The Ouch Moment of a Terrorist: When a selfie helped US forces to destroy ISIS secret headquarter

Washington, June 7: A major blunder of one the terrorists proved to be fatal for terror group ISIS. US forces tracked and destroyed ISIS headquarters in Syria following a selfie.

The selfie was posted on social media by a terrorist who wanted to show the command and control capabilities of the Islamic State. However, the selfie worked as a boomerang and helped the US forces to track their secret location.


Hawk Carlisle, the commander of Air Combat Command, was quoted as saying, "These guys that are working down at Hurlburt (Florida), they were combing through social media. And they see some moron standing at this command and control capability for Daesh, ISIL."

Twenty-two hours after seeing the post, US warplanes went in for the kill and destroyed the building, reported CNN. "Long story short...three JDAMs (joint direct attack munitions) take the entire building out," Carlisle said at a speech in Arlington, Virginia.

A JDAM is a kit attached to a conventional bomb that converts it into a "smart" weapon, according to the US Navy. Carlisle did not give details of the type of JDAM bomb or aircraft used.

He was also more careful than the selfie simpleton and didn't specify the location of the flattened HQ. "Incredible work when you think about it," Carlisle said of the operation.

"And it was these incredible airmen out there doing those kind of things," he was quoted as saying in the CNN report. Social media has been a central focus for ISIS to recruit, share their experiences and show off their triumphs.

However, US intel, specifically airmen, have been avidly searching across social media to track down ISIS whereabouts to actively respond.

The terror group has published 1,700 photos, videos and other posts, reaching up to 200,000 users on Twitter and other social media sites, experts told Congress, according to Air Force Times reported.

OneIndia News
(With agency inputs)

Please Wait while comments are loading...