Research Article
BibTex RIS Cite

Demokrat Parti Hack Skandalı Bağlamında ABD ve RF'nin Siber Güvenlik Stratejilerinin Analizi

Year 2017, Volume: 1 Issue: 1 - AUİLS | 2017 Special Issue, 1 - 24, 18.08.2017

Abstract

Amerika Birleşik Devletleri (ABD) ve Rusya Federasyonu (RF), günümüzde siber uzayı domine eden en önemli küresel siber güçlerdir. İki devletin siber güçlerinin sistematiğine ve planlamasına yönelik detayların temelleri ise Soğuk Savaş döneminde ABD ve Sovyet Sosyalist Cumhuriyetleri Birliği (SSCB) arasındaki askeri rekabetin ortaya çıkardığı teknolojik yeniliklere dayanmaktadır.

1990’lı yıllar ile birlikte ağ teknolojilerinin hızla gelişmesi, ayrıca internetin sivilleşerek ticarileşmesi ve yaygınlaşmasının bir sonucu olarak, ABD ulusal ve uluslararası düzeyde siber güvenlik stratejilerini hızla geliştirmeye başlamış ve günümüzdeki güçlü siber kapasitesine ulaşmıştır. 2000’li yıllar sonrasında attığı adımlar ile birlikte RF’de, espiyonaj, kontr/espiyonaj, dezenformasyon, elektronik savaş kabiliyetleri, psikolojik savaş ve propaganda, siber saldırı gibi kabiliyetleri de kapsayan etkili bir siber kapasiteye sahip olabilmiştir.

Öte yandan iki devlet arasındaki siber mücadele ise RF’nin, Demokrat Parti Ulusal Komitesi bünyesinde görev alan bazı siyasilerin ve danışmanların e-postalarını siber saldırı yöntemleri ile temin ettiği ve bu e-postalardan bazılarını kamuoyuna sızdırdığı, böylelikle de aktif bir şekilde ABD seçim sürecini kendi ulusal çıkarları doğrultusunda diğer başkan adayı Donald Trump lehine manipüle ettiği iddiaları ile yeni bir boyuta taşınmıştır. Bu bağlamda çalışmamızda literatürde Demokrat Parti hack skandalı olarak tanımlanan olay; ABD ve RF’nin siber güvenlik stratejilerinin tarihsel gelişimi kapsamında taraflar arasında günümüze kadar meydana geldiği karşılıklı olarak iddia edilen siber saldırı vakaları çerçevesinde analiz edilecektir.

