Buradasınız

SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI

Journal Name:

Publication Year:

Author Name
Abstract (Original Language): 
Günümüzde, gelişen teknolojiye bağlı olarak ortaya çıkan küreselleşmenin etkisiyle, devletlerin geleneksel yapılarında ve birbirleriyle olan her türlü ilişkilerinde değişiklikler meydana gelmektedir. Bu değişimler barış zamanında ekonomi, kültürel iletişim, eğitim, ticaret gibi pek çok konuda olmakla beraber, devletlerin ya da aktörlerin, çatışma veya savaş durumlarında da meydana gelmektedir. 21. yüzyılda, gelişen teknoloji ve bilişim sistemleri, geleneksel savaş yöntemlerini de değiştirmiş, ortaya, siber dünyada gerçekleşen yeni savaş ya da saldırı kavramları çıkmıştır. Ağlar üzerinden bilgi edinme, saldırı, zarar verme, yok etme, kontrol etme gibi yöntemlerle hedeflere savaş açılmış ya da saldırıda bulunulmuştur. Teknolojinin oldukça yaygın, ulaşılması kolay ve ucuz olması sebepleriyle bu tip saldırılar sadece devletler tarafından değil, bizzat şahıslar tarafından yapılabilmekte; bu da bu suçların tespitini ve cezalandırılmasını zorlaştırmaktadır. Bu tip saldırıların, devlet desteği ile düşman bir aktör ya da devlete karşı işlenmesi durumu ise güncel olarak son derece ciddi ve hukuki bir zeminle çözülmesi gereken bir sorundur. Geleneksel savaşlarda olduğu gibi saldıranın aşikâr olmaması, çok farklı bölgelerden kaynaklanması, tespitinin ve kanıtlanmasının zor olması, bu suçların tanımını ve yaptırımının sağlanmasını zorlaştırmaktadır. 2007 yılında Estonya ve 2008 yılında Gürcistan’a karşı yapılan servis saldırılarının reddi (DoS), bu yeni savaş şeklinin operasyonel olduğunu ve ayrıca uluslararası hukukun siber savaş ile daha iyi bir anlayışın geliştirilmesi ihtiyacını kuvvetli bir şekilde göstermektedir. Mevcut uluslararası hukuk kurallarında geçen; saldırı, silah ve toprak gibi kavramlar siber saldırı ve savaşları açıklamaya yetmemektedir. Coğrafyacıların stratejik gerçeklikleri, gelecekteki siber çatışmalar bağlamındaki kararların, soyut bir şekilde tam bir izolasyon ve uluslararası kamu hukukunun hükümlerinin yorumlanmayacağını ve uygulanmayacağını dikte etmekte, siberuzayı da içeren çözümlenmemiş Jus ad bellum ve Jus in bello konuları birçok önemli kaygıya yol açmaktadır.1 Jus ad bellum kavramı genel olarak savaş yapma hakkıdır ve devletlerin güç kullanıp kullanamayacağı meselesini ortaya koyan kavramdır ve jus in bello’nun uygulanması çatışmanın başlamasına bağlıdır.2 Jus ad bellum’un kaynağı çok daha yenidir ve B.M. Şartı’nın m. 2/4’ünde zikredilen kuvvet kullanma yasağına, söz konusu yasağın istisnası olan m.51’de ifade edilen meşru müdafaa hakkına ve B.M. Şartı’nın yedinci bölümüne dayanmaktadır.3 Belirli eylemlerin silahlı saldırı mı veya güç kullanımı mı oluşturduğuna, nihai olarak karar veren mağdur devlet değil, asıl saldırgan devlet olacaktır; diğer bir deyişle, mağdur devletin hukuki yorumu, bu gibi eylemleri saygı duyulan hukuki sistemler ve askeri düzenlemeleri değerlendiren otoriteler, herhangi bir karşıt hukuk danışmanı yönlendirecektir. 4 Çalışmamızda; siber savaş, siber uzay, siber terörizm tanımı yapılacak, siber savaş operasyonlarının öncesi ve uluslararası hukuk bağlamında gelişimine değinilecek, siber savaş operasyon silahlarından söz edilecek, saldırılarda sivil-asker ayrımının önemine ve egemenlik söylemine değinilerek, barışı korumak adına siber savaşa başvurulmasından ve siber savaş ile casusluk ilişkisinden söz edilecektir.
FULL TEXT (PDF): 
1177-1227

REFERENCES

References: 

KİTAPLAR
AKMAN, Toygar, Sibernetik: Dünü, Bugünü, Yarını, Kaknüs Yay., İstanbul,
2003.
ALFORD, Lione1.D., Cyber Warfare: A New Doctrine and Taxonomy,
CrossTalk: The Journal of Defense Software Engineering, Vol. 14 No. 4, Nisan
2001, http://www.ldalford.com/technical_writing.htm, (e.t.02.02.2012).
AMATO, Ivan, Lying With Pixels, Seeing is No Longer believing. Tech.
