Research Article
BibTex RIS Cite

ANALYSIS OF ALLEGED CYBER ATTACKS FROM RUSSIAN FEDERATION

Year 2014, Volume: 7 Issue: 2, 1 - 16, 27.02.2017

Abstract

Russian Federation (RF) increases its activity in the field, called cyber space, day by day. The main reason why RF improves its efficiency in cyberspace is that it demands to be one of the most important cyber powers in the international system and needs to have power to use it as a means of pressure and sanction at the point of solving its foreign policy problems. Within this target, RF has made considerable efforts in the 2000s in order to reach the existing cyber attack capacity. As a result of the strategy it pursues, RF, which has increased its cyber attack power in a short period of time, is now one of the most important actors that dominate cyber space.
In this context, our article examines how RF uses its cyber attack capacity at the point of solving its foreign policy problems by analyzing on the alleged RF attacks on Estonia in 2007, Georgia and Lithuania in 2008, Kyrgyzstan in 2009 and Ukraine in 2014.

References

  • ALKAN Mustafa (2012), Siber Güvenlik ve Siber Savaşlar, TBMM İnternet Komisyonu, https://www.google.com.tr/?gfe_rd=cr&ei=J0hhWLqZL6Ps8wfGxLD4Cg#q=Siber+G%C3%BCvenlik+ve+ Siber+Sava%C5%9Flar+tbmm, (25.12.2014).
  • AKYAZI Uğur (2013), Uluslararası Siber Güvenlik Stratejisi ve Doktrinler Arasında Alınabilecek Tedbirler, 6.Uluslararası Siber Güvenlik ve Kriptoloji Konferansı, http://www.iscturkey.org/s/2226/i/2013-paper105.pdf, (14.01.2014).
  • BIÇAKÇI Salih (2012), “Yeni Savaş ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler, Cilt 9, Sayı 34, Yaz 2012, ss. 205-226.
  • BIÇAKÇI Salih (2013), 21. Yüzyılda Siber Güvenlik, İstanbul, Bilgi Üniversitesi Yayınları, Ağustos 2013.
  • BIÇAKÇI Salih (2014), “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler, Cilt 10, Sayı 40, Kış 2014, ss. 101-130.
  • DEMİRCİOĞLU Cemalettin (2014), “Siber Uzayda Güç ve Güvenlik”, İdareci’nin Sesi, http://www.tid.web.tr/ortak_icerik/tid.web/160/8%20Cemalettin%20DEM%C4%B0RC%C4%B0O%C4%9ELU.pdf, (10.02.2014).
  • GIBSON William (1984), Neuromancer, New York, Ace Books.
  • GOBLE A. Paul (2009), Defining Victory and Defeat: The Information War Between Russia and Georgia, In the Guns of August 2008: Russia War in Georgia”, edited by Svantee E. Cornell and S. Frederick Starr (Armonk, N.Y.: M.E. Sharpe)
  • GÜRCAN Metin (2014), Rusya’nın Ukrayna’daki Bulanık Savaş Konsepti, http://www.analistdergisi.com/sayi/2014/05/rusya-nin-ukrayna-daki-bulanik-savas-stratejisi, (22.04.2014).
  • HEİCKERÖ Roland (2010), “Emerging Cyber Threats and Russian Views on Information Warfare and Operation”, Swedish Defense Research Agency Press, http://www.foi.se/rapport?rNo=FOI-R--2970--SE, (23.06.2014).
  • KELLY Sanja (2014), Freedom on the Net 2014, Freedom on the Net (Freedom House, 2014), https://freedomhouse.org/sites/default/files/FOTN_2014_Full_Report_compressedv2_0.pdf., (24.04.2014).
  • LEE David (2014), Russia and Ukraine in Cyber Stand-Off, BBC News, http://www.bbc.com/news/technology-26447200, (23.04.2014).
  • MCLAUGHLIN Daniel (2014), Lithuaniaaccuses Russian Hackers of Cyber Assault After Collapse of Over 300 Websites, http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?did=1503762091&sid=2&Fmt=3&cl ientld=5094&RQT=309&VName=PQD;, (19.02.2014).
  • MEDVEDEV A. Sergei (2014), Offence-Defence Theory Analysis of Russian Cyber Capability, Master Thesis, Naval Post-Graduate School, Monterey, Colifornia, 2014, https://www.google.com.tr/?gfe_rd=cr&ei=qzHZVrreN7Go8wfMuYegDw#q=this+thesis+represent+mikhail+tsypkin, (05.03.2014).
  • NYE S. Joseph (2014), Cyber Power, Harvard Kennedy School, Belfer Center for Science and International Affairs, http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf, (19.02.2014).
  • OTTIS Rain (2008), Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective, In Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, Reading: Academic Publishing Limited, 2008, http://www.academic-bookshop.com/ourshop/prod_1355933-ECIW-2008-7th-European-Conference-on-Information-Warfare-and-Security-Plymouth-UK.html, (18.04.2014).
  • RHOADS Christopher (2009), Kyrgyzstan Knocked Offline, Wall Street Journal, http://www.wsj.com/articles/SB123310906904622741, (19.04.2016).
  • ROTH Mathias (2009), Bilateral Disputes Between EU Member States and Russia, CEPS Working Document (Centre for European Policy Studies), August 2009, http://www.ceps.eu/files/book/2009/09/1900.pdf., (18.04.2014).
  • TİKK Eneken (2010), International CyberIncidents: Legal Considerations, Tallinn, Cooperative Cyber Defense Centre of Excellence, 2010, https://ccdcoe.org/publications/books/legalconsiderations.pdf, (16.04.2014).
  • WEEDON Jenand ve GALANTE Laura (2014), Intelligence Analysts Dissectthe Headlines: Russia, Hackers, Cyberwar! Not So Fast, Fire Eye Executive Perspectives, https://www.fireeye.com/blog/executive-perspective/2014/03/intel-analysts-dissect-the-headlines-russia-hackers-cyberwar-not-so-fast.html, (24.04.2014).
  • WILLIAM C. Ashmore (2014), Impact of Alleged Russian CyberAttacks, School of Advanced Military Studies United States Army Commandand General Staff College Fort Leavenworth, Kansas, http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-027.pdf, (19.04.2016).
  • YENER Yavuz (2014), 8. yılında Estonya Saldırılarına Çok Boyutlu Bir Bakış, https://siberbulten.com/siber-saldirilar-2/8-yilinda-estonya-saldirilarina-cok-boyutlu-bir-bakis/, (18.04.2014).

