Skip to main content

tv   [untitled]    August 31, 2023 1:30pm-2:00pm IRST

1:30 pm
[000:00:00;00] the zionist army has trained forces to carry out cyber attacks or hacking and is expanding its activities to this company, and so far it has reached certain results that cannot be predicted. the zionist regime, the intelligence unit of the zionist regime, the rules of the zionist regime, this company operates under the supervision of the ministry of defense of this regime, and it works . it is called the 8200 unit. it is very big to establish so that these companies can
1:31 pm
get what they need, that is, to make money. definitely money in biyaram is one of the intelligence units of the zionist regime, which has been mentioned a lot recently. it is the 8200 unit of the zionist army. it is a unit under yaman , or the military intelligence organization of the zionist regime. it is in charge of 80 units and 20 of them are graduates and specialists in the field of information technology and it is working in the form of knowledge-based companies of the zionist regime . unit 8200 mainly carries out its missions under the cover of this company and this unit designing and compiling new programs for spying and attacking other countries
1:32 pm
, among them, it can be mentioned to disrupt the nuclear program of the islamic republic of iran, that is, it is the same famous story. it is designed in a complex way that iran can deal well with this cyber threat. iranian women experts, in the course of breaking the passwords of this virus , realize that this malware was designed by the zionist regime and entered the country's nuclear facilities until one of the security officers of the white regime in 2012 with the publication of a book called spy, peace be upon him, about the involvement of the zionist regime in the attack on iran's nuclear facilities, says that this attack was a joint attack by the united states and the zionist regime, and that this attack was carried out by unit 8200, along with the american national security agency and moses and black. the idea of ​​processing it was the work of the americans. the americans liked this plan, they saw that it was cheaper without the use of conventional military weapons. the importance of this
1:33 pm
issue was that they cooperated for the first time in an offensive cyber war on the 29th. this was previously engaged in encryption. and now in the face he is the technical director of the intelligence department of the us national security agency and has a good knowledge of the united nations' methods for collecting 12 and spying. when a smartphone connects to the internet , it is globally recognized as you and everything on your phone. for those who do, it is completely clear, and that's why when your phone is connected, i can understand where and what you are, and they must identify your ip number or take it into account. their system is very strong, the system is perfect. and they recognize incredibly well
1:34 pm
, much more than you think you will definitely be identified with these wonderful systems that were built in the province that citizen took part in the nsa incident and the pegasus spy software in 2016. there have been controversies at the world level and the installer claims that he is looking for the development of technology is for government agencies to detect and prevent terrorism and crime, but people who have been exposed to the phone know that when the pegasus news broke a few years ago, it mainly targeted human rights activists, politicians, and others . who had great wealth, why my information and
1:35 pm
it is very useful for them, but they are definitely looking for certain people, and the same is true of most spy software with the ability to penetrate private information and hack the target device through the most widely used applications, i.e. those used by many users, such as whatsapp, telegram, and instagram. it is estimated that in 2019, it was owned by facebook. it is accused of helping the popular communication tool. this caused panic among a large number of whatsapp users, until some victims and terrible consequences were faced. such it becomes difficult to take actions against the death of people, but in the case of saudi arabia, we saw in the khashoggi issue, tracking information about things that he said and did not say, and stopped collecting. in the end , i became him in a terrible operation, and it was easy
1:36 pm
for him to be the one who put me at risk. and i deleted in mexico we saw how the mexican police and security services used these spy software and ana was 1 coin of the police and government area and following and one day she disappeared until she was working as a reporter for al jazeera. tattoos and suspicious text messages through different applications he found that we had increased and he was working on sensitive issues in the region. he was even more likely to install the radio app on his work phone to track possible hacking . a suspicious message is sent to the target phone, which contains a short text and a link, and when i click on the link, the software
1:37 pm
takes control of the phone and works to make the device perform any command sent through the link. it is automatically sent to a server that hackers use this is how spyware is not installed on the phone. the user does not see the hacked spyware on the phone. they can take control of the device and everything. when the phone is infected with this software, this malware does what we have seen. what other malware does is to spy on phone calls and text messages, whatsapp messages and any encrypted messages that are sent and turn on the microphone and camera. what made it particularly complicated was that new functions for iphone was used to infect the victim and
1:38 pm
it's easy to get iphones and each one of pegasus spyware costs millions of dollars to deliver to its customers, and it can only be used for a short period of time, meaning that targeting a large number of smartphones over a long period of time costs hundreds of millions of dollars. this very high cost raises the question, who can afford this spy software ? who are the main clients of ansar group? is used does this mean that they can no longer buy the pegasus and the foreign military forces of the zionist regime, this information is very specialized and very needed and valuable, and they take this information to private companies such as the group and this information to other countries.
1:39 pm
they are sold to countries that work in line with the interests of the zionist regime and can serve tel aviv and washington . providing these services in this regard will be useful for them. you don't need to send text messages containing links. at one time, users were warned not to click on a text message containing a link from an unknown number. today , there is no need to send a text message containing a link. it means that it has been hacked without clicking on any link. an action from the front, does it have any questionable rules? this israeli software has advanced to such an extent that the user receives anonymous calls through the internet, and the phone
1:40 pm
is called even without answering, that is, with a call without you answering. don't get infected with this terrible malware from that spy software plus is installed on the target phone and takes full control of the device . they made the most sophisticated attack. in the past few years , i saw that this spy software can do something on the target person's device . it can be seen that a malware can hack the phone so well and cleanly, and it also has very few and very rare capabilities , that's why we don't have much information about advanced espionage, it's very worrying. unfortunately , there are men who do this, for example . this is exactly what happens to everyone
1:41 pm
whether pegasus has access to all applications and content or not , they can access everything on the phone . infiltrating that stores your passwords and thus they have all your secret information and you according to the location monitoring of our research showed that at least 36 journalists of al jazeera network were hacked by pegasus spy software. al jazeera has always been critical towards the zionist regime and it is no surprise that targets the journalists of this network and the others we still don't have accurate information , but we can say that the statistics must be more wet , much more than what you think , pegasus malware purchase contracts are no longer hidden in
1:42 pm
many reports from far away kurdistan and the uae paid hundreds of millions of dollars to buy pegasus from the zionist regime. it seems that these contracts have increased even more after the mediation of the united states in the agreement to reveal the relations between the uae and the zionist regime. era there has been a significant increase in the complete security cooperation programs between the two countries, which resulted in the exchange of information and the uae and invested millions of dollars in the spying software of the zionist regime
1:43 pm
. it was done with foreign passports when these relations became official. i think most of the commercial activities will appear. the export of technology is part of this relationship . considering foreign competitors like iran is not used, it is also used against enemies inside the country
1:44 pm
. the threats of foreign policy and reuters website were investigating the cyber attacks of this company, i.e. the actions they had taken to hack them, these reports showed that a group of former officials of the cia and the national intelligence agency from the united states went to the uae less often under the cover of this company. up for this country is doing espionage work, i went to your novel and in this country soviet espionage was done and maybe without the uae knowing it is america and the zionist regime that have chosen the territory of the uae to design and carry out cyber operations in the region, especially now that the united states has been forced to significantly reduce the military forces of the army in khuzestan to iraq following the pressure of the world public opinion and its own people . in october 2016, the american internet advertising website
1:45 pm
published a report based on the experience of an italian cyber researcher. it was claimed in this report that about his roles, he said that they want to reach a position in the uae with the push of a button. the composer of this report also mentioned some employees of the article, who were officials of asghar intelligence and the national security organization of the united states . they said that he asked them in the name of protection. in 2015, the uae national security started cyber operations against the woman and the procurement company and the close relationship with the defense service of this country . american contractors and it limited these cool people who didn't say, and then living in beautiful places , villas, swimming pools and yachts, attracted
1:46 pm
them to use their skills for cyber attacks, that is , they wanted to serve the emirati and benefit from these services. take it and use it . and now by revealing more and more and emirates and the zionist regime is clear that the zionist regime has been responsible for the hardware supply of this company, the small country of the emirates, and what is the need of the uae, which is taking steps ahead of other countries to reveal relations with the zionist regime, by gaining the satisfaction of the political money empires.
1:47 pm
and the media was established will guarantee that some reports indicate that he had tried to hack into the internet site. a report published by this american base in early 2019 says that the former national security agency of the united states and other retired american intelligence and military use had done to target the computers of their political opponents, including american citizens, inside and outside . according to this side, a meter of building land is located in abu dhabi. these people are american citizens who are in another country and to analyze the information of american citizens with heart problems. faced with this, according to the illegal american laws, it must be acknowledged that later c showed that it
1:48 pm
