Araştırma Makalesi
BibTex RIS Kaynak Göster

Yıl 2025, Cilt: 12 Sayı: 2
https://doi.org/10.26513/tocd.1785938

Öz

Kaynakça

  • AA. (2025, May 15). Interview – ‘Expose them’: Viral Palantir protester warns all complicit in Gaza horrors. https://www.aa.com.tr/en/middle-east/interview-expose-them-viral-palantir-protester-warns-all-complicit-in-gaza-horrors/3565328
  • Abraham, Y. (2025). Israeli intelligence data: Militants account for only 1 in 4 Gaza detainees. +972 Magazine. https://www.972mag.com/israeli-intelligence-database-militants-civilians-gaza-detainees/
  • Abu-Sittah, G. (2020). The Virus, the Settler, and the Siege: Gaza in the Age of Corona. Journal of Palestine Studies, 49(4(196)), 65–76.
  • Action, P., & Corbyn, J. (2024). Direct Action against the Arms Trade. In R. Michie, A. Feinstein, & P. Rogers (Eds.), Monstrous Anger of the Guns: How the Global Arms Trade is Ruining the World and What We Can Do About It (1st ed., pp. 164–171). Pluto Press.
  • Adut, A. (2012). A Theory of the Public Sphere. Sociological Theory, 30(4), 238–262.
  • Amnesty International. (2021). Stop the automated apartheid in Palestine. https://www.amnesty.org/en/petition/stop-the-automated-apartheid-in-palestine/
  • Amnesty International. (2023). Israel and Occupied Palestinian Territories: Automated Apartheid: How facial recognition fragments, segregates and controls Palestinians in the OPT. https://www.amnesty.org/en/documents/mde15/6701/2023/en/
  • Antebi, L., & Yanko-Avikasis, M. (2023). Life and Death in the Hands of the Drone: The Small, Cheap Devices Early in the Swords of Iron War. Institute for National Security Studies.
  • Arab News. (2025). Israel’s Unit 8200 used Microsoft cloud to store ‘a million calls an hour’ of Palestinian phone conversations. https://www.arabnews.com/node/2610908/world
  • Asen R. and Brouwer D. C. (2001). Introduction: Reconfigurations of the Public Sphere. In Asen R. and Brouwer D. C. (eds), Counterpublics and the State. Albany, State University of New York Press.
  • Azizian, A. (2022, July 28). Iran crude/condensate review H1 2022. Vortexa. https://www.vortexa.com/insights/crude/iran-crude-condensate-review-h1-2022/
  • Azulay, Y. (2024). Israel to ease defense export rules, opening local market to new international buyers. Ynet Global. https://www.ynetnews.com/business/article/ryba4b37kl
  • Baldwin, D. A. (2016). Constructivism. In Power and International Relations: A Conceptual Approach (pp. 139–154). Princeton University Press.
  • Bamford, J. (2016). national security: The Espionage Economy. Foreign Policy, 216, 70–72.
  • Barney, D. (2014). Publics without Politics: Surplus Publicity as Depoliticization. In K. Kozolanka (Ed.), Publicity and the Canadian State: Critical Communications Perspectives (pp. 70–86). University of Toronto Press.
  • Beauchamp, G. (1984). Big Brother in America. Social Theory and Practice, 10(3), 247–260.
  • Bennett, N.M. (2025). When the government can see everything: How one company – Palantir – is mapping the nation’s data. The Conversation. https://theconversation.com/when-the-government-can-see-everything-how-one-company-palantir-is-mapping-the-nations-data-263178
  • Bentham, J. (1843). Principles of Penal Law. In J. Bowring (Ed.), The Works of Jeremy Bentham Vol. 4, Edinburgh: William Tait.
  • Berman, L. and Staff, T. (2025). Report: Netanyahu approved major deals between top Israeli defense companies and Qatar. Times of Israel. https://www.timesofisrael.com/report-netanyahu-approved-major-deals-between-top-israeli-defense-companies-and-qatar/
  • Bernot, A., Trevaskes, S., & Strange, S. (2022). Smart Governance, Smarter Surveillance. In L. Jaivin & E. S. Klein (Eds.), Contradiction (1st ed., pp. 15–31). ANU Press.
  • Biddle, S. (2024). Israeli Group Claims It's Working With Big Tech Insiders to Cencor "Inflammatory" Wartime Content. The Intercept. https://theintercept.com/2024/01/10/israel-disinformation-social-media-iron-truth/
  • Boudreau, C. (2009). Closing the Gap: When Do Cues Eliminate Differences between Sophisticated and Unsophisticated Citizens? The Journal of Politics, 71(3), 964–976.
  • Boyer, Y., Carle, C., Müller, H., & Van Orden, G. (1996). The Proliferation of Conventional Arms And Dual-Use Technologies. In J. Krause, P. Cornish, & P. van Ham (Eds.), Europe And The Challenge of Proliferation. European Union Institute for Security Studies (EUISS).
  • Business & Human Rights Resource Centre. (2023a). EU sends formal information request to Meta, TikTok over disinformation on Israel-Hamas war. https://www.business-humanrights.org/en/latest-news/eu-sends-formal-information-request-to-meta-tiktok-over-disinformation-on-israel-hamas-war/
  • Business & Human Rights Resource Centre. (2023b). EU digital chief urges TikTok & X Corp to increase efforts to remove harmful content on their platforms. https://www.business-humanrights.org/en/latest-news/eu-digital-chief-urges-tiktok-x-corp-to-increase-efforts-to-remove-harmful-content-on-their-platforms/
  • Business & Human Rights Resource Centre. (2023c). EU warns Google & YouTube over Hamas-Israel disinformation. https://www.business-humanrights.org/en/latest-news/eu-warns-google-youtube-over-hamas-israel-disinformation/
  • Business & Human Rights Resource Centre. (2023d). Access Now, Article19 & 28 CSOs urge EU to respect rule of law when tackling content about Gaza & Israel. https://www.business-humanrights.org/en/latest-news/access-now-article19-28-csos-urge-eu-to-respect-rule-of-law-when-tackling-content-about-gaza-israel/
  • Buzan, B. G., Wæver, O., & de Wilde, J. H. (1998). Security: A New Framework for Analysis. Lynne Rienner.
  • Buzan, B., & Wæver, O. (2009). Macrosecuritisation and Security Constellations: Reconsidering Scale in Securitisation Theory. Review of International Studies, 35(2), 253–276.
  • Byler, D. (2022). Surveillance, data police, and digital enclosure in Xinjiang’s ‘Safe Cities.’ In D. Byler, I. Franceschini, & N. Loubere (Eds.), Xinjiang Year Zero (1st ed., pp. 183–204). ANU Press.
  • Carrillo, P. E. (2017). Commercial Dual-Use Technologies in Defense Acquisition Reform. R Street Institute.
  • Castells, M. (2008). The New Public Sphere: Global Civil Society, Communication Networks, and Global Governance. The Annals of the American Academy of Political and Social Science, 616, 78–93.
  • Cave, D., Hoffman, S., Joske, A., Ryan, F., & Thomas, E. (2019). Enabling & exporting digital authoritarianism. In Mapping China’s technology giants (pp. 08–15). Australian Strategic Policy Institute.
  • Coffey, J. W. (1974). The Five Faces of Walter Lippmann [Review of Five Public Philosophies of Walter Lippmann., by B. F. Wright]. Reviews in American History, 2(4), 546–552.
  • Cooper, H. (2014). Israeli soldiers from elite wire-tapping unit refuse to use 'extortion', 'blackmail' on Palestinians. ABC. https://www.abc.net.au/news/2014-09-13/israeli-soldiers-refuse-to-spy-on-palestinians/5741492
  • Cronin, D. (2025). Space agency heads to Venus with help from genocide profiteer. The Electronic Intifada. https://electronicintifada.net/blogs/david-cronin/space-agency-heads-venus-help-genocide-profiteer
  • Dahl, R. A. (1961). Who governs?: Democracy and power in an American city. Yale University Press.
  • Dahl, R. A. (1978). Pluralism Revisited. Comparative Politics, 10(2), 191–203.
  • Dayan, H. (2022). Israel/Palestine: Authoritarian Practices in the Context of a Dual State Crisis. In Ö. E. Topak, M. Mekouar, & F. Cavatorta (Eds.), New Authoritarian Practices in the Middle East and North Africa (pp. 131–151). Edinburgh University Press.
  • Dewey, J. (2012). The Public and Its Problems: An Essay in Political Inquiry (M. L. Rogers, Ed.). Penn State University Press.
  • Drexel, B. (2025). Promethean Rivalry: The World-Altering Stakes of Sino-American AI Competition. Center for a New American Security.
  • Embassy of Israel Kathmandu. (2025). Israel Ministry of Defense Spokesperson: Israel Sets New Record in Defense Exports: Over $14.7 Billion in 2024. https://new.embassies.gov.il/nepal/en/news/israel-ministry-defense-spokesperson-israel-sets-new-record-defense-exports-over-147-billion#:~:text=Israel%20MOD%20announces%20that%20Israel's,increase%20over%20the%20previous%20year.
  • Enjolras, B., & Steen-Johnsen, K. (2017). The Digital Transformation of the Political Public Sphere: a Sociological Perspective. In K. Steen-Johnsen, F. Engelstad, H. Larsen, J. Rogstad, D. Polkowska, A. S. Dauber-Griffin, & A. Leverton (Eds.), Institutional Change in the Public Sphere: Views on the Nordic Model (1st ed., pp. 99–117). De Gruyter.
  • EU. (2021). Regulation (EU) 2021/821 of the European Parliament and of the Council of 20 May 2021 setting up a Union regime for the control of exports, brokering, technical assistance, transit and transfer of dual-use items (recast). https://eur-lex.europa.eu/eli/reg/2021/821/oj/eng
  • EU. (2024). Commission Recommendation (EU) 2024/2659 of 11 October 2024 on guidelines on the export of cyber-surveillance items under Article 5 of Regulation (EU) 2021/821 of the European Parliament and of the Council. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202402659
  • Euro-Med Human Rights Monitor. (2020). EU Should Cancel €59M Contract with Israeli Companies for Drones to Surveille Migrants. https://euromedmonitor.org/en/article/3529/EU-Should-Cancel-€59M-Contract-with-Israeli-Companies-for-Drones-to-Surveille-Migrants
  • European Parliament. (2020). Procurement of Israeli drones for the surveillance of migrants in the Mediterranean. https://www.europarl.europa.eu/doceo/document/E-9-2020-003321_EN.html#def1
  • European Parliament. (2023). Report of the investigation of alleged contraventions and maladministration in the application of Union law in relation to the use of Pegasus and equivalent surveillance spyware. https://www.europarl.europa.eu/doceo/document/A-9-2023-0189_EN.html
  • Evans, N. G. (2013). Contrasting Dual-Use Issues in Biology and Nuclear Science. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects (pp. 255–274). ANU Press.
  • Feldstein, S., & Kot, B. (2023). Introduction. In Why Does the Global Spyware Industry Continue to Thrive?: Trends, Explanations, and Responses (pp. 5–6). Carnegie Endowment for International Peace.
  • Feldman, I. (2015). Gaza as an Open-Air Prison. Middle East Report, 275, 12–14.
  • Feldstein, S. (2019). The Global Expansion of AI Surveillance. The Global Expansion of AI Surveillance. https://carnegie-production-assets.s3.amazonaws.com/static/files/files__WP-Feldstein-AISurveillance_final1.pdf
  • Finlayson, J. G. (2019). The Habermas-Rawls Debate. Columbia University Press.
  • Fischer, J. E. (2006). Defining Dual-Use Technologies. In Stewardship or Censorship?: Balancing Biosecurity, The Public’s Health, and The Benefits of Scientific Openness (pp. 43–45). Stimson Center.
  • Foreign Policy. (2007). Net Effect: How Technology Shapes the World. 162, 92–93.
  • Foreign Policy. (2013). The Surveillance State and Its Discontents. 203, 64–74.
  • Foucault, M. (2008). “Panopticism” from “Discipline & Punish: The Birth of the Prison.” Race/Ethnicity: Multidisciplinary Global Contexts, 2(1), 1–12.
  • Fraser, N. (2018). The Theory of the Public Sphere: The Structural Transformation of the Public Sphere (1962). In H. Brunkhorst, R. Kreide, & C. Lafont (Eds.), The Habermas Handbook (pp. 245–255). Columbia University Press.
  • Fuhrmann, M. (2008). Exporting Mass Destruction? The Determinants of Dual-Use Trade. Journal of Peace Research, 45(5), 633–652.
  • Fuchs, C. (2016). Beyond Habermas: Rethinking Critical Theories of Communication. In Critical Theory of Communication: New Readings of Lukács, Adorno, Marcuse, Honneth and Habermas in the Age of the Internet (Vol. 1, pp. 177–206). University of Westminster Press.
  • Fuchs, C. (2018). Propaganda 2.0: Herman and Chomsky’s Propaganda Model in the Age of the Internet, Big Data and Social Media. In J. Pedro-Carañana, D. Broudy, & J. Klaehn (Eds.), The Propaganda Model Today: Filtering Perception and Awareness (Vol. 8, pp. 71–92). University of Westminster Press.
  • Fürstenau, M. (2025). German police expands use of Palantir surveillance software. Deutsche Welle. https://www.dw.com/en/german-police-expands-use-of-palantir-surveillance-software/a-73497117 Gad, U. P., & Petersen, K. L. (2011). Concepts of politics in securitization studies. Security Dialogue, 42(4/5), 315–328.
  • Galantonu, D. (2016). The Big Brother Fear: Four Perspectives on Surveillance. American Intelligence Journal, 33(1), 59–64.
  • Gallagher, N. W., Rand, L., Entrikin, D., & Aoki, N. (2023). Post-Cold War controls on WMD-related technologies. In The Desirability and Feasibility of Strategic Trade Controls on Emerging Technologies (pp. 33–49). Center for International & Security Studies, U. Maryland.
  • Gelardi, C. (2022). The State Police Want to Crack Your Phone. New York Focus. https://nysfocus.com/2022/11/23/new-york-state-police-phone-surveillance-cellebrite
  • Gouck, J. (2018). The Viewer Society: ‘New Panopticism’, Surveillance, and The Body in Dave Eggers’ The Circle. IJAS Online, 7, 57–64.
  • Goodfriend, S. (2024). Algorithmic Dissent: Militarized Platforms and Palestinian Political Imagination in Jerusalem. Journal of Palestine Studies, 53(3), 36–53.
  • Groot, G. (2020). Schemes, Dreams, and Nightmares: China’s Paradox(Es) Of Trust. In J. Golley, L. Jaivin, B. Hillman, & S. Strange (Eds.), China Dreams (pp. 198–212). ANU Press.
  • Habermas, J., Lennox, S., & Lennox, F. (1974). The Public Sphere: An Encyclopedia Article (1964). New German Critique, 3, 49–55.
  • Habermas, J. (1991). The Structural Transformation of the Public Sphere An Inquiry into a Category of Bourgeois Society. The MIT Press.
  • Herman, E. S., & Chomsky, N. (1988). Manufacturing consent: the political economy of the mass media. Pantheon Books.
  • Hillman, J. E. (2021). “Techno-Authoritarianism: Platform for Repression in China and Abroad.” Center for Strategic and International Studies (CSIS).
  • Hopf, T. (1998). The Promise of Constructivism in International Relations Theory. International Security, 23(1), 171–200.
  • IMARC. (2025). Global Video Surveillance Systems Market to Reach USD 236.9 Billion by 2033, Propelled by Growing Incidences of Theft. https://www.imarcgroup.com/global-video-surveillance-systems-market
  • Jackson, P. T. & Stanfield, J. R. (2004). The Role of the Press in a Democracy: Heterodox Economics and the Propaganda Model. Journal of Economic Issues, 38(2), 475–482.
  • Jewish Voice Ministries International. (2018). Israel’s Unit 8200 Takes on Global Terrorism. https://www.jewishvoice.org/read/blog/israels-unit-8200-takes-global-terrorism
  • Joh, E. E. (2025). Police Technology Experiments. Columbia Law Review, 125(1), 1–28.
  • Jones, M. O. (2025). Lessons from the Digital Coalface in the Post-Truth Age: Researching the Middle East Amid Authenticity Vacuums, Transnational Repression & Disinformation. Daedalus, 154(2), 132–156.
  • JPS. (2015). Selections from the Press. Journal of Palestine Studies, 45(1 (177)), 110–135.
  • Kang D., Grauer, Y. (2025). Silicon Valley enabled brutal mass detention and surveillance in China, internal documents show. The Associated Press. https://www.ap.org/news-highlights/spotlights/2025/silicon-valley-enabled-brutal-mass-detention-and-surveillance-in-china-internal-documents-show/
  • Kania, E. B. (2018). The dual-use dilemma in China’s AI development. In Technological entanglement: Cooperation, competition and the dual-use dilemma in artificial intelligence (pp. 08–09). Australian Strategic Policy Institute.
  • Keene, J. R., Shoenberger, H., Berke, C. K., & Bolls, P. D. (2017). The biological roots of political extremism: Negativity bias, political ideology, and preferences for political news. Politics and the Life Sciences, 36(2), 37–48.
  • Khalil, L. (2020). Digital Authoritarianism, China and C0VID. Lowy Institute for International Policy.
  • Kilgore, J. (2022). E-Carceration, settler colonialism, and the open-air prison. In Understanding E-Carceration: Electronic Monitoring, the Surveillance State, and the Future of Mass Incarceration (pp. 140–152). The New Press.
  • Kirchgaessner, S., Evans, R. and Hughes, S. (2020). UN rapporteur condemns UK hosting of Israeli spyware firm. The Guardian. https://www.theguardian.com/world/2020/feb/07/un-rapporteur-condemns-uk-hosting-of-israeli-spyware-firm
  • Kubovich, Y. (2022). Israeli Troops' New Quota: Add 50 Palestinians to Tracking Database Every Shift. Haaretz. https://www.haaretz.com/israel-news/2022-03-24/ty-article/.premium/soldiers-not-allowed-off-shifts-until-they-enter-50-palestinian-names-in-database/00000180-5ba7-d97e-a7fb-7bf7361c0000
  • Lewis, K. (2021). Social media platforms are complicit in censoring Palestinian voices. The Conversation.https://theconversation.com/social-media-platforms-are-complicit-in-censoring-palestinian-voices-161094
  • Lindblom, C.E. (1982). Another state of mind. American Political Science Review, 76(1), pp.9-21.
  • Lindley, D. (2025). Exposed in Translation: Between Hebrew and English media narratives, Israel hides its war crimes confessions. The New Arab. https://www.newarab.com/opinion/between-hebrew-and-english-israel-hides-war-crimes-confessions
  • Lippmann. W. (1922). Public Opinion. The Macmillan Company. https://en.wikisource.org/wiki/Public_Opinion Loewenstein, A. (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso.
  • Loewenstein, A., & Corbyn, J. (2024). The Palestine Laboratory: An Update. In R. Michie, A. Feinstein, & P. Rogers (Eds.), Monstrous Anger of the Guns: How the Global Arms Trade is Ruining the World and What We Can Do About It (1st ed., pp. 62–66). Pluto Press.
  • Lukes, S. (1974). Power: A Radical View, Macmillan.
  • Lyon, D. (2019). State and Surveillance. In Governing Cyberspace during a Crisis in Trust: An essay series on the economic potential — and vulnerability — of transformative technologies and cyber security (pp. 21–25). Centre for International Governance Innovation.
  • Margetts, H., John, P., Hale, S., & Yasseri, T. (2016). From Political Turbulence to Chaotic Pluralism. In Political Turbulence: How Social Media Shape Collective Action (pp. 196–228). Princeton University Press.
  • Markowski, R. (2020). On Complexity and Simplism. In H. K. Anheier & I. Begg (Eds.), Ralf Dahrendorf and the European Union 2030: Looking Back, Looking Forward (pp. 91–98). LSE Ideas.
  • Martinez, E.C. (2025). EU sanctions against Israel: here’s what’s on the table. The Conversation. https://theconversation.com/eu-sanctions-against-israel-heres-whats-on-the-table-260982
  • Mayfield, M., & Roaten, M. (2021). Israeli Firm Delivers Advanced Targeting System. National Defense, 105(811), 13. Mckeon, M. (2004). Parsing Habermas’s “Bourgeois Public Sphere.” Criticism, 46(2), 273–277.
  • McMurray, J. (2015). The paradox of information and voter turnout. Public Choice, 165(1/2), 13–23.
  • Missile Technology Control Regime (MTCR). (2017). Annex Handbook. https://www.mtcr.info/download/pictures/5b/4x3ixi033jhup4yyjjuotfb7074as4/mtcr-handbook-2017-indexed-final-digital.pdf
  • Morgus, R. (2019). The Spread of Russia’s Digital Authoritarianism. In N. D. Wright (Ed.), Artificial Intelligence, China, Russia, and the Global Order (pp. 89–97). Air University Press.
  • Müller, J.-W. (2016). The EU’s Democratic Deficit and the Public Sphere. Current History, 115(779), 83–88.
  • Nanz, P. (2018). Public Sphere. In H. Brunkhorst, R. Kreide, & C. Lafont (Eds.), The Habermas Handbook (pp. 605–609). Columbia University Press.
  • Nelson, N., Speranza, L., Deni, J. R., Alden, C., Brattberg, E., Cliff, R., Duckenfield, M., & Ellis, R. E. (2022). Security Risks: Dual-Use Technology in Europe. In China, Europe, and the Pandemic Recession: Beijing’s Investments and Transatlantic Security (pp. 151–198). Strategic Studies Institute, US Army War College.
  • Norwegian Refugee Council. (2018). Gaza: The world’s largest open-air prison. https://www.nrc.no/news/2018/april/gaza-the-worlds-largest-open-air-prison
  • OCHA. (2025). West Bank Movement and Access Update. https://www.ochaopt.org/sites/default/files/Factsheet%20Booklet_Movement_and_Access.pdf
  • Oded, A. (2010). Africa in Israeli Foreign Policy—Expectations and Disenchantment: Historical and Diplomatic Aspects. Israel Studies, 15(3), 121–142
  • OFTA. (2025). Operation Find Them All. https://ofta.cellebrite.com
  • OHCHR. (2025). A/HRC/59/23. Human rights situation in Palestine and other occupied Arab territories. From economy of occupation to economy of genocide Report of the Special Rapporteur on the situation of human rights in the Palestinian territories occupied since 1967, Francesca Albanese.https://www.ohchr.org/sites/default/files/documents/hrbodies/hrcouncil/sessions-regular/session59/advance-version/a-hrc-59-23-aev.pdf
  • OIP. (2025a). OIP selected to build spectrometer for ESA EnVision mission to Venus. https://oipspace.be/2025/05/28/venspec-h-contract-signed/
  • OIP. (2025b.) Company Profile. https://oipspace.be
  • Onuf, N. (2002). Institutions, Intentions and International Relations. Review of International Studies, 28(2), 211–228.
  • Palan, R. (2000). A World of Their Making: An Evaluation of the Constructivist Critique in International Relations. Review of International Studies, 26(4), 575–598.
  • Penney, J., McKune, S., Gill, L., & Deibert, R. J. (2018). Advancing Human-Rights-by-Design in the Dual-Use Technology Industry. Journal of International Affairs, 71(2), 103–110.
  • PI. (2025). Examples of Abuse Timeline. https://privacyinternational.org/abusetimeline
  • Prime Minister's Office. (2025). PM Netanyahu’s remarks at the “Fifty States – One Israel” Event at the Ministry of Foreign Affairs, with the largest delegation of American legislators to ever visit Israel. https://www.gov.il/en/pages/event-one-150925
  • Research and Markets. (2025). Border Security System Market by Platform Type (Fixed Surveillance Systems, Portable Surveillance Systems, Unmanned Aerial Vehicles), Technology (Biometric, Iot, Rfid), Application, Deployment Mode, End User - Global Forecast 2025-2030. https://www.researchandmarkets.com/reports/6011062/border-security-system-market-platform-type?utm_code=kn9fvt&utm_exec=chdomsai
  • Rowland, A. L. (2016). Life-Saving Weapons: The Biolegitimacy of Drone Warfare. Rhetoric and Public Affairs, 19(4), 601–628.
  • Sample, C., Justice, C., & Darraj, E. (2019). A Model for Evaluating Fake News. The Cyber Defense Review, 171–192.
  • Senor, D. & Singer, S. (2009). Start-Up Nation: The Story of Israel's Economic Miracle. Twelve. https://ia600509.us.archive.org/7/items/TheLeanStartupErickRies/start-up_nation_the_stor.pdf
  • Shadle, M. A. (2011). Constructivism. In The Origins of War: A Catholic Perspective (pp. 75–94). Georgetown University Press.
  • Shankar, P., Dixit, P. and Siddiqui, U. (2023). Are social media giants censoring pro-Palestine voices amid Israel’s war? Al Jazeera. https://www.aljazeera.com/features/2023/10/24/shadowbanning-are-social-media-giants-censoring-pro-palestine-voices
  • Shewring, E. (2025). Israel’s Spyware Law: A Step Towards Authoritarianism? German Institute of Global and Area Studies (GIGA).
  • Shlaim, A. (2024). Israel’s War on Gaza. In J. STERN-WEINER (Ed.), Deluge: Gaza and Israel from Crisis to Cataclysm (pp. 13–34). OR Books.
  • Silver, L., Fagan, M., Huang, C., & Clancy, L. (2024). Citizen behavior and individual rights and equality. In What Can Improve Democracy? (pp. 59–69). Pew Research Center.
  • Simon, J., & Mahoney, R. (2022). State Surveillance. In The Infodemic: How Censorship and Lies Made the World Sicker and Less Free (pp. 80–101). Columbia Global Reports.
  • Simons, M. (2025). Israeli spyware company CEO testifies in Meta damages trial. Courthouse News Service. https://www.courthousenews.com/israeli-spyware-company-ceo-testifies-in-meta-damages-trial/
  • Sivakumar, S., & Lukose, L. P. (2017). How to Read, Assess and Write A Research Article. Journal of the Indian Law Institute, 59(2), 123–152.
  • SIPRI. (2023). The SIPRI Top 100 arms-producing and military services companies in the world, 2023. https://www.sipri.org/visualizations/2024/sipri-top-100-arms-producing-and-military-services-companies-world-2023
  • Steiner, G. (1986). Language Under Surveillance: The Writer and The State. The New York Times. https://www.nytimes.com/1986/01/12/books/language-under-surveillance-the-writer-and-the-state.html
  • The American Immigration Council. (2025). ICE to Use ImmigrationOS by Palantir, a New AI System, to Track Immigrants’ Movements. https://www.americanimmigrationcouncil.org/blog/ice-immigrationos-palantir-ai-track-immigrants/
  • The Hague Code of Conduct against Ballistic Missile Proliferation (HCOC). (2002). Text of the HCoC. https://www.hcoc.at/what-is-hcoc/text-of-the-hcoc.html
  • Tkacheva, O., Schwartz, L. H., Libicki, M. C., Taylor, J. E., Martini, J., & Baxter, C. (2013). The Internet in China: Threatened Tool of Expression and Mobilization. In Internet Freedom and Political Space (pp. 93–118). RAND Corporation.
