0 0
Read Time:1 Minute, 6 Second

I will compare two cyber attacks for you, see the difference between us and them. #IRGC #Cyber

Some time ago, during a cyber attack, we managed to hack the CIA, the encrypted codes of the list of CIA spies around the world were broken, and we obtained the names, addresses and details of thousands of CIA-related forces.

Broken lists and codes were made available to our strategic partners such as Russia, Jane, etc., and many of these agents were either arrested, killed, or doubled.

This caused a great deal of scandal for the US intelligence service, which also imposed very high costs on them.

Along with this issue, Iran’s position and cyber power also greatly improved among friendly and hostile countries

With all their might, they were able to carve the country’s fuel system and disrupt the distribution of the country’s gasoline for several hours, as well as change the text of several billboards.

  • I have nothing to do with humiliating the enemy
  • I have nothing to do with the weakness of the enemy
  • I have nothing to do with this non-strategic and insensitive action

I’m just saying wait for a cyber action that is tens of times more sensitive, strategic and crippling
We do not reach the mountains, but we reach Israel and the United States.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence