Araştırma Makalesi
BibTex RIS Kaynak Göster

Hukuk Siber Uzayda Caydırıcı Olabilir mi? Türk Ceza Kanunu Bağlamında Türkiye’nin Deneyimi

Yıl 2025, Cilt: 7 Sayı: 1, 114 - 130, 30.06.2025
https://doi.org/10.59940/jismar.1695163

Öz

Siber uzayın yaygın kullanımı, güvenlik kavramını önemli ölçüde dönüştürerek hem bireyler hem de devletler için karmaşık ve yeni tehditleri beraberinde getirmiştir. Bu makale, özellikle Türkiye’de siber uzayın yasal olarak düzenlenmesi bağlamında caydırıcılık konusunu incelemektedir. Fiziksel korumadan siber savunmaya doğru güvenliğin tarihsel dönüşümünü ele alarak başlayan çalışma, dijital alanın artık savaşın beşinci boyutu olarak kabul edilmesiyle geleneksel caydırıcılık modelleri açısından oluşturduğu zorlukları tartışmaktadır. Libicki ve Nye tarafından önerilen teorik çerçevelerden hareketle, makalede siber caydırıcılığın uygulanabilirliği; atfedilebilirlik, asimetri ve maliyet dinamikleri gibi sorunlar çerçevesinde ele alınmaktadır. Ayrıca hukuki caydırıcılığın rolü incelenmekte ve siber uzayda etkili bir caydırıcılığın yalnızca ağır yaptırımlarla değil; aynı zamanda hukuki sonuçların kesinliği, zamanında uygulanabilirliği ve icra edilebilirliği ile mümkün olabileceği vurgulanmaktadır. Makale, Türkiye’nin erken dönem reformlardan başlayarak Ceza Kanunu ve Budapeşte Sözleşmesi gibi uluslararası düzenlemelere uyumlu çağdaş yasalara uzanan hukuki ve kurumsal tepkilerini değerlendirmektedir. Türkiye, siber suçların düzenlenmesi konusunda önemli ilerlemeler kaydetmiş olsa da Hükmün Açıklanmasının Geri Bırakılması (HAGB) ve etkin pişmanlık gibi uygulamalar, hukuki sistemin caydırıcılık kapasitesini zayıflatan temel sorunlar arasında yer almaktadır. Çalışma, siber uzayda güçlü bir caydırıcılık çerçevesi oluşturmak için tutarlı ulusal mevzuat, uluslararası iş birliği ve hukuki normların istikrarlı şekilde uygulanmasının önemine dikkat çekerek son bulmaktadır. Bu makale 2023 yılında Hatay Mustafa Kemal Üniversitesi, Sosyal Bilimler Enstitüsü, Siyaset Bilimi ve Kamu Yönetimi Ana Bilim Dalında savunulan “Ulusal ve Uluslararası Güvenlik Politikaları Temelinde Dijitalleşme ve Siber Güvenlik: Hukuksal ve Yönetsel Bir Değerlendirme” başlıklı doktora tezinden türetilmiştir.

Kaynakça

  • [1] Baylis, J. (2008). Uluslararası İlişkilerde Güvenlik Kavramı. Uluslararası İlişkiler, 5(18): 69-85.
  • [2] Booth, K. (2007). Theory of World Security. University Press. https://doi.org/10.1017/CBO9780511840210
  • [3] Nye, J. S. (2011a). Nuclear Lessons for Cyber Security? Strategic Studies Quarterly, 5(4), 18-38.
  • [4] Mazarr, M. J. (2018). Understanding Deterrence. Rand Corporation Perspective. https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE295/RAND_PE295.pdf [Accessed: April 23, 2025)
  • [5] Libicki, M. C. (2009). Cyberdeterrence and cyberwar. The Rand Corporation.
  • [6] Nye, J. S. (2010). Cyber Power. Belfer Center for Science and International Affairs. https://apps.dtic.mil/sti/pdfs/ADA522626.pdf [Accessed: April 20, 2025]
  • [7] CISA (2022). Federal Information Security Modernization Act. https://www.cisa.gov/topics/cyber-threats-and-advisories/federal-information-security-modernization-act [Accessed: April 25, 2025]
  • [8] Resmi Gazete (2013). 2818 sayılı Siber Olaylara Müdahale Ekiplerinin Kuruluş, Görev ve Çalışmalarına Dair Usul ve Esaslar Hakkında Tebliğ. https://www.resmigazete.gov.tr/eskiler/2013/11/20131111-6.htm [Accessed: April 15, 2024]
  • [9] UAB (2020). 2020-2023 Ulusal Siber Güvenlik Stratejisi ve Eylem Planı. https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf [Accessed: July 16, 2023]
  • [10] Boulos, S. (2017). Cyberspace: Risks and Benefits for Society, Security and Development, Ramírez, J. M., & García-Segura, L. A. (Eds.). The Talinn Manual and Jus as bellu: Some Critical Notes, 231-242, Springer International Publishing. https://doi.org/10.1007/978-3-319-54975-0 [11] The Guardian (2007). “Russia accused of unleashing cyberwar to disable Estonia”. https://www.theguardian.com/world/2007/may/17/topstories3.russia [Accessed: March 25, 2025]
  • [12] Healy, J. & Jordan, K.T. (2014). Nato’s Cyber Capabilities: Yesterday, Today, and Tomorrow, Atlantic Council. https://www.atlanticcouncil.org/wp-content/uploads/2014/08/NATOs_Cyber_Capabilities.pdf [Accessed: March 20, 2025]
  • [13] Singer, P. W. & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
  • [14] Holloway, M. (2015). Stuxnet Worm Attack on Iranian Nuclear Facilities. Stanford University. http://large.stanford.edu/courses/2015/ph241/holloway1/ [Accessed: April 18, 2025]
  • [15] Orhan, U. (2021). Cezaları Ağırlaştırmak Caydırıcılığı Artırır mı? (Does Aggravating Penalties Increase Deterrence?). Türkiye Barolar Birliği Dergisi, 34(56), 65-85. http://tbbdergisi.barobirlik.org.tr/m2021-156-1997 [Accessed: January 3, 2023]
  • [16] Dolu, O., Büker, H.& Uludağ, Ş. (2012). Türk Ceza Adalet Sisteminin Caydırıcılık Kapasitesine İlişkin Eleştirel Bir Değerlendirme, Ankara Üniversitesi Hukuk Fakültesi Dergisi, 61(1), 69-106. https://doi.org/10.1501/Hukfak_0000001651
  • [17] United Nations Charter (1945). https://www.un.org/en/about-us/un-charter/full-text [Accessed: March 18, 2025]
  • [18] Schmitt, M. N., Vihul, L., & NATO Cooperative Cyber Defence Centre of Excellence (Ed.). (2017). Tallinn manual 2.0 on the international law applicable to cyber operations (First published 2017). Cambridge University Press.
  • [19] Tikk, E., Kaska, K. & Vihul, L. (2010). International Cyber Incidents Legal Considerations. NATO Cooperative Cyber Defence Centre of Excellence https://ccdcoe.org/uploads/2018/10/legalconsiderations_0.pdf [Accessed: March 15, 2025]
  • [20] Moynihan, H. (2020). The vital role of international law in the framework for responsible state behaviour in cyberspace. Journal of Cyber Policy, 6(3), 394–410. https://doi.org/10.1080/23738871.2020.1832550 [Accessed: April 18, 2025] [21] Nye, J.S. (2017). Deterrence and Dissuasion in Cyberspace. International Securit, Vol. 41, No. 3 (Winter 2016/17). https://www.belfercenter.org/sites/default/files/pantheon_files/files/publication/isec_a_00266.pdf [Accessed: April 4, 2025]
  • [22] International Committee of the Red Cross (ICRC). (2015). International humanitarian law and the challenges of contemporary armed conflicts. https://www.icrc.org/en/publication/international-humanitarian-law-and-challenges-contemporary-armed-conflicts-building [Accessed: April 18, 2025]
  • [23] Council of Europe. (2001). Convention on Cybercrime (ETS No. 185). https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 [Accessed: April 23, 2025]
  • [24] Carr, E.H. (2001). The Twenty Years’ Crisis: An Introduction to the Study of International Relations, New York: Palgrave.
  • [25] United Nations. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (A/70/174). https://digitallibrary.un.org/record/799853?ln=en&v=pdf [Accessed: April 29, 2025]
  • [26] United Nations. (2021). Report of the Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security (A/75/816). https://documents.un.org/doc/undoc/gen/n21/068/72/pdf/n2106872.pdf [Accessed: April 29, 2025]
  • [27] NATO. (2019). Cyber defence. https://www.nato.int/cps/en/natohq/topics_78170.htm [Accessed: April 29, 2025]
  • [28] European Commission. (2020). Cyber Diplomacy Toolbox. https://www.consilium.europa.eu/en/policies/cyber-diplomacy/ [Accessed: April 29, 2025]
  • [29] BTK (2017). Siber Güvenlik Kurulu. https://www.btk.gov.tr/siber-guvenlik-kurulu [Accessed: June 13, 2023]
  • [30] 5651 Kanun (2004). https://www.mevzuat.gov.tr/mevzuatmetin/1.5.5651.pdf [Accessed: June 13, 2023]
  • [31] Resmi Gazete (2008). 5809 sayılı Elektronik Haberleşme Kanunu. https://www.resmigazete.gov.tr/eskiler/2008/11/20081110M1-3.htm [Accessed: May 12, 2023]
  • [32] Resmi Gazete (2016). 6698 Sayılı Kişisel Verilerin Korunması Kanunu. https://www.resmigazete.gov.tr/eskiler/2016/04/20160407-8.pdf [Accessed: April 29, 2023]
  • [33] Resmi Gazete (1991). 3756 sayılı 765 sayılı Türk Ceza Kanunu’nun Bazı Maddelerinin Değiştirilmesine Dair Kanun. https://www.resmigazete.gov.tr/arsiv/20901.pdf [Accessed: Feb 2, 2023]
  • [34] 5237 Sayılı Türk Ceza Kanunu (2004). https://www.mevzuat.gov.tr/MevzuatMetin/1.5.5237.pdf [Accessed: July 12, 2023]
  • [35] 3756 sayılı 765 sayılı Türk Ceza Kanunu’nun Bazı Maddelerinin Değiştirilmesine Dair Kanun. https://www.resmigazete.gov.tr/arsiv/20901.pdf [Accessed: Feb 2, 2023]
  • [36] Türkiye Cumhuriyeti Anayasası (1982) https://www.mevzuat.gov.tr/mevzuat?MevzuatNo=2709&MevzuatTur=1&MevzuatTertip=5 [Accessed: Feb 2, 2023]
  • [37] EGM (2019). Siber Suç Nedir?. https://www.egm.gov.tr/siber/sibersucnedir [Accessed: April 2, 2023]
  • [38] Council of Europe Budapest Convention (2004). The Budapest Convention (ETS No. 185) and its Protocols. https://www.coe.int/en/web/cybercrime/the-budapest-convention [Accessed: June 21, 2023]
  • [39] 5271 Sayılı Ceza Muhakemesi Kanunu (2004). https://www.mevzuat.gov.tr/mevzuatmetin/1.5.5271.pdf [Accessed: June 27, 2023]

Can Law Deter in Cyberspace? Türkiye’s Experience in the Context of the Turkish Penal Code

Yıl 2025, Cilt: 7 Sayı: 1, 114 - 130, 30.06.2025
https://doi.org/10.59940/jismar.1695163

Öz

The widespread use of cyberspace has significantly transformed the concept of security, introducing complex and novel threats to both individuals and states. This article explores the idea of deterrence in cyberspace, particularly focusing on its legal dimensions within Türkiye's regulatory framework. It starts by tracing the historical shift in security from physical protection to cyber defense and discusses how the digital domain, now regarded as the fifth domain of warfare, presents unique challenges to traditional deterrence models. Drawing on theoretical frameworks, particularly those proposed by Libicki and Nye, the article examines the feasibility of cyber deterrence along with the challenges posed by attribution, asymmetry, and cost dynamics. It further investigates the role of legal deterrence, emphasizing that effective deterrence in cyberspace requires more than just severe penalties; it also depends on the certainty, promptness, and enforceability of legal consequences. The article reviews Türkiye's legal and institutional responses, from early reforms to the Penal Code to contemporary laws aligned with international conventions like the Budapest Convention. Despite Türkiye's significant progress in regulating cybercrime, practices such as the Postponement of the Announcement of the Verdict (HAGB) and effective remorse reductions pose key weaknesses that undermine the deterrent capacity of the legal system. The study concludes by asserting the importance of coherent national legislation, international cooperation, and the consistent application of legal norms to establish a strong deterrent framework in cyberspace. This article is derived from the doctoral dissertation titled “Digitalization and Cybersecurity Based on National and International Security Policies: A Legal and Administrative Assessment,” defended in 2023 at Hatay Mustafa Kemal University, Institute of Social Sciences, Department of Political Science and Public Administration.

