This commander elaborated on methods used to target Hamas commanders digitally.
By subscribing I accept the terms of use and privacy policy