Research Article
BibTex RIS Cite

TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI

Year 2021, , 163 - 179, 02.09.2021
https://doi.org/10.30794/pausbed.874414

Abstract

Terörizm tecrübe edilen dönemin en önemli güvenlik meselelerinden birini oluşturmaktadır. İnsani, ulusal, bölgesel ve uluslararası düzeylerde ciddi bir tehdit olarak terörizmle ve imkân ve kabiliyetleri olağandışı bir gelişme gösteren terör örgütleriyle mücadele de bu bağlamda ciddi bir sorun olarak öne çıkmaktadır. Bu çalışmada açık kaynak istihbaratının terörle mücadele içindeki rolü ele alınmaktadır. İstihbaratta toplamada başvurulan pek çok yöntem ve teknik bulunmaktadır. Açık kaynak istihbaratını özel kılan ise toplama faaliyetlerinde maliyet, erişilebilirlik, yasallık ve risk gibi kıstaslardaki avantajıdır. Terör örgütlerine karşı yürütülen mücadelede açık kaynaklardan toplananlar, istihbarat çarkına işlerlik kazandıran önemli girdilerdir. Çalışmada öncelikle istihbaratta toplama ve açık kaynak istihbaratı üzerine geniş bir çerçeve çizilecektir. Böylece bu konuda yapılacak araştırmalar için Türkçe literatüre mütevazı bir katkı sunulması planlamaktadır. İkinci bölümde ise terörle mücadele kapsamında istihbaratın rolü ve toplama faaliyetlerinde açık kaynak analizinin önemi ortaya konulmaya çalışılacaktır. Burada terör örgütleri ve faaliyetleriyle ilgili nelerin, nasıl ve ne ölçüde toplanılabildiği ifade edilecektir. Çalışma; karanlık internet konusunun da var olduğu bir değerlendirme ile sona erecektir.

References

  • Acar, Ü. (2011). İstihbarat, Akçağ, Ankara.
  • Ackerman, G. ve Burnham, M. (2019). “Towards A Definition of Terrorist Ideology”, Terrorism and Political Violance, 1-30.
  • Amble, J. C. (2014). “Jihad Online: What Militant Groups Say About Themselves and What It Means for the Counterterrorism Strategy”, Open Source Intelligence in the Twenty-First Century: New Approaches and Oppurtunities (Ed: C. Hobbes, M. Moran ve D. Salisbury), Palgrave Macmillian, Londra, 168-184.
  • Bellaby, R. (2012). “What’s the Harm? The Ethics of Intelligence Collection”, Intelligence and National Security, 27/1, 93-117.
  • Benes, L. (2013). “OSINT, New Technologies, Education: Expanding Opportunities and Threats- A New Paradigm”, Journal of Strategic Security, 6/3, 22-37.
  • Bimfort, M. T. (1958). “A Definition of Intelligence”, Studies in Intelligence, 2, 73-78.
  • Bolz, F., Dudonis, K. J. ve Schulz, D. P. (2002). The Counterterrorism Handbook: Tactics, Procedures, and Techiques, CRC Press, Boca Raton.
  • Breakspear, A. (2013). “A New Definition of Intelligence”, Intelligence and National Security, 28/5, 678-693.
  • Brown, K. E. ve Pearson, E. (2019). “Social Media, Online Environment and Terrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 149-164.
  • Bury, P. ve Chertoff, M. (2020). “New Intelligence Strategies for a New Decade”, The RUSI Journal, 165/4, 42-53.
  • Cammaert, P. C. (2003). “Intelligence in Peacekeeping Operations: Lessons for the Future”, Peacekeeping Intelligence: Emerging Concepts for the Future (Ed: B., de Jong; W. Platje, ve R. D. Steele), OSS International Press, Oakton, 11-30.
  • Carment, D., Rudner, M. ve Heide, R. L. (2006). “Peacekeeping Intelligence: Extending Partnership and Boundaries for Peacekeeping”, Peace Keeping Intelligence: New Players, Extended Boundaries (Ed: D. Carment ve R. Martin), Routledge, New York, 1-14.
  • Chen, H. (2011). “From Terrorism Informatics to Dark Web Reaserch”, Counterrorism and Open Source Intelligence (Ed:U. K. Wiil), Viyana: Springer, 316-341. Clark, J. R. (2007). Intelligence and National Security: A Reference Handbook, Praeger, Westport.
  • Cormac, R. (2013). “Much Do About Nothing: Terrorism, Intelligence and the Mechanics of Threat Exaggeration”, Terrorism and Political Violance, 25/3, 476-493.
  • Crelinsten, R. (2019). “Conceptualising Counterterrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 363-374.
  • Draeger, W. R. (2009). “Take Advantage of OSINT”, Military Intelligence Professional Bulletin, 35/3, 39-44. Drake, C. J. M. (1998). Terrorist’s Target Selection, St. Martin’s Press, New York.
  • Eijkman, Q. A. M. ve Weggemans, D. (2013). “Open Source Intelligence and Privacy Dilemmas: Is It Time to Reassess State Accountability”, Security and Human Rights, 23/4, 285-296.
  • Eldridge, E., Hobbs, C. ve Moran, M. (2018). “Fusing Algorithms and Analysts: Open-source Intelligence in the Age of ‘Big Data’”, Intelligence and National Security, 33/3, 391-406.
  • Farson, S. (1989). “Schools of Thought: National Perceptions of Intelligence”, Conflict Quarterly, 9/2, 52-104.
  • Ganor, B. (2020). “Is One Man’s Terrorist Another Man’s Freedom Fighter?”, Police Practice and Research: An International Journal, 3/4, 287-304.
  • Gibson, S. (2004). “Open Source Intelligence”, The RUSI Journal, 149/1, 16-22.
  • Glassman, M. ve Kang, M. J. (2012). “Intelligence in the Internet Age: The Emergence and Evolution of Open Source Intelligence (OSINT)”, Computers in Human Computer, 28, 673-682.
  • Gruters, P. C. ve Gruters, K. T. (2018). “Publicly Avaible Information: Modernizing Defense Open Source Information”, Special Operation Journal, 4/1, 97-102.
  • Gunaratna, R. (2007). “Ideology in Terrorism and Counter Terrorism: Lessons From Al Qaeda”, The Ideological War on Terror: Worldwide Strategies on Counter-terrorism (Ed: A. Aldis ve G. P. Herd), Routledge, Londra, 21-34.
  • Gutfraind, A. (2011), “Targeting By Transnational Terrorist Groups”, Counterrorism and Open Source Intelligence (Ed: U. K. Wiil), Springer, Viyana, 9-32.
  • Hassan, N. A. ve Hijazi, R. (2018). Open Source Intelligence Methods and Tools: A Pracitcal Guide to Online Intelligece, Apress, New York.
  • Henricks, S. C. (2017). “Social Media, Publicly Avalaible Information, and the Intelligence Community”, American Intelligence Journal, 34/1, 21-31.
  • Herman, M. (1996). Intelligence Power in Peace and War, Cambridge University Press, Cambridge.
  • Hoffman, B. (2006). Inside Terrorism, Cambridge University Press, New York.
  • Hribar, G., Podbregar, I. ve Ivanusa, T. (2014). “OSINT: A ‘Grey Zone’?”, International Journal of Intelligence and Counterintelligence, 27/3, 529-549.
