1

By Bill Morrow

¥¢¥á¥ê¥«¤Ç¤ÏÂçÅýÎθõÊä¤Î¥É¥Ê¥ë¥É¡¦¥È¥é¥ó¥×»á¤¬¥í¥·¥¢¤ËÂФ·¤Æ¥Ò¥é¥ê¡¼¡¦¥¯¥ê¥ó¥È¥ó¸õÊä¤Î¥á¡¼¥ë¤ò¥Ï¥Ã¥­¥ó¥°¤¹¤ë¤è¤¦´õ˾¤¹¤ë¤È¤¤¤¦¼Â¤Ë¶¯Îõ¤Ê¡Ö¥¸¥ç¡¼¥¯¡×¤¬Èô¤Ó½Ð¤·¤¿¤³¤È¤¬ÏÃÂê¤Ë¤Ê¤ê¤Þ¤·¤¿¤¬¡¢¼ÂºÝ¤Ë¡¢¥¢¥á¥ê¥«¤È¥í¥·¥¢¡¢¤½¤·¤Æ¤½¤ì°Ê³°¤Î¹ñ¡¹¤Î´Ö¤Ç¤ÏßõÎõ¤Ê¥¹¥Ñ¥¤¹çÀ郎·«¤ê¹­¤²¤é¤ì¤Æ¤¤¤Þ¤¹¡£¤½¤ó¤ÊÃæ¤Ç¡¢Àø¿å´Ï¤Ï³¤Ä쥱¡¼¥Ö¥ë¤Î¿®¹æ¤ò˵¼õ¤¹¤ë¡Ö¥µ¥¤¥Ð¡¼¥¹¥Ñ¥¤¡×¤È¤·¤Æ¤ÎǤ̳¤òÍ¿¤¨¤é¤ì¡¢Ì©¤«¤Ë³èÌö¤·¤Æ¤¤¤ë¤½¤¦¤Ç¤¹¡£

America uses stealthy submarines to hack other countries¡Ç systems - The Washington Post

https://www.washingtonpost.com/news/the-switch/wp/2016/07/29/america-is-hacking-other-countries-with-stealthy-submarines/

·³»ö³èÆ°¤ËƳÆþ¤µ¤ì¤ëÁõÈ÷Éʤä¼Öξ¡¦¹Ò¶õµ¡¡¦Á¥Çõ¤ÏÈëÌ©¤Î¥Ù¡¼¥ë¤Ë¼é¤é¤ì¤ëÉôʬ¤¬Â¿¤¯¡¢¤½¤ÎÀ­Ç½¤ò°ìÈ̿ͤ¬Á´¤ÆÇÄ°®¤¹¤ë¤³¤È¤ÏÉÔ²Äǽ¤Ç¤¹¤¬¡¢¤È¤ê¤ï¤±°ìǯ¤ÎÂçÉôʬ¤ò³¤¤ÎÃæ¤ËÀø¤Ã¤ÆǤ̳¤Ë¤¢¤¿¤ëÀø¿å´Ï¤ÏÆäËÈëÌ©¤ËÊñ¤Þ¤ì¤¿Á¥Çõ¤È¤¤¤¨¤Þ¤¹¡£ÃϾå¤ä¶õÃæ¡¢³¤¾å¤Ç»Ñ¤ò³Îǧ¤Ç¤­¤ë¤â¤Î¤È¤Ï°Û¤Ê¤ê¡¢¿Í¤ÎÌܤϤª¤í¤«¡¢¥ì¡¼¥À¡¼¤Ê¤É¤ÎõººÁõÃ֤ǤâÇÄ°®¤¬Æñ¤·¤¤¿¼³¤¤ËÀø¤ê¡¢¿ÍÃΤ줺Ǥ̳¤Ë¤¢¤¿¤ëÀø¿å´Ï¤Ï¡Ö¥µ¥¤¥ì¥ó¥È¡¦¥µ¡¼¥Ó¥¹¡×¤È¤â¸Æ¤Ð¤ì¡¢¤½¤ÎÆÃÀ­¤ò³è¤«¤·¤¿¹âÅÙ¤ÊǤ̳¤¬Í¿¤¨¤é¤ì¤Æ¤¤¤ë¤È¸À¤ï¤ì¤Æ¤¤¤Þ¤¹¡£

