tv [untitled] September 17, 2023 4:30am-5:01am IRST
4:30 am
we are willing to accept the fire because all computer and internet systems can be hacked. the pegasus zionist regime is the producer of the most advanced spy software in the world. this issue was first noticed in 2016. these spy software and they bought it, but what is the purpose of producing this software, who does it target with what motivation , and in whose interests is it used? when the defense ministers of the zionist regime were asked for an example about this issue, they kept silent because this issue is like a sacred cow for them and i don't want to allow anyone to talk about it and discuss it
4:31 am
, the hard and difficult way to get information about this spy malware. for several months, we monitored the hacked phone of one of the journalists with the help of a research institute called citizen kokab. the investigation about yazen kokab's delay was the first time that the existence of spy software of the zionist regime was held in 2016. this company provided information about the infrastructure of abuser the release related to the mobile phone of an emirati activist, the information obtained through the phone and its verdict led to the arrest of a person named ahmed mansour , until today, the new technique is still called "zero", gas-burning electricity, software that the zionist regime used to hack.
4:32 am
ahmed masoud's phone has been used by the pathogen, who has been working on this issue for several years as a prison expert , what happened in 2016 , he started working with this man, ahmed mansour, a building operator, he noticed a number of suspicious text messages on the glass mobile phone, and he doubts how the text messages are. sent by an unknown number he knows that information about human issues is the topic of human rights today , and it is used as an attractive topic, and he sent me this possibility in the fight. i was registering the phone and i realized that after clicking on this link, the constitutional spying program was installed on the phone . we realized that when we click on the link for the second time, there is no problem, only the first time , if we click on this link for the second time, there is a problem. click it and it will redirect you to alki's site
4:33 am
make it look real. we clicked on the link for the second time and it directed us to google, but there were some special events. transferring to google is part of the spy software. transfer the user to google. we did this. we changed the scan to using a famous open source program called internet cost . similar to this spy software, it is very complicated to have spy software. eavesdropping and extracting information advertises sometimes it steals your personal information on the phone, and if there is a political goal in the middle, it can extort you and force you to do things that are in line with its own interests, and this is what
4:34 am
spy software can do, and this is a very good performance for identification. the worship and similarity of reviews of experts and experts in the field is that persepolis was written by ns group, but it happens that we can identify the software producer very quickly and easily . ankara group is a technology company established in herzliya in the occupied territories in 2010. and five hundred experts it has employed cyber security, regarding the most important product of this company, the zionist regime is one of the toughest players in the world in the cyber scene, the zionist army has trained forces to carry out hacking cyber attacks, and this company is expanding its activities and up to
4:35 am
now it has reached certain results and predicts that most of the people who work for these companies are former members of the 82200 unit of the zionist regime , this unit is the intelligence unit of the zionist army , the rules of the zionist regime, this company operates under the supervision of the ministry of defense of this regime , and it works. it is said a lot sir, let us establish companies so that these companies can get what they need, that is, to make money, i will definitely make money. one of the intelligence units of the zionist regime has been mentioned a lot recently . it is the unit 8200 of the zionist army. the subdivisions of imam, or the military intelligence organization of the zionist regime, are responsible for collecting
4:36 am
information on smoking, eavesdropping, cyber defense, designing software and collecting information from cyberspace. in the form of knowledge-based companies of the zionist regime, yaganeh 8200 mainly carries out its missions under the cover of this company . from the sites of this dreaded unit , new programs are designed and compiled for espionage and to other countries , including programs that can be he pointed out that causing disruption in the nuclear program of the islamic republic of iran means that the famous story of sunt province in the summer of 1989, iran was attacked by a computer virus that was designed in a complex way that iran could well deal with this iranian cyber threat in password cracking flow
4:37 am
companions have entered the country's nuclear facilities, and until one of the security officers of the zionist regime in 2012 published a book called spy , peace be upon him, about the involvement of the zionist regime in attacking iran's nuclear facilities, and said that this was all a joint effort by the united states and the zionist regime. the attack of unit 80 and 20 together with the american national security agency and musa and black were present. the idea of processing ankara was the americans' idea. the americans liked this plan because it is military and cheaper to see without the use of conventional weapons. the importance of this issue was for the first time . 29 times in a cyber war aggressive has cooperated with each other. it used to be engaged in encryption, and
4:38 am
now they are engaged in needlework and disclosure. the internet connects and is recognized globally, and everything i feel on your phone is completely clear, and that's why when your phone is connected, i can understand where you are and who you are, and you should be identified based on this ip number. do or consider it, their system is very strong super camellia and super good they identify much more than you think they will definitely identify you with these wonderful systems that are in the province, who
4:39 am
participated in the human story and the pegasus spy software in 2016? there has been controversy around the world and it claims to be developing technology for government agencies to detect and prevent terrorism and crime, but people who have dropped their phones know it's a different story when it was released a few years ago . it was mainly human rights activists and lisa and it targeted politicians and people who have high wealth and your information is very useful for them, but they are definitely looking for certain people, and the same is true of the best spy software with the ability to penetrate private information and make it the target device through the most widely used application.
4:40 am
this means that the application is used by many users, because whatsapp, telegram, and instagram are evaluated. in 2019, the style was owned by facebook. this is why he was accused of helping this popular communication tool. of the victims and terrible consequences were faced, sometimes such actions end in the death of people . in the case of saudi arabia, we saw in khashoggi's issue , tracking information about what he had said and heard, and stopped collecting it, in the end, in a terrible operation. in mexico, we saw how the mexican police and security services used this spy software
4:41 am
. he was working as a reporter for al jazeera and had suspicious text messages he received through various applications, this investigation has increased and when he was working on sensitive regional issues , he installed it on his work phone to track possible hacking methods. hacking a smartphone is usually done by sending a suspicious message to the target phone, which contains a short text and a link, and when i click on the link, the software takes over the control of the phone and works that the device executes any command through the link is then automatically sent to a server hackers use it and this is how the spy software is not installed on the phone
4:42 am
, it does not see the work with the spy software that has been hacked on the phone, and it can take control of the device to everyone when they have the phone with this software . it did what we've seen many other malware do, that is, spy on phone calls and text messages , whatsapp messages, and any encrypted messages that are sent , and turn on the microphone and camera . what makes it particularly complicated is that it used new functions for the iphone to infect the victim and it was very easy to iphone phones. each pegasus spyware costs millions of dollars to deliver to its customers and can only be used for a short period of time, meaning that targeting many smartphones for long periods of time costs hundreds of millions of dollars.
4:43 am
the range of this very high cost raises the question, who can afford this spy software ? who are the main customers of the ansar group? who are the israelis on their website ? their spy software is only used by government organizations and by request. the official of the government itself it is used. does this mean that they can no longer buy pegasus? when people leave the military forces of the zionist regime , they are very specialized and very needed and valuable, and they take this information to private companies like the group , and this information to other countries. they sell doors that work in line with the interests of the zionist regime and can serve tel aviv and washington . these services are useful for these people in the field. i don't know how to explain to you
4:44 am
that the advancement of technology has made spying easier. you need to send the text messages do not contain links. users were warned that if a text message from an unknown number is sent to you, do not click on it. there is no need for that text message containing a link. traveling means hacking without clicking on any link. it does not require any action from the user or anyone. it does not have suspicious links, it is advanced that the phone will be hacked without answering this call, that is, with one call without you answering , you will be infected with this terrible malware. it takes the most sophisticated attack seen in the past few years
4:45 am
the fact that this spy software can be buried on a compact device without spending hours on anything, the engine will be damaged if a malicious software can hack the phone so well and cleanly, it is complicated and because it is so it has very few and very rare capabilities, that's why we don't have much information about it, and this advanced spying is very worrying, but unfortunately there are institutions that do this, which happens to everyone. the content of the phone has access, it can access anything on the phone they can have access to everything in the phone, the microphone of the camera and turn on the meetings or conversations that happen around the phone . they can penetrate the part of your phone that stores your passwords and
4:46 am
thus they have all your secret information. it monitors you closely. our research showed that at least 36 journalists of al jazeera were hacked by the pegasus spy software. al jazeera has always been critical of the zionist regime, and it is not surprising that the journalists of this network are targeted , and we still do not have detailed information about the rest. but we can talk that the statistics should be much more , much more than what you think, the pegasus malware purchase contracts are no longer hidden. in many distant reports , saudi arabia and the uae spent hundreds of millions of dollars to purchase stress from the zionist regime, and after the agreement the disclosure of the relationship
4:47 am
between the uae and the zionist regime has increased, according to the report, which found that the cyber cooperation between the zionist regime and the uae has increased significantly during this period. regime espionage the zionist invested until there was no official or famous reaction. now i wanted this issue to be fully revealed. everything was done secretly under the table and with foreign passports. when these relations became official, i think most of these commercial activities will appear. technology export is part of this is better. who will send this technology to saudi arabia, uae and bahrain
4:48 am
? well, this technology is only for you. you know that this technology is not used to monitor foreign competitors like iran , but it is also used against domestic enemies. an emirati company called less existence that plays the role of uae cyber security, which is an interesting company based in the uae and active in the cyber field as well as dealing with threats. these reports showed that a group of former officials of the cia and the national intelligence agency from the united states, under the cover of this company, went to the uae to
4:49 am
do espionage work for this country . without us let them know that it is the united states and the zionist regime that have chosen the territory of the uae to design and carry out cyber operations in the region, and now that the united states is forced to significantly reduce its military forces in afghanistan and iraq due to the pressure of world public opinion and its own people. in october 2016, the american advertising site internet published a report based on the experience of an italian cyber researcher who wrote less about this person . hack the uae, this report is also to some
4:50 am
he mentioned from the justice officials that they were among the officials of asghar intelligence and the national security organization of the united states. they said that he asked them in the name of protecting the national security of the uae to carry out cyber operations against the woman around 2015. i wanted to bring some of these employees to them to be able to do more work or with more freedom, because american laws and american contractors limited these people, and the promise of living in beautiful places, villas, swimming pools and yachts attracted them. and from these employees they rarely reached the dar company and asked why they would use their skills for cyber attack, that is, they wanted to serve an emirati well and benefit from this service and use it to play the company, the name of one of them is dar
