0 0
Read Time:55 Second

Announce to all users of #Cyber_Army_Soldiers_Without_Border

As the days of the martyrdom of Sardar Delha are approaching, Generals Haj Qassem Soleimani and Abu Mehdi Al-Mohandes are planning to carry out a large operation on Twitter.

Content axes

The secret of the popularity of Haj Qasim and Abu Mahdi al-Mohandes
2⃣American crime in assassinating resistance martyrs
Emphasis on continuing to take severe revenge on the perpetrators of this crime
4⃣ Emphasis on continuing the path of these loved ones
5⃣The reason for the assassination of the martyrs of the resistance by American terrorists

Operation time

Sunday 14/10/12 from 20:00 to Monday 1400/10/13 24:00

Location: Twitter

هشتگهای عمیلیات

Hero

شهید_ملت

All of us promise on Sunday from 20:00 to rise again against the perpetrators and perpetrators of the assassination of the martyrs of the resistance

محورهای محتوایی

1⃣راز محبوبیت حاج قاسم و ابومهدی المهندس
2⃣جنایت امریکا در ترور شهدای مقاومت
3⃣تأکید بر ادامه انتقام سخت از عاملان این جنایت
4⃣تأکید بر ادامه راه این عزیزان
5⃣علت ترور شهدای مقاومت توسط تروریستهای امریکایی

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence