tv [untitled] September 19, 2023 4:30am-5:00am IRST
4:30 am
[000:00:00;00] there is little information about it. when i was asked about this issue from the defense ministers of the zionist regime, they kept silent because it is like a sacred cow and they do not want to allow anyone to talk about it and discuss it in order to get information about this malware. espionage we have traveled a difficult and difficult path. for several months, the phone of one of the journalists was hacked with the help of a researcher called citizen laptop with research laboratory graphics located in canada . it is about
4:31 am
espionage. in 2016, this company held information about the infrastructure of the use of heat related to the mobile phone of a social activist. the information obtained through the phone and its sentence led to the arrest of a person named ahmed mansour. until today, we still used the roussef operation technique, which is called the software for hacking. ahmad massoud's phone was used by the hospital , which is a specialist in prison , and has been working on this issue for several years in order to be able to pegasus . it is possible and he doubts it how come the text message was sent by an unknown number and claims that he knows information about human issues, the dream of today's human rights issue is an attractive topic, and that's why he is using it to search for gold , and he sent me this possibility in
4:32 am
stizand. i was recording the internet traffic and phone activities and i noticed that after clicking on this link, the constitutional spy program was installed on my phone . we noticed that when we click on the link for the second time, there is no problem, only the first time , if for the second time on this link click on it, it will redirect you to alki's site . it will make it look real. we clicked on the link for the second time, and it redirected us to google, but there were no special events. transferring to google is also part of the spy software. we just started the scanner. let's check the internet if there are other servers that transfer the user to google in the same way. we did this. we used a famous open source program called "internet cost
4:33 am
" to scan the internet, similar to this spy software. sometimes the phone calls you into the microphone to listen and information extraction will steal your personal information on the phone, and if there is a political goal in the middle, it can extort you and force you to do things that are in line with its own interests. spy software can do this, and this is very bad. a good way to identify the worship and the similarity of the reviews of experts and specialists in the field of information technology in canada proved that the father was written by the ns group, but it still happens that we can very quickly and easily identify the company that produces the software . ankara group is a technology company in herzliya in the territories it is an occupation that was established in 2010 and has employed 500 cyber security experts
4:34 am
and the most important product of this company is the zionist regime, one of the most newsworthy actors in the world in the cyber scene. it expands its activities and so far it has reached certain results that cannot be predicted. most of the people who work for these companies and the unique record of the 82200 zionist regime of this unit of the intelligence unit of the zionist regime, according to the laws of the zionist regime, this company is under supervision you know that the ministry of defense of this regime is active and it works. 8207 always very big
4:35 am
companies can get what i need, i.e. make money, batman, make money. one of the intelligence units of the zionist regime has been mentioned a lot recently. 8200 is the zionist army, a unit under yaman or the military intelligence organization of the zionist regime. it is responsible for collecting information on smoking , eavesdropping, cyber defense, designing software and collecting information from cyberspace. the forces of the unit are 80 and 20 of them are graduates of specialists in the field. technology information and in the form of knowledge-based companies of the zionist regime, the 8200 unit mainly
4:36 am
carries out its missions under the cover of this company. disruption in the nuclear program of the islamic republic of iran pointed out that the famous story of sunt province in the summer of 1989 was attacked by a computer virus that was designed in a complex way that iran could well deal with this successful iranian cyber threat. break the 2020 codes of design have entered the country's nuclear facilities. in 2012, one of the regime's security officers published a book called spy, peace be upon him, about the involvement of the zionist regime in the attack on iran's nuclear facilities. unit 82 2020 was present along with the national security agency of america and musa and black. he saw the processing of ankara by the americans. the americans
4:37 am
liked this plan that it is military without the use of conventional weapons and it is less expensive. the importance of this issue was for the first time in length of history 29 in one war aggressive cyber has cooperated with each other , he used to be engaged in encryption, and now they are engaged in needlework and disclosure . the global face is recognized for you and everything that i feel on your phone is completely clear, so when your phone is connected, i can understand where and who you are, and they must identify you based on this ip number or
4:38 am
it they consider their system very strong super camellia and super good they detect much more than you think they will definitely detect you with these wonderful systems that took part in the story of ns and spy software pegasus in 2016. controversies in the world has set up a trap that seeks to develop technology for government agencies to identify and prevent terrorism and crime, but the people whose phones have been cut off , i don't know, is exactly another thing. when the initial news was published a few years ago,
4:39 am
it targeted human rights activists and lisa and politicians and so on people who have a lot of wealth, why is my information and yours useful to them, but they must be looking for certain people, and the same is true of the most spy software with the ability to penetrate private information and hack the target device through the most widely used applications, i.e. applications which is widely used because whatsapp, telegram, and instagram are getting cheaper. in 2019, it was under the ownership of facebook, this is accusing him of being a communication tool . terrible consequences they were faced with the death of people, and in the case of saudi arabia, we saw in the khashoggi issue, tracking information about things that he had said and
4:40 am
did not, and had stopped collecting. in the end , he was killed in a terrible operation, and this is the convenience of someone who is a danger to their caregivers. it was deleted in mexico, but we saw how the mexican police and security services use these spy software . sarana analyse, who was a critic of the police and the government , followed and disappeared one day until she was working as a reporter for al jazeera . threats and suspicious text messages through the application he found out that we had increased and he was working on sensitive issues in the region. he got the radio app that was made to install the 3 prison specifications on his work phone .
4:41 am
smart is done by sending a suspicious message to the target phone, which contains a short text and a link, and when i click on the link , the software takes over the control of the phone and the device executes any command sent through the link. automatically to a server that can be used by hackers and this is how the spy software is not installed on the phone, it does not see the work with the spy software that is hacked on the phone, they can take control of the device to everyone, when the phone is infected with this software, this malware does what we've seen a lot of other malware do that, which is spying on phone calls and text messages, whatsapp messages, and any encrypted messages that are sent that can turn on the microphone and camera, so that makes it particularly complicated. which
4:42 am
used new functions for the iphone to infecting a victim and very easily to iphone phones and providing each pegasus spyware to its customers costs millions of dollars and can only be used for a short period of time, i.e. targeting a very large number of smartphones for a long period of time it costs hundreds of millions of dollars. this very high cost raises the question of who can afford this spy software . who are the main clients of the ansar group? israel denies that their spy software is only used by intelligence agencies. it is used by the government and by the official request of the government. does this mean that they can no longer buy gas? some people from the military forces of the foreign zionist regime have this very specialized and much needed and valuable information, and this
4:43 am
information is given to private companies such as the group. they take and sell this information to other countries from countries that work in line with the interests of the zionist regime and can serve tel aviv and washington . providing these services in this regard will be useful for them. i don't know how to explain to you the advancement of technology. it has also made spying easier. hackers no longer need to send text messages containing links to your phone. users are warned that if a text message containing a link from an unknown number is sent to you , do not click on it. today, there is no need for a text message containing a link, which means hacking without clicking on any link does not require any action in terms of work. does it have any suspicious rules? this israeli software has advanced to such an extent that
4:44 am
the user receives a call through the internet and the phone rings even without answering the call , but with a call without you answering to you will be infected with this terrible malware, after that spy plus software is installed on the target phone and takes full control of the device . the most complex attack i have seen in the past few years is the spy software of the target person's device compared to the form without this person even if he has done something that is a trip without damage, it can be seen that a malware can hack the phone so well and cleanly , it is complicated and because such capabilities are very few and very rare, that's why we don't have much information about this advanced spying. it is worrying, unfortunately, there are institutions that do this
4:45 am
to answer the question that everyone has is exactly whether the pegasus has access to all the actions and content, can they access anything on the phone, can they access everything on the phone, the camera microphone, and turn on the meetings? the conversations that happen around the phone can be eavesdropped, even the part of your phone that stores your passwords and thus has all your secret information will show you the location of our investigation by pegasus spy software. al jazeera's sleep hacking is always a topic there has been criticism of the zionist regime, it is not surprising that the journalists of this network are targeted , and we still do not have accurate information about the rest
4:46 am
, but we can say that the statistics must be much more than what you think. in many reports, 261, saudi arabia and the uae spent hundreds of millions of dollars to buy pegasus from the zionist regime, and these contracts increased even more after the revelation of the uae's relations with the zionist regime, according to the report found in the regime's cyber cooperation. zionism and the uae have increased significantly during this period. the full security cooperation program between the two countries led to the exchange of information and the uae invested millions of dollars in the spy software of the zionist regime until there was no official or famous reaction because i did not want
4:47 am
this issue to be fully revealed. everything was done secretly and under the table and with foreign passports, when these relations were straightened, i think most of these commercial activities will appear. the export of technology is part of this relationship . as you know, technology is not only used to monitor foreign competitors such as iran
4:48 am
, but it is also used against sleepy enemies inside the country. and it is active in the cyber field as well as dealing with cyber threats. foreign policy magazine and reuters examine the cyber attacks of this company, that is, the actions they took to hack them, these reports showed from former cia and national intelligence agency officials covered by this the company owners rarely went to the uae to do espionage work for this country. they went to the uae and did soviet espionage work in this country , and perhaps without the uae knowing , it is america and the zionist regime that were chosen to plan cyber operations in the region. they did, especially now that the united states is forced to significantly reduce military forces in afghanistan and iraq due to the pressure of world public opinion and its own people
4:49 am
. in october 2016, the american internet advertising website wrote a report based on the experience of an italian cyber researcher. reference person in this report, it is claimed that he said about his roles that they want to reach a position where he can press a button on any device in the uae. they were american nationals , they said that they were asked to carry out cyber operations in the name of protecting the national security of the uae. more or with freedom i have to do more because american laws restricted some american contractors and these people tricked them into living in beautiful places
4:50 am
with swimming pools, villas and yachts, and used their own skills for cyber attacks, that is , they wanted to i want to serve the emirati and make them use this service and use it again. i lost the name of one of them . the motivation was less because of such an incident that exists in the country and it was built by architectural engineers. but this company is supported by afshan. the american is engaged in espionage and sabotage activities and now by revealing more and more relations with the zionist regime, it becomes clear that the zionist regime has been in charge of repairing the company's hardware , the small country of the emirates, and why do they need this ability in the uae, which
4:51 am
has taken a step ahead of other countries to reveal the relations with the zionist regime? it thinks it was established with the consent of the empires of politics and media , it will guarantee that some reports indicate that it had tried to hack into the internet site . and other american intelligence and military retirees had used it to target the computers of their political opponents, including american citizens, inside and outside the country. according to this report, a meter of building land was located in abu dhabi.
4:52 am
being and analyzing the information of american citizens with a legal problem based on the illegal american laws, one must definitely be military. later on, c showed that he was the main operator of the israeli spy software pegasus in the united arab emirates, an american who is a former officer of the zionist regime in its branches the emirates of singapore used this company to spend millions of dollars on services. one of the things that we are going to know more and more is that countries like the uae have great ambitions in the field of cyberspace, trying to imitate this technology in our country is very dangerous, especially that the headphones of reporters and protesters are from civil societies and people
4:53 am
are spying by their own governments and in some cases by their own governments. i want to spy for intelligence purposes, to find out what power they have, what am i going to do, i want to find out what the person is doing and what he is going to do, and the most frightening pool of america and the zionist regime, under the pretext of strengthening the cyber power of this king, to disrupt his goals the stability of the region is the advancement of many victims of hacking this spy software
4:54 am
. hack activity they told me that citizen had used it to hack my phone . i was targeted because i am a reporter for lg tv. i believe that i was targeted because of my close relationship with prominent opponents of the uae. but few of them are willing to come forward and tell their story , so i think if we look at some of the most prominent media organizations in the world, we'll find other people who are being hacked or targeted, no matter where you are , wherever you are, you can be a target. be pegasus it doesn't matter whether in the region or abroad for
4:55 am
this software, so the question is, with this advanced technology, how can people be sure that their devices are safe from being hacked? we receive a messenger that has a strange link, do n't click on the link, we receive an unexpected email or file, take action and please don't open this bucket, be very, very careful because you might be spied on, and these tips are from one of the people in this way. they don't pay attention, but we can receive training, but in the end we have to do it ourselves we should do what is useful so that we can use these features in the right way. the old ones are vulnerable , and if they are known , they will be connected by apple or android or others. the devices are not yet known . they also have vulnerabilities. every device
4:56 am
has a weakness that can be exploited. there are organizations all over the world that are looking for vulnerabilities to use in the future, i have no doubt that this will happen again, the only issue is the timing of the meeting is that the claimants of human rights and freedom of speech remained silent in the face of such revelations, and so did their arab allies. as they want i am abusing this technology. something that has been exposed about the israeli group and their main product, which is the gas burner , has caused many problems . it happened that he used pegasus to attack human rights and mineral rights, and i think you know that
4:57 am
they have a lot of sales in the arab world, especially between the countries of the persian gulf, that's why these countries are the main customers. when the contract is closed under the table, the companies give them more money. good luck to them it is very beneficial for them, it is really good for them. yes, our smart phones have become an inseparable necessity of life. however, they have become punjabi. security services through them can have private information. there are still many things in this mysterious world of women . there is spyware and software that is eyeing who exactly
4:59 am
. this is gilna publications, which is by your side at any moment you want to get 60% of the resources of this publication for free. 3000 4855 why did you sit when i did? i can't stop telling you, the service of 8 agrin pot cloths in three sizes 24 and 28, together with a book in size 28, granite pots sit and are integrated with the body, they are very resistant to heat and do not change color, agrin pots taste and look your food
5:00 am
i will preserve it in the best way, delicious with number 3, number 7122, service of 8 fabrics, agrin pots with free delivery to your home , in the name of allah, rahman raheem, greetings, two iranian prisoners released from american prisons , named mehrdad moeen ansari and reza sarhengpour azad entered the country after the transfer of these fans they were transferred to qatar through a special flight. at the same time, sahm and darbandi were released from american prisons. deputy minister of foreign affairs said that
13 Views
IN COLLECTIONS
IRINN Television Archive Television Archive News Search ServiceUploaded by TV Archive on