4:51 am
i am proud of such industries that exist in the country and are built by architectural engineering , but this failure is engaged in espionage and sabotage activities with the support of american officers, and now with more and more revelations and the uae and the zionist regime, it is clear. it is possible that the zionist regime too the hardware supply of this company has been in charge of the small country of the uae, and this ability will be guaranteed for the needs of the uae, which is taking steps ahead of other countries to reveal its relations with the zionist regime, by satisfying the empires of money, politics and media. reports indicate that he had tried to hack into the internet site. a report published by this american base in early 2019 said that the former national security agency of the united states and other american intelligence and military retirees had used it to
4:52 am
hack the computers of his political opponents. sentence to target american citizens inside and outside, according to this side, a meter of building land is located in abu dhabi, these people are american citizens who are in another country and to analyze the information of american citizens with legal problems in illegal american laws should definitely be done. later, it was revealed that dark matter was the main operator of the israeli spy software pegasus in the united arab emirates, and in addition to american employees, former officers of the zionist regime were also used by senior branches in the uae to singapore. million dollar company
4:53 am
i think that one of the things that we are going to see more and more is that countries like the united arab emirates have large cyber space efforts. they are trying to replicate this technology in the country. this is very dangerous, especially when the headphones of journalists and civil society protesters and people are being spied on by their own governments and in some cases by their own governments, this is scary and i think it is a kind of abuse of spy software, the reason why the us government spies on these people for intelligence purposes. to understand what is their personality, what am i going to do, i want to understand what the person is doing and what he is going to do, and the most frightening pool of america and the zionist regime, under the pretext of strengthening the cyber power of this king , advanced their goals to disrupt the stability of the region, and many of
4:54 am
we contacted the victims of the hacking of this spy software. they are based in london and cooperate with al-arabiya tv . pegasus was hacked on july 29, 2020. the management of al-arabiya tv told me that the mobile phone was hacked. and attached it to his lips he was active in the field of hacking operations. i contacted one of their agents . they told me that my phone was hacked at least once. citizen qaqeb told me that the uae government had probably used pegasus to hack my phone, probably because being a reporter for lg tv, i was targeted, but i personally believe
4:55 am
that i was targeted because of my close relationship with the famous opponents of the uae. many of them were targeted and hacked, but few of them are willing to come forward and take their story, so i think that if to some of let's look at the world's most prominent media organizations, we can find other people who are hacked or targeted, it doesn't matter where you are, wherever you are, you may be targeted by pegasus, whether in the region or outside , it doesn't matter for this snap software, so the question is with this advanced technology, how can people be sure that their devices are safe from hacking? in the case of picasso, it was difficult to understand that the phone was hacked. and please this file
4:56 am
don't open it, be very careful because they might be spied on, and many people don't pay attention to these tips, so we can get training, but in the end, we have to do the useful ourselves to be able to use these features in the right way. it is connected to the point by apple or android or others. the devices are not yet known . they also have vulnerabilities that can be exploited . there are organizations all over the world that are looking for vulnerabilities to exploit in the future. doubt i don't have that it is happening again, the only issue is the timing of the meeting is that the claimants of human rights and freedom of expression were silent in front of them, and the 9th arab allies
4:57 am
will abuse this technology as much as they want, what has been revealed about the israeli group and their main product, 1300 it has created many problems that many countries of the world do business with this company because of its trouble -making memory. this company has found tabriz city so far . it turned out that it used pegasus to attack human rights and civil rights, and i think you know the sale. a lot in the arab world having especially between the persian gulf countries and also these countries are the main customers when the contract is closed under the table, the companies have more money for them, it is good for them, you have a lot of profit for them, it is really very good for
4:58 am
them. they have become a window through which the afghan security services can access the private information of sasi's mother . there are still many things in this mysterious world of women and spy software that have been revealed. who exactly will be the next victim ? here is gilan publications. is by your side in every
4:59 am
the moment you decide to receive 60% of the resources of this publication for free , right now, number 5 to 3048 forums, why are you sitting in my fountain, i don't know anything, now i have to say, 28 agrin pot cloths in three sizes, 24 and 28, along with a book in size 28, they have an intense granite cover and a fabric grip with the body . they are very resistant to heat and do not change color . agrin pots preserve the taste and appearance of your food in the best way. it is delicious by sending number 3 to number 100081 22 service 8
5:00 am
get agrin pot fabric delivered to your door with free delivery don't worry, in the name of allah, the most merciful, the most merciful, greetings to you at 5:00 am, 40,000 billion tomans unspent balance of construction projects in the account of the executive bodies of the technical and audit and economic affairs deputy of the accounts court announced this news and said that based on the capacity, the implementation of the account of the treasury unit there is a possibility of cowardice at the expense of the executive bodies , barzadeh added, these bodies until the end of shahrivar parast
13 Views
IN COLLECTIONS
IRINN Television Archive Television Archive News Search ServiceUploaded by TV Archive on