BibTex RIS Cite
Year 2018, Volume: 3 Issue: 1, 12 - 20, 01.01.2018

Abstract

References

  • Aslan, M. Y. (2008). Savaş hukukunun temel prensipleri. Türkiye Barolar Birliği dergisi, 79, 470.
  • Boothby, W. H. (2015). Deception in the modern, cyber battlespace. In J. D. Ohlin, K. Govern and C. Finkelstein (Eds.), Cyberwar: Law and ethics for virtual conflicts. New York: Oxford University Press, 195-214.
  • CACI International. (2008). Dealing with today's asymmetric threat to US and global security. CACI International. 12.
  • Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. O'Reilly Media, Inc., 176.
  • Caso, J. S. (2014, June). The rules of engagement for cyber-warfare and the Tallinn Manual: A case study. Paper Presented at the IEEE 4th Annual International Conference, Hong Kong, China.
  • Cordesman, A. (July 2006). Iran’s Support of the Hezbollah in Lebanon, Center for Strategic and International Studies, 15.
  • Dinniss, H. (2012). Cyber Warfare and the Laws of War. New York: Cambridge University Press, 265.
  • Dinstein, Y. (1995).War, Agression and Self- Defense, (2. Baskı) New York, Cambridge Univ. Press
  • Follath, E. and Stark, H. (2009). How Israel Destroyed Syria’s Al Kibar Nuclear Reactor. Spiegel Online, 11.
  • Gamreklidze, E. (2014). Cyber security in developing countries, a digital divide issue: The case of Georgia. Journal of International Communication, 20(2), 200- 217.
  • General Petraeus’un 1 Ağustos 2010 tarihinde Afganistan Komutanı olarak yayınlandığı emir (2017), Retrieved from: http://www.isaf.nato.int/from-the-commander/from-the-commander/comisaf-s-counterinsurgency-guidance.html. 02.02.2017
  • Greenberg, A. (2012). Shopping for Zero-Days: A Price List for Hackers Secret Software Exploits, Forbes, Retrieved from: www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price- list-for-hackerssecret-software-exploits/ 15.03.2017
  • European Union. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, Retrieved from: www.ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1667 15.03.2017
  • Gürcan, M. (2012). Savaşın Evrimi ve Teorik Yaklaşımlar, A. Sandıklı(Ed.), Teoriler ışığında Güvenlik, savaş, barış ve Çatışma Çözümleri, İstanbul, Bilgesam Yayınlar, 71-133
  • Hammes, T.X. (2004). The Sling and the Stone: On War in the 21st Century, St. Paul: MN Zenith Press, 321.
  • Kazemzadeh, M. (2007). Ahmedinejad’s Foreign Policy, Comparative Studies of South Asia, Africa and the Middle East, 27(2), 446.
  • Langner, R. (2013). To kill a centrifuge: A technical analysis of what Stuxnet’s creators tried to achieve, Retrieved from: http://www.langner.com/en/wp- content/uploads/2013/11/To-kill-a-centrifuge, 19.12.2017.
  • Lind, W.S., Nightengale, K., K. Schmitt J. F. and Sutton J. W. (Ekim 1989). The Changing Face of War: Into the Fourth Generation, Marine Corps Gazette, 22-26.
  • Lucas, G. R. (2016). Emerging norms for cyberwarfare. In F. Allhoff, A. Henschke and B. J. Strawser (Eds.), Binary bullets: The ethics of cyberwarfare. New York: Oxford University Press, 13-33.
  • Luvaas, J. (2001). Napoleon On the Art of War (New York: The Free Press), 99-120.
  • Mansfield-Devine, S. (2012). Estonia: what doesn't kill you makes you stronger. Network security,7, 12-20.
  • Oppenheim, L. (1906). International Law – A Treatise. Volume II: War and Neutrality Longmans, Greenand Corporation, London, 56.
  • Paletta, D., Yadron, D. And Valentino-Devries, J. (October 2015). Cyberwar ignites a new arms race: Dozens of countries amass cyberweapons, reconfigure militaries to meet threat. The Wall Street Journal. Retrieved from: http://www.wsj.com/articles/cyberwar- ignites-a-new-arms-race-1444611128. 21.02.2012
  • Polityuk, P. (2016). Ukraine sees Russian hand in cyber-attacks on power grid. Reuters, http://www.reuters.com/article/us- ukrainecybersecurity-idUSKCN0VL18E, 21.02.2017.
  • Raitasalo, J. (2005). The western war picture after the Cold War, in Jyri Raitasalo and Joonas Sipilä (eds), Variable war. National Defence University: Helsinki, 101–125.
  • Rid, T. (2013). Cyber war will not take place. Journal of strategic studies, 35(1), 5- 32.
  • Sanger, D. E. (2012). Obama order sped up wave of cyberattacks against Iran. The New York Times. Retrieved from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran.html?_r=0, 19.12.2017.
  • Singer, P. and Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press, 160-165.
  • Symantec(2010), Retrieved from BBC News, Retrieved at 03.02.2017 from www.news.bbc.co.uk/2/hi/americas/1540544.stm
  • Turcan, M.& Ozpinar, N. (2009). “Who let the dogs out?”: A critique of the security for hire option in weak states. Dynamics of Asymmetric Conflict, 2(3), 143-171.
  • Valo, J. (2014). Cyber Attacks and the Use of Force in International Law. Master Thesis, University of Helsinki, Faculty of Law, Helsinki, 12.
  • War in the Fifth Domain; Are the mouse and keyboard the new weapons of conflict? The Economist (2010). Retrieved from: http://www.economist.com/node/16478792. 19.02.2017
  • Whetham, D. (2016). Cyber Chevauchees: Cyber war can happen. In F. Allhoff, A. Henschke and B. J. Strawser (Eds.), Binary bullets: The ethics of cyberwarfare. New York: Oxford University Press, 75-88.
  • Zenko, M. (March-April 2011). The Future of War,Foreign Policy, 56-71.

