¡¡¡¡¡¶ÃÀ¹úÑо¿¡·2013ÄêµÚ3ÆÚ

ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÑݽø¼°Êµ¼ù(×¢£º±¾ÎÄΪÉϺ£ÊÐÕÜѧÉç»á¿Æѧ¹æ»®¿ÎÌâ¡°»¥ÁªÍøÓë¹ú¼Ê¹Øϵ¡±£¨ÏîÄ¿±àºÅ£º2011BGJ004£©¡¢ÉϺ£ÊÐÆÖ½­È˲żƻ®¡°ÐÂýÌå¡¢¿ç¹úÍøÂçÓë¹ú¼Ò°²È«¡±µÄ½×¶ÎÐÔÑо¿³É¹û¡£¸Ðл¡¶ÃÀ¹úÑо¿¡·ÔÓÖ¾µÄ±à¼­ÓëÄäÃûÆÀÉóר¼ÒÌá³öµÄ±¦¹óÒâ¼ûºÍ½¨Òé¡£ÎÄÖпÉÄܵÄÊè©ÓɱÊÕ߸ºÔð¡£)

Éò¡¡ÒÝ¡¡¡¡¡¡

¡¡¡¡¡²ÄÚÈÝÌáÒª¡³ÃÀ¹ú×÷Ϊ»¥ÁªÍø¸ÅÄî¡¢¹Ø¼ü¼¼ÊõÓëºËÐÄÉ豸µÄ·¢Ô´µØºÍ×î´óµÄÈíÓ²¼þ×ÊÔ´Õ¼Óйú£¬ÆäÍøÂ簲ȫսÂÔ¾­ÀúÁ˱£»¤¹Ø¼ü»ù´¡ÉèÊ©°²È«¡¢¼àÊÓ¿ØÖÆÌض¨ÄÚÈÝÐÅÏ¢Á÷¶¯¡¢×¼±¸¿ç½çÐж¯ÒÔ»ý¼«·ÀÓùÖ±ÖÁÐÎËÜÈ«ÇòÍøÂç¿Õ¼äÐÅÏ¢ÄÚÈݵÄÑݽø¹ý³Ì¡£ÀäÕ½½áÊøÒÔÀ´£¬ÌرðÊǰ°ÍÂíÕþ¸®Ê±ÆÚ£¬Ëæ×ÅÃÀ¹úÕûÌåʵÁ¦µÄѹµ¹ÐÔÓÅÊƳÖÐø¼õÈõ£¬ÃÀ¹úÔÚÍøÂ簲ȫÁìÓòµÄÏà¶ÔÕ½ÂÔÓÅÊƸü¼Ó͹ÏÔ£¬¼¼Êõ´´ÐÂÓëÍøÂ簲ȫ¶ÔÓÚÃÀ¹ú¹ú¼ÒÀûÒæµÄÖØÒªÐÔ¸ü¼Ó͹ÏÔ£¬ÍøÂ簲ȫÎÊÌâÔÚÃÀ¹ú¹ú¼Ò°²È«Õ½ÂÔÕûÌå¿ò¼ÜÖеÄÖØÒªÐÔÈÕÒæ³ÊÏÖÉÏÉýÇ÷ÊÆ¡£

¡¡¡¡¹Ø¼ü´Ê£ºÃÀ¹úÍâ½» ÍøÂ簲ȫ ¹ú¼ÒÍøÂ簲ȫսÂÔ

¡¡¡¡2013Äê2ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾ÂüµÏÑÇÌع«²¼ÁË°²È«Ñо¿±¨¸æ£¬Ö¸ÔðÖйúÕþ¸®Ö§³ÖºÚ¿ÍÇÔÈ¡ÃÀ¹úÉÌÒµ»úÃܲ¢×ª½»Öйú¹«Ë¾µÄ×ö·¨²»½öËðº¦ÁËÃÀ¹ú¹«Ë¾µÄÉÌÒµÀûÒ棬Σº¦ÁËÃÀ¹ú¹úÄڵľÍÒµ£¬¶øÇÒ´ÓÕ½ÂÔ²ãÃæÌôÕ½ÁËÃÀ¹úµÄ¹ú¼Ò°²È«¡£(×¢£ºMandiant APT1 Report£ºExposing One of China's Cyber Espionage Units, À´Ô´£ºhttp://intelreport.mandiant.com/Mandiant_APT1_Report.pdf£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)2ÔÂ20ÈÕ£¬°×¹¬·¢²¼ÁËÒ»Ïî´ò»÷ÇÔÈ¡ÃÀ¹úÉÌÒµ»úÃܵÄÐÂÕ½ÂÔ£¬½¨Á¢ÁËÒ»¸öÃÀ¹úÃæÁÙÀ´×ÔÖйúÍøÂç¹¥»÷ÍþвµÄÐðʽṹ£ºÖйúÕþ¸®Ê¹Óùú¼ÒÁ¦Á¿£¬¶ÔÃÀ¹ú˽Ӫ¹«Ë¾·¢¶¯ÍøÂç¹¥»÷£¬ÇÔÈ¡ÉÌÒµ»úÃÜ£¬È»ºóת½»¸øÖйú¹«Ë¾¶ÔÃÀ¹úÕ¹¿ª²»¹«Æ½¾ºÕù£¬ÕâÒ»²»¹«Æ½¾ºÕùÒѾ­ÑÏÖØÍþвÃÀ¹úµÄ¾­¼Ã°²È«¡£(×¢£ºAdministration's Strategy on Mitigating the Theft of U.S. Trade Secrets, À´Ô´£ºhttp://www.whitehouse.gov//sites/default/files/omb/IPEC/admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.pdf£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)2013Äê6Ô£¬Ç°ÃÀ¹ú¹ú¼Ò°²È«¾Ö³Ð°üÉ̵ĺÏͬÖÆÔ±¹¤Ë¹ÅµµÇ£¨Snowden£©Åû¶ÃÀ¹ú¹ú¼Ò°²È«¾Ö½¨³É²¢ÔËÐÐ×Å´óÐ͵ļà¿ØÏîÄ¿¡°Àâ¾µ¡±£¨PRIZM£©£¬Äܹ»¶ÔÈ«Çò¸÷¹úµÄÍøÂçͨѶ»î¶¯½øÐÐÈ«Ãæ¼à¿Ø¡£(×¢£ºGellman Barton, Laura Poitras, ¡°US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,¡±The Washington Post, June 6, 2013, À´Ô´£ºhttp://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)ÕâÊÇÍøÂ簲ȫÎÊÌâÓ°Ïìµ½¹ú¼Ò°²È«²¢¶Ô´ó¹ú¹Øϵ¹¹³ÉÌôÕ½µÄ×îÐÂÊÂÀý¡£¶ÔÖйúÀ´Ëµ£¬Àí½âÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÑݽø¼°ÆäÓ°Ïì¾ßÓÐÖØÒªµÄÀíÂÛ¼ÛÖµÓëʵ¼ùÒâÒå¡£ÔÚÕ¹¿ª¶ÔÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂԵķÖÎö֮ǰ£¬ÏȶÔÏà¹ØµÄ¸ÅÄî½øÐбæÎö£¬Ã÷È·Ï໥֮¼äµÄÁªÏµÓëÇø±ð¡£

Ò»¡¡ÐÅÏ¢°²È«ÓëÍøÂ簲ȫµÄÁªÏµÓëÇø±ð

¡¡¡¡¡°ÍøÂ簲ȫ¡±£¨Cyber Security£©¡¢¡°ÐÅÏ¢°²È«¡±£¨Information Security£©¡¢ÐÅϢͨѶ¼¼Êõ°²È«£¨Information Communication Technology Security£©¡¢¡°ÍøÂ簲ȫ¡±£¨Network Security£©¡¢¡°»¥ÁªÍø°²È«¡±£¨Internet Security£©¡¢¹Ø¼ü»ù´¡ÉèÊ©±£»¤£¨Critical Information Infrastructure Protection£©ÊÇÅ·ÃÀ·¢´ï¹ú¼Ò̽ÌÖÍøÂç¿Õ¼ä·¢Õ¹Óë¹ú¼Ò°²È«¹Øϵʱ¾­³£Éæ¼°µ½µÄÒ»×é¸ÅÄî¡£ÕâЩ¸ÅÄîÏ໥֮¼äµÄ¹Øϵ£¬ÈçÏÂҳͼËùʾ¡£

¡¡¡¡ÏÂҳͼÊǹú¼Ê±ê×¼»¯×éÖ¯£¨ISO£©ÒѾ­ÈϿɵĸÅÄîͼʾ£¬ÓÃÓÚÃèÊöÐÅÏ¢°²È«¹ÜÀíÌåϵÄÚ¸÷Ïà¹Ø¸ÅÄîµÄ¹Øϵ£ºÐÅÏ¢°²È«£¨Information Security£©ÊÇ×îÒ»°ãµÄÃèÊö£¬Ö¼ÔÚÇ¿µ÷¸ù¾ÝÏà¹ØÓû§µÄÐèÒª£¬±£ÕÏÐÅÏ¢µÄ±£ÃÜÐÔ¡¢ÍêÕûÐԺͿÉÓÃÐÔ£»ÍøÂ簲ȫ£¨Network Security£©¹Ø×¢ÈçºÎÔÚ¼¼Êõ²ãÃ棬¶ÔÄÇЩʵ¼ÊÔËÐеÄÍøÂ磬ȷ±£·Ö²¼ÔÚÍøÂçÉϵÄ×éÖ¯ÄÚ²¿¡¢×éÖ¯Óë×éÖ¯Ö®¼ä£¬ÒÔ¼°×éÖ¯Óë¸öÈËÖ®¼äµÄÐÅÏ¢°²È«£»»¥ÁªÍø°²È«£¨Internet Security£©¹Ø×¢ÔÚ»¥ÁªÍø£¨Ò²¾ÍÊÇʹÓÃTCP/IPЭÒéÁ¬½ÓÆðÀ´µÄÍøÂ磩ÈçºÎ±£ÕÏ¿É¿¿ÐԺͿÉÓÃÐÔ£»¹Ø¼ü»ù´¡ÉèÊ©±£»¤£¨Critical Information Infrastructure Protection£©±£ÕÏÄÇЩÌṩ»òÕ߹ؼü»ù´¡ÉèÊ©ÔËÓªÕßµÄÍøÂçϵͳµÄ°²È«£¬¹Ø¼ü»ù´¡ÉèÊ©ÔËÓªÉÌ°üÀ¨ÄÜÔ´¡¢Í¨Ñ¶¡¢ÒûÓÃˮϵͳµÈ£¬¹Ø¼ü»ù´¡ÉèÊ©±£»¤È·±£ÕâЩϵͳºÍÍøÂçÔÚÃæÁÙ¸÷ÖÖÀàÐ͵ķçÏÕʱÄܵõ½×ã¹»±£»¤£¬ÓÐ×ã¹»µÄµ¯ÐÔ»òÕß·ÀÓùÄÜÁ¦£»ÍøÂ簲ȫ£¨Cyber Security£©ÓÖ±»³ÆΪÍøÂç¿Õ¼äµÄ°²È«£¨Cyberspace Security£©±»¶¨ÒåΪ±£ÕÏÔÚÍøÂç¿Õ¼äÉÏ´æ´¢µÄÐÅÏ¢µÄ±£ÃÜÐÔ¡¢ÍêÕûÐԺͿÉÓÃÐÔ£¬¶øÍøÂç¿Õ¼ä´æ´¢ÐÅÏ¢µÄÕæʵÐÔ¡¢¿ÉºËʵÐÔ¡¢²»¿ÉµÖÀµÐÔÒÔ¼°¿É¿¿ÐÔÒ²¿ÉÒÔÄÉÈëÍøÂ簲ȫ£¨Cyber Security£©µÄ¿ò¼ÜÄÚ¡£(×¢£ºAlexander kilmburg ed., National Cyber Security: Framework Manul,(NATO Cooperation Cyber Defense Centre of Excellence, 2012), p£®10.)

ͼ£ºÍøÂ簲ȫսÂÔÏà¹Ø¸ÅÄîͼʾ

¡¡¡¡¹ú¼ÊµçÐÅÁªÃË£¨International Telecommunication Union£©½«ÍøÂ簲ȫ£¨Cyber Security£©¶¨ÒåΪ¡°¹¤¾ß¡¢Õþ²ß¡¢°²È«¸ÅÄî¡¢°²È«±£ÕÏ¡¢Ö¸µ¼·½Õë¡¢·çÏÕ¹ÜÀí·½·¨¡¢Ðж¯¡¢ÑµÁ·¡¢×îºÃµÄʵ¼ù¡¢±£ÕÏ´ëÊ©ÒÔ¼°¼¼ÊõµÄ¼¯ºÏ£¬ÕâÒ»¼¯ºÏÄܹ»±»ÓÃÓÚ±£ÕÏÍøÂç»·¾³£¬ÒÔ¼°×éÖ¯ºÍÓû§µÄ²Æ²ú¡£×éÖ¯ºÍÓû§µÄ²Æ²ú°üÀ¨Ï໥Á´½ÓµÄ¼ÆËãÉ豸¡¢¸öÈ˼ÆËã»ú¡¢»ù´¡ÉèÊ©¡¢Ó¦ÓᢷþÎñÆ÷¡¢Í¨Ñ¶ÏµÍ³£¬ÒÔ¼°ËùÓÐÔÚÍøÂç»·¾³Àï´æ´¢/»ò´«ÊäµÄÐÅÏ¢µÄ×ۺϡ£Íø·°²È«Ö¼ÔÚʵÏÖ²¢Î¬»¤×éÖ¯ºÍÓû§×ʲúÔÚÍøÂç¿Õ¼äµÄ°²È«ÊôÐÔ£¬·´»÷ÍøÂç»·¾³ÖÐÏà¹ØµÄ°²È«·çÏÕ¡£°²È«ÊôÐÔ°üÀ¨¿ÉÓÃÐÔ¡¢¿ÉÐŶȣ¨°üÀ¨ÕæʵÐÔÒÔ¼°²»¿ÉµÖÀµÐÔ£©ÒÔ¼°±£ÃÜÐÔ¡£¡±(×¢£ºDefinition of cybersecurity, À´Ô´£ºhttp://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡ºÁÎÞÒÉÎÊÐÅÏ¢°²È«£¨Information Security£©ÓëÍøÂ簲ȫ£¨Cyber Security£©ÊÇÁ½¸öÃÜÇÐÁªÏµÓÖ´æÔÚÇø±ðµÄ¸ÅÄÐÅÏ¢°²È«ÀïµÄ¡°ÐÅÏ¢¡±º­¸ÇÁ˸÷ÖÖÐÎʽµÄÐÅÏ¢£¬ÆäÆðÔ´ºÍ³öÏÖµÄʱ¼ä½ÏÍøÂ簲ȫ¸üÔ磻ÍøÂ簲ȫ£¬´ÓijÖÖÒâÒåÉÏÀ´Ëµ£¬¿ÉÒÔ±»Àí½âΪÍøÂç¿Õ¼äµÄ°²È«£¬ÆäÖÐ×îÖØÒªºÍ×îÖ÷ÒªµÄÄÚÈÝ£¬µ±È»ÈçÇ°ËùÊö£¬¾ÍÊÇÒª±£ÕÏÔÚÍøÂç¿Õ¼äÀï´æ´¢µÄÐÅÏ¢µÄ°²È«£¬µ«Í¬Ê±ÎªÁËʵ¼ùÕâһĿ±ê£¬ÍøÂ簲ȫ¾Í±ØÐ뽫ÆäÉæ¼°µÄ·¶Î§´Ó»ù´¡ÑÓÉìµ½Õþ²ß¡¢Ðж¯¡¢¹ÛÄîµÈÖî¶à²ãÃæ¡£

¡¡¡¡´ÓÉÏÊö¶¨Ò廹¿ÉÒÔ·¢ÏÖ£¬ÐÅÏ¢°²È«½ç¶¨µÄ·½Ê½ÊÇ°²È«µÄ¿ÍÌ壬Ҳ¾ÍÊÇÐèÒª±»±£ÕϵÄÊÇ¡°ÐÅÏ¢¡±µÄ°²È«£»¶øÍøÂ簲ȫµÄ½ç¶¨£¬¸ü¶àµÄÊǺÍÒ»¸öÌض¨µÄ¡°¿Õ¼ä¡±£¬Ò²¾ÍÊÇÍøÂç¿Õ¼ä£¨Cyberspace£©ÃÜÇÐÏà¹Ø£¬Ïà±È¡°ÐÅÏ¢°²È«¡±£¬ÍøÂ簲ȫ¸ü¼Ó¹Ø×¢µÄÊÇҪʵÏÖµÄЧ¹û£¬Ò²¾ÍÊÇʵÏÖÕû¸ö¡°ÍøÂç¿Õ¼ä¡±µÄ°²È«¡£ÍøÂç¿Õ¼äÒ»´Ê£¬Ô´×Ô1984Äê¼ÓÄôó×÷¼Ò¼ª²¼É­£¨£¨William Gibson£©µÄ¿Æ»ÃС˵¡¶Éñ¾­ÂþÓÎÕß¡·£¨Neuromancer£©£¬´Ó¹¹´Ê·¨ÉÏ¿´ÊÇ¿ØÖÆÂÛ£¨cybernetics£©ºÍ¿Õ¼ä£¨space£©Á½¸öµ¥´Ê¹²Í¬¹¹³ÉµÄ£¬´Ó¸ÅÄîÉÏ˵£¬Ö¸Í¨¹ý¼ÆËã»úÒÔ¼°ÓɼÆËã»ú¹¹³ÉµÄÍøÂçÀïËùÖ§³ÅÆðÀ´Ò»¸öÐéÄâÏÖʵ¿Õ¼ä£¬ËüÒÀÍÐÓÚ¾ßÌåµÄÎïÀíÉ豸¶ø´æÔÚÓÚÂß¼­¿Õ¼äÀͬʱ¿çÔ½ÕâÁ½Õߣ¬½èÖú¾ßÌåµÄÓû§½»»»×ÅÊý¾Ý¡¢ÐÅÏ¢¡£

¡¡¡¡´Ó¹ú¼Ò°²È«Õ½ÂÔÑо¿µÄÊӽdzö·¢£¬ÍøÂ簲ȫÔÚµ±Ï£¬³ÉΪÁËÖ±½ÓÓ°ÏìÄËÖÁÌôÕ½¹ú¼Ò°²È«µÄ¹Ø¼üËùÔÚ£¬Ñϸñ¾ÖÏÞÓÚÐÅÏ¢±¾ÉíµÄÐÅÏ¢°²È«¸ÅÄÔÚ21ÊÀ¼ÍÈ«ÇòÍøÂç¿Õ¼äµÄ»·¾³Ï£¬×÷Ϊһ¸öѧÀíºÍ¼¼Êõ²ãÃæµÄ¸ÅÄîÒÀÈ»ÖØÒª£¬µ«×÷Ϊһ¸öÖй۵ÄÇÒÓвÙ×÷ÐԵĸÅÄî¶øÑÔ£¬ÍøÂ簲ȫµÄÓÅÊƸü¼ÓÏÔÖø£ºÒòΪ¿ÉÒÔ½«ÍøÂç¿Õ¼äÖи÷ÖÖ¶Ô¹ú¼Ò°²È«²úÉúÓ°ÏìµÄÒòËØ×÷Ϊһ¸öÓлúµÄÕûÌå½øÐÐ×ۺϿ¼ÂÇ£¬´ÓÐÅÏ¢µÄ±£ÕÏ¡¢ÐÐΪµÄ¹æÖÆ¡¢Õþ²ßÓëÕ½ÂÔµÄÖƶ¨µÈÖî¶à·½ÃæÕ¹¿ªÏàÓ¦µÄÂÛÊöºÍ·ÖÎö¡£

¡¡¡¡¾Í±¾ÎÄÑо¿µÄÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔÀ´Ëµ£¬ÃÀ¹úÕþ¸®Ä¿Ç°Ã÷ȷʹÓõÄÒ²ÊÇÍøÂ簲ȫ£¬¸ù¾Ý°×¹¬ÍøÕ¾ÓйØÍøÂ簲ȫµÄÂÛÊö£¬¿ÉÒÔ·¢ÏÖÃÀ·½ÊÇ´ÓÍøÂç¿Õ¼äµÄÖØÒªÐÔÀ´ÌÖÂÛÍøÂ簲ȫµÄÖØÒªÐÔ£¬¶øÍøÂ簲ȫ¾ÍÒâζ×ÅÃÀ¹ú±ØÐëÒªÖ±ÃæÀ´×ÔÍøÂç¿Õ¼äµÄÍþв£¬¶øÇÒÃÀ¹úÔÚ21ÊÀ¼ÍµÄ·±ÈÙ¾ÍÓÐÀµÓÚÍøÂ簲ȫ¡£(×¢£ºCybersecurity, À´Ô´£ºhttp://www.whitehouse.gov/cybersecurity, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡ÎªÁË·ÖÎöµÄ·½±ãºÍÀí½âµÄÐèÒª£¬±¾ÎĽ«Í³Ò»Ê¹Óá°ÍøÂ簲ȫ¡±À´ÂÛÊöÃÀ¹ú¹ú¼ÒÓë´ËÏà¹ØµÄÕ½ÂÔµÄÑݽøºÍʵ¼ùµÈ¡£µ±È»£¬ÔÚÍøÂç¼¼ÊõÎÊÊÀ¡¢ÍøÂç¿Õ¼äÔÚÈ«ÇòÀ©É¢Ö®Ç°£¬ÃÀ¹úµÄÕ½ÂÔ׼ȷµØ˵ÊÇ¡°ÐÅÏ¢°²È«Õ½ÂÔ¡±£¬µ«¿¼Âǵ½ÕâЩսÂÔÔÚÄ¿±ê¡¢ÊֶΡ¢Âß¼­µÈ·½ÃæµÄÒ»ÖÂÐÔºÍÑÓÐøÐÔ£¬ÏÂÎĵÄÂÛÊö½«Í³Ò»Ê¹Óá°ÍøÂ簲ȫ¡±ÒÔ¼°¡°ÍøÂ簲ȫսÂÔ¡±¡£

¶þ¡¡ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÑݽø

¡¡¡¡2011Äê5Ô£¬ÃÀ¹ú°×¹¬¡¢¹úÎñÔº¡¢¹ú·À²¿¡¢¹úÍÁ°²È«²¿¡¢Ë¾·¨²¿¡¢ÉÌÎñ²¿ÁªºÏ·¢²¼ÁË¡¶ÍøÂç¿Õ¼ä¹ú¼ÊÕ½ÂÔ¡·¡£ÕâÊÇÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂԵļ¯´ó³ÉÕߣ¬Ò²ÊǵÚÒ»·ÝÃ÷È·±í´ïÖ÷Ȩ¹ú¼ÒÔÚ¹ú¼ÊÍøÂç¿Õ¼äÖеÄÐж¯×¼ÔòµÄÕ½ÂÔÎļþ¡£¸ÃÕ½ÂÔÎļþµÄ³ǫ̈±êÖ¾×ÅÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÕûÌ嶨ÐÍ¡£ÕâÒ²ÊÇÃÀ¹úÍøÂ簲ȫսÂÔ¾­Àú³¤Æڱ仯¡¢·¢Õ¹¡¢×ªÐÍÖ®ºóµÄ½×¶ÎÐԳɹû¡£ÊáÀíÕâÒ»±ä»¯·¢Õ¹¹ý³Ì£¬ÓÐÖúÓÚ¸üºÃµØÈÏʶºÍÀí½âÃÀ¹úµÄ¹ú¼ÒÍøÂ簲ȫսÂÔ¡£

¡¡¡¡´Óʵ¼ù²ãÃæÀ´¿´£¬ÃÀ¹úµÄÍøÂ簲ȫսÂÔ¾­ÀúÁËÒ»¸öÌݴη¢Õ¹ÍêÉƵĹý³Ì£º´Ó¡°±£»¤¡±Ãô¸ÐÐÅÏ¢ÓëÊý¾Ý¡¢¹Ø¼üϵͳ¡¢½Úµã¡¢»ù´¡ÉèÊ©°²È«µ½²àÖØ¡°¼à¿Ø¡±ÐÅÏ¢ÄÚÈÝ¡¢¡°»ý¼«·ÀÓù¡±Ç±ÔÚÍþв£¬×îÖÕ·¢Õ¹³ÉΪ¡°ËÜÔ족ÓÐÀûÓÚÃÀ¹úµÄÈ«ÇòÍøÂç¿Õ¼ä¡£Õâ¸öÌݴη¢Õ¹µÄ¹ý³Ì£¬×îÔç¿ÉÒÔ×·Ëݵ½20ÊÀ¼Í40¡¢50Äê´ú¡£µ±Ê±ÃÀ¹úÈÏʶµ½±ØÐë¶ÔÓëÖÆÔìºËÎäÆ÷Ïà¹ØµÄÃô¸ÐÐÅÏ¢½øÐбØÒªµÄ±£»¤£¬²»ÄÜ·ÅÈÎÆä×ÔÓÉÁ÷¶¯£¬·ñÔò½«ÓÐËð¹ú¼Ò°²È«¡£

¡¡¡¡£¨Ò»£©ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔ³¤ÆÚÒ¡°ÚÓÚ¡°¿ª·Å¡±Óë¡°¿ØÖÆ¡±Ö®¼ä

¡¡¡¡Ê×ÏÈ£¬´ÓÖƶȲãÃæÀ´¿´£¬×Ô½¨¹úÖ®ºóÖÁµÚÒ»´ÎÊÀ½ç´óÕ½£¬ÃÀ¹úÏÜ·¨µÚÒ»ÐÞÕý°¸( ¼´ÑÔÂÛ×ÔÓÉÌõ¿î) ¶ÔÃÀ¹úÕþ¸®¸ÉÔ¤ÐÅÏ¢Á÷¶¯ÐγÉÁËÃ÷ÏÔµÄÖÆÔ¼¡£´Ó˼ÏëºÍ¹ÛÄî²ãÃæ¿´£¬ÃÀ¹ú¹úÄÚ¸÷½×²ã¶ÔÕþ¸®ÊµÊ©Ç鱨ËѼ¯ºÍÐÅÏ¢Á÷¶¯¹ÜÖÆÆÕ±éÐÄ´æÒÉÂÇ¡£1921Ä꣬ÃÀ¹ú¹úÎñÇäÊ·Í¡Éú£¨Henry Lewis Stimson£©¿´µ½Ç鱨ÆÆÒë×é½Ø»ñµÄÈÕ±¾»úÃÜͨѶʱÍÑ¿Ú¶ø³ö¡°ÕæÕýµÄÉðÊ¿²»²ðÔÄËûÈËÐżþ¡±¡£Õâ¿ÉÒÔ˵ÊÇÕâÖÖÒÉÂǵÄÏÖʵ±íÏÖ¡£µ½1945Äê8ÔÂ16ÈÕ£¬µ±µÚ¶þ´ÎÊÀ½ç´óÕ½ÁÙ½üβÉùʱ£¬ÃÀ¹ú½¾ü¾ü·¨ÊðÊð³¤×¨ÃÅÏòÕ½Õù²¿²¿³¤Ìá½»¾øÃܱ¸Íü¼£¬²ûÃ÷¡°ºÍƽʱÆÚÀ¹½ØÍâ¹úÇ鱨»î¶¯µÄºÏ·¨ÐÔ¡±£¬Ç¿µ÷ÕâÖÖÀ¹½ØÐж¯²»Î¥·´ÃÀ¹ú1934ÄêÁª°îͨѶ·¨µÄµÚ605Ìõ¿î£¬Ò²²»Î¥·´ÃÀ¹úÏÜ·¨µÚËÄÐÞÕý°¸¡£(×¢£ºM.C. Cramer, ¡°Memorandum for: the Secretary of War, Subject: Legality of Signal Intelligence Activities,¡± 1945, Top Secret, pp£®3, 9, 12, 18£¬À´×ÔProquest¹«Ë¾µÄÃÀ¹ú¹ú¼Ò°²È«½âÃܵµ°¸Êý¾Ý¿â£¨DNSA£©£¬ÒÔÏÂÉæ¼°ÃÀ¹úÕþ¸®½âÃܵĵµ°¸Îļþ¶¼À´×Ôͬһ¸öÊý¾Ý¿â£¬³ý·ÇÁí×÷˵Ã÷¡£)

¡¡¡¡µ±½ñÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÔ´Í·¿ÉÒÔ×·Ëݵ½1946Ä꡶ԭ×ÓÄÜ·¨¡·ºÍ¡¶1947Äê¹ú¼Ò°²È«·¨¡·¡£ÕâÁ½²¿·¨ÂÉÕýʽÊÚȨÕþ¸®ÔÚ¡°Ò»¶¨Çé¿ö¡±Ï¿ÉÒÔ¶ÔÌض¨ÀàÐ͵ÄÐÅÏ¢½øÐйܿء£Ëùν¡°Ò»¶¨Çé¿ö¡±£¬Ö÷ÒªÖ¸ÔÚÉæ¼°¹ú¼Ò°²È«µÄÇé¿öÏ£¬¿ÉÒÔ¶ÔÏà¹ØµÄÐÅÏ¢Á÷¶¯½øÐйܿء£ÍøÂ簲ȫսÂԵĺËÐĸÅÄîÒ²Òò´ËµÃÒÔ³õ²½½ç¶¨£¬¼´ÐÅÏ¢×ÔÓÉÁ÷¶¯£¬µ«²»µÃË𺦹ú¼Ò°²È«¡£

¡¡¡¡20ÊÀ¼Í40Äê´ú£¬ÃÀ¹ú¶ÔÐÅÏ¢Á÷¶¯Óë¹ú¼Ò°²È«µÄ¹Ø×¢½¹µãÊÇ¡°±£»¤¡±£¬Ò²¾ÍÊDZ£»¤ÄÇЩÓë¹ú¼Ò°²È«Ïà¹ØµÄÐÅÏ¢£¬Ö÷ÒªÖ¸ÓëÖÆÔìÔ­×Óµ¯Ïà¹ØµÄÐÅÏ¢£¬±ÜÃâÒòÆä鶶øË𺦹ú¼Ò°²È«¡£¸ù¾Ý1946Ä꡶ԭ×ÓÄÜ·¨¡·£¬ËùÓÐÓëÔ­×Óµ¯ÖÆÔìÏà¹ØµÄÊý¾Ý±»³ÆΪ¡°ÏÞÖÆÐÔÊý¾Ý¡±¡£ÕâÖÖÀàÐ͵ÄÊý¾Ý±ØÐë´¦ÓÚÑÏÃܵı£»¤Ö®Ï£¬²»ÔÊÐíÈκηÇÕþ¸®×éÖ¯»ò¸öÈËÒÔÈκÎÃûÒå½Ó´¥ÈκδËÖÖÐÅÏ¢¡£

¡¡¡¡´ÓÕâʱ¿ªÊ¼£¬ÃÀ¹úÖð½¥½ÓÊÜÁËÕâÑùÒ»¸ö¹ÛÄΪÁ˱£ÕϹú¼Ò°²È«£¬Õþ¸®±ØÐë¿ØÖÆһЩÖØÒªµÄÐÅÏ¢£¬ÉõÖÁÊÇijЩ¿ÉÄÜÉæ¼°¸öÈËÒþ˽µÄÐÅÏ¢¡£µ«ÈçºÎ½ç¶¨¹ú¼Ò°²È«£¬ÈçºÎÅж¨ÄÄЩÐÅϢʹعú¼Ò°²È«£¬ÈçºÎ¾ßÌå¼ÓÒÔÖ´ÐкÍÂäʵ£¬ÔÚÃÀ¹ú½ÓÏÂÀ´µÄ¾ßÌåʵ¼ùÖÐÔò´æÔÚÃ÷ÏԵķÖÆ磬×îÖÕÐγɵÄÊÇÒ»ÖÖÒÔ¿ª·ÅΪÖ÷¡¢¼æ¹Ë±£»¤Óë¿ØÖƵݲÅÅ¡£1966Äêͨ¹ý²¢ÓÉÁֵǡ¤Ô¼º²Ñ·×ÜͳǩÊðµÄ¡¶ÐÅÏ¢×ÔÓÉ·¨¡·¿ÉÒÔ˵ÊÇÕâÖÖ°²ÅŵÄ×îµäÐ͵ÄÌåÏÖ¡£

¡¡¡¡¡¶ÐÅÏ¢×ÔÓÉ·¨¡·¹æ¶¨£¬Õþ¸®±ØÐëÎÞÌõ¼þµØ¹«²¼²»·ûºÏ»íÃâÌõÀýµÄËùÓÐÐÅÏ¢£¬ÈκÎרºá»òÈÎÒâ×è°­¹«ÖÚ»ñÈ¡Õþ¸®ÎļþµÄÕþ¸®»ú¹¹³ÉÔ±£¬¶¼½«¡°ÃæÁÙÒ»¸öÌرðίԱ»áµÄµ÷²é£¬ÒÔÈ·ÈÏËûÊÇ·ñÐèҪΪ¾Ü¾ø½»³öÎļþ³Ðµ£Ö÷ÒªÔðÈΡ£¡±¡²III¡ªSection 552-(a)4(F)¡³¡£¡¶ÐÅÏ¢×ÔÓÉ·¨¡·µÄͨ¹ýʹÕþ¸®ÎÞ·¨¶ÔËùÓÐÕþ¸®Îļþ¼ÌÐø±£³ÖÑÏÃܵĿØÖÆ¡£ÃñÖÚÄܹ»Ô®Òý¸Ã·¨°¸ÏòÕþ¸®»ú¹ØÒªÇó²éÔÄÓйصÄÎļþµµ°¸¡£

¡¡¡¡ÁíÒ»·½Ã棬ÕâÒ»·¨Âɹ涨¹«ÖÚÓÐȨ½Ó´¥Ìض¨ÖÖÀàÖ®ÍâµÄÕþ¸®ÐÅÏ¢¡£ÅÅÔÚ¿ÉÒÔÃâÓÚ¹«¿ªÅû¶µÄ¾ÅÀàÐÅÏ¢Ê×λµÄÊÇ¡°ÒÀ¾ÝÐÐÕþÃüÁîÌرðÊÚȨ£¬»ùÓÚ¹ú·À»òÍâ½»Õþ²ßÀûÒæ¶øÐèÒª±£ÃܵÄÐÅÏ¢¡±£¬Æä´ÎÊÇ¡°ÉÌÒµ»úÃÜ¡±ÒÔ¼°¡°¿ÉÄÜÇÖ·¸¸öÈËÒþ˽µÄÐÅÏ¢¡±¡²III¡ªSection 552-(b) 1, 4 and 6¡³¡£(×¢£ºPresident Gerald R. Ford, Memorandum for: The Attorney General, January 12, 1976. Top Secret.)

¡¡¡¡ÉÏÊöÁ½²¿·ÖÌõ¿î¹¹³ÉÁË¡¶ÐÅÏ¢×ÔÓÉ·¨¡·µÄÖ÷ÒªÄÚÈÝ¡£¹æ¶¨Õþ¸®»ú¹¹³ÉÔ±²»µÃ×è°­ÐÅÏ¢¹«¿ªµÄÌõÎÄÈçͬ·æÀûµÄ죬Äܹ»ÓÐЧµØ´©Í¸ÐÐÕþ²¿ÃŶÔÄÚ²¿ÐÅÏ¢µÄ±£»¤¡£ÔÊÐí×ÜͳÒÔÐÐÕþÃüÁʽ×èÖ¹Ìض¨ÐÅÏ¢Åû¶µÄ¹æ¶¨£¬ÔòÈÃÐÐÕþ²¿ÃÅ»ñµÃÁËÒ»¸ö²»Ì«´óµ«È´×ã¹»¼á¹ÌµÄ¶Ü£¬Ê¹ÆäÄܹ»ÔÚÒ»¶¨³Ì¶ÈÉϵֵ²¿ª·ÅÐÅÏ¢µÄÒªÇó¡£Á½Õß²¢´æÔÚÒ»²¿·¨ÂÉÖУ¬¿´ÆðÀ´ºÜÓÐЩ×ÔÏàì¶ÜÖ®´¦¡£

¡¡¡¡ÕâÖÖ¿´ËÆ×ÔÏàì¶ÜµÄ¹æ¶¨£¬Êµ¼ÊÉÏÕýÊÇÒªÇó¡°¿ª·Å¡±ÓëÖ÷ÕÅ¡°¿ØÖÆ¡±Á½·½Ö®¼ä΢Ã¶¯µÄ½á¹û¡£ÒÔÌá³ö¡¶ÐÅÏ¢×ÔÓÉ·¨¡·Á¢·¨¶¯ÒéµÄÔ¼º²¡¤ÄªË¹£¨John Moss£©²ÎÒéԱΪ´ú±íµÄÒ»·½ÈÏΪ£¬Ó¦¸ÃÍƶ¯Õþ¸®ÐÅÏ¢µÄ¹«¿ªÓë͸Ã÷¡£ÄªË¹´Ó20ÊÀ¼Í50Äê´úºóÆÚ¿ªÊ¼ÊÜÃü¾ÍÐÐÕþ»ú¹ØѹÖÆÐÂÎÅÓßÂÛµÄÎÊÌâ½øÐе÷²é¡£ÕâÒ»µ÷²é´ÙʹĪ˹¿ªÊ¼¹Ø×¢ÐÐÕþ»ú¹ØÀÄÓÃȨÁ¦¡¢×è°­ÐÅÏ¢×ÔÓÉÁ÷¶¯µÄÎÊÌ⣬²¢´ÙʹËû×îÖÕÌá³öÖƶ¨¡¶ÐÅÏ¢×ÔÓÉ·¨¡·µÄ²Ý°¸¡£(×¢£ºPhilip W. Buchen, Memorandum for: The President, Subject: Legislation on Electronic Surveillance for Foreign Intelligence Purposes, March 15, 1976. Top Secret.)¶øÒÔÁֵǡ¤Ô¼º²Ñ·×ÜͳΪ´ú±íµÄÁíÒ»·½ÔòÊÔͼÏ÷Èõ¡¶ÐÅÏ¢×ÔÓÉ·¨¡·¶ÔÐÐÕþ»ú¹¹È¨Á¦µÄÏÞÖÆ¡£¾Ýµ±Ê±µ£ÈÎÔ¼º²Ñ·×ÜͳÐÂÎÅÃØÊéµÄ±È¶û¡¤ÄªÒ®Ë¹£¨Bill Moyers£©»ØÒ䣬¡°Ô¼º²Ñ·Í´ºÞÈκÎÓйØÐÅÏ¢×ÔÓÉ·¨µÄÏë·¨£¬Í´ºÞ¼ÇÕ߶ÔÕþ¸®¹ÙÔ±×·¸ù¾¿µ×µÄÔðÎÊ£¬Í´ºÞ¶Ô¹Ù·½¹ÛµãµÄÌôÕ½¡£¡­¡­µ±¹ú»áÌÖÂÛ¡¶ÐÅÏ¢×ÔÓÉ·¨¡·Ê±£¬ËûÊÔͼÐ޸IJ¢Ï÷ÈõÕâ·Ý²Ý°¸¡£µ±¡¶ÐÅÏ¢×ÔÓÉ·¨¡·½øÈë×ÜͳǩÊðµÄ³ÌÐòʱ£¬ËûÍþвҪʹÓᮿڴü·ñ¾ö¡¯£¨Pocket Vote£©¡­¡­ËäÈ»ËûÔÚ1966ÄêÃÀ¹ú¹úÇìÈÕÇ©ÊðÁË¡¶ÐÅÏ¢×ÔÓÉ·¨¡·£¬²¢Ëæºó·¢±íÁËÈÈÇéÑóÒçµÄÑÝ˵£¬µ«ÊÇÔÚ˽ÏÂÀËûÈ´ÒÔÎÛÑÔ»àÓïÖäÂÐÅÏ¢×ÔÓÉ·¨¡·¡£¡±(×¢£ºPhilip W. Buchen, Talking Points, Meeting: March 12, 1976, at 10:30 a.m. in White House Situation Room, Subject: Legislation on Electronic Surveillance for Foreign Intelligence Purposes, March 12, 1976.)

¡¡¡¡´ÓĪҮ˹µÄ»ØÒäÖУ¬¿ÉÒÔ²¿·Ö¿´³ö¹ØÓÚÐÅÏ¢¡°¿ª·Å¡±µÄÖ÷ÕÅÔÚÃÀ¹úȷʵÓÐ×ŷdz£Ç¿´óµÄÓ°ÏìÁ¦£¬ÃÀ¹úÕþ¸®µÄȨÁ¦Ò²È·ÊµÊܵ½ÁËÏàÓ¦µÄÖÆÔ¼¡£¶øÁíÒ»·½Ã棬¶Ô¹ú¼Ò°²È«µÄ¹ØעͬÑùÎÞ·¨±»ÍêÈ«ºöÊÓ¡£Á½ÕßÖ®¼äÐγÉÁËÒ»ÖÖ΢ÃîµÄÕÅÁ¦½á¹¹£¬²¢³ÊÏÖ³öÃ÷ÏԵĽ׶ÎÐÔÆð·ü£¬´Ó¼ÓÇ¿¿ØÖƺÍÏÞÖÆÐÅÏ¢Á÷¶¯µ½·ÅËÉ¿ØÖƺ͹ÄÀøÐÅÏ¢¹«¿ª£¬ÆðÆð·ü·ü£¬·Ç³£ÄÍÈËѰζ¡£

¡¡¡¡1982Ä꣬Àï¸ù×ÜͳǩÊðÁ˵Ú12356ºÅ×ÜͳÐÐÕþÁî¡£¸ÃÐÐÕþÃüÁîÔÚ1982ÄêÖÁ1995Äê¼ä£¬ÔÊÐíÃÀ¹úÁª°îÕþ¸®Ïà¹Ø²¿ÃÅÔ®Òý¡¶ÐÅÏ¢×ÔÓÉ·¨¡·Öйú¼Ò°²È«ÀýÍâÌõ¿î£¬¶Ô´óÁ¿±»ÈÏΪÓë¹ú¼Ò°²È«Ïà¹ØµÄÐÅÏ¢²»Ó蹫¿ª¡£ÓÉ´ËÒý·¢²¢ÀۼƵÄÇ¿ÁÒ²»Âú£¬ÆÈʹ¿ËÁÖ¶Ù×ÜͳÔÚ1995ÄêÖÁ1999Äê¼ä´ó·ù·Å¿í¶ÔÐÅÏ¢µÄ¹ÜÖÆ£¬½âÃܲ¢Åû¶ÁË´óÁ¿µÄµµ°¸Îļþ¡£´ÓÀï¸ùµÄÇ¿»¯µ½¿ËÁֶٵķÅËÉ£¬¹¹³ÉÒ»¸öÍêÕûµÄÑ­»·¡£

¡¡¡¡2001Äê11ÔÂ1ÈÕ£¬ÃÀ¹ú˾·¨²¿³¤¸ÔÈøÀ×˹£¨Alberto R. Gonzales£©Æð²Ý²¢ÓÉÃÀ¹ú×Üͳ²¼Ê²Ç©ÊðÁ˵Ú13233ºÅÐÐÕþÃüÁÏÞÖÆÅû¶ǰÈÎ×ÜͳµÄÏà¹Ø¼Ç¼¡£(×¢£ºExecutive Order no. 13233, Further Implementation of the Presidential Records Act, 66 F.R. 56025, À´Ô´£ºhttp://www.gpo.gov/fdsys/pkg/FR-2001-11-05/pdf/01-27917.pdf#page=1£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)2002Ä꣬ÃÀ¹ú¹ú»áͨ¹ý¡¶2003Äê²ÆÕþÄê¶ÈÇ鱨ÊÚȨ·¨¡·£¬¶Ô¡¶ÐÅÏ¢×ÔÓÉ·¨¡·×ö³öÐÞ¶©£¬½ûÖ¹ÃÀ¹úÇ鱨»ú¹¹»ØÓ¦ÈκÎÍâ¹úÕþ¸®»ò¹ú¼Ê×éÖ¯»ùÓÚ¡¶ÐÅÏ¢×ÔÓÉ·¨¡·ÏòÃÀ¹úÌá³öµÄÐÅÏ¢¹«¿ªÒªÇó¡£ÕâÀïµÄÇ鱨»ú¹¹Ö¸µÄÊÇÒÀ¾Ý¡¶1947Äê¹ú¼Ò°²È«·¨¡·µÚ3ÌõµÚ4¿î½¨Á¢µÄ»ú¹¹£¬°üÀ¨ÖÐÑëÇ鱨¾Ö¡¢¹ú¼Ò°²È«¾Ö¡¢¹ú·À²¿Ç鱨¾Ö¡¢¹ú¼ÒͼÏñÓë²â»æ¾Ö¡¢¹ú¼ÒÕì²ì°ì¹«ÊÒ£¨the National Reconnaissance Office£©¡¢¹ú·À²¿ÄÚ²¿¸ºÔðÕì²ìµÄ°ì¹«ÊÒ¡¢·ÖÁÐÓÚ½º£¿ÕÈý¾üºÍº£¾ü½ս¶ÓµÄÇ鱨»ú¹¹¡¢Áª°îµ÷²é¾Ö¡¢²ÆÕþ²¿¡¢ÄÜÔ´²¿¡¢º£°¶¾¯ÎÀ¶Ó¡¢¹úÍÁ°²È«²¿¡¢ÃÀ¹ú¹úÎñÔºµÄÇ鱨ÓëÑо¿¾Ö£¬ÒÔ¼°ÆäËûÈκÎÓëÇ鱨Ïà¹ØµÄ»ú¹¹¡£¸ù¾Ý×ÜͳµÄÐèÒªºÍ¹ú¼Ò°²È«µÄÐèÇóÇ¿»¯ÐÅÏ¢¿ØÖƵÄËßÇó£¬Í¨¹ý·¨Âɵõ½Á˳ä·ÖÌåÏÖ¡£

¡¡¡¡2009Äê1ÔÂ21ÈÕ£¬°Â°ÍÂí×ÜͳǩÊðÁ˵Ú13489ºÅÐÐÕþÃüÁȡÏûÁ˵Ú13233ºÅÐÐÕþÃüÁîµÄÏÞÖÆ¡£2009Äê11ÔÂ29ÈÕ£¬°Â°ÍÂí×ÜͳǩÊðÁ˵Ú13526ºÅÐÐÕþÃüÁ½øÒ»²½ÊÚȨÕþ¸®ÔÚ½Óµ½ÐÅÏ¢¹«¿ªµÄÇëÇóÖ®ºó£¬¶ÔijЩÌض¨ÀàÐ͵ı»ÈÏΪÓë¹ú¼Ò°²È«Ïà¹ØµÄÐÅÏ¢½øÐмÓÃÜ¡£ÕâÒâζ×ÅÄÇЩ¸ù¾Ý¡¶ÐÅÏ¢×ÔÓÉ·¨¡·±»ÔÊÐí¹«¿ªµÄÐÅÏ¢£¬ÈÔÈ»¿ÉÄܱ»Õþ¸®ÖØÐÂÉ趨Ϊ²»¿É¹«¿ª¡£ÓÐȤµÄÊÇ£¬ÔÚͬһ¸öÐÐÕþÃüÁîÀ°Â°ÍÂíÓÖÌá³öÁËÒ»¸öʱ¼ä±í£¬¹æ¶¨ÄÇЩ±»ÈÏΪûÓбØÒª¼ÌÐø±£ÃܵÄÐÅÏ¢£¬¿ÉÒÔÔÚ¾­¹ýÒ»¶Îʱ¼äºó×Ô¶¯½âÃÜ¡£(×¢£ºExecutive Order 13526-Classified National Security Information, À´Ô´£ºhttp://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¶Ô±È°Â°ÍÂí¡¢²¼Ê²Õþ¸®ÈÎÄÚÇ©ÊðµÄÕâһϵÁÐÃüÁ»á·¢ÏÖÈýµã£º

¡¡¡¡Ê×ÏÈ£¬ÐÅÏ¢¿ª·ÅȷʵÊÇÃÀ¹úÁ¢¹úÕþÖÎ˼ÏëµÄÖØÒª×é³É²¿·Ö£¬µ«ÎÞÂÛÃñÖ÷¡¢¹²ºÍÁ½µ³£¬ÔÚÈëÖ÷°×¹¬Ö®ºó£¬¶¼ÈÏͬ´ËÖÖ¿ª·Å²»Ó¦Î£¼°ÃÀ¹ú¹ú¼Ò°²È«¡£Í¬Ê±£¬ËäÈ»¿ª·ÅºÍ¿ØÖƵÄÖ±½Ó¶ÔÏóÍùÍùÊÇijЩ¾ßÌåµÄÐÅÏ¢£¬µ«Í¬Ñù×ã¹»³ÉΪÕÛÉä³öͬ½ìÕþ¸®¶ÔÍøÂç¿Õ¼ä¹ÜÖƵÄÁ¦¶È£¬Òò´ËÔÚ²¼Ê²¡¢°Â°ÍÂíµÈÕþ¸®ÈÎÄÚ£¬ÕâЩ¶ÔÐÅÏ¢¿ª·Å¡¢¿ØÖƵÄÕþÁî±ä»¯£¬¿ÉÒÔ¿´×÷ÊǺâÁ¿»òÕßÔ¤²âÃÀ¹úÕþ¸®¶ÔÍøÂç¿Õ¼ä¿ØÖÆÁ¦¶ÈµÄÖØÒªÖ¸±ê¡£

¡¡¡¡Æä´Î£¬ÐÅÏ¢¿ª·ÅÓëÇ¿»¯¿ØÖÆÖ®¼äµÄÕÅÁ¦£¬²»½ö½öÊÇÀíÄîÖ®Õù£¬»¹ÓëÃÀ¹ú¹úÄÚÁ½µ³Ö®¼äµÄÕþÖζ·Õù´æÔÚ×Å΢Ãî¶ø¸´ÔӵĹØϵ¡£Í¨¹ý¶Ô¿ª·ÅÊÚȨÉæ¼°µÄÄêÏÞ¡¢ÐÅÏ¢Àà±ðÒÔ¼°Õþ¸®¾ßÌå²Ù×÷ȨÏÞµÄ΢Ãîµ÷Õû£¬¿ÉÒÔ¹¹Ôì³öÂú×ã¹úÄÚÕþÖζ·ÕùÐèÒªµÄй¤¾ß¡£

¡¡¡¡µÚÈý£¬ÕûÌåÀ´¿´£¬ÎÞÂÛµ³Åɱ³¾°»¹ÊǸöÈË·ç¸ñ£¬×Ô2001ÄêÖ®ºóµÄÃÀ¹úÕþ¸®£¬ÎÞÂÛ²¼Ê²Õþ¸®£¬»¹Êǰ°ÍÂíÕþ¸®¶¼Ç¿»¯Á˶ÔÐÅÏ¢µÄ¿ØÖÆ£¬ÆäÖ÷ÒªÇý¶¯Á¦¶¼ÊÇΪÁ˱£ÕÏÃÀ¹úµÄ¹ú¼Ò°²È«¡£ÕâÊǾÅÒ»Ò»¿Ö²ÀÏ®»÷ʼþ´øÀ´µÄºó¹û¡£¸ÃʼþµÄ·¢Éú´Ì¼¤²¢Íƶ¯ÁËÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄתÐÍ¡£

¡¡¡¡£¨¶þ£©ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔÏò¡°¿ØÖÆ¡±×ªÐÍ

¡¡¡¡2001Äê9ÔÂ11ÈÕ£¬ÃÀ¹úÔâÓö¿Ö²ÀÏ®»÷¡£ÔÚÕâһʼþµÄÍƶ¯Ï£¬³¤ÆÚÆÈÓÚÃÀ¹ú¹úÄÚÕþÖÎѹÁ¦¶øDZ·üÔÚˮϵÄÐÅÏ¢¡°¿ØÖÆ¡±Õ½ÂÔ¿ªÊ¼¸¡³öË®Ãæ¡£ÆäÔ­ÒòÔÚÓÚ£¬¾ÅһһʼþÓ°ÏìÁËÃÀ¹úÕþ¸®Öƶ¨Óëʵ¼ùÏà¹ØÕþ²ßËùÒÀÀµµÄ¹úÄÚÃñÒâ»ù´¡¡£ÃÀ¹ú¸ÇÂåÆÕ¹«Ë¾´Ó20ÊÀ¼Í60Äê´úÖÐÆÚÖÁ2003Äê¼ä½øÐÐÁËһϵÁеÄÏà¹Øµ÷²é£¬Á˽âÃÀ¹úÃñÖÚ¶Ô¡°ºÎν¹ú¼ÒδÀ´×î´óÍþв¡±µÄ¿´·¨¡£µ÷²éÉèÁ¢ÁË´óÐ͹«Ë¾¡¢´óÐ͹¤»áºÍ´óÕþ¸®Èý¸öÑ¡Ïî¡£µ÷²éÊý¾ÝÏÔʾ£¬ÔÚ1965Äê2ÔÂÖÁ2004Äê11ÔµÄʱ¶ÎÀÃÀ¹úÃñÖÚʼÖÕÈÏΪ´óÕþ¸®¶ÔÓÚ¹ú¼ÒµÄδÀ´¹¹³ÉÁË×î´óµÄÍþв¡£ÖµµÃ×¢ÒâµÄÊÇ£¬×ÔÀäÕ½ºóÆÚÖÁ2000Äê10Ô£¬ÈÏΪ´óÕþ¸®¹¹³ÉÍþвµÄÃñÖÚ³ÊÏÖÎȶ¨µÄÉÏÉýÇ÷ÊÆ¡£1985Äê6Ôµĵ÷²éÊý¾ÝÏÔʾ£¬50%µÄÊÜ·ÃÕßÈÏΪ´óÕþ¸®¶ÔÃÀ¹úµÄ°²È«¹¹³ÉÁË×î´óµÄÍþв¡£2000Äê10Ôµĵ÷²éÊý¾ÝÏÔʾ£¬Õâ¸öÊý×ÖÉÏÉýµ½ÁË65%¡£(×¢£ºDarren K. Carlson (Government and Public Affairs Editor), ¡°Big Government, Big Threat?¡± À´Ô´£ºhttp://www.gallup.com/poll/content/print.aspx?ci=14458, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡È»¶ø£¬¾ÅһһʼþÖ®ºó£¬ÊÜ·ÃÕ߶ÔÕâ¸öÎÊÌâµÄÈÏÖª·¢ÉúÁ˾޴óµÄ±ä»¯¡£2002Äê7Ôµĵ÷²éÊý¾ÝÏÔʾ£¬Ö»ÓÐ47%µÄÊÜ·ÃÕßÈÏΪ´óÕþ¸®ÊÇ×î´óµÄÍþв£¬ÕâÒ»Êý×ÖÊÇ×Ô1983ÄêÒÔÀ´µÄÀúÊ·×îµÍµã¡£(×¢£ºDarren K. Carlson (Government and Public Affairs Editor), ¡°Big Government, Big Threat?¡±, À´Ô´£ºhttp://www.gallup.com/poll/content/print.aspx?ci=14458, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¾ÅһһʼþµÄÁíÒ»¸öÓ°ÏìÔÚÓÚ£¬ÃÀ¹úÃñÖÚͻȻ¸ÐÊܵ½ÁËÕæʵ´æÔڵľ޴óÍþв¡£ÎªÁËÓ¦¶ÔÕâÖÖÍþв£¬ËûÃÇ×ö³öÁËijÖÖÑ¡Ôñ£¬°üÀ¨ÔÝʱÎþÉü´ËÇ°±»¿´×÷ÊÇÖÁ¹ØÖØÒªµÄºËÐļÛÖµ£¬¼´¸öÈË×ÔÓÉ¡£ÔÚ¾ÅһһʼþÖ®ºó£¬2002Äê1Ôµĵ÷²éÏÔʾ£¬ÓÐ47%µÄÊÜ·ÃÕßÈÏΪÕþ¸®Ó¦¸Ã²ÉÈ¡¸÷ÖÖ±ØÒªµÄ´ëÊ©±ÜÃâÔÙ¶ÈÔÚÃÀ¹ú·¢Éú¿Ö²ÀÏ®»÷ʼþ£¬ÆäÖаüÀ¨ÄÇЩ»áÇÖ·¸×ÔÓÉÃñȨµÄ´ëÊ©¡£ËäÈ»Ëæ×Åʱ¼äµÄÍÆÒÆ£¬ÕâÒ»±ÈÂÊÔÚÖð½¥½µµÍ£¬µ«µ½ÁË2003Äê11Ô£¬ÈÔÈ»ÓÐ31%µÄÊÜ·ÃÕß³ÖÏàͬµÄ¹Ûµã¡£(×¢£ºDarren K. Carlson, (Government and Politics Editor), ¡°Far Enough? Public Wary of Restricted Liberties,¡± À´Ô´£ºhttp://www.gallup.com/poll/content/print.aspx?ci=10324, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¸ù¾ÝÏà¹ØµÄ¹«¿ªÐÅÏ¢ºÍ×ÊÁÏ£¬ÃÀ¹úÔÚÍøÂç¿Õ¼äʵʩµÄ¡°¿ØÖÆ¡±Òâζ×ÅÕþ¸®ÔËÓÃÌض¨µÄÐÅϢϵͳ£¬¼àÊÓÌض¨·¶Î§ÄÚµÄÐÅÏ¢Á÷¶¯ÒÔ¼°ÍøÂçÓû§µÄ»î¶¯¡£ÒÔÃÀ¹úÀ´Ëµ£¬Æä¡°¿ØÖÆ¡±·ÖΪÁ½¸ö²¿·Ö£¬°üÀ¨¶ÔÍâ¼à¿ØºÍ¶ÔÄÚ¼à¿Ø¡£

¡¡¡¡¶ÔÍâ¼à¿ØÖ÷ÒªÓɹú¼Ò°²È«¾Ö¸ºÔð¡£ËüÒÔÀäսʱÆÚÒÅÁôÏÂÀ´µÄ¶ÔËÕÇ鱨¼¼ÊõÊÕ¼¯ÏµÍ³Îª»ù´¡£¬×ÛºÏÃÀ¹ú×ÔÉíµÄ½âÃܵµ°¸ºÍÅ·ÖÞÒé»á2001Äê×éÖ¯µÄÁÙʱίԱ»áÌṩµÄµ÷²é±¨¸æ£¬Æ¾½è20ÊÀ¼Í40Äê´úÓëÓ¢¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢°Ä´óÀûÑÇÇ©ÊðµÄ¡¶Îå¹úÇ鱨½»»»Ð­Òé¡·£¬ÔÚÈ«Çò·¶Î§ÄÚ½¨Á¢²¢ÍêÉÆÁËÒ»Ì×ÃûΪ¡°Ìݶӡ±£¨Echelon£©µÄ¼à¿Øϵͳ¡£¸Ãϵͳ¾ß±¸È«Ãæ¼àÌýµç»°¡¢ÊÖ»ú¡¢´«Õæ¡¢µç×ÓÓʼþ¡¢ÍøÒ³ä¯ÀÀ¡¢¼´Ê±Í¨Ñ¶µÈͨѶÊֶεÄÄÜÁ¦£¬Ã¿ÌìÄܹ»´¦Àí½Ó½ü»ò³¬¹ý10ÒڴεÄͨѶ¡£

¡¡¡¡Óë¶ÔÍâ¼à¿ØÏà±È£¬ÔÚÃÀ¹ú¾³ÄÚÖصãÕë¶ÔÃÀ¹ú¹«ÃñµÄÐÅÏ¢»î¶¯½øÐеĶÔÄÚ¼à¿Ø£¬Ê¼ÖÕÊÇÃÀ¹úÐÅÏ¢°²È«Õ½ÂÔÖеÄÄѵ㡣ÀäսʱÆÚ£¬´Ó1947Äêµ½1973Ä꣬ÃÀ¹ú¹ú¼Ò°²È«¾ÖµÄ¡°ÈýÒ¶²ÝÐж¯¡±£¨Operation Shamrock£©Ôø¾­ÔÚ°ëºÏ·¨×´Ì¬Ï£¬¼à¿ØÁËÈ«ÃÀ¹«ÃñËùÓеĹú¼Êµç±¨¡£(×¢£ºDepartment of Justice, Report on the Inquiry into CIA-Related Electronic Surveillance Activities, June 30, 1976. Top Secret.)20ÊÀ¼Í70Äê´ú·¢ÉúµÄ¡°Ë®ÃÅʼþ¡±´Ùʹ¹ú»á¶ÔÖÐÑëÇ鱨¾ÖµÈ»ú¹¹½øÐÐÁËÃØÃÜÌýÖ¤µ÷²é¡£Ôڴ˵÷²é¹ý³ÌÖУ¬¡°ÈýÒ¶²ÝÐж¯¡±ÒâÍâÆع⣬Óɴ˵¼ÖÂÃÀ¹ú¹ú»áÖƶ¨ÁË¡¶1978Äê¶ÔÍâÇ鱨¼à¿Ø·¨¡·£¬½ûÖ¹ÔÚȱÉÙÖ¤¾ÝµÄÇé¿ö϶ÔÃÀ¹ú¹«ÃñµÄͨÐŻ½øÐмàÌý¡£µ±Ê±µ£ÈÎÃÀ¹ú×ÜͳµÄ¸£ÌØ£¨Gerald Rudolph Ford, Jr.£©²»¹ËʱÈιú·À²¿³¤µÄÀ­Ä·Ë¹·Æ¶ûµÂºÍÖÐÇé¾Ö¾Ö³¤ÇÇÖÎÿðþº€²¼Ê²µÄ·´¶Ô£¬Íƶ¯¡¶1978Äê¶ÔÍâÇ鱨¼à¿Ø·¨¡·Íê³ÉÁ¢·¨³ÌÐò²¢Ç©ÊðÉúЧ¡£(×¢£ºPhilip W. Buchen, Memorandum for: The President, Subject: Legislation on Electronic Surveillance for Foreign Intelligence Purposes, March 15, 1976. Top Secret.)

¡¡¡¡×Ô¡°Ë®ÃÅʼþ¡±Ö®ºó£¬¶ÔÄÚ¼à¿Ø³ÉΪÃÀ¹úÐÅÏ¢°²È«Õ½ÂÔÖеÄÒ»¸ö»ÒÉ«Ãô¸ÐÇøÓò¡£ÔÚ¾ßÌåµÄÐж¯ÊµÊ©¹ý³ÌÖУ¬ÒÔÁª°îµ÷²é¾ÖΪÀý£¬ËäÈ»Ëü´Ó20ÊÀ¼Í70Äê´ú¿ªÊ¼¾ÍÖð½¥·¢Õ¹³öÁËÒ»Ì×Äܹ»¶Ôµç»°£¨Áúϵͳ£¬Dragon System£©ºÍºóÀ´µÄµç×ÓÓʼþÓëÍøÂçä¯ÀÀ½øÐмà¿ØµÄϵͳ£¨Ê³È⶯Îïϵͳ£¬Carnivore System£©£¬µ«ÆäÔËÓÃÈÔÊܵ½ÑϸñµÄÏÞÖÆ£ºÊ×ÏÈ£¬±ØÐëÈ¡µÃÌض¨·¨Í¥µÄ¼àÌýÐí¿É£¨¼´Í¨¹ý·Ç¼àÌý;¾¶Ö¤Ã÷ij¸öÃÀ¹ú¹«ÃñÓб»¼àÌýµÄ±ØÒª£©£¬È»ºó²ÅÄÜʵʩ¼à¿Ø£»Æä´Î£¬ÕâÖÖ¼à¿ØʼÖÕ´¦ÓÚÑϸñµÄ±£ÃÜ״̬£¬ÒÔ±ÜÃâýÌåµÄ¹Ø×¢¡£¾Åһһʼþ֮ǰ£¬¡°Ê³È⶯ÎϵͳµÄ´æÔÚºÍÔË×÷±»Æع⣬ȫÃÀÓßÂÛ¶ÙʱһƬ»©È»£¬ÆÈʹ¹ú»á×¼±¸½øÐÐÌýÖ¤£¬²¢ÊÔͼ¶ÔÆä½øÐпØÖÆ¡£(×¢£ºLaurie Assed, ¡°FBI Given Deadline on ¡®Carnivore¡¯ Issues,¡± ABC News, Aug. 3rd, 2000, À´Ô´£ºhttp://www.firstamendmentcenter.org/judge-gives-10-day-deadline-for-fbi-in-carnivore-case, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¾ÅһһʼþºóÖÁ2008ÄêÃÀ¹ú×Üͳѡ¾ÙÕâ¶Îʱ¼ä£¬ÃÀ¹ú¹úÄÚµÄÕþÖηÕΧת±äÁËÃÀ¹úÃñÖÚ¶ÔÕþ¸®¼à¿ØÐÅÏ¢Á÷¶¯µÄ̬¶È£¬²¢½øÒ»²½Ó°ÏìÁËÃÀ¹ú¹ú»áÒéÔ±¶ÔÏà¹ØÁ¢·¨µÄ̬¶È¡£¸ÇÂåÆÕÃñÒâµ÷²é½á¹ûÒ²ÏÔʾ£¬ÃñÖÚÖÁÉÙÔÚ×î³õµÄ4Äê¼ä£¨2001ÄêÖÁ2005Ä꣩ԸÒâΪÁË¡°°²È«¡±ÎþÉüÒ»¶¨³Ì¶ÈµÄ¡°×ÔÓÉ¡±£¬½ÓÊÜÕþ¸®µÄ¼à¿Ø¡£ÔÚÕâÖÖ»·¾³Ï£¬ÃÀ¹ú¹ú»áÒ²¼Ó¿ìÁ˶ÔÏà¹Ø·¨ÂɵÄÍƽø¡£Ô­±¾Òª½ÓÊÜÑÏÀ÷Éó²éÉõÖÁ¿ÉÄܱ»Ç¿ÖÆÈ¡ÏûµÄÁª°îµ÷²é¾ÖµÄ¡°Ê³È⶯Î¼à¿ØϵͳÔÚ¹ú»áͨ¹ýÁËÉó²é£¬²¢ÇÒ»¹µÃµ½Á˸ü¶àµÄ×ʽðÖ§³Ö¡£ÔÊÐíÕþ¸®¼à¿ØÐÅÏ¢Á÷¶¯¡¢ÒªÇó¹«Ë¾ÏòÕþ¸®Ìṩ¸öÈ˵Ļ¥ÁªÍø»î¶¯Êý¾ÝÒÔÅäºÏ·´¿ÖµÈ¹ú¼ÒÐèÒªµÄ¡¶°®¹úÕß·¨°¸¡·»ñµÃÁËͨ¹ý¡£¡¶1978Äê¶ÔÍâÇ鱨·¨¡·ÖжԼàÌýÃÀ¹ú¹«ÃñÉèÖõÄÇ°ÌáÌõ¼þ£¨Í¨¹ý·Ç¼àÌý·½Ê½»ñµÃÖ¤¾Ý£¬Ö¤Ã÷Æä´æÔÚ¼äµýÏÓÒɵȣ©±»É¾³ýÁË¡£ÖîÈç´ËÀàµÄ±ä»¯¶¼±êÖ¾×ÅÔÚÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔÖУ¬¡°¿ØÖÆ¡±¿ªÊ¼Õ¼¾ÝÓÅÊƵØλ¡£

¡¡¡¡£¨Èý£©ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔ´Ó¡°¿ØÖÆ¡±Ïò¡°ËÜÔ족תÐÍ

¡¡¡¡°Â°ÍÂí²Î¼Ó×Üͳ¾ºÑ¡Ê±£¬²¼Ê²Õþ¸®Ç¿»¯¼àÌýÄÜÁ¦µÄ×ö·¨³ÉΪÃñÖ÷µ³¹¥»÷µÄÖصãÖ®Ò»£¬ÀíÓÉÊǴ˾ÙΪÁ˹ú¼Ò°²È«¶øΣ¼°ÃÀ¹úÁ¢¹úµÄºËÐļÛÖµ£¬ÒòСʧ´ó¡£¾ßÓзí´ÌÒâζµÄÊÇ£¬ÈëÖ÷°×¹¬Ö®ºó£¬°Â°ÍÂíÕþ¸®¶ÔÄںͶÔÍâ¿ØÖÆÄÜÁ¦µÄ½¨Éè·Çµ«Ã»ÓÐÍ£Ö¹£¬·´¶øÈ¡µÃÁ˳¤×ãµÄ½ø²½£¬ÍøÂ簲ȫ³¬Ô½·´¿ÖÕ½ÕùµÄÐèÇ󣬳ÉΪÃÀ¹ú¹ú¼Ò°²È«µÄÖØÒª×é³É²¿·Ö£¬±»¸³Óè¸üÖØÒªµÄµØλ¡£¸ü¾ß½ø¹¥ÐԵġ°»ý¼«·ÀÓù¡±ºÍ¡°ËÜÔ족µÄ¸ÅÄîÓ¦Ô˶øÉú£¬½«Ä¿±êÖ±½ÓÖ¸ÏòÁËÈ«ÇòÍøÂç¿Õ¼ä¡£

¡¡¡¡2011Ä꣬ÃÀ¹ú°×¹¬¡¢¹úÎñÔº¡¢¹ú·À²¿¡¢¹úÍÁ°²È«²¿¡¢Ë¾·¨²¿¡¢ÉÌÎñ²¿ÁªºÏ°ä²¼ÁË¡¶ÍøÂç¿Õ¼ä¹ú¼ÊÕ½ÂÔ¡·£¬Ã÷È·Ìá³öÁËÒª×ÛºÏÔËÓÃ3DÊֶΣ¨¼´Íâ½»¡¢·ÀÓùºÍ·¢Õ¹£©£¬È·±£ÃÀ¹úÕ½ÂÔÄ¿±êµÄʵÏÖ¡£ÆäÖÐÓë·ÀÓùÏà¹ØµÄ²¿·ÖÊ״ν«Ô­ÏȾÖÏÞÓÚ¹ú·ÀÕ½ÂԵġ°ÍþÉ塱սÂÔÒýÈëÍøÂ簲ȫÁìÓò£¬Ìá³ö½«×ÛºÏÔËÓÃÍøÂç¿Õ¼äµÄ¼¼ÊõÊֶκÍʵÌåÊÀ½çµÄÎïÀíɱÉËÊֶΣ¬À´Ó¦¶ÔÐéÄâÊý×ÖÊÀ½çµÄÐÅÏ¢¹¥»÷¡£ÃÀ¹ú¹ú·À²¿ÔÚÒÀ¾Ý¡¶ÍøÂç¿Õ¼ä¹ú¼ÊÕ½ÂÔ¡·Ï¸»¯ÂäʵµÄ¡¶ÍøÂç¿Õ¼äÐж¯Õ½ÂÔ¡·ÖУ¬´´ÔìÁË¡°»ý¼«·ÀÓù¡±£¨Active Defense£©µÄ¸ÅÄÃ÷È·Ö¸³ö¡°µ±·¢ÏÖÃÀ¹ú¾³ÍâµÄ¼ÆËã»úÄÚ´æ´¢ÓпÉÄÜΣº¦ÃÀ¹úµÄ´úÂëʱ¡±£¬¿ÉÒÔ¡°Ö÷¶¯¡±²ÉÓðüÀ¨ÎïÀí»ÙÉËÔÚÄÚµÄÊֶΡ°Ô½¾³¡±¹¥»÷£¬ÒÔÏû³ýÕâÖÖÍþв¡£(×¢£ºDepartment of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934, À´Ô´£ºhttp://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)2013Äê3ÔÂ12ÈÕ£¬ÃÀ¹ú¹ú¼Ò°²È«¾Ö¾Ö³¤¡¢Íø¾ü˾Á˾ÁîÑÇÀúɽ´ó£¨Keith Alexander£©Öн«ÔÚ¹ú»á²ÎÒéÔº¾üÊÂίԱ»áÌýÖ¤»áÉÏ×÷֤ʱ±íʾ£¬ÃÀ¹úÕýÔÚ×齨40Ö§ÍøÂçÕ½²¿¶Ó£¬ÆäÖÐ13Ö§ÊôÓÚ½ø¹¥ÐÔ²¿¶Ó£¬27Ö§ÊôÓÚ·ÀÓùÐÔ²¿¶Ó£¬ÆäÕ½ÂԵġ°¹¥»÷ÐÔ¡±Óɴ˿ɼûÒ»°ß¡£(×¢£ºJohn Reed, ¡°Cyber Command Fielding 13 ¡®Offensive¡¯ Cyber Deterrence Units,¡± http://killerapps.foreignpolicy.com/posts/2013/03/12/us_cyber_command_developing_13_offensive_cyber_deterrence_units.)

¡¡¡¡Í¬Ê±£¬´Ó2010Ä꿪ʼ£¬ÓÉ¿ËÁÖ¶Ù¹úÎñÇäÖ÷µ¼µÄÃÀ¹ú¹úÎñÔºÖð½¥ÐγɺÍÍêÉÆÁË¡°»¥ÁªÍø×ÔÓÉ¡±µÄ¸ÅÄ²¢½«Æä×÷ΪºËÐĸÅÄͳÁ졶ÍøÂç¿Õ¼ä¹ú¼ÊÕ½ÂÔ¡·µÄÈ«ÎÄ¡£Õâ¸ö¸ÅÄîµÄºËÐÄÒªµãÔÚÓÚ£¬Í¨¹ý¶ÔÈ«ÇòÍøÂç¿Õ¼äÐÅÏ¢Á÷¶¯»·¾³µÄËÜÔ죬½«È«ÇòÍøÂç¿Õ¼äºÍ×îеĻ¥ÁªÍøÓ¦ÓÃ×÷Ϊʵ¼ùÃÀ¹úÍâ½»Õþ²ßµÄй¤¾ß¡£¹È¸è¹«Ë¾2010ÄêÓëÖйú´ó½·¢ÉúµÄÕù¶ËºÍĦ²Á£¬¾ÍÊÇʵ¼ùÕâÖÖ¸ÅÄîµÄµäÐÍ°¸Àý£¬Ò»Ð©²ÎÓëÕßʵÃû·¢±íµÄÎÄÕÂÅû¶ÁËÆäÖеÄÄÚÔÚÁªÏµ¡£Í»Äá˹ÜÔÀò»¨¸ïÃüµÄºËÐÄ×éÖ¯ÕßÖ®Ò»£¬Ò²Ôø׫ÎÄÅû¶ÃÀ¹úͨ¹ý»¥ÁªÍøºÍ·ÇÕþ¸®×éÖ¯½«Ó°ÏìÁ¦Éø͸½øÖж«ºÍ±±·ÇÖî¹úµÄ¾ßÌå²Ù×÷Á÷³Ì¡£Ôø¾­²ÎÓëÓÃÐÂýÌåÍƶ¯¿ç¹ú»î¶¯·Ö×ÓÍøÂçµÄ×éÖ¯ºÍʵ¼ù»î¶¯µÄ°×¶íÂÞ˹Ñо¿ÕßÔò´Óʵ¼ùºÍѧÀíÁ½¸ö½Ç¶ÈÖ¸³ö£¬ÕâÖÖÐÂÐ͵ÄÍøÂçÍâ½»ÔÚijÖ̶ֳÈÉϺʹóÐÍÄÜÔ´¼¯ÍÅÓÎ˵ÃÀ¹úÕþ¸®µÄÔË×÷ģʽºÜÓÐЩÏàËÆÖ®´¦¡£(×¢£ºGolnaz Esfandiari, ¡°The Twitter Devolution£¬¡± Foreign Policy, June 7th, 2010, À´Ô´£ºhttp://www.foreignpolicy.com/articles/2010/06/07/the_twitter_revolution_that_wasnt, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡×Ô2003Äêµ½2013Ä꣬ÓëÍøÂ簲ȫÏà¹Ø¹ú¼ÒÕ½ÂÔÎļþ¡¢×ÜͳÐÐÕþÖ¸ÁîÖбȽÏÖØÒªµÄ£¬ÊÇÈçÏÂÆß·ÝÎļþ¡£Æä°ä²¼Ê±¼ä¡¢·¢²¼Ãû³ÆÒÔ¼°ÊÔͼʵÏÖµÄÖ÷ҪĿ±ê£¬ÈçϱíËùʾ£º(×¢£º×Ô2003ÄêÖÁ2013Ä꣬ÃÀ¹úÕþ¸®Óйء°ÍøÂ簲ȫ¡±µÄÕ½ÂÔÎļþ¡¢±¨¸æ¡¢¼Æ»®¡¢·¨°¸µÈÀÛ»ý·¢²¼14·ÝÒÔÉÏ£¬±¾±í¸ñÑ¡ÔñµÄÒÀ¾ÝΪÃÀ¹ú°×¹¬¹Ù·½ÍøÕ¾ÓйØÍøÂ簲ȫ£¨Cyber Security£©ÎÊÌâµÄ½âÊͺÍ˵Ã÷ÖÐÌáʾÁÐÈë²Î¿¼µÄÖØÒªÕ½ÂÔÎļþ¡£)

±í£º ÃÀ¹úÕþ¸®ÓйؓÍøÂ簲ȫ”µÄÎļþ(2003-2013)


Äê·Ý

Ãû³Æ

Ö÷ҪĿ±ê

2003

±£ÕÏÍøÂç¿Õ¼ä°²È«µÄ¹ú¼ÒÕ½ÂÔ

  1. ×èÖ¹Õë¶ÔÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷
  2. ½µµÍÃæ¶ÔÍøÂç¹¥»÷ʱ¹ú¼ÒµÄ´àÈõÐÔ
  3. µ±ÍøÂç¹¥»÷·¢Éúʱ½«Ëðʧ½µµ½×îµÍ£¬½«»Ö¸´Ê±¼äËõµ½×î¶Ì

2008

µÚ54ºÅ¹ú¼Ò°²È«×ÜͳÁÍøÂ簲ȫÓë¼àÊÓ/µÚ23ºÅ¹úÍÁ°²È«×ÜͳÁÍøÂ簲ȫÓë¼àÊÓ

  1. ·¢Õ¹Ò»¸ö¸²¸ÇËùÓÐÐÐÕþ²¿ÃŵÄÍøÂçÇ鱨¼Æ»®
  2. Ôö¼Ó¼ÓÃÜÍøÂçµÄ°²È«ÐÔ
  3. À©Õ¹ÍøÂç½ÌÓý
  4. ½ç¶¨Äܹ»±£³Ö³ÖÐø£¬ÊµÏÖ“¿çԽʽ³¬Ç°”µÄÏȽø¼¼ÊõÑз¢·½Ïò
  5. ½ç¶¨Äܹ»Ìṩ³Ö¾ÃÍþÉåÁ¦µÄ¼¼ÊõÓë·½°¸
  6. ¶à¹ÜÆëÏ£¬¶ÔÓëÍøÂ簲ȫÏà¹ØµÄ¹©Ó¦Á´·çÏÕ½øÐÐÓÐЧ¹ÜÀí
  7. ¶¨ÒåÍøÂ簲ȫÔÚ˽Ӫ²¿ÃŵĽÇÉ«
  8. ¶¨ÒåÁª°îÑÓÉì½øÈë¹Ø¼ü»ù´¡ÉèÊ©ÁìÓòµÄÍøÂ簲ȫ½ÇÉ«
  9. ¹ÜÀíÁª°îÆóÒµÍøÂç×÷Ϊһ¸öµ¥Ò»µÄÍøÂçÆóÒµÓë¿ÉÐÅÈεĻ¥ÁªÍøÁ¬½Ó
  10. ²¿ÊðÈëÇÖ¼ì²âϵͳµÄ´«¸ÐÆ÷Õû¸öÁª°îÆóÒµ
  11. Ñ°ÇóΪ¿çÁª°îÆóÒµ²¿ÊðÈëÇÖ·ÀÓùϵͳ
  12. Эµ÷ºÍÖض¨ÏòµÄÑо¿ºÍ·¢Õ¹£¨R£¦D£©µÄŬÁ¦
  13. Á¬½Óµ±Ç°ÍøÂçÐж¯ÖÐÐÄ£¬ÒÔÌá¸ß̬ÊƸÐÖªÄÜÁ¦
  14. Öƶ¨²¢ÊµÊ©Ò»ÏîÕþ¸®¸÷²¿ÃŵÄÍøÂç·´Ç鱨£¨CI£©¼Æ»®

2009

ÍøÂç¿Õ¼äÕþ²ßÉó²é£ºÈ·±£¿ÉÐÅÈεÄÊÊÓ¦ÐÔÇ¿µÄÐÅÏ¢ºÍͨÐÅ »ù´¡ÉèÊ©

¹ú¼ÒÍøÂ簲ȫȫÃ泫Òé

2011

ÍøÂç¿Õ¼ä¿ÉÐÅÉí·ÝµÄ¹ú¼ÒÕ½ÂÔ

  1. ½«ÍøÂç¿Õ¼ä¿ÉÐÅÈÎÉí·ÝµÄ½¨Á¢£¬×÷Ϊ¸ÄÉÆÍøÂ簲ȫµÄ»ùʯ
  2. ʹÓõ¥Ò»µÄͳһÉí·ÝÈÏ֤ϵͳ£¬Ìá¸ß°²È«ÐÔ£¬¼õÉÙÒòΪµ¥Ò»¸öÈËʹÓôóÁ¿Óû§ÃûºÍÃÜÂëËù´øÀ´µÄ¸´ÔÓÐÔ¡¢²»È·¶¨ÐÔÒÔ¼°Óɴ˵¼ÖµIJ»°²È«ºÍµÍЧ
  3. Ç¿»¯¿É¿¿ÐÔ£¬Íƽø¸öÈË¡¢Ë½Óª¹«Ë¾ÒÔ¼°Õþ¸®Î§Èƽ¨Á¢¿É¿¿µÄÉí·ÝÈÏ֤ϵͳչ¿ª»ý¼«Å¬Á¦

ÍøÂç¿Õ¼ä¹ú¼ÊÕ½ÂÔ

  1. È·ÈÏÍøÂç¿Õ¼ä¶ÔÃÀ¹úÒÔ¼°ÊÀ½çµÄ¹ú¼Ò°²È«¡¢¾­¼Ã°²È«´øÀ´ÁËÐÂÌôÕ½
  2. ÃÀ¹ú½«ÔÚÓ¦¶ÔÌôÕ½Ó뺴ÎÀÁ¢¹úºËÐÄÔ­ÔòÖ®¼ä±£³Öƽºâ
  3. ×ÛºÏÔËÓ÷¢Õ¹¡¢Íâ½»¡¢ÍþÉåµÈ·½Ê½£¬ÊµÏÖÒ»¸ö¿ª·Å¡¢¿É»¥¶¯²Ù×÷¡¢°²È«¡¢¿É¿¿¡¢Îȶ¨µÄÈ«ÇòÍøÂç¿Õ¼ä

2013

µÖÏúÇÔÈ¡ÃÀ¹úóÒ×»úÃÜÍþвµÄÐÐÕþÕ½ÂÔ

ͨ¹ýÍâ½»·½Ê½ÔÚº£Íâ±£ÕÏÃÀ¹úóÒ×»úÃÜ
ÒÔ×ÔÔ¸²ÎÓëΪ»ù´¡Íƽø˽Ӫ¹«Ë¾²ÎÓëóÒ×»úÃÜ
Ç¿»¯¹úÄÚ˾·¨Ç¿»¯ºÏ×÷
¸Ä½øÁ¢·¨£¬¸ÄÉƹ«ÖÚÈÏÖªÓëÍƹã

 

¡¡¡¡ÉÏÊöÆß·ÝÎļþ£¬¹¹³ÉÁËÃÀ¹úÍøÂ簲ȫսÂԱȽÏÍêÕûµÄÎÄ×Ö±íÊö£¬½áºÏÉÏÎÄËùÊöÓйØÍøÂ簲ȫÀúÊ·µÄÑݽø£¬¿ÉÒÔÈÏΪÃÀ¹úÍøÂ簲ȫսÂÔÒѾ­³õ²½ÐγÉÁËÒ»¸öÍêÉƵÄÌåϵ£¬ÆäÄÚÔÚÂß¼­½á¹¹¡¢Õ½ÂÔÄ¿±êÉèÖÃÒÔ¼°Õþ²ß¹¤¾ßÑ¡ÔñÏà¶Ô±È½ÏÍêÕû¡£ÊÂʵÉÏ£¬´ÓÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄһϵÁÐʵ¼ùÖÐÒ²Äܵõ½±È½Ï³ä·ÖµÄÑéÖ¤¡£

Èý¡¡ÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄʵ¼ù

¡¡¡¡ÃÀ¹úµÄ¹ú¼ÒÍøÂ簲ȫսÂÔʵ¼ùÊǷḻ¶ø¸´Ôӵģ¬ÉõÖÁ±ÈÃÀ¹ú¹«¿ª±íÊöµÄÍøÂ簲ȫսÂÔ±¾Éí¸ü¼Ó¸´ÔÓ£¬¾ßÓеäÐ͵Ä×ÔÎÒÖÐÐÄÖ÷ÒåºÍÃÀ¹úʽʵÓÃÖ÷ÒåµÄÌص㡣ËüÄܹ»ºÁ²»ÓÌÔ¥µØΧÈÆÃÀ¹úµÄ¹ú¼ÒºËÐÄÀûÒ棬ͨ¹ýºËÐĸÅÄîµÄ¾«×¼µ÷½Ú£¬ÊÊÓ¦²»¶Ï±ä»¯µÄ»·¾³µÄÐèÇ󡣸ÅÀ¨¶øÑÔ£¬ÕâÖÖʵ¼ù±íÏÖÔÚËĸö·½Ã棬¼´£º·À·¶·Ç¹ú¼ÒÐÐΪÌå½èÖúÍøÂçÍþвÃÀ¹úµÄ¹ú¼Ò°²È«£»±£»¤²¢¹®¹ÌÃÀ¹úÔÚÍøÂç¿Õ¼äµÄÒÑÓÐÓÅÊÆ£»Ö§³Ö¿ç¹ú»î¶¯·Ö×ÓÍøÂçµÄµß¸²Ðж¯£¬ÒÔ´ËʵÏÖÃÀ¹úÍâ½»Õþ²ß×·ÇóµÄÄ¿±ê£»¶ÔÕýÔÚ³öÏֵġ¢¿ÉÄܳÉΪÃÀ¹ú¶ÔµÈ¾ºÕù¶ÔÊֵĹú¼Ò½øÐÐÍøÂ簲ȫ¹ÛÄîµÄ¹æѵ£¬ËÜÔìÒ»¸ö·ûºÏÃÀ¹ú¹ú¼ÒÀûÒæµÄÍøÂç¿Õ¼äÕ½ÂÔ´ó»·¾³¡£

¡¡¡¡£¨Ò»£© ·À·¶·Ç¹ú¼ÒÐÐΪÌå½èÖúÍøÂçÍþвÃÀ¹úµÄ¹ú¼Ò°²È«

¡¡¡¡¹ú¼Ò°²È«ÊÇÃÀ¹úÍøÂ簲ȫսÂÔ×·ÇóµÄºËÐÄÄ¿±ê£¬²»ÈÝÈκÎÐÎʽµÄÍþвÓëÌôÕ½¡£µ±Èκηǹú¼ÒÐÐΪÌåÊÔͼÒÔÈκη½Ê½ÊµÊ©Èκα»ÈÏΪΣ¼°ÃÀ¹ú¹ú¼Ò°²È«µÄÐж¯Ê±£¬¶¼»áÔâµ½ÃÀ¹úÕþ¸®Ñ¸ËÙ¶øÓÐЧµÄ´ò»÷¡£2010Ä꣬·ÇÕþ¸®×é֯ά»ù½âÃܺÍÅû¶ÁËÃÀ¹úÕþ¸®µÄ¡°Õ½ÕùÎļþ¡±ºÍ¡°¹úÎñÔºÄÚ²¿µç±¨¡±£¬ÃÀ¹úÕþ¸®¶Ô´Ë×ö³öµÄ·´Ó¦ÊÇÕâÖÖ·À·¶Ðж¯µÄµäÐÍÌåÏÖ¡£

¡¡¡¡ÕâÖÖ·À·¶°üº¬Á½¸ö²¿·Ö£¬Ê×ÏÈÊǿɼûµÄ²¿·Ö¡£Î¬»ù½âÃÜʼþÖ®ºó£¬2011Äê2ÔÂ15ÈÕ£¬ÃÀ¹ú¹úÎñÇäÏ£À­À¿ËÁÖ¶ÙÔÚÇÇÖÎÿðþº€»ªÊ¢¶Ù´óѧÔٴη¢±íÁËÓйػ¥ÁªÍø×ÔÓɵÄÑÝ˵£¬ÌâΪ¡°»¥ÁªÍøµÄÕýÈ·Óë´íÎó£ºÔÚÒ»¸öÍøÂ绯ÊÀ½çÀïµÄÑ¡ÔñÓëÌôÕ½¡±¡£Ï£À­Àï¹úÎñÇäÃ÷È·Ö¸³ö£¬Î¬»ù½âÃܺÍÅû¶ÄÚ²¿ÎļþµÄÐÐΪ²»ÊÇÃÀ¹úËù˵µÄ¡°»¥ÁªÍø×ÔÓÉ¡±£¬ÕâÖÖÐÎʽµÄ¡°×ÔÓÉÁ÷¶¯¡±ÊÇ¡°ÇÔÃÜС͵¡±µÄÐо¶¡£Ï£À­Àï¹úÎñÇäÃ÷È·Ìá³ö£¬ÈκÎÐÎʽµÄ»¥ÁªÍø×ÔÓɶ¼²»µÃÍþвµ½ÃÀ¹úµÄ¹ú¼Ò°²È«£¬·ñÔò¾Í²»ÊÇ»¥ÁªÍø×ÔÓÉ¡£(×¢£ºHillary Rodham Clinton, ¡° Internet Rights and Wrongs: Choices & Challenges in a Networked World,¡± Feb. 15th, 2011, À´Ô´£ºhttp://www.state.gov/secretary/rm/2011/02/156619.htm, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡ÔÚ²»¿É¼ûµÄ²¿·Ö£¬ÃÀ¹úÕþ¸®ÓëýÌå¹¹ÖþµÄÁ¼ºÃ¹ØϵÐγÉÁËÒ»ÕÅÇÄÇÄÔË×÷µÄÍøÂ磬×Ô¶¯¶ÔÐÅÏ¢½øÐйýÂËÓë¼Ó¹¤¡£ÆäÖУ¬¡¶Å¦Ô¼Ê±±¨¡·µÄÐÐΪ±È½Ï¾ßÓдú±íÐÔ¡£µÃµ½Ïà¹Ø²ÄÁÏÖ®ºó£¬ÔÚ½øÐб¨µÀµÄÇ°Ò»ÖÜ£¬¡¶Å¦Ô¼Ê±±¨¡·ÅɳöÁËפ»ªÊ¢¶Ù°ì¹«ÊÒÖ÷Èκ͸߼¶¼ÇÕß×é³ÉµÄÍŶӣ¬Ð¯´ø²É·ÃÌá¸Ù£¬ÉõÖÁ¿ÉÄÜÊÇÒѾ­»ñµÃµÄԭʼ²ÄÁÏ£¬¸°°×¹¬ÑÐÌÖ±¨µÀµÄ½Ç¶È¡£¡¶Å¦Ô¼Ê±±¨¡·Êºó³Æ£¬¡°À´×ÔÃÀ¹ú¹ú·À²¿Ç鱨¾Ö¡¢¹ú¼Ò°²È«¾Ö¡¢ÖÐÑëÇ鱨¾Ö¡¢¹úÎñÔºµÄÈËÔ±»òÆäËûδ±êÃ÷Éí·ÝµÄÈËΧ×Å×À×Ó³ÖÐø¹¤×÷ÁËÁ½Ììʱ¼ä£¬¸æËß¡¶Å¦Ô¼Ê±±¨¡·ÄÄЩÄÚÈÝÊDz»¿ÉÒÔ±¨µÀµÄ¡£¡±µ±±¨µÀ·¢²¼Ê±£¬°×¹¬ÐÂÎÅ·¢ÑÔÈ˵Úһʱ¼äÓá°²»¸ºÔðÈΡ±¶Ôά»ù½âÃÜʼþ½øÐж¨µ÷£¬²¢½«½¹µã¾Û¼¯µ½ÁË¡°°Í»ù˹̹Ç鱨»ú¹¹Ö§³ÖËþÀû°à¡±ÒÔ¼°¡°¹«²¼ÃØÃÜÐж¯µÄϸ½ÚÓÐËð¹ú¼Ò°²È«¡±ÕâÁ½µãÉÏ¡£¡¶Å¦Ô¼Ê±±¨¡·ºÍ¡¶Å¦Ô¼Óʱ¨¡·µÈýÌåµÄ±¨µÀ½¹µãÒ²Èç·¨ÅÚÖÆ¡£³ý´ËÖ®Í⣬ά»ù½âÃÜÍøÕ¾³Æ£¬×Ô´ÓÐû²¼·¢²¼»úÃÜÎļþÖ®ºó£¬Á¢¿ÌÔâµ½Á˺£Á¿µÄÀ¬»øÊý¾Ý·¢ÆðµÄ¡°¾Ü¾ø·þÎñ¹¥»÷¡±¡£µ±Ê±ÎªÎ¬»ù½âÃÜ·þÎñÆ÷ÌṩÓòÃû½âÎö·þÎñµÄÃÀ¹úÍøÂ繫˾Ôò½Óµ½ÁËÀ´×ÔÃÀ¹ú²ÎÒéÔº¹úÍÁ°²È«Î¯Ô±»áÖ÷ϯµÄµç»°£¬²¢ËæºóÐû²¼Í£Ö¹ÌṩÓòÃû½âÎö·þÎñ¡£(×¢£ºEwen MacAskill, ¡°Wikileaks Website Pulled by Amazon after US Political Pressure,¡± À´Ô´£ºhttp://www.guardian.co.uk/media/2010/dec/01/wikileaks-website-cables-servers-amazon, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡µ±ºÚ¿Í×éÖ¯¡°ÄäÃû¡±·¢ÆðÕë¶ÔÐԵķ´»÷£¬ÈëÇÖÄÇЩÅäºÏÃÀ¹úÕþ¸®´òѹά»ù½âÃÜÐж¯µÄ¹«Ë¾ÍøÕ¾Ö®ºó£¬ÃÀ¹úÕþ¸®²ÉÈ¡Á˸ü¼ÓÖ±½ÓµÄÐж¯¡£2011Äê1ÔÂ27ÈÕ£¬FBIÔÚÈ«ÃÀ12¸öÖݺÍÊ׶¼»ªÊ¢¶Ù·¢³ö27·ÝËѲéÁî¡£7ÔÂ19ÈÕ£¬FBIÓÖÔÚÈ«ÃÀ11¸öÖÝ·¢³ö21·ÝËѲéÁ½øÒ»²½µ÷²éÆäËûÉè¼Æ·Ö²¼Ê½¾Ü¾ø·þÎñ¹¥»÷µÄ¡°ÄäÃû¡±×éÖ¯³ÉÔ±¡£Í¬Ê±£¬ÃÀ¹ú˾·¨²¿Ïò°üÀ¨ÍÆÌع«Ë¾ÔÚÄڵĻ¥ÁªÍøÄÚÈݹ©Ó¦É̼°»¥ÁªÍø·þÎñ¹©Ó¦ÉÌ·¢³ö¹ú¼Ò°²È«Ðź¯£¬ÒªÇóÆäÌṩÈô¸É¡°ÄäÃû¡±×éÖ¯³ÉÔ±µÄÏà¹ØÐÅÏ¢£¬°üÀ¨IPµØÖ·¡¢ÐÅÓÿ¨Õ˺š¢·¢Ë͵ÄÐÅÏ¢ºÍÄÚÈÝ¡£ÕâЩӦ¶Ô¾Ù´ë͹ÏÔÁËÃÀ¹úÍøÂ簲ȫսÂÔÒÔ¹ú¼ÒΪÖ÷Ìå¡¢ÒÔ±£ÕϹú¼Ò°²È«ÎªÊ×ҪĿ±êµÄ»ù±¾Ìص㡣ÕâÊÇÈκγÌÐòÓëÐÎʽÉϵݲÅŶ¼ÎÞ·¨´ÓʵÖÊÉϼÓÒԸıäµÄÌص㡣(×¢£ºTerry Frieden, Susan Candiotti, ¡° 14 Arrested in Operation Targeting Anonymous,¡± À´Ô´£ºhttp://edition.cnn.com/2011/CRIME/07/19/new.york.anonymous.warrants/index.html, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡£¨¶þ£©±£³Ö²¢¹®¹ÌÃÀ¹úÔÚÍøÂç¿Õ¼äµÄÒÑÓÐÓÅÊÆ

¡¡¡¡ÃÀ¹úÔÚÍøÂç¿Õ¼äµÄ×î´óÓÅÊÆÖ®Ò»ÊÇ£¬Ëü¶ÔÈ«ÇòÍøÂç¿Õ¼äµÄ¹Ø¼ü»ù´¡ÉèÊ©¾ßÓÐʵ¼ÊµÄ¹ÜÀíȨÏÞ¡£ÕâÖֹؼü»ù´¡ÉèÊ©µÄ´ú±íÖ®Ò»£¬¾ÍÊÇÓòÃû½âÎöϵͳDNS¡£2012Äê12Ô£¬´óÔ¼150¸ö¹ú¼ÒºÍµØÇø¾Û¼¯ÔÚ°¢ÁªÇõµÄµÏ°Ý£¬¾Í¹ú¼ÊµçÐÅÁªÃ˹ÜÀí¹ú¼ÊÍøÂç¿Õ¼äµÄÌõÔ¼½øÐжà±ß»á̸¡£12ÔÂ13ÈÕ£¬ÃÀ¹ú´ú±íÍÅÍų¤¿ËÀ­Â꣨Terry Kramer£©ÔÚ»áÉÏÃ÷È·±íʾ£¬ÃÀ¹ú²»»áͬÒâÇ©ÊðÒ»·Ý¸Ä±ä»¥ÁªÍø¹ÜÀí½á¹¹µÄÐÂÌõÔ¼¡£ÃÀ·½Ïêϸ²ûÊöÁË×Ô¼ºµÄÁ¢³¡ºÍ¹Ûµã£ºµÚÒ»£¬ÃÀ¹ú¾Ü¾øÇ©ÊðÈκοÉÓÃÓڹ淶ÍøÂç·þÎñ¹©Ó¦ÉÌ¡¢Õþ¸®»ò˽È˹«Ë¾µÄÌõÔ¼£»µÚ¶þ£¬ÃÀ¹ú¾Ü¾ø¶Ô°üÀ¨À¬»øÓʼþÔÚÄÚµÄÍøÂçÐÅÏ¢Á÷¶¯×ö³öÏÞÖÆ£¬ÒòΪÄÇ»áËðº¦ÑÔÂÛ×ÔÓÉ£»µÚÈý£¬¾Ü¾ø³ÐÈϹú¼ÊµçÐÅÁªÃËÔÚ±£ÕÏÍøÂ簲ȫ·½Ãæ·¢»ÓÁË»ý¼«×÷Ó㻵ÚËÄ£¬¶Ô»¥ÁªÍøµÄÖÎÀí±ØÐëÔÚÏÖÐеĻ¥ÁªÍøÃû³ÆÓëÊý×ÖµØÖ··ÖÅä»ú¹¹£¨ICANN£©ËùνµÄ¶àÖØÀûÒæÏà¹Ø·½µÄ¿ò¼ÜÄÚÒÀ·¨½øÐУ»µÚÎ壬¹ú¼ÊµçÐÅÁªÃË·å»áÎÞȨ¾Í»¥ÁªÍø×ö³ö¾öÒé¡£(×¢£ºTerry Kramer, ¡° World Conference on International Telecommunications,¡± À´Ô´£ºhttp://www.state.gov/e/eb/rls/rm/2012/202040.htm, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡Ò»¸ö»ù±¾µÄÊÂʵÊÇ£¬½ö½öÒÀ¾ÝÃÀ¹úµÄ¹úÄÚ·¨ºÍÃÀ¹úÕþ¸®¡¢¹«Ë¾Õƿصľ޴óµÄÈíÓ²¼þ×ÊÔ´£¬ÃÀ¹ú¾Í¿ÉÒÔÔÚijÖ̶ֳÈÉ϶ÔÈ«ÇòÍøÂç¿Õ¼ä½øÐÐÓÐЧµÄ¹ÜÀíÓë¿ØÖÆ¡£2011Äê8ÔÂ11ÈÕ£¬ITÒµ½çµÄÖªÃûÍøÕ¾ZdnetתÔØÁ˹ȸ蹫˾µÄһλ·¢ÑÔÈ˶Ե¹ú¡¶¾­¼ÃÖÜ¿¯¡·£¨Wirtschafts Woche£©µÄ̸»°£¬³Æ¡°¹È¸è¹«Ë¾ÊÕµ½ÁËÃÀ¹úÏà¹ØÕþ¸®²¿ÃÅÒÀ¾Ý¡¶°®¹úÕß·¨¡·¿ª³öµÄ¹ú¼Ò°²È«´«Æ±£¨National Security Letter£©Ö®ºó£¬½«´æÖüÔڹȸèÅ·ÖÞ¡®ÔÆÊý¾ÝÖÐÐÄ¡¯µÄÊý¾Ýͨ¹ý°²È«µÄ´«Êä¼Ü¹¹£¬Ô½¹ý´óÎ÷Ñ󣬽»¸øÁËÃÀ¹úµÄÏà¹ØÕþ¸®²¿ÃÅ¡±¡£(×¢£ºZack Whittaker, ¡° Google Admits Patriot Act Requests; Handed over European Data to U.S. Authorities,¡± À´Ô´£ºhttp://www.zdnet.com/blog/igeneration/google-admits-patriot-act-requests-handed-over-european-data-to-u-s-authorities/12191, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡ÁíÒ»¸ö³¤ÆÚ´æÔÚµ«²¢·ÇËùÓÐÈ˶¼ÓÐÓÂÆøÃæ¶ÔµÄÊÂʵÊÇ£¬ÃÀ¹ú³¤ÆÚÒÔÀ´Ò»Ö±¾ß±¸²¢ÇÒÔÚ³ÖÐøÍêÉÆ×ŶÔÍøÂç¿Õ¼äÊý¾ÝÁ÷¶¯ÊµÊ©ÓÐЧ¼à¿ØµÄÄÜÁ¦¡£2013Äê6Ô£¬ÃÀ¹ú¹ú¼Ò°²È«¾ÖÇ°ºÏͬÖÆÔ±¹¤Ë¹ÅµµÇÅû¶µÄ¡°Àâ¾µ¡±ÏîÄ¿Òý·¢ÐùÈ»´ó²¨£¬°üÀ¨¹È¸èÔÚÄÚµÄ9¼ÒÃÀ¹ú»¥ÁªÍø¾ÞÍ·±»Ö¸³¤ÆÚÓëÃÀ¹úÕþ¸®ºÏ×÷£¬¶ÔÍøÂç¿Õ¼ä¼¸ºõËùÓеÄÊý¾ÝÁ÷¶¯¶¼ÔÚʵʩ¼à¿Ø¡£(×¢£ºGellman, Barton; Poitras, Laura, ¡°US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,¡± The Washington Post. June. 6th, 2013.)¸ù¾Ý¹«¿ª×ÊÁÏͳ¼Æ£¬ÕâÊÇÆù½ñΪֹ±»ÆعâµÄµÚ12¸öÀàËƵļà¿ØÏîÄ¿/¼Æ»®/Ðж¯£¬ÕâЩ¼à¿ØÏîÄ¿/¼Æ»®/Ðж¯×î¹ÅÀϵÄÊÇÁª°îµ÷²é¾ÖµÄ¿¨Æ¬Ë÷Òýϵͳ£¬ËûÔÚ20ÊÀ¼Í30Äê´úÓɵ±Ê±Áª°îµ÷²é¾ÖµÄºú·ð¾Ö³¤ÒýÈ룻³ÖÐøʱ¼ä×·¶Î§×î¹ãµÄÊÇ2001Äê±»Åû¶µÄ¡°Ìݶӡ±ÏµÍ³£¨Echelon£©£¬Ëü²»½ö±»ÓÃÓÚ¼àÌýÇ°ËÕÁª¡¢¶«Å·¹ú¼ÒµÄÐźÅÇ鱨£¬»¹±»Å·ÖÞÒé»áÈÏΪÓÃÓÚÃÀ¹ú¹«Ë¾µÄÉÌÒµ¼äµýÐж¯£»(×¢£ºMike Ingram, ¡° European Parliament Concludes Echelon Electronic Spy Network Does Exist,¡± June 6th, 2001, À´Ô´£ºhttp://www.wsws.org/en/articles/2001/06/ech-j06.html, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ£©£¬¸Ãµ÷²é±¨¸æÈ«ÎIJμû£ºhttp://www.fas.org/irp/program/process/rapport_echelon_en.pdf¡£)˹ŵµÇÅû¶µÄ¡°Àâ¾µ¡±Ö÷ÒªÔÚ¼à¿ØÄÜÁ¦·½ÃæÓÐÁ˳¤×ã½ø²½£¬²»½ö¿ÉÒԼǼͨѶÈË¡¢Ê±¼ä¡¢IPµØÖ·¡¢Í¨Ñ¶Ê±¼ä³¤¶ÈµÈÊý¾Ý£¬»¹ÄܽüËÆʵʱµÄ¼à¿ØÌض¨¶ÔÏóÔÚÍøÂç¿Õ¼ä½øÐÐÓïÒô¡¢ÊÓƵͨѶÄÚÈÝ£¬Ò²¾ÍÊÇ˵£¬Õâ¸öϵͳÄܹ»¶Ô¡°Êý¾ÝÁ÷¡±£¨Data Flow£©½øÐÐʵʱ¼à¿Ø¡£(×¢£ºPRISM (surveillance program), À´Ô´£ºhttp://en.wikipedia.org/wiki/PRISM_program, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¿Í¹ÛµØ˵£¬µ±ÃÀ¹ú¾ß±¸Èç´ËÏÔÖøµØѹµ¹ÐÔÓÅÊÆʱ£¬ËüûÓÐÈκÎÄÚÔÚ¶¯Á¦Ô¸Òâ»ùÓÚÆäËû¹ú¼ÒµÄÀûÒ濼ÂÇ×ö³öÖ÷¶¯µÄÈò½¡£Òò´Ë£¬ºÜÏÔÈ»£¬¾¡¹ÜÓÐÀ´×ÔÆäËû¹ú¼ÒµÄÇ¿ÁÒËßÇ󣬵«ÃÀ¹ú²¢Ã»ÓÐÌ«´óµÄÐËȤͨ¹ýÒ»¸öÕæÕýÒâÒåÉϵĶà±ß×éÖ¯£¬×ñÑ­Ö÷Ȩ¹ú¼ÒƽµÈµÄÔ­Ôò£¬À´¸Ä±äÏÖÓÐÍøÂç¿Õ¼äµÄÖÎÀí½á¹¹£¬ÒòΪÕâÖ»»áÓ°Ïì»òÏ÷ÈõÃÀ¹úÔÚÍøÂç¿Õ¼äµÄÒÑÓÐÓÅÊÆ¡£

¡¡¡¡£¨Èý£©Ö§³Ö¿ç¹ú»î¶¯·Ö×ÓÍøÂçµÄµß¸²Ðж¯

¡¡¡¡´Ó1990Äê´úÖÐÆÚ¿ªÊ¼£¬ÃÀ¹ú¹ú·À²¿µÈϵͳ¾ÍÒѾ­ÈÏʶµ½£¬»¥ÁªÍøµÄÕ½ÂÔ¼ÛÖµÖ®Ò»ÔÚÓÚÌṩÁËÒ»Öֵͳɱ¾µÄÓÐЧ¹¤¾ß£¬°ïÖúÃÀ¹úÕþ¸®È¥ÌôÕ½ÄËÖÁµß¸²ÄÇЩ²»·ûºÏÃÀ¹ú¹ú¼ÒÀûÒæµÄËùνÍþȨÕþÌå¡£Ô­À´´ïµ½ÕâһĿµÄÐèÒª²ÉÈ¡ÒþÃصÄÐж¯£¬»òÅÉDzÃÀ¹úµÄÌØÖÖ²¿¶Óð±»×¥»ñµÄ·çÏÕÉø͸µ½±ð¹ú¾³ÄÚ£¬»òÓÉÃÀ¹úÕþ¸®Ö±½Ó½éÈ룬´Ó¶øÃæÁÙ¾Þ´óµÄÕþÖηçÏÕ£¬¶ø½ñÖ»Òª¼òµ¥µØÅàѵ·ÇÕþ¸®×éÖ¯»òÕß¹¹½¨¿ç¹ú»î¶¯·Ö×ÓÍøÂç¾Í¿ÉÒÔÁË¡£´Ó2009ÄêÒÁÀÊ×Üͳѡ¾Ù¿ªÊ¼£¬ÒÔ¹úÎñԺΪ´ú±íµÄÃÀ¹úÕþ¸®»ú¹¹¿ªÊ¼»ý¼«Íƽø½ø¹¥ÐÔÍøÂ簲ȫսÂÔµÄʵ¼ù£¬ÆäÖÐÓÚ2011Äê2ÔÂÔÚ°£¼°½øÐеÄʵ¼ù×î¾ßµäÐÍÒâÒå¡£

¡¡¡¡2011Äê1ÔÂ25ÈÕ±¬·¢µÄ°£¼°Î£»ú¾­ÀúÁËÖÁÉÙ6¸öÔÂÒÔÉϵÄÔÍÄð½×¶Î¡£Ôڴ˽׶Σ¬ÒÔÍÆÌغÍÁ³Æ×ÍøΪ´ú±íµÄÐÂýÌå·¢»ÓÁË¡°µ¼»ðË÷¡±Óë¡°¶¯Ô±¹¤¾ß¡±µÄ×÷Óá£ÔÚΣ»ú±¬·¢ºÍÉý¼¶½×¶Î£¬ÐÂýÌå°çÑÝÁË¡°Ð­µ÷Õß¡±¡¢¡°È¼ÁÏÌṩÕß¡±Óë¡°·Å´óÆ÷¡±µÄ½ÇÉ«£¬²ÉÈ¡ÁËÒÔϲ½Ö裺Ê×ÏÈ£¬ÔÚ´í×Û¸´ÔÓµÄ×éÖ¯ÕßÖ®¼ä·ÖÏíÐÅÏ¢ºÍ×ÊÁÏ£¬Éú²ú²¢´«²¥¾ßÓÐÄý¾ÛÁ¦µÄÏóÕ÷ÐÔ·ûºÅ£»Æä´Î£¬Îª²Î¼ÓÓÎÐÐʾÍþµÄÈËȺÌṩ¼á³ÖÏÂÈ¥µÄ¶¯Á¦£¬ÕâÖÖ¶¯Á¦Ö÷ÒªÀ´×ÔÍⲿÁ¦Á¿µÄ³ÖÐø¸ÉÔ¤¡¢×ÔÎÒʵÏÖµÄÐÄÀíÂú×ã¸ÐÒÔ¼°¡°ÕýÔڱƽü³É¹¦¡±µÄ³É¾Í¸Ð£»×îºó£¬Í¨¹ýÓ°ÏìÐÅÏ¢´«µÝÀ´·Å´ó×ÔÉíÁ¦Á¿£¬¶¯Ò¡Õþ¸®Ó¦¶ÔΣ»úµÄÐÅÐÄ£¬¹Æ»ó¸ü¶àµÄÅÔ¹ÛÕß³ÖÐø¼ÓÈëÆäÖС£

¡¡¡¡ÔÚʼþµÄ·¢ÉúºÍ·¢Õ¹¹ý³ÌÖУ¬ÃÀ¹úÕþ¸®°çÑݵĽÇÉ«±È½ÏÒþ±Î£¬Æä×÷ÓÃÖ÷Ҫͨ¹ýÈýÖÖ·½Ê½±íÏÖ³öÀ´£º