¤½¤ó¤ÊÀø¿å´Ï¤¬Ã´Åö¤¹¤ëǤ̳¤Î1¤Ä¤¬¡¢¤µ¤Þ¤¶¤Þ¤Ê¼êÃʤòÍѤ¤¤ÆÀ¤³¦Ãæ¤Î³¤Äì¤ò¤Ï¤¤²ó¤ë³¤Ä쥱¡¼¥Ö¥ë¤ÎÄÌ¿®Ëµ¼õ¤ä˸³²(¥¸¥ã¥ß¥ó¥°)¡¢¤½¤·¤ÆÄÌ¿®ÆâÍƤβþ¤¶¤ó¤ò¹Ô¤¦¥¹¥Ñ¥¤³èÆ°¤Ç¤¹¡£¤³¤Î³èÆ°¤Ï1970ǯÂ夫¤é¹Ô¤ï¤ì¤Æ¤ª¤ê¡¢¥¢¥á¥ê¥«·³¤Ï¥ª¥Û¡¼¥Ä¥¯³¤¤ËÇÛÃÖ¤µ¤ì¤¿¥½¥Ó¥¨¥È¤Î³¤Ä쥱¡¼¥Ö¥ë¤òÅðÄ°¤¹¤ëºîÀï¡Ö¥¢¥¤¥ô¥£¡¼¡¦¥Ù¥ë¡×¤ò¼Â»Ü¤·¤Æ¤¤¤Þ¤·¤¿¡£Åö»þ¤Ï¡Ö³¤Ä쥱¡¼¥Ö¥ë·Ðͳ¤ÎÄÌ¿®ÆâÍƤÏÅðÄ°¤µ¤ì¤¦¤ë¡×¤È¤¤¤¦¹Í¤¨¤¬°ìÈÌŪ¤Ç¤Ï¤Ê¤«¤Ã¤¿¤¿¤á¡¢¥¢¥á¥ê¥«¤Ï¤³¤ÎºîÀï¤ÇÈó¾ï¤Ë½ÅÍפʾðÊó¤ò¼¡¡¹¤È¼ê¤ËÆþ¤ì¤Æ¤¤¤Þ¤·¤¿¡£



By Global Marine Photos

¤½¤ÎºÝ¤Ë¤Ï¡¢µ­Ï¿ÍѤΥơ¼¥×¤òÆ⢤·¤¿ÀìÍѤÎÅðÄ°´ï¤¬»Å³Ý¤±¤é¤ì¡¢¥±¡¼¥Ö¥ë¤«¤éϳ¤ì½Ð¤¹Èù¼å¤ÊÅż§ÇȤòµ­Ï¿¤·¤Æ²òÀϤ¹¤ë¤³¤È¤Çµ¡Ì©¾ðÊó¤òÆÀ¤Æ¤¤¤Þ¤·¤¿¡£¤·¤«¤·¶áǯ¤ÏÅŵ¤¿®¹æ¤ÎÂå¤ï¤ê¤Ë¸÷¥Õ¥¡¥¤¥Ð¡¼¤Ë¤è¤ëÄÌ¿®¤¬¹Ô¤ï¤ì¤ë¤Ê¤É¡¢ÅðÄ°¤Ëµá¤á¤é¤ì¤ëµ»½Ñ¤Ï¹âÅÙ²½¤¬¿Ê¤ó¤Ç¤¤¤Þ¤¹¡£¤·¤«¤·¡¢¤«¤Ä¤Æ¥¢¥á¥ê¥«¹ñ²È°ÂÁ´Êݾã¶É¤ÎÁêÃÌÌò¤ò̳¤á¤¿¥¹¥Á¥å¥ï¡¼¥È¡¦¥Ù¥¤¥«¡¼»á¤¬¡Öº£¤ÎÀ¤¤ÎÃæ¤Ç¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤«¤é´°Á´¤ËÀÚ¤êÎ¥¤µ¤ì¤Æ¤¤¤ë¤Î¤Ï¡¢¥»¥­¥å¥ê¥Æ¥£¤òÈó¾ï¤Ëµ¤¤Ë¤¹¤ë¤´¤¯°ìÉô¤Î¼Ô¤À¤±¤Ç¤¹¡×¤È¸ì¤ë¤è¤¦¤Ë¡¢¤Û¤È¤ó¤ÉÁ´¤Æ¤Î¾ðÊ󤬥¤¥ó¥¿¡¼¥Í¥Ã¥È¤ò·Ðͳ¤¹¤ë»þÂå¤Ë¤ª¤¤¤Æ¡¢³¤Ä쥱¡¼¥Ö¥ë¤ÎÄÌ¿®¤òÅðÄ°¤¹¤ë¤³¤È¤ÏÈó¾ï¤Ë½ÅÍפʥ¹¥Ñ¥¤³èÆ°¤ÎÍפȤâ¸À¤¨¤Þ¤¹¡£

¥¢¥á¥ê¥«³¤·³¤Ë½ê°¤¹¤ë¥í¥µ¥ó¥¼¥ë¥¹µé¸¶»ÒÎÏÀø¿å´Ï¡Ö¥¢¥Ê¥Ý¥ê¥¹¡×¤Ï¡¢¤½¤ó¤ÊǤ̳¤Ë¤¢¤¿¤ëÀø¿å´Ï¤Î1¤Ä¤Ç¤¹¡£2013ǯ¤ËȯÀ¸¤·¤¿¥¨¥É¥ï¡¼¥É¡¦¥¹¥Î¡¼¥Ç¥ó»á¤Ë¤è¤ë¥ê¡¼¥¯¾ðÊ󤫤é¤Ï¡¢³¤·³¤¬¡Öcomputer network exploitations(¥³¥ó¥Ô¥å¡¼¥¿¡¼¡¦¥Í¥Ã¥È¥ï¡¼¥¯ºñ¼è¡×¤È¸Æ¤Ð¤ì¤ëºîÀï¤ò¼Â¹Ô¤·¤Æ¤ª¤ê¡¢¤½¤³¤Ç¿¤¯³èÍѤµ¤ì¤¿¤Î¤¬¥¢¥Ê¥Ý¥ê¥¹¤Î¤è¤¦¤ÊÀø¿å´Ï¤ò³èÍѤ·¤¿ÅðİǤ̳¤À¤Ã¤¿¤³¤È¤¬ÌÀ¤é¤«¤Ë¤Ê¤Ã¤Æ¤¤¤Þ¤¹¡£

¥¸¥ã¡¼¥Ê¥ê¥¹¥È¤Î¥¦¥£¥ê¥¢¥à¡¦¥¢¡¼¥­¥ó»á¤È¥¢¥À¥à¡¦¥ï¥¤¥ó¥¹¥¿¥¤¥ó»á¤Ï¡Ö¥¢¥Ê¥Ý¥ê¥¹¤È¤½¤Î»ÐËå´Ï¤Ï¡¢¸½Âå¤Î¥µ¥¤¥Ð¡¼ÀïÁè¤Ë¤ª¤±¤ëÀøÆþÉôÂâ¤Ç¤¹¡£Å¨¤ÎËɸæÃÏÂÓ¤ËÆþ¤ê¹þ¤ß¡¢ÄÌ¿®¤Î˸³²¤ä³ÉÍð¡¢Áàºî¤ä¥Ï¥Ã¥­¥ó¥°¤ò¹Ô¤¤¤Þ¤¹¡£¤³¤ì¤é¤Î³èÆ°¤Ï´ÏÂâ¤Ë¼è¤êÉÕ¤±¤é¤ì¤¿¥¢¥ó¥Æ¥Ê¤ò»È¤Ã¤Æ¼Â»Ü¤µ¤ì¤Æ¤¤¤Þ¤¹¡£¤½¤Î¤¤¤¯¤Ä¤«¤ÏÆÃÊ̤ÊǤ̳¤Ë±þ¤¸¤Æºî¤é¤ì¤Æ¤¤¤ë¤â¤Î¤Ç¡¢Á´¤Æ¤¬¾­Íè¤ÎÀïÁè¤Ë¤ª¤¤¤Æ½ÅÍפÊÌòÌܤò²Ì¤¿¤¹¥Ö¥é¥Ã¥¯¥Ü¥Ã¥¯¥¹¤Ç¤¹¡×¤È¥Ö¥í¥°¤Ç¼¨¤·¤Æ¤¤¤Þ¤¹¡£



By Maggie Stephens

¤È¤Ï¤¤¤¨¡¢³¤Ä쥱¡¼¥Ö¥ë¤Î˵¼õ¤¬ºÇ¿·¤Î¥¹¥Ñ¥¤³èÆ°¤È¤¤¤¦¤ï¤±¤Ç¤Ï¤¢¤ê¤Þ¤»¤ó¡£¶áǯ¤ÎÀø¿å´Ï¤Ï¡¢¤µ¤é¤Ë¹âÅ٤ʥ¹¥Ñ¥¤³èÆ°¤òÅý³ç¤¹¤ë¡ÖÊìÁ¥¡×¤È¤·¤Æ¤ÎÌò³ä¤¬Í¿¤¨¤é¤ì¤ë¤è¤¦¤Ë¤Ê¤ë¤È¤ß¤é¤ì¤Æ¤¤¤Þ¤¹¡£

Àø¿å´Ï¤¬¿È¤ò±£¤¹¤³¤È¤¬ÆÀ°Õ¤À¤È¤Ï¸À¤Ã¤Æ¤â¡¢¤½¤ÎÂ礭¤ÊÁ¥ÂΤò±£¤¹¤³¤È¤Ë¤Ï¤ª¤Î¤º¤«¤é¸Â³¦¤¬Â¸ºß¤·¤Þ¤¹¡£¤½¤³¤Ç¡¢Àø¿å´Ï¤«¤é¼Í½Ð¤µ¤ì¡¢Å¨ÃϤαü¿¼¤¯¤Þ¤ÇÆþ¤ê¹þ¤ó¤ÇĵÊó³èÆ°¤Ë¤¢¤¿¤ë¤ÎUAV(̵¿Í¹Ò¶õµ¡)¤äUUV(̵¿Í¿åÃæ¹ÒÁöÂÎ)¤È¤¤¤Ã¤¿¡¢¤¤¤ï¤æ¤ë¡Ö¥É¥í¡¼¥ó¡×¤ËÎह¤ë¤â¤Î¤è¤ëĵÊó³èÆ°¤¬ÃíÌܤµ¤ì¤Æ¤¤¤Þ¤¹¡£³¤·³¤Ç³¤ÃæÀïÁèÉôÌç¤òΨ¤¤¤Æ¤¤¤ë¥Á¥ã¡¼¥ë¥º¡¦¥ê¥Á¥ã¡¼¥É³¤·³¾¯¾­¤Ï¡Ö²æ¡¹¤ÏÁ¥Çõ¤Î¥«¥Ð¡¼¤¹¤ëÈϰϤò¹­¤²¤¿¤¤¤È¹Í¤¨¤Æ¤ª¤ê¡¢UAV¤ÈUUV¤ÎξÊý¤ËÁ´ÎϤǼè¤êÁȤó¤Ç¤¤¤Þ¤¹¡×¤È¸ì¤Ã¤Æ¤¤¤Þ¤¹¡£



̵¿Íµ¡¤¬Å¨ÃϤαü¿¼¤¯¤Þ¤ÇÆþ¤ê¹þ¤ß¡¢¾ðÊó¼ý½¸¤È¹¶·â¤ò¹Ô¤¦¤È¤¤¤¦¤³¤È¤Ë¤Ê¤ì¤Ð¡¢¤³¤ì¤Ï¤â¤¦¥¢¥Õ¥¬¥Ë¥¹¥¿¥ó¤Ê¤É¤ÇÊÆ·³¤¬Å¸³«¤·¤Æ¤¤¤ëºîÀï¹ÔÆ°¤È¤Þ¤Ã¤¿¤¯Æ±¤¸¤³¤È¤¬³¤¤ÎÃæ¤Ç¤â·«¤ê¹­¤²¤é¤ì¤ë¤È¤¤¤¦¤³¤È¤Ë¤Ê¤ê¤Þ¤¹¡£¤·¤«¤·¡¢¤³¤¦¤·¤¿Àø¿å´ÏÉôÂâ¤Î¸ºß¤Ë¤Ä¤¤¤Æ¡¢ÀìÌç²È¤Î¿¤¯¤Ï¡Ö¼ª¤Ë¤·¤¿¤³¤È¤¬¤Ê¤¤¡×¤ÈÈÝÄꤷ¤Æ¤¤¤Þ¤¹¡£

¤·¤«¤·¡¢¥Ù¥¤¥«¡¼»á¤Ï¡Ö¥¹¥Ñ¥¤ºîÀï¤È¤¤¤¦¤â¤Î¤Ï¡¢¾ï¤Ë¼¡¤Î°ì¼ê¤¬Â¸ºß¤·¤Æ¤¤¤ë¤â¤Î¤Ç¤¹¡£¤½¤Î¤¿¤á¡¢¤³¤Î¤è¤¦¤Ê¹½ÁÛ¤¬¼Â¸½¤·¤Æ¤¤¤ë²ÄǽÀ­¤Ï½½Ê¬¤Ë¸ºß¤·¤Þ¤¹¡×¤È¸ì¤Ã¤Æ¤¤¤Þ¤¹¡£¥í¥·¥¢¤Ë²Ã¤¨¡¢Ãæ¹ñ¤«¤é¤Î°µÎϤâ¹â¤Þ¤Ã¤Æ¤¤¤ë¤È¤ß¤é¤ì¤ë¾õ¶·¤Ç¡¢¥¢¥á¥ê¥«¤¬¤³¤Î¤è¤¦¤Ê¼êË¡¤òÅêÆþ¤·¤Æ¤¤¤ë¤È¤¤¤¦¤³¤È¤Ï¡¢½½Ê¬¤Ë¹Í¤¨ÆÀ¤ë¤³¤È¤È¸À¤¨¤ë¤è¤¦¤Ç¤¹¡£