Rev., Temmuz 2000, http://www.technologyrevie w.com/Infotech/12115/?a=f,
(e.t.29.01.2012).
ARKIN, William M., When Seeing and Hearing Isn 't Believing, Wash.
Post.Com, 1 Şubat 1999, http://www.washingtonp ost.com/wp-srv/national/
dotmil/arkin020199.htm, (e.t.29.01.2012).
A Strategic Approach to Protecting SCADA and Process Control
Systems, IBM Global Services, Temmuz 2007, s.1–13, http://www935.
ibm.com/services/us/iss/pdf/scada_ whitepaper.pdf, (e.t.28.01.2012).
BEAL, Vangie, Webopedia, The Difference Between a Virus, Worm and
Trojan Horse, 06.29.2010, Son güncelleme: 03.29.2011, http://www.
webopedia.com/DidYouKnow/Internet/2004/virus.asp, (e.t.29.01.2012)
BERG, Paul, Air Force Cyber Command: What It Will Do and Why We
Need It, Air & Space Power Journal, 20 Şubat 2007, http://www.airpower.
au.af.mil/apjinternational/apj-s/2007/1tri07/bergeng.html, (e.t.28.01.2012).
BILLO, Charles, Welton Chang, An Analysis of the Means and
Motivations of Selected Nations States, Institute For Security Technology
Studies At Dartmouth College, Kasım 2004. http://www.ists.dartmouth.edu/
docs/execsum.pdf, (e.t.29.01.2012).
BRADLEY, Graham, Washingtonpost.com:Bush Orders Guidelines for
Cyber-Warfare, Washington Post, 7 Şubat 2003, http://www.washingtonpost.
com/ac2/wpdyn/A381102003Feb6?language=printer, (e.t.28.01.2012).
BRADLEY, Tony, Pandora’s Box, Antionline Newsletter #7, Nisan/Mayıs
2003, s.15–16, http://www.Antionline.com/news le tter/aonewsletter7.pdf,
(e.t.28.01.2012).
BRENNER, Susan W., Leo L. Clarke, Conscription and Cyber Conflict:
Legal Issues, 3rd International Conference on Cyber Conflict, CCD COE
Publications, Estonia, 2011.
BYRES, Eric, The Myths and facts behind Cyber Security Risks for
Industrial Control Systems, British Columbia Insti tute Of Technology A
Polytechnic Institution, http://www.nealsystems.com/downloads/Myths%2 0and%2
0Facts%20for%20 Control%20System%20Cyber-security.pdf, (e.t.30.01.2012).
CAHILL, Thomas P., Konstantin Rozinav ve Christopher Mule, Cyber
Warfare Peacekeeping, Proceedings of the 2003 IEEE Workshop on
Information Assurance United States Academy, ISBN 0-7803-7808-3/03, 2003.
CASSESE, Antonio, International Law, Oxford University Press:2001.
Siber Savaş Hukuku ve Uygulanma Sorunsalı 1219
CHEN, Thomas M., “Stuxnet, The Real Start of Cyber Warfare?”, IEEE
Network, Kasım/Aralık 2010, s.1–3.
CLAUSEWITZ, Carl von, On War, (editör ve çeviren: Michael Howard and
Peter Paret), Princeton University Press, New Jersey, 1989.
COATES, J.F., What’s next? Foreseeable terrorist acts, The Futurist
36 (5), 2002, s.23–26.
COLEMAN, Kevin, Department of Cyber Defense, An organization who's
time has come!, Technolytics, Kasım 2007. http://www.technolytics.com/
Dept of_Cyber_Defense.pdf, (e.t.10.02.2012).
COLEMAN, Kevin, Inside DPRK's Unit 121, Defencetech.org., 24 Aralık
2007, http://defensetech.org/2007/12 /24/inside-dprks-unit-121/, (e.t.
29.01.2012).
COLEMAN, Kevin, Russia's Cyber Forces, Defencetech.org., 27 Mayıs
2008, http://defensetech.org/2008/05/2 7/russias-cyber-forces/, (e.t.29.01.2012).
COLEMAN, Kevin, The Cyber Arms Race Has Begun, 28 Ocak 2008,
s.1–4, http://www.csoonline.com/article/216991/c oleman-the-cyber-armsrace-
has-begun, (e.t. 28.01.2012).
Commentary on the Additional Protocols of 8 June 1977 to the Geneva
Conventions of 12 August 1949, Yves Sandoz (editör), 1987.
Cyberwar The Threat From The Internet, The Economist, 3–9 Temmuz
2010.
Çalışma Grubu 4, E-Devlet Uygulamalarında Güvenlik ve Güvenilirlik
Yaklaşımları, Türkiye Bilişim Derneği.
DAKOFF, Howard S., Note, The Clipper Chip Proposal: Deciphering
the Unfounded Fears That Are Wrongfully Derailing Its Implementation, J.
Marshall L. Rev., Vol. 29, Num:2, 1996, s.475–479.
DAVIS, Brown, A Proposal for an tnternational Convention To Regulate
the Use of tnformation Systems in Armed Conflict, Volume 47, Number 1,
Winter 2006, s.201–202, http://www.harvardilj.org/wp-content/uploads/
2010/10/HILJ_47-1_Brown.pdf, (e.t.06.02.2012).
DAVIS, Joshua, Hackers take Down the Most Wired Country in Europe,
Wired Magazine: Issue 15.09,
http://www.wired.com/politics/security/magazine/1509/ff_estonia?currentPa
ge=all, (e.t.28.01.2012)
DECI, E.L., R.M. Ryan, Intrinsic Motivation and Self-determination in
Human Behavior, Plenum Press, New York, 1985, http://www.google.com.tr/
books?hl=tr&lr=&id=p96WmnER4QC&oi=fnd&pg=PA1&dq=Dec i+E.T, +Ryan,
+R. M+1985+Intrinsic+Motivation+and+Selfdetermination+in+Human+Behavior
&ots=3cGTx2vc 23&sig=eG5tcI60CDo0grCtd w9xai0Qw38&redir_esc=y#v=
onepage&q&f=false, (e.t.29.01.2012).
DEIBERT, Ron, Rafal Rohuzinski, Tracking GhostNET: Investigating a
Cyber Espionage Network, Information Warfare Monitor, JR02–2009,
http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-
Cyber-Espionage-Network, (e.t.28.01.2012).
DENNING, Dorothy E., Activism, Hacktivism, and Cyberterrorism:
The Internet as a Tool for Influencing Foreign Policy, 1999,
http://www.iwar.org.uk/cyberterror/resources/denning.htm, (e.t. 28.01.2012).
DENNING, Dorothy E., Hacktivism: an Emerging Threat to
Diplomacy, American Foreign Service Association, 25.06.2007, www.a
fsa.org/fsj/sept00/Denning.cfm, (e.t.10.02.2012).
Şeyda Türkay (İÜHFM C. LXXI, S. 1, s. 1220 1177-1228, 2013)
DENNING, Dorothy E., Is Cyber Terror Next?, Social Science Research
Council, http://essays.ssrc.org/sept11/ essays/denn ing.htm, (e.t.02.02.2012).
DODGE, Martin, Rob Kitchin, Mapping Cyberspace, Routledge, London,
2001.
DÖRMANN, Knut, Computer Network Attack and International
Humanitarian Law, International Committee of the Red Cross, 19 Mayıs 2001,
http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm,
(e.t.06.02.2012).
DROGIN, Bob, Russians seem to be Hacking ınto Pentagon Sensitive
information taken-but nothing top secret, Los Angeles Times, 7 Ekim 1999,
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/1999/10/07/MN5855
8.DTL, (e.t. 28.01.2012).
ENGİNSOY, Umit, Burak Ege Bekdil, Turkey Raises Emphasis On
Cyberspace Defense, Defense News, 15 Ağustos 2011, http://www.
defensenews.com/story.php?i=7388376&c=FEA&s=SPE, (e.t. 03.01.2012).
ERKİNER, Hakkı Hakan, Devletin Haksız Fiilinden Kaynaklanan Uluslararası
Sorumluluğu, 12 Levha Yay., , 1. Baskı, İstanbul, 2010.
GRAHAM, Bradley, For a description of hesitancy to use CNA during
Operation “Allied Force”, “Military Grappling with Rules for Cyber
Warfare: Questions Prevented Use on Yugoslavia”, Washington Post, 8 Kasım
1999, http://www.washingtonpost.com/wp-srv/WPcap/1999-11/08/
011r-110899-idx.html, (e.t. 05.01.2012).
GRAHAM, Bradley, Military Grappling With Guidelines For Cyber
Warfare; Questions Prevented Use on Yugoslavia, The Washington Post, 8
Kasım 1999, sec. A.
GREENBERG, Andy, America’s Hackable Backbone, 08.22.07, http://
www.forbes.com/2007/08/22/scada-hackers-infrastruc ture-tech-securitycx_
ag_0822hack.html, (e.t. 28.01.2012)
GREENBERG, Lawrence t., et al., Information Warfare and
International Law 12, National Defense University Press, , 1998.
http://www.dodccrp.org/files/Greenberg_Law.pdf, (e.t.06.02.2012).
GRYC, Wojciech, Cyber Warfare, Peace Magazine, 2009.
GUANG, Pan, The SCO's Success in Security Architecture
(highlighting confidence building, cooperation against destabilizing transborder
elements, and the maintenance of regional security and stability as general
successes of the SCO), http://epress.anu.edu.au/ sdsc/architecture/ mobile_
devices/ch04.html, (e.t.07.02.2012).
HIGGINS, Kelly Jackson, Permanent Denial-of-Service Attack
Sabotages Hardware, Dark Reading, 19 Mayıs 2008, http://archive.cert.unistuttgart.
de/isn/2008/05/msg00102.html, (e.t.29.01.2012).
