The DRC Gorvenment hasreacted on M23's accusations of “violating its airspace.” This is an attempt to blind public opinion, because it has been 48 hours since, due to weather problems, no aircraft from the FARDC or their partners has been able to take to the air in North Kivu. In this same context, to justify the attacks they launched this Sunday on our positions in Kikubo in the territory of Lubero, the latter signed, on August 24, and published in the public square a press release evoking a deployment of FARDC troops around areas under their control. This was once again a manipulation of public opinion, says the Congolese army.
An experienced CYBER SECURITY ANALYST dealing in transborder crimes on phones,computers,threat intelligence, bug hunting,.... White hat hacking and Repairing phones and reviewer of new technology gadgets
Monday, August 26, 2024
DRC army reacts on M23's accusations of violating it's airspace
The DRC Gorvenment hasreacted on M23's accusations of “violating its airspace.” This is an attempt to blind public opinion, because it has been 48 hours since, due to weather problems, no aircraft from the FARDC or their partners has been able to take to the air in North Kivu. In this same context, to justify the attacks they launched this Sunday on our positions in Kikubo in the territory of Lubero, the latter signed, on August 24, and published in the public square a press release evoking a deployment of FARDC troops around areas under their control. This was once again a manipulation of public opinion, says the Congolese army.
Subscribe to:
Post Comments (Atom)
The core ,dangerous and malicious strategies of ISIS our Moslem communities in Uganda should be careful of.
From its emergence to the present day, ISIS has heavily invested in and operated through three core strategies, which elucidate the founda...
-
With the widespread availability of the Internet today, there are still times when it may not be feasibly available. Be it on a flight, du...
-
msticpy is a package of python tools intended to be used for security investigations and hunting (primarily in Jupyter notebooks). Most ...
-
A new way for cybercriminals to create fake social media profiles and carry identity scams using Artificial Intelligence powered tool? A ...
No comments:
Post a Comment