­^°ê¤Q¦~«e¤Þ¶iµØ¬°®¬¤£·íªì

2014-05-12 583

ªñ¤é³ø¸üÂE®ü¸³¨Æªø³¢¥x»Ê°ª½Õ¹ï¬F©²¶æÁn¡A»¡¦pªG¤£­ã¥Lªº4G°ò¦a¥x¥Î¤¤°êµØ¬°¤½¥qªº³q°T³]³Æ¡A´N­n©Úµ´Ãº

ªñ¤é³ø¸üÂE®ü¸³¨Æªø³¢¥x»Ê°ª½Õ¹ï¬F©²¶æÁn¡A»¡¦pªG¤£­ã¥Lªº4G°ò¦a¥x¥Î¤¤°êµØ¬°¤½¥qªº³q°T³]³Æ¡A´N­n©Úµ´Ãºµ|¡A¦]¦¹¤Þ°_¥xÆWªÀ·|°ª«×Ãöª`¡C¦b³o¸Ì§Ú¤£·Q½Í³¢¸³¡A¦Ó¬O¤Þ¥Î­^°êªº¨Ò¤l¡A¬Ý¬Ý­^°ê°ê¦w¨t²Î¬O¦p¦ó²`¦ÛÀË°Q­^°ê¹q«H¡A¤Þ¶iµØ¬°³]³Æ©Ò³y¦¨ªº°ê®a¦w¥þÁô¼~¡A¥H¤Î¤`¦Ï¸É¨cªº¹ïµ¦¡C

­^°ê¬F©²¦b2013¦~6¤ë¡A°w¹ï¡u¥~°ê¼t°Ó°Ñ»PÃöÁä°ê®a°ò¦«Ø³]¹ï°ê®a¦w¥þªº¥i¯à¼vÅT¡v¡A¹ï°ê·|´£¥X³ø§i¡C§Ú¦b¤µ¦~¥|¤ëªì½Ķ©M¤ÀªR¤F³o¥÷³ø§i¡A´£¿ôNCC¥²¶·¦Ò¼{²M·¡¡AªA¶T¨óij¤¤¶}©ñ¤¤°ê¸gÀç¸ê³q°Tºô¸ôªA°Èªº½d³ò¡A©M«Ø¥ß¦³®Äªº¸ê¦w­·ÀIµû¦ôºÞ²z¨î«×¡A¤]ÅýªÀ·|¤j²³ÁA¸Ñ¥ý¶i°ê®a¬O¦p¦ó·V­«¬Ý«Ý³o­ÓijÃD¡Aºâ¬OºÉª¾ÃÑ¥÷¤lªº´ÖÁ¡¤§¤O¡C

­^°ê¬F©²³o ¥÷°ê·|³ø§i¤¤¡A¥Î¤F¤G¤Q¦h­¶ªº¤º®e¨Ó½Í¸ê³q°T²£·~ªº¸ê¦wijÃD¡Aµ´¤j³¡¤À¬O°w¹ï¤¤°êªºµØ¬°¡C

³o¥÷¸ê®Æ¬OIntelligence and Security Committee (ISC)°µ¥X¨Óªº¡AÅý­º¬Û¯à°÷¦³¥R¤Àªº¸ê®Æ¹ï°ê·|°µ³ø§i¡C³o­Ó¸ê®Æ¤]¬O¤½¶}ªº¡A¥i¥HÅý¤j²³À˵ø¡CISC³o­Ó¬F©²³æ¦ì¡A¥Ñ°ê·|´£¦W©e­û¡A­º¬Û¥ô©R¡Aª½±µ¹ï ­º¬Û­t³d¡A¥i¥HºÊ·þ­^°êªº¤T¤j±¡¸ê¾÷Ãö¡Athe Security Service (MI5), the Secret Intelligence Service (MI6) and the Government Communications Headquarters (GCHQ)¡A¤j·§µ¥¦P©ó§Ú­Ìªº°ê¦w·|¡CMI5¤j·§¬O°ê¦w§½¡AMI6¬O007©ÒªA°Èªº±¡³ø§½¡AGCHQ«hµ¥¦P©ó§Ú­ÌªºNCC¡C