Evolution of War and Cyber Attacks in the Concept of Conventional Warfare

Year 2018, Volume: 3 Issue: 1, 12 - 20, 01.01.2018

Abstract

Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

References

  • Aslan, M. Y. (2008). Savaş hukukunun temel prensipleri. Türkiye Barolar Birliği dergisi, 79, 470.
  • Boothby, W. H. (2015). Deception in the modern, cyber battlespace. In J. D. Ohlin, K. Govern and C. Finkelstein (Eds.), Cyberwar: Law and ethics for virtual conflicts. New York: Oxford University Press, 195-214.
  • CACI International. (2008). Dealing with today's asymmetric threat to US and global security. CACI International. 12.
  • Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. O'Reilly Media, Inc., 176.
  • Caso, J. S. (2014, June). The rules of engagement for cyber-warfare and the Tallinn Manual: A case study. Paper Presented at the IEEE 4th Annual International Conference, Hong Kong, China.
  • Cordesman, A. (July 2006). Iran’s Support of the Hezbollah in Lebanon, Center for Strategic and International Studies, 15.
  • Dinniss, H. (2012). Cyber Warfare and the Laws of War. New York: Cambridge University Press, 265.
  • Dinstein, Y. (1995).War, Agression and Self- Defense, (2. Baskı) New York, Cambridge Univ. Press
  • Follath, E. and Stark, H. (2009). How Israel Destroyed Syria’s Al Kibar Nuclear Reactor. Spiegel Online, 11.
  • Gamreklidze, E. (2014). Cyber security in developing countries, a digital divide issue: The case of Georgia. Journal of International Communication, 20(2), 200- 217.
  • General Petraeus’un 1 Ağustos 2010 tarihinde Afganistan Komutanı olarak yayınlandığı emir (2017), Retrieved from: http://www.isaf.nato.int/from-the-commander/from-the-commander/comisaf-s-counterinsurgency-guidance.html. 02.02.2017
  • Greenberg, A. (2012). Shopping for Zero-Days: A Price List for Hackers Secret Software Exploits, Forbes, Retrieved from: www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price- list-for-hackerssecret-software-exploits/ 15.03.2017
  • European Union. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, Retrieved from: www.ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1667 15.03.2017
  • Gürcan, M. (2012). Savaşın Evrimi ve Teorik Yaklaşımlar, A. Sandıklı(Ed.), Teoriler ışığında Güvenlik, savaş, barış ve Çatışma Çözümleri, İstanbul, Bilgesam Yayınlar, 71-133
  • Hammes, T.X. (2004). The Sling and the Stone: On War in the 21st Century, St. Paul: MN Zenith Press, 321.
  • Kazemzadeh, M. (2007). Ahmedinejad’s Foreign Policy, Comparative Studies of South Asia, Africa and the Middle East, 27(2), 446.
  • Langner, R. (2013). To kill a centrifuge: A technical analysis of what Stuxnet’s creators tried to achieve, Retrieved from: http://www.langner.com/en/wp- content/uploads/2013/11/To-kill-a-centrifuge, 19.12.2017.
  • Lind, W.S., Nightengale, K., K. Schmitt J. F. and Sutton J. W. (Ekim 1989). The Changing Face of War: Into the Fourth Generation, Marine Corps Gazette, 22-26.
  • Lucas, G. R. (2016). Emerging norms for cyberwarfare. In F. Allhoff, A. Henschke and B. J. Strawser (Eds.), Binary bullets: The ethics of cyberwarfare. New York: Oxford University Press, 13-33.
  • Luvaas, J. (2001). Napoleon On the Art of War (New York: The Free Press), 99-120.
  • Mansfield-Devine, S. (2012). Estonia: what doesn't kill you makes you stronger. Network security,7, 12-20.
  • Oppenheim, L. (1906). International Law – A Treatise. Volume II: War and Neutrality Longmans, Greenand Corporation, London, 56.
  • Paletta, D., Yadron, D. And Valentino-Devries, J. (October 2015). Cyberwar ignites a new arms race: Dozens of countries amass cyberweapons, reconfigure militaries to meet threat. The Wall Street Journal. Retrieved from: http://www.wsj.com/articles/cyberwar- ignites-a-new-arms-race-1444611128. 21.02.2012
  • Polityuk, P. (2016). Ukraine sees Russian hand in cyber-attacks on power grid. Reuters, http://www.reuters.com/article/us- ukrainecybersecurity-idUSKCN0VL18E, 21.02.2017.
  • Raitasalo, J. (2005). The western war picture after the Cold War, in Jyri Raitasalo and Joonas Sipilä (eds), Variable war. National Defence University: Helsinki, 101–125.
  • Rid, T. (2013). Cyber war will not take place. Journal of strategic studies, 35(1), 5- 32.
  • Sanger, D. E. (2012). Obama order sped up wave of cyberattacks against Iran. The New York Times. Retrieved from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran.html?_r=0, 19.12.2017.
  • Singer, P. and Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press, 160-165.
  • Symantec(2010), Retrieved from BBC News, Retrieved at 03.02.2017 from www.news.bbc.co.uk/2/hi/americas/1540544.stm
  • Turcan, M.& Ozpinar, N. (2009). “Who let the dogs out?”: A critique of the security for hire option in weak states. Dynamics of Asymmetric Conflict, 2(3), 143-171.
  • Valo, J. (2014). Cyber Attacks and the Use of Force in International Law. Master Thesis, University of Helsinki, Faculty of Law, Helsinki, 12.
  • War in the Fifth Domain; Are the mouse and keyboard the new weapons of conflict? The Economist (2010). Retrieved from: http://www.economist.com/node/16478792. 19.02.2017
  • Whetham, D. (2016). Cyber Chevauchees: Cyber war can happen. In F. Allhoff, A. Henschke and B. J. Strawser (Eds.), Binary bullets: The ethics of cyberwarfare. New York: Oxford University Press, 75-88.
  • Zenko, M. (March-April 2011). The Future of War,Foreign Policy, 56-71.
There are 34 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Huseyin Kuru This is me

Publication Date January 1, 2018
Published in Issue Year 2018 Volume: 3 Issue: 1

Cite

APA Kuru, H. (2018). Evolution of War and Cyber Attacks in the Concept of Conventional Warfare. Journal of Learning and Teaching in Digital Age, 3(1), 12-20.

Journal of Learning and Teaching in Digital Age 2023. © 2023. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. 19195

Journal of Learning and Teaching in Digital Age. All rights reserved, 2023. ISSN:2458-8350