ع
    • Flag of the Hashemite Kingdom of Jordan
    • The Kingdom's Emblem
    • Geography and History
    • The Royal National Anthem
    • Amman Message
    • The Supreme Commander of the Armed Forces
    • Commanders and Chiefs of Staff of the Arab Army
    • Formations of the Armed Forces
    • Honor and Tournament Battles
    • Great Arab Revolt
    • Ranks and Medals
    • The Meaning of the Arab Army Emblem
    • Affilation with the Armed Forces
    • Women in the Armed Forces
    • Legislation
    • A Brief History
    • Patterns of Jordanian Participation
    • Force Command Officers
    • Other Participation
    • The Philosophy of Jordanian Participation
    • Military Observers
    • Participation in the United Nations
    • Benefits of Jordanian Participation
    • Radio Jordanian armed forces
    • Army fm radio
    • Military magazines
    • Photo albums
    • Video albums
    • contact us
    • Address
    • Important Links
    • Military Retirees` Inquiries
    • jaf nato conf 2023

The Northern Military Region foils an infiltration attempt on its northern frontier

  • 04/04/2025

Picture News

An officer from the General Command of the Jordan Armed Forces stated that the Northern Military Region successfully foiled, on Friday, an infiltration attempt by an individual coming from Syrian territory into Jordanian soil through illegal means, within its area of responsibility.

The officer explained that the rules of engagement were applied, and the individual was apprehended and transferred to the relevant authorities.

He emphasized that the Jordan Armed Forces are working with full strength and determination to prevent infiltration and smuggling attempts, ensuring the security and stability of the Hashemite Kingdom of Jordan.


advertisement
  • Flag of the Hashemite Kingdom of Jordan
  • The emblem of the kingdom
  • Geography and history
  • The Royal National Anthem
  • Amman Message
  • Majesty King Abdullah II
  • Commanders and chiefs of staff arab army
  • Formations of the armed forces

(V-6.9)
All Rights Reserved© 2021 ,Directorate of Cyber Security and Information Technology.