Category: active shooter
Send Him to Ukraine
#Cyber-attacks against “Commander of the Resistance, #Amerli Battle” game – The Full Story
At the beginning of 1998, Sardar Haj Ghasem Soleimani had a demand that the lives of the soldiers defending the shrine should be portrayed properly in today’s language, and we would have liked Sardar Haj Ghasem to be present today when we are going to unveil this game. While we were writing the game “Nabl and Al-Zahra”, that tragic event took place at one and twenty minutes on Friday night, the 13th of January, and Hajj Qasim Aziz was martyred. During one of the Friday prayers, the Supreme Leader of the Revolution recounted a memory of Hajj Qasim and said that in an area surrounded by 360 degrees of the enemy, Hajj Qasim finally entered the city by helicopter and liberated the city with the help of the people’s forces. “After examining this fascinating memory, we realized how much it has the potential to become a glorious and fascinating game.”
The city of Amerli in Iraq’s Salah al-Din province was under siege for 80 days by the takfiri terrorist group ISIS. In September 1993, the siege was broken by attacks by the Iraqi army and the popular uprising.
Armed attack in the #Austrian capital
The Islamic State claimed responsibility for the terrorist attack in Vienna, Austria by publishing a photograph of the terrorist Abu Dujan Al-Albani. VIENNA – Police Vienna confirms: -Shots at 8pm -Severeal attackers with rifles -1 dead, many wounded -1 attacker killed by police [My guess is there are many more dead, as I saw footage…
Drone shoot down LMADIS – Iran says did not happen
The Pentagon claimed to have captured its signals through Jamming and the E-UAV first and then targeted it with LMADIS. 📡 US has launched a UAV with a new device called LMADIS or Light Marine Air Defense Integrated System. An image of a new US anti-drone vehicle called LMADIS on the USS boxer’s deck that…
Read More “Drone shoot down LMADIS – Iran says did not happen” »
Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery
HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and…
The 12 Days of Cyber Christmas
…or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be…
Active Defense – Strike, CounterStrike, Mercenary or Vigilante?
The opponent lands combination after combination to the head, ribs, and kidneys. This barrage continues until the defender boxer is knocked out, dragged off the mat to hopefully fight another day. The fighter cannot continue. (Bardin, 2011) This picture is much like our cyber defenses today. Culturally trained to block every punch, cyber defenses attempt…
Read More “Active Defense – Strike, CounterStrike, Mercenary or Vigilante?” »
Washington Naval Yard Shooting – Case Analysis – Utica College Masters in Cyber Intelligence and Forensics
On 16 September 2013, Aaron Alexis conducted a mass shooting in Building 197 at the Washington Navy Yard. He was a lone shooter killed by police after killing 12 and injuring 8. There were former instances of misconduct and mental issues. These are not considered in issuance of Common Access Card (CAC) or clearance. There…

You must be logged in to post a comment.