RUSYA FEDERASYONU KAYNAKLI OLDUĞU İDDİA EDİLEN SİBER SALDIRILARIN ANALİZİ

Year 2014, Volume: 7 Issue: 2, 1 - 16, 27.02.2017

Abstract

Rusya Federasyonu (RF), siber uzay olarak adlandırılan alanda etkinliğini her geçen gün artırmaktadır. RF’nin siber uzaydaki etkinliğini artırmasının temel sebebi ise uluslararası sistemdeki en önemli siber güçlerden biri konumuna ulaşarak, sahip olduğu bu gücü dış politika sorunlarının çözülmesi noktasında bir baskı ve yaptırım aracı olarak kullanmak istemesidir.
Bu hedef kapsamında RF, mevcut siber saldırı kapasitesine ulaşmak amacıyla 2000’li yıllarda ciddi gayret göstermiştir. İzlediği stratejinin sonucunda kısa bir süre içinde sahip olduğu siber saldırı gücünü arttıran RF, günümüzde siber uzayı domine eden en önemli aktörlerden biri konumuna ulaşmıştır.
Bu bağlamda makalede RF’nin 2007 yılında Estonya’ya, 2008 yılında Gürcistan’a ve Litvanya’ya, 2009 yılında Kırgızistan’a ve 2014 yıllında Ukrayna’ya yönelik olarak gerçekleştirdiği iddia edilen siber saldırılar incelenerek, RF’nin dış politika sorunlarının çözümü kapsamında sahip olduğu siber saldırı kapasitesini ne şekilde kullanmakta olduğu analiz edilecektir.

References

  • ALKAN Mustafa (2012), Siber Güvenlik ve Siber Savaşlar, TBMM İnternet Komisyonu, https://www.google.com.tr/?gfe_rd=cr&ei=J0hhWLqZL6Ps8wfGxLD4Cg#q=Siber+G%C3%BCvenlik+ve+ Siber+Sava%C5%9Flar+tbmm, (25.12.2014).
  • AKYAZI Uğur (2013), Uluslararası Siber Güvenlik Stratejisi ve Doktrinler Arasında Alınabilecek Tedbirler, 6.Uluslararası Siber Güvenlik ve Kriptoloji Konferansı, http://www.iscturkey.org/s/2226/i/2013-paper105.pdf, (14.01.2014).
  • BIÇAKÇI Salih (2012), “Yeni Savaş ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler, Cilt 9, Sayı 34, Yaz 2012, ss. 205-226.
  • BIÇAKÇI Salih (2013), 21. Yüzyılda Siber Güvenlik, İstanbul, Bilgi Üniversitesi Yayınları, Ağustos 2013.
  • BIÇAKÇI Salih (2014), “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler, Cilt 10, Sayı 40, Kış 2014, ss. 101-130.
  • DEMİRCİOĞLU Cemalettin (2014), “Siber Uzayda Güç ve Güvenlik”, İdareci’nin Sesi, http://www.tid.web.tr/ortak_icerik/tid.web/160/8%20Cemalettin%20DEM%C4%B0RC%C4%B0O%C4%9ELU.pdf, (10.02.2014).
  • GIBSON William (1984), Neuromancer, New York, Ace Books.
  • GOBLE A. Paul (2009), Defining Victory and Defeat: The Information War Between Russia and Georgia, In the Guns of August 2008: Russia War in Georgia”, edited by Svantee E. Cornell and S. Frederick Starr (Armonk, N.Y.: M.E. Sharpe)
  • GÜRCAN Metin (2014), Rusya’nın Ukrayna’daki Bulanık Savaş Konsepti, http://www.analistdergisi.com/sayi/2014/05/rusya-nin-ukrayna-daki-bulanik-savas-stratejisi, (22.04.2014).
  • HEİCKERÖ Roland (2010), “Emerging Cyber Threats and Russian Views on Information Warfare and Operation”, Swedish Defense Research Agency Press, http://www.foi.se/rapport?rNo=FOI-R--2970--SE, (23.06.2014).
  • KELLY Sanja (2014), Freedom on the Net 2014, Freedom on the Net (Freedom House, 2014), https://freedomhouse.org/sites/default/files/FOTN_2014_Full_Report_compressedv2_0.pdf., (24.04.2014).
  • LEE David (2014), Russia and Ukraine in Cyber Stand-Off, BBC News, http://www.bbc.com/news/technology-26447200, (23.04.2014).
  • MCLAUGHLIN Daniel (2014), Lithuaniaaccuses Russian Hackers of Cyber Assault After Collapse of Over 300 Websites, http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?did=1503762091&sid=2&Fmt=3&cl ientld=5094&RQT=309&VName=PQD;, (19.02.2014).
  • MEDVEDEV A. Sergei (2014), Offence-Defence Theory Analysis of Russian Cyber Capability, Master Thesis, Naval Post-Graduate School, Monterey, Colifornia, 2014, https://www.google.com.tr/?gfe_rd=cr&ei=qzHZVrreN7Go8wfMuYegDw#q=this+thesis+represent+mikhail+tsypkin, (05.03.2014).
  • NYE S. Joseph (2014), Cyber Power, Harvard Kennedy School, Belfer Center for Science and International Affairs, http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf, (19.02.2014).
  • OTTIS Rain (2008), Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective, In Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, Reading: Academic Publishing Limited, 2008, http://www.academic-bookshop.com/ourshop/prod_1355933-ECIW-2008-7th-European-Conference-on-Information-Warfare-and-Security-Plymouth-UK.html, (18.04.2014).
  • RHOADS Christopher (2009), Kyrgyzstan Knocked Offline, Wall Street Journal, http://www.wsj.com/articles/SB123310906904622741, (19.04.2016).
  • ROTH Mathias (2009), Bilateral Disputes Between EU Member States and Russia, CEPS Working Document (Centre for European Policy Studies), August 2009, http://www.ceps.eu/files/book/2009/09/1900.pdf., (18.04.2014).
  • TİKK Eneken (2010), International CyberIncidents: Legal Considerations, Tallinn, Cooperative Cyber Defense Centre of Excellence, 2010, https://ccdcoe.org/publications/books/legalconsiderations.pdf, (16.04.2014).
  • WEEDON Jenand ve GALANTE Laura (2014), Intelligence Analysts Dissectthe Headlines: Russia, Hackers, Cyberwar! Not So Fast, Fire Eye Executive Perspectives, https://www.fireeye.com/blog/executive-perspective/2014/03/intel-analysts-dissect-the-headlines-russia-hackers-cyberwar-not-so-fast.html, (24.04.2014).
  • WILLIAM C. Ashmore (2014), Impact of Alleged Russian CyberAttacks, School of Advanced Military Studies United States Army Commandand General Staff College Fort Leavenworth, Kansas, http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-027.pdf, (19.04.2016).
  • YENER Yavuz (2014), 8. yılında Estonya Saldırılarına Çok Boyutlu Bir Bakış, https://siberbulten.com/siber-saldirilar-2/8-yilinda-estonya-saldirilarina-cok-boyutlu-bir-bakis/, (18.04.2014).
There are 22 citations in total.

Details

Journal Section Articles
Authors

A. Burak Darıcılı

Publication Date February 27, 2017
Submission Date March 21, 2017
Published in Issue Year 2014 Volume: 7 Issue: 2

Cite

APA Darıcılı, A. B. (2017). ANALYSIS OF ALLEGED CYBER ATTACKS FROM RUSSIAN FEDERATION. International Journal of Social Inquiry, 7(2), 1-16.

---------------------------------------------------------------------------------------------------------------------------------------------------

26134 26133     Content on this site is licensed under a Creative Commons Attribution 4.0 International license.

---------------------------------------------------------------------------------------------------------------------------------------------------