The five techniques employed to launch colour revolutions include providing encrypted network communication services through TOR technology, offering offline communication services like 'to ensure that anti-government personnel can still keep in touch with the outside world when the internet is disconnected', utilising on-site command tools for protests, using the software Riot for independent broadband networks, and developing an anti-censorship information system funded by the US State Department with over$30 million.
In addition to these five methods, the report highlights further discoveries regarding the CIA's cyberattack techniques. Recent cyberattacks targeting China have revealed the presence of Trojan horse programs and plug-ins associated with the CIA, prompting investigations by public security authorities.
The sources report that through extensive technical analysis, additional nine methods employed by the CIA as weapons for cyberattacks were identified. These methods encompass various aspects such as attack module delivery, remote control, information collection and theft, as well as the utilisation of third-party open-source tools.
Of particular significance is the identification of an information-stealing tool used by the CIA, which is among the 48 advanced cyber weapons detailed in a confidential document from the US National Security Agency (NSA). This finding suggests potential collaboration between the CIA and the NSA, where they jointly target victims, share cyberattack weapons or provide technical and human support to one another.
The report was prepared by China's National Computer Virus Emergency Response Center and cybersecurity company 360, and published on 4 May according to several sources. The Embassy of the People's Republic of China in the State of Kuwait officially published the findings of the report.