Skip to content

Nachrichtenagentur Radio Utopie

Nachrichten weltweit direkt von der Quelle. News worldwide directly from the source. Deutsch, English. Democracy first!
  • Start
  • Nachrichten / News
  • Ticker
  • Archiv
  • Status
  • … the FAQ?!
  • Support Radio Utopie
  • Hauptseite / Main Site
28.09.2020 - 13:21 [ 168.am ]

Azerbaijan hired jihadist terrorists, militants from Syria to attack Artsakh – names released

The Syrian militants have arrived to Azerbaijan through Turkish territory.

Below is a list of the divisions and losses.

1) al-Sharqiya rebel group – 19 militants

2) Hamza Division – 4 militants

3) 51-rd Division – 9 militants

4) Jaysh al-Nukhba group – 11 militants

5) Levant Front – 22 militants

6) Al Furqan Brigade – 33 militants

7) Al-Mutasim Division – 6 militants

Nachrichten Kategorie: Weltöffentlichkeit / World Public Opinion. Nachrichten Schlagwörter: Angaben / Behauptungen (Verlautbarungen) / Beschuldigungen / claims / accusations, Armenia / Armenien, hört hört.. / hear hear..., Invasion of Nagorno-Karabakh by Azerbaijan / Invasion von Berg-Karabach durch Aserbeidschan 2020, Paramilitärs / Söldner / Milizen / Proxies / Attentäter / paramilitary / mercenaries / militias / contractors / proxies / assassins, Staatsstreiche / Umstürze / Versuche / Invasionen (Angriffskriege / Interventionen) / coups / attempts / regime changes / invasions (aggressions / interventions), Stationierung / Abzug / Rückzug von Militär / Milizen / Polizei / military / militias / agents / police) transfer / deployments / buildups / withdrawals, Syrien / Syria, und Türkei / Turkey.

Post navigation

← URGENT: Martakert town under bombardment from Azerbaijan History of Nagorno-Karabakh: Soviet era, 1921–1991 →

Your Party Founding Conference – Day Two

status reports:

  • Mysterious technical problem: what a waste of time 7. November 2025
  • Some downtime due to technical glitch. 18. August 2025

our news feed:

RSS Feed / Atom Feed

search the archive dating back to 2010:


Impressum
Datenschutzerklärung

^

Guess what - we are using cookies.