By Yuan Hong
cyber attack Photo:VCG
For a long time, the US Central Intelligence Agency (CIA) has plotted “peaceful evolution” and “color revolutions” as well as spying activities around the world. Although details about these operations have always been murky, a new report released by China’s National Computer Virus Emergency Response Center and Chinese cybersecurity company 360 on Thursday unveiled the main technical means the CIA has used to scheme and promote unrest around the world.
According to the report, since the beginning of the 21st century, the rapid development of the internet offered “new opportunity” for CIA’s infiltration activities in other countries and regions. Any institutions or individuals from anywhere in the world that use US digital equipment or software could be turned into the CIA’s “puppet agent.”
For decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate governments abroad (the CIA has only recognized seven of these instances), causing turmoil in related countries. Whether it is the “color revolution” in Ukraine in 2014, the “sunflower revolution” in Taiwan island, China, or the “saffron revolution” in Myanmar in 2007, the “green revolution” in Iran in 2009, and other attempted “color revolutions” — the US intelligence agencies are behind them all, according to the report.
The US’ leading position in technologies of telecommunication and on-site command has provided unprecedented possibilities for the US intelligence community to launch “color revolutions” abroad. The report released by the National Computer Virus Emergency Response Center and 360 disclosed five methods commonly used by the CIA.
The first is to provide encrypted network communication services. In order to help protesters in some countries in the Middle East keep in touch and avoid being tracked and arrested, an American company, which, reportedly, has a US military background, developed TOR technology that can stealthily access the internet — the Onion Router technology.
The servers encrypt all information that flows through them to help certain users to surf the web anonymously. After the project was launched by American companies, it was immediately provided free of charge to anti-government elements in Iran, Tunisia, Egypt and other countries and regions to ensure that those “young dissidents who want to shake their own government’s rule” can avoid the scrutiny of the government, according to the report.
The second method is to provide offline communication services. For example, in order to ensure that anti-government personnel in Tunisia, Egypt and other countries can still keep in touch with the outside world when the internet is disconnected, Google and Twitter quickly launched a special service called “Speak2Tweet,” which allows users to dial and upload voice notes for free.
These messages are automatically converted into tweets and then uploaded to the internet, and publicly released through Twitter and other platforms to complete the “real-time reporting” of the event on site, said the report.
The third method is to provide on-site command tools for rallies and parades based on the internet and wireless communications. The report noted that the US RAND Corporation has spent several years developing a non-traditional regime change technology called “swarming.” The tool is used to help a large number of young people connected through the internet join the “one shot for another place” mobile protest movement, greatly improving the efficiency of on-site command of the event.
The fourth is American developed software called “Riot.” The software supports 100 percent independent broadband network, provides variable WiFi network, does not rely on any traditional physical access method, does not need telephone, cable or satellite connection, and can easily escape any form of government monitoring.
The last one is the “anti-censorship” information system. The US State Department regards the research and development of the system as an important task and has injected more than $30 million into the project.
High vigilance needed
Moreover, the National Computer Virus Emergency Response Center and 360 company have spotted Trojan horse programs or plug-ins related to the CIA in recent cyberattacks targeting China. The public security authorities have investigated these cases, the Global Times has learned.
Aside from the five methods the CIA has used to incite unrest globally, through further technical analysis, the National Computer Virus Emergency Response Center and 360 company also identified another nine methods used by the CIA as “weapons” for cyberattacks, including attack module delivery, remote control, information collection and stealing, and third-party open-source tools.
The response center and 360 company also spotted an information-stealing tool used by the CIA, which is also one of the 48 advanced cyber weapons exposed in the confidential document of the US National Security Agency.
The discovery of these information-stealing tools shows that the CIA and the US National Security Agency will jointly attack the same victim, or share cyberattack weapons with each other, or provide relevant technical or human support, according to the report.
These new findings also offer important new evidence in tracing the identity of the APT-C-39 attackers. In 2020, 360 company independently discovered an APT organization that had never been exposed to the outside world, and named it APT-C-39. The organization specifically targets China and its friendly countries to carry out cyberattack and stealing activities, and its victims are spread all over the world.
The report also noted that the danger of CIA attack weapons can be glimpsed from third-party open-source tools as it often uses these tools to carry out cyberattacks.
The initial attack of the CIA cyberattack operation will generally be carried out against the victim’s network equipment or server. After obtaining the target purview, it will further explore the network topology of the target organization and move to other networked devices in the internal network to steal more sensitive information and data.
The controlled target computer is monitored in real time for 24 hours, and all information will be recorded. Once a USB device is connected, the private files in the victim’s USB device will be monitored and automatically stolen. When conditions permit, the camera, microphone and GPS positioning device on the user terminal will be remotely controlled and accessed, according to the report.
These CIA cyber weapons use standardized espionage technical specifications, and various attack methods echo and interlock and have now covered almost all internet and IoT assets worldwide, and can control other countries’ networks anytime, anywhere to steal important and sensitive data from other countries.
The American-style cyber hegemony is evident, the report notes.
Chinese Foreign Ministry spokesperson Mao Ning said on Thursday that US intelligence and espionage activities and cyberattacks on other countries deserve high vigilance from the international community.
The US must take seriously and respond to the concerns from the international community, and stop using cyber weapons to carry out espionage and cyberattacks around the world, Mao said.
In response to the highly systematic, intelligent, and concealed cyberattacks launched by the CIA against China, it is important for domestic government agencies, scientific research institutions, industrial enterprises, and commercial organizations to quickly find out and deal with them immediately upon discovery, the report says.
The report suggests that in order to effectively deal with imminent network and real-world threats, while adopting self-controllable localized equipment, China should organize self-inspection against APT attacks as soon as possible, and gradually establish a long-term defense system to achieve comprehensive systematic prevention and control against advanced attacks.
Published: May 04, 2023
“There are no contradictions amongst the African masses – only amongst Africa’s elites” – Amilcar…
By Abiola Olawale A two-term Ekiti State Governor and one time minister of Solid Minerals,…
Vice President Professor Naana Jane Opoku-Agyemang issued a soulful call to action, urging Ghanaians to…
*'Why Them, Why Now, Why This Way?'- Chief of Staff Asks Amid Helicopter Crash Grief*…
07/08/25 *On that partly cloudy but dark day,* Carlos Calony and the cameraman of JoyNews…
08/08/25 A nation is wounded in the heart when an unfathomable tragedy befalls. It is…
View Comments
Hi! I just wanted to ask if you ever have any issues with hackers?
My last blog (wordpress) was hacked and I ended up losing a few months oof hard work due to no data
backup. Do you have any solutions to stop hackers?
Review my homepage: binance
Hi! This is my first visit to your blog! We are a team of volunteers and
starting a new project in a community in the same niche. Your
blog provided us useful information to work on. You have done a
wonderful job!
Hey! I just wanted to ask if you ever have any trouble with hackers?
My last blog (wordpress) was hacked and I ended up losing
a few months of hard work due to no backup. Do you have
any methods to stop hackers?
I like the valuable info you provide for your articles. I will bookmark your weblog and check once more here frequently.
I'm rather certain I'll learn plenty of new stuff proper right here!
Good luck for the following!
Thanks for finally talking abvout >Еxclusive: New report unveils
how CIA schemes color rеvokutions around thhe
world - Theinsightneqs <Loved it!
I blog frequently and I seriously appreciate your content.
The article has really peaked my interest. I will book mark your
site and keep checking for new details about once
a week. I opted in for your Feed as well.
Hi, after reading this amazing paragraph i am too glad to share my experience here with mates.
Fantastic post but I was wanting to know if you could write
a litte more on this subject? I'd be very thankful if you
could elaborate a little bit more. Cheers!
Maintaining health is required for a fulfilling and happy life.
Incorporating healthy habits into your daily routine could make an important difference in your
current well-being. Listed here are ten essential health tips that will assist you to achieve and maintain a balanced and healthy life:
Stay Hydrated: Drinking enough of water is essential for maintaining proper bodily functions.
Try to drink at least 8 glasses (about 2 liters) of water daily
to remain hydrated and support your body's natural processes.
Balanced Diet: Consume a variety of nutrient-rich foods, including fruits, vegetables, lean proteins, whole grains, and healthy fats.
Avoid excessive usage of processed foods, sugary snacks, and high-calorie beverages.
Regular Exercise: Engage in regular physical activity to enhance cardiovascular health, build
muscle, and maintain a healthy weight. Shoot for at the
very least 150 minutes of moderate-intensity
aerobic exercise or 75 minutes of vigorous-intensity
exercise per week.
Prioritize Sleep: Quality sleep is essential for physical and
mental well-being. Shoot for 7-9 hours of uninterrupted sleep each night to support your body's recovery and rejuvenation processes.
Stress Management: Chronic stress can have a toll on your own health.
Practice stress-reduction techniques such as for example meditation, deep breathing,
yoga, or spending time in nature to relax and unwind.
Maintain Social Connections: Strong social relationships can positively impact mental health.
Stay linked to friends and family, take part in meaningful conversations, and be involved in social activities.
Regular Check-ups: Schedule regular visits to your healthcare provider for preventive check-ups and screenings.
Early detection of medical issues can lead to raised treatment outcomes.
Limit Screen Time: Excessive screen time,
especially before bedtime, can disrupt sleep patterns and contribute to sedentary behavior.
Set limits on screen time and prioritize activities that involve movement and interaction.
Practice Good Hygiene: Proper hygiene, including regular handwashing,
will help avoid the spread of illnesses. Follow recommended hygiene practices to
guard yourself and others from infections.
Stay Positive: An optimistic mindset may have a powerful impact on your own health.
Cultivate gratitude, practice self-care, and concentrate
on the aspects of life that bring you joy and fulfillment.
Remember that every individual is exclusive, and what works for one person may not
benefit another. It's important to be controlled by the human body, make
gradual changes, and look for a routine that suits your lifestyle and
preferences.
In conclusion, adopting these ten essential health tips can pave the way in which for an even more balanced and fulfilling life.
By prioritizing hydration, nutrition, exercise,
sleep, stress management, social connections, regular check-ups, limited screen time,
good hygiene, and an optimistic attitude, you can take proactive steps toward achieving optimal health and well-being.
If you desire to grow your knowledge simply keep visiting this web site and be
updated with the hottest gossip posted here.
Take a look at my blog ... calendário junho 2023