BibTex RIS Cite

-

Year 2013, Volume: 71 Issue: 1, 1177 - 1227, 16.08.2013

Abstract

KANUCK, s.1596. Toygar Akman, Sibernetik: Dünü, Bugünü, Yarını, Kaknüs Yay., İstanbul, 2003, s. 21. Türkçe Sözlük, Türk Dil Kurumu, 9. Baskı, Ankara, 1998, s.1978. Martin Dodge ve Rob Kitchin, Mapping Cyberspace, Routledge, London, 2001, s.1. Steven A. Hildreth, Cyberfare Warfare 11, Congressional Research Service Report For Congress No. RL30735, 19 Haziran 2001, s.1, http://www.fas.org/irp/crs/ RL30735.pdf, (e.t.28.01.2012)

References

  • KİTAPLAR
  • AKMAN, Toygar, Sibernetik: Dünü, Bugünü, Yarını, Kaknüs Yay., İs- tanbul, 2003.
  • ALFORD, Lione1.D., Cyber Warfare: A New Doctrine and Taxonomy, CrossTalk: The Journal of Defense Software Engineering, Vol. 14 No. 4, Nisan 2001, http://www.ldalford.com/technical_writing.htm, (e.t.02.02.2012).
  • AMATO, Ivan, Lying With Pixels, Seeing is No Longer believing. Tech. Rev., Temmuz 2000, http://www.technologyrevie w.com/Infotech/12115/?a=f,
  • ARKIN, William M., When Seeing and Hearing Isn 't Believing, Wash. Post.Com, 1 Şubat 1999, http://www.washingtonp ost.com/wp-srv/national/ dotmil/arkin020199.htm, (e.t.29.01.2012).
  • A Strategic Approach to Protecting SCADA and Process Control Systems, IBM Global Services, Temmuz 2007, s.1–13, http://www935. ibm.com/services/us/iss/pdf/scada_ whitepaper.pdf, (e.t.28.01.2012).
  • BEAL, Vangie, Webopedia, The Difference Between a Virus, Worm and Trojan Horse, 06.29.2010, Son güncelleme: 03.29.2011, http://www. webopedia.com/DidYouKnow/Internet/2004/virus.asp, (e.t.29.01.2012)
  • BERG, Paul, Air Force Cyber Command: What It Will Do and Why We Need It, Air & Space Power Journal, 20 Şubat 2007, http://www.airpower. au.af.mil/apjinternational/apj-s/2007/1tri07/bergeng.html, (e.t.28.01.2012).
  • BILLO, Charles, Welton Chang, An Analysis of the Means and Motivations of Selected Nations States, Institute For Security Technology Studies At Dartmouth College, Kasım 2004. http://www.ists.dartmouth.edu/ docs/execsum.pdf, (e.t.29.01.2012).
  • BRADLEY, Graham, Washingtonpost.com:Bush Orders Guidelines for Cyber-Warfare, Washington Post, 7 Şubat 2003, http://www.washingtonpost. com/ac2/wpdyn/A381102003Feb6?language=printer, (e.t.28.01.2012).
  • BRADLEY, Tony, Pandora’s Box, Antionline Newsletter #7, Nisan/Mayıs 2003, s.15–16, http://www.Antionline.com/news le tter/aonewsletter7.pdf,
  • BRENNER, Susan W., Leo L. Clarke, Conscription and Cyber Conflict: Legal Issues, 3rd International Conference on Cyber Conflict, CCD COE Publications, Estonia, 2011.
  • BYRES, Eric, The Myths and facts behind Cyber Security Risks for Industrial Control Systems, British Columbia Insti tute Of Technology A Polytechnic Institution, http://www.nealsystems.com/downloads/Myths%2 0and%2 0Facts%20for%20 Control%20System%20Cyber-security.pdf, (e.t.30.01.2012).
  • CAHILL, Thomas P., Konstantin Rozinav ve Christopher Mule, Cyber Warfare Peacekeeping, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Academy, ISBN 0-7803-7808-3/03, 2003.
  • CASSESE, Antonio, International Law, Oxford University Press:2001.
  • CHEN, Thomas M., “Stuxnet, The Real Start of Cyber Warfare?”, IEEE Network, Kasım/Aralık 2010, s.1–3.
  • CLAUSEWITZ, Carl von, On War, (editör ve çeviren: Michael Howard and Peter Paret), Princeton University Press, New Jersey, 1989.
  • COATES, J.F., What’s next? Foreseeable terrorist acts, The Futurist 36 (5), 2002, s.23–26.
  • COLEMAN, Kevin, Department of Cyber Defense, An organization who's time has come , Technolytics, Kasım 2007. http://www.technolytics.com/ Dept of_Cyber_Defense.pdf, (e.t.10.02.2012).
  • COLEMAN, Kevin, Inside DPRK's Unit 121, Defencetech.org., 24 Aralık 2007, 29.01.2012).
  • /24/inside-dprks-unit-121/, (e.t.
  • COLEMAN, Kevin, Russia's Cyber Forces, Defencetech.org., 27 Mayıs 2008, http://defensetech.org/2008/05/2 7/russias-cyber-forces/, (e.t.29.01.2012).
  • COLEMAN, Kevin, The Cyber Arms Race Has Begun, 28 Ocak 2008, s.1–4, http://www.csoonline.com/article/216991/c oleman-the-cyber-arms- race-has-begun, (e.t. 28.01.2012).
  • Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, Yves Sandoz (editör), 1987.
  • Cyberwar The Threat From The Internet, The Economist, 3–9 Temmuz 2010.
  • Çalışma Grubu 4, E-Devlet Uygulamalarında Güvenlik ve Güvenilirlik Yaklaşımları, Türkiye Bilişim Derneği.
  • DAKOFF, Howard S., Note, The Clipper Chip Proposal: Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation, J. Marshall L. Rev., Vol. 29, Num:2, 1996, s.475–479.
  • DAVIS, Brown, A Proposal for an tnternational Convention To Regulate the Use of tnformation Systems in Armed Conflict, Volume 47, Number 1, Winter 2006, s.201–202, http://www.harvardilj.org/wp-content/uploads/ 2010/10/HILJ_47-1_Brown.pdf, (e.t.06.02.2012).
  • DAVIS, Joshua, Hackers take Down the Most Wired Country in Europe, Wired http://www.wired.com/politics/security/magazine/1509/ff_estonia?currentPa ge=all, (e.t.28.01.2012) Magazine: Issue 15.09,
  • DECI, E.L., R.M. Ryan, Intrinsic Motivation and Self-determination in Human Behavior, Plenum Press, New York, 1985, http://www.google.com.tr/ books?hl=tr&lr=&id=p96WmnER4QC&oi=fnd&pg=PA1&dq=Dec i+E.T, +Ryan, +R. M+1985+Intrinsic+Motivation+and+Selfdetermination+in+Human+Behavior &ots=3cGTx2vc onepage&q&f=false, (e.t.29.01.2012).
  • 23&sig=eG5tcI60CDo0grCtd
  • w9xai0Qw38&redir_esc=y#v=
  • DEIBERT, Ron, Rafal Rohuzinski, Tracking GhostNET: Investigating a Cyber Espionage Network, Information Warfare Monitor, JR02–2009, http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a- Cyber-Espionage-Network, (e.t.28.01.2012).
  • DENNING, Dorothy E., Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, 1999, http://www.iwar.org.uk/cyberterror/resources/denning.htm, (e.t. 28.01.2012).
  • DENNING, Dorothy E., Hacktivism: an Emerging Threat to Diplomacy, American Foreign Service Association, 25.06.2007, www.a fsa.org/fsj/sept00/Denning.cfm, (e.t.10.02.2012).
  • DENNING, Dorothy E., Is Cyber Terror Next?, Social Science Research Council, http://essays.ssrc.org/sept11/ essays/denn ing.htm, (e.t.02.02.2012).
  • DODGE, Martin, Rob Kitchin, Mapping Cyberspace, Routledge, London, 2001.
  • DÖRMANN, Knut, Computer Network Attack and International Humanitarian Law, International Committee of the Red Cross, 19 Mayıs 2001, http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm, (e.t.06.02.2012).
  • DROGIN, Bob, Russians seem to be Hacking ınto Pentagon Sensitive information taken-but nothing top secret, Los Angeles Times, 7 Ekim 1999, http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/1999/10/07/MN5855 8.DTL, (e.t. 28.01.2012).
  • ENGİNSOY, Umit, Burak Ege Bekdil, Turkey Raises Emphasis On Cyberspace Defense, Defense News, 15 Ağustos 2011, http://www. defensenews.com/story.php?i=7388376&c=FEA&s=SPE, (e.t. 03.01.2012).
  • ERKİNER, Hakkı Hakan, Devletin Haksız Fiilinden Kaynaklanan Ulusla- rarası Sorumluluğu, 12 Levha Yay., , 1. Baskı, İstanbul, 2010.
  • GRAHAM, Bradley, For a description of hesitancy to use CNA during Operation “Allied Force”, “Military Grappling with Rules for Cyber Warfare: Questions Prevented Use on Yugoslavia”, Washington Post, 8 Ka- sım 011r-110899-idx.html, (e.t. 05.01.2012).
  • GRAHAM, Bradley, Military Grappling With Guidelines For Cyber Warfare; Questions Prevented Use on Yugoslavia, The Washington Post, 8 Kasım 1999, sec. A.
  • GREENBERG, Andy, America’s Hackable Backbone, 08.22.07, http:// www.forbes.com/2007/08/22/scada-hackers-infrastruc cx_ag_0822hack.html, (e.t. 28.01.2012) ture-tech-security
  • GREENBERG, Lawrence t., et al., Information Warfare and International Law 12, National Defense University Press, , 1998. http://www.dodccrp.org/files/Greenberg_Law.pdf, (e.t.06.02.2012).
  • GRYC, Wojciech, Cyber Warfare, Peace Magazine, 2009.
  • GUANG, Pan, The SCO's Success in Security Architecture (highlighting confidence building, cooperation against destabilizing transborder elements, and the maintenance of regional security and stability as general successes of the SCO), http://epress.anu.edu.au/ sdsc/architecture/ mo- bile_devices/ch04.html, (e.t.07.02.2012).
  • HIGGINS, Kelly Jackson, Permanent Denial-of-Service Attack Sabotages Hardware, Dark Reading, 19 Mayıs 2008, http://archive.cert.uni- stuttgart.de/isn/2008/05/msg00102.html, (e.t.29.01.2012).
  • HILDRETH, Steven A., Cyberfare Warfare 11, Congressional Research Service Report http://www.fas.org/irp/crs/RL30735.pdf, (e.t.28.01.2012). Congress For No. RL30735, 19 Haziran 2001.
  • HIRSHLEIFER, J., The bioeconomic causes of war, Managerial and Decision Economics 19 (7/8), 1998, s.457–466, http://time.dufe.edu.cn/ spti/article/hirshleifer/hirshleifer170.pdf, (e.t.29.01.2012).
  • JANCZEWSKI, Lech J., Andrew M. Colarik, Managerial Guide for Handling Cyber-Terrorism and Information Warfare, Idea Group Publishing, The U.S.A, 2005.
  • JENSEN, Eric Talbot, Cyber Warfare and Precautions Against the Effects of Attacks, Texas Law Review, Vol. 88:1533.
  • JONES, Andrew, Cyber Terrorism: Fact or Fiction, Computer Fraud and Security, 2005.
  • JOYNER, C. Christopher, Catherine Lotdonte, Information Warfare as International Coercion: Elements of a Legal Framework, 12 EUR. J. INT'L L. 825–841, 2001. http://www.ejil.Org/pdfs/12/5/1552.pdf (e.t.29.01.2012).
  • KABAY, M. E., Industrial Espionage, Part 8: China and Titan Rain, Network World, 10 Kasım 2005, http://www.networkworld.com/newsletters/ 2005/1107sec2.html?page=2), (e.t.28.01.2012).
  • KANUCK, Sean, Sovereign Discourse on Cyber Conflict Under Intemational Law, Texas Law Review Association, Symposium: Law at the Intersection of National Security, Privacy and Technology: II. Cybersecurity and Network Operations, Vol. 88:1571, 2010.
  • KELSEY, Jeffrey T.G., Hacking into International Humanitarian Law: The Principles of Disdinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review, Vol. 106 No:7, 2008.
  • KNIERIM, Tammy M., Lou Anne DeMattei ve Sebastian M. Convertino, Flying and Fighting in Cyberspace, Maxwell Paper No.40Air War College, Temmuz 2007. http://aupress.au.af.mil/digital/pdf/paper/mp_0040_conve rtino_demattei_knierim_flying_fighting_cyberspace.pdf, (e.t.30.01.2012).
  • LANGNER, Ralph, Stuxnet: Dissecting a Cyberwarfare Weapon, Focus, Mayıs/Haziran 2011.
  • LASKER, John, U.S. Military's Elite Hacker Crew, WIRED, 18 Nisan 2005, http://www.wired.com/politics/security/news/ 2005/04/67223, (e.t. 28.01.2012).
  • LAKHANI, K.R., R.G. Wolf, In: J. Feller, B. Fitzgerald, S. Hissam, K. R. Lakhani (Editörler), Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects, MIT Press, 2005, http://ocwmit.edu/courses/sloan-school-of-management/15-352-managing- innovation-emerging-trends-spring-2005/readings/lakhaniwolf.pdf, (e.t.29.01.2012).
  • LAPPIN, Yaakov, Reuters Admits to More Image Manipulation, YNETNEWS.COM, 7 Ağustos 2006, http://www.ynetn ews.com/articles/0, 7340, L-3287774, 00.html, (e.t.29.01.2012).
  • LEWIS, James A., Computer Espionage, Titan Rain and China, Center for Strategic and International Studies - Technology and Public Policy Program, Aralık 2005, s.1–2, http://csis.org/files/media/csis/pubs/051214_china _titan_rain. pdf, (e.t. 28.01.2012).
  • LEYDEN, John, ‘Electronic Jihad’ fails to materialise, 26 Ağustos 2004, http://www.theregister.co.uk/2004/0 8/26/cyberfu d/, (e.t.02.02.2012).
  • LIANG, Qiao, Wang Xiangsui, Unrestricted Warfare, Beijing: PLA Literature and Arts Publishing House, Şubat 1999, http://cryptome.org/ cuw.htm, (e.t.02.02.2012).
  • LIBICKI, Martin C., Cyberdeterrence and Cyberwar, Rand Corporation, The U.S.A, 2009.
  • LIBICKI, Martin, What is Information Warfare, Strategic Forum 28, Institute for National Strategic, Studies, Mayıs 1995, http://www.dtic.mil/cgi- bin/GetTRDoc?AD=ADA394692, (e.t.02.02.2012).
  • LINDENBERG, S., Intrinsic motivation in a new light, Kyklos 54 (2/3), 2001, 2001_LindenbergIntrinsic_motivation_in_a_new_light.pdf, (e.t.29.01.2012).
  • http://www.ppsw.rug.nl/~lindenb/documents/articles/
  • MILLS, Elinor, Google wants ability to 'combine' your user data, CNET News, 25 Ocak 2012, http://www.zdnetasia.com /google-wants-ability- to-combine-your-user-data-62303592.htm, (e.t. 28.01.2012).
  • MILLS, Elinor, Report: Turkish hackers breached U.S. Army servers, Mayıs 29 2009,
  • http://news.cnet.com/8301-1009_3-10252375-83.html,
  • ÖZKIŞLALI, Gizem, Küreselleşme, İnternet ve Terörizmin Değişen Yüzü; Siber Terörizm, Yüksek Lisans Tezi, Ankara, 2008.
  • PARKS, Raymond C., David P. Duggan, Principles of Cyber-warfare, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5–6 Haziran 2001, http://www.periwork.com/peri_db/wr_db/2004_May_11_11_30_41/DOCS%20 WEBREVIEW/P rinciplesCYBER%20WARFARE.pdf, (e.t.02.02.2012).
  • POWER, Richard, Dario Forte, “Ten years in the wilderness—a retrospective Part 2: Cyber Security = National Security”, Computer Fraud&Security: War&Peace in Cyberspace, Şubat 2006.
  • RHO, Jennifer J., Blackbeards of the Twenty-First Century: Holding Cybercriminals Liable under the Alien Tort Statute, 7 Cffl. J. INT'L L.695, 2006–2007.
  • ROSENZWEIG, Paul, National Security Threats in Cyberspace 2, 2009, http://www.americanbar.org/content/dam/ab a/migrated/natsecurity/ threats_in_cyberspace.authcheckdam.pdf, (e.t.07.02.2012).
