Deleted No
Hibernated Yes
Last Checked May 27, 2021

Created

Thu Apr 16 07:59:05 +0000 2020

Likes

1

Retweets

2

Source

Twitter for iPad

View Raw Data

JSON Data

View on Twitter

Likely Available
Profile Image

Laith Alkhouri @MENAanalyst

I’d like to see the cybersecurity threat modeling practices applied in-depth to the physical security field, including terrorism, guerrilla warfare, urban warfare, corporate security and executive protection, cartel violence, and others. https://t.co/hYkK1bDGEI — PolitiTweet.org

Posted April 16, 2020 Hibernated