New report unveils how CIA schemes color revolutions around the world
By Yuan Hong | Global Times | May 4, 2023
For a long time, the US Central Intelligence Agency (CIA) has plotted “peaceful evolution” and “color revolutions” as well as spying activities around the world. Although details about these operations have always been murky, a new report released by China’s National Computer Virus Emergency Response Center and Chinese cybersecurity company 360 on Thursday unveiled the main technical means the CIA has used to scheme and promote unrest around the world.
According to the report, since the beginning of the 21st century, the rapid development of the internet offered “new opportunity” for CIA’s infiltration activities in other countries and regions. Any institutions or individuals from anywhere in the world that use US digital equipment or software could be turned into the CIA’s “puppet agent.”
For decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate governments abroad (the CIA has only recognized seven of these instances), causing turmoil in related countries. Whether it is the “color revolution” in Ukraine in 2014, the “sunflower revolution” in Taiwan island, China, or the “saffron revolution” in Myanmar in 2007, the “green revolution” in Iran in 2009, and other attempted “color revolutions” — the US intelligence agencies are behind them all, according to the report.
The US’ leading position in technologies of telecommunication and on-site command has provided unprecedented possibilities for the US intelligence community to launch “color revolutions” abroad. The report released by the National Computer Virus Emergency Response Center and 360 disclosed five methods commonly used by the CIA.
The first is to provide encrypted network communication services. In order to help protesters in some countries in the Middle East keep in touch and avoid being tracked and arrested, an American company, which, reportedly, has a US military background, developed TOR technology that can stealthily access the internet — the Onion Router technology.
The servers encrypt all information that flows through them to help certain users to surf the web anonymously. After the project was launched by American companies, it was immediately provided free of charge to anti-government elements in Iran, Tunisia, Egypt and other countries and regions to ensure that those “young dissidents who want to shake their own government’s rule” can avoid the scrutiny of the government, according to the report.
The second method is to provide offline communication services. For example, in order to ensure that anti-government personnel in Tunisia, Egypt and other countries can still keep in touch with the outside world when the internet is disconnected, Google and Twitter quickly launched a special service called “Speak2Tweet,” which allows users to dial and upload voice notes for free.
These messages are automatically converted into tweets and then uploaded to the internet, and publicly released through Twitter and other platforms to complete the “real-time reporting” of the event on site, said the report.
The third method is to provide on-site command tools for rallies and parades based on the internet and wireless communications. The report noted that the US RAND Corporation has spent several years developing a non-traditional regime change technology called “swarming.” The tool is used to help a large number of young people connected through the internet join the “one shot for another place” mobile protest movement, greatly improving the efficiency of on-site command of the event.
The fourth is American developed software called “Riot.” The software supports 100 percent independent broadband network, provides variable WiFi network, does not rely on any traditional physical access method, does not need telephone, cable or satellite connection, and can easily escape any form of government monitoring.
The last one is the “anti-censorship” information system. The US State Department regards the research and development of the system as an important task and has injected more than $30 million into the project.
High vigilance needed
Moreover, the National Computer Virus Emergency Response Center and 360 company have spotted Trojan horse programs or plug-ins related to the CIA in recent cyberattacks targeting China. The public security authorities have investigated these cases, the Global Times has learned.
Aside from the five methods the CIA has used to incite unrest globally, through further technical analysis, the National Computer Virus Emergency Response Center and 360 company also identified another nine methods used by the CIA as “weapons” for cyberattacks, including attack module delivery, remote control, information collection and stealing, and third-party open-source tools.
The response center and 360 company also spotted an information-stealing tool used by the CIA, which is also one of the 48 advanced cyber weapons exposed in the confidential document of the US National Security Agency.
The discovery of these information-stealing tools shows that the CIA and the US National Security Agency will jointly attack the same victim, or share cyberattack weapons with each other, or provide relevant technical or human support, according to the report.
These new findings also offer important new evidence in tracing the identity of the APT-C-39 attackers. In 2020, 360 company independently discovered an APT organization that had never been exposed to the outside world, and named it APT-C-39. The organization specifically targets China and its friendly countries to carry out cyberattack and stealing activities, and its victims are spread all over the world.
The report also noted that the danger of CIA attack weapons can be glimpsed from third-party open-source tools as it often uses these tools to carry out cyberattacks.
The initial attack of the CIA cyberattack operation will generally be carried out against the victim’s network equipment or server. After obtaining the target purview, it will further explore the network topology of the target organization and move to other networked devices in the internal network to steal more sensitive information and data.
The controlled target computer is monitored in real time for 24 hours, and all information will be recorded. Once a USB device is connected, the private files in the victim’s USB device will be monitored and automatically stolen. When conditions permit, the camera, microphone and GPS positioning device on the user terminal will be remotely controlled and accessed, according to the report.
These CIA cyber weapons use standardized espionage technical specifications, and various attack methods echo and interlock and have now covered almost all internet and IoT assets worldwide, and can control other countries’ networks anytime, anywhere to steal important and sensitive data from other countries.
The American-style cyber hegemony is evident, the report notes.
Chinese Foreign Ministry spokesperson Mao Ning said on Thursday that US intelligence and espionage activities and cyberattacks on other countries deserve high vigilance from the international community.
The US must take seriously and respond to the concerns from the international community, and stop using cyber weapons to carry out espionage and cyberattacks around the world, Mao said.
