How manage threat contact in CQB in according to limited penetration tactics by Project Gecko and the ITCQB system
Viewing entries in
instruction
Limited Penetration CQB by Project Gecko regarding breaching of doors in CQB
Introduction to Limited Penetration in CQB / CQC by Project Gecko