¡¡¡¡µÚÒ»£¬¼ä½Óͨ¹ýÕÆÎÕ¼¼ÊõÓÅÊƵĿç¹ú¹«Ë¾£¬´Ó¼¼ÊõÉÏÖ§³Ö°£¼°·´¶ÔÅɵĿ¹Òé»î¶¯¡£ÓÉÓëÃÀ¹úÕþ¸®±£³ÖÃÜÇйØϵµÄ¹È¸èºÍÍÆÌع«Ë¾³öÃ棬Ϊ°£¼°¹úÄڵķ´¶ÔÅÉÌṩÓÐЧµÄÐÅÏ¢¼¼ÊõÖ§³Å¡£ÕâÖÖÃÜÇйØϵÊÇͨ¹ýÕâÁ½¼Ò¹«Ë¾µÄÁìµ¼ÕßÓëÃÀ¹ú¹úÎñÔºÕþ²ßÉè¼Æ°ì¹«ÊÒÏÂÊôµÄ21ÊÀ¼ÍÖιú·½ÂÔÏîÄ¿µÄºËÐĹǸɳÉÔ±µÄÁ¼ºÃ»¥¶¯À´Î¬ÏµµÄ¡£ÕâÖÖ¼¼ÊõÖ§³ÅÍ»³ö±íÏÖÔÚÓïÒôÍÆÌع¦ÄÜÉÏ¡£ÔÚ°£¼°Õþ¸®¹Ø±Õ90%µÄ»¥ÁªÍø½ÓÈëºÍÊÖ»ú·þÎñ¶øÖ»ÁôϹ̶¨µç»°·þÎñÖ®ºó£¬¹È¸è¹«Ë¾Ñ¸ËÙ¿ª·¢³öÁËÓïÒôÍÆÌع¦ÄÜ£¬ÔÊÐíÓû§²¦´òÌض¨µÄµç»°ºÅÂë¸øÓïÒôÐÅÏäÁôÑÔ£¬Èí¼þ»á×Ô¶¯½«ÁôÑÔתΪÎÄ×ÖÐÅÏ¢£¬·¢²¼ÔÚÍÆÌØÉÏ£¬´Ó¶øÈ·±£ÁËʾÍþÕßÓëÐÂýÌåµÄÁ´½Ó²»±»Çжϡ£(×¢£ºDoug Gross, ¡° Google, Twitter Help Give Voice to Egyptians,¡±À´Ô´£ºhttp://edition.cnn.com/2011/TECH/web/02/01/google.egypt/index.html£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡µÚ¶þ£¬Ö±½ÓÔËÓÃÃÀ¹úÕþ¸®µÄÓ°ÏìµÖÏû°£¼°Õþ¸®ÔÚÇ¿ÖÆ´ëÊ©·½ÃæµÄÓÅÊÆ¡£µ±°£¼°Õþ¸®Ç¿ÊÆÇжϰ£¼°»¥ÁªÍøÁ¬½ÓÖ®ºó£¬ÃÀ¹úÊ©¼Ó¾Þ´óµÄѹÁ¦£¬ÒªÇó°£¼°Õþ¸®Á¢¿Ì¿ª·ÅÍøÂçÁ¬½Ó¡£(×¢£ºHillary Rodham Clinton, ¡° Remarks With Colombian Vice President Angelino Garzon After Their Meeting,¡± À´Ô´£ºhttp://www.state.gov/secretary/rm/2011/01/155566.htm£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£ÕâÒ»½²»°ÊÇÔÚ¿ËÁÖ¶Ù¹úÎñÇäÓë¸çÂ×±ÈÑǸ±×Üͳ¹²Í¬½øÐеļÇÕßÕдý»áÉÏ·¢±íµÄ£¬¿ËÁÖ¶ÙÔÚתÈë¸çÂ×±ÈÑÇÎÊÌâÇ°²åÈëÁË5¶ÎÕë¶Ô°£¼°¾ÖÊƵķ¢ÑÔ£¬µ±Ê±¾àÀë°£¼°Õþ¸®ÇжÏÓë¹ú¼Ê»¥ÁªÍøÁ¬½Ó²»µ½24Сʱ¡£)ÓÐȤµÄÊÇ£¬ÃÀ¹úͬʱÈÏΪÓбØÒªÊÚȨÃÀ¹ú×ÜͳÔÚ±ØÒªµÄʱºò¹Øµô»¥ÁªÍø¡£ÃÀ¹ú¹ú»áÔøÓÚ2011ÄêÌÖÂÛ¹ýÊÚȨÃÀ¹ú×ÜͳÏàӦȨÏÞ£¬Ê¹ÆäµÃÒÔÔÚ±ØҪʱ¡°ÔÚ»¥ÁªÍøÉÏÐû²¼½øÈë½ô¼±×´Ì¬¡±£¬²¢ÓûÊÚÓè×Üͳ¡°¹Øµô»¥ÁªÍø¡±µÄȨÁ¦£¬ºóÒò·´¶ÔÓëÖÊÒÉÉù¹ýÓÚÇ¿ÁÒ¶øÔÝʱ¸éÖá£2012Äê7ÔÂ6ÈÕ£¬°Â°ÍÂíͨ¹ýÇ©Êð ¡°·ÖÅä¹ú¼Ò°²È«ºÍÓ¦¼±×´Ì¬×¼±¸Í¨Ñ¶¹¦ÄܵÄÐÐÕþÃüÁ£¨Assignment of National Security and Emergency Preparedness Communications Functions£©£¬¼ä½Ó»ñµÃÁËÀàËƵĸ³È¨¡£(×¢£ºExecutive Order: Assignment of National Security and Emergency Preparedness Communications Functions, À´Ô´£ºhttp://www.whitehouse.gov/the-press-office/2012/07/06/executive-order-assignment-national-security-and-emergency-preparedness-, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡µÚÈý£¬Í¨¹ýÅàѵ·ÇÕþ¸®×éÖ¯½èÖú»¥ÁªÍø×éÖ¯½øÐÐʾÍþµÄÄÜÁ¦¼ä½Ó½éÈëÆäÖУ¬Íƶ¯°£¼°¹úÄÚµÄÕþÖαä¸ï¡£ÃÀ¹úÊÂÏÈÅàÑøÁË°£¼°¾³ÄڵĿç¹ú»î¶¯·Ö×ÓÍøÂç¡£°£¼°×éÖ¯ÓÎÐÐʾÍþµÄÖ÷Á¦ËÄÔÂÁùÈÕÇàÄêÔ˶¯ÔøÔÚ2008~2011Äê¼äϵͳµØ½ÓÊÜÁËÃÀ¹ú×ÊÖúϵļ¼ÄÜÅàѵ¡ª¡ªÌرðÊÇÔËÓÃÍøÂç×é֯ʾÍþÓÎÐС¢Íƶ¯ÕþȨ¸üµü·½ÃæµÄ¼¼ÄÜÅàѵ¡£ÔÚÄ°ÍÀ­¿ËÏĄ̂ºó²»µ½72СʱµÄʱ¼äÀÃÀ¹ú¡¶Íâ½»Õþ²ß¡·ÔÓÖ¾¾ÍÔÚרÌâÎÄÕÂÖÐÅû¶ÁËÕâÖÖÅàѵµÄ»ù±¾ÊµÊ©·½Ê½¡£¸ù¾Ý½éÉÜ£¬´Ó1999Ä꿪ʼ£¬ÃÀ¹úÃñÖ÷»ù½ð»á¡¢ºÍƽ֮¼ÒµÈ»ú¹¹Ò»Ö±×ÊÖúÄÏ˹À­·ò¹úÄÚ·ÇÕþ¸®×éÖ¯ÍÆ·­×ÜͳÃ×ÂåÉáάÆæµÄÐж¯£¬²¢½«Õâ¸ö»ú¹¹×ª±ä³ÉΪһ¸öÈ«ÇòÐÔµÄÅàѵ»ú¹¹£¬Åàѵ¸÷¹ú·ÇÕþ¸®×é֯ʵʩºÍƽµß¸²Ðж¯£¬¡°ÔÚ50¸ö¹ú¼Ò¾Ù°ìÁË50³¡Åàѵ£¬´Ù³ÉÁË15´Î¸ïÃü¡±¡£(×¢£ºJams Adams, The Next World War (Simon & Schuster, March 23, 2001), pp.15~25.)

¡¡¡¡£¨ËÄ£©¹æѵDZÔÚ¾ºÕù¶ÔÊÖµÄÍøÂ簲ȫÐÐΪ

¡¡¡¡´Ó¿ËÁÖ¶ÙÕþ¸®ÈÎÆÚ¿ªÊ¼£¬ÃÀ¹ú×Üͳ·¢²¼µÄ¹ú¼Ò°²È«Õ½ÂÔ±¨¸æÃ÷È·Ìá³ö£¬ÃÀ¹úÕæÕýÃæÁÙµÄÕ½ÂÔÍþв£¬ÊÇÔÚÈ«Çò·¶Î§ÄÚ³öÏÖÒ»¸öÊƾùÁ¦µÐµÄ¾ºÕùÕß¡£µ±È»£¬×îÓпÉÄÜÕ¼¾ÝÕâ¸ö¾ºÕùÕßλÖõĺòÑ¡¹ú¼ÒÒ»¸öÊÇÖйú£¬Ò»¸öÊǶíÂÞ˹¡£³ý´ËÖ®Í⣬»¹ÓдóÁ¿µØÇøÇ¿¹ú½øÈëÁË´ýÑ¡Ãûµ¥£¬ÒÁÀÊËãµÃÉÏÊǸöÖÐÇ̳þ¡£¹ØÓÚÈçºÎÓ¦¶ÔÕâÀàÌôÕ½£¬ÃÀ¹ú¾üʼÇÕßղķ˹ÿðþº€ Ñǵ±Ë¹£¨James Adams£©ÔÚÆä׫дµÄ¡¶ÏÂÒ»³¡ÊÀ½ç´óÕ½¡·£¨The Next World War£©Ò»ÊéÖÐÌá³öÁËÓë¶ôÖÆËÕÁªµÄÀäս˼άÓÐËù²»Í¬µÄÐÂ˼·£¬¼´Í¨¹ýÍøÂç¿Õ¼ä£¬²ÉÈ¡²»¶Ô³ÆµÄÐж¯£¬¼ÌÐøά³ÖÃÀ¹úµÄÓÅÊƵØλ¡£

¡¡¡¡¸ÃÊéÉèÏëÁËÕâÑùÒ»¸ö³¡¾°£ºÖж«µØÇøÃæÁÙ³åÍ»£¬ÒÁÀʺÍÖйúÊÔͼÒÔ³£¹æ¾üÊÂÁ¦Á¿½éÈëÆäÖС£ÃÀ¹ú²ÉÈ¡µÄÓ¦¶Ô·½Ê½ÊÇ£¬Ê×ÏÈÔÚÒÁÀÊÆô¶¯Ö²ÈëµÂºÚÀ¼¹©µçϵͳµÄ¡°Ä¾Âí¡±²¡¶¾£¬¹ØµôµÂºÚÀ¼È«³ÇµÄµçÔ´¡£ÒÁÀÊÊøÊÖÎ޲ߣ¬Ö»ÄÜÑûÇëÌṩÕâЩÉ豸µÄÃÀ¹ú¹«Ë¾½øÐÐɱ¶¾·þÎñ£¬¶øÅÉÀ´µÄÃÀ·½¹¤×÷ÈËԱȫ²¿ÊÇÌع¤¡£ËûÃÇɱµôÁ˾ɵIJ¡¶¾³ÌÐò£¬È»ºóÖ²ÈëеIJ¡¶¾³ÌÐò£¬Ê¹µÃµÂºÚÀ¼³ÖÐøÏÝÈë»ìÂÒ״̬¡£ÔÚÖйú£¬ÃÀ¹úÆô¶¯ÊÂÏÈÖ²ÈëÈýÏ¿µçÕ¾¿ØÖÆÈí¼þÖеġ°Ä¾Âí¡±²¡¶¾£¬Çж϶ÔÏÂÓεÄˮԴ¹©Ó¦¡£Í¬Ê±£¬ÃÀ¹ú¾ü·½Ô¶³ÌÖÂ̱ÖйúÈËÃñ½â·Å¾üͨѶϵͳµÄºËÐĽ»»»»ú¡£µ±Öйú¹ú¼Ò×î¸ßÁìµ¼ÈËÒò´ò²»Í¨Èκε绰¶øÈçͬÈȹøÉϵÄÂìÒÏʱ£¬ÃÀ¹ú×ÜͳºÜ¹ØÇеØÖ÷¶¯Í¨¹ýÖз½¾øÃܵÄÄÚÏߵ绰£¬ÏòÆä±íʾ¡°Î¿ÎÊÓë¹ØÐÄ¡±¡£×îºóµÄ½á¹ûÊÇ£¬ÃÀ¹ú±ø²»ÈÐѪµØÈÃÕâÁ½¸öDZÔڵľºÕùÕ߸ıäÁËÆä½éÈëÖж«ÊÂÎñµÄ°²ÅÅ¡£µ±È»£¬ÕâÁ½¸ö¹ú¼ÒµÄ¹Ø¼ü»ù´¡ÉèÊ©Ò²Òò´Ë»Ö¸´ÁËÕý³£¡£ÓÐȤµÄÊÇ£¬Õâ±¾ÊéÖÐËùÃèÊöµÄÃÀ¹úͨ¹ýÍøÂç¿Õ¼ä¶ÔDZÔÚ¶ÔÊÖ²ÉÈ¡µÄÐж¯£¬ÕýÊǽñÌìÃÀ¹úͨ¹ý¸÷ÖÖ·½Ê½¼«Á¦Ëµ·þÖйúµÈ¹ú¼Ò²»Òª×öµÄÊÂÇ顪¡ªÓÈÆäÊÇÉæ¼°ÈëÇÖ¼ÆËã»úÈíÓ²¼þϵͳµÄ¸÷ÖÖºÚ¿ÍÐж¯¡£

¡¡¡¡´ÓÄÚÈÝÉÏ¿´£¬ÃÀ¹ú¶ÔÖйúµÄ¡°µ£ÓÇ¡±±È½Ï¼¯ÖкÍÍêÕûµÄ±íÏÖÔÚÁË´Ë´ÎÓÐÃÀ¹ú¹«Ë¾·¢²¼µÄÍøÂ簲ȫ±¨¸æºÍÃÀ¹úÕþ¸®°ä²¼µÄÓ¦¶Ô´ëÊ©Àï¡£

¡¡¡¡ÔÚÂüµÏÑÇÌØ£¨Mandiant£©¹«Ë¾·¢²¼µÄ76Ò³±¨¸æÖУ¬ÓÃÁË20Ò³×óÓÒµÄƪ·ù²ûÊöÖйúÈËÃñ½â·Å¾ü×ܲÎı²¿µÄ»ú¹¹ÉèÖÃÓëÖ°ÄÜ£¬ÓýӽüÒ»°ëµÄƪ·ù²ûÊöÁËÆäÖØÒªµÄ·¢ÏÖÓëÖ¤¾Ý£¬³ÆÓÃ6Äêʱ¼ä×·×ÙÁËÕë¶Ô141¼ÒÃÀ¹ú¹«Ë¾»ò×éÖ¯µÄ1905´Î³ÖÐøÐÔÈëÇÖÐж¯£¬ÆäÖÐ97%µÄIPµØÖ·Äܹ»±»×·×Ùµ½ÉϺ££¬¶øÇÒ·¢ÏÖ±»×·×ÙµÄÈëÇÖʹÓÃÁ˼òÌåÖÐÎĵļÆËã»ú²Ù×÷ϵͳ¡£½ÓÏÂÀ´¾ÍÊǽ¨Á¢ÔÚÍƶϻù´¡ÉϵĽáÂÛ£º´ËÀàºÚ¿ÍÐж¯µÃµ½ÁËÖйúÕþ¸®µÄÖ§³Ö£¬¡°ÒòΪÖйúÕþ¸®²»¿ÉÄܶԴËÀàÐж¯Ò»ÎÞËùÖª¡±£»ÕâЩºÚ¿ÍÓëÖйúÈËÃñ½â·Å¾ü´æÔÚÃÜÇÐÁªÏµ£¬¡°ÒòΪ½â·Å¾üÕÐļÁ˼ÆËã»úרҵ±ÏÒµµÄѧÉú£¬¶øÇÒ±»×·×ÙµÄËùÔÚµØÉϺ£Óнâ·Å¾üµÄפ¾ü¡±£»ÕâЩºÚ¿ÍÐж¯ÔÚÇÔÈ¡ÁËÃÀ¹ú¹«Ë¾µÄÉÌÒµ»úÃÜÖ®ºóת½»¸øÖйú¹«Ë¾£¬°ïÖúÆäºÍÃÀ¹ú½øÐв»¹«Æ½¾ºÕù¡£

¡¡¡¡ÔÚÂüµÏÑÇÌع«Ë¾µÄ±¨¸æÅû¶֮ºó£¬ÃÀ¹ú°×¹¬Á¢¿Ì·¢²¼ÁË¡¶¼õÉÙÇÔÈ¡ÃÀ¹úóÒ×»úÃܵÄÐÐÕþÕ½ÂÔ¡·£¨Administration Strategy on Mitigating the Theft of US Trade Secrets£©¡£¸ÃÕ½ÂÔÓÉÃÀ¹úÉÌÎñ²¿¡¢¹ú·À²¿¡¢¹úÍÁ°²È«²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢²ÆÕþ²¿¡¢¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒÒÔ¼°ÃÀ¹úóÒ×´ú±í°ì¹«ÊÒÁªºÏ·¢²¼£¬ÈÏΪÍøÂçÈëÇÖÇÔÈ¡ÃÀ¹úÉÌÒµ»úÃܵÄÐж¯ÕýÔÚÑÏÖØËðº¦ÃÀ¹úµÄ¹ú¼ÒÀûÒæ¡£ÔÚÕâ·Ý141Ò³µÄ±¨¸æÖУ¬ÖйúÔÚ31Ò³±»µãÃû£¬¼¸ºõËùÓС°ÇÔÈ¡ÃÀ¹úóÒ×»úÃÜ¡±µÄ°¸Àý£¬È«²¿Óá°ÃÀ¹ú¹«Ë¾µÄÖйú¹ÍÔ±¡±¡¢¡°ÖйúÈË¡±ºÍ¡°Öйú¡±×÷ΪÀýÖ¤¡£¶ÁÍê´Ë·Ý±¨¸æµÄÈË»ù±¾»áÈÏΪ£¬ÖйúÕýÔÚͨ¹ýϵͳµÄÇÔÈ¡ÉÌÒµ»úÃܵÄÐÐΪÍþвÃÀ¹ú¹«Ë¾µÄ¾­¼ÃÀûÒ棬²¢¶ÔÃÀ¹úµÄ¹ú¼Ò°²È«¹¹³ÉÕ½ÂÔÌôÕ½¡£±¨¸æÌá³öÓÃÍâ½»Ðж¯¡¢¹úÄÚÁ¢·¨¡¢¹úÄÚÖ´·¨Ðж¯¡¢¼ÓÇ¿Õþ¸®Óë˽Ӫ¹«Ë¾¼äµÄºÏ×÷µÄ·½Ê½£¬À´Ó¦¶ÔÕâÑùµÄÍþв¡£Õû¸ö±¨¸æµÄÌصãÖ®Ò»£¬ÔÚÓÚ½«Ô­ÏÈÍ£ÁôÔÚ´«Í³°²È«ºÍÇ鱨ËѼ¯ÁìÓòµÄÍøÂ簲ȫÎÊÌâÀ­ÈëÁ˾­¼ÃóÒ×ÁìÓò£¬Í¬Ê±½«¾­¼ÃóÒ×ÁìÓò·¢ÉúµÄÉÌÒµ»úÃܱ»ÇÔÎÊÌ⣬ÉÏÉýµ½¹ú¼Ò°²È«µÄÕ½ÂÔ²ãÃæ½øÐп¼Á¿¡£Ôڴ˱³¾°Ï£¬ÃÀ¹úÕþ¸®¿ÉÒÔÖƶ©ÏàÓ¦µÄ·¨¹æ£¬ÏÞÖÆÌض¨µÄ¹«Ë¾£¨ÈçÖйúµÄ»ªÎª¹«Ë¾ºÍÖÐÐ˹«Ë¾£©½øÈëÃÀ¹úµçÐÅ»ù´¡ÉèÊ©Êг¡¡£ÕâÖÖÃ÷ÏÔµÄóÒ×±£»¤Ö÷ÒåÕþ²ßÏÖÔÚ±äµÃÃûÕýÑÔ˳ÁË¡£Ô­ÏÈÔÚÃÀ¹ú¹úÄÚÔâÓöÑÏÖØ·´¶ÔµÄÒªÇó¹«Ë¾ÓëÕþ¸®ºÏ×÷¡¢Ç¿»¯Õþ¸®¶ÔÔÚÏßÐÅÏ¢¹ÜÖƵķ¨°¸£¬´ò×ÅÓ¦¶ÔÀ´×ÔÖйúµÄÍøÂçÍþвµÄÃûÒ壬Ҳ±È½Ï˳ÀûµØ½øÈëµ½ÁËÖ´Ðн׶Ρ£

¡¡¡¡×ÛºÏÃÀ·½ÒÑÓеÄÕ½ÂÔºÍÕþ²ßÎļþ£¬¿ÉÒÔ·¢ÏÖÃÀ¹ú¶ÔÍøÂç¿Õ¼äµÄÐж¯½øÐÐÁËÃ÷È·µÄ½ç¶¨£¬ÕâÖֽ綨°üº¬ÒÔÏÂÈý¸ö·½Ã棺

¡¡¡¡Ê×ÏÈ£¬ÊǶÔÍøÂ簲ȫ¸ÅÄîµÄ½ç¶¨¡£ÃÀ¹ú¼«Á¦Íƶ¯¸ù¾ÝÃÀ¹ú¹ú¼ÒÀûÒæ½ç¶¨µÄÍøÂ簲ȫ¸ÅÄÈÏΪ¹Ø¼ü»ù´¡ÉèÊ©ºÍ´æ´¢ÓÚÐÅÏ¢ÉèÊ©ÖеÄÐÅÏ¢£¨ÌرðÊÇÉÌÒµ»úÃÜ£©µÄ°²È«£¬ÊôÓÚÍøÂ簲ȫµÄ·¶³ë¡£ÔÚÍøÂçÖд«²¥µÄ·Ç¾­¼ÃÀ൫¿ÉÄܶԹú¼Ò°²È«¹¹³ÉÍþвµÄÐÅÏ¢£¬Ô­ÔòÉϲ»ÊôÓÚÍøÂ簲ȫµÄ·¶³ë¡£¶ÔÓÚÄÇЩÇÖ·¸µ½ÃÀ¹ú¹ú¼Ò°²È«µÄ¸ö°¸£¬¿É°´ÕÕ¸ö°¸À´´¦Àí¡£¾Ü¾øÔÚ·¨ÀíºÍÔ­ÔòÉϳÐÈÏÖ÷Ȩ¹ú¼ÒÓµÓжÔÐÅÏ¢ÄÚÈݽøÐйÜÀíµÄºÏ·¨ÐÔ¡¢ºÏÀíÐÔºÍÕýµ±ÐÔ¡£

¡¡¡¡Æä´Î£¬ÊǶÔÐÐΪ¶ÔÏóºÍ¾ßÌå¹ý³ÌµÄ½ç¶¨¡£ÃÀ¹ú¶ÔºÚ¿ÍÐж¯ÓÈÆäÊÇÓëÖйúÏà¹ØµÄºÚ¿ÍÐж¯µÄ¹Ø×¢½¹µã£¬¾­ÀúÁËÒ»¸ö±ä»¯µÄ¹ý³Ì¡£×îÔçµÄ¹Ø×¢µãÊÇ´ÓÈËȨºÍÕþÖÎ×ÔÓɵĽǶÈÇÐÈëµÄ£¬Ö®ºó¿ªÊ¼¹Ø×¢ÓëÃÀ¹ú¹ú¼Ò°²È«Ïà¹ØµÄ»úÃÜÐÅÏ¢£¬×îÐÂÒ»ÂÖµÄÌÖÂÛÔòΧÈÆÉÌÒµÃØÃÜÓëÃÀ¹úµÄÕ½ÂÔ¾ºÕùÁ¦¡£ÃÀ¹úÕþ¸®ÈÏΪ£¬Ò»¸ö¹ú¼ÒÊÕ¼¯Ç鱨ÊǺÜÕý³£µÄÐÐΪ£¬¶Ô´Ë²»±Ø·ñÈÏ£¬µ«¾ø²»½ÓÊÜÀûÓùú¼ÒÇ鱨»ú¹ØµÄÄÜÁ¦Ö§³ÖÉÌÒµ¾ºÕùµÄ×ö·¨¡£ÃÀ¹ú´Ë´Î¶ÔÖйúºÚ¿ÍÐж¯µÄÇ´Ô𣬽«ËѼ¯Ç鱨µÄ¹ú¼ÒÐÐΪºÍÇÔÈ¡ÉÌÒµ»úÃܵÄÐж¯»ìΪһ̸£¬Ê×´ÎÃ÷È·Ö¸³ö¶ÔÃÀ¹ú¹¹³ÉÍþвµÄÀ´Ô´ÊÇÖйúÓùú¼ÒÇ鱨»ú¹ØµÄÁ¦Á¿ÇÔÈ¡ÃÀ¹úµÄÉÌÒµ»úÃÜ£¬ÕâÊÇ¡°²»¹«Æ½¾ºÕù¡±¡£ÕâÊÇÒ»ÖÖеÄÌá·¨£¬Òâͼռ¾ÝµÀµÂ¸ßµØ£¬ÆÈʹÖйúÔÚÃÀ¹ú»®¶¨µÄÐж¯·¶Î§¿ò¼ÜÄÚÓëÃÀ¹ú½øÐÐ̸ÅС£ÃÀ¹ú×Üͳ°Â°ÍÂíÔÚÖµç×£ºØÏ°½üƽµ±Ñ¡Öйú¹ú¼ÒÖ÷ϯµÄµç»°ÖУ¬Ê×ÏÈÌá¼°ºÚ¿ÍÍþвÎÊÌâ¡£Õâ¿ÉÒÔ±»¿´×÷ÊÇijÖÖÖØÒªµÄ°µÊ¾£¬Ô¤¼ÆÏÂÒ»½×¶ÎÃÀ·½½«»á¼Ó´óÁ¦¶È£¬ÒªÇ󽫺ڿÍÍþвºÍÍøÂç¿Õ¼äÐÐΪ׼ÔòÎÊÌâÄÉÈëÖÐÃÀ¾­¼ÃÓëÕ½ÂÔ¶Ô»°µÄ¿ò¼Ü¡£

¡¡¡¡µÚÈýÊǶÔÐж¯·½Ê½ºÍÄ¿±êµÄ½ç¶¨¡£ÃÀ¹úÊÔͼͨ¹ý´ËÀàºÚ¿Í±¨¸æÖÆÔì³öÒ»¸öÀ´×ÔÓßÂÛµÄѹÁ¦»·¾³£¬ÆÈʹÖйú²»½öͬÒ⽫ÍøÂ簲ȫÎÊÌâÄÉÈëÖÐÃÀÕ½ÂÔÓë¾­¼Ã¶Ô»°µÄ¿ò¼Ü£¬¶øÇÒÑϸñ×ñÑ­ÃÀ¹úµÄÕþ²ß·½°¸À´²ÉÈ¡Ïà¹ØµÄÓ¦¶Ô´ëÊ©¡£Í¬Ê±£¬ÃÀ¹ú±ØȻҪΪ×Ô¼º±£Áô×î´óÏ޶ȵÄÐж¯×ÔÓɿռ䣬°üÀ¨ÓÃÃÀ¹ú¹ú¼Ò°²È«¾ÖµÄÈ«ÇòÐźżàÌýϵͳÇÔÈ¡ÉÌÒµ»úÃܵÄÐж¯×ÔÓÉ¡£

¡¡¡¡Èç¹ûDZÔÚ¶ÔÊÖ½ÓÊÜÁËÃÀ¹úµÄÉÏÊö½ç¶¨£¬¾Í»á±»ÒýÈëÃÀ¹ú¹¹½¨µÄ¹æ·¶Ìåϵ£¬ÆäÏà¹ØÐж¯Ò²×ÔÈ»¿ÉÒÔ±»Ô¤²â£¬²¢·ûºÏÃÀ¹úÖƶ¨µÄ¹ú¼Ê¹æ·¶¡£

½á¡¡¡¡Óï

¡¡¡¡×ÛÉÏËùÊö£¬ÕûÌåÀ´¿´£¬±£³Ö¶Ô»¥ÁªÍø·¢Õ¹µÄ¹ú¼Ò¿ØÖÆʼÖÕÊÇÃÀ¹úÕþ¸®¸÷ÖÖÕþ²ßÓëÕ½ÂÔµÄÖ÷ҪѡÔñ¡£ÃÀ¹úÕþ¸®µÄÍøÂ簲ȫսÂÔʵ¼ù¿ÉÒÔ¸ÅÀ¨ÎªÈçÏÂÈý¸ö·½Ã棺

¡¡¡¡Ê×ÏÈ£¬Î¬³Ö¶ÔÍøÂç¿Õ¼ä¹Ø¼ü×ÊÔ´µÄµ¥±ß¢¶ÏºÍ¿ØÖÆ¡£ÕâÖÖ¢¶ÏÊÇͨ¹ýÃÀ¹úÕþ¸®Ó뻥ÁªÍøÃû³ÆÓëÊý×ÖµØÖ··ÖÅä»ú¹¹£¨Internet Corporation for Assigned Names and Numbers£¬ËõдΪICANN£©µÄ¹ØϵÀ´¾ßÌåÌåÏֵġ£Õâ¸ö×éÖ¯³ÉÁ¢ÓÚ1998Äê9ÔÂ18ÈÕ£¬ÆäÖ÷ҪȨÏÞ°üÀ¨µØÖ·¿Õ¼ä(IP Address Space)µÄ·ÖÅ䡢ЭÒé²ÎÊý(Protocol Parameters)µÄÅäÖá¢ÓòÃûϵͳ(Domain Name System)Óë¸ù·þÎñÆ÷ϵͳ(Root Server System)µÄ¹ÜÀíµÈÉæ¼°È«Çò»¥ÁªÍøµÄÖØÒª¹¤×÷¡£¸Ã×é֯ʵ¼ÊÉÏÐÐʹµÄÊÇ»¥ÁªÍøºÅÂë·ÖÅäµ±¾Ö(IANA)µÄÖ°ÄÜ¡£¶øÈ¡µÃÕâÖÖÖ°ÄÜÔòÐèÒªµÃµ½ÃÀ¹úÉÌÎñ²¿¹ú¼ÒµçÐźÍÐÅÏ¢¹ÜÀí¾Ö£¨NTIA£©ÒÔ¶¨ÆÚÐøÇ©ºÏͬµÄÐÎʽ½øÐеÄÊÚȨ¡£×îÔçÇ©¶¨µÄ»¥ÁªÍøºÅÂë·ÖÅäµ±¾ÖºÏͬµÄÓÐЧÆÚΪһÄ꣬2003ÄêÇ©¶¨µÄΪÈýÄ꣬2006ÄêÇ©¶¨µÄΪÎåÄ꣬2012ÄêÇ©¶¨µÄºÏͬÔò½«ÆÚÏÞÑÓ³¤µ½ÆßÄ꣬°üÀ¨ÈýÄê»ù±¾ºÏִͬÐÐÆÚºÍÁ½´Î¸÷Á½ÄêµÄÑÓ³¤ÆÚ¡£¾¡¹ÜÆÚÏÞÔÚÑÓ³¤£¬Ò²ÌýÈ¡Á˶෽ÃæµÄÒâ¼û£¬µ«Êǽö½ö´Ó¹ý³Ì°²ÅÅÀ´Ëµ£¬Ê¼ÖÕûÄÜÍÑÀëÃÀ¹úÕþ¸®µÄ¿ØÖÆ¡£ÃÜÇйØ×¢²¢²ÎÓëÆäÖеÄÖйú¹¤ÒµºÍÐÅÏ¢»¯²¿µçÐÅÑо¿ÔºÍ¨ÐÅÐÅÏ¢Ñо¿ËùµÄÑо¿ÈËÔ±Ö¸³ö£¬¡°¾¡¹Ü±íÃæÉÏÊÇ»¥ÁªÍøÃû³ÆÓëÊý×ÖµØÖ··ÖÅä»ú¹¹À´ÐÐʹ»¥ÁªÍøºÅÂë·ÖÅäµ±¾ÖµÄÖ°ÄÜ£¬µ«ÊÇÃÀ¹úÕþ¸®ÈÔÈ»ÕÆÎÕ׏ؼüϵͳµÄËùÓÐȨ£¬ÎÕÓÐ×ö³ö×îÖղþöµÄȨÁ¦¡££¨ÓÉ£©»¥ÁªÍøÃû³ÆÓëÊý×ÖµØÖ··ÖÅä»ú¹¹£¨ICANN£©À´ÐÐʹ»¥ÁªÍøºÅÂë·ÖÅäµ±¾Ö£¨IANA£©µÄÖ°ÄÜ¡£¾¡¹Ü»¥ÁªÍøÃû³ÆÓëÊý×ÖµØÖ··ÖÅä»ú¹¹²ÉÈ¡Á˶àÀûÒæÏà¹Ø·½µÄģʽ¸ºÔð»¥ÁªÍøµÄÈÕ³£ÔËÓªºÍά»¤£¬µ«±¾ÖÊÉÏÈÔȻֻÊÇÒ»¸ö³Ð°üÉÌ¡£¡±

¡¡¡¡Æä´Î£¬ÏµÍ³ÔËÓÃÃÀ¹úÕÆÎյļ¼ÊõÓÅÊÆ£¬Í¨¹ýÒѾ­´æÔÚµÄÕþ¸®Ó빫˾¼äµÄ¹Øϵ£¬´óÁ¿¿ª·¢·ûºÏÃÀ¹úÍøÂç¿Õ¼äÕ½ÂÔÄ¿±êµÄÐÂÐÍÓ¦Ó÷½Ê½¡£´ËÀàʵ¼ùÊýÁ¿ÅÓ´ó£¬Ôڴ˽ö¾ÙÁ½¸ö´ú±íÐԵݸÀý¡£20ÊÀ¼Í90Äê´ú£¬ÃÀ¹úÖÐÑëÇ鱨¾Öǣͷ×齨ÁËÃûΪIn-Q-TelµÄ·çÏÕͶ×ʹ«Ë¾£¬×ÊÖúËùÓÐÓÐÖúÓÚÇ¿»¯ÃÀ¹úÔÚÐÅÏ¢¿Õ¼äµÄÇ鱨ÊÕ¼¯ÓëÐÅÏ¢¼à¿ØÄÜÁ¦µÄÍøÂç´´ÐÂÓ¦Óá£ÆäͶ×ʶÔÏó°üÀ¨µç»°ÍÚ¾òÕß¹«Ë¾£¨CallMiner£©ºÍ¿ÉÊÓ¼¼Êõ¹«Ë¾£¨Visible Technology£©¡£Ç°ÕߵĴ´Ð³ɹûÊÇÃûΪ¡°Callminer Eureka£¡¡±µÄµç»°Â¼ÒôÄÚÈÝÖÇÄÜ·ÖÎöÈí¼þ¡£¾Ý³ÆÆä·ÖÎöÖص㲻½ö°üÀ¨ÓïÒô£¬»¹°üÀ¨Óïµ÷¡¢ÓïËÙÄËÖÁ˵»°¹ý³ÌÖеijÁĬµÈ·ÇÓïÒôÐÅÏ¢£¬²¢½ø¶ø·ÖÎö³ö˵»°ÕßµÄÕæʵÐÄÀí״̬¡£¿ÉÊÓ¼¼Êõ¹«Ë¾µÄÖ÷´ò²úÆ·ÊÇ¡°»ùÓÚWeb2.0µÄÐÅÏ¢ÕûºÏ¡±£¬¼´Í¨¹ýÿÌì·ÃÎʳ¬¹ý50Íò¸öWeb2.0ÍøÕ¾£¬×¥È¡°üÀ¨²©¿Í¡¢ÂÛ̳ÄËÖÁYoutubeÊÓƵÍøÕ¾µÄÍƼöÁôÑÔÔÚÄÚµÄÐÅÏ¢£¬¾«È·µØ±æʶ³öÍøÉÏÓßÂ۵ķ½Ïò£¬Ê¶±ð³öÄÇЩÍøÂçÓßÂÛµÄÒýµ¼Õߣ¬ÒÔ¼°ÕâЩÓßÂÛ»òÇãÏòÓëÆä¿Í»§£¨ÖÐÇé¾ÖÏÖÔÚÊÇÕâ¼Ò¹«Ë¾µÄ×îÖÕ¿Í»§£©ÀûÒæ¼äµÄÀû±×¹Øϵ¡£(×¢£ºÀ´Ô´£ºhttp://www.iqt.org/portfolio/visible_technologies.html£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£¸ÃÍøÕ¾¿ª×ÚÃ÷ÒåµÄÐû²¼£¬¡°´´Á¢ÓÚ1999ÄêµÄ±¾»ú¹¹£¬Ö¼ÔÚΪÃÀ¹úÇ鱨½çµÄ¼¼ÊõÐèÇóÒÔ¼°ÉÌÓÃÐÅÏ¢¼¼Êõ·¢Õ¹Ö®¼ä¼ÜÉèÇÅÁº¡±£¬À´Ô´£ºhttp://www.iqt.org/about/mission.html£¬µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)´ËÍ⻹Óиü¼ÓÖ±½ÓµÄ¡°»úÆ÷ÈËË®¾ü¡±¼¼Êõ£¬¼´ÔÊÐí1ÈËͬʱ²Ù¿Ø¶à¸öÍøÂçÕ˺ţ¬ÔÚÉ罻ýÌåƽ̨²ÎÓ빫¹²ÌÖÂÛ¡£¾ÝÓ¢¹úýÌ屨µÀ£¬²É¹ºÁËÕâÒ»¼¼ÊõµÄÃÀ¾üÖÐÑë˾Á¡¢ÃÀ¹ú¿Õ¾ü˾ÁÖ÷Òª½«ÆäÓÃÓÚÉ罻ýÌåµÄÓßÂÛÕ½£¬ÒԱ㽫¿Ö²À·Ö×ÓµÄÍøÂçսʿ¸Ï³öÍøÂç¿Õ¼ä¡£(×¢£ºNick Fielding and Ian Cobain, ¡° Revealed: U.S. Spy Operation That Manipulates Social Media,¡± Guardian, Mar. 17, 2011, À´Ô´£ºhttp://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡µÚÈý£¬ÔÚÄÚÈÝÓë¹ØϵµÄ²ãÃ棬½èÖúÃÀ¹úÔÚÕþ¸®¡¢¹«Ë¾¡¢·ÇÕþ¸®×éÖ¯ÈýÕß»¥¶¯·½ÃæµÄ·á¸»¾­Ñ飬¹¹½¨Áé»î¶àÑùµÄ»ùÓÚÏîÄ¿µÄºÏ×÷ÍŶӻò¿ç¹ú»î¶¯·Ö×ÓÍøÂ磬½«ÃÀ¹úÍøÂç¿Õ¼äÕ½ÂÔµÄÖ¸µ¼ÀíÄîºÍÃÀ¹úµÄÕ½ÂÔÄ¿±êÖ²È뻥ÁªÍøÓû§µÄ¹ÛÄîÖУ¬ËÜÔì¹ú¼ÊÍøÂç¿Õ¼äµÄÓßÂÛ·ÕΧ¡£¹ØÓÚ´ËÀàÐж¯µÄÕþÖμÛÖµ£¬ÔçÔÚ»¥ÁªÍøͶÈëÉÌÒµÔË×÷²»¾ÃµÄ1995Ä꣬ÃÀ¹ú¹ú·À²¿·Ö¹ÜµÍÁҶȳåÍ»ÓëÒþÃØÐж¯µÄ¸±²¿³¤°ì¹«ÊÒÕ½ÂÔÆÀ¹ÀÖúÀíÔøÓйýÒÔϾ«±ÙµÄÂÛÊö£º¡°»¥ÁªÍø¶ÔÍþȨÕþÌå¹¹³ÉÁËÎÞ·¨ÓÐЧ¿¹ºâµÄ³¤ÆÚÕ½ÂÔÍþв¡±£¬¡°½èÖú»¥ÁªÍøʵʩµÄÐÄÀíÐж¯£¬Äܹ»ÈöÔÏó¹ú¹úÄÚÃñÖÚ²ÉÈ¡Ô­ÏȱØÐëͨ¹ýÃÀ¹úÌØÖÖ²¿¶Ó²ÅÄÜÓÐЧʵʩµÄÐж¯¡­¡­Õâ½ø¶ø¼õÉÙÁËÃÀ¹úÌØÖÖ²¿¶ÓÃæÁÙµÄÈËÉíÍþв£¬Ò²±ÜÃâÁËÃÀ¹úÕþ¸®Ö±½Ó¾íÈëÕþÖηçÏÕ¡£¡±(×¢£ºCharles Swett, Strategic Assessment: The Internet, Office of the Assistant Secretary of Defense for Special Operation and Low-Intensity Conflict (Policy Planning), À´Ô´£ºhttp://www.fas.org/cp/swett.html, µÇ¼ÈÕÆÚ£º2013Äê7ÔÂ14ÈÕ¡£)

¡¡¡¡¶Ô°üÀ¨ÖйúÔÚÄÚµÄÆäËû¹ú¼ÒÀ´Ëµ£¬ÔڿɼûµÄδÀ´£¬Ö÷ÒªÈÎÎñ½«ÊÇ̽Ë÷²¢Àí½âÃÀ¹ú¹ú¼ÒÍøÂ簲ȫսÂÔµÄÑݽø¼°Æäʵ¼ù£¬È»ºóÔÚ´Ë»ù´¡ÉÏÓþ¡¿ÉÄÜ¿ìµÄËٶȽ¨Á¢×ÔÉíµÄ¹ú¼ÒÍøÂ簲ȫսÂÔ£¬Î¬»¤×ÔÉíÔÚÍøÂç¿Õ¼äµÄºÏÀíÀûÒæËßÇó¡£

¡¡¡¡ÉòÒÝ£º¸´µ©´óѧ¹ú¼Ê¹ØϵÓ빫¹²ÊÂÎñѧԺ¹ú¼ÊÕþÖÎϵ½²Ê¦

£¨±¾ÎÄÔðÈα༭:Ñî»á¾ü£©