Author: Shen Yi

On September 23, before the general debate of the UN General Assembly, New York staged a farce: all members of the world's largest intergovernmental intelligence organization five -eye alliance, coupled with EU members, coupled with Japan with military alliances with the United StatesWith South Korea, a total of 27 countries have been made, and a so -called agreement has been signed to jointly establish the rules of game rules in the network space. It also points to China and Russia.

At the beginning of this scene, it made people feel angry, because it is full of dual standards and hegemonism.It is boring to look at it again, because in addition to the naked five -eye alliance and the small circle of the US military alliance, there are a few more European countries that have been used to playing global moral pseudo -teachers.The third reading will make people feel black humor, because vividly interprets the live drama that can be set on the five -eye alliance, China and Russia are not allowed to light up.

In fact, the five -eye alliance is the biggest source of threats facing the current global network space strategy.

From the Cold War, the Five Eye Alliance has changed from the Justice League that fights fascism to a tool for the world of superpower and American hegemony, and thus quickly become a threat of world peace and justice that has been vowed to defend.

From 1999 to 2000, European Airbus and Boeing Company in the United States went to Saudi Arabia to compete for aircraft contracts. The airbank company finally lost the bid.Airbus who dissatisfied went to the European Union to complain. The European Parliament established a temporary committee. The results of the investigation found that Boeing borrowed the Global ECHELON echelon of the Five Eye Alliance.Confidential business communication, and then got the bid.The survey report also shows that at least 50 similar cases, most of them are leaked when they are competing with American companies.

Woolnes, who once served as the director of the CIA, published an article on the Wall Street Journal. The title is why we listen to our allies and clearly point out that using national intelligence power to monitor the allies' business confidential communications, it is a fair competition for American companies to gain fair competition.The necessary conditions.Note that it is necessary, and it is still for fair competition, that is, monitoring is the norm, and no monitoring is an exception.

In the past, the Justice Alliance that fascinated fascist has completely fallen into a weapon for American companies' commercial competition. Of course, it is also covered with fair competition coats.

When the time arrived in 2019, one of the so -called agreements in the 27 countries pulled up by the five -eye alliance was the so -called Chinese illegal commercial stealing.Use the echelon system to eaves out the five -eye alliance for the labels of the allies' commercial communication, and accusing China of engaging in commercial secrets. How refresh the bottom line and break through the lower limit!

The core of the Five Eye Alliance is the United States. The United States is not only the birthplace of the Internet, but also the originator of an offensive network psychological war with the Internet.

In July 1995, the Secrets of the United States and Deputy Minister's Office of the Secrets and Low -intensity Council Strategic Adviser Xiute wrote a strategic assessment: the secret report of the Internet, the secret report of the 2007 decrypted report clearly states that the United States uses offensive use by offensiveness.The Internet can achieve unconventional psychological war goals. You can publish information through the Internet to allow local groups to adopt the behavior that the United States wants to take; therefore, avoid sending special forces to be sent to subvert, incitement, and direct political statements in the U.S. government.Political risks.

From a practical point of view, it will not be said how the United States and the Soviet Union were engaged in the propaganda war during the Cold War. Rand Company published the modern political war report for authoritative summary.After the Cold War, the United States began to use the Internet to promote the color revolution in other countries and engage in political interference.

The most prominent of these is that in 2010, Middot; Ms. Clinton, who was the then Secretary of State of the United States, sturdyly published a speech with the theme of freedom of the Internet, and clearly announced that Facebook, Twitter, and Youbutu were all diplomatic tools.Subsequently, the non -governmental organizations with the US Congress's funding, with developed global collaborative networks, social media tools, and mainstream European and American media that adopted various positive attitudes, global, from Yugoslav to Ukraine, from Tunisia to Libya;In China, from Xinjiang to Hong Kong and Taiwan, it once tossed the posture of Zhou Tianhan, saying that it was not an exaggeration to press the city at that time.

However, the so -called self -sin is not alive.The European and American developed countries, which use the Internet with the Internet with the Internet, quickly lost their control of the development of the situation.In the process of globalization, the gap and resentment of excessive expansion of financial capital within developed countries are also ignited by social media.The governments of developed countries that are led, shielded and torn by elected politics are completely effective in responding to such impacts.

Therefore, what people see is that after the 2016 U.S. presidential election, the Democratic Party of Hillary Middot; Clinton, and supporters of all parties, will dress themselves to be harmless to adult animals overnight.The claims of accusing the so -called Russian and Chinese social media interfere with various deserted lanes in the internal affairs of Western countries came out.

This is a very funny reversal. What is even more funny is that it is said that the mainstream European and American media that can use information and communication technology can not be used. In the night, it is like a new hard disk server.The memory was deleted, and the appearance of a pure victim was taken out, and began to continue to engage in various bitter performances in the network space.How absurd and shameless this is!

Of course, the so -called green mountains cannot be covered, after all, the east is flowing.There are 27 countries signed, among more than 200 countries around the world, the most important source of threats facing global network space security and stability.Obviously, they represent the power of network space hegemony and traditional order, which has become a minority in the world as a whole.

Behind the aggressiveness of 27 countries, it is just a small group of developed countries in Europe and the United States from the real world to the network space, and it is full of the fading and downward position of the Western center status and hegemony.

However, how to cope with the tide of this negative force, how to actively and effectively unite and love peaceful and secure countries, promote the construction of the community of destiny community of network space, and build a new order of more constructive network space governance.The goals of the joint efforts of the State, SCO members, emerging countries, and the majority of developing countries.