BibTex RIS Kaynak Göster

Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses

Yıl 2014, Cilt: 1 Sayı: 2, 1 - 36, 16.10.2014
https://doi.org/10.17336/igusbd.32621

Öz

This article focuses on the disparate cyber threats against the North Atlantic Treaty Organization (NATO), its members, and selected NATO responses to such perils. Prior to doing so, the article shares various definitions and designations of cyber dangers. Next, the piece provides an in-depth discussion of the nature and types of cyber threats. Subsequently, a discussion of the types of individuals, organizations, and nations pursuing offensive cyber measures takes place.

Kaynakça

  • Albanesius, C. (2011, July 21). Anonymous: We hacked NATO. PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2388823,00.asp
  • Alexander, D. (2010, July). The radicalization of extremists/terrorists - why it affects you. Security Magazine. Retrieved from http://digital.bnpmedia.com/publication/?i=41296&p=42
  • Amoroso, E. (2010). Cyber Attacks: Protecting National Infrastructure. Oxford, UK: Butterworth-Heinemann.
  • Anderson, R. (n.d.). Countering state-sponsored cyber attacks: Who should lead? Information as power. Army War College. Retrieved from http://www.csl.army.mil/usacsl/Publications/infoaspowervol2/IAP2%20-%20Section%20Two%20%28Anderson%29.pdf
  • (2011, June 21). Anonymous target Spanish national police website after hacker arrests. www.huffingtonpost.com Retrieved from http://www.huffingtonpost.com/2011/06/12/anonymous-spain-police-website-hacker-arrests_n_875527.html
  • Apps, P. (2012, Feb. 3). Cyber security specialist: disagreements over hacking risk could mean digital ‘cold war’. Retrieved from http://www.huffingtonpost.com/2012/02/03/cyber-security-risk_n_1252889.html
  • Ashmore, W. (2009, May 21). Impact of alleged Russian cyber attacks. US Army Command and General Staff College. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA504991
  • Avlon, J. (2009, Oct. 20). The growing cyberthreat. Forbes. Retrieved from http://www.forbes.com/2009/10/20/digital-warfare-cyber-security-opinions-contributors-john-p-avlon.html
  • Ball, J. (2011, Sept. 2). Wikileaks publishes full cache of unreduced cables. The Guardian. Retrieved from http://www.guardian.co.uk/media/2011/sep/02/wikileaks-publishes-cache-unredacted-cables
  • Baocun, W. and Fei, L. (1995, June 13/20). Information Warfare. Chinese Academy of Military Science. Retrieved from http://www.fas.org/irp/world/china/docs/iw_wang.htm
  • Bohn, K. and Todd, B. (2008, Nov. 6). Obama, McCain campaigns’ hacked for policy data. CNN. Retrieved from http://www.cnn.com/2008/TECH/11/06/campaign.computers.hacked/
  • Botnets: The new threat landscape white paper. (n.d.). Cisco. Retrieved fromhttp://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns171/ns441/networking_solutions_whitepaper0900aecd8072a537.html
  • Bradbury, D. (2009, Feb. 4). The fog of cyberwar. The Guardian. Retrieved from http://www.guardian.co.uk/technology/2009/feb/05/ kyrgyzstan-cyberattack-internet-access
  • British Muslim computer geek, son of diplomat, revealed as al Qaeda’s top cyber terrorist. (2008, Jan. 16). Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-508543/British-Muslim-geek-son-diplomat-revealed-al-Qaedas-cyber-terrorist.html
  • Bucci, S. (2009, June 12). The confluence of cyber crime and terrorism. Lecture #1123, Heritage Foundation. Retrieved from http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism
  • Carr, J. (2011, Aug. 12). What is cyberwar? Slate.com. Retrieved from http://www.slate.com/articles/technology/future_tense/2011/08/what_is_cyberwar.html
  • Charvart, P. Cyber terrorism: A new dimension in battlespace. (n.d.). NATO Cooperative Cyber Defence, Centre of Excellence. Retrieved from http://www.ccdcoe.org/publications/virtualbattlefield/05_CHARVAT_Cyber%20Terrorism.pdf
  • China gone cyber-wild – cyber attacks by China. (2011, Sept. 23). Retrieved from http://uscyberlabs.com/blog/2011/09/23/china-cyber-wild-cyber-attacks-china/
  • Chinese cyber-attacks: Hello, Unit 61398. (2013, Feb. 19). The Economist. Retrieved from http://www.economist.com/blogs/analects/ 2013/02/chinese-cyber-attacks
  • Choinere, P. (2012, Mar. 11). Lieberman warns of a cyber 9/11. Retrieved from http://www.theday.com/article/20120311/OP04/303119943
  • Clapper, J. (2012, Jan. 31). Unclassified statement for the record on the worldwide threat assessment of the US intelligence community for the Senate Select Intelligence Committee. Senate Select Intelligence Committee, at 3. Retrieved from http://www.intelligence.senate.gov/120131/clapper.pdf
  • Context Information Security. (2012, Mar.). Crouching tiger, hidden dragon, stolen data. Retrieved from http://www.contextis.co.uk/
  • Conway, M. (n.d.). Hackers as terrorists? Why it does not compute. Computer Fraud & Security. Retrieved from http://www.arifyildirim.com/ilt510/maura.conway.pdf
  • Cyber attacks against US government growing at rapid pace (n.d.). Secure128.com. Retrieved from http://www.secure128.com/cyber-attacks-against-us-government-growing-at-rapid-pace.aspx
  • (2011, June 10). Cyber defence: Next steps. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/SIDFF200A97 BAB17CB7/natolive/news_75358.htm?selectedLocale=en
  • Cyber Security: a Part 3 Definition. (n.d.). Palo Alto Networks. Retrieved from http://www.paloaltonetworks.com/community/learning-center/what-is-cyber-security.html
  • Daly, J. (2007, June 5). LTTE: Technologically innovative rebels. ISN Eth Zurich. Retrieved from http://isn.ch/isn/Digital-Library/Articles/ Detail/?ots783=4888caa0-b3db-1461-98b9-e20e7b9c13d4&lng=en&id =53217
  • (n.d.). Defending against cyber attacks. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/ 75747.htm
  • (2011). Defending the Networks: The NATO Policy on Cyber Defence. NATO Public Diplomacy Division. Retrieved from www.nato.int/nato.../20111004_110914-policy-cyberdefence.pdf
  • Definition of cyberwarfare (n.d.). Retrieved from http://dictionary.reference.com/browse/cyberwarfare
  • Denning, D. (2009). Terror’s web: How the Internet is transforming terrorism. Handbook on Internet Crime (Y. Jewkes and M. Yar, eds.), Willan Publishing. Retrieved from http://faculty.nps.edu/dedennin/publications/Denning-TerrorsWeb.pdf
  • Duell, M. (2012, Feb. 3). 'What about McDonald's in the Pentagon?: Extraordinary top secret call between FBI and Scotland Yard 'tapped' by Anonymous. Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-2096035/Secret-FBI-Scotland-Yard-tapped-Anonymous--trying-catch.html
  • Estonia fines man for ‘cyber war.’ (2008, Jan. 25). BBC news, Retrieved from http://news.bbc.co.uk/2/hi/technology/7208511.stm
  • Evans. M. et al. (2012, Apr. 12). Two arrested after hackers attacked anti-terror hotline. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/9201621/Two-arrested-after-hackers-attacked-anti-terror-hotline.html
  • Examining the cyber threat to critical infrastructure and the American economy. (2011, Mar. 16). Subcommittee on cyber security, infrastructure protection, and security technologies, Committee on homeland security, U.S. House of Representatives. Retrieved from http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg72221/html/CHRG-112hhrg72221.htm
  • Executive order - - Improving critical infrastructure cybersecurity. (2013, Feb. 12). Office of the Press Office, White House. Retrieved from http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
  • Federal Bureau of Investigation. (2012, May 11). Economic espionage: how to spot a possible insider threat. Retrieved from http://www.fbi.gov/news/stories/2012/may/insider_051112/insider_051112
  • (2011, Oct.). Foreign spies stealing U.S. economic secrets in cyberspace. Office of the National Counterintelligence Executive. Retrieved fromhttp://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
  • Fox News. (2011, Aug. 3). Massive global cyberattack targeting U.S., U.N. discovered; experts blame China. Retrieved from http://www.foxnews.com/scitech/2011/08/03/massive-global-cyberattack-targeting-us-un-discovered-experts-blame-china/
  • Germany, W. (2012, Feb. 29). What is ‘Anonymous’ and How Does it Operate? Radio Free Europe/Radio Liberty. Retrieved from http://www.rferl.org/content/explainer_what_is_anonymous_and_how_does_it_operate/24500381.html
  • Glenny, M. (2010, May 24). The countdown to cybergeddon. FT.com. Retrieved from http://www.ft.com/cms/s/0/47b390e4-66ca-11df-aeb1-00144feab49a.html#axzz2T6t8My9N
  • Goldman, D. (2011, July 28). China v. U.S.: The cyber cold war is raging. Retrieved from http://money.cnn.com/2011/07/28/technology /government_hackers/index.htm
  • Gorman, S. et al. (2009, Apr. 21). Computer spies breach fighter-jet project. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB124027491029837401.html.html
  • Graham, D. (2010). Cyber threats and the laws of war. 4 Journal of national security law and policy 84. Retrieved from http://jnslp.com/wp-content/uploads/2010/08/07_Graham.pdf
  • Grauman, B. (2012, Feb.). Cyber-security: the vexed question of global rules. Retrieved from http://www.securitydefenceagenda.org/Contentnavigation/Library/Libraryoverview/tabid/1299/articleType/ArticleView/articleId/3064/SDA-cybersecurity-report.aspx
  • Hale, J. (2010, May 23). NATO official: cyber attack systems proliferating. Defense News. Retrieved from http://www.defensenews.com/article/20100323/DEFSECT04/3230304/NATO-Official-Cyber-Attack-Systems-Proliferating
  • Healey, J. & Van Bochoven. (n.d.). NATO cyber capabilities: yesterday, today, and tomorrow. Atlantic Council. Retrieved from http://www.acus.org/publication/natos-cyber-capabilities-yesterday-today-and-tomorrow
  • Hellman, Z. (2012, Feb. 22). Hackers or terrorists. Jpost.com.Retrieved from http://m.jpost.com/Headlines/Article.aspx?id=86258350&cat=2
  • (2012, Mar. 11). Hidden Chinese Hackers Crouching Dragon, Stolen Data. Cyber War Zone Retrieved from http://www.cyberwarzone.com/cyberwarfare/hidden-chinese-hackers-crouching-dragon-stolen-data?page=4
  • Hoffman, S. (2011, Aug. 1). Anonymous hackers target FBI cybersecurty [sic] contractor Mantech. www.crn.com. Retrieved from http://www.crn.com/news/security/231003077/anonymous-hackers-target-fbi-cybersecurty-contractor-mantech.htm
  • Hoffman, S. (2011, Sept. 2). 10 biggest cyber attacks in August. www.crn.com Retrieved from http://www.crn.com/slide-shows/security/ 231600608/10-biggest-cyber-attacks-in-august.htm?pgno=4
  • Hopkins, N. (2012, Mar. 10). China suspected of facebook attack on Nato’ s supreme allied commander. The Guardian. Retrieved from http://www.guardian.co.uk/world/2012/mar/11/china-spies-facebook-attack-nato
  • Hosenball, M. and Zengerle, P. (2013, Mar. 12). Cyber attacks leading threat against U.S.: Spy agencies. Reuters.com. Retrieved from http://www.reuters.com/article/2013/03/12/us-usa-threats-idUSBRE92B0LS20130312
  • Insider security threats: State CIOs take action now. (2007). National Association of Chief Information Officers of States. Retrieved from http://www.nascio.org/publications/documents/NASCIO-InsiderSecurityThreats.pdf
  • Jajodia, S. et al. (1999, Apr.). Surviving information warfare attacks. Mitre. Retrieved from http://www.mitre.org/work/best_papers/ 99/jajodia_surviving/jajodia_surviving.pdf
  • Jones, T. (2012, Apr. 2). Anonymous again targets Czech ruling party. Czechposition.com. Retrieved from http://www.ceskapozice.cz/en/news/politics-policy/anonymous-again-targets-czech-ruling-party
  • Kempf, A. (2011, Mar. 24). Considerations for NATO strategy on collective cyber defense. Center for Strategic & International Studies. Retrieved from http://csis.org/blog/considerations-nato-strategy-collective-cyber-defense
