Skip to main content

Posts

Showing posts from January 1, 2017

SHOOTERS DRESSED AS SANTAS STORM NIGHTCLUB IN ISTANBUL. AT LEAST 35 KILLED, 40 INJURED.

At least 35 people were killed and 40 badly wounded in the attack, Istanbul’s governor Vasip Şahin said, calling the incident a terrorist attack. 
The attack took place at the well-known Reina nightclub in the Ortakoy neighborhood, in Istanbul’s Besiktas district. A policeman and a civilian are reported to be among the two known casualties at the nightclub. There were two attackers involved, according to NTV, but conflicting reports also described a lone gunman. 
The gunmen were dressed in Santa Claus outfits, wielding assault rifles, Turkish media said. The attackers opened fire on clubgoers, injuring at least 20-30 and killing two, according to NTV. One of the gunmen has reportedly hidden inside the club, while the whereabouts of the second one were not immediately clear. 
The number of casualties may rise, as it is estimated that between 700 and 800 people could have been in the club at the time of the attack, Mynet Haber reports. Emergency crews have been evacuating injured people…

AH-64D APACHE LONGBOW ATTACK HELICOPTER (INFOGRAPHICS)

The AH-64D Apache Longbow is a US four-blade, twin-turboshaft attack helicopter for rear, close, and shaping missions including deep precision strike. It is able to conduct distributed operations, precision strikes against relocatable targets and to provide armed reconnaissance in day, night, obscured battlefield and adverse weather conditions.

The AH-64D Apache Longbow is equipped with a glass cockpit and advanced sensors. The AN/APG-78 Longbow millimeter-wave fire-control radar (FCR) target acquisition system is capable of simultaneously tracking up to 128 targets and engaging up to 16 at once. A radio modem integrated with the sensor suite allows data to be shared with ground units and other Apaches, allowing them to engage targets detected by a helicopter. Click to see the full-size map

ISIS COMMANDER FLEES TO EUROPE WITH 400 FIGHTERS DISGUISED AS REFUGEES – REPORT

According to the Italian intelligence, one of the commanders of the Islamic State (IS) terrorist group has left the Syrian battlefield and returned to Europe with about 400 fighters of his group.


Lavdrim Muhaxheri, also known as Abu Abdullah al Kosova (Photo: liveleak.com)

Lavdrim Muhaxheri, a former NATO soldier, who became a commander of the Islamic State (IS) terrorist group, has left the Syrian battlefield and returned to Europe with about 400 fighters of his group, posing themselves as refugees, the Daily Mail newspaper reported, citing a report of the Italian intelligence.

According to the report, Muhaxheri, also known as Abu Abdullah al Kosova, is a Kosovo Albanian, who was trained at the largest military base of the US Army in the Balkans. The US State Department has recognized him as a serious threat to Kosovo and Albania, as well as a global terror threat after his accession to the IS.

Muhaxheri is not only one of the most active recruiters of the IS, but also one of the most pu…

RUSSIAN HACKERS’ PENETRATE US POWER GRID WITH ‘OUTDATED UKRAINIAN MALWARE

Originally appeared at RT
A Vermont utility sounded the alarm after finding malware code on a laptop that the FBI and DHS had touted as associated with Russian hackers. However, cybersecurity specialists say the code came from an outdated Ukrainian hacking tool.


On Thursday, the FBI and DHS released a joint report on a hacking operation they called ‘Grizzly Steppe’. They claimed the operation was linked to the Russian government, alleging that it had targeted “US persons and institutions, including from US political organizations.”

Along with the report, the US security agencies released a sample of the malware code allegedly used in the Grizzly Steppe operation to compromise US computer networks. The code was also shared with executives from 16 industries around the nation, including the financial, utility, and transportation sectors, according to a Washington Post report.

On Friday, Burlington Electric, a Vermont-based power company, released a statement saying that the malware code had…