References

  • Abbate, Janet, “Government, Business, and the Making of the Internet”, Business History Review, Cilt 75, No 1, Bahar 2001, s.147-176.
  • AFCEA Organization, The Evolution of US Cyberpower, http://www.afcea. org/committees /cyber/documents/TheEvolutionofUSCyberpower.pdf, (Erişim Tarihi 23 Nisan 2016).
  • Akyazı, Uğur, “Uluslararası Siber Güvenlik Stratejisi ve Doktrinler Arasında Alınabilecek Tedbirler”, 6.Uluslararası Siber Güvenlik ve Kriptoloji Konferansı, http://www.iscturkey. org/s/2226/i/ 2013-paper105.pdf, (Erişim Tarihi 14 Nisan 2017).
  • Başa, Şafak, “ABD İç Güvenlik Bakanlığı”, https://www.academia.edu/9830086/ ABD_%C4% B0%C3 %87_G%C3%9CVENL%C4%B0K_BAKANLI%C4%9EI_SUNUM_, (Erişim Tarihi 31 Nisan 2017).
  • “Beyaz Saray ABD, 35 Rus diplomatı 72 saat içerisinde sınır dışı edecek”, Sputniknews Haber Portalı, https://tr.sputniknews.com/abd/201612291026553306-abd-rusya-yaptirim- diplomat-sinir-disi/, (Erişim Tarihi 20 Şubat 2017).
  • “Beyaz Saray, Rusya'nın Hackleme Operasyonuna Cevap Verileceğini Açıkladı”, Türk İnternet Haber Sitesi, http://www.turk-internet.com/portal/yazigoster.php?yaziid=54247, (Erişim Tarihi 20 Şubat 2017).
  • Bıçakcı, Salih, “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler, Cilt 10, No 40, Kış 2014, s. 101-130.
  • Bıçakcı, Salih, 21. Yüzyılda Siber Güvenlik, İstanbul, Bilgi Üniversitesi Yayınları, Ağustos 2013.
  • Carr, Jeffry, “Intelligence on Russian Information Warfare Activities”, http://jeffreycarr.blogspot.com/2012/01/intelligence-on-russian-information.html, (Erişim Tarihi 04 Ocak 2017).
  • Carr, Jeffrey, Inside Cyber Warfare: Mapping the Cyber Underworld, O'Reilly Media Inc., USA, 2011.
  • Committee on Homeland Security and Governmental Affairs, A Review of the Department of Homeland Security’s Missions and Performance, file:///C:/Users/tk44655/Downloads /Senator%20Coburn%20DHS%20Report%20FINAL%20(3).pdf, (Erişim Tarihi 31 Mayıs 2016).
  • Chivers, Ian ve Jane Sleightholme, “Fortran History and Development”, http://www.fortranplus .co.uk/resources/Fortran_history_and_development.pdf, (Erişim Tarihi 23 Nisan 2015).
  • “Cyberspace Becomes Second Front in Russia’s Clash With NATO”, Bloomberg Tecnology News Portal, http://www.bloomberg.com/news/articles/2015-10-14/cyberspace-becomes- second-front-in-russia-s-clash-with-nato, (Erişim Tarihi 01 Nisan 2017).
  • “Clinton'a 4 ay Boyunca Yapılan Siber Saldırılar, Seçimleri Manipule Etti”, Türk İnternet Haber Sitesi, http://www.turk-internet.com/portal/yazigoster.php?yaziid=55005, (Erişim Tarihi 20 Şubat 2017).
  • Darıcılı, A. Burak, “Rusya Federasyonu Kaynaklı Olduğu İddia Edilen Siber Saldırılar”, Uludağ Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, Cilt 7, No 2, 2014, s.1-16.
  • Darıcılı, A. Burak ve Barış Özdal, “Enformasyon Savaşı Bağlamında Rusya Federasyonu-Türkiye İlişkilerinin Analizi”, Gelişim Üniversitesi Sosyal Bilimler Dergisi, Cilt 4, Sayı 1, Nisan 2017, s.19-40.
  • Department of Homeland Security, Executive Summary of Grizzly Steppe Findings from Homeland Security Assistant Secretary for Public Affairs Todd Breasseale, https://www.dhs.gov/news/2016/12/30/executive-summary-grizzly-steppe-findings- homeland-security-assistant-secretary, (Erişim Tarihi 20 Şubat 2017).
  • Department of Homeland Security, Joint DHS, ODNI, FBI Statement on Russian Malicious Cyber Activity, https://www.dhs.gov/news/2016/12/29/joint-dhs-odni-fbi-statement- russian-malicious-cyber -activity, (Erişim Tarihi 20 Şubat 2017).
  • Department of Homeland Security, National Cybersecurity and Communications Integration Center, https://www.isaca.org/chapters2/New-York- Metropolitan/membership/Documents/2012-04-30%20Spring%20Conference- Meeting/2%20Lichtenfels%20DHS%20NCCIC%202.pdf, (Erişim Tarihi 31 Mayıs 2016).
  • EastWest Instıtute, The American and Russian Approaches to Cyber Challenges, http://www.omicsgroup.org/journals/the-american-and-russian-approaches-to-cyber- challenges-2167-0374.1000110.pdf, (Erişim Tarihi 14 Nisan 2017).
  • “Eski FBI Başkanı Comey: Trump yönetimi yalan söyledi.”, BBC, http://www.bbc.com/turkce/haberler-dunya-40199389, (Erişim Tarihi 10 Temmuz 2017).
  • Federal Bureau of Investigation, Cyber Crime, https://www.fbi.gov/about-us/investigate /cyber/ncijtf, (01 Haziran 2017).
  • Gerden, Eugene, “$500 Million for New Russian Cyber Army”, Security Magazine UK, http://www.scmagazineuk.com/500-million-for-new-russian-cyber- army/article/381720/, (Erişim Tarihi 26 Mart 2016).
  • Gibson, William, Neuromancer, Ace Books, New York, 1984.
  • “Hackers to the U.S. Election”, NY Timeshttps://www.nytimes.com/interactive /2016/07/27/us/politics/trail-of-dnc-emails-russia-hacking.html, (Erişim Tarihi 20 Şubat 2016).
  • Hagestad II, William, “Comparative Study: Iran, Russia and PRC Cyber War”, RSA Conference, 2013 Europe, http://www.rsaconference.com/writable/presentations/file_upload/hta-w01-comparative-study-iran-russia-prc-cyber-war_copy1.pdf, (Erişim Tarihi05 Mart 2017).
  • Heickerö, Roland, Emerging Cyber Threats and Russian Views on Information Warfare and Operation, Swedish Defense Research Agency Press, Mart, http://www.foi.se/rapport?rNo=FOI-R--2970--SE, (Erişim Tarihi 23 Haziran 2016).
  • Medvedev, A. Sergei, Offence-Defence Theory Analysis of Russian Cyber Capability, Master Thesis, Naval Post-Graduate School, Monterey, Colifornia, https://www.google.com.tr/?gfe_rd=cr&ei=qzHZVrreN7Go8wfMuYegDw#q=this+thesis +represent+mikhail+tsypkin, (Erişim Tarihi 05 Mart 2017).
  • Ministry of Foreign Affairs of the Russian Federation, Information Security Doctrine of Russian Federation,http://archive.mid.ru//bdomp/nsosndoc.nsf/1e5f0de28fe77fdcc32575d900 298676/2deaa9ee15ddd24bc32575d9002c442b!OpenDocument, (Erişim Tarihi 23 Mart 2016).
  • Mowthorpe, Matthew, “The Revolution in Military Affairs (RMA): The United States, Russian and Chinese Views”, file:///C:/Users/tk44655/Downloads/2011.06.02-Maturing- Revolution-In-Military-Affairs1.pdf, (Erişim Tarihi 05 Mart 2017).
  • National Security Agency, 60 Years of Defending Our Nation, http://www.nsa.gov/public_info/_files/cryptologic_histories/origins_of_nsa.pdf, (Erişim Tarihi 30 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, National Security Strategy, https://ccdcoe.org/sites/default/files/strategy/USA_NSS2015.pdf, (Erişim Tarihi 25 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, National Cyber Security Organisation in United States, https://ccdcoe.org/sites/default/files/multimedia/pdf/CS_organisation_ USA_122015.pdf, (Erişim Tarihi 01 Haziran 2019).
  • NATO Cooperative Cyber Defense Centre of Excellence, The Department of Defence Cyber Strategy,http://www.defense.gov/home/features/2015/0415_cyberstrategy/Final_201 5_DoD_CYBER_STRATEGY_for_web.pdf, (Erişim Tarihi 25 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, Basic Principles for State Policy of the Russian Federation in the Field of International Information Security, https://ccdcoe.org/sites/default/files/strategy/RU_state-policy.pdf, (Erişim Tarihi 24 Mart 2017).
  • “New Kremlin Information-Security Doctrine Calls For ‘Managing’ Internet In Russia”, RIA Novosti ve Mir24.Tv, http://www.rferl.org/a/russia-informaiton-security-internet- freedome concerns/28159130.html, (Erişim Tarihi 02 Ocak 2017).
  • Office of the Director of National Intelligence, Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution, https://www.dni.gov/files/documents/ICA_2017_01.pdf, (Erişim Tarihi 10 Temmuz 2017).
  • Presidency Of USA, Executive Order 13010—Critical Infrastructure Protection, http://www.presidency.ucsb.edu/ws/?pid=53066, (Erişim Tarihi 17 Şubat 2017).
  • “Putin'den ABD'ye yanıt: Biz hiç kimseyi sınır dışı etmeyeceğiz.”, Sputniknews Haber Portalı, https://tr.sputniknews.com/rusya/201612301026565257-putin-abdye-yanit-biz-hic- kimseyi-sinir-disi-etmeyecegiz/, (Erişim Tarihi 20 Şubat 2017).
  • “Putin Ordered ‘Influence Campaign’ Aimed at U.S. Election, Report Says”, NY Times, https://www.nytimes.com/2017/01/06/us/politics/russia-hack-report.html, (Erişim Tarihi 20 Şubat 2017).
  • “Putin: 'Patriotic' Russian hackers may have targeted US election”, CNN International, http://edition.cnn.com/2017/ 06/01/politics/russia-putin-hackers-election/index.html, (Erişim Tarihi 10 Temmuz 2017). “Russia Announces Development of Cyber Military Unit”, State Security Magazine, http://www.tripwire.com/state-of-security/latest-security-news/russia-announces- developme nt -cyberwar-military-unit/, (Erişim Tarihi 26 Mart 2017).
  • Rustrans Useful Translations, Russia's National Security Strategy to 2020, http://rustrans.wikidot. com/russia-s-national-security-strategy-to-2020, (Erişim Tarihi 23 Mart 2016).
  • Staar, R. Tocaso, “Russia’s Security Services”, Mediterranean Quarterly, Vol 15, Issue 1, 2010, ss.1- 10. Stewart, Phil ve Jim Wolf, "Old Worm Won’t Die after 2008 Attack on Military", Reuters, June 16 2011, http://www.reuters.com/article/us-usa-cybersecurity-worm- idUSTRE75F5TB20110617, (Erişim Tarihi16 Haziran 2016).
  • The Centre For Counterintelligence and Security Studies, Russia’s SVR/FSB/GRU Intelligence Services, http://www.cicentre.com/?page=191, (Erişim Tarihi 27 Mart 2016).
  • The Russian Ministry of Defense, Concept of the Foreign Policy of the Russian Federation,http://archive.mid.ru//brp_4.nsf/0/76389FEC168189ED44257B2E0039B16 D, (Erişim Tarihi 24 Mart 2016).
  • The Russian Ministry of Defense, Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in the Information Space, https://ccdcoe.org /strategies/ Russian_Federation_unofficial_translation.pdf, (Erişim Tarihi 23 Mart 2016).
  • Tirrell, K. William, United States Cybwer Security Strategy, Policy and Organization: Poorly Postured to Cope With a Post-9/11 Security Environment, Master Thesis, Washington University, 2012, https://www.hsdl.org/?view&did=729810, (Erişim Tarihi 10 Şubat 2017).
  • Thomas, L. Timothy, “Russia’s Information Warfare Strategy: Can the Nation Cope inFuture Conflicts?”, The Journal of Slavic Military Studies, Cilt 27, No 1, 2014, s. 20-42.
  • White House, Presidential Decision Directive (PDD)-63, Critical Infrastructure Protection, http://fas.org/irp/offdocs/pdd/pdd-63.htm, (Erişim Tarihi 24 Mayıs 2016).
  • Wirtz, J. James, “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”, NATO CCD COE Publications, Tallinn 2015, https://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Wirtz_0 3.pdf, (Erişim Tarihi 05 Mart 2016).
  • United States Department of Defense, About the Department of Defense (DoD)”, http://www.defense.gov/About-DoD, (Erişim Tarihi 30 Mayıs 2016).
  • Yayla, Mehmet, “Hukuki Bir Terim Olarak Siber Savaş”, http://portal.ubap.org.tr/App_Themes/ Dergi/2013-104-1247.pdf, (Erişim Tarihi 17 Şubat 2017).

Analysis of the USA and the RF's Cyber Strategies within the Context of Democratic Party Hacking Scandal

Year 2017, Volume: 1 Issue: 1 - AUİLS | 2017 Special Issue, 1 - 24, 18.08.2017

Abstract

The United States of America (USA) and the Russian Federation (RF) are the most important global cyber forces that dominate cyber space today. The details of the system and planning of the cyber powers of the two states are based on the technological innovations derived from the military competition between the US and the Union of Soviet Socialist Republics (USSR) during the Cold War.

As a result of the rapid development of networking technologies as well as the commercialization and widespread use of the internet by the 1990s, the USA has rapidly developed national and international cyber security strategies and has reached today's strong cyberspace capacity. In the years after 2000, RF was able to have an effective cyber capacity including espionage, counter/espionage, disinformation, electronic war capabilities, psychological warfare and propaganda and cyber attack.

The cyber struggle between the two states has been moved to a new dimension with assertions that e-mails of some of the politics and consultants involved in RF's National Committee for the Democratic Party were provided by cyber attack methods organized by RF and leaked some of these emails to the public, thus actively manipulating the US electoral process in favor of other presidential candidate Donald Trump in the direction of RF’s national interests. In this context, the event defined as “Democratic Party hacking scandal” in the literature will be analyzed together with the mutually alleged cyber attacks happened between USA and RF within the context of the historical development of the cyber security strategies of two states in our study.

References

  • Abbate, Janet, “Government, Business, and the Making of the Internet”, Business History Review, Cilt 75, No 1, Bahar 2001, s.147-176.
  • AFCEA Organization, The Evolution of US Cyberpower, http://www.afcea. org/committees /cyber/documents/TheEvolutionofUSCyberpower.pdf, (Erişim Tarihi 23 Nisan 2016).
  • Akyazı, Uğur, “Uluslararası Siber Güvenlik Stratejisi ve Doktrinler Arasında Alınabilecek Tedbirler”, 6.Uluslararası Siber Güvenlik ve Kriptoloji Konferansı, http://www.iscturkey. org/s/2226/i/ 2013-paper105.pdf, (Erişim Tarihi 14 Nisan 2017).
  • Başa, Şafak, “ABD İç Güvenlik Bakanlığı”, https://www.academia.edu/9830086/ ABD_%C4% B0%C3 %87_G%C3%9CVENL%C4%B0K_BAKANLI%C4%9EI_SUNUM_, (Erişim Tarihi 31 Nisan 2017).
  • “Beyaz Saray ABD, 35 Rus diplomatı 72 saat içerisinde sınır dışı edecek”, Sputniknews Haber Portalı, https://tr.sputniknews.com/abd/201612291026553306-abd-rusya-yaptirim- diplomat-sinir-disi/, (Erişim Tarihi 20 Şubat 2017).
  • “Beyaz Saray, Rusya'nın Hackleme Operasyonuna Cevap Verileceğini Açıkladı”, Türk İnternet Haber Sitesi, http://www.turk-internet.com/portal/yazigoster.php?yaziid=54247, (Erişim Tarihi 20 Şubat 2017).
  • Bıçakcı, Salih, “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler, Cilt 10, No 40, Kış 2014, s. 101-130.
  • Bıçakcı, Salih, 21. Yüzyılda Siber Güvenlik, İstanbul, Bilgi Üniversitesi Yayınları, Ağustos 2013.
  • Carr, Jeffry, “Intelligence on Russian Information Warfare Activities”, http://jeffreycarr.blogspot.com/2012/01/intelligence-on-russian-information.html, (Erişim Tarihi 04 Ocak 2017).
  • Carr, Jeffrey, Inside Cyber Warfare: Mapping the Cyber Underworld, O'Reilly Media Inc., USA, 2011.
  • Committee on Homeland Security and Governmental Affairs, A Review of the Department of Homeland Security’s Missions and Performance, file:///C:/Users/tk44655/Downloads /Senator%20Coburn%20DHS%20Report%20FINAL%20(3).pdf, (Erişim Tarihi 31 Mayıs 2016).
  • Chivers, Ian ve Jane Sleightholme, “Fortran History and Development”, http://www.fortranplus .co.uk/resources/Fortran_history_and_development.pdf, (Erişim Tarihi 23 Nisan 2015).
  • “Cyberspace Becomes Second Front in Russia’s Clash With NATO”, Bloomberg Tecnology News Portal, http://www.bloomberg.com/news/articles/2015-10-14/cyberspace-becomes- second-front-in-russia-s-clash-with-nato, (Erişim Tarihi 01 Nisan 2017).
  • “Clinton'a 4 ay Boyunca Yapılan Siber Saldırılar, Seçimleri Manipule Etti”, Türk İnternet Haber Sitesi, http://www.turk-internet.com/portal/yazigoster.php?yaziid=55005, (Erişim Tarihi 20 Şubat 2017).
  • Darıcılı, A. Burak, “Rusya Federasyonu Kaynaklı Olduğu İddia Edilen Siber Saldırılar”, Uludağ Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, Cilt 7, No 2, 2014, s.1-16.
  • Darıcılı, A. Burak ve Barış Özdal, “Enformasyon Savaşı Bağlamında Rusya Federasyonu-Türkiye İlişkilerinin Analizi”, Gelişim Üniversitesi Sosyal Bilimler Dergisi, Cilt 4, Sayı 1, Nisan 2017, s.19-40.
  • Department of Homeland Security, Executive Summary of Grizzly Steppe Findings from Homeland Security Assistant Secretary for Public Affairs Todd Breasseale, https://www.dhs.gov/news/2016/12/30/executive-summary-grizzly-steppe-findings- homeland-security-assistant-secretary, (Erişim Tarihi 20 Şubat 2017).
  • Department of Homeland Security, Joint DHS, ODNI, FBI Statement on Russian Malicious Cyber Activity, https://www.dhs.gov/news/2016/12/29/joint-dhs-odni-fbi-statement- russian-malicious-cyber -activity, (Erişim Tarihi 20 Şubat 2017).
  • Department of Homeland Security, National Cybersecurity and Communications Integration Center, https://www.isaca.org/chapters2/New-York- Metropolitan/membership/Documents/2012-04-30%20Spring%20Conference- Meeting/2%20Lichtenfels%20DHS%20NCCIC%202.pdf, (Erişim Tarihi 31 Mayıs 2016).
  • EastWest Instıtute, The American and Russian Approaches to Cyber Challenges, http://www.omicsgroup.org/journals/the-american-and-russian-approaches-to-cyber- challenges-2167-0374.1000110.pdf, (Erişim Tarihi 14 Nisan 2017).
  • “Eski FBI Başkanı Comey: Trump yönetimi yalan söyledi.”, BBC, http://www.bbc.com/turkce/haberler-dunya-40199389, (Erişim Tarihi 10 Temmuz 2017).
  • Federal Bureau of Investigation, Cyber Crime, https://www.fbi.gov/about-us/investigate /cyber/ncijtf, (01 Haziran 2017).
  • Gerden, Eugene, “$500 Million for New Russian Cyber Army”, Security Magazine UK, http://www.scmagazineuk.com/500-million-for-new-russian-cyber- army/article/381720/, (Erişim Tarihi 26 Mart 2016).
  • Gibson, William, Neuromancer, Ace Books, New York, 1984.
  • “Hackers to the U.S. Election”, NY Timeshttps://www.nytimes.com/interactive /2016/07/27/us/politics/trail-of-dnc-emails-russia-hacking.html, (Erişim Tarihi 20 Şubat 2016).
  • Hagestad II, William, “Comparative Study: Iran, Russia and PRC Cyber War”, RSA Conference, 2013 Europe, http://www.rsaconference.com/writable/presentations/file_upload/hta-w01-comparative-study-iran-russia-prc-cyber-war_copy1.pdf, (Erişim Tarihi05 Mart 2017).
  • Heickerö, Roland, Emerging Cyber Threats and Russian Views on Information Warfare and Operation, Swedish Defense Research Agency Press, Mart, http://www.foi.se/rapport?rNo=FOI-R--2970--SE, (Erişim Tarihi 23 Haziran 2016).
  • Medvedev, A. Sergei, Offence-Defence Theory Analysis of Russian Cyber Capability, Master Thesis, Naval Post-Graduate School, Monterey, Colifornia, https://www.google.com.tr/?gfe_rd=cr&ei=qzHZVrreN7Go8wfMuYegDw#q=this+thesis +represent+mikhail+tsypkin, (Erişim Tarihi 05 Mart 2017).
  • Ministry of Foreign Affairs of the Russian Federation, Information Security Doctrine of Russian Federation,http://archive.mid.ru//bdomp/nsosndoc.nsf/1e5f0de28fe77fdcc32575d900 298676/2deaa9ee15ddd24bc32575d9002c442b!OpenDocument, (Erişim Tarihi 23 Mart 2016).
  • Mowthorpe, Matthew, “The Revolution in Military Affairs (RMA): The United States, Russian and Chinese Views”, file:///C:/Users/tk44655/Downloads/2011.06.02-Maturing- Revolution-In-Military-Affairs1.pdf, (Erişim Tarihi 05 Mart 2017).
  • National Security Agency, 60 Years of Defending Our Nation, http://www.nsa.gov/public_info/_files/cryptologic_histories/origins_of_nsa.pdf, (Erişim Tarihi 30 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, National Security Strategy, https://ccdcoe.org/sites/default/files/strategy/USA_NSS2015.pdf, (Erişim Tarihi 25 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, National Cyber Security Organisation in United States, https://ccdcoe.org/sites/default/files/multimedia/pdf/CS_organisation_ USA_122015.pdf, (Erişim Tarihi 01 Haziran 2019).
  • NATO Cooperative Cyber Defense Centre of Excellence, The Department of Defence Cyber Strategy,http://www.defense.gov/home/features/2015/0415_cyberstrategy/Final_201 5_DoD_CYBER_STRATEGY_for_web.pdf, (Erişim Tarihi 25 Mayıs 2016).
  • NATO Cooperative Cyber Defense Centre of Excellence, Basic Principles for State Policy of the Russian Federation in the Field of International Information Security, https://ccdcoe.org/sites/default/files/strategy/RU_state-policy.pdf, (Erişim Tarihi 24 Mart 2017).
  • “New Kremlin Information-Security Doctrine Calls For ‘Managing’ Internet In Russia”, RIA Novosti ve Mir24.Tv, http://www.rferl.org/a/russia-informaiton-security-internet- freedome concerns/28159130.html, (Erişim Tarihi 02 Ocak 2017).
  • Office of the Director of National Intelligence, Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution, https://www.dni.gov/files/documents/ICA_2017_01.pdf, (Erişim Tarihi 10 Temmuz 2017).
  • Presidency Of USA, Executive Order 13010—Critical Infrastructure Protection, http://www.presidency.ucsb.edu/ws/?pid=53066, (Erişim Tarihi 17 Şubat 2017).
  • “Putin'den ABD'ye yanıt: Biz hiç kimseyi sınır dışı etmeyeceğiz.”, Sputniknews Haber Portalı, https://tr.sputniknews.com/rusya/201612301026565257-putin-abdye-yanit-biz-hic- kimseyi-sinir-disi-etmeyecegiz/, (Erişim Tarihi 20 Şubat 2017).
  • “Putin Ordered ‘Influence Campaign’ Aimed at U.S. Election, Report Says”, NY Times, https://www.nytimes.com/2017/01/06/us/politics/russia-hack-report.html, (Erişim Tarihi 20 Şubat 2017).
  • “Putin: 'Patriotic' Russian hackers may have targeted US election”, CNN International, http://edition.cnn.com/2017/ 06/01/politics/russia-putin-hackers-election/index.html, (Erişim Tarihi 10 Temmuz 2017). “Russia Announces Development of Cyber Military Unit”, State Security Magazine, http://www.tripwire.com/state-of-security/latest-security-news/russia-announces- developme nt -cyberwar-military-unit/, (Erişim Tarihi 26 Mart 2017).
  • Rustrans Useful Translations, Russia's National Security Strategy to 2020, http://rustrans.wikidot. com/russia-s-national-security-strategy-to-2020, (Erişim Tarihi 23 Mart 2016).
  • Staar, R. Tocaso, “Russia’s Security Services”, Mediterranean Quarterly, Vol 15, Issue 1, 2010, ss.1- 10. Stewart, Phil ve Jim Wolf, "Old Worm Won’t Die after 2008 Attack on Military", Reuters, June 16 2011, http://www.reuters.com/article/us-usa-cybersecurity-worm- idUSTRE75F5TB20110617, (Erişim Tarihi16 Haziran 2016).
  • The Centre For Counterintelligence and Security Studies, Russia’s SVR/FSB/GRU Intelligence Services, http://www.cicentre.com/?page=191, (Erişim Tarihi 27 Mart 2016).
  • The Russian Ministry of Defense, Concept of the Foreign Policy of the Russian Federation,http://archive.mid.ru//brp_4.nsf/0/76389FEC168189ED44257B2E0039B16 D, (Erişim Tarihi 24 Mart 2016).
  • The Russian Ministry of Defense, Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in the Information Space, https://ccdcoe.org /strategies/ Russian_Federation_unofficial_translation.pdf, (Erişim Tarihi 23 Mart 2016).
  • Tirrell, K. William, United States Cybwer Security Strategy, Policy and Organization: Poorly Postured to Cope With a Post-9/11 Security Environment, Master Thesis, Washington University, 2012, https://www.hsdl.org/?view&did=729810, (Erişim Tarihi 10 Şubat 2017).
  • Thomas, L. Timothy, “Russia’s Information Warfare Strategy: Can the Nation Cope inFuture Conflicts?”, The Journal of Slavic Military Studies, Cilt 27, No 1, 2014, s. 20-42.
  • White House, Presidential Decision Directive (PDD)-63, Critical Infrastructure Protection, http://fas.org/irp/offdocs/pdd/pdd-63.htm, (Erişim Tarihi 24 Mayıs 2016).
  • Wirtz, J. James, “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”, NATO CCD COE Publications, Tallinn 2015, https://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Wirtz_0 3.pdf, (Erişim Tarihi 05 Mart 2016).
  • United States Department of Defense, About the Department of Defense (DoD)”, http://www.defense.gov/About-DoD, (Erişim Tarihi 30 Mayıs 2016).
  • Yayla, Mehmet, “Hukuki Bir Terim Olarak Siber Savaş”, http://portal.ubap.org.tr/App_Themes/ Dergi/2013-104-1247.pdf, (Erişim Tarihi 17 Şubat 2017).
There are 52 citations in total.

Details

Subjects Political Science
Journal Section Articles
Authors

Ali Burak Darıcılı

Publication Date August 18, 2017
Submission Date August 18, 2017
Published in Issue Year 2017 Volume: 1 Issue: 1 - AUİLS | 2017 Special Issue

Cite

APA Darıcılı, A. B. (2017). Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi. Ulisa: Uluslararası Çalışmalar Dergisi, 1(1), 1-24.
AMA Darıcılı AB. Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi. Ulisa: Uluslararası Çalışmalar Dergisi. August 2017;1(1):1-24.
Chicago Darıcılı, Ali Burak. “Demokrat Parti Hack Skandalı Bağlamında ABD Ve RF’nin Siber Güvenlik Stratejilerinin Analizi”. Ulisa: Uluslararası Çalışmalar Dergisi 1, no. 1 (August 2017): 1-24.
EndNote Darıcılı AB (August 1, 2017) Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi. Ulisa: Uluslararası Çalışmalar Dergisi 1 1 1–24.
IEEE A. B. Darıcılı, “Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi”, Ulisa: Uluslararası Çalışmalar Dergisi, vol. 1, no. 1, pp. 1–24, 2017.
ISNAD Darıcılı, Ali Burak. “Demokrat Parti Hack Skandalı Bağlamında ABD Ve RF’nin Siber Güvenlik Stratejilerinin Analizi”. Ulisa: Uluslararası Çalışmalar Dergisi 1/1 (August 2017), 1-24.
JAMA Darıcılı AB. Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi. Ulisa: Uluslararası Çalışmalar Dergisi. 2017;1:1–24.
MLA Darıcılı, Ali Burak. “Demokrat Parti Hack Skandalı Bağlamında ABD Ve RF’nin Siber Güvenlik Stratejilerinin Analizi”. Ulisa: Uluslararası Çalışmalar Dergisi, vol. 1, no. 1, 2017, pp. 1-24.
Vancouver Darıcılı AB. Demokrat Parti Hack Skandalı Bağlamında ABD ve RF’nin Siber Güvenlik Stratejilerinin Analizi. Ulisa: Uluslararası Çalışmalar Dergisi. 2017;1(1):1-24.
Ulisa: Journal of International Studies is published by the ULİSA Institute.