed at exhausting the enemy, that is, it is only the first wave—preparation, the goal of which is to destroy the enemy’s warehouses and provoke him to introduce reserves from the Crimea ( operational reserve 30% + units that were withdrawn for recovery, in general, this is about 10 thousand servicemen and 2-3 thousand units of anti-aircraft fire). Most likely, the Armed Forces of Ukraine are planning to inflict damage on military infrastructure facilities on the territory of the Autonomous Republic of Crimea in the near future.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence