IG came up with a way to disrupt the presidential elections in Egypt

684

Photo: Amr Abdallah Dalsh / Reuters

Militants associated with a terrorist group “Islamic state” (IG, is prohibited in Russia), they intend to disrupt voting in the upcoming elections of the President of Egypt. About it reports on Monday, February 12, Associated Press.

According to the Agency, the network has a video in which a jihadist talks about the planned attacks during the vote and asks the Egyptians to stay away from polling stations. He calls the elections an apostasy and urges allies to shed blood.

The authenticity of the 23-minute video has not been confirmed, however it is very similar to the distributed IG earlier, notes the AP. In the video mentioned began last week operation for the Egyptian military, also contains footage of past attacks of ISIS in the Sinai Peninsula and the killing of unarmed soldiers and men suspected of having links with the security forces. Video excerpt publishes Telegram-channel 4 Directorate responsible for monitoring activities of terrorists.

The army and police of Egypt launched a large-scale anti-terrorist operation in the Sinai Peninsula, and also in the Nile Delta and the desert areas in the West of the country, on the morning of 9 February. Air force began to strike blows to positions of terrorists, and the population is urged to cooperate with security forces. According to Al Arabiya, from the beginning of the operation were eliminated 28 militants, 126 were arrested from the air and destroyed 60.

Presidential elections in Egypt will take place March 26-28. Participate in them will be the two candidates: incumbent President Abdul Fattah Al-Sisi, and also submitted documents 15 minutes before the deadline Moussa Mustafa Moussa — the Chairman of the party “Tomorrow” (El-Ghad Party). He is considered a politician supporting the current leader. Another candidate was not allowed, and five starred.

Video, photo All from Russia.



LEAVE A REPLY

Please enter your comment!
Please enter your name here