HILDRETH, Steven A., Cyberfare Warfare 11, Congressional Research
Service Report For Congress No. RL30735, 19 Haziran 2001.
http://www.fas.org/irp/crs/RL30735.pdf, (e.t.28.01.2012).
HIRSHLEIFER, J., The bioeconomic causes of war, Managerial and
Decision Economics 19 (7/8), 1998, s.457–466, http://time.dufe.edu.cn/
spti/article/hirshleifer/hirshleifer170.pdf, (e.t.29.01.2012).
JANCZEWSKI, Lech J., Andrew M. Colarik, Managerial Guide for
Handling Cyber-Terrorism and Information Warfare, Idea Group Publishing,
The U.S.A, 2005.
Siber Savaş Hukuku ve Uygulanma Sorunsalı 1221
JENSEN, Eric Talbot, Cyber Warfare and Precautions Against the
Effects of Attacks, Texas Law Review, Vol. 88:1533.
JONES, Andrew, Cyber Terrorism: Fact or Fiction, Computer Fraud
and Security, 2005.
JOYNER, C. Christopher, Catherine Lotdonte, Information Warfare as
International Coercion: Elements of a Legal Framework, 12 EUR. J. INT'L L.
825–841, 2001. http://www.ejil.Org/pdfs/12/5/1552.pdf (e.t.29.01.2012).
KABAY, M. E., Industrial Espionage, Part 8: China and Titan Rain,
Network World, 10 Kasım 2005, http://www.networkworld.com/newsletters/
2005/1107sec2.html?page=2), (e.t.28.01.2012).
KANUCK, Sean, Sovereign Discourse on Cyber Conflict Under
Intemational Law, Texas Law Review Association, Symposium: Law at the
Intersection of National Security, Privacy and Technology: II. Cybersecurity and
Network Operations, Vol. 88:1571, 2010.
KELSEY, Jeffrey T.G., Hacking into International Humanitarian Law:
The Principles of Disdinction and Neutrality in the Age of Cyber Warfare,
Michigan Law Review, Vol. 106 No:7, 2008.
KNIERIM, Tammy M., Lou Anne DeMattei ve Sebastian M. Convertino,
Flying and Fighting in Cyberspace, Maxwell Paper No.40Air War College,
Temmuz 2007. http://aupress.au.af.mil/digital/pdf/paper/mp_0040_conve
rtino_demattei_knierim_flying_fighting_cyberspace.pdf, (e.t.30.01.2012).
LANGNER, Ralph, Stuxnet: Dissecting a Cyberwarfare Weapon, Focus,
Mayıs/Haziran 2011.
LASKER, John, U.S. Military's Elite Hacker Crew, WIRED, 18 Nisan
2005, http://www.wired.com/politics/security/news/ 2005/04/67223, (e.t.
28.01.2012).
LAKHANI, K.R., R.G. Wolf, In: J. Feller, B. Fitzgerald, S. Hissam, K. R.
Lakhani (Editörler), Why Hackers Do What They Do: Understanding
Motivation and Effort in Free/Open Source Software Projects, MIT Press,
2005, http://ocwmit.edu/courses/sloan-school-of-management/15-352-managinginno...
emerging-trends-spring-2005/readings/lakhaniwolf.pdf, (e.t.29.01.2012).
LAPPIN, Yaakov, Reuters Admits to More Image Manipulation,
YNETNEWS.COM, 7 Ağustos 2006, http://www.ynetn ews.com/articles/0,
7340, L-3287774, 00.html, (e.t.29.01.2012).
LEWIS, James A., Computer Espionage, Titan Rain and China, Center
for Strategic and International Studies - Technology and Public Policy Program,
Aralık 2005, s.1–2, http://csis.org/files/media/csis/pubs/051214_china
_titan_rain. pdf, (e.t. 28.01.2012).
LEYDEN, John, ‘Electronic Jihad’ fails to materialise, 26 Ağustos
2004, http://www.theregister.co.uk/2004/0 8/26/cyberfu d/, (e.t.02.02.2012).
LIANG, Qiao, Wang Xiangsui, Unrestricted Warfare, Beijing: PLA
Literature and Arts Publishing House, Şubat 1999, http://cryptome.org/
cuw.htm, (e.t.02.02.2012).
LIBICKI, Martin C., Cyberdeterrence and Cyberwar, Rand Corporation,
The U.S.A, 2009.
LIBICKI, Martin, What is Information Warfare, Strategic Forum 28,
Institute for National Strategic, Studies, Mayıs 1995, http://www.dtic.mil/cgibin/
GetTRDoc?AD=ADA394692, (e.t.02.02.2012).
Şeyda Türkay (İÜHFM C. LXXI, S. 1, s. 1222 1177-1228, 2013)
LINDENBERG, S., Intrinsic motivation in a new light, Kyklos 54 (2/3),
2001, s.317–342, http://www.ppsw.rug.nl/~lindenb/documents/articles/
2001_LindenbergIntrinsic_motivation_in_a_new_light.pdf, (e.t.29.01.2012).
