0 0
Read Time:51 Second

Islamic State resources released a statement detailing the massive attack on the Hasakah prison. According to propagandists, the attack began with a self-explosion of two suicide bombers. Then one of the militant groups broke into the institution, and the other ambushed those units of the Syrian Democratic Forces (SDF) that could join in the suppression of the attackers.

Epic Gherwan / Destroy walls
Congrats

According to the terrorists, in total they released about eight hundred prisoners. The ISIS-affiliated agency Amak published a video of captured SDF fighters who asked the command to start negotiations with the militants.

Currently, hostilities continue in the city of Al-Hasakah. To counter the militants, the SDF pulled armored vehicles, including tanks, into the settlement. The buildings where the jihadists have taken refuge are being attacked by the US Air Force. The leadership of the SDS appealed to the militants barricaded in the prison with an appeal to lay down their arms.

Contact safe_rewards.com with info on terrorists activities
Malay ISIS Support

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
100 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence