<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>cbd</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Coğrafi Bilimler Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1303-5851</issn>
                                        <issn pub-type="epub">1308-9765</issn>
                                                                                            <publisher>
                    <publisher-name>Ankara Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.33688/aucbd.1788517</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Political Geography</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Siyasi Coğrafya</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Siber Mekânın Siyasi Coğrafyası: Şifreleme, Gözetim ve Küresel Güç İlişkileri</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>The Political Geography of Cyberspace: Encryption, Surveillance, and Global Power Relations</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8694-0981</contrib-id>
                                                                <name>
                                    <surname>Nargül</surname>
                                    <given-names>Semih</given-names>
                                </name>
                                                                    <aff>VAN YÜZÜNCÜ YIL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                                                <issue>Advanced Online Publication</issue>
                                        <fpage>337</fpage>
                                        <lpage>353</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250921">
                        <day>09</day>
                        <month>21</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260410">
                        <day>04</day>
                        <month>10</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2003, Coğrafi Bilimler Dergisi</copyright-statement>
                    <copyright-year>2003</copyright-year>
                    <copyright-holder>Coğrafi Bilimler Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Dijital çağ, siyasi coğrafyanın sınırlarını kökten dönüştürmektedir. Bu çalışma, siber mekânın klasik devlet-merkezli düzeni nasıl aşındırdığını ve yeniden kurduğunu üç boyut üzerinden incelemektedir: şifreleme, gözetim ve yeni aktörler. Şifreleme teknolojileri bireylere ulusal sınırların ötesinde ifade ve örgütlenme özgürlüğü tanırken, aynı zamanda suç ve terör ağlarına da alan açmaktadır. Dijital panoptikon çerçevesinde ele alınan gözetim teknolojileri, devletlerin egemenlik kapasitesini toprak sınırlarının ötesine taşıyarak mahremiyet, güvenlik ve kamusal alanı yeniden tanımlamaktadır. WikiLeaks, Anonymous ve Snowden örnekleri ise bireylerin ve ağ tabanlı kolektiflerin uluslararası siyasette yeni güç biçimleri ürettiğini göstermektedir. Bulgular, siber mekânın özgürleşme ile denetim, birey ile devlet, sınır ile ağ arasındaki gerilimde şekillenen çok aktörlü ve veri temelli bir siyasi coğrafya yarattığını ortaya koymaktadır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>The digital age is fundamentally transforming the boundaries of political geography. This study examines how cyberspace erodes and reconfigures the classical state-centered order through three dimensions: encryption, surveillance, and new actors. While encryption technologies grant individuals freedom of expression and organization beyond national borders, they also provide a space for criminal and terrorist networks. Surveillance technologies, examined within the framework of the digital panopticon, extend the sovereignty of states beyond territorial borders, redefining privacy, security, and the public sphere. Examples such as WikiLeaks, Anonymous, and Snowden demonstrate that individuals and network-based collectives are producing new forms of power in international politics. The findings reveal that cyberspace creates a multi-actor, data-driven political geography shaped by tensions between liberation and control, the individual and the state, and borders and networks.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Siber mekân</kwd>
                                                    <kwd>  Siyasi coğrafya</kwd>
                                                    <kwd>  Şifreleme</kwd>
                                                    <kwd>  Gözetim</kwd>
                                                    <kwd>  Yeni aktörler</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Cyberspace</kwd>
                                                    <kwd>  Political geography</kwd>
                                                    <kwd>  Encryption</kwd>
                                                    <kwd>  Surveillance</kwd>
                                                    <kwd>  New actors</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">ABD Yüksek Mahkemesi. (2014). Riley v. California, No. 13-132. Erişim adresi: https://supreme.justia.com/cases/federal/us/573/13-132/case.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Alvarez, J. (2015). Stuxnet: The world&#039;s first cyber weapon. Stanford Center for International Security and Cooperation. Erişim adresi: https://cisac.fsi.stanford.edu/news/stuxnet</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Arendt, H. (1963). Eichmann in Jerusalem: A Report on the Banality of Evil. New York: Penguin.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Avrupa Parlamentosu (2014). Introductory statement by Edward Snowden submitted to the European Parliament’s inquiry into the Electronic Mass Surveillance of EU Citizens. European Parliament. Erişim adresi: https://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">BBC. (2024). Hizbullah&#039;ın çağrı cihazlarının patlatılması: Hangi sorular yanıt buldu? Erişim adresi: https://www.bbc.com/turkce/articles/czj978p0w39o</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Berkman Center (2016). Don’t Panic Making Progress on the “Going Dark” Debate Erişim adresi: https://cyber.law.harvard.edu/pubrelease/dontpanic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Berlinski, D. (2000). The Advent of the Algorithm: The 300-Year Journey from an Idea to the Computer. Houghton Mifflin Harcourt.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Blount, P. J. (2019). Reprogramming the World: Cyberspace and the Geography of Global Order. E-International Relations Publishing.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Borgwardt, E. (2005). A New Deal for the World: America’s Vision for Human Rights. Cambridge, MA: Belknap.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Boschetti, N., Gordon, N. G. &amp; Falco, G. (2022, October 24). Space Cybersecurity Lessons Learned from the ViaSat Cyberattack. ASCEND 2022. https://doi.org/10.2514/6.2022-4380</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Bowman, G. W. (2007). Thinking Outside the Border: Homeland Security and the Forward Deployment of the US Border. Houston Law Review, 44(2): 189–251. Erişim adresi: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=921121</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Castells, M. (2007). Communication, Power and Counter-Power in the Network Society. International Journal of Communication, 1(1): 238-266. Erişim adresi: https://ijoc.org/index.php/ijoc/article/view/46</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Castells, M. (2010). The rise of the network society. Wiley-Blackwell.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Clapham, C. (1998). Degrees of Statehood. Review of International Studies, 24(2): 143–57.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Clinton, H. (2011). Internet Rights and Wrongs: Choices &amp; Challenges in a Networked World remarks. U.S. Department of State. Erişim adresi: https://2009-2017.state.gov/secretary/20092013clinton/rm/2011/02/156619.htm</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Cohen, J. E. (2008). Privacy, Visibility, Transparency, and Exposure. The University of Chicago Law Review, 181–201. Erişim adresi: https://scholarship.law.georgetown.edu/facpub/805/</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Deleuze, G. &amp; Guattari, F. (2015). A thousand plateaus : capitalism and schizophrenia. Bloomsbury.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">DeNardis, L. (2014). The Global War for Internet Governance. New Haven: Yale University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Dittmer, J. (2015). Everyday Diplomacy: UKUSA Intelligence Cooperation and Geopolitical Assemblages. Annals of the Association of American Geographers, 105(3), 604–619. https://doi.org/10.1080/00045608.2015.1015098</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Domscheit-Berg, D. (2011). Inside Wikileaks: My Time with Julian Assange at the World’s Most Dangerous Website. New York: Crown Publishers.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Fielder, J. D. (2013). “The Internet and Dissent in Authoritarian States,” in Conflict and Cooperation in Cyberspace: The Challenge to National Security, (Eds.) In Panayotis A. Yannakogeorgos &amp; Adam B. Lowther, pp. 161-191. Boca Raton: Taylor &amp; Francis.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Foucault, M. (1995). Discipline and Punish: The Birth of the Prison. New York: Vintage Books.