MILLS, Elinor, Google wants ability to 'combine' your user data,
CNET News, 25 Ocak 2012, http://www.zdnetasia.com /google-wants-abilityto-
combine-your-user-data-62303592.htm, (e.t. 28.01.2012).
MILLS, Elinor, Report: Turkish hackers breached U.S. Army servers,
29 Mayıs 2009, http://news.cnet.com/8301-1009_3-10252375-83.html,
(e.t.28.01.2012).
ÖZKIŞLALI, Gizem, Küreselleşme, İnternet ve Terörizmin Değişen
Yüzü; Siber Terörizm, Yüksek Lisans Tezi, Ankara, 2008.
PARKS, Raymond C., David P. Duggan, Principles of Cyber-warfare,
Proceedings of the 2001 IEEE Workshop on Information Assurance and
Security United States Military Academy, West Point, NY, 5–6 Haziran 2001,
http://www.periwork.com/peri_db/wr_db/2004_May_11_11_30_41/DOCS%20
WEBREVIEW/P rinciplesCYBER%20WARFARE.pdf, (e.t.02.02.2012).
POWER, Richard, Dario Forte, “Ten years in the wilderness—a
retrospective Part 2: Cyber Security = National Security”, Computer
Fraud&Security: War&Peace in Cyberspace, Şubat 2006.
RHO, Jennifer J., Blackbeards of the Twenty-First Century: Holding
Cybercriminals Liable under the Alien Tort Statute, 7 Cffl. J. INT'L L.695,
2006–2007.
ROSENZWEIG, Paul, National Security Threats in Cyberspace 2,
2009, http://www.americanbar.org/content/dam/ab a/migrated/natsecurity/
threats_in_cyberspace.authcheckdam.pdf, (e.t.07.02.2012).
SCHAAP, Arie J., Cyber Warfare Operations: Development and Use
Under International Law, Air Force Law Review, Vol. 64, 2009.
SCHMITT, Michael N., Wired warfare: Computer network attack and
jus in bello, RICR Juin IRRC Haziran 2002 Vol. 84 No. 846.
http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf,
(e.t.08.08.2011).
SCHWARTZ, Peter, Warrior in the Age of Intelligent Machines, Wired
Magazine, Nisan 1995, http://www.wired.com/wire d/archive/3.04/pentagon_
pr.html, (e.t.02.02.2012).
SCOTT, Roger D., Territorially Intrusive Intelligence Collection and
International Law, 46 A.F. L. Rev. 217, 1999.
SHARMA, Amit, “Cyber Wars: A Paradigm Shift from Means to Ends”,
Strategic Analysis, 34:1, 2010, http://dx.doi.org/10.1080/ 09700160903354450,
(e.t.20.01.2012).
SHAY, Shaul, Netwars and Networks, Mark Last ve Abraham Kandel
(editör), Fighting Terror in Cyberspace içinde (33), World Scientific Publishing,
The U.S.A, 2005.
SINROD, Eric J., William P. Reilly, Cyber-Crimes: A Practical Approach
To The Application Of Federal Computer Crime Laws, Santa Clara
University School of Law, Volume 16, Num.2, Mayıs 2000, s.12–16,
http://www.sinrodlaw.com/CyberCrime.pdf, (e.t.29.01.2012).
SPIEKER, Heike, Civilian Immunity, in Crımes of War 84, 84 (Roy
Gutman & David Rieff eds. 1999), s.84, http://www.crimesofwar.org/a-zguide/
civilian-immunity/, (e.t.14.02.2012).
Siber Savaş Hukuku ve Uygulanma Sorunsalı 1223
STRELSOV, A.A., International information security: description and
legal aspects, icts and international security. http://www.peacepalacelibrary.nl/
ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.10.02.2012).
STRELTSOV, A.A., International Information Security: Description
and Legal Aspects, DISARMAMENT F., 2007 (Issue 3). http://www.peace
palacelibrary.nl/ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.08.02.2012).
Sun Tzu, The Art of War, çeviren: Samuel B. Griffith, Oxford University
Press, Oxford, 1963.
SWARTZ, Jon, Crooks slither into Net's shady nooks and crannies;
Crime explodes as legions of strong-arm thugs, sneaky thieves log on, USA
Today, 21 Ekim 2004, www.usatoday.com/printedition/money/200410
21/cybercrimecover.art. htm, (e.t.10.02.2012).
TÜTÜNCÜ, Ayşe Nur, İnsancıl hukuka Giriş, Beta Yay., İstanbul, 2006.
TRAYNOR, Ian, Russia accused of unleashing cyberwar to disable
Estonia, The Guardian, http://www.guardian.co.uk/wo rl d/2007/may/17/
topstories3.russia, (e.t. 28.01.2012)
TREMLETT, Giles, Turkish arrests intensify global war between hacker
activists and police, The Guardian, 13 Haziran 2011,
http://www.guardian.co.uk/technology/2011/jun/13/ turkish-arrests-globalwar-
hackers-police, (e.t. 03.01.2012).