  • Hulnick, A. S. (2002). “The Downside of Open Source Intelligece”, International Journal of Inteligence and Counterintelligence, 15/4, 565-579.
  • Hulnick, A. S. (2006). “What’s Wrong with the Intelligence Cycle”, Intelligence and National Security, 21/6, 959-979.
  • Hulnick, A. S. (2010). “The Dilemma of Open Source Intelligence: Is OSINT Really Intelligence”, The Oxford Handbook of National Security Intelligence (Ed: L. K. Johnson), Oxford University Press, Oxford, 229.
  • Ilardi, G. J. (2009). “The 9/11 Attacks: A Study of Al-Qaeda’s Use of Intelligence and Counterintelligence”, Studies in Conflict and Terrorism, 32/3, 171-187.
  • Johnson, L. K. (2010). “National Security Intelligence”, The Oxford Handbook of National Security Intelligence (Ed. L. K. Johnson),: Oxford University Press, Oxford, 3-32. Kent, S. (1949). Strategic Intelligence for American World Policy, Princeton University Press, Princeton.
  • Lerner, K. L. ve Lerner, B. W. (Eds.) (2004). Encyclopedia of Espionage, Intelligence, and Scurity: Volume 1-2-3, Thomson Gale, Detroit.
  • Lowenthal, M. M. (2009). Intelligence: From Secret to Policy, CQ Press, Washington.
  • Marlo, F. H. (1999). “WMD Terrorism and US Intelligence Collection”, Terrorism and Political Violance, 11/3, 53-71.
  • Miller, J. A. (2005). “Turning Open Source Data Into Knowledge About Global Threats”, American Inelligence Journal, 23, 74-78.
  • Mtsweni, J.; Mutemwa, M. ve Mkhonto, N. (2016). “Development of Cyber-Threat Intelligence-Sharing Model from Big Data Sources”, Journal of Information Warfare, 15/3, 56-68.
  • NATO (2001). Open Source Intelligence Handbook, The North Atlantic Treaty Organization.
  • Newman, E. (2006). “Exploring the ‘Roots Causes’ of Terrorism”, Studies in Conflict and Terrorism, 29/8, 749-772.
  • Omand, D., Barlett, J. ve Miller, C. (2012). “Introducing Social Media Intelligence (SOCMINT)”, Intelligence and National Security, 27/6, 801-823.
  • Özdağ, Ü. (2013). “Açık Kaynak İstihbaratı”, Dünyayı Yöneten Güç İstihbarat Bilimi (Ed: S. Yılmaz), Kripto, Ankara, 137-154.
  • Price, B. (2017). “Terrorism As Cancer: How to Combat an Incurable Disease”, Terrorism and Political Violance, 31/5, 1096-1120.
  • Quiggin, T. (2007). Seeing the Invisible: National Security Intelligence in an Uncertain Age, World Scientific Publishing, New Jersey.
  • Richards, J. (2019). “Intelligence and Counterterrorism”, Routledge Handbook of Terrorism and Counterterrorsim (Ed:A. Silke), Routledge, Londra, 395-405.
  • Richey, M. K. ve Binz, M. (2015). “Open Source Collection Methods for Indetifying Radical Extremists Using Social Media”, International Journal of Intelligence and Counterintelligence, 28/2, 347-364.
  • Rineheart, J. (2010). “Counterterrorism and Counterinsurgency”, Perspectives on Terrorism, 4/5, 31-47.
  • Saadat, S. Y. (2020). “International Cooperation for Counter-terrorism: A Strategic Perspective”, Journal of Policing, Intelligence and Counter Terrorism, 15/1, 83-93.
  • Sevendsen, A. (2008). “The Globalization of Intelligence Since 9/11: Frameworks and Operational Parameter”, Cambridge Review of International Relations, 21/1, 129-144.
  • Shaffer, R. (2015). “Counter-Terrorism Intelligence, Policy and Theory Since 9/11”, Terrorism and Political Violence, 27/2, 368-375.
  • Shulsky, A. ve Schmitt, G. J. (2002). Silent Warfare: Understanding the World of Intelligence, Potomac Books, Washington.
  • Sims, J. (2007). “Intelligence to Counter Terror: The Importance of All-Source Fusion”, Intelligence and National Security, 22/1, 38-56.
  • Smelser, N. J. (2007). The Faces of Terrorism: Social and Psychological Dimensions, Princeton University Press, Princeton.
  • Steele, R. (1995). “The Importance of Open Source Intelligence to the Military”, International Journal of Intelligence and CounterIntelligence, 8/4, 457-470.
  • Steele, R. (2010). “Human Intelligence: All Humans, All Minds, All the Time”, Strategic Studies Institute, 17.
  • Stepanova, E. (2008). “Terrorism in Asymmetrical Conflict: Ideological and Structural Aspects”, SIPRI Research Report 23, Oxford University Press, Oxford.
  • Stottlemyre, S. A. (2015). “HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence”, International Journal of Intelligence and Counterintelligence, 28/3, 578-589.
  • Stout, M. ve Warner, M. (2018). “Intelligence is As Intelligence Does”, Intelligence and National Security, 33/4, 517-526.
  • Treverton, G. F. (2004). Reshaping National Intelligence for An Age of Information, Cambridge University Press, Cambridge.
  • Wark, W. K. (1993). “Introduction: The Study of Espionage: Past, Present, Future”, Intelligence and National Security, 8/3, 1-13.
  • Warner, M. (2002). “Wanted: A Definition of Intelligence”, Studies in Intelligence, 46/3, 15-22.

APPLICATION TO INTELLIGENCE IN COUNTERTTERORISM: THE USE OF OPEN SOURCE INTELLIGENCE

Year 2021, , 163 - 179, 02.09.2021
https://doi.org/10.30794/pausbed.874414

Abstract

Terrorism constitutes one of the most important security issues of the period experienced. The fight against terrorism as a serious threat at humanitarian, national, regional and international levels, and against terrorist organizations, whose capabilities and capabilities have shown an unusual development, also stands out as a serious problem in this context. This study examines the role of open source intelligence in the fight against terrorism. There are many methods and techniques used in intelligence gathering. What makes open source intelligence special is its advantage in terms of cost, accessibility, legality and risk in collection activities. In the fight against terrorist organizations, those gathered from open sources are important inputs that make the intelligence circle operational. In the study, first of all, a broad framework will be drawn on intelligence gathering and open source intelligence. Thus, it is planned to make a modest contribution to the Turkish literature on this subject. In the second part, the role of intelligence in counterterrorism applications and the importance of open source analysis in collection activities will be tried to be revealed. Here, what, how and to what extent can be gathered regarding terrorist organizations and their activities will be expressed. The study will end with an evaluation that includes the dark internet.

References

  • Acar, Ü. (2011). İstihbarat, Akçağ, Ankara.
  • Ackerman, G. ve Burnham, M. (2019). “Towards A Definition of Terrorist Ideology”, Terrorism and Political Violance, 1-30.
  • Amble, J. C. (2014). “Jihad Online: What Militant Groups Say About Themselves and What It Means for the Counterterrorism Strategy”, Open Source Intelligence in the Twenty-First Century: New Approaches and Oppurtunities (Ed: C. Hobbes, M. Moran ve D. Salisbury), Palgrave Macmillian, Londra, 168-184.
  • Bellaby, R. (2012). “What’s the Harm? The Ethics of Intelligence Collection”, Intelligence and National Security, 27/1, 93-117.
  • Benes, L. (2013). “OSINT, New Technologies, Education: Expanding Opportunities and Threats- A New Paradigm”, Journal of Strategic Security, 6/3, 22-37.
  • Bimfort, M. T. (1958). “A Definition of Intelligence”, Studies in Intelligence, 2, 73-78.
  • Bolz, F., Dudonis, K. J. ve Schulz, D. P. (2002). The Counterterrorism Handbook: Tactics, Procedures, and Techiques, CRC Press, Boca Raton.
  • Breakspear, A. (2013). “A New Definition of Intelligence”, Intelligence and National Security, 28/5, 678-693.
  • Brown, K. E. ve Pearson, E. (2019). “Social Media, Online Environment and Terrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 149-164.
  • Bury, P. ve Chertoff, M. (2020). “New Intelligence Strategies for a New Decade”, The RUSI Journal, 165/4, 42-53.
  • Cammaert, P. C. (2003). “Intelligence in Peacekeeping Operations: Lessons for the Future”, Peacekeeping Intelligence: Emerging Concepts for the Future (Ed: B., de Jong; W. Platje, ve R. D. Steele), OSS International Press, Oakton, 11-30.
  • Carment, D., Rudner, M. ve Heide, R. L. (2006). “Peacekeeping Intelligence: Extending Partnership and Boundaries for Peacekeeping”, Peace Keeping Intelligence: New Players, Extended Boundaries (Ed: D. Carment ve R. Martin), Routledge, New York, 1-14.
  • Chen, H. (2011). “From Terrorism Informatics to Dark Web Reaserch”, Counterrorism and Open Source Intelligence (Ed:U. K. Wiil), Viyana: Springer, 316-341. Clark, J. R. (2007). Intelligence and National Security: A Reference Handbook, Praeger, Westport.
  • Cormac, R. (2013). “Much Do About Nothing: Terrorism, Intelligence and the Mechanics of Threat Exaggeration”, Terrorism and Political Violance, 25/3, 476-493.
  • Crelinsten, R. (2019). “Conceptualising Counterterrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 363-374.
  • Draeger, W. R. (2009). “Take Advantage of OSINT”, Military Intelligence Professional Bulletin, 35/3, 39-44. Drake, C. J. M. (1998). Terrorist’s Target Selection, St. Martin’s Press, New York.
  • Eijkman, Q. A. M. ve Weggemans, D. (2013). “Open Source Intelligence and Privacy Dilemmas: Is It Time to Reassess State Accountability”, Security and Human Rights, 23/4, 285-296.
  • Eldridge, E., Hobbs, C. ve Moran, M. (2018). “Fusing Algorithms and Analysts: Open-source Intelligence in the Age of ‘Big Data’”, Intelligence and National Security, 33/3, 391-406.
  • Farson, S. (1989). “Schools of Thought: National Perceptions of Intelligence”, Conflict Quarterly, 9/2, 52-104.
  • Ganor, B. (2020). “Is One Man’s Terrorist Another Man’s Freedom Fighter?”, Police Practice and Research: An International Journal, 3/4, 287-304.
  • Gibson, S. (2004). “Open Source Intelligence”, The RUSI Journal, 149/1, 16-22.
  • Glassman, M. ve Kang, M. J. (2012). “Intelligence in the Internet Age: The Emergence and Evolution of Open Source Intelligence (OSINT)”, Computers in Human Computer, 28, 673-682.
  • Gruters, P. C. ve Gruters, K. T. (2018). “Publicly Avaible Information: Modernizing Defense Open Source Information”, Special Operation Journal, 4/1, 97-102.
  • Gunaratna, R. (2007). “Ideology in Terrorism and Counter Terrorism: Lessons From Al Qaeda”, The Ideological War on Terror: Worldwide Strategies on Counter-terrorism (Ed: A. Aldis ve G. P. Herd), Routledge, Londra, 21-34.
  • Gutfraind, A. (2011), “Targeting By Transnational Terrorist Groups”, Counterrorism and Open Source Intelligence (Ed: U. K. Wiil), Springer, Viyana, 9-32.
  • Hassan, N. A. ve Hijazi, R. (2018). Open Source Intelligence Methods and Tools: A Pracitcal Guide to Online Intelligece, Apress, New York.
  • Henricks, S. C. (2017). “Social Media, Publicly Avalaible Information, and the Intelligence Community”, American Intelligence Journal, 34/1, 21-31.
  • Herman, M. (1996). Intelligence Power in Peace and War, Cambridge University Press, Cambridge.
  • Hoffman, B. (2006). Inside Terrorism, Cambridge University Press, New York.
  • Hribar, G., Podbregar, I. ve Ivanusa, T. (2014). “OSINT: A ‘Grey Zone’?”, International Journal of Intelligence and Counterintelligence, 27/3, 529-549.
  • Hulnick, A. S. (2002). “The Downside of Open Source Intelligece”, International Journal of Inteligence and Counterintelligence, 15/4, 565-579.
  • Hulnick, A. S. (2006). “What’s Wrong with the Intelligence Cycle”, Intelligence and National Security, 21/6, 959-979.
  • Hulnick, A. S. (2010). “The Dilemma of Open Source Intelligence: Is OSINT Really Intelligence”, The Oxford Handbook of National Security Intelligence (Ed: L. K. Johnson), Oxford University Press, Oxford, 229.
  • Ilardi, G. J. (2009). “The 9/11 Attacks: A Study of Al-Qaeda’s Use of Intelligence and Counterintelligence”, Studies in Conflict and Terrorism, 32/3, 171-187.
  • Johnson, L. K. (2010). “National Security Intelligence”, The Oxford Handbook of National Security Intelligence (Ed. L. K. Johnson),: Oxford University Press, Oxford, 3-32. Kent, S. (1949). Strategic Intelligence for American World Policy, Princeton University Press, Princeton.
  • Lerner, K. L. ve Lerner, B. W. (Eds.) (2004). Encyclopedia of Espionage, Intelligence, and Scurity: Volume 1-2-3, Thomson Gale, Detroit.
  • Lowenthal, M. M. (2009). Intelligence: From Secret to Policy, CQ Press, Washington.
  • Marlo, F. H. (1999). “WMD Terrorism and US Intelligence Collection”, Terrorism and Political Violance, 11/3, 53-71.
  • Miller, J. A. (2005). “Turning Open Source Data Into Knowledge About Global Threats”, American Inelligence Journal, 23, 74-78.
  • Mtsweni, J.; Mutemwa, M. ve Mkhonto, N. (2016). “Development of Cyber-Threat Intelligence-Sharing Model from Big Data Sources”, Journal of Information Warfare, 15/3, 56-68.
  • NATO (2001). Open Source Intelligence Handbook, The North Atlantic Treaty Organization.
  • Newman, E. (2006). “Exploring the ‘Roots Causes’ of Terrorism”, Studies in Conflict and Terrorism, 29/8, 749-772.
  • Omand, D., Barlett, J. ve Miller, C. (2012). “Introducing Social Media Intelligence (SOCMINT)”, Intelligence and National Security, 27/6, 801-823.
  • Özdağ, Ü. (2013). “Açık Kaynak İstihbaratı”, Dünyayı Yöneten Güç İstihbarat Bilimi (Ed: S. Yılmaz), Kripto, Ankara, 137-154.
  • Price, B. (2017). “Terrorism As Cancer: How to Combat an Incurable Disease”, Terrorism and Political Violance, 31/5, 1096-1120.
  • Quiggin, T. (2007). Seeing the Invisible: National Security Intelligence in an Uncertain Age, World Scientific Publishing, New Jersey.
  • Richards, J. (2019). “Intelligence and Counterterrorism”, Routledge Handbook of Terrorism and Counterterrorsim (Ed:A. Silke), Routledge, Londra, 395-405.
  • Richey, M. K. ve Binz, M. (2015). “Open Source Collection Methods for Indetifying Radical Extremists Using Social Media”, International Journal of Intelligence and Counterintelligence, 28/2, 347-364.
  • Rineheart, J. (2010). “Counterterrorism and Counterinsurgency”, Perspectives on Terrorism, 4/5, 31-47.
  • Saadat, S. Y. (2020). “International Cooperation for Counter-terrorism: A Strategic Perspective”, Journal of Policing, Intelligence and Counter Terrorism, 15/1, 83-93.
  • Sevendsen, A. (2008). “The Globalization of Intelligence Since 9/11: Frameworks and Operational Parameter”, Cambridge Review of International Relations, 21/1, 129-144.
  • Shaffer, R. (2015). “Counter-Terrorism Intelligence, Policy and Theory Since 9/11”, Terrorism and Political Violence, 27/2, 368-375.
  • Shulsky, A. ve Schmitt, G. J. (2002). Silent Warfare: Understanding the World of Intelligence, Potomac Books, Washington.
  • Sims, J. (2007). “Intelligence to Counter Terror: The Importance of All-Source Fusion”, Intelligence and National Security, 22/1, 38-56.
  • Smelser, N. J. (2007). The Faces of Terrorism: Social and Psychological Dimensions, Princeton University Press, Princeton.
  • Steele, R. (1995). “The Importance of Open Source Intelligence to the Military”, International Journal of Intelligence and CounterIntelligence, 8/4, 457-470.
  • Steele, R. (2010). “Human Intelligence: All Humans, All Minds, All the Time”, Strategic Studies Institute, 17.
  • Stepanova, E. (2008). “Terrorism in Asymmetrical Conflict: Ideological and Structural Aspects”, SIPRI Research Report 23, Oxford University Press, Oxford.
  • Stottlemyre, S. A. (2015). “HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence”, International Journal of Intelligence and Counterintelligence, 28/3, 578-589.
  • Stout, M. ve Warner, M. (2018). “Intelligence is As Intelligence Does”, Intelligence and National Security, 33/4, 517-526.
  • Treverton, G. F. (2004). Reshaping National Intelligence for An Age of Information, Cambridge University Press, Cambridge.
  • Wark, W. K. (1993). “Introduction: The Study of Espionage: Past, Present, Future”, Intelligence and National Security, 8/3, 1-13.
  • Warner, M. (2002). “Wanted: A Definition of Intelligence”, Studies in Intelligence, 46/3, 15-22.
There are 63 citations in total.

