Research Article
BibTex RIS Cite

Değişen Nesne Kavramı ve Silahlı Çatışma Hukukunda Verilerin Hedef Alınması

Year 2021, Volume: 27 Issue: 2, 1298 - 1313, 03.12.2021
https://doi.org/10.33433/maruhad.994306

Abstract

Nesne kavramı, küçük adımlar atılarak değişmektedir. Her ne kadar Silahlı Çatışma Hukuku kapsamında ‘veri’nin nesne olup olmadığı üzerinde bir belirsizlik olsa da bunun niteliği farklı perspektiflerden bu makalede tartışılacaktır. Olan hukuku (lex lata) temel alan bakış açısı lafzi yorum metodunun etkisiyle ‘veri’yi nesne olarak kabul etmezken olması gereken hukuku (lex ferenda) temel alan bakış açısı farklı bir şekilde yaklaşmakta ve teleolojik yorum metodunu dikkate alarak ‘veri’yi nesne olarak kabul etmektedir. Son bir bakış açısı olarak, devletler ve uluslararası kuruluşlar tarafından hazırlanan resmî belgelerden örnekler verilerek, devlet uygulamasının ikinci yaklaşıma doğru ilerlediği gösterilecektir. Bu noktada, bu makalede verinin nesne olduğu değil, nesne olarak kabul edilmeye doğru evrildiği ispatlanacaktır.