Türk Asya Stratejik Araştırmalar Merkezi, Siber Terörizm Raporu,
Stratejik Rapor No: 2 Aralık 2004.
Türkçe Sözlük, Türk Dil Kurumu, 9. Baskı, Ankara, 1998.
UZUN, Elif, Milletlerarası Hukuka Aykırı Eylemlerinden Dolayı Devletin
Sorumluluğu, Beta Yay., 1. Basım, İstanbul, 2007.
VERTON, Dan, Lack of Incident Reporting Slows Cybercrime Fight,
31 Ekim 2002, http://computerworld.com/securityto pics/security/cybercrime/
story/0, 10801, 75532, 00.html, (e.t.10.02.2012).
WALKER, George K., Information Warfare and Neutrality, Vanderbilt
Journal of Transnational Law, 2000, http://findarticl es.com/p/articles/
mi_hb3577/is_5_33/ai_n28809531/, (e.t.06.02.2012).
WALKER, Jeffrey K., The Demise of the Nation-State, The Dawn of
New Paradigm Warfare, and a Future for the Profession of Arms, 51 A.F. L.
REV. 323, 2001, s.337–38, http://www.afjag.af.mil/shared/media/docum
ent/AFD-081204-028.pdf, (e.t.06.03.2012).
WATTS, Sean, Combatant Status and Computer Network Attack, 3
Ağustos 2009, Virginia Journal of International Law, Vol. 50, No. 2, s. 392–393,
2010, http://ssrn.com/abstract=1460680, (e.t.08.02.2012).
WEARDEN, Graeme, Cyberterrorists poised to attack', warns Labour
peer, 28 Nisan 2005, http://www.silicon.com/tec h nology/security/2005/
04/28/cyberterrorists-poised-to-attack-warns-labour-peer-391 29961/,
(e.t.02.02.2012).
WLINGFIELD, Thomas C., The Law Of Information Conflict: National
Security Law In Cyberspace 17, Aegis Research Corp., 2000.
WILLIAMS, P., Organized crime and cybercrime: synergies, trends,
and responses, 13 Ağustos 2001, Office of International Information Programs,
U.S. Department of State, http://usinfo.state.gov, (e.t.05.01.2012).
Şeyda Türkay (İÜHFM C. LXXI, S. 1, s. 1224 1177-1228, 2013)
WILSON, Clay, Computer Attack and Cyberterrorism: Vulnerabilities
and Policy Issues for Congress, CRS Report for Congress, Order Code
RL32114, 17 Ekim 2003. http://fpc.state.gov/documents/organization/451
84.pdf, (e.t.02.02.2012).
WOLTAG, Johann-Christoph, Cyber Warfare, Max Planck Encyclopedia
of Public International Law, Rüdiger Wolfrum (editör), Oxford University Press,
2010.
ELEKTRONİK KAYNAKLAR
Air Force Policy Directive 10–7, 6 Eylül 2006, http://www.
survivalebooks.com/free%20manuals/2006%20US %20Air%20Force%20
INFORMATION%20OPERATIONS%2027p.pdf, (28.01.2012).
A Proposal for an International Convention on Cyber Crime and
Terrorism, Ağustos 2000, http://www.iwar.org.uk /law/resources/
cybercrime/stanford/cisac-draft.htm, (e.t.02.02.2012).
Birleşmiş Milletler Antlaşması (BM Şartı), http://www.belgenet.com/
arsiv/sozlesme/bmsarti-01.html, (e.t.30.01.2012).
CERT Coordination Center, http://www.cert.org/tech_tips/denial_of_
service.html, (e.t.29.01.2012).
Convention on Cybercrime, Council of Europe, http://conventions.
coe.int/ Treaty/en/Treaties/html/185.htm, (e.t.30.01.2 012).
Convention on Prohibitions or Restrictions on tbe Use of Certain
Conventional Weapons Which May Be Deemed to Be Excessively Injurious
or to Have Indiscriminate Effects, 10 Ekim 1980, S, TREATY Doc. No. 103–
25 (1994). 1342 U.N.T, S. 137, http://www.icrc.org/eng/resources/
documents/publication/p0811.htm, (e.t.08.02.2012).
Convention Conceming the Rights and Duties of Neutral Powers in Naval
War, madde 10, 18 Ekim 1907, http://www.icr c.org/ihl.nsf/FULL/240,
(e.t.11.02.2012).
Convention (III) relative to the Treatment of Prisoners of War.
Geneva, 12 Ağustost 1949, madde 4 (A) (2), http://www.icrc.org/ihl.nsf/
FULL/375, (e.t.07.02.2012).
Convention (IV) relative to the Protection of Civilian Persons in
Time of War, Geneva, 12 August 1949, madde 28, http://www.icrc.org/
ihl.nsf/full/380, (e.t.07.02.2012).
