Indra 2017 exercise: Russian and Indian troops repel attack against humanitarian convoy

Friday, 27 October 2017 05:30

Units of EMD Combined Arms Army and Indian Coastal Defence Troops eliminated a mock terrorist group at Sergeevsky training ground in Primorsky Krai. A simulated attack targeted a secured humanitarian convoy in urban environment within the coastal part of the Indra 2017 international exercise.

According to the scenario, the 40-strong terrorist group attacked a military convoy using a car bomb during a humanitarian action. The security forces had to retreat under an intensive fire and assume the defence. The self-propelled and towed artillery systems and MLRS Grad were used to destroy terrorist reinforcements. Ground units mopped up the city to eradicate the rest terrorists. Tactical assault force airlifted by Mi-8 AMTSh helicopters supported the operation.

Today, before the live-fire exercise, Russian and Indian servicemen adjusted arms and guns of armored vehicles.

Popular articles

01 March 2018

Presidential Address to the Federal Assembly

The President of Russia delivered the Address to the Federal Assembly. The ceremony took place at the Manezh Central Exhibition Hall. The presentation of...
31 March 2018

Russia’s questions to the United Kingdom regarding the...

On March 31, the Embassy of the Russian Federation in London delivered to the British Foreign Ministry a note with a list of questions to the British side...
14 April 2018

Statement by President of Russia Vladimir Putin

On April 14, the United States, supported by its allies, launched an airstrike against military and civilian targets in the Syrian Arab Republic. An act...
Emergency phone number only for the citizens of Russia in emergency in India +91-81-3030-0551
Shantipath, Chanakyapuri,
New Delhi - 110021
(91-11) 2611-0640/41/42;
(91-11) 2687 38 02;
(91-11) 2687 37 99
This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.