Get News Fast

Iran’s proposals to improve information security

The secretary of the Supreme National Security Council of our country expressed his suggestions for improving information security in the world at the specialized meeting of the St. Petersburg Security Summit.
– International news – Ali Akbar Ahmadian, the secretary of the Supreme National Security Council of our country, today, Wednesday, May 5, participated in the specialized meeting of the St. Petersburg Security Summit, and while pointing out the harms, challenges and threats of information security, he presented a proposed package with 5 axes.

The full text of the speech of the Secretary of the Supreme National Security Council of Iran at the specialized meeting of the St. Petersburg Security Summit is as follows:

First of all, I feel it necessary to express my gratitude and appreciation. I express my gratitude to your Excellency for holding this important international meeting and the government of the Russian Federation for its warm hospitality in this important security event. I also condemn the terrorist operation in Moscow and offer my condolences.

Dear colleagues;

We are We are transitioning from a type of complex governance based on information that is developing day by day and relying on information technology, not only governments but also the domination system with the knowledge they have found about individuals and societies, are moving towards psychoanalytical controls that are less colorful. And it smells of traditional intervention. But it provides a much more possibility than in the past to exercise policy and control in the hands of the rulers and, unfortunately, others who can obtain the information.

This causes Now, information has gained a far greater role and importance than in the past, and one of the most important security challenges in the international arena is information security, especially in the cyberspace, which requires the cooperation and collective participation of countries to solve it.

Great gentlemen!

My other colleagues talked about information security in its common sense, which we also agree with, but I A different “central theory” I have come to this meeting to draw your attention to two big threats, which I interpret as “soft threat” and “semi-hard threat”.

Information security, as it is thought in a simplistic view, does not only mean the protection of information and data and communications, but in a comprehensive view, creating a defense and security shield against the “modern enslavement” of humans and societies by removing Their human and national identity is through promoting extreme individualism and creating gap between generations and severing social ties.

1- Monopoly of the Internet to America

2- Monopoly of operating systems of computers and smart phones (such as Windows and Android to America)

3- monopoly of global and large data centers and platforms (such as Google and NSA to America)

As ​​a result of these monopolies, the following threats have occurred:

1. Abusing information and empowering information owners to penetrate deep into the lives of people, communities and countries

2. Shaping the desires, lives and even aspirations of people and human societies, in accordance with the goals and desires of the owners of power and the international domination system

3. Making it possible for some specific countries to take over the vital infrastructures of the countries, for example, the internet infrastructure is monopolized by America, and in this way it has taken over, controlled, and taken over the infrastructures of all countries.

4. The intervention of governments beyond their political and sovereign borders and the gradual removal of national sovereignty of countries

5. Creating a serious possibility for change in the identity of people and societies and shaping it according to the West and creating a distance between people and societies with their roots

6. Generational gap and social and family bonds through extreme individualism, of the deviant type and degradation of human beings to pleasure-seeking and individual gain

as a result of these cases:

Unprecedented and extremely extreme control ability, psychoanalysis and intervention in the most private layers of people’s and societies’ lives and even controlling their mind and behavior with commercial and political purposes in a way that It deprives them of freedom, independence and the power of choice and eliminates individual and national sovereignty and forms modern slavery. Which one of you has not faced the amazing change of thoughts and desires of your young generation, even your children?!

Dear ones! The main thief and the cause of insecurity is the one who is considered trustworthy, he is the one who has the network and information in his hands.

The individual, social and national sovereignty of countries is quickly exposed to two semi-hard threats, meaning the capture of global platforms, systems and mechanisms, and also, exposed to soft threats, meaning the capture of people’s thoughts and interests and persuasion against the desires of the global domination system.

Dear colleagues!

The lack of fair international laws in this area has caused the American government to have the management The global Internet and the development of Internet platforms, consider the international cyberspace as its sovereign territory and exert influence on the governance of different countries, especially in the field of their national security.

Islamic Republic Iran is one of the countries that has been a victim of numerous cyber attacks by America and the Zionist regime for years. You remember the story of the dangerous attack on the nuclear site of the Islamic Republic of Iran with the Stuxnet malware. Due to the fact that most hardware and software systems, especially operating systems of computers and smartphones belong to American companies, this country abuses this tool. Unfortunately, the aforementioned platforms have been used in sabotage, espionage and terrorist operations, such as the attack on the Islamic Republic of Iran’s consulate in Damascus or the assassination of Palestinians. /p>

Dear colleagues!

In contrast to unilateral America and the West, regional organizations such as Shanghai and BRICS should try to expand their cooperation in the field of information security and create new tools, institutions and structures so that they are not defenseless against these two types of threats.

The Islamic Republic presents a specific package of proposals to this meeting:

1- Bilateral and multilateral international cooperation on the subject of information security Based on the theory and approach of the Islamic Republic of Iran to information security

2- multilateralizing international institutions and structures in the field of information and cyber security and removing it from the monopoly of one country and a pole

3- Cooperation to formulate laws and regulations related to information security and global cyber security (cyber diplomacy) in different dimensions and coordinate their defense in the assemblies international organizations such as ITU and confronting American unilateralism in the cyber space and economic and administrative among the members with each other

5- Division of work between independent countries to produce hardware, software, data centers and independent platforms

Today, Iran has undeniable scientific and technological capacities that can provide a great opportunity for cooperation at the international level. As in the past, the Islamic Republic of Iran is ready to cooperate with other countries in the world and in the region in the field of ensuring international peace and security, especially in the field of dealing with terrorist threats and extremism.

Explanation of Ahmadiyya work program in Russia
Reviewing the implementation process of the Iran-Iraq security agreement

end of message/

 

© Webangah News Hub has translated this news from the source of Tasnim News Agency
free zones of Iran, heaven for investment | 741 investment packages in Iran's free zones | With a capacity of over 158 billion dollars Safe investment in the Islamic Republic of Iran

Leave a Reply

Your email address will not be published. Required fields are marked *

seventeen + five =

Back to top button