Convention (V) respecting the Rights and Duties of Neutral Powers
and Persons in Case of War on Land, The Hague, 18 Ekim 1907,
http://www.icrc.org/ihl.nsf/full/200?opendocument, (e.t.06.02.2012).
Council of Europe, Convention on Cybercrime, opened for signature:11
Kasım 2001, Europ. T.S. No. 185, http://conve ntions.coe.int/treaty/en/
treaties/html/185.htm, (e.t.07.02.2012).
Creation of a Global Culture of Cybersecurity and the Protection of
Critical Information Infrastructures, United Nations General Assembly,
A/RES/58/199, Fifty-eighth session, 30 January 2004, http://www.itu.int/
ITU-D/cyb/cybersecurit y/docs/UN_resolution_58_199.pdf, (e.t.12.02.2012).
Department of Defense, Dictionary of Military and Associated Terms
Joint Publication 1–02, (JP 3–13), http://www.dtic.mil/doctrine/new_pubs/
jp1_02.pdf, (e.t. 28.01.2012).
Department. of the Air Force, Policy Directive 51–4, Compliance with the
law of armed conflıct, 1993, .http://www.icrc.org/ihlnat.nsf/6fa4d35
Siber Savaş Hukuku ve Uygulanma Sorunsalı 1225
e5e3025394125673e00508143/cfaff63edde42523c1256a8e00342cfb!OpenDoc
ument, (e.t.06.02.2012).
Final Report to the Prosecutor by the Committee Established to
Review the NATO Bombing Campaign Against the Federal Republic of
Yugoslavia, 8 Haziran 2000, 39 I L M 1257., http://www.icty.org/sid/10052,
(e.t.06.02.2012).
Geneva Convention Relative To The Treatment Of Prisoners Of War
of 12 Ağustos 1949 (Geneva Convention III), http://protection.unsudanig.org/
data/legal/Third%20Geneva%20Convention%20 (POW), %2019 49.pdf,
(e.t.02.02.2012).
Hacker Attacks in US Linked to Chinese Military: Researchers, 12
Aralık 2005, http://seclists.org/isn/2005/ Dec/0059.html, (e.t.29.01.2012).
http://daccess-ddsny.
un.org/doc/UNDOC/GEN/N03/506/52/PDF/N0350652.pdf?OpenElement,
(e.t.31.01.2021).
http://www.digitalbroadcasting.com/storefronts/pvimage.html,
(e.t.29.01.2012).
http://www.fbi.gov/publications/leb/2002/june2002/june02leb.htm,
(e.t.10.02.2012).
http://www.itu.int/net/about/basic-texts/constitution/chaptervi.aspx,
(e.t.31.01.2012).
http://meeting.afrinic.net/afrinic-
11/slides/aaf/Estonia_cyber_attacks_2007_latest.pdf, (e.t. 28.01.2012).
http://www.un.org/en/ecosoc/cybersecurity/maurer-cyber-norm-dp-
2011-11.pdf, (e.t.31.01.2012).
ICRC, International Humanitarian Law - Treaties & Documents,
http://www.icrc.org/ihl.nsf/WebART/1952 00034?Ope nDocument,
(e.t.29.01.2012).
Information Assurance – the Achilles’ Heel of Joint Vision 2010?, 2
Mart 1999, http://www.airpower.au.af. mil/airchr onicles/cc/ashley.html,
(e.t.02.02.2012).
INTERPOL, Secure Global Police Communications Services,
https://www.interpol.int/Public/ICPO/corefunct ions/secu recom.asp,
(e.t.06.02.2012).
Introduction to Computer Viruses, S0PH0S.COM, 26 Mayıs 1998,
http://www.sophos.com/en-us/press-office/pressreleases/
1998/05/va_virusesintro.aspx, (e.t.29.01.2012).
Joint Chiefs Of Staff, Joint Publication 1-02, Department Of Dhf.
Directive Of Military &Assoc'D Terms, 12 Nisan 2001, s.190, http://www.
bits.de/NRANEU/others/jp-doctrine/jp1_02 (01).pdf, (e.t.29.01.2012).
Joint Doctrine for Information Operations, Joint Pub. 3–13, 9 Ekim
1998, s.1–136, http://www.c4i.org/jp3_13.pdf (e.t.29.01.2012).
Joint Publication 3–13, Information Operations, 13 Şubat 2006,
http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf, (e.t.30.01.2012).
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion,
1996 I.C.J. 226, 257, July 8, http://ww w.icj-cij.org/docket/index.php?
p1=3&p2=4&k=e1&p3=4&case=95, (e.t.14.02.2012).
M/Cyclopedia of New Media, Digital Manipulation, http://www.
fourandsix.com/photo-tampering-history/, (e.t.29.01.2012).