  • UK Government. (2025). Country policy and information note: social media, surveillance and sur place activities, Iran. https://www.gov.uk/government/publications/iran-country-policy-and-information-notes/country-policy-and-information-note-social-media-surveillance-and-sur-place-activities-iran-april-2025-accessible
  • UN. (1949). Geneva Convention Relative to the Protection of Civilian Persons in Time of War of 12 August 1949. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.33_GC-IV-EN.pdf
  • UN. (1954). Convention for the Protection of Cultural Property in the Event of Armed Conflict and Protocol I. https://treaties.un.org/doc/Publication/UNTS/Volume%20249/volume-249-I-3511-English.pdf
  • UN. (1968). Treaty on the Non-Proliferation of Nuclear Weapons (NPT). https://treaties.unoda.org/t/npt?_gl=1*136txtx*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxMTQ1NzYkbzIkZzEkdDE3NTQxMTU4MzYkajYwJGwwJGgw
  • UN. (1972). Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction. Opened for Signature at London, Moscow and Washington. 10 April 1972. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.37_conv%20biological%20weapons.pdf
  • UN. (1976). Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques (ENMOD). https://treaties.un.org/doc/Treaties/1978/10/19781005%2000-39%20AM/Ch_XXVI_01p.pdf
  • UN. (1977a). Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), of 8 June 1977. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.34_AP-I-EN.pdf
  • UN. (1977b). Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II), of 8 June 1977. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.35_AP-II-EN.pdf
  • UN. (1993). Convention on the prohibition of the development, production, stockpiling and use of chemical weapons and on their destruction, Paris 13 January 1993. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.42_Conv%20Chemical%20weapons.pdf
  • UN. (1996). Comprehensive Nuclear-Test-Ban Treaty https://treaties.unoda.org/t/ctbt?_gl=1*1ccxsg0*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNTgxMTgkbzMkZzEkdDE3NTQxNTgyNTAkajYwJGwwJGgw
  • UN. (1997). Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction, 18 September 1997. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.44_convention%20antipersonnel%20mines.pdf
  • UN. (2000). Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict. https://childrenandarmedconflict.un.org/tools-for-action/optional-protocol/
  • UN. (2005). Mine Action and Effective Coordination: The United Nations Inter-Agency Policy. https://www.mineaction.org/sites/default/files/documents/maec.pdf
  • UN. (2008). Convention on Cluster Munitions. https://treaties.un.org/doc/Publication/CTC/26-6.pdf
  • UN. (2013). The Arms Trade Treaty. https://treaties.un.org/doc/Treaties/2013/04/20130410%2012-01%20PM/Ch_XXVI_08.pdf
  • UN. (2017). Treaty on the Prohibition of Nuclear Weapons. https://treaties.unoda.org/t/tpnw?_gl=1*6u2ubx*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNTgxMTgkbzMkZzEkdDE3NTQxNTgyNTAkajYwJGwwJGgw
  • UN. (2025a). UN Mine Action Service (UNMAS). https://www.unmas.org/en
  • UN. (2025b). UN Safeguard Programme. https://unsaferguard.org
  • UNESCO. (1999). Second Protocol to the Hague Convention of 1954 for the Protection of Cultural Property in the Event of Armed Conflict. https://unesdoc.unesco.org/ark:/48223/pf0000130696
  • UNGA. (2002). Measures to Prevent Terrorists from Acquiring Weapons of Mass Destruction. A/C.1/57/L.49/Rev.1. https://digitallibrary.un.org/record/476446?v=pdf
  • UNGA. (2010). Women, Disarmament, Non-proliferation and Arms Control. Resolution 65/69. https://docs.un.org/en/A/RES/65/69
  • UNGA. (2023). Youth, Disarmament and Non-Proliferation. Resolution 78/31. https://docs.un.org/en/A/RES/78/31?_gl=1*1ikzqo7*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNjM4MDEkbzQkZzAkdDE3NTQxNjM4MDEkajYwJGwwJGgw
  • UNODA. (1980). Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. https://treaties.unoda.org/t/ccw
  • UNSC. (1988). Resolution 620. Secretary-General’s Mechanism for Investigation of Alleged Use of Chemical and Biological Weapons (UNSGM). https://docs.un.org/en/s/res/620(1988)
  • UNSC. (2004). Resolution 1540. https://docs.un.org/en/S/RES/1540(2004)
  • VRI. (2025). OIP Space Instruments. https://vri.vlaanderen/en/members/oip-sensor-systems/
  • Wallerstein, M. B. (1991). Controlling Dual-Use Technologies in the New World Order. Issues in Science and Technology, 7(4), 70–77.
  • Ward, I. (1997). How Democratic Can We Get?: The Internet, the Public Sphere, and Public Discourse. JAC, 17(3), 365–379.
  • Wæver, O. (2011). Politics, security, theory. Security Dialogue, 42(4/5), 465–480.
  • Wendt, A. (1992). Anarchy is what States Make of it: The Social Construction of Power Politics. International Organization, 46(2), 391–425.
  • Who Profits. (2018). “Big Brother” in Jerusalem’s Old City: Israel’s Militarized Visual Surveillance System in Occupied East Jerusalem. https://www.whoprofits.org//writable/uploads/old/uploads/2018/11/surveil-final.pdf
  • Who Profits. (2025). Elbit Systems. https://www.whoprofits.org/companies/company/3794
  • Winston, E. A., Lee, R. G., Monikowski, C., Peterson, R., & Swabey, L. (2023). Contextualizing Assessment. In Beyond Equivalence: Reconceptualizing Interpreting Performance Assessment (pp. 49–58). Gallaudet University Press.
  • Wright, N. D. (Ed.). (2019). Artificial Intelligence and Domestic Political Regimes: Digital Authoritarian, Digital Hybrid, and Digital Democracy. In Artificial Intelligence, China, Russia, and the Global Order (pp. 21–34). Air University Press.
  • Yasur, N. and Ring E. (2024). Drowning in the Flood Social Media Platforms' Management of Harmful and Pro-Terror Content During the October 7th Attack and the Israel-Hamas War. Israel Internet Association. https://en.isoc.org.il/wp-content/uploads/2024/06/ISOC-IL-drowning-in-the-flood-2024.pdf
  • Zahra, R. (2023). Israel helps other countries to spy on their own citizens. Middle East Monitor. https://www.middleeastmonitor.com/20230904-israel-helps-other-countries-to-spy-on-their-own-citizens/
  • Ziółkowski, M. (2004). Commodification of Social Life. Polish Sociological Review, 148, 385–402.

State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel

Yıl 2025, Cilt: 12 Sayı: 2
https://doi.org/10.26513/tocd.1785938

Öz

This article examines the intricate relationship between state power, technological innovation, and social control, analyzing how states utilize emerging technologies, especially in surveillance and military capacities, and the legitimization strategies employed to justify these practices to both domestic and global audiences. A key observation is the dualism of state technology use, projecting beyond domestic control to external strategic and economic interests, demonstrating technology as both a commodity and diplomatic tool. Taking Israel as a conspicuous case study due to its peculiar geopolitical situation that has rendered the Palestinian territories a laboratory for innovative military and security technologies, this paper examines how combat-proven systems are created, internationally traded, making Israel's defense industry a leading sector. To understand these dynamics, the research integrates various theoretical frameworks including panopticism, dual-use technologies, securitization theory, constructivism, techno-authoritarianism, as well as theories pertaining to public opinion and state legitimation. The study starts by explaining the theoretical basis, its presence in Israel, and its global consequences. The study also considers the state's rationales founded upon security as well as humanitarian reasons, and includes a focus on international collusion as well as censorship in informing public opinion.

Kaynakça

  • AA. (2025, May 15). Interview – ‘Expose them’: Viral Palantir protester warns all complicit in Gaza horrors. https://www.aa.com.tr/en/middle-east/interview-expose-them-viral-palantir-protester-warns-all-complicit-in-gaza-horrors/3565328
  • Abraham, Y. (2025). Israeli intelligence data: Militants account for only 1 in 4 Gaza detainees. +972 Magazine. https://www.972mag.com/israeli-intelligence-database-militants-civilians-gaza-detainees/
  • Abu-Sittah, G. (2020). The Virus, the Settler, and the Siege: Gaza in the Age of Corona. Journal of Palestine Studies, 49(4(196)), 65–76.
  • Action, P., & Corbyn, J. (2024). Direct Action against the Arms Trade. In R. Michie, A. Feinstein, & P. Rogers (Eds.), Monstrous Anger of the Guns: How the Global Arms Trade is Ruining the World and What We Can Do About It (1st ed., pp. 164–171). Pluto Press.
  • Adut, A. (2012). A Theory of the Public Sphere. Sociological Theory, 30(4), 238–262.
  • Amnesty International. (2021). Stop the automated apartheid in Palestine. https://www.amnesty.org/en/petition/stop-the-automated-apartheid-in-palestine/
  • Amnesty International. (2023). Israel and Occupied Palestinian Territories: Automated Apartheid: How facial recognition fragments, segregates and controls Palestinians in the OPT. https://www.amnesty.org/en/documents/mde15/6701/2023/en/
  • Antebi, L., & Yanko-Avikasis, M. (2023). Life and Death in the Hands of the Drone: The Small, Cheap Devices Early in the Swords of Iron War. Institute for National Security Studies.
  • Arab News. (2025). Israel’s Unit 8200 used Microsoft cloud to store ‘a million calls an hour’ of Palestinian phone conversations. https://www.arabnews.com/node/2610908/world
  • Asen R. and Brouwer D. C. (2001). Introduction: Reconfigurations of the Public Sphere. In Asen R. and Brouwer D. C. (eds), Counterpublics and the State. Albany, State University of New York Press.
  • Azizian, A. (2022, July 28). Iran crude/condensate review H1 2022. Vortexa. https://www.vortexa.com/insights/crude/iran-crude-condensate-review-h1-2022/
  • Azulay, Y. (2024). Israel to ease defense export rules, opening local market to new international buyers. Ynet Global. https://www.ynetnews.com/business/article/ryba4b37kl
  • Baldwin, D. A. (2016). Constructivism. In Power and International Relations: A Conceptual Approach (pp. 139–154). Princeton University Press.
  • Bamford, J. (2016). national security: The Espionage Economy. Foreign Policy, 216, 70–72.
  • Barney, D. (2014). Publics without Politics: Surplus Publicity as Depoliticization. In K. Kozolanka (Ed.), Publicity and the Canadian State: Critical Communications Perspectives (pp. 70–86). University of Toronto Press.
  • Beauchamp, G. (1984). Big Brother in America. Social Theory and Practice, 10(3), 247–260.
  • Bennett, N.M. (2025). When the government can see everything: How one company – Palantir – is mapping the nation’s data. The Conversation. https://theconversation.com/when-the-government-can-see-everything-how-one-company-palantir-is-mapping-the-nations-data-263178
  • Bentham, J. (1843). Principles of Penal Law. In J. Bowring (Ed.), The Works of Jeremy Bentham Vol. 4, Edinburgh: William Tait.
  • Berman, L. and Staff, T. (2025). Report: Netanyahu approved major deals between top Israeli defense companies and Qatar. Times of Israel. https://www.timesofisrael.com/report-netanyahu-approved-major-deals-between-top-israeli-defense-companies-and-qatar/
  • Bernot, A., Trevaskes, S., & Strange, S. (2022). Smart Governance, Smarter Surveillance. In L. Jaivin & E. S. Klein (Eds.), Contradiction (1st ed., pp. 15–31). ANU Press.
  • Biddle, S. (2024). Israeli Group Claims It's Working With Big Tech Insiders to Cencor "Inflammatory" Wartime Content. The Intercept. https://theintercept.com/2024/01/10/israel-disinformation-social-media-iron-truth/
  • Boudreau, C. (2009). Closing the Gap: When Do Cues Eliminate Differences between Sophisticated and Unsophisticated Citizens? The Journal of Politics, 71(3), 964–976.
  • Boyer, Y., Carle, C., Müller, H., & Van Orden, G. (1996). The Proliferation of Conventional Arms And Dual-Use Technologies. In J. Krause, P. Cornish, & P. van Ham (Eds.), Europe And The Challenge of Proliferation. European Union Institute for Security Studies (EUISS).
