USA VETO UN Resolution against israel (The other 14 members voted in...
The Unites States vetoed the Security Council Resolution which condemns all the israeli settlements built in occupied Palestine's territory since...
The Unites States vetoed the Security Council Resolution which condemns all the israeli settlements built in occupied Palestine's territory since 1967 as illegal. The other 14 members of the council voted for the resolution.
5m:25s
7796
انقلاب اسلامی کے ثمرات [SEMINAR] Fruits of the...
Clips from the seminar on the topic of Fruits of the Islamic Revolution. Ayatullah Agha Bahauddini delivered a great speech as well...
Clips from the seminar on the topic of Fruits of the Islamic Revolution. Ayatullah Agha Bahauddini delivered a great speech as well...
20m:43s
16445
Fresh israeli airstrikes on Gazans - 8Apr11 - English
A fresh Israeli airstrike on the besieged Gaza Strip has killed at least three Palestinians. Witnesses say two missiles hit a vehicle in southern...
A fresh Israeli airstrike on the besieged Gaza Strip has killed at least three Palestinians. Witnesses say two missiles hit a vehicle in southern Gaza.
2m:50s
3617
Nasrallah slams anti-Iran remarks by Hariri - 9Apr11 - English
Secretary General Sayyed Hassan Nasrallah has underlined Hezbollah\\\'s stance towards the latest developments in Lebanon through a televised...
Secretary General Sayyed Hassan Nasrallah has underlined Hezbollah\\\'s stance towards the latest developments in Lebanon through a televised speech.
Remarks of caretaker premier Saad Hariri in which he accused Iran of interfering in the affairs of Arab states and inciting problems were considered by Nasrallah as a reflection of Israeli rhetoric.
Sayyed Nasrallah linked the latest position of Saad Hariri to the unrest in the region, especially after Hariri held a telephone conversation with Bahraini king Hamad Bin Khalifa:
The anti Iranian remarks follow a campaign by the March 14 against hezbollah\\\'s arms , but this stance is not new, and nasrallah said it goes back some years and is part of a deal between the US and the embattled March 14th .
Analysts see the war of words in Lebanon as a reflection of rivalry between the camp allied with the US and the resistance:
The issue of the formation of a new cabinet headed by PM designate Najib Mikati was also tackled by Nasrallah who said the march 8th are determined to deal with the remaining obstacles before forming the Mikati cabinet.
2m:36s
21232
[Crescent International] Crisis in Bahrain and the truth behind GCC -...
Renowned Journalist, Scholar and Director[ICIT] Zafar Bangash explains the current crisis in Bahrain. In this video he exposes the truth behind the...
Renowned Journalist, Scholar and Director[ICIT] Zafar Bangash explains the current crisis in Bahrain. In this video he exposes the truth behind the Gulf Cooperation Council and its sectarian Zionist agenda.
4m:4s
13636
The Zionist Ideology and Its Overcoming - Ilan Pappe - Nov 2010 - English
Ilan Pappe: The Zionist Ideology in State of Israel and its overcoming.
Palestine Solidarity Conference in Stuttgart 27. November 2010.
Organized...
Ilan Pappe: The Zionist Ideology in State of Israel and its overcoming.
Palestine Solidarity Conference in Stuttgart 27. November 2010.
Organized by Palestine Solidarity Committee in Stuttgart.
Presented By:
www.publicsolidarity.de
Source: publicsolidarity on blip tv:
http://blip.tv/file/4464605
23m:40s
5041
Israel ethnic cleansing of Palestinians - May 11, 2011 - English
The legacy and constant policy of Israel is the displacement of the Palestinian people from their land, a political analyst says.Israeli Foreign...
The legacy and constant policy of Israel is the displacement of the Palestinian people from their land, a political analyst says.Israeli Foreign Minister Avigdor Lieberman has reprimanded the Palestinian unity agreement, saying Tel Aviv will not stop settlement constructions.Press TV conducted an interview with Ralph Schoenman, the author of The Hidden History of Zionism and a political commentator in Berkeley, concerning Israel's reaction towards the Palestinian unity deal.
5m:20s
5638
The CIA Secret War in Pakistan - English
PressTV Presents - The CIA's Secret War in Pakistan - English, A Short Documentary on the Extra Judicial Killings
PressTV Presents - The CIA's Secret War in Pakistan - English, A Short Documentary on the Extra Judicial Killings
23m:24s
5356
Judaism Yes, Zionism No: Ultra-Orthodox Jews march against Israel - Jun...
The conflict between Israelis and Palestinians in the Middle East still shows little sign of a peaceful resolution. But in New York, there's a...
The conflict between Israelis and Palestinians in the Middle East still shows little sign of a peaceful resolution. But in New York, there's a group of ultra orthodox Jews, who are devoted to the Palestinian struggle. And as Marina Portnaya discovered, they believe an end to the State of Israel is the only solution.
3m:41s
5139
*** MUST WATCH *** FACEBOOK is American CIA spying machine - English
wikileaks founder Julian assange disclose the
truth about the FACEBOOK
Israeli secret forces also used Facebook against Palestinian for information
wikileaks founder Julian assange disclose the
truth about the FACEBOOK
Israeli secret forces also used Facebook against Palestinian for information
1m:21s
5969
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
10m:40s
9273
[Face to Face] - Interview with Rabbi Feldman - JUAZ - PressTV - 06 July...
On the sidelines of Iran's First International Conference on Global Fight against Terrorism, Ghanbar Naderi has interviewed with Rabbi Dovid...
On the sidelines of Iran's First International Conference on Global Fight against Terrorism, Ghanbar Naderi has interviewed with Rabbi Dovid Feldman, from Jews United against Zionism.
19m:55s
8682
Anti-Semite & Anti-Semitism Are Tricks, We Always Use Them - English
It's the the standard tactic of calling someone "anti-Semitic," and its used to sabotage anyone who speaks out against the US government...
It's the the standard tactic of calling someone "anti-Semitic," and its used to sabotage anyone who speaks out against the US government policy of supporting immoral and illegal Israeli policies which violate basic human rights. And as you can see, this person suggests using a new word for the same old trick.
Amy Goodman interviews a former Israeli minister and she helps expose this trick used against dissidents, the defamation tactic of calling people "anti-Semitic.
2m:22s
5874
[AQC] Al-Quds International Day in USA - Al-Quds Committee invites you...
For further details, check out freealquds.org.
Countless disgusting crimes committed by the Zionist Regime are not captured on cameras. Tip of...
For further details, check out freealquds.org.
Countless disgusting crimes committed by the Zionist Regime are not captured on cameras. Tip of the iceberg is here...
http://shiatv.net/plist.php?plist=237
http://shiatv.net/plist.php?plist=276
http://shiatv.net/plist.php?plist=303
http://shiatv.net/plist.php?plist=322
http://shiatv.net/plist.php?plist=368
http://shiatv.net/plist.php?plist=466
http://shiatv.net/plist.php?plist=506
http://shiatv.net/plist.php?plist=700
http://shiatv.net/plist.php?plist=1133
For last year's coverage of Al-Quds Day protests around the globe, click on the Video Response tab under the video player.
Also check these out:
http://shiatv.net/plist.php?plist=1298
http://shiatv.net/plist.php?plist=1299
3m:46s
21647
****AL-QUDS 101**** H.I. Muhammad Baig - English
A short interview on the topic of Al-Quds.
Hujjatul Islam Muhammad Ali Baig answering to some commonly raised questions about the topic of...
A short interview on the topic of Al-Quds.
Hujjatul Islam Muhammad Ali Baig answering to some commonly raised questions about the topic of Al-Aqsa mosque, oppressed people of Palestine, and our responsibility towards the matter as a human being and as a Muslim.
12m:57s
24998
[10] داستان فلسطین - 100 سالہ جدوجہد - Story of...
[10] داستان فلسطین - 100 سالہ جدوجہد - Dastan e Falasteen - Story of Palestine - Urdu Documentary
[10] داستان فلسطین - 100 سالہ جدوجہد - Dastan e Falasteen - Story of Palestine - Urdu Documentary
26m:35s
12251