(Slide)
First Previous Next Last     Index

A variety of technologies, dating to D-Day and before, have been developed for military breaching. Some have proven useful in humanitarian clearance, but they have severe limitations.