  • SCHAAP, Arie J., Cyber Warfare Operations: Development and Use Under International Law, Air Force Law Review, Vol. 64, 2009.
  • SCHMITT, Michael N., Wired warfare: Computer network attack and jus in bello, RICR Juin IRRC Haziran 2002 Vol. 84 No. 846. http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf,
  • SCHWARTZ, Peter, Warrior in the Age of Intelligent Machines, Wired Magazine, Nisan 1995, http://www.wired.com/wire d/archive/3.04/pentagon_ pr.html, (e.t.02.02.2012).
  • SCOTT, Roger D., Territorially Intrusive Intelligence Collection and International Law, 46 A.F. L. Rev. 217, 1999.
  • SHARMA, Amit, “Cyber Wars: A Paradigm Shift from Means to Ends”, Strategic Analysis, 34:1, 2010, http://dx.doi.org/10.1080/ 09700160903354450,
  • SHAY, Shaul, Netwars and Networks, Mark Last ve Abraham Kandel (editör), Fighting Terror in Cyberspace içinde (33), World Scientific Publishing, The U.S.A, 2005.
  • SINROD, Eric J., William P. Reilly, Cyber-Crimes: A Practical Approach To The Application Of Federal Computer Crime Laws, Santa Clara University School of Law, Volume 16, Num.2, Mayıs 2000, s.12–16, http://www.sinrodlaw.com/CyberCrime.pdf, (e.t.29.01.2012).
  • SPIEKER, Heike, Civilian Immunity, in Crımes of War 84, 84 (Roy Gutman & David Rieff eds. 1999), s.84, http://www.crimesofwar.org/a-z- guide/civilian-immunity/, (e.t.14.02.2012).
  • STRELSOV, A.A., International information security: description and legal aspects, icts and international security. http://www.peacepalacelibrary.nl/ ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.10.02.2012).
  • STRELTSOV, A.A., International Information Security: Description and Legal Aspects, DISARMAMENT F., 2007 (Issue 3). http://www.peace palacelibrary.nl/ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.08.02.2012).
  • Sun Tzu, The Art of War, çeviren: Samuel B. Griffith, Oxford University Press, Oxford, 1963.
  • SWARTZ, Jon, Crooks slither into Net's shady nooks and crannies; Crime explodes as legions of strong-arm thugs, sneaky thieves log on, USA Today, 21 Ekim 2004, www.usatoday.com/printedition/money/200410 21/cybercrimecover.art. htm, (e.t.10.02.2012).
  • TÜTÜNCÜ, Ayşe Nur, İnsancıl hukuka Giriş, Beta Yay., İstanbul, 2006.
  • TRAYNOR, Ian, Russia accused of unleashing cyberwar to disable Estonia, The Guardian, http://www.guardian.co.uk/wo rl d/2007/may/17/ topstories3.russia, (e.t. 28.01.2012)
  • TREMLETT, Giles, Turkish arrests intensify global war between hac- activists ker and http://www.guardian.co.uk/technology/2011/jun/13/ turkish-arrests-global- The war-hackers-police, (e.t. 03.01.2012). police, Guardian, 13 Haziran 2011,
  • Türk Asya Stratejik Araştırmalar Merkezi, Siber Terörizm Raporu, Stratejik Rapor No: 2 Aralık 2004.
  • Türkçe Sözlük, Türk Dil Kurumu, 9. Baskı, Ankara, 1998.
  • UZUN, Elif, Milletlerarası Hukuka Aykırı Eylemlerinden Dolayı Devletin Sorumluluğu, Beta Yay., 1. Basım, İstanbul, 2007.
  • VERTON, Dan, Lack of Incident Reporting Slows Cybercrime Fight, 31 Ekim 2002, http://computerworld.com/securityto pics/security/cybercrime/ story/0, 10801, 75532, 00.html, (e.t.10.02.2012).
  • WALKER, George K., Information Warfare and Neutrality, Vanderbilt Journal of Transnational Law, 2000, http://findarticl es.com/p/articles/ mi_hb3577/is_5_33/ai_n28809531/, (e.t.06.02.2012).
  • WALKER, Jeffrey K., The Demise of the Nation-State, The Dawn of New Paradigm Warfare, and a Future for the Profession of Arms, 51 A.F. L. REV. 323, 2001, s.337–38, http://www.afjag.af.mil/shared/media/docum ent/AFD-081204-028.pdf, (e.t.06.03.2012). WATTS, Sean,
  • Combatant Status and Computer Network Attack, 3
  • Ağustos 2009, Virginia Journal of International Law, Vol. 50, No. 2, s. 392–393,
  • 2010, http://ssrn.com/abstract=1460680, (e.t.08.02.2012).
  • WEARDEN, Graeme, Cyberterrorists poised to attack', warns Labour peer, 28 Nisan 2005, http://www.silicon.com/tec h nology/security/2005/ 04/28/cyberterrorists-poised-to-attack-warns-labour-peer-391 (e.t.02.02.2012). 29961/,
  • WLINGFIELD, Thomas C., The Law Of Information Conflict: National Security Law In Cyberspace 17, Aegis Research Corp., 2000.
  • WILLIAMS, P., Organized crime and cybercrime: synergies, trends, and responses, 13 Ağustos 2001, Office of International Information Programs, U.S. Department of State, http://usinfo.state.gov, (e.t.05.01.2012).
  • WILSON, Clay, Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, Order Code RL32114, 17 Ekim 2003. http://fpc.state.gov/documents/organization/451 84.pdf, (e.t.02.02.2012).
  • WOLTAG, Johann-Christoph, Cyber Warfare, Max Planck Encyclopedia of Public International Law, Rüdiger Wolfrum (editör), Oxford University Press, 2010.
  • ELEKTRONİK KAYNAKLAR
  • Air Force Policy Directive 10–7, 6 Eylül 2006, http://www. survivalebooks.com/free%20manuals/2006%20US INFORMATION%20OPERATIONS%2027p.pdf, (28.01.2012). %20Air%20Force%20
  • A Proposal for an International Convention on Cyber Crime and Terrorism, cybercrime/stanford/cisac-draft.htm, (e.t.02.02.2012). 2000,
  • http://www.iwar.org.uk /law/resources/
  • Birleşmiş Milletler Antlaşması (BM Şartı), http://www.belgenet.com/ arsiv/sozlesme/bmsarti-01.html, (e.t.30.01.2012).
  • CERT Coordination Center, http://www.cert.org/tech_tips/denial_of_ service.html, (e.t.29.01.2012).
  • Convention on Cybercrime, Council of Europe, http://conventions. coe.int/ Treaty/en/Treaties/html/185.htm, (e.t.30.01.2 012).
  • Convention on Prohibitions or Restrictions on tbe Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects, 10 Ekim 1980, S, TREATY Doc. No. 103– 25 (1994). 1342 U.N.T, S. 137, http://www.icrc.org/eng/resources/ documents/publication/p0811.htm, (e.t.08.02.2012).
  • Convention Conceming the Rights and Duties of Neutral Powers in Naval War, madde 10, 18 Ekim 1907, http://www.icr c.org/ihl.nsf/FULL/240,
  • Convention (III) relative to the Treatment of Prisoners of War. Geneva, 12 Ağustost 1949, madde 4 (A) (2), http://www.icrc.org/ihl.nsf/ FULL/375, (e.t.07.02.2012).
  • Convention (IV) relative to the Protection of Civilian Persons in Time of War, Geneva, 12 August 1949, madde 28, http://www.icrc.org/ ihl.nsf/full/380, (e.t.07.02.2012).
  • Convention (V) respecting the Rights and Duties of Neutral Powers and Persons in Case of War on Land, The Hague, 18 Ekim 1907, http://www.icrc.org/ihl.nsf/full/200?opendocument, (e.t.06.02.2012).
  • Council of Europe, Convention on Cybercrime, opened for signature:11 Kasım 2001, Europ. T.S. No. 185, http://conve ntions.coe.int/treaty/en/ treaties/html/185.htm, (e.t.07.02.2012).