was the main operator of the israeli spy software pegasus in the united arab emirates, and that in addition to american employees , former officers of the zionist regime were also used in branches in the uae and singapore. the company reported has spent millions of dollars on services and i think one of the things that make us more and more aware is that countries like the uae have great ambitions in the field of cyber space, they are trying to imitate this technology in our country, this is very dangerous, especially that the headphones of journalists and the protesters are civil societies, these people are being spied on by their own governments and in some cases by their own governments, this is scary and i think it is a kind of misuse of spy software, the reason why i want the government to spy on these people. mind i want to find out what the person
1:49 pm
is doing and what he is going to do, and the most frightening pool of the united states and the zionist regime, under the pretext of strengthening the cyber power of this king, have set their goals to disrupt the stability of the pre-loser region. many of the victims of the spy software we contacted from every side of themselves and their families objected to the movie, which cooperates with al-arabiya tv . it was hacked by pegasus on july 29, 2020. the management of al-arabiya tv told me that my mobile phone was hacked and he put it on his lips he was working in the field of hacking operations. i contacted one of their representatives and he gave me information about the techniques and degrees and they said that
1:50 pm
my phone had been hacked at least 6 times. i was targeted because i am a reporter for ali tv. i was targeted because of my close relationship with prominent opponents of the uae . i was targeted and hacked, but few of them are willing to come forward and take their story, so i think. if some of the most prominent let's look at the media organizations of the world, we can find other people who are hacked or targeted, it doesn't matter where you are, wherever you are, you may be targeted by pegasus, whether in the region or outside it , it doesn't matter for this snap software, so the question is with this advanced technology, how can people be sure
1:51 pm
that their devices are safe from hacking? in the case of picasso, it was difficult to understand that the phone was hacked . take and please this do not open the file, be very careful because they may be spied on and many people do not pay attention to these tips in this way that we can receive training, but in the end we have to do the useful ourselves so that we can use these features in the right way. use it, and if they are recognized by apple or android or others, they will connect the devices that are not yet known , they also have vulnerabilities that can be exploited , there are organizations all over the world that are looking for vulnerabilities
1:52 pm
to use in the future i have no doubt that this it will happen again, the only issue is the timing of the meeting is that the claimants of human rights and freedom of expression were silent about this disclosure and the arab allies of the ninth koran, if they want , i will abuse this technology, what i have revealed about the israeli group and their main product, the spy. it caused many problems that many countries of the world did business with this company because of the problem. this company has become famous until now . it turned out that it used pegasus to attack human rights and mineral rights, and i think you know that. having a lot of sales in the arab world, especially
1:53 pm
between the persian gulf countries and these countries, being the main customers when the contract is signed , the companies have more money for them, it is good for them, it is very good for them, this is really good for them. it has turned out that the afghan security services can have private information of mother sasi . there is still a lot in this mysterious world of women and spy software that has an eye on
1:54 pm
who exactly will be the next victim . more than this experts prefer to get dollars from the market and convert them into dinars in iraq . for some years , dinars were not found in the exchange offices , and people had to buy dollars from the exchange offices. i don't know how many around ferdowsi square, i said, i don't know, only the dollar, the price of the dollar, there is no need for the cross section of this banknote in a particular decade and it is used, many exchanges are not willing to
1:55 pm
supply the capital of one year, for example, for 10 days in tomans , the pressure of demand is from the general manager in the past, the central bank has influenced the fluctuation of the currency market, mr. beh it was cited as one of the reasons for the increase in the price of the dollar. in the past, but in certain seasons , there are fluctuations in the currency market on the occasion of arbaeen. all of this together increased the demand in the currency market seasonally, but this year the issue was a little different. by injecting dinars into the banks, the central bank was able to completely eliminate this pilgrimage. this year, the iraqi dinar took
1:56 pm
sinai dinars even to the most remote villages by the people of the media . every thousand dinars in the open market the book was about 38,500 tomans, 38,500 tomans every 1,000 dinars reduced by a few thousand tomans. the free market of cheap cars, with the presence of 32 , so far, 900,000 people have been able to receive the arbaeen currency in dinars, which is half of the registrations.
1:57 pm
in person, gouders samieh mardani of sed and sima news agency, many people spoke, but there was no hair with the people, with mutual self-reports , there is a train game, there is an underground train in the field of energy, the most important area of ​​reserves, strategies and horizons of the free zone , the first consumer and evaluation and arbitration with you on the front page
1:58 pm
of khabar network every night at 19:30 a silk carpet completes your arrangement, but i like the simpler parts of the series, they are memories and patterns are old, but anyone with any style and taste can complete their arrangement with one of the modern and classic hand-woven or machine-made heavenly carpets and choose we can pay up to 24 installments, the complement of any arrangement of excitement and different
1:59 pm
sizes for all ages in installments without guarantor in the iranian house
2:00 pm
, vitality and health in the big iranian house . the industrial sabotage of the spy service of the regime zionists in iran's aircraft missile industries, with the help of the information protection organization of the ministry of defense

26 Views

info Stream Only

Uploaded by TV Archive on