Şeyda Türkay (İÜHFM C. LXXI, S. 1, s. 1226 1177-1228, 2013)
Official Records Of The Diplomatic Conference on the Reaffirmation
and Development of International Humanitarian Law Applicable in Armed
Conflicts, Volume 1, Federal Political Department, (Geneva, 1974 -1977), Bern,
1978, http://www.loc.gov/rr/frd/Military_Law/pdf/RC-records_Vol-1.pdf,
(e.t.11.02.2012).
On Bush's Watch, U.S. Suffered Its "Electronic Pearl Harbor,
3.18.2010, Güncelleme: 5.25.2011, http://www.huffingt onpost.com/2009/
11/10/on-bushs-watch-us-suffere_n_352204.html, (e.t.30.01.2012).
Photo Alteration, http://www.espionageinfo.com/Pa-Po/Photo-
Alteration.html, (e.t.10.02.2012).
Photo Tampering throughout History, http://www.fourandsix.com/
photo-tampering-history/, (e.t.29.01.2012).
Proceedings of European Conference on Information Warfare and
Security 2002, 2003, http://books.google. com.tr/b ooks?hl=tr&id=EvsP
IeM4w5AC&q=cyber#v=onepage&q=conferences&f=false, (e.t.02.02.2012).
Protocol Additional to the Geneva Conventions of 12 August 1949,
and relating to the Protection of Victims of International Armed Conflicts
(Protocol I), 8 Haziran 1977, http://www.icrc.org/ihl.nsf/full/470?op
endocument, (e.t.07.02.2012).
Reducing On-line Credit Card Fraud, Web Developers Journal,
http://www.webdevelopersjournal.com/article s/card_fra ud.html, (e.t.10.02.2012).
Report of the International Law Commission on the work of its fiftythird
session, DOCUMENT A/56/10, madde 1, (23 Nisan–1 Haziran ve 2
Temmuz–10 Ağustos 2001), http://untreaty.un.org/ilc/reports/2001/200
1report.htm, (e.t.13.02.2012).
SearchSecurity.com, Definitions, IP Spoofing, http://searchsecurity.
techtarget.com/definition/IP-spoofing, (e.t.29.01.2012).
SearchSecurity.com, Trojan Horse, http://searchsecurity.
techtarget.com/definition/Trojan-horse, (e.t.29.01.2012)
Security for the Next Generation, The National Security of the United
Kingdom, Güncelleme:2009, Cabinet Office, Haziran 2009, http://www.officialdocuments.
gov.uk/document/cm75/7590/7590.pdf, (e.t.02.02.2012).
Statute of the International Law Commission, 1947, http://untreaty.
un.org/ilc/texts/instruments/english/statute /statute_ e.pdf, (e.t.07.02.2012).
Techterms.com, The Tech Terms Computer Dictionary, Malware,
http://www.techterms.com/definition/malwar e, (e.t.29.01.2012).
The Guardian, 15 Ağustos 2003, http://www.guardian.co.uk/news/
2003/aug/15/informer, (e.t.02.02.2012).
The Secretary-General, Developments in the Field of Information and
Telecommunications in the Context of International Security, delivered to
the General Assembly, U, N, Doc. A/62/98, 2 Temmuz 2007,
http://www.disarmament. un.org/library.../a-62-98.pdf, (e.t.08.02.2012).
The White House, Remarks By The President On Securing Our
Nation’s Cyber Infrastructure, Office of the Press Secretary, 29 Mayıs 2009,
http://www.whitehouse.gov/the-press-office/remarks-president-securing-ou...
cyberinf rastructure, (e.t.29.01.2012).
Turkey conducts cyber terror drill, Hurriyet Daily News, 27 Ocak
2011, http://www.hurriyetdailynews.com/n.P?n=turke y-conducts-cyberterror-
drill-2011-01-27, (e.t. 03.01.2012).
Siber Savaş Hukuku ve Uygulanma Sorunsalı 1227
U.S. Department Of Defence, Information Operations Roadmap 1, 30
Ekim 2003, s.1–72, http://www.gwu.edu/~nsarc hiv/NSAEBB/NSAEBB177/
info_ops_roadmap.pdf, (e.t.28.01.2012).
U.S. Department of Defense, Directive IR. 3600.1, Information
Operations, 14 Ağustos 2006, http://www.Fas.org/irp/do ddir/dod/info_ops.pdf,
(e.t.29.01.2012).
White House. Cyberspace Policy Review, 2009, http://www.
whitehouse.gov/assets/documents/Cyberspace _Pol icy _ Review_final.pdf,
(e.t.08.02.2012).
12 Ağustos 1949 Tarihli Cenevre Sözleşmelerine Ek Uluslararası Silahlı
Çatışmaların Kurbanlarının Korunmasına İlişkin (1) No.lu Protokol, 8
Haziran 1977, http://www.kizilay.org.tr/hukuk/sayf a_yazdir.php?t=-Ulusal.
ve.Uluslararasi.Sozl esmeler-CENEVRE.EK.1.PROTOKOL, (e.t.06.02.2012).

Thank you for copying data from http://www.arastirmax.com