Iran opens nuclear fuel facility - 09Apr09 - English
Irans president has opened the countrys first nuclear fuel production plant and announced progress on a new generation of centrifuges.
Irans president has opened the countrys first nuclear fuel production plant and announced progress on a new generation of centrifuges.
1m:50s
6391
[Documentary] The Return of Moazzam Begg - English
The Return of Moazzam Begg (Moazzam Begg’s first trip to the house where he was abducted in 2002.)
Follow Moazzam Begg, a former...
The Return of Moazzam Begg (Moazzam Begg’s first trip to the house where he was abducted in 2002.)
Follow Moazzam Begg, a former Guantanamo prisoner, on his first visit to Pakistan since he was abducted from his house by American and Pakistani forces in 2002.
Moazzam, a British Pakistani citizen, talks his first-hand account of incarceration in Bagram Theater Internment Facility in Afghanistan and the Guantanamo Bay detainment camp in Cuba, the world\'s most notorious prisons where he was held for three years without trial or charge.
Moazzam’s controversial decision to revisit the scene of crime in Islamabad, made his family and friends worried, but he was determined to confront his past, present and future.
After his release, Moazzam started to expose brutal behavior of the US government in Guantanamo and other detention facilities. He also brought to the fore the issues of the UK Muslim community as well as UK and US acts of terrorism.
24m:22s
4929
[06/11/19] Iran starts injecting gas into centrifuges at Fordow...
Watch Live: http://www.presstv.com/live.html
Twitter: http://twitter.com/PressTV
LiveLeak: http://www.liveleak.com/c/PressTV
Facebook:...
Watch Live: http://www.presstv.com/live.html
Twitter: http://twitter.com/PressTV
LiveLeak: http://www.liveleak.com/c/PressTV
Facebook: http://www.facebook.com/PRESSTV
Instagram: http://instagram.com/presstvchannel
#PressTV #Iran #News
1m:18s
2674
[10/11/19] Iran will never trust the United States - Sayyed Ali Khamenei...
‘Iran will never trust the United States’
Iran has resumed uranium enrichment in Fordow nuclear facility as part of the country\'s new step...
‘Iran will never trust the United States’
Iran has resumed uranium enrichment in Fordow nuclear facility as part of the country\'s new step away from the 2015 nuclear deal in response to violations by the United States.
Watch Live: http://www.presstv.com/live.html
Twitter: http://twitter.com/PressTV
LiveLeak: http://www.liveleak.com/c/PressTV
Facebook: http://www.facebook.com/PRESSTV
Instagram: http://instagram.com/presstvchannel
#PressTV #Iran #News
2m:9s
2998
The Future of the Saudi Regime | Imam Khamenei | Farsi Sub English
Leader of the Muslim Ummah, Imam Sayyid Ali Khamenei talks about the future of the evil Saudi regime. What kind of a regime is it? The United...
Leader of the Muslim Ummah, Imam Sayyid Ali Khamenei talks about the future of the evil Saudi regime. What kind of a regime is it? The United States of America announced building of a nuclear development facility and missile development program in Saudi Arabia. Let\'s assume that it happens, what will be the future of these missiles?
The Leader speaks.
1m:43s
7735
Video Tags:
purestream,
media,
production,
Future,
Saudi,
Regime,
Imam,
Khamenei,
Leader,
Muslim,
Ummah,
Sayyid,
Ali,
evil,
United,
States,
America,
announced,
building,
nuclear,
development,
facility,
missile,
program,
assume,
speaks,
Fine Prints - Discussion on Lebanon - English
A great discussion on Lebanese post election situation.
The Lebanese Army has condemned recent Israeli deployments inside Lebanon's borders,...
A great discussion on Lebanese post election situation.
The Lebanese Army has condemned recent Israeli deployments inside Lebanon's borders, saying that it will follow up the move through international bodies.
The army said in a statement on Friday that the recent erection of an observation post and a military facility by Israel on the outskirts of the Kfar Shouba Hills of Lebanon is against the international resolutions and also against the United Nations' frontier line between Lebanon and Israel.
Responding to the Israeli violation of Lebanese territory Lebanon called the action “provocative” and deployed its own army units in the area on Friday.