References

  • Hague Convention IX of 1907 Concerning Bombardment by Naval Forces in Time of War
  • HPCR Manual on International Law Applicable to Air and Missile Warfare (Bern, 15 May 2009)
  • Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (adopted 8 June 1977, entered into force 7 December 1978) 1125 UNTS 3
  • Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare (December 1922 - February 1923)
  • Schmitt MN, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press 2017)
  • US Department of Defence, Law of War Manual (2015)
  • Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Croatia v. Serbia) (Judgment) [2015] ICJ Rep 3
  • UNGA ‘Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security' UN Doc A/74/120 (24 June 2019)
  • UNGA ‘Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security' UN Doc A/70/174 (22 July 2015)
  • Germany, ‘On the Application of International Law in Cyberspace’ <https://www.auswaertiges-amt.de/blob/2446304/2ae17233b62966a4b7f16d50ca3c6802/on-the-application-of-international-law-in-cyberspace-data.pdf> accessed 19 March 2021
  • ‘International Security & Cyberspace - Australia’s International Cyber Engagement Strategy’ <https://www.dfat.gov.au/publications/international-relations/international-cyber-engagement-strategy/aices/chapters/part_4_international_security_and_cyberspace.html> accessed 20 April 2020
  • Ministère des Armées, ‘International Law Applied to Operations in Cyberspace’ <https://www.defense.gouv.fr/content/download/567648/9770527/file/international+law+applied+to+operations+in+cyberspace.pdf> accessed 4 April 2020
  • ‘The Department of Defense Cyber Strategy’ (The Department of Defense 2015)
  • Biller J and Schmitt MN, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 International Law Studies 179
  • Boothby WH, The Law of Targeting (Oxford University Press 2012)
  • Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare (Program on Humanitarian Policy and Conflict Research at Harvard University 2010)
  • Dinniss HAH, ‘The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives’ (2015) 48 Israel Law Review 39
  • Dinniss HH, Cyber Warfare and the Laws of War (Cambridge University Press 2012)
  • Dörmann K, ‘Applicability of the Additional Protocols to Computer Network Attacks’ <https://www.icrc.org/en/doc/assets/files/other/applicabilityofihltocna.pdf> accessed 3 April 2020
  • Droege C, ‘Get off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 International Review of the Red Cross 533
  • Fleck D, ‘Searching for International Rules Applicable to Cyber Warfare—A Critical First Assessment of the New Tallinn Manual’ (2013) 18 Journal of Conflict and Security Law 331
  • Geiss R, ‘The Conduct of Hostilities in and via Cyberspace’, Proceedings of the ASIL Annual Meeting (Cambridge University Press 2010)
  • Gisel L, Rodenhäuser T and Dörmann K, ‘Twenty Years on: International Humanitarian Law and the Protection of Civilians against the Effects of Cyber Operations during Armed Conflicts’ [2020] International Review of the Red Cross 1
  • Hollis, DB, International Law and State Cyber Operations: Improving Transparency, OEA/Ser.Q, CJI/doc 603/20 (5 March 2020)
  • ——, International Law and State Cyber Operations: Improving Transparency, OEA/Ser.Q, CJI/doc 615/20 (7 August 2020)
  • Kilovaty I, ‘Virtual Violence-Disruptive Cyberspace Operations as Attacks under International Humanitarian Law’ (2016) 23 Mich. Telecomm. & Tech. L. Rev. 113
  • Lubell N, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 International Law Studies 252
  • Mačák K, ‘Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law’ (2015) 48 Israel Law Review 55
  • Maurer T, Levite A and Perkovich G, ‘Toward A Global Norm Against Manipulating the Integrity of Financial Data’ (Carnegie Endowment for International Peace 2017)
  • Mavropoulou E, ‘Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks’ (2015) 4 Journal of Law & Cyber Warfare 23
  • McCormack T, ‘International Humanitarian Law and the Targeting of Data’ (2018) 94 International Law Studies 222
  • Murray D, Practitioners’ Guide to Human Rights Law in Armed Conflict (Oxford University Press 2016)
  • Sandoz Y, Swinarski C and Zimmermann B (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (ICRC 1987)
  • Schmitt MN, ‘Wired Warfare: Computer Network Attack and Jus in Bello’ (2002) 84 International Review of the Red Cross 365
  • ——, ‘Cyber Operations and the Jus in Bello: Key Issues’ (2011) 87 International Law Studies 89
  • ——, ‘“Attack” as a Term of Art in International Law: The Cyber Operations Context’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (IEEE 2012)
  • ——, ‘The Law of Cyber Warfare: Quo Vadis’ (2014) 25 Stan. L. & Pol’y Rev. 269
  • ——, ‘The Notion of “Objects” during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision’ (2015) 48 Israel Law Review 81
  • Schmitt MN and Highfill CE, ‘Invisible Injuries: Concussive Effects and International Humanitarian Law’ (2018) 9 Harvard National Security Journal 72
  • Dunlap C, ‘The Loyola Conference and the Evolving Definition of Military Objective’ (Lawfire) <https://sites.duke.edu/lawfire/2016/02/14/the-loyola-conference-and-the-evolving-definition-of-military-objective/> accessed 4 April 2020
  • ‘G20 Finance Communiqué’ (18 March 2017) <http://www.g20.utoronto.ca/2017/170318-finance-en.html> accessed 4 April 2020
  • ‘International Humanitarian Law and the Challenges of Contemporary Armed Conflicts’ (ICRC 2019) <https://rcrcconference.org/app/uploads/2019/10/33IC-IHL-Challenges-report_EN.pdf?fbclid=IwAR3ksX7qBnQd61yJFgKqYlAhRKF3VPh9sFFhIZaQB2hNzxqAhksEjJJ83HM>
  • Richemond-Barak D, ‘Is Money a Legitimate Target?’ (Just Security) <https://www.justsecurity.org/29255/money-legitimate-target/> accessed 4 April 2020
  • Schmitt M, ‘France’s Major Statement on International Law and Cyber: An Assessment’ (Just Security, 16 September 2019) <https://www.justsecurity.org/66194/frances-major-statement-on-international-law-and-cyber-an-assessment/> accessed 4 April 2020
  • Schmitt M and Mauer T, ‘Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?’ (Just Security) <https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/> accessed 4 April 2020
  • Watkin K, ‘Sustaining the War Effort: Targeting Islamic State Oil Facilities’ (Just Security) <https://www.justsecurity.org/15890/sustaining-war-effort-targeting-islamic-state-oil-facilities/> accessed 4 April 2020

Changing Notion of Object and Targeting Data Under the Law of Armed Conflict

Year 2021, Volume: 27 Issue: 2, 1298 - 1313, 03.12.2021
https://doi.org/10.33433/maruhad.994306

Abstract

The notion of an object is changing by being taken small steps. Although, there is an ambiguity whether ‘data’ is an object or not under the law of armed conflict, the qualification of it will be discussed from different perspectives in this article. While the lex lata position does not accept data as an object by the impact of textual interpretation, the lex ferenda position approaches differently and regards data as an ‘object’ by taking teleological interpretation into consideration. As a last point of view, it will be demonstrated that state practice seems to progress towards the latter approach by giving examples from official documents prepared by states and international organisations. At this point, it will be demonstrated in this article that data is not an object, but it evolves towards being accepted as an object.

References

  • Hague Convention IX of 1907 Concerning Bombardment by Naval Forces in Time of War
  • HPCR Manual on International Law Applicable to Air and Missile Warfare (Bern, 15 May 2009)
  • Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (adopted 8 June 1977, entered into force 7 December 1978) 1125 UNTS 3
  • Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare (December 1922 - February 1923)
  • Schmitt MN, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press 2017)
  • US Department of Defence, Law of War Manual (2015)
  • Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Croatia v. Serbia) (Judgment) [2015] ICJ Rep 3
  • UNGA ‘Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security' UN Doc A/74/120 (24 June 2019)
  • UNGA ‘Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security' UN Doc A/70/174 (22 July 2015)
  • Germany, ‘On the Application of International Law in Cyberspace’ <https://www.auswaertiges-amt.de/blob/2446304/2ae17233b62966a4b7f16d50ca3c6802/on-the-application-of-international-law-in-cyberspace-data.pdf> accessed 19 March 2021
  • ‘International Security & Cyberspace - Australia’s International Cyber Engagement Strategy’ <https://www.dfat.gov.au/publications/international-relations/international-cyber-engagement-strategy/aices/chapters/part_4_international_security_and_cyberspace.html> accessed 20 April 2020
  • Ministère des Armées, ‘International Law Applied to Operations in Cyberspace’ <https://www.defense.gouv.fr/content/download/567648/9770527/file/international+law+applied+to+operations+in+cyberspace.pdf> accessed 4 April 2020
  • ‘The Department of Defense Cyber Strategy’ (The Department of Defense 2015)
  • Biller J and Schmitt MN, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 International Law Studies 179
  • Boothby WH, The Law of Targeting (Oxford University Press 2012)
  • Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare (Program on Humanitarian Policy and Conflict Research at Harvard University 2010)
  • Dinniss HAH, ‘The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives’ (2015) 48 Israel Law Review 39
  • Dinniss HH, Cyber Warfare and the Laws of War (Cambridge University Press 2012)
  • Dörmann K, ‘Applicability of the Additional Protocols to Computer Network Attacks’ <https://www.icrc.org/en/doc/assets/files/other/applicabilityofihltocna.pdf> accessed 3 April 2020
  • Droege C, ‘Get off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 International Review of the Red Cross 533
  • Fleck D, ‘Searching for International Rules Applicable to Cyber Warfare—A Critical First Assessment of the New Tallinn Manual’ (2013) 18 Journal of Conflict and Security Law 331
  • Geiss R, ‘The Conduct of Hostilities in and via Cyberspace’, Proceedings of the ASIL Annual Meeting (Cambridge University Press 2010)
  • Gisel L, Rodenhäuser T and Dörmann K, ‘Twenty Years on: International Humanitarian Law and the Protection of Civilians against the Effects of Cyber Operations during Armed Conflicts’ [2020] International Review of the Red Cross 1
  • Hollis, DB, International Law and State Cyber Operations: Improving Transparency, OEA/Ser.Q, CJI/doc 603/20 (5 March 2020)
  • ——, International Law and State Cyber Operations: Improving Transparency, OEA/Ser.Q, CJI/doc 615/20 (7 August 2020)
  • Kilovaty I, ‘Virtual Violence-Disruptive Cyberspace Operations as Attacks under International Humanitarian Law’ (2016) 23 Mich. Telecomm. & Tech. L. Rev. 113
  • Lubell N, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 International Law Studies 252
  • Mačák K, ‘Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law’ (2015) 48 Israel Law Review 55
  • Maurer T, Levite A and Perkovich G, ‘Toward A Global Norm Against Manipulating the Integrity of Financial Data’ (Carnegie Endowment for International Peace 2017)
  • Mavropoulou E, ‘Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks’ (2015) 4 Journal of Law & Cyber Warfare 23
  • McCormack T, ‘International Humanitarian Law and the Targeting of Data’ (2018) 94 International Law Studies 222
  • Murray D, Practitioners’ Guide to Human Rights Law in Armed Conflict (Oxford University Press 2016)
  • Sandoz Y, Swinarski C and Zimmermann B (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (ICRC 1987)
  • Schmitt MN, ‘Wired Warfare: Computer Network Attack and Jus in Bello’ (2002) 84 International Review of the Red Cross 365
  • ——, ‘Cyber Operations and the Jus in Bello: Key Issues’ (2011) 87 International Law Studies 89
  • ——, ‘“Attack” as a Term of Art in International Law: The Cyber Operations Context’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (IEEE 2012)
  • ——, ‘The Law of Cyber Warfare: Quo Vadis’ (2014) 25 Stan. L. & Pol’y Rev. 269
  • ——, ‘The Notion of “Objects” during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision’ (2015) 48 Israel Law Review 81
  • Schmitt MN and Highfill CE, ‘Invisible Injuries: Concussive Effects and International Humanitarian Law’ (2018) 9 Harvard National Security Journal 72
  • Dunlap C, ‘The Loyola Conference and the Evolving Definition of Military Objective’ (Lawfire) <https://sites.duke.edu/lawfire/2016/02/14/the-loyola-conference-and-the-evolving-definition-of-military-objective/> accessed 4 April 2020
  • ‘G20 Finance Communiqué’ (18 March 2017) <http://www.g20.utoronto.ca/2017/170318-finance-en.html> accessed 4 April 2020
  • ‘International Humanitarian Law and the Challenges of Contemporary Armed Conflicts’ (ICRC 2019) <https://rcrcconference.org/app/uploads/2019/10/33IC-IHL-Challenges-report_EN.pdf?fbclid=IwAR3ksX7qBnQd61yJFgKqYlAhRKF3VPh9sFFhIZaQB2hNzxqAhksEjJJ83HM>
  • Richemond-Barak D, ‘Is Money a Legitimate Target?’ (Just Security) <https://www.justsecurity.org/29255/money-legitimate-target/> accessed 4 April 2020
  • Schmitt M, ‘France’s Major Statement on International Law and Cyber: An Assessment’ (Just Security, 16 September 2019) <https://www.justsecurity.org/66194/frances-major-statement-on-international-law-and-cyber-an-assessment/> accessed 4 April 2020
  • Schmitt M and Mauer T, ‘Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?’ (Just Security) <https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/> accessed 4 April 2020
  • Watkin K, ‘Sustaining the War Effort: Targeting Islamic State Oil Facilities’ (Just Security) <https://www.justsecurity.org/15890/sustaining-war-effort-targeting-islamic-state-oil-facilities/> accessed 4 April 2020
There are 46 citations in total.

Details

Primary Language English
Subjects Law in Context
Journal Section Articles
Authors

Yunus Emre Gül 0000-0002-8701-2236

Early Pub Date December 3, 2021
Publication Date December 3, 2021
Published in Issue Year 2021 Volume: 27 Issue: 2

Cite