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Gellman, B. &amp; Poitras, L. (2013). U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. The Washington Post. Erişim adresi: http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Greenberg, A. (2012). This Machine Kills Secrets: How WikiLeakers, Cypherpunks and Hacktivists Aim to Free the World’s Information. New York: Dutton.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Greenwald, G. (2014a). NSA Collecting Phone Records of Millions of Verizon Customers Daily. The Guardian. Erişim adresi: http://www. theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Greenwald, G. (2014b). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Habermas, J. (2001). The Postnational Constellation: Political Essays. MIT Press.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Hopkins, N., Borger, J. &amp; Harding, L. (2013). GCHQ: Inside the Top Secret World of Britain’s Biggest Spy Agency. The Guardian. Erişim adresi: http://www.theguardian.com/world/2013/aug/02/gchq-spy-agency-nsa-snowden</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Kahn, D. (1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Lam, L. (2013). EXCLUSIVE: US Hacked Pacnet, Asia Pacific Fibre-Optic Network Operator, in 2009. South China Morning Post. Erişim adresi: http://www.scmp.com/news/hong-kong/article/1266875/exclusive-us-hacked-pacnet-asia-pacific-fibre-optic-network-operator</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Lessig, L. (2004). Free Culture : The Nature and Future of Creativity. New York: Penguin Books.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Lessig, L. (2006). Code 2.0. Basic Books.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Michel, A. H. (2015). How Rogue Techies Armed the Predator, Almost Stopped 9/11, and Accidentally Invented Remote War. Wired. Erişim adresi: https://www.wired.com/2015/12/how-rogue-techies-armed-the-predator-almost-stopped-911-and-accidentally-invented-remote-war/</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Moore, D. &amp; Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1): 7–38. https://doi.org/10.1080/00396338.2016.1142085</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">National Security Agency. (2013). PRISM/US-984XN Overview of the SIGAD Used Most in NSA Reporting Overview. https://nsarchive2.gwu.edu/NSAEBB/NSAEBB436/docs/EBB-055.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">O’Brien, J. (2019). Keeping Enigma Secret From The Germans– Many Lives Were Lost Sacrificed Doing So, War History Erişim adresi: https://www.warhistoryonline.com/instantarticles/times-allies-didnt-use-enigma.html</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">PCLOB. (2014). Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act. Erişim adresi: https://documents.pclob.gov/prod/Documents/OversightReport/e9e72454-4156-49b9-961a-855706216063/2023%20PCLOB%20702%20Report%20(002).pdf</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Poitras, L., Rosenbach, M. &amp; Stark, H. (2013). NSA Spies on 500 Million German Data Connections. Spiegel Online. Erişim adresi:http://www.spiegel.de/international/germany/nsa-spies-on-500-million-german-data-connections-a-908648.html</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Russon, M-A. (2021). ABD&#039;de siber saldırı: Bilgisayar korsanları ülkenin en büyük boru hattını devre dışı bıraktı, akaryakıt karayoluyla taşınacak. BBC. Erişim adresi: https://www.bbc.com/turkce/haberler-dunya-57056048</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Snowden, E. (2014). Testimony before the Parliament of the European Union. Erişim adresi: http://library.blountsfolly.com/space/items/show/171.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Soesanto, S. (2022). The IT Army of Ukraine Structure, Tasking, and Eco-System. CyberDefense Report. Erişim adresi: https://www.research-collection.ethz.ch/bitstreams/388e09e6-ce5e-4330-a284-13e873952f67/download</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Svyrydenko, D. &amp; Mozgin, W. (2022). Hacktivism of the Anonymous Group as a Fighting Tool in the Context of Russia’s War against Ukraine. Future Human Image, 17. https://doi.org/10.29202/fhi/17/6</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Timberg, C. &amp; Nakashima, E. (2013). Agreements with Private Companies Protect U.S. Access to Cables’ Data for Surveillance. The Washington Post. Erişim adresi: http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html 
United Nations Security Council. (1960). S/RES/138 Question relating to the case of Adolf Eichmann. Erişim adresi: https://digitallibrary.un.org/record/112107?v=pdf</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">Zimmermann, P. R. (1995). The Official PGP User’s Guide. MIT Press.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for The Future at the New Frontier Of Power. Profile Books.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