  • Kirk, J. (2007, May 17). Estonia recovers from massive denial-of-service attack. Infoworld. Retrieved from http://www.infoworld.com/d/security-central/estonia-recovers-massive-denial-service-attack-188 (hereinafter Kirk 2007)
  • Kirk, J. (2008, July 4). Lithuania: Attacks focused on hosting company. PC World. Retrieved from http://www.pcworld.com/article/147960/ article.html (hereinafter Kirk 2008)
  • Kovacs, E. (2012, Apr. 3). Site of NATO Croatia hacked and defaced by TeaMp0ison. Softpedia. Retrieved from http://news.softpedia.com/news/ Site-of-NATO-Croatia-Hacked-and-Defaced-by-TeaMp0isoN-262429.shtml
  • Kretsinger, Sony hacker Recrusion, jailed for year. (2013, Apr. 13). BBC News. Retrieved from http://www.bbc.co.uk/news/technology-22214506
  • Krupnick, S. (2011, Aug. 16). Freedom fighters or vandals? No consensus on Anonymous. Contra Costa Times. Retrieved from http://www.mercurynews.com/top-stories/ci_18686764
  • Lewis, J. (2002, Dec.). Assessing the risks of cyber terrorism, cyber war, and other cyber threats. Center for Strategic and International Studies at 9.Retrieved from http://www.steptoe.com/publications/231a.pdf
  • Lewis, J. (2012, Mar. 10). How spies used to steal Nato chief’s details, Daily Telegraph. Retrieved from http://www.telegraph.co.uk/technology/ 9136029/How-spies-used-Facebook-to-steal-Nato-chiefs-details.html
  • (2010, Nov. 20). Lisbon summit declaration. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/official_texts_68828.htm
  • Lithuanian tax office website hit by cyber attack. (2008, July 21). Reuters. Retrieved from http://www.reuters.com/article/2008/07/21/ lithuania-web-attacks-idUSMAR14153920080721
  • Mackey, R., (2009, Feb. 9). Are ‘cyber-militias’ attacking Kyrgyzstan? NY Times. Retrieved from http://thelede.blogs.nytimes.com/2009/02/05/ are-cyber-militias-attacking-kyrgyzstan/
  • Markoff, J. (2008, Aug. 13). Before the gunfire, cyberattacks. Retrieved from http://www.nytimes.com/2008/08/13/technology/13cyber.html
  • Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Backgrounder. Retrieved from http://www.cfr.org/ technology-and-foreign-policy/confronting-cyber-threat/p15577
  • McAfee. (2009). In the Crossfire: Critical Infrastructure in the Age of Cyber War. Retrieved from http://www.mcafee.com/us/resources/reports /rp-in-crossfire-critical-infrastructure-cyber-war.pdf
  • McCusker, R. (2006). Transnational organised cyber crime: distinguishing threat from reality. Crime, Law and Social Change, 46 (4-5), pp. 257-273. Retrieved from http://tees.openrepository.com/tees/ bitstream/10149/115450/2/115450.pdf
  • McGee, J. (2011, July 8). NATO and Cyber Defense: A Brief Overview and Recent Events. Center for Strategic & International Studies. Retrieved from http://csis.org/blog/nato-and-cyber-defense-brief-overview-and-recent-events
  • Moore, D. et al. (2003, July/Aug.). Inside the slammer worm. IEEE Security & Privacy, at 33. Retrieved from http://cseweb.ucsd.edu/~savage/papers/IEEESP03.pdf
  • Mueller III, R. (2012, Mar. 1). Speech at RSA cyber security conference. FBI press release. Retrieved fromhttp://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies
  • Murphy, D. (2011, June 19). Three reasons to fear Lulzsec: Sites, skills, and slant. PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2387219,00.asp
  • Nakashima, E. (2011, July 21). Anonymous claimed it hacked NATO web site, tells FBI we’re back. Washington Post. Retrieved from http://articles.washingtonpost.com/2011-07-21/world/35266809_1_ anonymous-claims-richard-stiennon-hackers-group
  • Nakashima, E. (2012, Mar. 7). China testing cyber-attack capabilities, report says, Washington Post. Retrieved from http://www.washingtonpost .com/world/national-security/china-testing-cyber-attack-capabilities-report-says/2012/03/07/gIQAcJwDyR_story. html
  • (2012, May 10). NATO and cyber defence. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/SID-D356AF5A-950BFC5F/natolive/topics_78170.htm
  • (2011, Nov. 17). NATO: getting serious about cyber security. Defense Management. Retrieved from http://www.defencemanagement.com/feature_story.asp?id=18166
  • (2012, March 13). NATO rapid reaction team to fight cyber attack. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/news_85161.htm
  • (2011, Dec. 5). NATO under cyber attack, 50+ sites hacked by pak cyber combat squad. Retrieved from http://www.voiceofgreyhat.com/2011/12/nato-under-cyber-attack-50-sites-hacked.html
  • Newton, S. (2001, Nov.). Can cyberterrorists actually kill people? SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers /warfare/cyberterrorists-kill-people_820
  • Olsen, K. (2009, July 9). Massive cyber attack knocked out government websites starting on July 4th. Retrieved fromhttp://www.huffingtonpost .com/2009/07/07/massive-cyber-attack-knoc_n_227483.html
  • Ottis, R. & P. Lorents. (n.d.). Cyberspace: definition and implications. Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia. Retrieved from www.ccdcoe.org/articles/.../Ottis_Lorents_CyberspaceDefinition.pdf
  • Paganini, P. (n.d.). The rise of cyber weapons and relative impact of cyber space. Infosec Institute Resources. Retrieved from http://resources.infosecinstitute.com/the-rise-of-cyber-weapons-and-relative-impact-on-cyberspace/
  • Pellerin, C. (2011, Sept. 14). Panetta: Regional defense, cyber highlight AUSMIN talks. American Forces Press Service. Retrieved from http://www.defense.gov/News/NewsArticle.aspx?ID=65337
  • PKK attacks Turkey’s finance ministry website. (2011, Nov. 9)Today’s Zaman. Retrieved from http://www.todayszaman.com/news-262152--pkk-attacks-turkeys-finance-ministry-website.html
  • (2011, June 23). Probable data breach from a NATO-related site. NATO. Retrieved from http://www.nato.int/cps/en/natolive/news_ 75729.htm
  • Puran, R. (2003, Feb. 28). Beyond conventional terrorism … the cyber assault. SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/threats/conventional-terrorismthe-cyber-assault_931
  • Rafter, M. (2010). New security risks from USB flash drives. Norton. Retrieved from http://us.norton.com/yoursecurityresource/detail.jsp? aid=usbdrives
  • Rhodin, S. (2008, July 1). Hackers tag Lithuanian website with Soviet symbols. NY Times. Retrieved from http://www.nytimes.com/2008/07/01/world/europe/01baltic.html?_r=1&scp=3&sq=lithuania&st=nyt&oref=slogin
  • Riley, M. & J. Walcott. (2011, Dec. 12). China-based hacking of 760 companies shows cyber cold war. Businessweek. Retrieved from http://www.businessweek.com/news/2011-12-22/china-based-hacking-of-760-companies-shows-cyber-cold-war.html
  • Rogin, J. (2010, Jan. 22). The top 10 Chinese cyber attacks that we know of. Foreign Policy. Retrieved from http://thecable.foreignpolicy.com/ posts/2010/01/22/the_top_10_chinese_cyber_attacks_that_we_know_of
  • Rollins, J. and Wilson, C. (2007, Jan. 22). Terrorist capabilities for cyberattack: Overview and policy issues. Congressional research service. Retrieved from http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/ docs/Cyber-024.pdf
  • Savage, C. (2013, Feb. 28). Soldiers admits providing files to WikiLeaks. NY Times. Retrieved from http://www.nytimes.com/2013/03/01/us/bradley-manning-admits-giving-trove-of-military-data-to-wikileaks.html?pagewanted=all&_r=0
  • Schwartz, M. (2011, June 16). LulzSec claims credit for CIA site takedown. Information Week. Retrieved from http://www.informationweek.com/security/cybercrime/lulzsec-claims-credit-for-cia-site-taked/230800019
  • Schwartz, M. (2011, June 27). LulzSec hackers retire: time to rethink risk. Information Week. http://www.informationweek.com/security /attacks/lulzsec-hackers-retire-time-to-rethink-r/231000472
  • Silicon Republic. (2012, Jan. 9). Anonymous attack reveals US, UK and Nato email passwords. Retrieved from http://www.siliconrepublic.com/ strategy/item/25247-anonymous-attack-reveals-us
  • Snow, G. (2011, Sept. 11). Statement before the House Financial Services Committee. Subcommittee on Financial Institutions and Consumer Credit. Retrieved from http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector
  • Snow, G. (2011, Apr. 12). Statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, at 3. Retrieved from http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism
  • Social engineering using a USB drive. (n.d.). Carnegie Mellon University. Retrieved from http://www.cmu.edu/iso/aware/be-aware/ usb.html
  • Spiegel Online International. (n.d.). WikiLeaks Diplomatic Cables. Retrieved from http://www.spiegel.de/international/topic/ wikileaks_diplomatic_cables/
  • Sterner, E. (2012, Apr.). The paradox of cyber protest. Marshall Policy Institute Outlook. Retrieved from http://www.marshall.org/pdf/materials/1087.pdf
  • Tafoya, W. (2011, Nov.). Cyber Terror. FBI Law Enforcement Bulletin. Retrieved from http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror
  • Taliharm, A.M. (2010, Fall). Cyberterrorism: In theory or in practice? Defence Against Terrorism Review. 3 (2). pp. 59-71. Retrieved from http://www.coedat.nato.int/publications/datr6/DATR_Fall2010.pdf
  • Thachuk, K. (2008, Spring). Countering terrorist support structures. Defence Against Terrorism Review. 1 (1), pp. 13-28. Retrieved from http://www.coedat.nato.int/publications/datr/02.Kimberley%20THACHUK.pdf
  • Three admit inciting terror acts. (2007, July 4). BBC News. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/6268934.stm
  • Tikk, E. et al. (2008, Nov.). Cyber attacks against Georgia: Legal lessons identified. Cooperative Cyber Defence Centre of Excellence. Retrieved from http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
  • Tikk, E. et al. (2010). International cyber incidents legal considerations. Cooperative Cyber Defence Centre of Excellence. Retrieved from http://www.ccdcoe.org/publications/books/legalconsiderations.pdf
  • Traynor, I. (2007, May 16). Russia accused of unleashing cyberwar to disable Estonia. The Guardian. Retrieved from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
  • UN Office on Drugs and Crime. (2012, Sept.). The use of the Internet for terrorism purposes. Retrieved from http://www.unodc.org/documents/ frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
  • U.S. Army Training and Doctrine Command, Cyber Operations and Cyber Terrorism Handbook. No. 1.02, P.II-1 and II-3. (2005, Aug. 15). Retrieved from http://www.au.af.mil/au/awc/awcgate/army/guidterr/ sup2.pdf
  • Wagensall, P. (2011, Feb. 16). Cyberwarfare called the fifth domain of battle by pentagon. Technewsdaily.com. Retrieved from http://www.technewsdaily.com/6620-cyberwarfare-called-fifth-domain-of-battle-by-pentagon.html
  • War in the fifth domain. (2010, July 1). The Economist. Retrieved from http://www.economist.com/node/16478792
  • War of the worms: cyber-attacks pose increasing danger to Israeli society (n.d.). Wharton. Retrieved from http://kw.wharton.upenn.edu/israel/war-of-the-worms-cyber-attacks-pose-increasing-danger-to-israeli-security/
  • War redefined. (2008, Aug. 17). LA Times. Retrieved from http://articles.latimes.com/2008/aug/17/opinion/ed-cyberwar17
  • Waugh, R. (2011, Dec. 29). Computer hackers ‘could bring rail network to a standstill’ warns security expert – but would we even notice? Daily Mail. http://www.dailymail.co.uk/sciencetech/article-2079449/Computer-hackers-bring-rail-network-standstill-warns-security-expert--notice.html
  • Whitlock, C. and Hsu, S. (2007, July 6). Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2007/ 07/05/AR2007070502120.html
  • Wilson, C. (2008, Jan. 29). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for Congre ss. Congressional Research Service. Retrieved from http://www.au.af.mil/au/awc/awcgate/crs/ rl32114.pdf
  • Wilson, C. (2005, Apr. 1). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congre ss. Congressional Research Service at 20. Retrieved from http://www.history.navy.mil/library/online/computerattack.htm

