Iran's Revolutionary Guards Hold Drill in Gulf to Show Tehran's Strength

Published August 5th, 2018 - 01:26 GMT
Iran holds naval drills in the Gulf (Twitter)
Iran holds naval drills in the Gulf (Twitter)

Iran’s "Revolutionary Guards" confirmed on Sunday it had held drills in the Gulf over the past several days, saying they were aimed at “confronting possible threats” by enemies, the state news agency IRNA reported.

U.S. officials told Reuters on Thursday that the United States believed Iran had started carrying out naval exercises in the Gulf, apparently moving up the timing of annual drills amid heightened tensions with Washington.

“This exercise was conducted with the aim of controlling and safeguarding the safety of the international waterway and within the framework of the program of the Guards’ annual military exercises,” "Guards" spokesman Ramezan Sharif said, according to IRNA.

The U.S. military’s Central Command on Wednesday confirmed it has seen increased Iranian naval activity. The activity extended to the Strait of Hormuz, a strategic waterway for oil shipments the "Revolutionary Guards" and Iranian President Hassan Rouhani threatened to block.

 

 

Sharif expressed satisfaction of the exercise, saying they were "successful" and further stressed the need to "to maintain and enhance defense readiness and the security of the Gulf and the Strait of Hormuz and to confront threats and potential adventurous acts of enemies."

One U.S. official, speaking on condition of anonymity, said possibly more than 100 vessels were involved in the drills, including small boats.

U.S. officials, speaking to Reuters on condition of anonymity, said the drills appeared designed to send a message to Washington, which is intensifying its economic and diplomatic pressure on Tehran but so far stopping short of using the U.S. military to more aggressively counter Iran and its proxies.

 

This article has been adapted from its original source.


Copyright © Saudi Research and Publishing Co. All rights reserved.

You may also like