The latest report released by the China National Virus Emergency Treatment Center and China Security Software Giant 360 Company revealed that the US Central Intelligence Agency (CIA) used non -traditional regime change technology to promote the connection through the InternetYoung people joined liquid protests and planned a large number of "color revolution" events around the world, including the "Sunflower Revolution" in Taiwan in 2014 and the "Color Revolution" of Ukraine.
According to CCTV news reports, the first part of the above series of reports shows that since the beginning of the 21st century, the rapid development of the Internet has provided new opportunities for the infiltration and disruption and disruption of CIA.Software products and individuals have become CIA's "agents", helping the agency to quickly become the "star" in the online spy war.
CIA is one of the main intelligence agencies of the US federal government. It is headquartered in Lami, Virginia, USA.DS) Four departments.Its main business scope involves: collecting information on foreign governments, companies, and citizens; comprehensive analysis and processing of information information collected by other American intelligence institutions; providing opinions on national security intelligence and security risk assessment to high -level decision makers;Guide and supervise cross -border secret activities.
Report pointed out that whether it is the "Color Revolution" in Ukraine in 2014, the "Sun Flower Revolution" in Taiwan, or the "Color Revolutionary Revolution of the Green Revolution" of Myanmar in 2007, the "Green Revolution" in 2009"Incidents cannot get rid of the influence of American love institutions.According to statistics, for decades, CIA has overturned or tried to overthrow more than 50 legal governments in other countries (the Central Intelligence Agency only recognizes seven of them), which has caused chaos in related countries.
Reports that these US technologies are leading internationally, providing unprecedented technical possibilities for the "Color Revolution" for the American Love Department to launch the "Color Revolution".The report revealed the five methods used to CIA.
First of all, providing encrypted network communication services, and secondly, it provides internet -discarding connection services.The third is to provide on -site command tools based on the Internet and wireless communication.
Report mentioned that Rand Corporation spent several years to develop a non -traditional regime change technology called "swarming" to help a large number of young people connected through the Internet to join the "shot a shotThe liquidity protests of "changing a place" greatly improved the efficiency of the event site command.
The fourth is a software that US companies developed "Riot".The software supports 100%independent wireless broadband network and provides variable WIFI networks. It does not rely on any traditional physical access method. It does not need to be connected by telephone, cable or satellite. It can easily avoid any form of government monitoring.With the help of the above -mentioned powerful network technology and communication technology, CIA has planned a large number of "color revolution" events around the world.
The fifth is the US State Department's research and development of the "anti -review" information system as an important task, and injects more than $ 30 million (about Singapore yuan) for the project.
Regarding many typical network attacks in China, the National Virus Emergency Treatment Center and 360 Company have captured and successfully extracted from the information network of the victims from the information network of the victims.(CIA) "VAULT7" (Dome 7) Trojan program, functional plug -in and attack platform samples closely associated with data.It is understood that the public security organs have followed up.
For the highly systematic, intelligent, and hidden network attacks initiated by CIA on China, how can domestic government institutions, scientific research institutions, industrial enterprises and commercial institutions "see" quickly and deal with it as soon as possibleParticularly important.The report suggested that in order to effectively respond to the imminent network and realistic threats, while using independent controllable localized equipment, China should organize the self -inspection and self -inspection of APT attacks as soon as possible, and gradually establish a long -term defense system to achieve comprehensive comprehensive achievementSystematic prevention and control against advanced threat attacks.
Northwestern University of Technology issued a statement on June 22 last year, saying that hackers from overseas and criminals sent fishing emails containing Trojans procedures to teachers and students from overseas, trying to steal relevant teachers and students' email data and citizen individualsInformation causes major risk hazards to the normal work and order of life.
The National Computer Virus Emergency treatment Center and 360 Company issued an investigation report on September 5 of the same year, respectively, stating that the National Security Agency (NSA )'s specific invasion operation office (OFFICE of Tailored Access Operation (TAO for short) Over the years, it has implemented tens of thousands of malicious network attacks on domestic network targets, controlled related network devices, and suspected of stealing high value data.