Araştırma Makalesi
BibTex RIS Kaynak Göster

21’nci Yüzyılda Açık Kaynak İstihbaratı

Yıl 2023, Cilt: 2 Sayı: 1, 17 - 38, 30.01.2023

Öz

Açık kaynaklar, günümüz istihbarat çalışmalarında yoğun olarak tartışılan bir konu başlığıdır. Birçok profesyonel, istihbaratın mutlaka gizli haber toplama faaliyetlerine dayanması gerektiğini ve bilgiye ulaşmanın kolay ve kısa bir yolu olmayacağını savunmaktadır. Diğerleri içinse açık kaynak istihbaratı yeni bir dönemi işaret etmektedir. Bu makalede, istihbarat çalışmaları literatüründe genelde teknoloji özelde ise açık kaynak başlığı altında yer alan bazı temel konu başlıklarının okuyuculara tanıtılması ve tartışılması amaçlanmıştır. Ayrıca, Türkçe terminoloji oluşturma sürecine de katkı sağlamak istenmektedir. Tartışma başlıkları; istihbaratın demokratikleşmesi, toplama-analiz ikiliği, görev ve kadro tanımlarındaki dönüşüm, açık kaynakların önleyici istihbarattaki güçlü ve zayıf yanları ile istihbarat zafiyeti olarak belirlenmiştir. Bu başlıklar etrafında istihbaratın 21. yüzyıldaki dönüşümü ve yol haritası tartışılmıştır.

Kaynakça

  • Ball, K. Webster, F. (2003) The intensification of surveillance. Ball, K. Webster, F. (Ed.). The intensification of surveillance: crime, terrorism and warfare in the information içinde (ss.1-15). Pluto Press.
  • Barnea, A. (2018). Challenging the “lone wolf” phenomenon in an era of informant. International Journal of Intelligence and Counterintelligence. 31(2). 217-234.
  • Barnea, A. (2019) Big data and counterintelligence in western countries. International Journal of Intelligence and counterintelligence. 32(3). 433-447.
  • Brynielsson, J. Horndahl, A. Johansson, F. Kaati, L. Mårtenson, C. ve Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone. Security Informatics. 2(11). 1-15. Denécé, E. (2014). The revolution in intelligence affairs: 1989–2003, International Journal of Intelligence and Counterintelligence. 27(1): 27-41.
  • Field manuel 2-0 intelligence. (2007). United States Army Press.
  • Freedman, L. (1977). U.S. Intelligence and the soviet strategic threat. Princeton University Press.
  • Gill P. ve Phythian M. (2018). Intelligence in an Insecure world. Polity Press Cambridge.
  • Goldman, A. (2016). Why didn’t the F.B.I. stop the New York bombing? Erişim tarihi: 24 Ekim 2018. https://www.nytimes.com/2016/09/22/us/fbi-terror-ahmad-khanrahami.html.
  • Herman, M. (1998). Diplomacy and intelligence, Diplomacy & Statecraft, 9(2). 1-22. https://www.bellingcat.com/news/uk-and-europe/2018/10/09/full-reportskripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/ Erişim tarihi: 24 Ekim 2018.
  • https://www.bellingcat.com/news/2022/08/25/socialite-widow-jeweller-spyhow-a-gru-agent-charmed-her-way-into-nato-circles-initaly/?s=03 Erişim tarihi: 24 Ekim 2022.
  • https://www.egm.gov.tr/02072020-tarihli-basin-aciklamasi Erişim tarihi: 24 Ekim 2022.
  • https://www.europarl.europa.eu/news/en/press-room/20220412IPR27112/epinquiry-committee-for-pegasus-and-other-spyware-launched Erişim tarihi: 20 Ekim 2022.
  • https://www.mevzuat.gov.tr/mevzuatmetin/1.5.6698.pdf Erişim tarihi: 14 Ekim 2022. https://www.i-scoop.eu/big-data-action-value-context/data-age-2025datasphere/#:~:text=In%20the%20announcement%20of%20the,a%20 yearly%20basis)%20by%202025. Erişim tarihi: 24 Ekim 2022.
  • https://www.statista.com/statistics/949144/worldwide-global-dataspherereal-time-data-annual-size/ Erişim tarihi: 24 Ekim 2022.
  • Hulnick, A.S. (1999) Fixing the spy machine: Preparing American intelligence for the twenty-first century. Praeger.
  • James J. Wirtz, ve Rosenwasser, J.J. (2010). From combined arms to combined intelligence: philosophy, doctrine and operations, Intelligence and National Security, 25(6). 725-743.
  • Johnson, L.K. (2009). Sketches for a theory of strategic intelligence. Gill, P. Marrin,S. ve Phythian, M. (Ed). Intelligence theory key questions and debates içinde. (ss.33-53). Routledge.
  • Johnson, L.K. (2010). National security intelligence. Johnson, K.L. (Ed). The oxford handbook of national security intelligence içinde. (ss.332). Oxford University Press.
  • Johnson, L.K. (2014). The development of intelligence studies. Dover, R. Goodman, M. ve Hillebrand, C. (Ed). Routledge companion to intelligence studies içinde. (3-22). Routledge.
  • Joint publication 3-25 countering threat networks. (2016).
  • United States Army Press. Krebs, V.E. (2002). Mapping networks of terrorist cells. Connections. 24(3): 43-52.
  • Lowenthal, M. (2008). Intelligence: From secrets to policy. CQ Press.
  • Lahneman, W.J. (2006). The future of intelligence analysis volume I final report. University of Maryland.
  • Shulsky, A.N. ve Schmitt G.J. (2002). Silent warfare: Understanding the world of intelligence. Potomac Books.
  • Sparrow, M.K. (1991). Network vulnerabilities and strategic intelligence in law enforcement. International Journal of Intelligence and counterintelligence. 5(3). 255-274.
  • Steele, R.D. (2007). Open source intelligence. Johnson, K.L. (Ed). Handbook of intelligence studies içinde. (ss.129-147). Routledge
  • Treverton, G.F. Jones, S.G. Boraz, S. Lipscy, P. (2006). Toward a theory of intelligence. RAND Corporation.
  • Treverton, G.F. C. Gabbard, B. (2008). Assessing the tradecraft of intelligence analysis. RAND Corporation.
  • Treverton, G.F. (2009). Intelligence for an age of terror. RAND Corporation. Cambridge University Press.
  • Williams, P. (2001). Transnational criminal networks. Phil Arquilla, J. Ronfeldt, D.F. (Ed). Networks and netwars: The future of terror, crime, and militancy içinde. (ss.61-98). RAND Corporation.
  • Wheaton, K.J. (2019). How to teach 2500 years of intelligence history in about an hour. Erişim tarihi: 11 Ekim 2022. https://sourcesandmethods.blogspot.com/2019/06/how-toteach-2500-years-of-intelligence.html.
  • Wohlstetter, R. (1962). Pearl harbor warning and decision. Stanford University Press.
  • Woo, G. (2011). Interdiction of plots with multiple operatives. Wiil, U.K. (Ed). Counterterrorism and open-source intelligence içinde. (ss.49-60) Springer-Verlag.
  • Younger A. MI6 'C' speech on fourth generation espionage, Erişim tarihi: 11 Mayıs 2022. https://www.gov.uk/government/speeches/mi6-c-speechon-fourth-generation-espionage.

Open Source Intelligence in the 21th Century

Yıl 2023, Cilt: 2 Sayı: 1, 17 - 38, 30.01.2023

Öz

Open sources are an important topic of discussion in contemporary intelligence studies. Many professionals argue that intelligence should be based on covert intelligence collection methods and there is no easy way or shortcut to access information. For others, open-source intelligence indicates a new era in intelligence. Accordingly, in this study, some of the primary debates in the intelligence studies literature under technology generally and open source specifically are introduced and examined. Besides, it intends to contribute to the efforts of forming Turkish terminology. The main discussion topics are the democratization of intelligence, collection-analysis duality, transformation in job descriptions, strengths and weaknesses of open sources in warning intelligence, and intelligence failure. Around these topics, the transformation and the road map of intelligence are discussed.

Kaynakça

  • Ball, K. Webster, F. (2003) The intensification of surveillance. Ball, K. Webster, F. (Ed.). The intensification of surveillance: crime, terrorism and warfare in the information içinde (ss.1-15). Pluto Press.
  • Barnea, A. (2018). Challenging the “lone wolf” phenomenon in an era of informant. International Journal of Intelligence and Counterintelligence. 31(2). 217-234.
  • Barnea, A. (2019) Big data and counterintelligence in western countries. International Journal of Intelligence and counterintelligence. 32(3). 433-447.
  • Brynielsson, J. Horndahl, A. Johansson, F. Kaati, L. Mårtenson, C. ve Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone. Security Informatics. 2(11). 1-15. Denécé, E. (2014). The revolution in intelligence affairs: 1989–2003, International Journal of Intelligence and Counterintelligence. 27(1): 27-41.
  • Field manuel 2-0 intelligence. (2007). United States Army Press.
  • Freedman, L. (1977). U.S. Intelligence and the soviet strategic threat. Princeton University Press.
  • Gill P. ve Phythian M. (2018). Intelligence in an Insecure world. Polity Press Cambridge.
  • Goldman, A. (2016). Why didn’t the F.B.I. stop the New York bombing? Erişim tarihi: 24 Ekim 2018. https://www.nytimes.com/2016/09/22/us/fbi-terror-ahmad-khanrahami.html.
  • Herman, M. (1998). Diplomacy and intelligence, Diplomacy & Statecraft, 9(2). 1-22. https://www.bellingcat.com/news/uk-and-europe/2018/10/09/full-reportskripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/ Erişim tarihi: 24 Ekim 2018.
  • https://www.bellingcat.com/news/2022/08/25/socialite-widow-jeweller-spyhow-a-gru-agent-charmed-her-way-into-nato-circles-initaly/?s=03 Erişim tarihi: 24 Ekim 2022.
  • https://www.egm.gov.tr/02072020-tarihli-basin-aciklamasi Erişim tarihi: 24 Ekim 2022.
  • https://www.europarl.europa.eu/news/en/press-room/20220412IPR27112/epinquiry-committee-for-pegasus-and-other-spyware-launched Erişim tarihi: 20 Ekim 2022.
  • https://www.mevzuat.gov.tr/mevzuatmetin/1.5.6698.pdf Erişim tarihi: 14 Ekim 2022. https://www.i-scoop.eu/big-data-action-value-context/data-age-2025datasphere/#:~:text=In%20the%20announcement%20of%20the,a%20 yearly%20basis)%20by%202025. Erişim tarihi: 24 Ekim 2022.
  • https://www.statista.com/statistics/949144/worldwide-global-dataspherereal-time-data-annual-size/ Erişim tarihi: 24 Ekim 2022.
  • Hulnick, A.S. (1999) Fixing the spy machine: Preparing American intelligence for the twenty-first century. Praeger.
  • James J. Wirtz, ve Rosenwasser, J.J. (2010). From combined arms to combined intelligence: philosophy, doctrine and operations, Intelligence and National Security, 25(6). 725-743.
  • Johnson, L.K. (2009). Sketches for a theory of strategic intelligence. Gill, P. Marrin,S. ve Phythian, M. (Ed). Intelligence theory key questions and debates içinde. (ss.33-53). Routledge.
  • Johnson, L.K. (2010). National security intelligence. Johnson, K.L. (Ed). The oxford handbook of national security intelligence içinde. (ss.332). Oxford University Press.
  • Johnson, L.K. (2014). The development of intelligence studies. Dover, R. Goodman, M. ve Hillebrand, C. (Ed). Routledge companion to intelligence studies içinde. (3-22). Routledge.
  • Joint publication 3-25 countering threat networks. (2016).
  • United States Army Press. Krebs, V.E. (2002). Mapping networks of terrorist cells. Connections. 24(3): 43-52.
  • Lowenthal, M. (2008). Intelligence: From secrets to policy. CQ Press.
  • Lahneman, W.J. (2006). The future of intelligence analysis volume I final report. University of Maryland.
  • Shulsky, A.N. ve Schmitt G.J. (2002). Silent warfare: Understanding the world of intelligence. Potomac Books.
  • Sparrow, M.K. (1991). Network vulnerabilities and strategic intelligence in law enforcement. International Journal of Intelligence and counterintelligence. 5(3). 255-274.
  • Steele, R.D. (2007). Open source intelligence. Johnson, K.L. (Ed). Handbook of intelligence studies içinde. (ss.129-147). Routledge
  • Treverton, G.F. Jones, S.G. Boraz, S. Lipscy, P. (2006). Toward a theory of intelligence. RAND Corporation.
  • Treverton, G.F. C. Gabbard, B. (2008). Assessing the tradecraft of intelligence analysis. RAND Corporation.
  • Treverton, G.F. (2009). Intelligence for an age of terror. RAND Corporation. Cambridge University Press.
  • Williams, P. (2001). Transnational criminal networks. Phil Arquilla, J. Ronfeldt, D.F. (Ed). Networks and netwars: The future of terror, crime, and militancy içinde. (ss.61-98). RAND Corporation.
  • Wheaton, K.J. (2019). How to teach 2500 years of intelligence history in about an hour. Erişim tarihi: 11 Ekim 2022. https://sourcesandmethods.blogspot.com/2019/06/how-toteach-2500-years-of-intelligence.html.
  • Wohlstetter, R. (1962). Pearl harbor warning and decision. Stanford University Press.
  • Woo, G. (2011). Interdiction of plots with multiple operatives. Wiil, U.K. (Ed). Counterterrorism and open-source intelligence içinde. (ss.49-60) Springer-Verlag.
  • Younger A. MI6 'C' speech on fourth generation espionage, Erişim tarihi: 11 Mayıs 2022. https://www.gov.uk/government/speeches/mi6-c-speechon-fourth-generation-espionage.
Toplam 34 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Bölüm Araştırma Makalesi
Yazarlar

Tolga Ökten 0000-0002-6102-7704

Yayımlanma Tarihi 30 Ocak 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 2 Sayı: 1

Kaynak Göster

APA Ökten, T. (2023). 21’nci Yüzyılda Açık Kaynak İstihbaratı. İstihbarat Çalışmaları Ve Araştırmaları Dergisi, 2(1), 17-38.