You were chillin out aboard John C Stennis enjoying some well deserved R n R when an alarm sounded.. KHASAB IS UNDER SEIGE! A well armed terrorist group has made a surprise take over of Khasab Air Field, a Oil Rig about 7 miles West of the Coast & a Mosque very close to the Airfield. Our Predator has also ID a ManPad & AAA Emplacement sharing a roof top about 1/2 a mile East of the Airstrip. There is also a deadly mobile SAM SA-15 TOR travelling within a small column patrolling the Airfield & also a MIG-29S coming in Hot from the East & a SU27 Flanker from the North in Hot as well.. both heading for Khasab. And if that's not enough, our Predator has unbelievably ID a SCUD & a SMERCH Unit on both sides of the Mosque. At the Oil Rig there are two Ka50 Black Sharks,one is parked on the Platform & the other is in a low orbit & a small armed speed boat is at the base of the Rig. This terrorist group has made a bold move taking over these assests. So now it's time to do some repossessing..
License: Freeware - Free version, Unlimited distribution
From my ongoing series Dubai Under Siege – A Huey Adventure
Module: Uh-1 Huey
Map: Persian Gulf (PG)
Runtime: Approx 1 Hour
DCS Version: 2.5.6 and Up!
Dubai International Airport has been taken over by insurgents. In an effort to take back control of the airport and the surrounding area we need to insert some fresh boots on the ground. You're assigned a troop transport operation to retake the Al Maktoum Bridge which is a major connection to Dubai International. After that, you are to extract J-Squad located in the town of Sharjah and relocate them to allied Sharjah International Airport.
License: Freeware - Free version, Unlimited distribution
FÜRS KNIEBRETT: KRIM / UKRAINE => Flugplatzkurse zwischen den einzelnen Flugplätzen, Differenz-Höhen, Zeiten bei V=800 km/h, Funkkanäle und RSBN, Landekurse, Detailierte Übersicht für den Flugplatz Kutaisi,
License: Freeware - Free version, Unlimited distribution
We use cookies to provide you with a better onsite experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
Found a typo? Select it with your mouse and press Ctrl+Enter.