{"provider_name":"Hatena Blog","width":"100%","blog_url":"https://www.catapultsuplex.com/","author_name":"kazuya_nakamura","title":"\u66f8\u8a55\uff5c\u30cf\u30c3\u30ab\u30fc\u305f\u3061\u306f\u3044\u304b\u306b\u3057\u3066\u300c\u98fc\u3044\u306a\u3089\u3055\u308c\u305f\u300d\u306e\u304b\uff5c\"Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers\" by Emily Crose","published":"2025-08-14 01:13:15","image_url":"https://m.media-amazon.com/images/I/61WkGSpwPAL._SL500_.jpg","provider_url":"https://hatena.blog","height":"190","author_url":"https://blog.hatena.ne.jp/kazuya_nakamura/","url":"https://www.catapultsuplex.com/entry/hack-to-the-future","type":"rich","description":"\u4eca\u56de\u7d39\u4ecb\u3059\u308b\u306e\u306f\u30cf\u30c3\u30ab\u30fc\u306e\u6b74\u53f2\u3092\u7d10\u89e3\u304d\u3001\u602a\u3057\u3052\u306a\u500b\u4eba\u306e\u30db\u30d3\u30a4\u30b9\u30c8\u304b\u3089\u653f\u5e9c\u3084\u4f01\u696d\u306b\u3068\u3063\u3066\u3082\u91cd\u8981\u306a\u5730\u4f4d\u3092\u7372\u5f97\u3057\u305f\u306e\u304b\u3092\u89e3\u8aac\u3059\u308b\u30a8\u30df\u30ea\u30fc\u30fb\u30af\u30ed\u30fc\u30ba\u8457 \"Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers\"\u3067\u3059\u3002\u8457\u8005\u306e\u30af\u30ed\u30fc\u30ba\u306f\u3001\u81ea\u8eab\u3082NSA\u30677\u5e74\u9593\u52e4\u52d9\u3057\u305f\u7d4c\u9a13\u3092\u6301\u3064\u30d9\u30c6\u30e9\u30f3\u306e\u30cf\u30c3\u30ab\u30fc\u3067\u3042\u308a\u3001\"Hacking History\"\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u5171\u540c\u8a2d\u7acb\u8005\u3067\u3082\u3042\u308a\u307e\u3059\u3002 \u3053\u3053\u3067\u91cd\u8981\u306a\u30ad\u30fc\u30ef\u30fc\u30c9\u306f\u526f\u984c\u306b\u3082\u3042\u308b\"Domesticate\"\u3001\u3064\u307e\u308a\u30cf\u30c3\u30ab\u30fc\u3092\u3069\u306e\u3088\u3046\u306b\u624b\u306a\u305a\u3051\u3066\u304d\u305f\u304b\u3068\u3044\u3046\u70b9\u3067\u3057\u3087\u2026","blog_title":"\u30ab\u30bf\u30d1\u30eb\u30c8\u30b9\u30fc\u30d7\u30ec\u30c3\u30af\u30b9","version":"1.0","categories":[],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.catapultsuplex.com%2Fentry%2Fhack-to-the-future\" title=\"\u66f8\u8a55\uff5c\u30cf\u30c3\u30ab\u30fc\u305f\u3061\u306f\u3044\u304b\u306b\u3057\u3066\u300c\u98fc\u3044\u306a\u3089\u3055\u308c\u305f\u300d\u306e\u304b\uff5c&quot;Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers&quot; by Emily Crose - \u30ab\u30bf\u30d1\u30eb\u30c8\u30b9\u30fc\u30d7\u30ec\u30c3\u30af\u30b9\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}