In response to the highly systematic, intelligent, and concealed cyberattacks launched by the CIA against China, it is important for domestic government agencies, scientific research institutions, industrial enterprises, and commercial organizations to quickly find out and deal with them immediately upon discovery, the report says.
The report suggests that in order to effectively deal with imminent network and real-world threats, while adopting self-controllable localized equipment, China should organize self-inspection against APT attacks as soon as possible, and gradually establish a long-term defense system to achieve comprehensive systematic prevention and control against advanced attacks.
Share this:
Related
May 4, 2023 - Posted by aletho | Deception, Timeless or most popular | China, CIA, NSA, United States
No comments yet.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Featured Video
Russia, China & Iran Seek to Contain U.S. Military
or go to
Aletho News Archives – Video-Images
From the Archives
Truth Telling, Whistle Blowing and the American Way
By Prof. Tony Hall | American Herald Tribune | July 15, 2016
The Kevin Barrett-Chomsky dispute in historical perspective – 3rd part of the series “9/11 and the Zionist Question”
Over decades Chomsky has moved towards the center of formidable networks of academic associations, publishing enterprises, activist groups, speakers forums and New Media operations. The fact that the senior professor is so well wired into such an effective communication grid of activist interaction has hugely amplified his voice and his influence.
Chomsky’s ideas have been broadcast to the far corners of the world in every conceivable format. His work is translated into many languages as the MIT professor goes from honor to honor, distinction to distinction, all the while seeming to combat the expansionary impulses emanating from some of the world’s leading centers of power including those in Israel. The phenomenal success of Chomsky’s career would seem to prove and illustrate that there is still some substance in the conception of America as the land of the free, home of the brave. … continue
Blog Roll
-
Join 2,405 other subscribers
Visits Since December 2009
- 7,313,142 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen ZionismRecent Comments
loongtip on Showdown loongtip on New York Bans Israel-Linked Te… loongtip on Trump tells India to stop purc… eddieb on The Old Testament and the Geno… papasha408 on Trump’s war posturing against… Coronistan on This is How We Should Have Res… Coronistan on NO MANDATES, NO PROFITS: MODER… Lutz Barz on Russia Vows to Protect Its Oil… loongtip on Russia Vows to Protect Its Oil… loongtip on Hamas never agreed to lay down… eddieb on Conspiracy Denial eddieb on WEF Calls for ‘Cultural Revolu…
Aletho News- Russia doubts ‘bright future’ for US economic ties – Lavrov
- Russia Urges International Community to Curb Arms Flow From Ukraine to Africa
- US’s Lack of Response to Russia’s New START Proposals Regrettable – Foreign Ministry
- Douglas Macgregor: Russia, China & Iran Seek to Contain U.S. Military
- Judge Strikes Down Hawaii Deepfake Law as Unconstitutional
- Sen. Schumer: I Will Continue to Fight to Give Israel All the Aid It Needs
- Epstein Files- Steve Bannon Admits Trump Administration Would ‘Not Cross Sheldon Adelson’ During First Term
- Israel-Palestine head of HRW resigns over blocked report on Palestinians right of return
- Israel to shut water, electricity at UNRWA facilities in occupied territories
- Germany eyes military space spending splurge to counter ‘threats’ from Russia, China: Report
If Americans Knew- U.S. Envoys Refused to Report “Apocalyptic” Conditions in Gaza. Exclusive Photos Show the Reality They Suppressed
- Israel tells Gazans, “smoking is hazardous to your health” – Not a ceasefire Day 117
- The Truth About Gaza’s Dead – Part 1: How We Got Here
- They were forced to hand one son over to the Israeli army in return for another. Eight months later he was dead in prison
- Exclusive: New owner of CBS coordinated with former Israeli military chief to counter the country’s critics, according to leaked emails
- AIPAC Gears Up for Midterm Election Cycle With $95 Million War Chest
- Official US gov’t reports contradict Mike Waltz’s rants against UNRWA
- Israel lets just 5 patients out of 20,000 exit Gaza – Not a ceasefire Day 116
- Trump Again Bypasses U.S. Congress to Push $6 Billion in Arms Sales to Israel
- One side emerged from a tunnel; the other side killed 31. Both must “exercise restraint” – Not a ceasefire Day 115
No Tricks Zone- Climate Scientist Who Predicted End Of “Heavy Frost And Snow” Now Refuses Media Inquiries
- Polar Bear Numbers Rising And Health Improving In Areas With The Most Rapid Sea Ice Decline
- One Reason Only For Germany’s Heating Gas Crisis: Its Hardcore-Dumbass Energy Policy
- 130 Years Later: The CO2 Greenhouse Effect Is Still Only An Imaginary-World Thought Experiment
- New Study Affirms Rising CO2’s Greening Impact Across India – A Region With No Net Warming In 75 Years
- Germany’s Natural Gas Crisis Escalates … One Storage Site Near Empty …Government Silent
- Polar Colding…Antarctica Saw Its Coldest October In 44 Years!
- New Study: Sea Levels Rose 20 Times The Modern Rate During The Roman Warm Period
- As German Gas Storage Dips Dangerously Low…Shortage Hardly Avoidable
- New Study: Brazil’s Relative Sea Level Was 2+ Meters Higher And SSTs 3-4°C Warmer 6000 Years Ago
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment