Skip to main content

tv   [untitled]    October 30, 2023 8:00pm-8:30pm IRST

8:00 pm
[000:00:00;00] let's go and draw up a statute. we drew up a statute. we gave it to the majlis . the majlis said that a major part of it is leadership powers, the basis of the constitution. there is legislation, either go and bring a plan or with a bill, that is, a plan by the representatives or a layer by the government. well, we made an attempt for a bill by the government, which was unsuccessful. our attempt was unsuccessful in the previous parliament . he did not give that plan again in the current parliament we presented it in the parliament and it was voted on. it went back and forth in the national commission and finally it was approved
8:01 pm
. in this law, he had assigned several issues. first, the permanent committee for the defense of compensation, which is defined as the supreme defense council in our constitution, is a council of 7 people, 3 of whom are the minister of interior, the minister of defense, and raezzad , the model program of the 3-member defense department. they are the chairman of the general council, the head of the organization and one of the deputies of the general council, one of the members of the parliament, the head of the national committee of the seven -member council, named as the commissioner of the permanent committee on the qur'an. in our constitution , these normal decisions are made here , the parliament came and legalized this and empowered this committee as the highest authority to make decisions and to bury the koran in the country. well, this is actually the confusion that we had caused by the constitution. it was a valuable and good work. the second thing he did was to come and tell him that the approvals of this committee
8:02 pm
will be notified with the signature of the chairman of the general assembly and the chairman of the standing committee. because we used to take it, it was announced in the government that there are so many changes in it again, because of those initial reasons , it would change at all. so this was the second point it was so good. the third area of ​​implementation includes the national sector, the military sector, government companies and non-governmental organizations, for example, municipalities and others . the fourth part was that the guarantee of implementation was made for this, the implementation was made that those who disagree with the implementation of the decisions have two tasks: one, if the consequences of their actions necessarily affect national security , they will be dealt with according to article 5876 of the islamic penal code, if not , they will be dealt with by the structures opposite to the violations in the system. it should be followed by the follow-up organization, which was actually an executive guarantee that the parliament
8:03 pm
gave for the law, which was very good in your opinion. the next point is this. it was that the government was obliged to foresee the necessary credit for the defense program in their program, because after all , it was a task to get credit for the third party. here, the parliament determined that this should be done . here, the next issue that was very important was decided, perhaps many of the media were doing something, for example, assigning responsibilities in federfan . well, here the law says that the responsibility for the implementation of defense is at the national level ministership means that in the ministry of oil, the responsibility for implementation rests with the minister of oil, in the ministry of interior, the minister of the interior, or in the other ministries, so if there is no implementation , the minister must be held
8:04 pm
accountable. in my province, the province is responsible. it belongs to this system, so here the tasks have become clear, who should implement, someone should be the demanding device, yes, the policy-maker, the policy -maker, the leader, the planner, and in fact, the guide and supervisor, and ensuring the readiness, that is, we monitor the ready, we remove it, that is if there is a violation if it happens, you should determine the report , maybe go to the food agency or the country's inspection system, so this was a good point, or the doubts that friends sometimes raise about who is responsible and what is happening. i remember, for example, an incident in one of these urban cafes. communications had happened in mashhad, the minister had said at the time that the defense considerations were not written, then my reporter asked that, for example, you should be responsible
8:05 pm
. in our own duties, yes we must be responsible for it and follow it, but it is not the case that i have to be responsible for everything that happens in dazaf. well, thank god, this is a completely transparent law, which i think is a very good thing and can be used. one last thing , specify the mechanism for amending the statutes here. . the reference was approved by the supreme leader of the mechanism of the general staff in cooperation with four government departments such as the ministry of defense, the ministry of interior, the ministry of information and the planning organization with the cooperation of these four institutions. in my opinion, this was almost the main weakness it solved our legal rights and gave us an opportunity
8:06 pm
to have a more accurate legal identity with the guarantee of law enforcement. in my opinion, a new chapter in the actions of the defense should be formed and followed by the parliament. now, according to this law, we have to report the actions to the parliament once every three months. in fact, the parliament will find its supervisory role and its supervisory role. here, it can follow up on demands, and in my opinion, it is a very good and valuable law, and it has created good capacities . you did it to cyberish, which of course is a strategic defense document electronics is supposed to be compiled or not . look , we are in the field of technology
8:07 pm
. it was mentioned, but it has grown so much, it came up today, it covers almost all the elements of the country, for example, our money has become digital, our defense system has become digital , our security system has become digital, banking services have become digital, the management of basic life infrastructure has become digital , and so on, according to this role. it has completely come up, then technology has grown four or five times another technology is combined, for example, in the field of cyberspace, data mining technology, artificial intelligence technology, communication technology plus electronic and electromatic technology are added in the definition of cyberspace. it wasn't 15 years ago that we could say that only and city means communication technology and communication technology, but about 7 elements have been added to it. this is a new definition . a new definition
8:08 pm
means a new field of operation . we say that the combined challenges of technology allow this combination to happen, that is, for example, the media becomes the law, in fact, encourages and incites people should use the media with a cognitive approach, for example, the fields of change of mentality, change of belief, change of behavior have actually been brought about by technology , well, besides these, for example, like artificial intelligence today , artificial intelligence has created thousands of capabilities. he has made a threat. i was reading in the news today and saw that one of the parliaments of the western countries has passed a law for artificial intelligence and defined all the requirements for it. so we cannot have a fixed long-term approach for these areas, we have to do it step by step, for example, two years or three years. what is the last thing you did about it? the first thing we did for all these areas at the national level
8:09 pm
was to prepare a map. we put a strategic document in the electronics field, in the cyber field, in the chemical field, in the biological field, in the nuclear defense field , we prepared this for all fields that depend on technology. we have prepared an operational system for some of these that are in the performance stage. that is, if we want, in the scene of vaqim taksim operation how are things done, what is the task of the device, what are the roles and what needs to be done. now, for example, i will give an example in the cyber operation system, so that if we are affected by cyber war , what are the roles of different ministries? what is the role of each device in defense? what is the role of the defense department in relation to him and what should be done. therefore, defining these roles and setting relationships is called
8:10 pm
operational system. we have defined a system for biological defense, cyber defense, and chemical defense . in fact, we are now in a relationship with a chemical factory, for example, with materials. risky or it was made by mistake, it was made next to the people, or it was made later, people came to sit next to it, but the reality is that if this company publishes it for any technical or other reasons. the first harm will be done to the people here, well, here is the task of the factory, the duty of the municipality, the governorship, their duty, the duty of the people, it should be known who should do what to do to defend them and for example, how far is the factory responsible, how far outside there, they should be limited to where the people are. who is responsible for educating people, who is
8:11 pm
responsible for treating people? and for the first time in the country, we designed the treatment of the chemical field for the first time in the country, with the help of the ministry of health , we built the most equipped hospital and treatment center for chemical diseases in the country, using the experiences of the holy defense, in tehran, and now we are in the midst of the highly concentrated centers of activities chemical , for example, like the month of shahrluyeh, khark, for example, provinces like isfahan, south of tehran, where there is a concentration of substances. there is also there, according to him , we should adjust our health care to the functions of the shop . if, god forbid, it happened for any reason , we will not witness any damage, after all, you know that a factory of chlorine gas, chlorine gas, world war i and ii, even in these recent conflicts, isis used it as a chemical weapon. well , we get it, we use it for water purification and other things , but if it publishes this with a high shortage, it is the same chemical weapon .
8:12 pm
it's past. now, for example, we should build this next to a city. well, it's very dangerous for the people. we should have done this for everyone . we shouldn't go in the direction of not disinfecting with chlorine. why did we go so far? we argued. friends say that chlorine is a disinfectant. maximum assurance to remove all impurities and wickets in fact, the virus and actually the microbes are high, for example, with uv and ozone, and this can also be done, which we tested somewhere, for example , we took yazdu as a sample towards the solution through ozone and uv, which has now been implemented, but well, friends of the ministry of energy they say that it is a big headache for us and now we are increasing the considerations. now it is not only purification. when you make chlorine gas , you make it in the factory. my problem is more in the factory . after all, we have more ige requirements , that's why we don't use it in industry.
8:13 pm
we also use it in the industry, here, for example, chlorine i said that chlorine can be used at all. i went to a city, i don't know its name. i saw that the wind direction from this side of the city entrance to the inner side of the entrance to the big factory was put there. then if it is chlorine, i went to see it and saw that it is not visible. it is below zero, meaning those things. the considerations of this mean that it will not be easy at all . we are following up seriously, either it should be secured or it should go to the area with a suitable distance from the city , where there is no harm to the people of the city, we are following up on these, we have the systems, in our opinion, each of these systems that we have approved in the permanent committee, and now about 9 operational systems have been approved.
8:14 pm
we inform everyone of the criteria for action and plan . our priority is more culture-building education for the topic of persuasion consensus is good for work, but if in the middle of this we meet a person who is dissatisfied, then we can't help you . now, you report such examples that you have. we filed a case with the previous story of the fuel attack, we introduced the students to the judiciary, but the judiciary was faced with the number of our referral centers, which had something, we did not understand where that matter went, but we followed up on the reports . that we had prepared, the weaknesses that have been revealed
8:15 pm
there were problems that we had written, we said, sir, there is a problem here, here, here , go and fix it, and if it wasn't fixed, we took all the actions, we also filed the results with the judiciary, now the judiciary, for example, saw that there is a national center, i don't know if there is another center. you can give your opinion, in any case, we were not informed about the outcome of his follow-up. well, the example here was after sohrab 's death. what did you do before sohrab's death? well , we will go before we had no legal authority, but from these two. after last month , we have the authority of the law to go. actually, it's a problem we feel that we will make minutes of the meeting, we will send it to the device, no, you, anyway, the same way you entered the fuel issue , you could have prepared a report on other issues, at least announce this to the non- judicial authorities. we went to non-judicial authorities, that is, for example, let's say that everywhere we went, we saw
8:16 pm
that there were problems, and we wrote. now, if mr. is not upset , we wrote an open letter personally to mr. jabali . you announce everyone if someone somewhere the person in charge of the device did not act, what then? for sure, from now on, you will have to go to sist from now on. well, the law has been passed by you, so we can ask you in the next meeting, say when, where , how many, yes, how many. we hope that i believe that your education and political culture are top notch. it has a major role, our managers are all good people, the principle is that our managers are all good people, from first to last, they may not know something, that's fine , we go and explain to them with complete sincerity and respect. they are explained later, we will make arrangements to do it again. now, god willing, it will not be found. if
8:17 pm
i am found, the law has given us the authority to introduce it to the previous system. how many cyber attacks do we have every day? cyber ​​attacks are categorized. that is, it has degrees, it has degrees, there is a first series, there is a definition of an attack in the technical system, they say that every cyber act is a malicious attempt, which they now call it in english, if mr. omid jalvodian does not catch us , he will redo every scan that is done on the device . the type of attack means trying to penetrate , well, this is now called a system the systems of the cyber ​​security center or soc, which is installed for most of the devices and is being installed , responds to such basic attacks, that is , it controls, finds, and in fact rejects and gives the statistics. one of the communications ministers said, for example, 50 million to 60 million is too much, but in our opinion
8:18 pm
, it is of little value. it is actually an initial attempt to penetrate the second level network . they try individually or in groups to enter a device with goals gentile and non-political? no, it may be political and security, but the volume is a bit lower , it is less limited, and it is possible that these tools are different from each other, for example, some people use a weapon, which has a specific definition of a virus. for example, we have ransomware. ransomware comes to a database, counts your data, takes possession of it, hits its head, encrypts, and says, "do you want to use it? give me this much money so that i can give it to you ."
8:19 pm
have you done something or are you committing a crime? they see these things, they lock the other party's data, they encrypt it, then they say that the data is in our hands, if you want to use it, with so much material, well , they pay them a lot. these are a group whose number is much less than those numbers, but there are a number of attacks . what we are saying is that in fact, attacks in the class of cyber war means that one of the cyber weapons is used, or zero-dig is used, or implants are used, that is, hardware , software, installed inside, in fact, the system and the systems, then to targets that have consequences. a function for people is being attacked, for example, like fuel, like media nationally, driving like other places, yes, traffic lights, if it can, for example, fix public traffic , for example, i think something like this happened two years ago, yes, esfand 100 was very weak and small, it was mostly at the first level, but if
8:20 pm
it can fix the consequences for the people, why it can be, for example, the fuel system and the system in the definition that they say is the service chain in such a way that the consequence of cutting this chain based on faulty transportation can create a problem for the people. it can be from this that we to this let's say, in fact, a cyber attack, for example, last year, if we want to review a year , i think we had something like 20 or 30 cases that were actually successful. we were able to actually identify the attack before the attack and then take action. let's neutralize and control preventively. i gave an example to my media. for example , the information devices say, based on the evidence and the qur'an
8:21 pm
, we came to the conclusion that there is a high probability that he wants to attack the electricity dispatching system. ok, well, this notification, we quickly contacted the ustan ministry of energy, we went and sat down and gathered, i even remember that the deputy minister was gone at that time , the cities missed him, he was able to come back here twice with great efforts by our friends. we sat down and made an analysis . we said, "well, where can we eat? where are our weaknesses ? " it means that some action was taken, but it was not enough basically, no attack happened, that is, we stopped all the attempts to attack , we stopped the attack, even if it was going to happen
8:22 pm
, we closed it , but it didn't happen. therefore, we followed the same pattern in another device, but now something has happened, we see that artificial intelligence is used in some new attacks , which means, for example, they penetrate, you know the network remotely, but in fact, we are vulnerable. we have vulnerability, a normal vulnerability like you whether your windows is windows 8 or not, it has a series of vulnerabilities, they are called security holes. well, if you go to its site , put a series of security packages or security tools that you use to close that hole. i know the solution, well, first, it will check artificially. do you have it or not? well, if you have it, it's easy to find it because it has a large list based on intelligence. for example
8:23 pm
, we look at your device and there are 15 of these. well, it's like a building with 15 doors, for example. you don't need to go out of the window now, you don't want to go out of the window, you're going to look, you're going in through these doors , well, this is the one, well, we are now, so the attack will be done intelligently, it's possible that our admin and our children don't pay attention to this matter, but after all, it's an important issue. it's not that he has to pay attention to what he does next. we call him a series of webshells, that is, he works a series of elements in the japai system, based on which he can actually invite the virus from outside and attack this system. we normally have to go and find one by one by checking and checking well, now artificial intelligence can easily help us. well, the phenomenon is getting more complicated. now
8:24 pm
, in the year 402, we prepared a plan for all the devices of the daneshmouni company that work with us . for everyone, for example, we have the iranian zedzar, we said that artificial intelligence must be used in it, or other tools , and we set a time that by the end of the year, most of our tools will actually be able to use artificial intelligence to perform cyber defense, so it can help us a lot. help and make the work more difficult and technical. finally, we entered a sea that knowledge and technology are the first word, expert and innovative human resources can actually play a role here, these two elements are also among our strengths, that is, we have young, innovative, intelligent scientists, as well as knowledgeable people who can work for us and follow us. thank you very much, sardar, for accepting our invitation. for me, the discussions were interesting
8:25 pm
. we will definitely be the same for the people, but more than this, you should come . this program should not be limited to non-operational defense days
8:26 pm
8:27 pm
. .
8:28 pm
we want to invest sometimes with an exciting investment, everything will fall apart at once. we have a special offer for you to benefit from a significant profit by making a deposit in the united nations credit institution. the national credit institution
8:29 pm
, be aware of the economic growth of the country. scalp oil of olive progen shampoo. greetings to nature again you know that you have a problem with carpets, come to shahr farsh and show them the originality of the pattern . the city of farsh is a must-see for the world, and it is one of the most popular cities in half of the world. isfahan, imam khomeini street, nafesh, mino street. i am here to introduce dorto laundry detergent to you and see if it removes this stain. the material of the show clothes around you
8:30 pm
has excellent cleaning and stain removal properties and is resistant. away from you in the name of allah, the most merciful, the most merciful. hello, dear viewers . welcome to atba news section at 20:30. afghanistan affairs announced the resumption of activities of hail al-ahmar islamic republic of iran in the city of zaranj, afghanistan . misam mehdipour added that at the request of the deprived people of nimruz region regarding the activities of the red crescent organization of the islamic republic of iran, multilateral talks were held with the ministry of justice and the local authorities of nimruz province. the sixth

31 Views

info Stream Only

Uploaded by TV Archive on