"In a clear violation of a restricted area of Lebanese territory, and in an attempt to impose a new reality on the ground, the Israeli enemy on Wednesday set up an observation post at the edge of Kfar Shouba and a military position overlooking Baathaeel pond, violating the imaginary line that (UNIFIL) delineated anew, which it considers to be the Israeli withdrawal line," said the statement, making reference to the Blue Line designated by the UN in 2000.
"Given this provocative stance, Lebanese Army units in the region deployed patrols along the border," it added. The army said it was following up on Israel's violation with UNIFIL officials in order "to resolve this urgent situation", The Daily Star reported.
Israel seized control of the Farms in 1967, when it also captured the Syrian Golan Heights.
UN Resolution 1701 was adopted in August 2006 following Israel's 33-day war against Lebanon. The resolution binds Israel to pull its forces out of the village of Ghajar and the Kfar Shouba Hills.
21m:50s
8749
George Galloway: If I was Iran I would get Nuclear Weapons - English
During his television show on Press TV, George Galloway expresses his views on Iran saying "If I was Iran, I'd get Nuclear Weapons". The...
During his television show on Press TV, George Galloway expresses his views on Iran saying "If I was Iran, I'd get Nuclear Weapons". The comments come as Iran Meets US and Allies for Nuclear Talks in Geneva to review Iran's nuclear package. Iran has repeatedly denied they are developing nuclear weapons. Iran says it still has one month to report the Qom enrichment facility to the IAEA and that the U.S. did not "foil" anything. All of Iran's religious leaders denounce the creation of nuclear weapons, including the Supreme Leader of the Islamic Republic. Washington and Europe however, claim that Iran secretly has a nuclear weapons program.
2m:42s
7959
US Court Convicts Dr. Afia Siddiquie of Pakistan - 04Feb10 - English
Pakistani neuroscientist Aafia Siddiqui has been found guilty of trying to kill US military personnel and FBI agents in Afghanistan two years ago....
Pakistani neuroscientist Aafia Siddiqui has been found guilty of trying to kill US military personnel and FBI agents in Afghanistan two years ago.
Siddiqui has vehemently denied all charges against her during the trial, calling them 'ridiculous' and insisting that she was framed, jailed and tortured by US agents in Pakistan and Afghanistan.
Siddiqui was accused of grabbing a US warrant officer's M-4 rifle in a police station in Ghazni province in 2008 and firing two shots at FBI agents and military personnel while being interrogated for her alleged possession of documents detailing a 'terrorist' plan.
In March 2003, Siddiqui vanished in Karachi, Pakistan with her three children. It was reported in local newspapers that she had been taken into custody on terrorism charges.
Many political activists believe she was Prisoner 650 of the notorious US detention facility in Bagram, Afghanistan, where they say she was tortured for five years until the US authorities claimed in an announcement that they had found her in Afghanistan.
Recorded February 04, 2010 at 0800GMT
4m:18s
6080
Recent Cyber Attacks On Irans Infrastructure - US & israel likely...
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by...
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by the US or Israel against the Islamic Republic.
The Stuxnet, a computer worm that is viewed as potentially the most dangerous piece of computer malware discovered, has targeted industrial computers in Iran.
The complex worm recognizes a specific facility's control network and then destroys it.
Experts say the worm, which has a very sophisticated design, may have been created by a state-sponsored organization in the US or Israel to target specific control software being used in the Iranian industrial sector, including the Bushehr plant -- Iran's first nuclear power plant.
"All the details so far to me scream that this was created by a nation-state," Bloomberg quoted Frank Rieger, technology chief for a maker of encrypted mobile phones, as saying.
Iran's nuclear facilities may have been the targets, said both Rieger and Richard Falkenrath of the Chertoff Group, a Washington-based security advisory firm.
"It is theoretically possible that the US government did this," Falkenrath said during an interview with Bloomberg Television on Saturday. "But in my judgment, that's a very remote possibility. It's more likely that Israel did it."
Meanwhile, a top US cyber-security official claims that the US does not know who is behind the cyber-attack and is still analyzing the worm.
"We've conducted analysis on the software itself," Sean McGurk, director of the National Cybersecurity and Communications Integration Center, told reporters on Friday.
"It's very difficult to say 'This is what it was targeted to do,'" he said, adding the center was not looking for those behind the attack but it rather sought to prevent the spread.
The US and Israel accuse Iran of developing a nuclear weapons program. Iran rejects the allegation, saying its nuclear program is solely for peaceful purposes.
The International Atomic Energy Agency, in its several reports, has confirmed that it continues to verify the country's non-diversion from its peaceful path.
Article Source: http://www.presstv.ir/detail/143868.html
0m:40s
10813
Bahraini medics recount hospital horror - 20Mar201 - English
Bahraini authorities have been accused of heavy-handedness in handling pro-democracy protesters.
According to medics at Salmania hospital in the...
Bahraini authorities have been accused of heavy-handedness in handling pro-democracy protesters.
According to medics at Salmania hospital in the capital Manama, the security forces surrounded the hospital and disallowed people, including health workers and ambulance staff, to enter or leave the facility.
The hospital staff have told Al Jazeera that doctors and nurses were beaten up and that many doctors were still under arrest.
Many patients were allegedly also attacked by the military.
Our special correspondent has this report from Manama.
2m:26s
8902
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
10m:40s
8811
Ex-Gitmo captive recounts lethal torture - English
German Guantanamo detainee Murat Kurnaz has publicly spoken about being subjected to electroshock torture, lethal beatings and humiliation during...
German Guantanamo detainee Murat Kurnaz has publicly spoken about being subjected to electroshock torture, lethal beatings and humiliation during his years of unlawful detention.
10m:59s
4084
Tectonic Weaponry : How to make an Earthquake -English
Extremely low frequency (ELF) electro-magnetic energy waves can trigger earthquakes. These waves are being produced by a military facility...
Extremely low frequency (ELF) electro-magnetic energy waves can trigger earthquakes. These waves are being produced by a military facility in Alaska called HAARP. Particulates sprayed into the atmosphere (chemtrails) theoretically could be used in conjunction with HAARP to change the weather, including the creation of droughts, storms, and floods
10m:21s
4583
[06 July 13] israel issues 39 new demolition orders in al-Khalil - English
Dozens of Israeli soldiers raided the village of Susiya in the South West of Al Khalil, Hebron while handing 39 stop work and demolition orders....
Dozens of Israeli soldiers raided the village of Susiya in the South West of Al Khalil, Hebron while handing 39 stop work and demolition orders. The latest Israeli orders target tents, kitchens, structures, solar panels, a clinic, a kindergarten, a cultural center, and milk production facility.
The solar panel plant was funded by the European Union and is the only source of electricity for the villagers. Human rights groups have stated that Israeli policy is part of its ethnic cleansing of indigenous Palestinians.
2m:39s
4609
Vancouver Protest Rally- LABAIK YA ZAINAB - Attack on the The Shrine of...
Protest Against The Attack on the
The Holy Shrine Syeda Zainab (s.a)
Saturday July 27th @3:00pm Holland Park, Surrey BC
Zainab...
Protest Against The Attack on the
The Holy Shrine Syeda Zainab (s.a)
Saturday July 27th @3:00pm Holland Park, Surrey BC
Zainab Binte Ali (as) was a symbol of empowerment for women and an image of resistance to the oppression as well.
On Friday, several mortar shells fired by foreign-backed terrorist groups hit the holy shrine of Syeda Zainab Binte Ali (as) of killing custodian of the facility.
Saudi and foreign-backed insurgents have stepped up their attacks on religious sites around Syria, which many believe is part of a plot sponsored by western and regional supporters of the militants to fire flames of sectarian war in Syria to pull it in an even deeper crisis.
Who was Zainab Binte Ali (as) ?
Zainab Binte Ali (as) (AH 5--62; 626/7--682 CE), daughter of ʿAlī ibn Abī Ṭālib and Fāṭimah al-Zahrāʾ, was the first granddaughter of the prophet Muḥammad. She is best known for her courageous and eloquent role supporting her brother Imām Ḥusayn, at the time of his martyrdom in the Battle of Karbala, and for protecting his family in the following months of Umayyad imprisonment.
