0 0
Read Time:1 Minute, 1 Second

Hello to all freedom fighters
Following the revelation of Fabli about Sajjad Ajmi, we have received new details about this army bastard, which we share with you friends:


Watchdog: Sajjad Ajmi Kashani
Organization: Supply and Security Center (Meta)
Responsibilities:

Responsible for infrastructure security, responsible for IT and responsible for providing SIM cards for cyber terrorist attacks of the Cyber Corps

https://wp.me/p3HRNS-9IA

Name of cursed father: Muhammad Hossein
This terrorist was born in: 1369
Car: Peugeot 206, white, 26 L543 Iran 10

The name of his prostitute wife: Mina Heydari

National code of this female prostitute: 0480558116
Telegram of this prostitute: @m770000

Ways to contact this impure egg:
Contact number: 09195312778

Residential location: Tehransara, North Naft St., Bistem Alley (Ghariban), Shagaig Tower, Unit 407

hello to our dear compatriots,
with your help we are proceeding well with our exposures.
in continuation to the info you sent us about the terrorist cover company DSPRI under the management of Amir Lashgarian, the head of Sepah Cyberi, our freinds told us about two more terrorist cover companies that are related to DSPRI: Sabrin Kish, and Azarakhsh Ista Tavan.
please send us any info you have about these companies, their type of work, their workers, and their connection to Sepah.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence