Young Journalists Club | Latest news of Iran and world

News ID: 46020
Publish Date: 11:41 - 09 May 2020
Tehran, 09 May_Russian troops are helping Venezuela in its search operation for members of a force that made an unsuccessful incursion attempt by operating drones over the Latin American country, according to a report by local news outlet El Nacional.

Russian troops helping Venezuela search for members of failed incursionCiting deleted tweets from a military command, known as ZODI La Guaira, the local media reported on Friday that at least eight Russian Special Forces members will be “operating drones to run search and patrol operations” near the northern state of La Guaira.

El Nacional posted a screenshot of the tweet which it said was later deleted on Thursday.

It also reported that an aircraft arrived at Venezuela’s international airport on Thursday in order to join the search mission.

El Nacional said this tweet was also later deleted on Thursday from ZODI La Guaira military command’s profile.

It was not immediately evident why the tweets were deleted. 

The Information Ministry did not immediately respond to a request for comment.

On Friday, ZODI La Guaira posted a tweet saying the military command “categorically denies interference by the Russian military” in its ranks.

The post included a screenshot of a tweet from user @YourNewsAnonLat about Russia’s alleged support, saying the claim was “Fake News.”

The post did not address the screenshots of the previous alleged tweets from the account.

Before dawn on Sunday, a group of US-backed mercenaries tried to intrude into the northern state of La Guaira on boats, but Venezuelan authorities foiled the attack — which was launched from Colombia — killing eight of the armed men and arresting several others.

In a state television address on Monday, Venezuelan President Nicolas said authorities had detained terrorists involved in the Sunday attack, including two Americans. The two US citizens were identified as Airan Berry and Luke Denman.

Your Comment
* Comment:
* captcha: