Don’t Be Surprised: A US Military Drill with ISIS in the Syrian Desert!

They told you they are in Syria to fight ISIS, but ISIS only grew during their illegal intervention, if you were still wondering how, you know nothing about the US foreign interventions.

Not only the US army drops weapons, food, and medical supplies to ISIS cells in the open desert between Iraq and Syria, most of which they claimed it was by mistake, they are now bragging about their strong relations with their ‘partners’ ISIS and its affiliated groups.

Here we’re talking about a terrorist group called ‘Maghawir Thawra’ (Revolution Vanguard), it’s based in the depth of the Syrian southeastern desert in the Al Tanf border area, it controls the infamous Rukban concentration camp where thousands of Syrian refugees are held in inhumane, disgusting, and horrible conditions, and it carries out its terrorist attacks against the Syrian remote villages committing horrendous massacres and assassinations then retreating to a ‘safe zone’ of 55 square kilometers protected by the world’s largest army, illegally.

While the Syrian Health Ministry is unable to import the most needed medical equipment due to the US and EU sanctions and blockade on the Syrian banking system and Syrian merchants, these terrorist groups are enjoying direct aid from the US taxpayers.

Details in this report: US Army Carried out ‘Military Drill’ with ISIS Affiliate in the Syrian Al Tanf – Video included.

If you want us to remain online, please consider a small donation, or see how you can help at no cost.
Follow us on Telegram: link will open the Telegram app.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: