But how to prove it all, or challenge western colonial hegemony? It starts by exposing it. Then, taking on the false, loaded terms-and tactics- of the FVEY arguments

是不是有点不寒而栗呢?

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

[ 转自铁血社区 http://bbs.tiexue.net/post_13284060_1.html/ ]

境外,有五只眼睛,几十年来,一直紧盯着中国。这不是在写电影剧本。

“五眼联盟”,听说过吗?这个跨国情报联盟机构是冷战的产物,本该随着冷战的结束而画上句号,却在后冷战时代找到了一个新“使命”,就是盯防中国。

“五眼联盟”,针对中国的一面越来越不加掩饰。因它而起的事端也日益增多。

特殊

这究竟是什么样的组织呢?

五眼联盟,FIVE EYES,分别是美国、英国、澳大利亚、加拿大和新西兰这5个国家。不难看出,它们都是英语系国家,英国及它的前殖民地。组织的基本守则自称是共享情报,并且互不监控。

[ 转自铁血社区 http://www.tiexue.net/ ]

说说它的特殊性吧。世界上也有一些其他多边情报共享安排,比如北约内部。但即使北约各国间也很难做到分享所有情报,因为国家太多,它们的利益并不是时时都一致的。

五眼之间不存在这个问题,因为5个成员国是有着共同语言、价值观和几十年相互信任的好基友。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

五眼的历史可以追溯到第二次世界大战。最开始,只有英国和美国。它俩在破解苏联电文的过程中,感受到分享情报的重要性,决定加强情报方面的协作。1946年3月5日,美英签署信号情报合作多边协议,正式成立情报分享联盟,该协议被称为UKUSA协议。

UKUSA协议为冷战期间的英美合作奠定基础。换句话说,该协议巩固了英美之间的特殊关系。

加拿大1948年加入,澳大利亚和新西兰1956年加入。后来加入的这3个国家都是英语国家,同时也是英联邦成员,与英国有着相似的政治体制。至此,五眼联盟成立。

[ 转自铁血社区 http://bbs.tiexue.net/ ]

在联盟内,每份情报都标有秘密等级,并注明哪个国家拥有阅读权限。比如,一份美国情报机构才能阅读的情报上会盖有“绝密仅限美国眼睛”的红色印戳,而“五眼”源自于冗长的“澳大利亚/加拿大/新西兰/英国/美国五眼可见”保密级别,有该标记的文件预示着高级别的文件和信息。

70多年里,这一联盟的隐匿性或者说秘密性非常高,以至于1973年时任澳大利亚总理高夫·惠特拉姆都不知道它的创建条约是什么。直到2010年6月,UKUSA协议的全文才由英美政府公布,并首次得到官方认可。

分工

随着时代的发展,UKUSA协议也在不断演进,目前只解密了最初的文本。

根据1946年的原始条约,签约方同意交换以下与外国通讯有关的行动成果:流量收集、通讯文件和设备获取、使用分析、密码分析、解密和转换以及所有获取的与通讯组织、方式、步骤和设备相关的信息。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

[ 转自铁血社区 http://bbs.tiexue.net/post_13284060_1.html/ ]

如今,各国都有专门与“五眼”对接的情报机构:美国国家安全局、英国政府通信总部、澳大利亚信息理事会、加拿大通信安全局和新西兰政府通信安全局。

2012年12月加拿大智库“防务与外交事务研究所”发布了一份关于加拿大在“五眼”中作用的报告。该报告指出,“五眼”将全球分为五大区域,每个成员负责一区。

英国监测欧洲、俄罗斯西部、中东北非和中国香港。

美国负责监督中东、中国、俄罗斯、非洲和加勒比地区。

澳大利亚负责南亚和东亚。

新西兰负责南太平洋和东南亚。

[ 转自铁血社区 http://www.tiexue.net/ ]

加拿大监测的是俄罗斯和中国的内陆,以及拉丁美洲的部分地区。

尽管如此,区域划分并不意味着各方只能将其努力仅限于这些地区,而是它们对某些地区“负有责任”,却没有义务只监测这些地区。况且情报汇总后将作为一个整体进行分析评测。

发展至今,五眼联盟不再局限于最初的信号情报合作,合作范围还扩大至人工情报、秘密行动、反间谍、地理空间情报、执法以及金融和交通安全等领域的合作。

比如在海洋领域,五眼监测战略海域的航运交通;在航空航天领域,监测弹道导弹试验、外国卫星部署和空军的相关军事活动。

恐怖组织和武器交易也在五眼联盟的监控范畴,特别是现在它们对五眼成员的威胁与日俱增。五眼收集的情报和数据有助于政策制定,也对日常工作至关重要。这些日常工作,包括跟踪和识别恐怖行动,以及其他非传统威胁的可能来源。

斯诺登曾将“五眼联盟”描述为“超国家情报机构”,表示“它不遵守任何国家的已知法律”。他爆料说,“五眼”的成员一直在监视彼此的公民,并分享各自收集的信息,以绕过禁止监视公民的国家法律。

[ 转自铁血社区 http://bbs.tiexue.net/ ]

圈子

这些年,“五眼”成员之间也曾出现过一些紧张局面。去年5月,英国曼切斯特音乐会遭遇自杀炸弹袭击,美国有官员泄露了该事件的调查情况,英国就曾一度停止与美国之间的情报共享。

然而,这样的紧张不宜被夸大。

“五眼”历经70多年,5个成员国说着一样的语言,享有相似的文化、历史与体制,它们一直是铁杆盟友,是以美国为老大的核心朋友圈。

这种基于互信的情报共享具有明显的战略优势,而成员的扩充会弱化这一优势,因此,“五眼”眼下不太可能再吸收新的成员。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

[ 转自铁血社区 http://bbs.tiexue.net/post_13284060_1.html/ ]

这并不妨碍“五眼”成员与其他国家建立双边合作关系。“五眼”之前就曾与丹麦、法国、挪威和荷兰的合作,被称为“九眼联盟”。再加上比利时、德国、意大利、西班牙和瑞典,成为“十四眼联盟”。“十四眼联盟”的更正式名称是欧洲高阶信号情报,其主要任务是协调成员国间的军事信号交换。

美国还与法国、德国和日本等盟国保持着情报共享关系。在中东,美国也正式或非正式地与约旦、沙特、埃及、土耳其等几个国家分享情报,以打击伊斯兰国和其他恐怖组织。

针对

知道了“五眼”的前世今生,我们再看看最近的新闻:“五眼联盟加强合作,对付中国”。

这似乎给人一种误解,那就是“五眼联盟”以前只关注苏联,没中国什么事。显然不是这样。“五眼”作为一个正常的情报交换机制,中国从来都是它情报搜集的主要对象。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

[ 转自铁血社区 http://www.tiexue.net/ ]

对几乎所有国家来说,隐形战线的对抗从来都是各国对外关系中必不可少的一部分。无论双边关系是好是坏,各国都会搜集对方情报,只是活跃程度有所不同。

当两国关系稳定发展时,彼此间的间谍丑闻和矛盾都是闭门解决。如果关系不好,外界就会看到公开的指责、驱逐外交官等摩擦。同时,媒体也会得到一些安全部门的爆料,公开一些对方的情报活动、间谍案件等等。

所以说,改变的不是中国针对西方,或者西方针对中国的情报活动,而是中美关系。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

这也说明一点:“五眼联盟”作为冷战产物,本来没有什么存在的必要,但是美国却有意保留并大加利用,因为它便于美国影响核心盟友,尤其是澳大利亚受美国影响至深,在中澳关系上一轮的紧张中,华盛顿起到了推波助澜的作用。相较之下,其他国家对美国几乎没有影响力。

据说,为了应对“越来越强硬”的中国外交政策,“五眼”联合日德法等国家经常碰头。一名在过去几个月参加了多次相关会谈的人士说:“我们如今生活在一个新世界中,突如其来的威权政府正在促进我们之间更紧密的合作,强化我们的情报共享。”

[ 转自铁血社区 http://bbs.tiexue.net/ ]

在这一针对中国的跨国联合阵线中,华盛顿和堪培拉扮演了重要角色。

美国主要负责中国投资方面的情报协调事务,澳大利亚则致力于抵御中国的政治影响。

澳大利亚政府援引对中国影响力的担忧,公布了反外国渗透法案,收紧对外国游说和政治捐款的规定,同时扩大对叛国和间谍活动的定义。

美国推行了一项名为《外国投资风险评估现代化法案》的法律,赋予华盛顿新的权力以阻止某些类型的外国投资。该法案的文本要求特朗普进行“更强有力的国际外联努力”,以说服盟国采取类似的保护措施。