Kuzey Atlantik Antlaşması Örgütü’ne (NATO) Karşı Siber Tehditler ve Seçilmiş Yanıtlar

Yıl 2014, Cilt: 1 Sayı: 2, 1 - 36, 16.10.2014
https://doi.org/10.17336/igusbd.32621

Öz

Bu makale, Kuzey Atlantik Antlaşması Teşkilatı (NATO), NATO üyeleri ve NATO’nun bazı siber tehlikeler ile ilgili yaptığı müdahalelere karşı yapılan benzeşmeyen, farklı siber tehditlere odaklanmaktadır. Bunu yapmadan önce, makale, siber tehlikeler ile ilgili çeşitli tanımlamalar ve belirlemeler anlatmaktadır. Daha sonra, makale, siber tehditlerin doğası ve çeşitleri ile ilgili geniş kapsamlı bir tartışma ortaya koymaktadır. Akabinde, makalede, taarruzi siber tedbirler arayışındaki bireyler, organizasyonlar ve milletler çeşitleri ile ilgili bir tartışma yer almaktadır.

Kaynakça

  • Albanesius, C. (2011, July 21). Anonymous: We hacked NATO. PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2388823,00.asp
  • Alexander, D. (2010, July). The radicalization of extremists/terrorists - why it affects you. Security Magazine. Retrieved from http://digital.bnpmedia.com/publication/?i=41296&p=42
  • Amoroso, E. (2010). Cyber Attacks: Protecting National Infrastructure. Oxford, UK: Butterworth-Heinemann.
  • Anderson, R. (n.d.). Countering state-sponsored cyber attacks: Who should lead? Information as power. Army War College. Retrieved from http://www.csl.army.mil/usacsl/Publications/infoaspowervol2/IAP2%20-%20Section%20Two%20%28Anderson%29.pdf
  • (2011, June 21). Anonymous target Spanish national police website after hacker arrests. www.huffingtonpost.com Retrieved from http://www.huffingtonpost.com/2011/06/12/anonymous-spain-police-website-hacker-arrests_n_875527.html
  • Apps, P. (2012, Feb. 3). Cyber security specialist: disagreements over hacking risk could mean digital ‘cold war’. Retrieved from http://www.huffingtonpost.com/2012/02/03/cyber-security-risk_n_1252889.html
  • Ashmore, W. (2009, May 21). Impact of alleged Russian cyber attacks. US Army Command and General Staff College. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA504991
  • Avlon, J. (2009, Oct. 20). The growing cyberthreat. Forbes. Retrieved from http://www.forbes.com/2009/10/20/digital-warfare-cyber-security-opinions-contributors-john-p-avlon.html
  • Ball, J. (2011, Sept. 2). Wikileaks publishes full cache of unreduced cables. The Guardian. Retrieved from http://www.guardian.co.uk/media/2011/sep/02/wikileaks-publishes-cache-unredacted-cables
  • Baocun, W. and Fei, L. (1995, June 13/20). Information Warfare. Chinese Academy of Military Science. Retrieved from http://www.fas.org/irp/world/china/docs/iw_wang.htm
  • Bohn, K. and Todd, B. (2008, Nov. 6). Obama, McCain campaigns’ hacked for policy data. CNN. Retrieved from http://www.cnn.com/2008/TECH/11/06/campaign.computers.hacked/
  • Botnets: The new threat landscape white paper. (n.d.). Cisco. Retrieved fromhttp://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns171/ns441/networking_solutions_whitepaper0900aecd8072a537.html
  • Bradbury, D. (2009, Feb. 4). The fog of cyberwar. The Guardian. Retrieved from http://www.guardian.co.uk/technology/2009/feb/05/ kyrgyzstan-cyberattack-internet-access
  • British Muslim computer geek, son of diplomat, revealed as al Qaeda’s top cyber terrorist. (2008, Jan. 16). Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-508543/British-Muslim-geek-son-diplomat-revealed-al-Qaedas-cyber-terrorist.html
  • Bucci, S. (2009, June 12). The confluence of cyber crime and terrorism. Lecture #1123, Heritage Foundation. Retrieved from http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism
  • Carr, J. (2011, Aug. 12). What is cyberwar? Slate.com. Retrieved from http://www.slate.com/articles/technology/future_tense/2011/08/what_is_cyberwar.html
  • Charvart, P. Cyber terrorism: A new dimension in battlespace. (n.d.). NATO Cooperative Cyber Defence, Centre of Excellence. Retrieved from http://www.ccdcoe.org/publications/virtualbattlefield/05_CHARVAT_Cyber%20Terrorism.pdf
  • China gone cyber-wild – cyber attacks by China. (2011, Sept. 23). Retrieved from http://uscyberlabs.com/blog/2011/09/23/china-cyber-wild-cyber-attacks-china/
  • Chinese cyber-attacks: Hello, Unit 61398. (2013, Feb. 19). The Economist. Retrieved from http://www.economist.com/blogs/analects/ 2013/02/chinese-cyber-attacks
  • Choinere, P. (2012, Mar. 11). Lieberman warns of a cyber 9/11. Retrieved from http://www.theday.com/article/20120311/OP04/303119943
  • Clapper, J. (2012, Jan. 31). Unclassified statement for the record on the worldwide threat assessment of the US intelligence community for the Senate Select Intelligence Committee. Senate Select Intelligence Committee, at 3. Retrieved from http://www.intelligence.senate.gov/120131/clapper.pdf
  • Context Information Security. (2012, Mar.). Crouching tiger, hidden dragon, stolen data. Retrieved from http://www.contextis.co.uk/
  • Conway, M. (n.d.). Hackers as terrorists? Why it does not compute. Computer Fraud & Security. Retrieved from http://www.arifyildirim.com/ilt510/maura.conway.pdf
  • Cyber attacks against US government growing at rapid pace (n.d.). Secure128.com. Retrieved from http://www.secure128.com/cyber-attacks-against-us-government-growing-at-rapid-pace.aspx
  • (2011, June 10). Cyber defence: Next steps. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/SIDFF200A97 BAB17CB7/natolive/news_75358.htm?selectedLocale=en
  • Cyber Security: a Part 3 Definition. (n.d.). Palo Alto Networks. Retrieved from http://www.paloaltonetworks.com/community/learning-center/what-is-cyber-security.html
  • Daly, J. (2007, June 5). LTTE: Technologically innovative rebels. ISN Eth Zurich. Retrieved from http://isn.ch/isn/Digital-Library/Articles/ Detail/?ots783=4888caa0-b3db-1461-98b9-e20e7b9c13d4&lng=en&id =53217
  • (n.d.). Defending against cyber attacks. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/ 75747.htm
  • (2011). Defending the Networks: The NATO Policy on Cyber Defence. NATO Public Diplomacy Division. Retrieved from www.nato.int/nato.../20111004_110914-policy-cyberdefence.pdf
  • Definition of cyberwarfare (n.d.). Retrieved from http://dictionary.reference.com/browse/cyberwarfare
  • Denning, D. (2009). Terror’s web: How the Internet is transforming terrorism. Handbook on Internet Crime (Y. Jewkes and M. Yar, eds.), Willan Publishing. Retrieved from http://faculty.nps.edu/dedennin/publications/Denning-TerrorsWeb.pdf
  • Duell, M. (2012, Feb. 3). 'What about McDonald's in the Pentagon?: Extraordinary top secret call between FBI and Scotland Yard 'tapped' by Anonymous. Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-2096035/Secret-FBI-Scotland-Yard-tapped-Anonymous--trying-catch.html
  • Estonia fines man for ‘cyber war.’ (2008, Jan. 25). BBC news, Retrieved from http://news.bbc.co.uk/2/hi/technology/7208511.stm
  • Evans. M. et al. (2012, Apr. 12). Two arrested after hackers attacked anti-terror hotline. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/9201621/Two-arrested-after-hackers-attacked-anti-terror-hotline.html
  • Examining the cyber threat to critical infrastructure and the American economy. (2011, Mar. 16). Subcommittee on cyber security, infrastructure protection, and security technologies, Committee on homeland security, U.S. House of Representatives. Retrieved from http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg72221/html/CHRG-112hhrg72221.htm
  • Executive order - - Improving critical infrastructure cybersecurity. (2013, Feb. 12). Office of the Press Office, White House. Retrieved from http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
  • Federal Bureau of Investigation. (2012, May 11). Economic espionage: how to spot a possible insider threat. Retrieved from http://www.fbi.gov/news/stories/2012/may/insider_051112/insider_051112
  • (2011, Oct.). Foreign spies stealing U.S. economic secrets in cyberspace. Office of the National Counterintelligence Executive. Retrieved fromhttp://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
  • Fox News. (2011, Aug. 3). Massive global cyberattack targeting U.S., U.N. discovered; experts blame China. Retrieved from http://www.foxnews.com/scitech/2011/08/03/massive-global-cyberattack-targeting-us-un-discovered-experts-blame-china/
  • Germany, W. (2012, Feb. 29). What is ‘Anonymous’ and How Does it Operate? Radio Free Europe/Radio Liberty. Retrieved from http://www.rferl.org/content/explainer_what_is_anonymous_and_how_does_it_operate/24500381.html
  • Glenny, M. (2010, May 24). The countdown to cybergeddon. FT.com. Retrieved from http://www.ft.com/cms/s/0/47b390e4-66ca-11df-aeb1-00144feab49a.html#axzz2T6t8My9N
  • Goldman, D. (2011, July 28). China v. U.S.: The cyber cold war is raging. Retrieved from http://money.cnn.com/2011/07/28/technology /government_hackers/index.htm
  • Gorman, S. et al. (2009, Apr. 21). Computer spies breach fighter-jet project. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB124027491029837401.html.html
  • Graham, D. (2010). Cyber threats and the laws of war. 4 Journal of national security law and policy 84. Retrieved from http://jnslp.com/wp-content/uploads/2010/08/07_Graham.pdf
  • Grauman, B. (2012, Feb.). Cyber-security: the vexed question of global rules. Retrieved from http://www.securitydefenceagenda.org/Contentnavigation/Library/Libraryoverview/tabid/1299/articleType/ArticleView/articleId/3064/SDA-cybersecurity-report.aspx
  • Hale, J. (2010, May 23). NATO official: cyber attack systems proliferating. Defense News. Retrieved from http://www.defensenews.com/article/20100323/DEFSECT04/3230304/NATO-Official-Cyber-Attack-Systems-Proliferating
  • Healey, J. & Van Bochoven. (n.d.). NATO cyber capabilities: yesterday, today, and tomorrow. Atlantic Council. Retrieved from http://www.acus.org/publication/natos-cyber-capabilities-yesterday-today-and-tomorrow
  • Hellman, Z. (2012, Feb. 22). Hackers or terrorists. Jpost.com.Retrieved from http://m.jpost.com/Headlines/Article.aspx?id=86258350&cat=2
  • (2012, Mar. 11). Hidden Chinese Hackers Crouching Dragon, Stolen Data. Cyber War Zone Retrieved from http://www.cyberwarzone.com/cyberwarfare/hidden-chinese-hackers-crouching-dragon-stolen-data?page=4
  • Hoffman, S. (2011, Aug. 1). Anonymous hackers target FBI cybersecurty [sic] contractor Mantech. www.crn.com. Retrieved from http://www.crn.com/news/security/231003077/anonymous-hackers-target-fbi-cybersecurty-contractor-mantech.htm
  • Hoffman, S. (2011, Sept. 2). 10 biggest cyber attacks in August. www.crn.com Retrieved from http://www.crn.com/slide-shows/security/ 231600608/10-biggest-cyber-attacks-in-august.htm?pgno=4
  • Hopkins, N. (2012, Mar. 10). China suspected of facebook attack on Nato’ s supreme allied commander. The Guardian. Retrieved from http://www.guardian.co.uk/world/2012/mar/11/china-spies-facebook-attack-nato
  • Hosenball, M. and Zengerle, P. (2013, Mar. 12). Cyber attacks leading threat against U.S.: Spy agencies. Reuters.com. Retrieved from http://www.reuters.com/article/2013/03/12/us-usa-threats-idUSBRE92B0LS20130312
  • Insider security threats: State CIOs take action now. (2007). National Association of Chief Information Officers of States. Retrieved from http://www.nascio.org/publications/documents/NASCIO-InsiderSecurityThreats.pdf
  • Jajodia, S. et al. (1999, Apr.). Surviving information warfare attacks. Mitre. Retrieved from http://www.mitre.org/work/best_papers/ 99/jajodia_surviving/jajodia_surviving.pdf
  • Jones, T. (2012, Apr. 2). Anonymous again targets Czech ruling party. Czechposition.com. Retrieved from http://www.ceskapozice.cz/en/news/politics-policy/anonymous-again-targets-czech-ruling-party
  • Kempf, A. (2011, Mar. 24). Considerations for NATO strategy on collective cyber defense. Center for Strategic & International Studies. Retrieved from http://csis.org/blog/considerations-nato-strategy-collective-cyber-defense
  • Kirk, J. (2007, May 17). Estonia recovers from massive denial-of-service attack. Infoworld. Retrieved from http://www.infoworld.com/d/security-central/estonia-recovers-massive-denial-service-attack-188 (hereinafter Kirk 2007)
  • Kirk, J. (2008, July 4). Lithuania: Attacks focused on hosting company. PC World. Retrieved from http://www.pcworld.com/article/147960/ article.html (hereinafter Kirk 2008)
  • Kovacs, E. (2012, Apr. 3). Site of NATO Croatia hacked and defaced by TeaMp0ison. Softpedia. Retrieved from http://news.softpedia.com/news/ Site-of-NATO-Croatia-Hacked-and-Defaced-by-TeaMp0isoN-262429.shtml
  • Kretsinger, Sony hacker Recrusion, jailed for year. (2013, Apr. 13). BBC News. Retrieved from http://www.bbc.co.uk/news/technology-22214506
  • Krupnick, S. (2011, Aug. 16). Freedom fighters or vandals? No consensus on Anonymous. Contra Costa Times. Retrieved from http://www.mercurynews.com/top-stories/ci_18686764
  • Lewis, J. (2002, Dec.). Assessing the risks of cyber terrorism, cyber war, and other cyber threats. Center for Strategic and International Studies at 9.Retrieved from http://www.steptoe.com/publications/231a.pdf
  • Lewis, J. (2012, Mar. 10). How spies used to steal Nato chief’s details, Daily Telegraph. Retrieved from http://www.telegraph.co.uk/technology/ 9136029/How-spies-used-Facebook-to-steal-Nato-chiefs-details.html
  • (2010, Nov. 20). Lisbon summit declaration. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/official_texts_68828.htm
  • Lithuanian tax office website hit by cyber attack. (2008, July 21). Reuters. Retrieved from http://www.reuters.com/article/2008/07/21/ lithuania-web-attacks-idUSMAR14153920080721
  • Mackey, R., (2009, Feb. 9). Are ‘cyber-militias’ attacking Kyrgyzstan? NY Times. Retrieved from http://thelede.blogs.nytimes.com/2009/02/05/ are-cyber-militias-attacking-kyrgyzstan/
  • Markoff, J. (2008, Aug. 13). Before the gunfire, cyberattacks. Retrieved from http://www.nytimes.com/2008/08/13/technology/13cyber.html
  • Masters, J. (2011, May 23). Confronting the cyber threat. Council on Foreign Relations Backgrounder. Retrieved from http://www.cfr.org/ technology-and-foreign-policy/confronting-cyber-threat/p15577
  • McAfee. (2009). In the Crossfire: Critical Infrastructure in the Age of Cyber War. Retrieved from http://www.mcafee.com/us/resources/reports /rp-in-crossfire-critical-infrastructure-cyber-war.pdf
  • McCusker, R. (2006). Transnational organised cyber crime: distinguishing threat from reality. Crime, Law and Social Change, 46 (4-5), pp. 257-273. Retrieved from http://tees.openrepository.com/tees/ bitstream/10149/115450/2/115450.pdf
  • McGee, J. (2011, July 8). NATO and Cyber Defense: A Brief Overview and Recent Events. Center for Strategic & International Studies. Retrieved from http://csis.org/blog/nato-and-cyber-defense-brief-overview-and-recent-events
  • Moore, D. et al. (2003, July/Aug.). Inside the slammer worm. IEEE Security & Privacy, at 33. Retrieved from http://cseweb.ucsd.edu/~savage/papers/IEEESP03.pdf
  • Mueller III, R. (2012, Mar. 1). Speech at RSA cyber security conference. FBI press release. Retrieved fromhttp://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies
  • Murphy, D. (2011, June 19). Three reasons to fear Lulzsec: Sites, skills, and slant. PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2387219,00.asp
  • Nakashima, E. (2011, July 21). Anonymous claimed it hacked NATO web site, tells FBI we’re back. Washington Post. Retrieved from http://articles.washingtonpost.com/2011-07-21/world/35266809_1_ anonymous-claims-richard-stiennon-hackers-group
  • Nakashima, E. (2012, Mar. 7). China testing cyber-attack capabilities, report says, Washington Post. Retrieved from http://www.washingtonpost .com/world/national-security/china-testing-cyber-attack-capabilities-report-says/2012/03/07/gIQAcJwDyR_story. html
  • (2012, May 10). NATO and cyber defence. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/SID-D356AF5A-950BFC5F/natolive/topics_78170.htm
  • (2011, Nov. 17). NATO: getting serious about cyber security. Defense Management. Retrieved from http://www.defencemanagement.com/feature_story.asp?id=18166
  • (2012, March 13). NATO rapid reaction team to fight cyber attack. North Atlantic Treaty Organization. Retrieved from http://www.nato.int/cps/en/natolive/news_85161.htm
  • (2011, Dec. 5). NATO under cyber attack, 50+ sites hacked by pak cyber combat squad. Retrieved from http://www.voiceofgreyhat.com/2011/12/nato-under-cyber-attack-50-sites-hacked.html
  • Newton, S. (2001, Nov.). Can cyberterrorists actually kill people? SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers /warfare/cyberterrorists-kill-people_820
  • Olsen, K. (2009, July 9). Massive cyber attack knocked out government websites starting on July 4th. Retrieved fromhttp://www.huffingtonpost .com/2009/07/07/massive-cyber-attack-knoc_n_227483.html
  • Ottis, R. & P. Lorents. (n.d.). Cyberspace: definition and implications. Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia. Retrieved from www.ccdcoe.org/articles/.../Ottis_Lorents_CyberspaceDefinition.pdf
  • Paganini, P. (n.d.). The rise of cyber weapons and relative impact of cyber space. Infosec Institute Resources. Retrieved from http://resources.infosecinstitute.com/the-rise-of-cyber-weapons-and-relative-impact-on-cyberspace/
  • Pellerin, C. (2011, Sept. 14). Panetta: Regional defense, cyber highlight AUSMIN talks. American Forces Press Service. Retrieved from http://www.defense.gov/News/NewsArticle.aspx?ID=65337
  • PKK attacks Turkey’s finance ministry website. (2011, Nov. 9)Today’s Zaman. Retrieved from http://www.todayszaman.com/news-262152--pkk-attacks-turkeys-finance-ministry-website.html
  • (2011, June 23). Probable data breach from a NATO-related site. NATO. Retrieved from http://www.nato.int/cps/en/natolive/news_ 75729.htm
  • Puran, R. (2003, Feb. 28). Beyond conventional terrorism … the cyber assault. SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/threats/conventional-terrorismthe-cyber-assault_931
  • Rafter, M. (2010). New security risks from USB flash drives. Norton. Retrieved from http://us.norton.com/yoursecurityresource/detail.jsp? aid=usbdrives
  • Rhodin, S. (2008, July 1). Hackers tag Lithuanian website with Soviet symbols. NY Times. Retrieved from http://www.nytimes.com/2008/07/01/world/europe/01baltic.html?_r=1&scp=3&sq=lithuania&st=nyt&oref=slogin
  • Riley, M. & J. Walcott. (2011, Dec. 12). China-based hacking of 760 companies shows cyber cold war. Businessweek. Retrieved from http://www.businessweek.com/news/2011-12-22/china-based-hacking-of-760-companies-shows-cyber-cold-war.html