Kaynakça

  • [1] Baylis, J. (2008). Uluslararası İlişkilerde Güvenlik Kavramı. Uluslararası İlişkiler, 5(18): 69-85.
  • [2] Booth, K. (2007). Theory of World Security. University Press. https://doi.org/10.1017/CBO9780511840210
  • [3] Nye, J. S. (2011a). Nuclear Lessons for Cyber Security? Strategic Studies Quarterly, 5(4), 18-38.
  • [4] Mazarr, M. J. (2018). Understanding Deterrence. Rand Corporation Perspective. https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE295/RAND_PE295.pdf [Accessed: April 23, 2025)
  • [5] Libicki, M. C. (2009). Cyberdeterrence and cyberwar. The Rand Corporation.
  • [6] Nye, J. S. (2010). Cyber Power. Belfer Center for Science and International Affairs. https://apps.dtic.mil/sti/pdfs/ADA522626.pdf [Accessed: April 20, 2025]
  • [7] CISA (2022). Federal Information Security Modernization Act. https://www.cisa.gov/topics/cyber-threats-and-advisories/federal-information-security-modernization-act [Accessed: April 25, 2025]
  • [8] Resmi Gazete (2013). 2818 sayılı Siber Olaylara Müdahale Ekiplerinin Kuruluş, Görev ve Çalışmalarına Dair Usul ve Esaslar Hakkında Tebliğ. https://www.resmigazete.gov.tr/eskiler/2013/11/20131111-6.htm [Accessed: April 15, 2024]
  • [9] UAB (2020). 2020-2023 Ulusal Siber Güvenlik Stratejisi ve Eylem Planı. https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf [Accessed: July 16, 2023]
  • [10] Boulos, S. (2017). Cyberspace: Risks and Benefits for Society, Security and Development, Ramírez, J. M., & García-Segura, L. A. (Eds.). The Talinn Manual and Jus as bellu: Some Critical Notes, 231-242, Springer International Publishing. https://doi.org/10.1007/978-3-319-54975-0 [11] The Guardian (2007). “Russia accused of unleashing cyberwar to disable Estonia”. https://www.theguardian.com/world/2007/may/17/topstories3.russia [Accessed: March 25, 2025]
  • [12] Healy, J. & Jordan, K.T. (2014). Nato’s Cyber Capabilities: Yesterday, Today, and Tomorrow, Atlantic Council. https://www.atlanticcouncil.org/wp-content/uploads/2014/08/NATOs_Cyber_Capabilities.pdf [Accessed: March 20, 2025]
  • [13] Singer, P. W. & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
  • [14] Holloway, M. (2015). Stuxnet Worm Attack on Iranian Nuclear Facilities. Stanford University. http://large.stanford.edu/courses/2015/ph241/holloway1/ [Accessed: April 18, 2025]
  • [15] Orhan, U. (2021). Cezaları Ağırlaştırmak Caydırıcılığı Artırır mı? (Does Aggravating Penalties Increase Deterrence?). Türkiye Barolar Birliği Dergisi, 34(56), 65-85. http://tbbdergisi.barobirlik.org.tr/m2021-156-1997 [Accessed: January 3, 2023]
  • [16] Dolu, O., Büker, H.& Uludağ, Ş. (2012). Türk Ceza Adalet Sisteminin Caydırıcılık Kapasitesine İlişkin Eleştirel Bir Değerlendirme, Ankara Üniversitesi Hukuk Fakültesi Dergisi, 61(1), 69-106. https://doi.org/10.1501/Hukfak_0000001651
  • [17] United Nations Charter (1945). https://www.un.org/en/about-us/un-charter/full-text [Accessed: March 18, 2025]
  • [18] Schmitt, M. N., Vihul, L., & NATO Cooperative Cyber Defence Centre of Excellence (Ed.). (2017). Tallinn manual 2.0 on the international law applicable to cyber operations (First published 2017). Cambridge University Press.
  • [19] Tikk, E., Kaska, K. & Vihul, L. (2010). International Cyber Incidents Legal Considerations. NATO Cooperative Cyber Defence Centre of Excellence https://ccdcoe.org/uploads/2018/10/legalconsiderations_0.pdf [Accessed: March 15, 2025]
  • [20] Moynihan, H. (2020). The vital role of international law in the framework for responsible state behaviour in cyberspace. Journal of Cyber Policy, 6(3), 394–410. https://doi.org/10.1080/23738871.2020.1832550 [Accessed: April 18, 2025] [21] Nye, J.S. (2017). Deterrence and Dissuasion in Cyberspace. International Securit, Vol. 41, No. 3 (Winter 2016/17). https://www.belfercenter.org/sites/default/files/pantheon_files/files/publication/isec_a_00266.pdf [Accessed: April 4, 2025]
  • [22] International Committee of the Red Cross (ICRC). (2015). International humanitarian law and the challenges of contemporary armed conflicts. https://www.icrc.org/en/publication/international-humanitarian-law-and-challenges-contemporary-armed-conflicts-building [Accessed: April 18, 2025]
  • [23] Council of Europe. (2001). Convention on Cybercrime (ETS No. 185). https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 [Accessed: April 23, 2025]
  • [24] Carr, E.H. (2001). The Twenty Years’ Crisis: An Introduction to the Study of International Relations, New York: Palgrave.
  • [25] United Nations. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (A/70/174). https://digitallibrary.un.org/record/799853?ln=en&v=pdf [Accessed: April 29, 2025]
  • [26] United Nations. (2021). Report of the Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security (A/75/816). https://documents.un.org/doc/undoc/gen/n21/068/72/pdf/n2106872.pdf [Accessed: April 29, 2025]
  • [27] NATO. (2019). Cyber defence. https://www.nato.int/cps/en/natohq/topics_78170.htm [Accessed: April 29, 2025]
  • [28] European Commission. (2020). Cyber Diplomacy Toolbox. https://www.consilium.europa.eu/en/policies/cyber-diplomacy/ [Accessed: April 29, 2025]
  • [29] BTK (2017). Siber Güvenlik Kurulu. https://www.btk.gov.tr/siber-guvenlik-kurulu [Accessed: June 13, 2023]
  • [30] 5651 Kanun (2004). https://www.mevzuat.gov.tr/mevzuatmetin/1.5.5651.pdf [Accessed: June 13, 2023]
  • [31] Resmi Gazete (2008). 5809 sayılı Elektronik Haberleşme Kanunu. https://www.resmigazete.gov.tr/eskiler/2008/11/20081110M1-3.htm [Accessed: May 12, 2023]
  • [32] Resmi Gazete (2016). 6698 Sayılı Kişisel Verilerin Korunması Kanunu. https://www.resmigazete.gov.tr/eskiler/2016/04/20160407-8.pdf [Accessed: April 29, 2023]
  • [33] Resmi Gazete (1991). 3756 sayılı 765 sayılı Türk Ceza Kanunu’nun Bazı Maddelerinin Değiştirilmesine Dair Kanun. https://www.resmigazete.gov.tr/arsiv/20901.pdf [Accessed: Feb 2, 2023]
  • [34] 5237 Sayılı Türk Ceza Kanunu (2004). https://www.mevzuat.gov.tr/MevzuatMetin/1.5.5237.pdf [Accessed: July 12, 2023]
  • [35] 3756 sayılı 765 sayılı Türk Ceza Kanunu’nun Bazı Maddelerinin Değiştirilmesine Dair Kanun. https://www.resmigazete.gov.tr/arsiv/20901.pdf [Accessed: Feb 2, 2023]
  • [36] Türkiye Cumhuriyeti Anayasası (1982) https://www.mevzuat.gov.tr/mevzuat?MevzuatNo=2709&MevzuatTur=1&MevzuatTertip=5 [Accessed: Feb 2, 2023]
  • [37] EGM (2019). Siber Suç Nedir?. https://www.egm.gov.tr/siber/sibersucnedir [Accessed: April 2, 2023]
  • [38] Council of Europe Budapest Convention (2004). The Budapest Convention (ETS No. 185) and its Protocols. https://www.coe.int/en/web/cybercrime/the-budapest-convention [Accessed: June 21, 2023]
  • [39] 5271 Sayılı Ceza Muhakemesi Kanunu (2004). https://www.mevzuat.gov.tr/mevzuatmetin/1.5.5271.pdf [Accessed: June 27, 2023]
Toplam 37 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Siber Güvenlik Politikaları
Bölüm Cilt 7 - Sayı 1 - 30 Haziran 2025 [tr]
Yazarlar

Mehmet Onur Özer 0000-0002-2926-3758

Mehmet Kahraman 0000-0003-2086-487X

Yayımlanma Tarihi 30 Haziran 2025
Gönderilme Tarihi 9 Mayıs 2025
Kabul Tarihi 18 Haziran 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 7 Sayı: 1

Kaynak Göster

APA Özer, M. O., & Kahraman, M. (2025). Can Law Deter in Cyberspace? Türkiye’s Experience in the Context of the Turkish Penal Code. Journal of Information Systems and Management Research, 7(1), 114-130. https://doi.org/10.59940/jismar.1695163