再看看频繁爆出的中国间谍、中国黑客等等诸多事件,其目的很清楚,美国及其盟友就是试图阻挠中国的高科技发展,不想中国继续做大。

惊!境外有五只眼睛 几十年来一直在暗处盯着中国

[ 转自铁血社区 http://bbs.tiexue.net/post_13284060_1.html/ ]

舆论干扰是其中很重要的一种手段,这些舆论在营造中国已经“被冷战”的感觉,想要带偏节奏,让我们疑神疑鬼,自乱阵脚,最后自毁长城。

五眼联盟搜集涉华情报,这是正常情报机构都会做的事情。斯诺登公开的大量文件,就曾涉及“五眼”围绕中国的网络窃听计划,难道那个时候它就开始全面针对中国了。

越是外界纷纷扰扰的时候,我们越要保持战略定力和战略清醒,不要跟着西方的瞎咋呼起舞。苏联是怎么倒的,就是跟着美国的节奏,被美国玩死的。

所以,我们要做的事情很简单:保持自己的节奏,坚持正确的发展道路。切勿被外媒牵制,产生基础性的误判。

文中图片均来自网络。

环球网

[ 转自铁血社区 http://www.tiexue.net/ ]

Related Story: How US Billionaires finance “black operations” using private security firms, NGOs, and target activists who are critical of western hypocrisy about human rights and “freedom”; and who do the bidding of the CIA around the world

Sharyl Attkisson: please ask Marcy Wheeler about the Tor Exception, and then "what is a "targeted individual."

More and more, we see reporters are targets of the “Fourteen Eyed Monster,” aka the NSA warrantless hacking, redirection, and targeting scheme.And, keep the CIA plausible deniability that I write aout all over ROGS here in mind as you read this case study of computer hacking, redirection, an monitoring of a targeted individual, CBS news reporter Sharyl Attkisson, and American citizen.
And-remember: one of the main threats of “gang stalkers” is that they will force a “target” to go broke suing them.

forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system

While forensically, we must look at “organized gang stalking” as “counter-intelligence stalking,” which is what it is properly called in the intelligence agency, law enforcement and military circles where it originated, we also must look at the complaints of “targeted individuals much the way that Marcy Wheeler, aka emptywheel.com and others are starting to see the term: as something more than ‘ordinary complaints.
Because what these claims are is EXTRAORDINARY complaints-once we weed out the counter-intelligence psychobabble, disinformation, misinformation, and the massive fraud that most of the spy-state is.
And, we can begin to perform a biopsy on many cases that otherwise defied explanation up until recently, such as the “kill book” that some BLM agents brag about, as they literally stalk people to suicide, using hidden methods and tactics of counter-intelligence that never see the inside of a court room.
Or former New Yarwk Times reporter James Risen’s case of being stalked for 12 years because he did what journalists are supposed to do in a healthy democracy-he protected his source Jeffrey Sterling, who was railroaded by the CIA;for allegedly revealing a cartoonish CIA plot.

Related: Why Every Reporter Must Understand the Sharyl Attkisson Lawsuit

Or the well known cases of “frame jobs” such as how the Beatrice Six were literally bullied into Stockholme Syndrome and framed for a crime they didn’t commit. But like I say quite frequently-in a word where counter-intelligence stalking is designed to “slice the enemies throats with Occam’s Razor,” well, get out the ROGS BINGO card for the case of Sharyl Atkisson too, because many-if not all OGS is political stalking that began in the “building the haystack era of political policing via database abuse.
And-take note of the similarities across ALL of these cases, because “hacking the computers of TI’s” is one of the most common threats in the dialectic online.

Related Story: How 5-9-or-14 nations are spying on you at any given time, aka the UKUSA (rhymes with Yakuza). Or, “what is a state sponsored shell game, 101.”

shell game
ˈSHel ˌɡām/
noun

NORTH AMERICAN
  1. a game involving sleight of hand, in which three inverted cups or nutshells are moved about, and contestants must spot which is the one with a pea or other object underneath.
    • a deceptive and evasive action or ploy, especially a political one.
      plural noun: shell games
      “officials played a shell game by loading prisoners onto buses during population counts at the jail”

      or “What is NSA-14 Other Nations Spying” for the win.

     
    From SharylAttkisson.com:
    It “is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.” –David Scantling, cyber-security expert.
     

    I’m frequently asked about the status of my lawsuit against the U.S. Department of Justice over the secret, unlawful intrusions into my computers, exposed in 2013. As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.
    The IP addresses don’t belong there.
    In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”
    Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.

    Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S. refused to cooperate with me, prior to my lawsuit, after my forensics expert recovered evidence of an IP address mysteriously residing in my computer. At the time, an agency official dismissed the forensics evidence as some sort of unexplainable mistake, and refused to help us learn how its IP addresses are maintained and accessed so we could identify the perpetrators.
    Tracing the evidence of the government-related intrusion to individual participants hasn’t been easy. The attackers attempted to erase their tracks once they were discovered. And neither the U.S.P.S. nor the Department of Justice (DOJ) are voluntarily cooperating. But experts familiar with the tools and tradecraft that are proprietary to government intelligence agencies have painstakingly recovered and pieced together compelling forensic proof as to attribution.
    “There can be no reasonable question that an [Advanced Persistent Threat]-style cyber-attack was carried on Attkisson’s computer systems and Internet connection,” stated Scantling in an affidavit filed last week. “Specifically, the APT methods deployed against [Attkisson’s] computers and Internet connection…were sophisticated and of the type only available to government-type activities and operations.”
    This latest information builds upon earlier forensic examinations already conducted by: a confidential government-linked source, an independent forensics specialist hired by CBS, and a forensics expert consulting on my lawsuit.

    The Counter-Narratives

    The facts at hand are at odds with widespread attempts to establish public counter-narratives, resulting in reckless reporting in the past that wrongly implied the Department of Justice Inspector General (IG) had rejected any notion of an intrusion into my computer(s). In fact, the IG never even reviewed the primary computer in question—a CBS laptop—because CBS News would not permit it. I had asked the IG to examine my personal computer, in which two independent forensics examiners had also identified evidence of intrusions. The IG investigators found and described to me significant suspicious anomalies in that system much like the CBS laptop, unearthing similar efforts by someone to erase data and evidence. However, when the IG computer experts finished their review, the findings went to higher ups and the resulting report was inexplicably withheld from me in its entirety.
    I was shut out.
    Many months later, under pressure from Congress, the IG eventually released a very different-sounding summary of its forensics report to the press. It recast or excluded much of what the investigators had told me they’d found. I attempted to obtain the full report and original notes, some of which I reviewed while the investigation was underway, describing the suspicious activity found on my personal computer. However, the IG has stonewalled my Freedom of Information (FOI) requests for these documents for several years. If the Department of Justice won’t comply with FOI law, then what recourse does a citizen have?
    Meantime, instead of helping us get at the facts, the Department of Justice (DOJ) has attempted to block the federal lawsuit at every turn. For example, their lawyers improperly ignored our first notice asking that the appropriate U.S. Postal Service employee(s) appear to give testimony for discovery. The DOJ lawyers didn’t even go through the appropriate legal processes to oppose discovery; they literally ignored the motion entirely. If the nation’s top law enforcement body doesn’t follow the rule of law, what recourse does a citizen have?
    If the Department of Justice wishes to establish that it had nothing to do with the forensically verified intrusions into my computers, it should help us get to the bottom of who did — instead of obstructing the effort. Above all, in the interest of justice, the Justice Department should want to identify who would have spied on a national journalist reporting on a number of international news stories impacting political officials. To me, there are few more chilling scenarios from the standpoint of constitutional press freedoms and protections in our society.
    Deep gratitude to the honest patriots who have been sources for my case because they believe the government attack on a member of the free press is so egregious. (As the case progresses, it’s better to be on the side of the law than exposed as someone who knew but kept silent. Government whistleblowers will receive legal protection.)
    Contact for Whistleblowers, and for more information: Attorney Tab Turner  501-791-2277
    Announcement of lawsuit
    Recent pleading in case denying DOJ motion to dismiss the lawsuit

    Sharyl Attkisson is a five-time Emmy award winning investigative correspondent and recipient of the Edward R. Murrow award for investigative reporting. She hosts the Sinclair weekly Sunday TV program: Full Measure, and is author of two New York Times bestsellers, including the new book: “The Smear: How Shady Political Operatives and Fake News Control What You See, What You Think and How You Vote.”

     

    Share
    • 11
    • 11
      Shares