tv [untitled] December 22, 2023 3:30am-4:01am IRST
3:30 am
the defense of the zionist regime, like lieberman , was asked about this issue, keeping silent, because for them, this issue is like one of the holy gaffes and they do not want to allow anyone to talk about this issue and discuss the difficult path to obtain information about this spy malware. we hacked the phone of one of the reporters for several months with the help of p
3:31 am
because these text messages were sent by an unknown number claiming to know information about human rights issues. well, the topic of human rights is an attractive topic these days, and that is why it is used as a trap, and these messages are sent to me. posted by citizen lab. i used a temporary phone instead of my original phone and clicked on the link . internet traffic and phone activities.
3:32 am
i was doing this and i realized that after clicking on that link, a suspicious spy program was installed on my phone. we noticed that when you click on the link for the second time , there is no problem and only the first time. if you click on this link for the second time, it will redirect you to alki's site to make the link look harmless and real, but we clicked on the link for the second time and it redirected us to google. but this was not a normal event. he had a special code with us. we said that maybe this transfer to google is a part of the spy software and that's why we started to scan the internet to see if there are other servers that transfer the user to google in the same way . we did this by using a famous open program. we scanned the source named zimp on the internet , yes, we found 149 other servers that have the same functionality as this spy software.
3:33 am
the phone turns your phone into a microphone for listening and extracting information. sometimes it steals your personal information on the phone, and if there is a political goal in the middle, it can extort money from you or force you to do things that are in line with its own interests, and this is what these spy software can do, and this is very give citizen lab had a very good performance to identify pegasus and the evidence and reviews of experts and experts in the field of technology.
3:35 am
make money. one of the intelligence units of the zionist regime that has been mentioned a lot recently, vahad 820 is the army of the zionist regime. this unit , which is located in the amman sub-group, that is, the military intelligence organization of the zionist regime , is responsible for collecting signal information, eavesdropping, cyber defense, software design, and collecting information from cyberspace. they are information technology , they are working in the form of knowledge-based companies of the zionist regime, and the 82 safar unit mainly carries out its missions under the cover of these doubts. part of the activities of this dreaded unit is designing and compiling new programs for spying and attacking other countries. among these programs, it can be mentioned to disrupt the nuclear program of the islamic republic of iran, i.e. the famous incident of stangnet. in the summer
3:36 am
of 2009, iran's nuclear facilities were attacked by a computer virus that was designed in a complex way. after iran can deal with this cyber threat very well. in the course of breaking the passwords of this virus, iranian experts realize that this malware was designed by the zionist regime and entered the country's nuclear facilities. later , one of the security officers of the zionist regime in the year 2012, with the publication of a book called spying against armageddon, about the involvement of the zionist regime in the stuxnet attack on iran's nuclear facilities, it says that this attack was a joint effort by the united states and the zionist regime. in this attack, unit 82 was an idea of the zionist regime, but the processing it was the americans. the americans liked this plan because they saw that it is less expensive without the use of conventional military weapons. the significance
3:37 am
of this was that for the first time in history, two allies cooperated in an offensive cyber war. william benny more than 30 year for the us national security agency. worked he used to be engaged in cryptography and now he is engaged in profiteering and disclosure. bini is the technical director of the intelligence department of the us national security agency and has a good knowledge of the methods of the us national security agency for data collection and espionage. the first time a smartphone connects to the internet , it is recognized globally. your ip number and everything in your phone for the institutions that monitor the cyber world. quite characteristic. therefore, when your phone is connected, they can find out where and who you are, and then based on that they identify your ip number or consider it. their system is very strong. the system is extremely complete and they identify you extremely well
3:38 am
. much more than what you think. they will definitely identify you with these wonderful systems they have. to identify and prevent terrorism and crime, but people whose phones have been hacked know that the story is something else. when they hear the news, your and mine information may not be of much use to them, but they are definitely looking for certain people, and
3:39 am
it is the same with such spy software. the ability to penetrate private information and hack the target device through perk. how do they use this spy software ? apparently, they were a journalist who was critical of the police and the government, and they followed him and one day he disappeared . when he was working as a reporter for al jazeera, tamer al-mashal
3:40 am
received suspicious messages and threats through various applications. did these restrictions increased over the months and became even more so when he was working on sensitive regional issues. he decided. install a tracker app made by citizen lab on your work phone for possible hacking tracking the usual method of embossing a smartphone. it is done by sending a suspicious message to the target phone , which contains a short text and a link. when the user clicks on the link, the software takes control of the phone and makes the device do whatever command is sent through the link. then the device is automatically connected to a server that hackers use, and this is how the spy software is installed on the phone. the user does not see the spyware that is hacked on the phone. hackers can control the device and all its functions hold hands when
3:41 am
the phone was infected with this software, this malware did what we have seen many other malware do , that is, spying on phone calls, text messages , whatsapp messages, and any encrypted messages that are sent, and it could listen to your camera's microphone. turn on what makes it particularly complicated is that it uses new functions for the iphone to infect its victims and penetrates into iphones very easily. it costs millions of dollars to provide each pegasus spyware to its customers and it can be used only for a short time. that means targeting huge numbers of smartphones over long periods of time costs hundreds of millions of dollars. this very high cost raises the question of who can afford this spyware.
3:42 am
who are the main customers of the group? his israeli group claims on their website that their spyware is only used by government intelligence agencies and at the official request of governments themselves. does this mean other people can't buy pegasus? when people leave the military force of the zionist regime . this information is very specialized and very needed and valuable. and they take this information to private companies like the group, and then they sell this information to other countries, countries that work in line with the interests of the zionist regime and can serve tel aviv and washington . this is the service that these people go to. providing that it can be very useful for them, i can't explain to you how the advancement of technology has made the work of espionage easier. now hackers need to send sms to control your phone they are not high links. once upon a time, users
3:43 am
were warned not to click on a text message containing a link from an unknown number, but today there is no need for that text message containing a link. zero click means hacking without clicking on any link. pegasus does not require any action from the user or any click on suspicious links. israel has gone to the extent that the user receives a call from an unknown person over the internet and the phone is encrypted even without answering the call, that is, with one call without you answering it, it is infected with this dangerous malware. after that, pexas spy software is installed on the target phone and takes full control of the device. this is definitely the most sophisticated attack i've seen in years. the fact is that this software. spyware can be installed on the target person's device without that person even
3:44 am
clicking on anything. this is a zero-click attack. it seems to you that a malware can hack the phone so well and cleanly. it is very complicated and because such capabilities are very few and very rare, that is why we do not have much information about it, and this advanced espionage is very worrying. is a doer but unfortunately there are institutions that continue this. the whole question that arises for everyone is exactly whether pegasus has access to all the applications and contents of the phone or not? they can access everything on the phone , they can access everything in the phone , turn on the camera's microphone , listen to the meetings or conversations that happen around the phone , even penetrate the part of your phone that stores your password and this way they have all your secret information. they are watching you carefully. our research has shown at least 36 al jazeera network reporter
3:45 am
was hacked by pegasus spy software. al-jazeera's dream has always been critical of the zionist regime, and i am not surprised that the journalists of this network are targeted. we still do not have accurate information about the rest. but we can guess that the statistics should be much more. much more than you think . pegasus malware purchase agreements are no longer secret. many reports claim that saudi arabia and the uae spent hundreds of millions of dollars to buy pegasus from the zionist regime. it seems that these contracts after mediation america has become more involved in the agreement to reveal the uae's relations with the zionist regime. well, i have to tell you that until
3:46 am
there was no official or visible reaction, they did not want this issue to be fully revealed. everything was done secretly and under the table with foreign passports. now that these relations are official, i think more of these commercial activities will appear. technology export is part of this relationship. who will bring this technology to saudi arabia, uae, bahrain and other countries?
3:47 am
which is based in the uae and is active in the cyber field as well as dealing with cyber threats fallin parisi magazine and reuters are investigating the cyber attacks of this company, that is, the actions they took to hack them, this report showed you. a group of former cia and national intelligence agency officials from america went to the uae under the cover of this company to do espionage work for this country. yes. they did this thing of going to the uae and doing their espionage work in that country, and maybe without the uae knowing , it is america and the zionist regime that have chosen the territory of the uae to design and carry out cyber operations in the region. especially now that the united states has been forced to
3:48 am
significantly reduce its military forces in afghanistan and iraq due to the pressure of the world's public opinion and its own people . in october 2016, seft wrote a report based on the experience of an italian cyber researcher. dark meter had referred to this person. in this report, it is claimed that darkmeter had said about his plans that they want to reach a point where they can engrave any device in the uae with the push of a button. this report also referred to some employees of dark meter who were former intelligence officials and national security organization of america. may employees they said that he asked them. because american laws restricted some american contractors. these people with huge salaries and
3:49 am
the promise of living in beautiful places, swimming pools, villas and boats. how do they use their own skills for cyber attack, that is, they wanted to serve the emirates and benefit from this service and use it. i visited two companies, the name of one of them was dark meter, it is an industry that amazes me. i feel proud because of such industries that exist in the country and are built by emirati engineers, but this company, with the support of american officers, engages in espionage and actions. it is engaged in sabotage, and now, by revealing more and more the relations between the uae and the zionist regime , it is clear that the zionist regime has also provided hardware to this company. the question is , what does the small country of the uae need such
3:50 am
a power for? they think zionists are ahead of other countries. by appeasing the empires of money, politics and the media, it will ensure its survival. some reports suggest that darkmeter had attempted to hack the intercept website. a report by this american base in july released in 2019. darkmeter used former national security agency hackers and other retired american intelligence and military personnel to hack into the computers of their political opponents, including american citizens, inside and outside of the country. target country. according to the intercept, doc meter's offices were located in this building in abu dhabi. these people. as american citizens who were in another country and were facing a legal problem to analyze the information of american citizens.
3:51 am
of course, this is illegal under american law. this must be mentioned. later , citizen lab revealed that dark matter was the main operator the israeli spy software pegasus was in the united arab emirates. dark meter in addition to american employees. in this way, people are spied on by their own governments, or in some cases by their own governments. this is scary and i think
3:52 am
it is considered as a kind of abuse of this spyware. the reason why governments want to spy on these people is for intelligence purposes, to understand what they intend to do and what they are going to do, and they want to understand what a person is doing and what they are going to do, and the most frightening thing is that america and the zionist regime an excuse to strengthen cyber power these ambitious kings advanced their goals to disrupt the stability of the region. we contacted many victims of this spyware hack. they refused to participate in the film, fearing for their safety and that of their families. rania darridy is a journalist based in london who works with al arabi tv. her phone by pegasus. it was engraved between october 29 and july 2020. someone from the management of al arabi tv told me that my mobile phone was hacked. they connected me to citizen lab
3:53 am
, which was involved in hacking operations. i called one of their representatives and he gave me technical information. i was told that my phone was hacked at least 6 times. citizen lab told me that probably the uae government from pegasus for hackett. my phone was used. probably, i was targeted because i am a journalist of al-arabi tv, but i personally believe that i was targeted because of my close relationship with prominent opponents of the uae. many journalists are being targeted and hacked, but few of them are willing to say come forward and tell their stories, so i think that if we look at some of the most prominent media organizations in the world, we may be able to find other people as well. find out whether to be engraved or targeted. it doesn't matter where you are. wherever you are, you may be targeted by pegasus. both in the region and outside
3:54 am
of it. it does not make any difference for this software. so the question is, with this advanced technology, how can people be sure that their devices are safe from being hacked. in the case of pegasus, it was hard to know that the phone was hacked. if a message you will receive a strange link , do not click on the link, if you receive an unexpected email or a link or file , do not click and please do not open this file, be very careful. be careful, because everyone can be the target of espionage and these are the points that many people do not pay attention to
3:55 am
. there are possibilities to use them in the future. i have no doubt that this again. what is more interesting is that the claimants of human rights and freedom of speech remained silent in the face of such revelations, and their arab allies are also abusing this technology as they wish . what has been revealed about his captive group and their main product, pegasus, are problems it has created many. many countries of the world do not want any trade. have trouble with this company. this company now has a bad reputation. it turned out that from pegasus
3:56 am
to hit human rights. and the mineral rights have been used. i think that, well, you know that they have a lot of sales in the arab world, especially between the countries of the persian gulf. yes, these countries are the main customers. when the contracts are closed under the table , the companies get more money, and this is very profitable for them. this is really good for them, yes. smartphones are essential to us have become inseparable from modern life. however , they have become a window through which security services can access our private information. there are still many things in this world of understanding and spyware that have not been discovered. no one knows who exactly will be the next victim.
3:59 am
in the second phase of the awarding of madh-farsh agencies , another carpet store was opened in qarak shahid beheshti street , guaranteeing price and quality and long-term deals throughout iran, a large number of designs, free shipping and easy purchase in another city carpet store, another carpet store.
4:00 am
it is 4 am tehran time and dear viewers, welcome to this news segment . swedish lawyer hamid nouri, an iranian citizen imprisoned in sweden, said that he will file a complaint with the supreme court of sweden against the confirmation of his client's sentence of recidivism in the appeals court of this country. hamid nouri's family legal advisor najandi manesh had said earlier that the court of appeal has a political view on justice.
19 Views
IN COLLECTIONS
IRINN Television Archive Television Archive News Search ServiceUploaded by TV Archive on