首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络时代五眼情报联盟的调整:战略引导、机制改进与国际影响
引用本文:黄紫斐,刘江韵.网络时代五眼情报联盟的调整:战略引导、机制改进与国际影响[J].情报杂志,2020,39(4):20-29.
作者姓名:黄紫斐  刘江韵
作者单位:上海外国语大学国际关系与公共事务学院 上海 200083;上海外国语大学国际关系与公共事务学院 上海 200083
摘    要:目的/意义]五眼情报联盟积极向网络空间调整,将对全球网络空间的安全及治理产生深远影响。对此进行分析,有助于认识“五眼”发展趋势,为我国国家情报和网络安全相关研究提供参考。方法/过程]通过梳理历史线索、事实材料和学术文献,从网络战略、情报机制和国际影响3个方面,分析“五眼”在网络时代的调整适应过程。结果/结论]五国出台网络空间安全战略,确立了主要的共同威胁挑战和应对措施,引导“五眼”聚焦于网络空间。同时,五国通过机制改进举措,大幅度扩展在网络空间的情报行动能力,特别是加强网络威胁情报领域的紧密合作,以巩固“五眼”在网络空间的情报优势。这在国际关系方面带来了网络备战升级、网络空间治理分化、信息产业风险等影响。

关 键 词:五眼情报联盟  情报合作  情报改革  网络安全  通信情报  网络威胁情报

The Five Eyes Adapting to Cyber space:Strategies,Mechanisms and Influences
Huang Zifei,Liu Jiangyun.The Five Eyes Adapting to Cyber space:Strategies,Mechanisms and Influences[J].Journal of Information,2020,39(4):20-29.
Authors:Huang Zifei  Liu Jiangyun
Institution:(Shanghai International Studies University,School of International Relations and Public Affairs,Shanghai 200083)
Abstract:Purpose/Significance]:The Five Eyes actively adapt to cyberspace.It makes significant influences to global cyberspace security and governance.Through analyzing this process,we can cognize the future development of the Five Eyes,and provide insights for further studies on national intelligence and cyber security.Method/Process]The article tries to describe how the Five Eyes adapt to cyberspace,according to historical materials and scholarly literatures.Result/Conclusion]Studies show that the five countries regard malicious cyber activities conducted by state actors and non-state actors as common threats,and propose countermeasures thereof,to lead the Five Eyes focus on cyberspace.Meanwhile,they improve cyberspace intelligence abilities and enhance cyber threat intelligence cooperation by further reforms of intelligence mechanisms,to implement the Five Eyes'global intelligence advantage.As a result,there comes new risks of cyber warfare escalation,cyberspace governance divides and IT industry competitions.
Keywords:five eyes intelligence network  intelligence cooperation  intelligence reforms  cyber security  communication intelligence  cyber threat intelligence
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号