Syrian rebels, dominated by Takfiri elements have earlier targetted the shrine twice in 2008 and 2012 causing extensive damage to it.
They aslo detonated another shrine revered by Shi\\\'ites. Shrine of Hujr Bin Adi, a close companion of Prophet of Islam, was dynamited by the militants who view shrines as symbols of apostacy.
A rocket strike on the revered Islamic shrine in Damascus killed its custodian, activists and residents
Al-Qaeda-linked al-Nusra Front terrorists also destroyed the historic mausoleum of Prophet Abraham (PBUH) with bulldozers in the eastern town of Ayn al-Arous in the province of Raqqa.
Attacks on mosques in different cities have also left hundreds of people dead, most of them while offering daily prayers.
\\\"Attackers in all these crimes claim that they are Muslims while not only they insult Islamic holy sites and figures, but act in ways that are strongly rejected by Islamic laws,\\\"
27m:46s
7819
[19 Nov 2013] Iranian college students support Iran nuclear energy...
University students throughout Iran have joined in solidarity to show their support for the country\'s inalienable right to pursue nuclear...
University students throughout Iran have joined in solidarity to show their support for the country\'s inalienable right to pursue nuclear technology for peaceful purposes.
Several hundred students gathered outside Iran\'s Fordow Nuclear Facility to make the international community understand that Iran needs nuclear technology for civilian purposes. Students talked to us and explained why Iran is pursuing peaceful nuclear technology. Also in attendance was the head of Iran\'s Atomic Energy Organization (IAEO) Ali Akbar Salehi.
2m:45s
5753
[11 Dec 2013] Iran met its first obligation under the IAEA agreement...
Iran and the International Atomic Energy Agency have wrapped up what\'s been desrcibed as a productive meeting on Tehran\'s nuclear energy program...
Iran and the International Atomic Energy Agency have wrapped up what\'s been desrcibed as a productive meeting on Tehran\'s nuclear energy program in the Austrian capital. The two sides will hold a fresh round of talks in Tehran on January 21.
The latest talks follow a recent nuclear deal between Iran and the permanent members of the UN Security Council plus Germany. Tehran also earlier agreed to provide the I-A-E-A access to formerly off-limit sites. Iran met its first obligation under the I-A-E-A agreement at the weekend, by allowing the UN nuclear agency inspectors to visit Arak\'s heavy-water facility.
1m:55s
4967
[01 Jan 2014] Washington irate by Kabul-s decision to release more...
More tension in US-Afghanistan ties. Washington wants Kabul to halt the release of prisoners from a jail that was handed over to Afghan officials...
More tension in US-Afghanistan ties. Washington wants Kabul to halt the release of prisoners from a jail that was handed over to Afghan officials recently.
The Bagram prison north of Kabul has been holding hundreds of prisoners for years. They were detained while the facility was under the American control. But the US ceded its control to the Afghans after several years of delay. Now, the Afghan government wants to free 88 prisoners there. It follows the release of at least 600 and fifty inmates. Kabul says it\\\'s found insufficient evidence to continue their detention. But Washington is angry about this, saying the prisoners pose a serious security threat. The row comes at a time when relations between the two sides are at a new low. Ties have grown strained particularly over President Hamid Karzai\\\'s refusal to sign a security deal to keep US troops in Afghanistan after 2014.
3m:52s
5791
[01 Jan 2014] The US calls on Afghanistan not to release 88 prisoners...
The Bagram prison north of Kabul has been holding hundreds of prisoners for years. They were detained while the facility was under the American...
The Bagram prison north of Kabul has been holding hundreds of prisoners for years. They were detained while the facility was under the American control. But the US ceded its control to the Afghans after several years of delay. Now, the Afghan government wants to free 88 prisoners there. It follows the release of at least 6-hundred and fifty inmates. Kabul says it\'s found insufficient evidence to continue their detention. But Washington is angry about this, saying the prisoners pose a serious security threat. The row comes at a time when relations between the two sides are at a new low. Ties have grown strained particularly over President Hamid Karzai\'s refusal to sign a security deal to keep U-S troops in Afghanistan after 20-14.
3m:32s
5321