Iranian tracking – US Military Aircraft Assets – China

Read Time:1 Minute, 18 Second

Zafra Air Force Base, #UAE

Multiple F-15 fighters
1398.05.20 1957 IRDT
Zafra Air Force Base, #UAE
Multiple F-15 fighters
1398.05.20 1957 IRDT
Azerbaijan Air Force Base, #Jordan
Multiple F-15 fighters
1398.05.20 2000 IRDT
Schematic diagram of the locations of two #US F-15 fighter bases
1398.05.20 2000 IRDT
Two hoods for F-22 fighters at Udayd Air Force Base, #Qatar
1398.05.20 2002 IRDT
Zafra Air Force Base, #UAE; two F-35 fighters
1398.05.20 2003 IRDT
Udayd Air Force Base, #Qatar; B-52H Strategic Bombers
1398.05.20 2005 IRDT
Udayd Airport, #Qatar; Three EA-18Q & Two RC-135S Support Aircrafts
1398.05.20 2007 IRDT
Udayd Air Force Base, #Qatar; U-2S Hanger

1398.05.20 2010 IRDT

According to informed sources, #Iran has previously reported logistics information of # US military equipment and assets in the region, as well as information and images of #China in recent months that have now been leaked to the public.
For this reason, after the disclosure of this information by China, the position and logistics of US military assets and equipment are now changing or changing, and are no longer consistent with this information.
It is worth noting that, in recent days, we have seen an unusual increase in US C-17 and C-130 aircraft flights in the region, which may be evidence of this claim. These aircraft are typically used for the transportation and relocation of military equipment and assets.
1398.05.20 2019 IRDT

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post How the NRA Rewrote the Second Amendment
Next post Lab_Dookhtegan Number 19
%d bloggers like this: