TY - JOUR T1 - DEĞİŞİM VE DÖNÜŞÜMÜN EŞİĞİNDE SİBER SAVAŞ AU - Açıkalın, Şuay Nilhan AU - Baykız, Tekin PY - 2024 DA - December Y2 - 2024 JF - Muhafazakar Düşünce Dergisi JO - MDD PB - Kadim Yayınları WT - DergiPark SN - 1304-8864 SP - 200 EP - 220 VL - 20 IS - 67 - Dijital Çağda Siyaset LA - tr AB - İnsanlık tarihi boyunca tehdit ve savaş kavramları içerik ve kapsam bakımından çok çeşitlidönüşümler geçirmiştir. Savaş kavramı, her ne kadar güç kavramı üzerinden şekillense de sonyüzyılda savaş ve tehdit araç ve yöntemlerindeki en büyük dönüşüm, teknolojik gelişmelerle ortayaçıkmıştır. 20. yüzyılın başlarında savaş teknolojileri özellikle konvansiyonel savaş çerçevesindeşekillenirken, özellikle son 20 yılda dijital devrim, geleneksel savaş alanlarının dışında yeni savaşalanlarının ortaya çıkmasına neden olmuştur. Bu çalışmada, siber savaşın evrimini analiz etmekve vaka çalışması çerçevesinde değerlendirmek amaçlanmıştır. Literatür taramaya dayalı buçalışmada doküman analizi yöntemiyle 7 farklı örnek olay incelenmiştir. Yapılan çalışma sonucundasaldırı araçlarının yıllar içinde farklılaştığı ve karmaşıklaştığı görülmüştür. Buna ek olarak sibersavaşın verdiği zarar da çok boyutluluk göstermiştir. İkinci olarak dijitalleşme, bilgi ve iletişim teknolojilerindekimuazzam artış, güvenlikçi bir bakış açısıyla bilgi sistemlerine bağımlılık yaratmıştır.Üçüncü ve son olarak siber saldırılar çeşitlilik göstererek artmış olsa da siber savaş kapsamındageliştirilen savunma sistemlerinde de ilerleme kaydedilmesini sağlamıştır. KW - Siber Savaş KW - Hibrit Savaş KW - Siber Uzay KW - Dijitalleşme KW - Vaka Çalışması CR - Ahronheim, A. (2018a, Mart). After a decade Israel admits: We bombed Syria nuclear reactor in 2007—The Jerusalem Post [Newspaper]. The Jerusalem Post. https://www.jpost.com/ Arab-Israeli-Conflict/After-a-decade-Israel-admits-We-bombed-Syria-nuclear-reactorin- 2007-546573 CR - Ahronheim, A. (2018b, Mart 21). Liberman: Squabbling over credit for strike on Syrian reactor an “embarrassment”. The Jerusalem Post | JPost.Com. https://www.jpost.com/israel-news/ liberman-praises-israels-strike-on-syrian-reactor-livni-recalls-events-546640 CR - Aktaş, M. (2023, Mart 7). Unraveling the Moonlight Maze: The State-Sponsored Cyber Espionage Campaign that Changed…. Medium. https://medium.com/@mertaktas1283/unravelingthe- moonlight-maze-the-state-sponsored-cyber-espionage-campaign-that-changed- 1a79e129b358 CR - Beard, M. (2013). Cyberwar and just war theory. Applied ethics, risk, justice and liberty, 1-12. Bendovschi, A. (2015). Cyber-Attacks- Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 28, 2015, 24-31. https://doi.org/10.1016/S2212- 5671(15)01077-1 CR - Benis, M. (2023, Ocak). (23) Titan Rain: The 2005 Cyber Attacks on the US Department of Defense | LinkedIn [Blog]. LinkedIn. https://www.linkedin.com/pulse/titan-rain-2005-cyberattacks- us-department-defense-michael-benis/ CR - Biernacik, B. (2018). The Fifth Dimension of War–Cyberspace. How to Secure This Area: The Approach of Selected States and International Organizations to Cybersecurity. Zeszyty Naukowe Wyższej Szkoły Bankowej w Poznaniu, 83(6), 2018, 63-84. CR - Bodmer, S. (2012). Reverse deception: Organized cyber threat counter-exploitation. McGraw-Hill. Boichak, O. (2021). Digital War: Mediatized Conflicts in Sociological Perspective. in The Oxford Handbook of Digital Media Sociology. (Ed.) Deana A. R., Sarah S. CR - Carr, J. (2012). Inside cyber warfare (2nd ed). O’Reilly. CR - CFR. (2019). Tracking State-Sponsored Cyberattacks Around the World. Council on Foreign Relations. https://www.cfr.org/cyber-operations CR - Chinnaraj, S. (2024, Şubat). (22) The Infamous “I Love You” Virus: A Cybersecurity Milestone | LinkedIn [Blog]. Linkedin. https://www.linkedin.com/pulse/infamous-i-love-you-viruscybersecurity- milestone-chinnaraj-tbzfc/ CR - Choucri, N. (2012). Cyberpolitics in International Relations. The MIT Press. https://doi. org/10.7551/mitpress/7736.001.0001 CR - Clements, R. (2012, Eylül 10). New details of Israel’s 2007 attack on the Syrian Nuclear reactor emerge. The Aviationist. https://theaviationist.com/2012/09/10/op-orchard/ CR - Collins, S., McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 2012, 80-91. https://doi.org/10.1080/18335330.2012.653198 CR - Cyware Labs. (t.y.). Remembering Operation Titan Rain—Titan Rain Cyber Attack. Cyware Labs. Geliş tarihi 12 Eylül 2024, gönderen https://cyware.com/news/remembering-operationtitan- rain-c54ad3e4 CR - Czosseck, C., Ottis, R., Talihärm, A.-M. (2011). Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security. International Journal of Cyber Warfare and Terrorism, 1(1), 2011, 24-34. https://doi.org/10.4018/ijcwt.2011010103 CR - Çelik, Ş. (2013). Stuxnet Saldırısı ve ABD’nin Siber Savaş Stratejisi: Uluslararası Hukukta Kuvvet Kullanmaktan Kaçınma İlkesi Çerçevesinde Bir Değerlendirme. Dokuz Eylul University Law Review, 15(1), 2013, Article 1. CR - Davis, J. (2007, Ağustos 21). Hackers Take Down the Most Wired Country in Europe | WIRED [Newspaper]. The Wired. https://www.wired.com/2007/08/ff-estonia/ CR - Doman, C. (2018, Ocak 22). The First Sophistiated Cyber Attacks: How Operation Moonlight Maze made history. Medium. https://medium.com/@chris_doman/the-first-sophistiatedcyber- attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7 Farwell, J. P., Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), 2011, 23-40. https://doi.org/10.1080/00396338.2011.555586 CR - FBI. (2014, Aralık 19). Update on Sony Investigation—FBI [Press Release]. https://www.fbi.gov/ news/press-releases/update-on-sony-investigation CR - Gasparre, R. (2008, Mart 10). The Israeli “E-tack” on Syria – Part II - Airforce Technology. Airforce Technology. https://www.airforce-technology.com/features/feature1669/ CR - Grant, P. (2024, Nisan 15). Moonlight Maze: Russian Espionage, Hacking, and Cyber Warfare in the Lead-Up to the 2016 Election. Medium. https://medium.com/@petergrant_14485/ moonlight-maze-russian-espionage-hacking-and-cyber-warfare-in-the-lead-up-to-the- 2016-election-a8fdbee51309 CR - Griffin, A. (2017, Haziran 27). Chernobyl’s radiation monitoring system has been hit by the worldwide cyber attack. The Independent. https://www.independent.co.uk/ tech/chernobyl-ukraine-petya-cyber-attack-hack-nuclear-power-plant-dangerlatest- a7810941.html CR - Gross, J. A. (2018, Mart 21). Ending a decade of silence, Israel confirms it blew up Assad’s nuclear reactor [Newspaper]. Times of Israel. https://www.timesofisrael.com/ending-a-decadeof- silence-israel-reveals-it-blew-up-assads-nuclear-reactor/ CR - Güntay, V. (2017). Uluslararasi Sistem ve Güvenlik Açisindan Değişen Savaş Kurgusu; Siber Savaş Örneği. Güvenlik Bilimleri Dergisi, 6(2), 2017, 81-108. CR - Holat, O. (2021). Yeni medya ve siber savaş kavramları bağlamında Stuxnet saldırısı örneğinin incelenmesi. Abant Kültürel Araştırmalar Dergisi, 6(11), 2021, 105-121. CR - Kaspersky Securelist, A. (t.y.). Moonlight Maze is a historic cyberespionage campaign [Logbook]. APT Kaspersky Securelist. Geliş tarihi 14 Eylül 2024, gönderen https://apt.securelist.com/ apt/moonlight-maze CR - Keskin, Ş. (2017). Realizm ve Liberalizm Işığında Siber Savaş ve Alternatif Bir Kavram Olarak Siber Barış’ın Değerlendirilmesi. TURAN-SAM, 9(35), 2017, 287-297. CR - Krajnyk, R. (2024, Mart 10). # 1 - The World’s Worst Computer Virus: The I Love You Virus - ZOO Repairs x [Blog]. Zoo Computer Repairs. https://www.zoorepairs.com.au/worlds-worstcomputer- virus/ CR - Lachow, I. (2011). The Stuxnet Enigma: Implications for the Future of Cybersecurity. Georgetown Journal of International Affairs, 118-126. CR - Landler, M., & Markoff, J. (2007, Mayıs 29). Digital Fears Emerge After Data Siege in Estonia. CR - The New York Times. https://www.nytimes.com/2007/05/29/technology/29estonia.html CR - Laughland, O., Rushe, D. (2014, Aralık 19). Sony cyber attack linked to North Korean government hackers, FBI says. The Guardian. https://www.theguardian.com/usnews/ 2014/dec/19/north-korea-responsible-sony-hack-us-official CR - Li, S. (2023, Eylül 27). How to Prevent Email-Borne Malware: Lessons from I-LOVE-YOU Virus. Cybersecurity Solutions | Email & Network Security. https://abusix.com/blog/emailsecurity/ how-to-prevent-email-borne-malware-lessons-from-i-love-you-virus/ CR - Makovsky, D. (2012, Eylül 10). The Silent Strike | The New Yorker [Newspaper]. The New Yorker. https://www.newyorker.com/magazine/2012/09/17/the-silent-strike CR - Nakashima, E. (2016, Haziran 14). Russian government hackers penetrated DNC, stole opposition research on Trump. Washington Post. https://www.washingtonpost.com/ world/national-security/russian-government-hackers-penetrated-dnc-stole-oppositionresearch- on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html CR - Proofpoint. (2023, Temmuz 10). What Is Privilege Escalation? - Definition, Types, Examples | Proofpoint US. Proofpoint. https://www.proofpoint.com/us/threat-reference/privilege-escalation CR - Ranger, S. (2018, Aralık 4). What is cyberwar? Everything you need to know about the frightening future of digital conflict | ZDNET. ZDnet. https://www.zdnet.com/article/cyberwar-aguide- to-the-frightening-future-of-online-conflict/ CR - Rid, T. (2016, Ekim 20). How Russia Pulled Off the Biggest Election Hack in U.S. History. Esquire. https://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/ CR - Roberts, D., Jacobs, B., Yuhas, A. (2016, Temmuz 25). Debbie Wasserman Schultz to resign as DNC chair as email scandal rocks Democrats. The Guardian. https://www.theguardian. CR - com/us-news/2016/jul/24/debbie-wasserman-schultz-resigns-dnc-chair-emails-sanders Robinson, M., Jones, K., Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & Security, (49), 2015, 70-94. https://doi.org/10.1016/j.cose.2014.11.007 CR - Schwarz, E. (2024, Şubat 12). Unraveling the I Love You Computer Virus on Valentine’s Day— TriLeafTech. https://trileaftech.com/i-love-you-virus-cybersecurity-lessons/ CR - Segal, A. (2017). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age (Second edition). PublicAffairs. CR - Shakarian, P., Shakarian, J., Ruef, A. (2013). Introduction to cyber-warfare: a multidisciplinary approach. Amsterdam: Morgan Kaufmann Publishers – Elsevier. s. 2. CR - Stark, H. (2009, Kasım 2). The Story of “Operation Orchard”: How Israel Destroyed Syria’s Al Kibar Nuclear Reactor—DER SPIEGEL [Newspaper]. Der Spiegel. https://www.spiegel.de/ international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-alkibar- nuclear-reactor-a-658663.html CR - The UK National Cyber Security Centre. (2018, Ekim 4). UK exposes Russian cyber attacks. GOV. UK. https://www.gov.uk/government/news/uk-exposes-russian-cyber-attacks CR - The White House. (2016, Aralık 29). Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment. Whitehouse.Gov. https://obamawhitehouse. archives.gov/the-press-office/2016/12/29/statement-president-actions-responserussian- malicious-cyber-activity CR - Thornburgh, N. (2005, Ağustos 29). The Invasion of the Chinese Cyberspies. TIME. https://time. com/archive/6674509/the-invasion-of-the-chinese-cyberspies/ CR - Traynor, I. (2007, Mayıs 17). Russia accused of unleashing cyberwar to disable Estonia. The Guardian. https://www.theguardian.com/world/2007/may/17/topstories3.russia CR - Vaishnav, C., Choucri, N., Clark, D. (2013). Cyber international relations as an integrated system. Environment Systems and Decisions, 33(4), 2015, 561-576. https://doi. org/10.1007/s10669-013-9480-3 CR - Yayla, M. (2013). Hukuki bir terim olarak siber savaş. Türkiye Barolar Birliği Dergisi, 104, 2013, 177-202. CR - Walker, C. (2017, Temmuz 18). Red Alert: Russian Hackers Hit Colorado in “Moonlight Maze” Invasion. Westword. https://www.westword.com/news/russian-cyberattacks-invadedcolorado- in-moonlight-maze-campaign-9269380 CR - Weinberger, S. (2007, Ekim 4). How Israel Spoofed Syria’s Air Defense System. Wired. https:// www.wired.com/2007/10/how-israel-spoo/ CR - Wikileaks. (2016). WikiLeaks—The Podesta Emails [Wiki]. Wikileaks. https://www.wikileaks.org/ podesta-emails/ CR - Zetter, K. (2017, Nisan 4). New Evidence Links a 20-Year-Old Hack on the US Government to a Modern Attack Group. VICE. https://www.vice.com/en/article/moonlight-maze-turla-link/ UR - https://dergipark.org.tr/tr/pub/muhafazakar/issue//1602302 L1 - https://dergipark.org.tr/tr/download/article-file/4443950 ER -