  • Creation of a Global Culture of Cybersecurity and the Protection of Critical Information Infrastructures, United Nations General Assembly, A/RES/58/199, Fifty-eighth session, 30 January 2004, http://www.itu.int/ ITU-D/cyb/cybersecurit y/docs/UN_resolution_58_199.pdf, (e.t.12.02.2012).
  • Department of Defense, Dictionary of Military and Associated Terms Joint Publication 1–02, (JP 3–13), http://www.dtic.mil/doctrine/new_pubs/ jp1_02.pdf, (e.t. 28.01.2012).
  • Department. of the Air Force, Policy Directive 51–4, Compliance with the law of armed conflıct, 1993, .http://www.icrc.org/ihlnat.nsf/6fa4d35 e5e3025394125673e00508143/cfaff63edde42523c1256a8e00342cfb OpenDoc ument, (e.t.06.02.2012).
  • Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia, 8 Haziran 2000, 39 I L M 1257., http://www.icty.org/sid/10052,
  • Geneva Convention Relative To The Treatment Of Prisoners Of War of 12 Ağustos 1949 (Geneva Convention III), http://protection.unsudanig.org/ data/legal/Third%20Geneva%20Convention%20 (e.t.02.02.2012). (POW), %2019 49.pdf,
  • Hacker Attacks in US Linked to Chinese Military: Researchers, 12 Aralık 2005, http://seclists.org/isn/2005/ Dec/0059.html, (e.t.29.01.2012).
  • http://daccess-dds- ny.un.org/doc/UNDOC/GEN/N03/506/52/PDF/N0350652.pdf?OpenElement, (e.t.31.01.2021).
  • http://www.digitalbroadcasting.com/storefronts/pvimage.html,
  • http://www.fbi.gov/publications/leb/2002/june2002/june02leb.htm, (e.t.10.02.2012).
  • http://www.itu.int/net/about/basic-texts/constitution/chaptervi.aspx, (e.t.31.01.2012).
  • http://meeting.afrinic.net/afrinic- 11/slides/aaf/Estonia_cyber_attacks_2007_latest.pdf, (e.t. 28.01.2012).
  • http://www.un.org/en/ecosoc/cybersecurity/maurer-cyber-norm-dp- 2011-11.pdf, (e.t.31.01.2012).
  • ICRC, International Humanitarian Law - Treaties & Documents, http://www.icrc.org/ihl.nsf/WebART/1952 00034?Ope nDocument,
  • Information Assurance – the Achilles’ Heel of Joint Vision 2010?, 2 Mart 1999, http://www.airpower.au.af. mil/airchr onicles/cc/ashley.html, INTERPOL, Secure https://www.interpol.int/Public/ICPO/corefunct (e.t.06.02.2012). Global Police
  • Communications ions/secu recom.asp,
  • Introduction to Computer Viruses, S0PH0S.COM, 26 Mayıs 1998, http://www.sophos.com/en-us/press-office/press- releases/1998/05/va_virusesintro.aspx, (e.t.29.01.2012).
  • Joint Chiefs Of Staff, Joint Publication 1-02, Department Of Dhf. Directive Of Military &Assoc'D Terms, 12 Nisan 2001, s.190, http://www. bits.de/NRANEU/others/jp-doctrine/jp1_02 (01).pdf, (e.t.29.01.2012).
  • Joint Doctrine for Information Operations, Joint Pub. 3–13, 9 Ekim 1998, s.1–136, http://www.c4i.org/jp3_13.pdf(e.t.29.01.2012).
  • Joint Publication 3–13, Information Operations, 13 Şubat 2006, http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf, (e.t.30.01.2012).
  • Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257, July 8, http://ww w.icj-cij.org/docket/index.php? p1=3&p2=4&k=e1&p3=4&case=95, (e.t.14.02.2012).
  • M/Cyclopedia of New Media, Digital Manipulation, http://www. fourandsix.com/photo-tampering-history/, (e.t.29.01.2012).
  • Official Records Of The Diplomatic Conference on the Reaffirmation and Development of International Humanitarian Law Applicable in Armed Conflicts, Volume 1, Federal Political Department, (Geneva, 1974 -1977), Bern, 1978, (e.t.11.02.2012).
  • On Bush's Watch, U.S. Suffered Its "Electronic Pearl Harbor, 3.18.2010, Güncelleme: 5.25.2011, http://www.huffingt onpost.com/2009/ 11/10/on-bushs-watch-us-suffere_n_352204.html, (e.t.30.01.2012). Photo Alteration,
  • http://www.espionageinfo.com/Pa-Po/Photo
  • Alteration.html, (e.t.10.02.2012).
  • Photo Tampering throughout History, http://www.fourandsix.com/ photo-tampering-history/, (e.t.29.01.2012).
  • Proceedings of European Conference on Information Warfare and Security 2002, 2003, http://books.google. com.tr/b ooks?hl=tr&id=EvsP IeM4w5AC&q=cyber#v=onepage&q=conferences&f=false, (e.t.02.02.2012).
  • Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), 8 Haziran 1977, http://www.icrc.org/ihl.nsf/full/470?op endocument, (e.t.07.02.2012).
  • Reducing On-line Credit Card Fraud, Web Developers Journal, http://www.webdevelopersjournal.com/article s/card_fra ud.html, (e.t.10.02.2012).
  • Report of the International Law Commission on the work of its fifty- third session, DOCUMENT A/56/10, madde 1, (23 Nisan–1 Haziran ve 2 Temmuz–10 Ağustos 2001), http://untreaty.un.org/ilc/reports/2001/200 1report.htm, (e.t.13.02.2012).
  • SearchSecurity.com, Definitions, IP Spoofing, http://searchsecurity. techtarget.com/definition/IP-spoofing, (e.t.29.01.2012).
  • SearchSecurity.com, Trojan Horse,
  • http://searchsecurity.
  • techtarget.com/definition/Trojan-horse, (e.t.29.01.2012)
  • Security for the Next Generation, The National Security of the United Kingdom, Güncelleme:2009, Cabinet Office, Haziran 2009, http://www.official- documents.gov.uk/document/cm75/7590/7590.pdf, (e.t.02.02.2012).
  • Statute of the International Law Commission, 1947, http://untreaty. un.org/ilc/texts/instruments/english/statute /statute_ e.pdf, (e.t.07.02.2012).
  • Techterms.com, The Tech Terms Computer Dictionary, Malware, http://www.techterms.com/definition/malwar e, (e.t.29.01.2012).
  • The Guardian, 15 Ağustos 2003, http://www.guardian.co.uk/news/ 2003/aug/15/informer, (e.t.02.02.2012).
  • The Secretary-General, Developments in the Field of Information and Telecommunications in the Context of International Security, delivered to the http://www.disarmament. un.org/library.../a-62-98.pdf, (e.t.08.02.2012).
  • The White House, Remarks By The President On Securing Our Nation’s Cyber Infrastructure, Office of the Press Secretary, 29 Mayıs 2009, http://www.whitehouse.gov/the-press-office/remarks-president-securing-our- nations-cyberinf rastructure, (e.t.29.01.2012).
  • Turkey conducts cyber terror drill, Hurriyet Daily News, 27 Ocak 2011, terror-drill-2011-01-27, (e.t. 03.01.2012). y-conducts-cyber
  • U.S. Department Of Defence, Information Operations Roadmap 1, 30 Ekim 2003, s.1–72, http://www.gwu.edu/~nsarc hiv/NSAEBB/NSAEBB177/ info_ops_roadmap.pdf, (e.t.28.01.2012).
  • U.S. Department of Defense, Directive IR. 3600.1, Information Operations, 14 Ağustos 2006, http://www.Fas.org/irp/do ddir/dod/info_ops.pdf,
  • White House. Cyberspace Policy Review, 2009, http://www. whitehouse.gov/assets/documents/Cyberspace _Pol icy _ Review_final.pdf,
  • 12 Ağustos 1949 Tarihli Cenevre Sözleşmelerine Ek Uluslararası Si- lahlı Çatışmaların Kurbanlarının Korunmasına İlişkin (1) No.lu Protokol, 8 Haziran 1977, http://www.kizilay.org.tr/hukuk/sayf a_yazdir.php?t=-Ulu- sal.ve.Uluslararasi.Sozl esmeler-CENEVRE.EK.1.PROTOKOL, (e.t.06.02.2012).

SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI

Year 2013, Volume: 71 Issue: 1, 1177 - 1227, 16.08.2013

Abstract

SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI

References

  • KİTAPLAR
  • AKMAN, Toygar, Sibernetik: Dünü, Bugünü, Yarını, Kaknüs Yay., İs- tanbul, 2003.
  • ALFORD, Lione1.D., Cyber Warfare: A New Doctrine and Taxonomy, CrossTalk: The Journal of Defense Software Engineering, Vol. 14 No. 4, Nisan 2001, http://www.ldalford.com/technical_writing.htm, (e.t.02.02.2012).
  • AMATO, Ivan, Lying With Pixels, Seeing is No Longer believing. Tech. Rev., Temmuz 2000, http://www.technologyrevie w.com/Infotech/12115/?a=f,
  • ARKIN, William M., When Seeing and Hearing Isn 't Believing, Wash. Post.Com, 1 Şubat 1999, http://www.washingtonp ost.com/wp-srv/national/ dotmil/arkin020199.htm, (e.t.29.01.2012).
  • A Strategic Approach to Protecting SCADA and Process Control Systems, IBM Global Services, Temmuz 2007, s.1–13, http://www935. ibm.com/services/us/iss/pdf/scada_ whitepaper.pdf, (e.t.28.01.2012).
  • BEAL, Vangie, Webopedia, The Difference Between a Virus, Worm and Trojan Horse, 06.29.2010, Son güncelleme: 03.29.2011, http://www. webopedia.com/DidYouKnow/Internet/2004/virus.asp, (e.t.29.01.2012)
  • BERG, Paul, Air Force Cyber Command: What It Will Do and Why We Need It, Air & Space Power Journal, 20 Şubat 2007, http://www.airpower. au.af.mil/apjinternational/apj-s/2007/1tri07/bergeng.html, (e.t.28.01.2012).
  • BILLO, Charles, Welton Chang, An Analysis of the Means and Motivations of Selected Nations States, Institute For Security Technology Studies At Dartmouth College, Kasım 2004. http://www.ists.dartmouth.edu/ docs/execsum.pdf, (e.t.29.01.2012).
  • BRADLEY, Graham, Washingtonpost.com:Bush Orders Guidelines for Cyber-Warfare, Washington Post, 7 Şubat 2003, http://www.washingtonpost. com/ac2/wpdyn/A381102003Feb6?language=printer, (e.t.28.01.2012).
  • BRADLEY, Tony, Pandora’s Box, Antionline Newsletter #7, Nisan/Mayıs 2003, s.15–16, http://www.Antionline.com/news le tter/aonewsletter7.pdf,
  • BRENNER, Susan W., Leo L. Clarke, Conscription and Cyber Conflict: Legal Issues, 3rd International Conference on Cyber Conflict, CCD COE Publications, Estonia, 2011.
  • BYRES, Eric, The Myths and facts behind Cyber Security Risks for Industrial Control Systems, British Columbia Insti tute Of Technology A Polytechnic Institution, http://www.nealsystems.com/downloads/Myths%2 0and%2 0Facts%20for%20 Control%20System%20Cyber-security.pdf, (e.t.30.01.2012).
  • CAHILL, Thomas P., Konstantin Rozinav ve Christopher Mule, Cyber Warfare Peacekeeping, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Academy, ISBN 0-7803-7808-3/03, 2003.
  • CASSESE, Antonio, International Law, Oxford University Press:2001.
  • CHEN, Thomas M., “Stuxnet, The Real Start of Cyber Warfare?”, IEEE Network, Kasım/Aralık 2010, s.1–3.
  • CLAUSEWITZ, Carl von, On War, (editör ve çeviren: Michael Howard and Peter Paret), Princeton University Press, New Jersey, 1989.
  • COATES, J.F., What’s next? Foreseeable terrorist acts, The Futurist 36 (5), 2002, s.23–26.
  • COLEMAN, Kevin, Department of Cyber Defense, An organization who's time has come , Technolytics, Kasım 2007. http://www.technolytics.com/ Dept of_Cyber_Defense.pdf, (e.t.10.02.2012).
  • COLEMAN, Kevin, Inside DPRK's Unit 121, Defencetech.org., 24 Aralık 2007, 29.01.2012).
  • /24/inside-dprks-unit-121/, (e.t.
  • COLEMAN, Kevin, Russia's Cyber Forces, Defencetech.org., 27 Mayıs 2008, http://defensetech.org/2008/05/2 7/russias-cyber-forces/, (e.t.29.01.2012).
  • COLEMAN, Kevin, The Cyber Arms Race Has Begun, 28 Ocak 2008, s.1–4, http://www.csoonline.com/article/216991/c oleman-the-cyber-arms- race-has-begun, (e.t. 28.01.2012).
  • Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, Yves Sandoz (editör), 1987.
  • Cyberwar The Threat From The Internet, The Economist, 3–9 Temmuz 2010.
  • Çalışma Grubu 4, E-Devlet Uygulamalarında Güvenlik ve Güvenilirlik Yaklaşımları, Türkiye Bilişim Derneği.
  • DAKOFF, Howard S., Note, The Clipper Chip Proposal: Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation, J. Marshall L. Rev., Vol. 29, Num:2, 1996, s.475–479.
  • DAVIS, Brown, A Proposal for an tnternational Convention To Regulate the Use of tnformation Systems in Armed Conflict, Volume 47, Number 1, Winter 2006, s.201–202, http://www.harvardilj.org/wp-content/uploads/ 2010/10/HILJ_47-1_Brown.pdf, (e.t.06.02.2012).
  • DAVIS, Joshua, Hackers take Down the Most Wired Country in Europe, Wired http://www.wired.com/politics/security/magazine/1509/ff_estonia?currentPa ge=all, (e.t.28.01.2012) Magazine: Issue 15.09,
  • DECI, E.L., R.M. Ryan, Intrinsic Motivation and Self-determination in Human Behavior, Plenum Press, New York, 1985, http://www.google.com.tr/ books?hl=tr&lr=&id=p96WmnER4QC&oi=fnd&pg=PA1&dq=Dec i+E.T, +Ryan, +R. M+1985+Intrinsic+Motivation+and+Selfdetermination+in+Human+Behavior &ots=3cGTx2vc onepage&q&f=false, (e.t.29.01.2012).
  • 23&sig=eG5tcI60CDo0grCtd
  • w9xai0Qw38&redir_esc=y#v=
  • DEIBERT, Ron, Rafal Rohuzinski, Tracking GhostNET: Investigating a Cyber Espionage Network, Information Warfare Monitor, JR02–2009, http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a- Cyber-Espionage-Network, (e.t.28.01.2012).
  • DENNING, Dorothy E., Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, 1999, http://www.iwar.org.uk/cyberterror/resources/denning.htm, (e.t. 28.01.2012).
  • DENNING, Dorothy E., Hacktivism: an Emerging Threat to Diplomacy, American Foreign Service Association, 25.06.2007, www.a fsa.org/fsj/sept00/Denning.cfm, (e.t.10.02.2012).
  • DENNING, Dorothy E., Is Cyber Terror Next?, Social Science Research Council, http://essays.ssrc.org/sept11/ essays/denn ing.htm, (e.t.02.02.2012).
  • DODGE, Martin, Rob Kitchin, Mapping Cyberspace, Routledge, London, 2001.
  • DÖRMANN, Knut, Computer Network Attack and International Humanitarian Law, International Committee of the Red Cross, 19 Mayıs 2001, http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm, (e.t.06.02.2012).
  • DROGIN, Bob, Russians seem to be Hacking ınto Pentagon Sensitive information taken-but nothing top secret, Los Angeles Times, 7 Ekim 1999, http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/1999/10/07/MN5855 8.DTL, (e.t. 28.01.2012).
  • ENGİNSOY, Umit, Burak Ege Bekdil, Turkey Raises Emphasis On Cyberspace Defense, Defense News, 15 Ağustos 2011, http://www. defensenews.com/story.php?i=7388376&c=FEA&s=SPE, (e.t. 03.01.2012).
  • ERKİNER, Hakkı Hakan, Devletin Haksız Fiilinden Kaynaklanan Ulusla- rarası Sorumluluğu, 12 Levha Yay., , 1. Baskı, İstanbul, 2010.
  • GRAHAM, Bradley, For a description of hesitancy to use CNA during Operation “Allied Force”, “Military Grappling with Rules for Cyber Warfare: Questions Prevented Use on Yugoslavia”, Washington Post, 8 Ka- sım 011r-110899-idx.html, (e.t. 05.01.2012).
  • GRAHAM, Bradley, Military Grappling With Guidelines For Cyber Warfare; Questions Prevented Use on Yugoslavia, The Washington Post, 8 Kasım 1999, sec. A.
  • GREENBERG, Andy, America’s Hackable Backbone, 08.22.07, http:// www.forbes.com/2007/08/22/scada-hackers-infrastruc cx_ag_0822hack.html, (e.t. 28.01.2012) ture-tech-security
  • GREENBERG, Lawrence t., et al., Information Warfare and International Law 12, National Defense University Press, , 1998. http://www.dodccrp.org/files/Greenberg_Law.pdf, (e.t.06.02.2012).
  • GRYC, Wojciech, Cyber Warfare, Peace Magazine, 2009.
  • GUANG, Pan, The SCO's Success in Security Architecture (highlighting confidence building, cooperation against destabilizing transborder elements, and the maintenance of regional security and stability as general successes of the SCO), http://epress.anu.edu.au/ sdsc/architecture/ mo- bile_devices/ch04.html, (e.t.07.02.2012).
  • HIGGINS, Kelly Jackson, Permanent Denial-of-Service Attack Sabotages Hardware, Dark Reading, 19 Mayıs 2008, http://archive.cert.uni- stuttgart.de/isn/2008/05/msg00102.html, (e.t.29.01.2012).
  • HILDRETH, Steven A., Cyberfare Warfare 11, Congressional Research Service Report http://www.fas.org/irp/crs/RL30735.pdf, (e.t.28.01.2012). Congress For No. RL30735, 19 Haziran 2001.
  • HIRSHLEIFER, J., The bioeconomic causes of war, Managerial and Decision Economics 19 (7/8), 1998, s.457–466, http://time.dufe.edu.cn/ spti/article/hirshleifer/hirshleifer170.pdf, (e.t.29.01.2012).
  • JANCZEWSKI, Lech J., Andrew M. Colarik, Managerial Guide for Handling Cyber-Terrorism and Information Warfare, Idea Group Publishing, The U.S.A, 2005.
  • JENSEN, Eric Talbot, Cyber Warfare and Precautions Against the Effects of Attacks, Texas Law Review, Vol. 88:1533.
  • JONES, Andrew, Cyber Terrorism: Fact or Fiction, Computer Fraud and Security, 2005.
  • JOYNER, C. Christopher, Catherine Lotdonte, Information Warfare as International Coercion: Elements of a Legal Framework, 12 EUR. J. INT'L L. 825–841, 2001. http://www.ejil.Org/pdfs/12/5/1552.pdf (e.t.29.01.2012).
  • KABAY, M. E., Industrial Espionage, Part 8: China and Titan Rain, Network World, 10 Kasım 2005, http://www.networkworld.com/newsletters/ 2005/1107sec2.html?page=2), (e.t.28.01.2012).
  • KANUCK, Sean, Sovereign Discourse on Cyber Conflict Under Intemational Law, Texas Law Review Association, Symposium: Law at the Intersection of National Security, Privacy and Technology: II. Cybersecurity and Network Operations, Vol. 88:1571, 2010.
  • KELSEY, Jeffrey T.G., Hacking into International Humanitarian Law: The Principles of Disdinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review, Vol. 106 No:7, 2008.
  • KNIERIM, Tammy M., Lou Anne DeMattei ve Sebastian M. Convertino, Flying and Fighting in Cyberspace, Maxwell Paper No.40Air War College, Temmuz 2007. http://aupress.au.af.mil/digital/pdf/paper/mp_0040_conve rtino_demattei_knierim_flying_fighting_cyberspace.pdf, (e.t.30.01.2012).
  • LANGNER, Ralph, Stuxnet: Dissecting a Cyberwarfare Weapon, Focus, Mayıs/Haziran 2011.
  • LASKER, John, U.S. Military's Elite Hacker Crew, WIRED, 18 Nisan 2005, http://www.wired.com/politics/security/news/ 2005/04/67223, (e.t. 28.01.2012).
  • LAKHANI, K.R., R.G. Wolf, In: J. Feller, B. Fitzgerald, S. Hissam, K. R. Lakhani (Editörler), Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects, MIT Press, 2005, http://ocwmit.edu/courses/sloan-school-of-management/15-352-managing- innovation-emerging-trends-spring-2005/readings/lakhaniwolf.pdf, (e.t.29.01.2012).
  • LAPPIN, Yaakov, Reuters Admits to More Image Manipulation, YNETNEWS.COM, 7 Ağustos 2006, http://www.ynetn ews.com/articles/0, 7340, L-3287774, 00.html, (e.t.29.01.2012).
  • LEWIS, James A., Computer Espionage, Titan Rain and China, Center for Strategic and International Studies - Technology and Public Policy Program, Aralık 2005, s.1–2, http://csis.org/files/media/csis/pubs/051214_china _titan_rain. pdf, (e.t. 28.01.2012).
  • LEYDEN, John, ‘Electronic Jihad’ fails to materialise, 26 Ağustos 2004, http://www.theregister.co.uk/2004/0 8/26/cyberfu d/, (e.t.02.02.2012).
  • LIANG, Qiao, Wang Xiangsui, Unrestricted Warfare, Beijing: PLA Literature and Arts Publishing House, Şubat 1999, http://cryptome.org/ cuw.htm, (e.t.02.02.2012).
  • LIBICKI, Martin C., Cyberdeterrence and Cyberwar, Rand Corporation, The U.S.A, 2009.
  • LIBICKI, Martin, What is Information Warfare, Strategic Forum 28, Institute for National Strategic, Studies, Mayıs 1995, http://www.dtic.mil/cgi- bin/GetTRDoc?AD=ADA394692, (e.t.02.02.2012).
  • LINDENBERG, S., Intrinsic motivation in a new light, Kyklos 54 (2/3), 2001, 2001_LindenbergIntrinsic_motivation_in_a_new_light.pdf, (e.t.29.01.2012).
  • http://www.ppsw.rug.nl/~lindenb/documents/articles/
  • MILLS, Elinor, Google wants ability to 'combine' your user data, CNET News, 25 Ocak 2012, http://www.zdnetasia.com /google-wants-ability- to-combine-your-user-data-62303592.htm, (e.t. 28.01.2012).
  • MILLS, Elinor, Report: Turkish hackers breached U.S. Army servers, Mayıs 29 2009,
  • http://news.cnet.com/8301-1009_3-10252375-83.html,
  • ÖZKIŞLALI, Gizem, Küreselleşme, İnternet ve Terörizmin Değişen Yüzü; Siber Terörizm, Yüksek Lisans Tezi, Ankara, 2008.
  • PARKS, Raymond C., David P. Duggan, Principles of Cyber-warfare, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5–6 Haziran 2001, http://www.periwork.com/peri_db/wr_db/2004_May_11_11_30_41/DOCS%20 WEBREVIEW/P rinciplesCYBER%20WARFARE.pdf, (e.t.02.02.2012).
  • POWER, Richard, Dario Forte, “Ten years in the wilderness—a retrospective Part 2: Cyber Security = National Security”, Computer Fraud&Security: War&Peace in Cyberspace, Şubat 2006.
  • RHO, Jennifer J., Blackbeards of the Twenty-First Century: Holding Cybercriminals Liable under the Alien Tort Statute, 7 Cffl. J. INT'L L.695, 2006–2007.
  • ROSENZWEIG, Paul, National Security Threats in Cyberspace 2, 2009, http://www.americanbar.org/content/dam/ab a/migrated/natsecurity/ threats_in_cyberspace.authcheckdam.pdf, (e.t.07.02.2012).
  • SCHAAP, Arie J., Cyber Warfare Operations: Development and Use Under International Law, Air Force Law Review, Vol. 64, 2009.
  • SCHMITT, Michael N., Wired warfare: Computer network attack and jus in bello, RICR Juin IRRC Haziran 2002 Vol. 84 No. 846. http://www.icrc.org/eng/assets/files/other/365_400_schmitt.pdf,
  • SCHWARTZ, Peter, Warrior in the Age of Intelligent Machines, Wired Magazine, Nisan 1995, http://www.wired.com/wire d/archive/3.04/pentagon_ pr.html, (e.t.02.02.2012).
  • SCOTT, Roger D., Territorially Intrusive Intelligence Collection and International Law, 46 A.F. L. Rev. 217, 1999.
  • SHARMA, Amit, “Cyber Wars: A Paradigm Shift from Means to Ends”, Strategic Analysis, 34:1, 2010, http://dx.doi.org/10.1080/ 09700160903354450,
  • SHAY, Shaul, Netwars and Networks, Mark Last ve Abraham Kandel (editör), Fighting Terror in Cyberspace içinde (33), World Scientific Publishing, The U.S.A, 2005.
  • SINROD, Eric J., William P. Reilly, Cyber-Crimes: A Practical Approach To The Application Of Federal Computer Crime Laws, Santa Clara University School of Law, Volume 16, Num.2, Mayıs 2000, s.12–16, http://www.sinrodlaw.com/CyberCrime.pdf, (e.t.29.01.2012).
  • SPIEKER, Heike, Civilian Immunity, in Crımes of War 84, 84 (Roy Gutman & David Rieff eds. 1999), s.84, http://www.crimesofwar.org/a-z- guide/civilian-immunity/, (e.t.14.02.2012).
  • STRELSOV, A.A., International information security: description and legal aspects, icts and international security. http://www.peacepalacelibrary.nl/ ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.10.02.2012).
  • STRELTSOV, A.A., International Information Security: Description and Legal Aspects, DISARMAMENT F., 2007 (Issue 3). http://www.peace palacelibrary.nl/ebooks/files/UNIDIR_pdf-art2642.pdf, (e.t.08.02.2012).
  • Sun Tzu, The Art of War, çeviren: Samuel B. Griffith, Oxford University Press, Oxford, 1963.
  • SWARTZ, Jon, Crooks slither into Net's shady nooks and crannies; Crime explodes as legions of strong-arm thugs, sneaky thieves log on, USA Today, 21 Ekim 2004, www.usatoday.com/printedition/money/200410 21/cybercrimecover.art. htm, (e.t.10.02.2012).
  • TÜTÜNCÜ, Ayşe Nur, İnsancıl hukuka Giriş, Beta Yay., İstanbul, 2006.
  • TRAYNOR, Ian, Russia accused of unleashing cyberwar to disable Estonia, The Guardian, http://www.guardian.co.uk/wo rl d/2007/may/17/ topstories3.russia, (e.t. 28.01.2012)
  • TREMLETT, Giles, Turkish arrests intensify global war between hac- activists ker and http://www.guardian.co.uk/technology/2011/jun/13/ turkish-arrests-global- The war-hackers-police, (e.t. 03.01.2012). police, Guardian, 13 Haziran 2011,
  • Türk Asya Stratejik Araştırmalar Merkezi, Siber Terörizm Raporu, Stratejik Rapor No: 2 Aralık 2004.
  • Türkçe Sözlük, Türk Dil Kurumu, 9. Baskı, Ankara, 1998.
  • UZUN, Elif, Milletlerarası Hukuka Aykırı Eylemlerinden Dolayı Devletin Sorumluluğu, Beta Yay., 1. Basım, İstanbul, 2007.
  • VERTON, Dan, Lack of Incident Reporting Slows Cybercrime Fight, 31 Ekim 2002, http://computerworld.com/securityto pics/security/cybercrime/ story/0, 10801, 75532, 00.html, (e.t.10.02.2012).
  • WALKER, George K., Information Warfare and Neutrality, Vanderbilt Journal of Transnational Law, 2000, http://findarticl es.com/p/articles/ mi_hb3577/is_5_33/ai_n28809531/, (e.t.06.02.2012).
  • WALKER, Jeffrey K., The Demise of the Nation-State, The Dawn of New Paradigm Warfare, and a Future for the Profession of Arms, 51 A.F. L. REV. 323, 2001, s.337–38, http://www.afjag.af.mil/shared/media/docum ent/AFD-081204-028.pdf, (e.t.06.03.2012). WATTS, Sean,
  • Combatant Status and Computer Network Attack, 3
  • Ağustos 2009, Virginia Journal of International Law, Vol. 50, No. 2, s. 392–393,
  • 2010, http://ssrn.com/abstract=1460680, (e.t.08.02.2012).
  • WEARDEN, Graeme, Cyberterrorists poised to attack', warns Labour peer, 28 Nisan 2005, http://www.silicon.com/tec h nology/security/2005/ 04/28/cyberterrorists-poised-to-attack-warns-labour-peer-391 (e.t.02.02.2012). 29961/,
  • WLINGFIELD, Thomas C., The Law Of Information Conflict: National Security Law In Cyberspace 17, Aegis Research Corp., 2000.
  • WILLIAMS, P., Organized crime and cybercrime: synergies, trends, and responses, 13 Ağustos 2001, Office of International Information Programs, U.S. Department of State, http://usinfo.state.gov, (e.t.05.01.2012).
  • WILSON, Clay, Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, Order Code RL32114, 17 Ekim 2003. http://fpc.state.gov/documents/organization/451 84.pdf, (e.t.02.02.2012).
  • WOLTAG, Johann-Christoph, Cyber Warfare, Max Planck Encyclopedia of Public International Law, Rüdiger Wolfrum (editör), Oxford University Press, 2010.
  • ELEKTRONİK KAYNAKLAR
  • Air Force Policy Directive 10–7, 6 Eylül 2006, http://www. survivalebooks.com/free%20manuals/2006%20US INFORMATION%20OPERATIONS%2027p.pdf, (28.01.2012). %20Air%20Force%20
  • A Proposal for an International Convention on Cyber Crime and Terrorism, cybercrime/stanford/cisac-draft.htm, (e.t.02.02.2012). 2000,
  • http://www.iwar.org.uk /law/resources/
  • Birleşmiş Milletler Antlaşması (BM Şartı), http://www.belgenet.com/ arsiv/sozlesme/bmsarti-01.html, (e.t.30.01.2012).
  • CERT Coordination Center, http://www.cert.org/tech_tips/denial_of_ service.html, (e.t.29.01.2012).
  • Convention on Cybercrime, Council of Europe, http://conventions. coe.int/ Treaty/en/Treaties/html/185.htm, (e.t.30.01.2 012).
  • Convention on Prohibitions or Restrictions on tbe Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects, 10 Ekim 1980, S, TREATY Doc. No. 103– 25 (1994). 1342 U.N.T, S. 137, http://www.icrc.org/eng/resources/ documents/publication/p0811.htm, (e.t.08.02.2012).
  • Convention Conceming the Rights and Duties of Neutral Powers in Naval War, madde 10, 18 Ekim 1907, http://www.icr c.org/ihl.nsf/FULL/240,
  • Convention (III) relative to the Treatment of Prisoners of War. Geneva, 12 Ağustost 1949, madde 4 (A) (2), http://www.icrc.org/ihl.nsf/ FULL/375, (e.t.07.02.2012).
  • Convention (IV) relative to the Protection of Civilian Persons in Time of War, Geneva, 12 August 1949, madde 28, http://www.icrc.org/ ihl.nsf/full/380, (e.t.07.02.2012).
  • Convention (V) respecting the Rights and Duties of Neutral Powers and Persons in Case of War on Land, The Hague, 18 Ekim 1907, http://www.icrc.org/ihl.nsf/full/200?opendocument, (e.t.06.02.2012).
  • Council of Europe, Convention on Cybercrime, opened for signature:11 Kasım 2001, Europ. T.S. No. 185, http://conve ntions.coe.int/treaty/en/ treaties/html/185.htm, (e.t.07.02.2012).
  • Creation of a Global Culture of Cybersecurity and the Protection of Critical Information Infrastructures, United Nations General Assembly, A/RES/58/199, Fifty-eighth session, 30 January 2004, http://www.itu.int/ ITU-D/cyb/cybersecurit y/docs/UN_resolution_58_199.pdf, (e.t.12.02.2012).
  • Department of Defense, Dictionary of Military and Associated Terms Joint Publication 1–02, (JP 3–13), http://www.dtic.mil/doctrine/new_pubs/ jp1_02.pdf, (e.t. 28.01.2012).
  • Department. of the Air Force, Policy Directive 51–4, Compliance with the law of armed conflıct, 1993, .http://www.icrc.org/ihlnat.nsf/6fa4d35 e5e3025394125673e00508143/cfaff63edde42523c1256a8e00342cfb OpenDoc ument, (e.t.06.02.2012).
  • Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia, 8 Haziran 2000, 39 I L M 1257., http://www.icty.org/sid/10052,
  • Geneva Convention Relative To The Treatment Of Prisoners Of War of 12 Ağustos 1949 (Geneva Convention III), http://protection.unsudanig.org/ data/legal/Third%20Geneva%20Convention%20 (e.t.02.02.2012). (POW), %2019 49.pdf,
  • Hacker Attacks in US Linked to Chinese Military: Researchers, 12 Aralık 2005, http://seclists.org/isn/2005/ Dec/0059.html, (e.t.29.01.2012).
  • http://daccess-dds- ny.un.org/doc/UNDOC/GEN/N03/506/52/PDF/N0350652.pdf?OpenElement, (e.t.31.01.2021).
  • http://www.digitalbroadcasting.com/storefronts/pvimage.html,
  • http://www.fbi.gov/publications/leb/2002/june2002/june02leb.htm, (e.t.10.02.2012).
  • http://www.itu.int/net/about/basic-texts/constitution/chaptervi.aspx, (e.t.31.01.2012).
  • http://meeting.afrinic.net/afrinic- 11/slides/aaf/Estonia_cyber_attacks_2007_latest.pdf, (e.t. 28.01.2012).
  • http://www.un.org/en/ecosoc/cybersecurity/maurer-cyber-norm-dp- 2011-11.pdf, (e.t.31.01.2012).
  • ICRC, International Humanitarian Law - Treaties & Documents, http://www.icrc.org/ihl.nsf/WebART/1952 00034?Ope nDocument,
  • Information Assurance – the Achilles’ Heel of Joint Vision 2010?, 2 Mart 1999, http://www.airpower.au.af. mil/airchr onicles/cc/ashley.html, INTERPOL, Secure https://www.interpol.int/Public/ICPO/corefunct (e.t.06.02.2012). Global Police
  • Communications ions/secu recom.asp,
  • Introduction to Computer Viruses, S0PH0S.COM, 26 Mayıs 1998, http://www.sophos.com/en-us/press-office/press- releases/1998/05/va_virusesintro.aspx, (e.t.29.01.2012).
  • Joint Chiefs Of Staff, Joint Publication 1-02, Department Of Dhf. Directive Of Military &Assoc'D Terms, 12 Nisan 2001, s.190, http://www. bits.de/NRANEU/others/jp-doctrine/jp1_02 (01).pdf, (e.t.29.01.2012).
  • Joint Doctrine for Information Operations, Joint Pub. 3–13, 9 Ekim 1998, s.1–136, http://www.c4i.org/jp3_13.pdf(e.t.29.01.2012).
  • Joint Publication 3–13, Information Operations, 13 Şubat 2006, http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf, (e.t.30.01.2012).
  • Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257, July 8, http://ww w.icj-cij.org/docket/index.php? p1=3&p2=4&k=e1&p3=4&case=95, (e.t.14.02.2012).
  • M/Cyclopedia of New Media, Digital Manipulation, http://www. fourandsix.com/photo-tampering-history/, (e.t.29.01.2012).
  • Official Records Of The Diplomatic Conference on the Reaffirmation and Development of International Humanitarian Law Applicable in Armed Conflicts, Volume 1, Federal Political Department, (Geneva, 1974 -1977), Bern, 1978, (e.t.11.02.2012).
  • On Bush's Watch, U.S. Suffered Its "Electronic Pearl Harbor, 3.18.2010, Güncelleme: 5.25.2011, http://www.huffingt onpost.com/2009/ 11/10/on-bushs-watch-us-suffere_n_352204.html, (e.t.30.01.2012). Photo Alteration,
  • http://www.espionageinfo.com/Pa-Po/Photo
  • Alteration.html, (e.t.10.02.2012).
  • Photo Tampering throughout History, http://www.fourandsix.com/ photo-tampering-history/, (e.t.29.01.2012).
  • Proceedings of European Conference on Information Warfare and Security 2002, 2003, http://books.google. com.tr/b ooks?hl=tr&id=EvsP IeM4w5AC&q=cyber#v=onepage&q=conferences&f=false, (e.t.02.02.2012).
  • Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), 8 Haziran 1977, http://www.icrc.org/ihl.nsf/full/470?op endocument, (e.t.07.02.2012).
  • Reducing On-line Credit Card Fraud, Web Developers Journal, http://www.webdevelopersjournal.com/article s/card_fra ud.html, (e.t.10.02.2012).
  • Report of the International Law Commission on the work of its fifty- third session, DOCUMENT A/56/10, madde 1, (23 Nisan–1 Haziran ve 2 Temmuz–10 Ağustos 2001), http://untreaty.un.org/ilc/reports/2001/200 1report.htm, (e.t.13.02.2012).
  • SearchSecurity.com, Definitions, IP Spoofing, http://searchsecurity. techtarget.com/definition/IP-spoofing, (e.t.29.01.2012).
  • SearchSecurity.com, Trojan Horse,
  • http://searchsecurity.
  • techtarget.com/definition/Trojan-horse, (e.t.29.01.2012)
  • Security for the Next Generation, The National Security of the United Kingdom, Güncelleme:2009, Cabinet Office, Haziran 2009, http://www.official- documents.gov.uk/document/cm75/7590/7590.pdf, (e.t.02.02.2012).
  • Statute of the International Law Commission, 1947, http://untreaty. un.org/ilc/texts/instruments/english/statute /statute_ e.pdf, (e.t.07.02.2012).
  • Techterms.com, The Tech Terms Computer Dictionary, Malware, http://www.techterms.com/definition/malwar e, (e.t.29.01.2012).
  • The Guardian, 15 Ağustos 2003, http://www.guardian.co.uk/news/ 2003/aug/15/informer, (e.t.02.02.2012).
  • The Secretary-General, Developments in the Field of Information and Telecommunications in the Context of International Security, delivered to the http://www.disarmament. un.org/library.../a-62-98.pdf, (e.t.08.02.2012).
  • The White House, Remarks By The President On Securing Our Nation’s Cyber Infrastructure, Office of the Press Secretary, 29 Mayıs 2009, http://www.whitehouse.gov/the-press-office/remarks-president-securing-our- nations-cyberinf rastructure, (e.t.29.01.2012).
  • Turkey conducts cyber terror drill, Hurriyet Daily News, 27 Ocak 2011, terror-drill-2011-01-27, (e.t. 03.01.2012). y-conducts-cyber
  • U.S. Department Of Defence, Information Operations Roadmap 1, 30 Ekim 2003, s.1–72, http://www.gwu.edu/~nsarc hiv/NSAEBB/NSAEBB177/ info_ops_roadmap.pdf, (e.t.28.01.2012).
  • U.S. Department of Defense, Directive IR. 3600.1, Information Operations, 14 Ağustos 2006, http://www.Fas.org/irp/do ddir/dod/info_ops.pdf,
  • White House. Cyberspace Policy Review, 2009, http://www. whitehouse.gov/assets/documents/Cyberspace _Pol icy _ Review_final.pdf,
  • 12 Ağustos 1949 Tarihli Cenevre Sözleşmelerine Ek Uluslararası Si- lahlı Çatışmaların Kurbanlarının Korunmasına İlişkin (1) No.lu Protokol, 8 Haziran 1977, http://www.kizilay.org.tr/hukuk/sayf a_yazdir.php?t=-Ulu- sal.ve.Uluslararasi.Sozl esmeler-CENEVRE.EK.1.PROTOKOL, (e.t.06.02.2012).
There are 164 citations in total.

Details

Primary Language Turkish
Journal Section Public Law
Authors

Şeyda Türkay This is me

Publication Date August 16, 2013
Published in Issue Year 2013 Volume: 71 Issue: 1

Cite

APA Türkay, Ş. (2013). SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI. Journal of Istanbul University Law Faculty, 71(1), 1177-1227.
AMA Türkay Ş. SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI. Journal of Istanbul University Law Faculty. August 2013;71(1):1177-1227.
Chicago Türkay, Şeyda. “SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI”. Journal of Istanbul University Law Faculty 71, no. 1 (August 2013): 1177-1227.
EndNote Türkay Ş (August 1, 2013) SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI. Journal of Istanbul University Law Faculty 71 1 1177–1227.
IEEE Ş. Türkay, “SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI”, Journal of Istanbul University Law Faculty, vol. 71, no. 1, pp. 1177–1227, 2013.
ISNAD Türkay, Şeyda. “SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI”. Journal of Istanbul University Law Faculty 71/1 (August 2013), 1177-1227.
JAMA Türkay Ş. SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI. Journal of Istanbul University Law Faculty. 2013;71:1177–1227.
MLA Türkay, Şeyda. “SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI”. Journal of Istanbul University Law Faculty, vol. 71, no. 1, 2013, pp. 1177-2.
Vancouver Türkay Ş. SİBER SAVAŞ HUKUKU VE UYGULANMA SORUNSALI. Journal of Istanbul University Law Faculty. 2013;71(1):1177-22.