Araştırma Makalesi
BibTex RIS Kaynak Göster

The Difficult Exam of International Law: The Relationship Between Cyberspace and International Law

Yıl 2024, , 184 - 201, 19.10.2024
https://doi.org/10.53451/ijps.1531144

Öz

The increasing importance of cyberspace in today's social, economic, political, and military terms necessitates states to regulate this area. However, when considering the structure of cyberspace, there are serious differences in the attitudes of states regarding the regulation of this area. More importantly, many states do not take steps to regulate this area. This study provides an initial assessment of how states act regarding the regulation of some regulations in cyberspace within the framework of international law rules instead of national laws, from a descriptive and normative perspective. The study will also address the importance of states' failure to take steps regarding the regulation of this area, despite the difficulty of determining the rules of cyberspace, in terms of international law. Finally, an attempt is made to create a discussion on the capacities and limitations of states to establish international law rules regarding cyberspace..

Kaynakça

  • Akande, D., Coco, A., & Dias, .T. D. (2021), Old Habits Die Hard: Applying Existing International Law in Cyberspace and Beyond, EJILTALK! 2021, https://www.ejiltalk.org/old-habits-die-hard-applying-existing-international-law-in-cyberspace-and-beyond, (4.10.2024).
  • Bossert, Thomas P., It’s Official: North Korea Is Behind WannaCry, Wall Street Journal, 2017, https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537. (18.09.2024).
  • Clark, David, Characterizing Cyberspace: Past, Present and Future (MIT,CSAIL, 2010), 2-6.
  • Denardis Laura, The Global War For Internet Governance, Yale University Press, 2014.
  • Efrony, Dan, “Enhancing Accountability in Cyberspace Through a Three-Tiered International Governance Regime”, International Law Studies, Vol. 103, (2024), 399.
  • Fidler, David, ""Whither the Web?: International Law, Cybersecurity, and Critical Infrastructure Protection", Articles by Maurer Faculty, (2015): 2452.
  • Global Affairs Canada, Canada identifies malicious cyber-activity by Russia, 2018, https://www.canada.ca/en/global-affairs/news/2018/10/canada-identifies-malicious-cyber-activity-by-russia.html, (19.09.2024).
  • Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/70/174, 22 Temmuz 2015.
  • Hollis Duncan B. & Sander, Baries, International Law and Cyberspace: What Does State Silence Say? (Temple University Beasley School of Law Legal Studies Research Paper No. 2022-22), 1-3.
  • Hollis, Duncan, B. & Raustiala, K. (2023), The Global Governance of the Internet, in M. Barnett & D. Snidal (Eds.), The Oxford Handbook Of Internatıonal Institutions. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4197418.
  • International Law Association Committee on Formation of Customary (General) International Law, Statement of Principles Applicable to the formation of General Customary International Law (Report of the 69th Conference 1, ILA, London, 2000)
  • Joint Statement on Advancing Responsible State Behavior in Cyberspace, https://www.state.gov/joint-statement-on-advancing-responsible-state-behavior-in-cyberspace/, (4.10.2024).
  • Ku, Julian How China’s Views on the Law Jus Ad Bellum Will Shape its Legal Approach to Cyberwarfare, Aegis Paper No. 1701 (Stanford: Hoover Institution, 2017).
  • Koh, Harold Hongju, Harold Koh on International Law in Cyberspace, https://opiniojuris.org/2012/09/19/harold-koh-on-international-law-in-cyberspace/. (3.10.2014).
  • Lyon Matthew ve Hafner Katie, Where Wizards Stay Up Late - The Origins of the Internet New York: A Touchstone Book, 1998
  • Mbanaso, Uche & Dandaura, Emmanuel S., “The Cyberspace: Redefining A New World”, OSR Journal of Computer Engineering, Volume 17, Issue 3, (2015), 18.
  • Mendelson Maurice, “The Subjective Element in Customary International Law”, The British Year Book of International Law; Oxford Vol. 66, Iss. 1, (1996): 177 – 208.
  • Ministry of Defence of the Netherlands, Netherlands Defence Intelligence and Security Service disrupts Russian cyber-operation targeting OPCW, 2018, https://english.defensie.nl/topics/cyber-security/russian-cyber-operation, (19.09.2024).
  • Mueller, Milton L., Networks and States: The Global Politics of Internet Governance Massachusetts Institute of Technology, 2010.
  • Ney, Paul C., DOD General Counsel Remarks at U.S. Cyber Command Legal Conference, 2020, https://www.defense.gov/News/Speeches/speech/article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/, (19.09.2024).
  • Report of Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, UN Doc. A/76/135 (May 28, 2021),
  • Revision of the International Telecommunication Regulations, 17 ASIL INSIGHT (Feb. 7, 2013).
  • Schmitt Michael N. Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Cambridge: Cambridge University Press 2013.
  • UK National Cyber Security Centre, Reckless campaign of cyber-attacks by Russian military intelligence service exposed, Press Release, 2018,https://www.gchq.gov.uk/news/reckless-campaign-of-cyber-attacks-by-russian-military-intelligence-service-exposed, (19.09.2024).
  • UK condemns Russia's GRU over Georgia cyber-attacks, https://www.gov.uk/government/news/uk-condemns-russias-gru-over-georgia-cyber-attacks (4.10.2024).
  • U.S. Department of State, Condemning Cyber-Attacks by North Korea, Press Release (Dec. 18,2014), https://2009-2017.state.gov/secretary/remarks/2014/12/235444.htm. (18.09.2024).
  • UK National Cyber Security Centre, Reckless campaign of cyber-attacks by Russian military intelligence service exposed, Press Release, 2018,https://www.gchq.gov.uk/news/reckless-campaign-of-cyber-attacks-by-russian-military-intelligence-service-exposed, (19.09.2024).
  • UK condemns Russia's GRU over Georgia cyber-attacks, https://www.gov.uk/government/news/uk-condemns-russias-gru-over-georgia-cyber-attacks (4.10.2024).
  • U.S. Department of State, Condemning Cyber-Attacks by North Korea, Press Release (Dec. 18,2014), https://2009-2017.state.gov/secretary/remarks/2014/12/235444.htm. (18.09.2024).
  • Worster, William T. (2013), "The Effect of Leaked Information on the Rules of International Law." American University International Law Review 28 no. 2 (2013): 443-488.
  • Zittrain, Jonathan, The Future of the Internet And How to Stop It (London: Yale University Press, 2008), 7-10.

Uluslararası Hukukun Zorlu Sınavı: Siber Uzay ve Uluslararası Hukuk Arasındaki İlişki

Yıl 2024, , 184 - 201, 19.10.2024
https://doi.org/10.53451/ijps.1531144

Öz

Siber uzayın günümüzde sosyal, ekonomik, politik ve askeri açıdan artan önemi, Devletlerin bu alana yönelik düzenlemeler yapmasını zorunlu kılmaktadır. Ancak siber uzayın yapısı düşünüldüğünde Devletlerin bu alana yönelik düzenlemeleri arasında ciddi farklılıklar mevcuttur. Daha da önemlisi birçok devlet bu alan ile ilgili düzenleme yapmak konusunda adım atmamaktadır. Bu çalışma, betimleyici ve normatif bir bakış açısıyla, Devletlerin siber uzayda ulusal yasalar yerine uluslararası hukuk kuralları çerçevesinde bazı düzenlemelerin yapılması konusunda nasıl davrandıklarına dair başlangıç niteliğinde bir değerlendirme sunmaktadır. Çalışmada ayrıca, siber uzayın kurallarının belirlenmesindeki zorluğuna rağmen devletlerin bu alan ile ilgili düzenlemeler konusunda adım atmamasının uluslararası hukuk açısından önemi ele alınacaktır. Son olarak siber uzay ile ilgili uluslararası hukuk kurallarını inşa etmek için Devletlerin kapasiteleri ve kısıtlamaları hakkında bir tartışma oluşturulmaya çalışılmıştır.

Kaynakça

  • Akande, D., Coco, A., & Dias, .T. D. (2021), Old Habits Die Hard: Applying Existing International Law in Cyberspace and Beyond, EJILTALK! 2021, https://www.ejiltalk.org/old-habits-die-hard-applying-existing-international-law-in-cyberspace-and-beyond, (4.10.2024).
  • Bossert, Thomas P., It’s Official: North Korea Is Behind WannaCry, Wall Street Journal, 2017, https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537. (18.09.2024).
  • Clark, David, Characterizing Cyberspace: Past, Present and Future (MIT,CSAIL, 2010), 2-6.
  • Denardis Laura, The Global War For Internet Governance, Yale University Press, 2014.
  • Efrony, Dan, “Enhancing Accountability in Cyberspace Through a Three-Tiered International Governance Regime”, International Law Studies, Vol. 103, (2024), 399.
  • Fidler, David, ""Whither the Web?: International Law, Cybersecurity, and Critical Infrastructure Protection", Articles by Maurer Faculty, (2015): 2452.
  • Global Affairs Canada, Canada identifies malicious cyber-activity by Russia, 2018, https://www.canada.ca/en/global-affairs/news/2018/10/canada-identifies-malicious-cyber-activity-by-russia.html, (19.09.2024).
  • Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/70/174, 22 Temmuz 2015.
  • Hollis Duncan B. & Sander, Baries, International Law and Cyberspace: What Does State Silence Say? (Temple University Beasley School of Law Legal Studies Research Paper No. 2022-22), 1-3.
  • Hollis, Duncan, B. & Raustiala, K. (2023), The Global Governance of the Internet, in M. Barnett & D. Snidal (Eds.), The Oxford Handbook Of Internatıonal Institutions. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4197418.
  • International Law Association Committee on Formation of Customary (General) International Law, Statement of Principles Applicable to the formation of General Customary International Law (Report of the 69th Conference 1, ILA, London, 2000)
  • Joint Statement on Advancing Responsible State Behavior in Cyberspace, https://www.state.gov/joint-statement-on-advancing-responsible-state-behavior-in-cyberspace/, (4.10.2024).
  • Ku, Julian How China’s Views on the Law Jus Ad Bellum Will Shape its Legal Approach to Cyberwarfare, Aegis Paper No. 1701 (Stanford: Hoover Institution, 2017).
  • Koh, Harold Hongju, Harold Koh on International Law in Cyberspace, https://opiniojuris.org/2012/09/19/harold-koh-on-international-law-in-cyberspace/. (3.10.2014).
  • Lyon Matthew ve Hafner Katie, Where Wizards Stay Up Late - The Origins of the Internet New York: A Touchstone Book, 1998
  • Mbanaso, Uche & Dandaura, Emmanuel S., “The Cyberspace: Redefining A New World”, OSR Journal of Computer Engineering, Volume 17, Issue 3, (2015), 18.
  • Mendelson Maurice, “The Subjective Element in Customary International Law”, The British Year Book of International Law; Oxford Vol. 66, Iss. 1, (1996): 177 – 208.
  • Ministry of Defence of the Netherlands, Netherlands Defence Intelligence and Security Service disrupts Russian cyber-operation targeting OPCW, 2018, https://english.defensie.nl/topics/cyber-security/russian-cyber-operation, (19.09.2024).
  • Mueller, Milton L., Networks and States: The Global Politics of Internet Governance Massachusetts Institute of Technology, 2010.
  • Ney, Paul C., DOD General Counsel Remarks at U.S. Cyber Command Legal Conference, 2020, https://www.defense.gov/News/Speeches/speech/article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/, (19.09.2024).
  • Report of Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, UN Doc. A/76/135 (May 28, 2021),
  • Revision of the International Telecommunication Regulations, 17 ASIL INSIGHT (Feb. 7, 2013).
  • Schmitt Michael N. Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Cambridge: Cambridge University Press 2013.
  • UK National Cyber Security Centre, Reckless campaign of cyber-attacks by Russian military intelligence service exposed, Press Release, 2018,https://www.gchq.gov.uk/news/reckless-campaign-of-cyber-attacks-by-russian-military-intelligence-service-exposed, (19.09.2024).
  • UK condemns Russia's GRU over Georgia cyber-attacks, https://www.gov.uk/government/news/uk-condemns-russias-gru-over-georgia-cyber-attacks (4.10.2024).
  • U.S. Department of State, Condemning Cyber-Attacks by North Korea, Press Release (Dec. 18,2014), https://2009-2017.state.gov/secretary/remarks/2014/12/235444.htm. (18.09.2024).
  • UK National Cyber Security Centre, Reckless campaign of cyber-attacks by Russian military intelligence service exposed, Press Release, 2018,https://www.gchq.gov.uk/news/reckless-campaign-of-cyber-attacks-by-russian-military-intelligence-service-exposed, (19.09.2024).
  • UK condemns Russia's GRU over Georgia cyber-attacks, https://www.gov.uk/government/news/uk-condemns-russias-gru-over-georgia-cyber-attacks (4.10.2024).
  • U.S. Department of State, Condemning Cyber-Attacks by North Korea, Press Release (Dec. 18,2014), https://2009-2017.state.gov/secretary/remarks/2014/12/235444.htm. (18.09.2024).
  • Worster, William T. (2013), "The Effect of Leaked Information on the Rules of International Law." American University International Law Review 28 no. 2 (2013): 443-488.
  • Zittrain, Jonathan, The Future of the Internet And How to Stop It (London: Yale University Press, 2008), 7-10.
Toplam 31 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Uluslararası Hukuk
Bölüm Makaleler
Yazarlar

Erdi Şafak 0000-0003-4000-2468

Yayımlanma Tarihi 19 Ekim 2024
Gönderilme Tarihi 9 Ağustos 2024
Kabul Tarihi 7 Ekim 2024
Yayımlandığı Sayı Yıl 2024

Kaynak Göster

Chicago Şafak, Erdi. “Uluslararası Hukukun Zorlu Sınavı: Siber Uzay Ve Uluslararası Hukuk Arasındaki İlişki”. International Journal of Politics and Security 6, sy. 2 (Ekim 2024): 184-201. https://doi.org/10.53451/ijps.1531144.

23370

               

Data Sharing Policy
This journal encourages authors to share the data obtained as a result of their research while remaining within the requirements of the universal and legal criteria for the protection of personal rights with scientific ethics and citation rules. In this context, IJPS adopts the Budapest Open Access Initiative Declaration (2001).