¥H¤U´N¬O­^°ê°ê¦w§½³ø§iªº­«ÂIºK­n¡G

¤@¡B¨p¦³¥ø·~¹ï°Ó¥Î°ò¦«Ø³]©Ò°µªº¨M©w¡A¹ï©ó°ê®a¦w¥þªº¼vÅT«D±`­«¤j... ¥Ñ©ó¨p¦³¤Æ©M°ê»Ú¤Æ¡A°Ó·~§Q¯q©M°ê®a¦w¥þ¤§¶¡¦³¼ç¦bªº½Ä¬ð¡A¬F©²¦b«Ø¸m³o¨Ç³]³Æ®É¡A¤×¨ä¬O°ê¥~¬ãµo©M»s³yªº³]³Æ¡A¥²¶·¦³«Ü²M·¡ªºµ¦²¤»P¦³®Äªº³W½d¡A¥H½T«O °Ó·~§Q¯q©M°ê®a¦w¥þ¤§¶¡ªº¥­¿Å¡C§Ú­Ì¡]«ü­^°ê°ê¦w·|¡^¥HBT¡]­^°ê¹q«H¡A¬Û·í©ó§Ú­Ìªº¤¤µØ¹q«H¡^©MµØ¬°ªºÃö«Y§@¬°°Q½×ÃD§÷¡C

¤G¡BµØ¬°©M¤¤°êªººØºØÃö³s©Ê­È±oÃö¤Á¡A¦]¬°³o¨Ç³y¦¨¤j²³ÃhºÃµØ¬°ªº°Ê¾÷¬O§_¬O¯Â°Ó·~ªºÁÙ¬O¬Fªv©Êªº... µM¦Ó¡AµØ¬°¥Ú¤f§_»{¥L»P¤¤°ê¬F©²©Î­x¶¤¦³Ãö¡A§¹¥þ¨S¦³±µ¦¬¬F©²ªº¸É§U¡A¥i¬O¡A¥Lªº°]°Èµ²ºc¨Ã¤£©ú½T¡C... ·íµØ¬°»P¤¤°êªºÃö«Y³Q½èºÃ®É¡A¥Lµo°Ê¤j§åªº¤å«Å¼s§i¡A¥ø¹Ï«ÅºÙ¥L¬O¥i³Q«H¥ôªº³q°T³]³Æ»s³y°Ó¡C

µM¦ÓµØ¬°ªº«Å¶Ç¤£¤j¶¶§Q¡A¨ä¥Lªº°ê®a³£³vº¥´£°ª§Ù³Æ¡C¦b¬ü°ê¡A³Ìªñªº°ê·|³ø§i«ü¥X¡AµØ¬°©M¤¤¿³©Ò´£¨Ñªº³]³Æ¼çÂæMÀI¡A¦³¥i¯à ¶Ë®`¬ü°ê®Ö¤ßªº°ê®a¦w¥þ¡C¦P®É¡A¬°¤F°ê¦w¡A¿D¬w¬F©²¤w¸g¨M©w¤£­ãµØ¬°°Ñ»P°ê®a¼eÀWºô¸ôªº«Ø¸m¡C

¤T¡BµØ¬°¦b­^°êªº¥æ©ö¥X¤F¤°»ò°ÝÃD©O¡H

­º¥ý¡ABT»¡¡A¦b2003¦~´¿§iª¾¬F©²Â¾­û¡AµØ¬°¦³°Ñ»P¡u21¥@¬öºô¸ô«Ø³]®×¡v¡A¦ý¬O³o¨Ç¬F©²Â¾­û¤@ª½¨ì2006¦~BT»PµØ ¬°Ã±¦X¬ù¤§«e¡A¨Ã¨S¦³±NµØ¬°ªº°Ñ»P§iª¾¤º»Õªº³¡ªø­Ì¡A³o¼Ëªº¥¢»~¡A¬O§Ú­ÌÀ³¸Ó­n·d²M·¡¹õ«á­ì¦]ªº¡G

- ­º¥ý¡A¾­û­Ìªº»¡ªk¬O¡A´Nºâ³qª¾ªø©x¡A¦]¬°µLªk¥iºÞ¡AµØ¬°ªº°Ñ»P¤]¤£·|³Q¸T¤î¡A©Ò¥H³qª¾¤F¤]¨S¥Î¡C

- µM¦Ó¡A³o¬O¿ù»~ªº»{ª¾¡A¤º»Õ¨ä¹êª¾¹D³o¨Ç¥æ©ö¡A¦Ó¥B¦³Åv¤O¥iªý¤î³o¼Ëªº¥æ©ö¡A¥u¬Oªý¤î¥æ©ö©Ò»Ý¥I¥Xªº°]°È©M¬Fªv¥N»ù¤Ó °ª¡C

- ¦b³o­Ó®×¤l¸Ì¡A¬F©²ªºµÛ²´ÂI¦b©ó°Ó·~§Q¯q¡A¨Ã¨S¦³¦Ò¼{°ê¦wijÃD¡C³o¬O§¹¥þµLªk¦X²z¤Æªº¥¢»~¡AÃþ¦ü³o¼Ë­«¤jªº¨M©w¡A¥²¶·¥Ñ ¤º»Õ¨Ó°µ¨M©w¡C

¥|¡B¬F©²«OÅ@°ê¥Á¦w¥þªºÂ¾³d¡Aµ´¹ï¤£¥i¦]¬°®`©È¸gÀÙ·l¥¢©Î¬O¯Ê¥F§´µ½ªº¨î«×¦Ó¥´§é¦©¡CµM¦Ó¡A¥Ñ©ó¯Ê¥F©ú½Tªº±¹¬I¡BÅv³d¤£ ¤À¡A¦]¬°¤¤°êµØ¬°°Ñ»PBTªººô¸ô«Ø³]¡A°ê®a¦w¥þ¤w¸g³´¤J¦M¾÷¡A¦Ó¥BÁÙ¤@ª½¦b¦M¾÷¤§¤¤¡A«o³Q©¿²¤¡C

BT©MµØ¬°¤w¦³ªø¹F¤Q¦~ªºÃö«Y¡A¦Ó¨ä¤¤²o¯A¨ì°ê¦wijÃD©~µM¨S¦³¨¬°÷«H¿àªº¨î«×¥iºÞ¡C§Ú­Ì«Ü¾_Åå¡A¦]¬°Â¾­û­Ì³sªø©x³£¨S¦³ §iª¾¡A§ó¤£¥Î»¡Åý³¡ªø­Ì¨ÓÃö¤Á³o¨ÇijÃD¡C¹ï©ó°ê¥~¼t°Ó°Ñ»PÃöÁä°ê®a°ò¦«Ø³]¤Wªº°Ñ»P¡A§Ú­Ì¤£¬Û«H¬F©²¦Ü¤µ¦³¥ô¦óªº§ï¶i±¹ ¬I¡C

°ê¦w§½¡]Security Service¡^§i¶D§Ú­Ì¡A²z½×¤W¡A³o¨ÇµØ¬°ªº³]³Æ´£¨Ñ¤¤°ê«Ü»¤¤Hªºº¯³z¿Ò³ø¾÷·|¡A¦Ó¥B±¡³øÁp®u·|¡]JIC¡^¤]ĵ§i¹L¡A³z¹L³o¨Ç¾÷·|¶i¦æ¦³¼Ä·Nªº§ðÀ»¡A¬O «D±`Ãø¥H°»´ú©M¹w¨¾ªº¡A¦Ó¥B¤]Åý¤¤°ê¯à°÷¯µ±KÄdºI©MÂZ¶Ã§Ú­Ìªº¸ê°Tºô¸ô¡C

¤­¡B¦b³o¨Ç³q°T¾¹§÷¸Ìªº³nÅé¥]§t¶W¹L¤@¦Ê¸U¦æµ{¦¡½X¡AGCHQ®Ú¥»µL¤O¬dÃÒ¡A¸Ì­±Á`¬O¦³¼ç¦b¦MÀI¡A­«ÂI¬O­n¦p¦óºÞ²z©M¨¾ °ô³o¨Ç¦MÀI¡C

GCHQÁöµM­n¨DµØ¬°°t¦X¡A¥H´£°ª¥i«H«×¡A¦ý¬O¤]©Ó»{µØ¬°¤£¨£±o·|«Ü¿n·¥¡C... ÁöµMµØ¬°§Æ±æÂǥѻP­^°êªº¦X§@¡A¦V°ê»ÚÃÒ©ú¥Lªº¥i«H«×¡A©Ò¥HµØ¬°²{¦b«ÜºÉ¤O¤]«Üªá¿ú¦b°µ³o­Ó¼ÊºÙ¬°Cellªº¸ê¦wµû¦ô¤¤¤ß¡]Cyber Security Evaluation Centre¡^¡A¦ýGCHQ§i»|¬F©²¤£¥i¤j·N¡AÁÙ¬O¥²¶·§óÄY®æ¥[±j¦w¥þ±¹ ¬I¡C

¤»¡B¥Ñ©ó¤j¦h¼Æ¸ê³q°T³]³Æ³£¤w¸g¬O¦b¤¤°ê¬ãµo©Î»s³yªº¡A²{¦b¤£¶R³o¨Ç³]³Æ¥i¯à¤£¬O­Ó¦n¿ìªk¡C¦b¦¹±¡ªp¤U¡A­·ÀIºÞ²zªº¤èªk ¡]risk management approach¡^¤~¬O­«ÂI¡C¬F©²­n¦³¾A·íªºµ{§Ç¨Óµû¦ô³o¨Ç­·ÀI¡A¥H¤ÎºÞ²z­·ÀI¡A¦Ó¥BÃöÁä¬O¡A³o­Óµ{§Ç¥²¶·§¹§¹¥þ¥þ»P¨î«×¾ã¦X¡AµL½×¬O¦bñ¬ù«e©Î¬Oñ¬ù «á¡Aµ´¹ï¤£¬Oªþ±a«~¡C§Ú­Ì¤£¬Û«H­^°ê¦b»PµØ¬°¥æ©ö«e¦³°µ¦n·Ç³Æ¡A¦Ó¬O¦]¬°§Ú­Ìµ¹¤FÀ£¤O¤§«á¡A¬F©²¤~§i¶D§Ú­Ì¡A²{¦b¤w¸g¦³ ¤F­·ÀIµû¦ô¨î«×¡C§Ú­Ìµ¥µÛ¬Ý³o¨Ç¨î«×¬O§_¦³¥Î¡G§Ú­Ì¦b³ø§i¤¤©Ò´£¥Xªº§@ªk¡A¬O¬°½T«O¬F©²¤£·|¦A¦¸¼Z¸¨©Ò­¢¤Á»Ý­nªºªF¦è¡C

¬Ý¬Ý¥H¤W­^°ê°ê¦w³æ¦ì¹ï©ó¬F©²¥»¨­ÄY¼FªºÀË°Q§å§P¡A¦^ÀY¬Ý¬Ý¥xÆW¹ï¨â©¤¶¡ºô¸ô¸ê³q°T¦w¥þªººA«×¡A¬O¤£¬OÅý¤H·nÀY©O¡H¥HµØ¬°Ãe¤jªº¸êª÷©M·G»ùªº³] ³Æ¡A³s­^°ê¬F©²³£©è¾×¤£¤F¡A¦b¤Q¦~«e°µ¤F¿ù»~¨Mµ¦¡A¦p¤µ¥u¯à¸É¯}ºôÁÙ¤£¯à½T«O°ê®a¦w¥þ¡A¥xÆW¯à¤£°O¨ú±Ð°V¶Ü¡H

¶RµØ¬°³]³Æªº©TµM¬Ù¿ú¡A¦ý¬O¡A¤Þ¤J¤¤°ê¸ê³q°Tºô¸ô³]³Æ¦³¨äÁôÂ꺭·ÀI¡A¤£¥i³g¤@®É¤§§Ö¦Ó«K©y¦æ¨Æ¡A¥H§K»~ÁЭ^°ê«á¹Ð¡C¦b¦¹¡A§Ú­Ì¤ä«ùNCC¥Ø«e¹ï¥»®×ªºÂÔ·VºA«×¡A§ó§Æ±æ¬F©²¥þ­±ÀË°Q»P¾¨³t«Ø¥ß±ÄÁÊ®×¼f®Ö»P¸ê¦w¨¾Å@¾÷¨î¡A¥H½T«O°ê®a¦w¥þ¡C®Ö¥|ªº®ïŲ´N¦b²´«e¡A¯ó²vªº±ÄÁÊ¡A¾É­PªºµL½a«á±w¡A³Ì²×ÁÙ¬O¥Ñ¥þ¥Á¶R³æ¡C°£¤F³¢¸³ªº±ÄÁʮפ§¥~¡A¨â©¤ªA¶T¨óij¤¤¹ï¤¤°ê¶}©ñªº¤GÃþ¹q«H¹q¸£¸ê³q°T·~°È¡A¤]¤Þ°_¤H¥ÁÄY­«ªºÃö¤Á¡A¬F©²³]ªk¡u¦³®Ä¡v»¡©ú²M·¡¡A¤~¯à®ø«Ú·í«eªÀ·|¦U¬ÉªººÃ¼{»P¯ÉÂZ¡C

ªþ¤W­ì©l³ø§iªº³sµ²¡G

Foreign involvement in the Critical National Infrastructure - The implications for national security

(https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/205680/ISC-Report-Foreign-Investment-in-the-Critical-National-Infrastructure.pdf)

¡iÄ«ªG¤é³ø¡þ¬x¤hø¯¡j(§@ªÌ¬°¥x¤j¸ê¤u¨t°Æ±Ð±Â) 2014/05/10

http://www.appledaily.com.tw/realtimenews/article/forum/20140510/395356/%E8%8B%B1%E5%9C%8B%E5%BC%95%E9%80%B2%E8%8F%AF%E7%82%BA%E6%82%94%E4%B8%8D%E7%95%B6%E5%88%9D

ment,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-35937129-1', 'auto'); ga('send', 'pageview');