Details

Primary Language Turkish
Subjects International Relations
Journal Section Articles
Authors

Emre Çıtak 0000-0002-8704-6495

Publication Date September 2, 2021
Acceptance Date February 21, 2021
Published in Issue Year 2021

Cite

APA Çıtak, E. (2021). TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi(46), 163-179. https://doi.org/10.30794/pausbed.874414
AMA Çıtak E. TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. PAUSBED. September 2021;(46):163-179. doi:10.30794/pausbed.874414
Chicago Çıtak, Emre. “TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI”. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, no. 46 (September 2021): 163-79. https://doi.org/10.30794/pausbed.874414.
EndNote Çıtak E (September 1, 2021) TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi 46 163–179.
IEEE E. Çıtak, “TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI”, PAUSBED, no. 46, pp. 163–179, September 2021, doi: 10.30794/pausbed.874414.
ISNAD Çıtak, Emre. “TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI”. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi 46 (September 2021), 163-179. https://doi.org/10.30794/pausbed.874414.
JAMA Çıtak E. TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. PAUSBED. 2021;:163–179.
MLA Çıtak, Emre. “TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI”. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, no. 46, 2021, pp. 163-79, doi:10.30794/pausbed.874414.
Vancouver Çıtak E. TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. PAUSBED. 2021(46):163-79.