  • Rogin, J. (2010, Jan. 22). The top 10 Chinese cyber attacks that we know of. Foreign Policy. Retrieved from http://thecable.foreignpolicy.com/ posts/2010/01/22/the_top_10_chinese_cyber_attacks_that_we_know_of
  • Rollins, J. and Wilson, C. (2007, Jan. 22). Terrorist capabilities for cyberattack: Overview and policy issues. Congressional research service. Retrieved from http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/ docs/Cyber-024.pdf
  • Savage, C. (2013, Feb. 28). Soldiers admits providing files to WikiLeaks. NY Times. Retrieved from http://www.nytimes.com/2013/03/01/us/bradley-manning-admits-giving-trove-of-military-data-to-wikileaks.html?pagewanted=all&_r=0
  • Schwartz, M. (2011, June 16). LulzSec claims credit for CIA site takedown. Information Week. Retrieved from http://www.informationweek.com/security/cybercrime/lulzsec-claims-credit-for-cia-site-taked/230800019
  • Schwartz, M. (2011, June 27). LulzSec hackers retire: time to rethink risk. Information Week. http://www.informationweek.com/security /attacks/lulzsec-hackers-retire-time-to-rethink-r/231000472
  • Silicon Republic. (2012, Jan. 9). Anonymous attack reveals US, UK and Nato email passwords. Retrieved from http://www.siliconrepublic.com/ strategy/item/25247-anonymous-attack-reveals-us
  • Snow, G. (2011, Sept. 11). Statement before the House Financial Services Committee. Subcommittee on Financial Institutions and Consumer Credit. Retrieved from http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector
  • Snow, G. (2011, Apr. 12). Statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, at 3. Retrieved from http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism
  • Social engineering using a USB drive. (n.d.). Carnegie Mellon University. Retrieved from http://www.cmu.edu/iso/aware/be-aware/ usb.html
  • Spiegel Online International. (n.d.). WikiLeaks Diplomatic Cables. Retrieved from http://www.spiegel.de/international/topic/ wikileaks_diplomatic_cables/
  • Sterner, E. (2012, Apr.). The paradox of cyber protest. Marshall Policy Institute Outlook. Retrieved from http://www.marshall.org/pdf/materials/1087.pdf
  • Tafoya, W. (2011, Nov.). Cyber Terror. FBI Law Enforcement Bulletin. Retrieved from http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror
  • Taliharm, A.M. (2010, Fall). Cyberterrorism: In theory or in practice? Defence Against Terrorism Review. 3 (2). pp. 59-71. Retrieved from http://www.coedat.nato.int/publications/datr6/DATR_Fall2010.pdf
  • Thachuk, K. (2008, Spring). Countering terrorist support structures. Defence Against Terrorism Review. 1 (1), pp. 13-28. Retrieved from http://www.coedat.nato.int/publications/datr/02.Kimberley%20THACHUK.pdf
  • Three admit inciting terror acts. (2007, July 4). BBC News. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/6268934.stm
  • Tikk, E. et al. (2008, Nov.). Cyber attacks against Georgia: Legal lessons identified. Cooperative Cyber Defence Centre of Excellence. Retrieved from http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
  • Tikk, E. et al. (2010). International cyber incidents legal considerations. Cooperative Cyber Defence Centre of Excellence. Retrieved from http://www.ccdcoe.org/publications/books/legalconsiderations.pdf
  • Traynor, I. (2007, May 16). Russia accused of unleashing cyberwar to disable Estonia. The Guardian. Retrieved from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
  • UN Office on Drugs and Crime. (2012, Sept.). The use of the Internet for terrorism purposes. Retrieved from http://www.unodc.org/documents/ frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
  • U.S. Army Training and Doctrine Command, Cyber Operations and Cyber Terrorism Handbook. No. 1.02, P.II-1 and II-3. (2005, Aug. 15). Retrieved from http://www.au.af.mil/au/awc/awcgate/army/guidterr/ sup2.pdf
  • Wagensall, P. (2011, Feb. 16). Cyberwarfare called the fifth domain of battle by pentagon. Technewsdaily.com. Retrieved from http://www.technewsdaily.com/6620-cyberwarfare-called-fifth-domain-of-battle-by-pentagon.html
  • War in the fifth domain. (2010, July 1). The Economist. Retrieved from http://www.economist.com/node/16478792
  • War of the worms: cyber-attacks pose increasing danger to Israeli society (n.d.). Wharton. Retrieved from http://kw.wharton.upenn.edu/israel/war-of-the-worms-cyber-attacks-pose-increasing-danger-to-israeli-security/
  • War redefined. (2008, Aug. 17). LA Times. Retrieved from http://articles.latimes.com/2008/aug/17/opinion/ed-cyberwar17
  • Waugh, R. (2011, Dec. 29). Computer hackers ‘could bring rail network to a standstill’ warns security expert – but would we even notice? Daily Mail. http://www.dailymail.co.uk/sciencetech/article-2079449/Computer-hackers-bring-rail-network-standstill-warns-security-expert--notice.html
  • Whitlock, C. and Hsu, S. (2007, July 6). Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2007/ 07/05/AR2007070502120.html
  • Wilson, C. (2008, Jan. 29). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for Congre ss. Congressional Research Service. Retrieved from http://www.au.af.mil/au/awc/awcgate/crs/ rl32114.pdf
  • Wilson, C. (2005, Apr. 1). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congre ss. Congressional Research Service at 20. Retrieved from http://www.history.navy.mil/library/online/computerattack.htm
Toplam 120 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Makaleler
Yazarlar

Dean Alexander

Yayımlanma Tarihi 16 Ekim 2014
Yayımlandığı Sayı Yıl 2014 Cilt: 1 Sayı: 2

Kaynak Göster

APA Alexander, D. (2014). Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses. İstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi, 1(2), 1-36. https://doi.org/10.17336/igusbd.32621

Cited By

TERRORIST USE OF CYBER TECHNOLOGY
Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi B - Teorik Bilimler
https://doi.org/10.20290/estubtdb.1021324


Creative Commons Lisansı
İstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi Creative Commons Atıf-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.