  • Business & Human Rights Resource Centre. (2023a). EU sends formal information request to Meta, TikTok over disinformation on Israel-Hamas war. https://www.business-humanrights.org/en/latest-news/eu-sends-formal-information-request-to-meta-tiktok-over-disinformation-on-israel-hamas-war/
  • Business & Human Rights Resource Centre. (2023b). EU digital chief urges TikTok & X Corp to increase efforts to remove harmful content on their platforms. https://www.business-humanrights.org/en/latest-news/eu-digital-chief-urges-tiktok-x-corp-to-increase-efforts-to-remove-harmful-content-on-their-platforms/
  • Business & Human Rights Resource Centre. (2023c). EU warns Google & YouTube over Hamas-Israel disinformation. https://www.business-humanrights.org/en/latest-news/eu-warns-google-youtube-over-hamas-israel-disinformation/
  • Business & Human Rights Resource Centre. (2023d). Access Now, Article19 & 28 CSOs urge EU to respect rule of law when tackling content about Gaza & Israel. https://www.business-humanrights.org/en/latest-news/access-now-article19-28-csos-urge-eu-to-respect-rule-of-law-when-tackling-content-about-gaza-israel/
  • Buzan, B. G., Wæver, O., & de Wilde, J. H. (1998). Security: A New Framework for Analysis. Lynne Rienner.
  • Buzan, B., & Wæver, O. (2009). Macrosecuritisation and Security Constellations: Reconsidering Scale in Securitisation Theory. Review of International Studies, 35(2), 253–276.
  • Byler, D. (2022). Surveillance, data police, and digital enclosure in Xinjiang’s ‘Safe Cities.’ In D. Byler, I. Franceschini, & N. Loubere (Eds.), Xinjiang Year Zero (1st ed., pp. 183–204). ANU Press.
  • Carrillo, P. E. (2017). Commercial Dual-Use Technologies in Defense Acquisition Reform. R Street Institute.
  • Castells, M. (2008). The New Public Sphere: Global Civil Society, Communication Networks, and Global Governance. The Annals of the American Academy of Political and Social Science, 616, 78–93.
  • Cave, D., Hoffman, S., Joske, A., Ryan, F., & Thomas, E. (2019). Enabling & exporting digital authoritarianism. In Mapping China’s technology giants (pp. 08–15). Australian Strategic Policy Institute.
  • Coffey, J. W. (1974). The Five Faces of Walter Lippmann [Review of Five Public Philosophies of Walter Lippmann., by B. F. Wright]. Reviews in American History, 2(4), 546–552.
  • Cooper, H. (2014). Israeli soldiers from elite wire-tapping unit refuse to use 'extortion', 'blackmail' on Palestinians. ABC. https://www.abc.net.au/news/2014-09-13/israeli-soldiers-refuse-to-spy-on-palestinians/5741492
  • Cronin, D. (2025). Space agency heads to Venus with help from genocide profiteer. The Electronic Intifada. https://electronicintifada.net/blogs/david-cronin/space-agency-heads-venus-help-genocide-profiteer
  • Dahl, R. A. (1961). Who governs?: Democracy and power in an American city. Yale University Press.
  • Dahl, R. A. (1978). Pluralism Revisited. Comparative Politics, 10(2), 191–203.
  • Dayan, H. (2022). Israel/Palestine: Authoritarian Practices in the Context of a Dual State Crisis. In Ö. E. Topak, M. Mekouar, & F. Cavatorta (Eds.), New Authoritarian Practices in the Middle East and North Africa (pp. 131–151). Edinburgh University Press.
  • Dewey, J. (2012). The Public and Its Problems: An Essay in Political Inquiry (M. L. Rogers, Ed.). Penn State University Press.
  • Drexel, B. (2025). Promethean Rivalry: The World-Altering Stakes of Sino-American AI Competition. Center for a New American Security.
  • Embassy of Israel Kathmandu. (2025). Israel Ministry of Defense Spokesperson: Israel Sets New Record in Defense Exports: Over $14.7 Billion in 2024. https://new.embassies.gov.il/nepal/en/news/israel-ministry-defense-spokesperson-israel-sets-new-record-defense-exports-over-147-billion#:~:text=Israel%20MOD%20announces%20that%20Israel's,increase%20over%20the%20previous%20year.
  • Enjolras, B., & Steen-Johnsen, K. (2017). The Digital Transformation of the Political Public Sphere: a Sociological Perspective. In K. Steen-Johnsen, F. Engelstad, H. Larsen, J. Rogstad, D. Polkowska, A. S. Dauber-Griffin, & A. Leverton (Eds.), Institutional Change in the Public Sphere: Views on the Nordic Model (1st ed., pp. 99–117). De Gruyter.
  • EU. (2021). Regulation (EU) 2021/821 of the European Parliament and of the Council of 20 May 2021 setting up a Union regime for the control of exports, brokering, technical assistance, transit and transfer of dual-use items (recast). https://eur-lex.europa.eu/eli/reg/2021/821/oj/eng
  • EU. (2024). Commission Recommendation (EU) 2024/2659 of 11 October 2024 on guidelines on the export of cyber-surveillance items under Article 5 of Regulation (EU) 2021/821 of the European Parliament and of the Council. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202402659
  • Euro-Med Human Rights Monitor. (2020). EU Should Cancel €59M Contract with Israeli Companies for Drones to Surveille Migrants. https://euromedmonitor.org/en/article/3529/EU-Should-Cancel-€59M-Contract-with-Israeli-Companies-for-Drones-to-Surveille-Migrants
  • European Parliament. (2020). Procurement of Israeli drones for the surveillance of migrants in the Mediterranean. https://www.europarl.europa.eu/doceo/document/E-9-2020-003321_EN.html#def1
  • European Parliament. (2023). Report of the investigation of alleged contraventions and maladministration in the application of Union law in relation to the use of Pegasus and equivalent surveillance spyware. https://www.europarl.europa.eu/doceo/document/A-9-2023-0189_EN.html
  • Evans, N. G. (2013). Contrasting Dual-Use Issues in Biology and Nuclear Science. In B. Rappert & M. J. Selgelid (Eds.), On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects (pp. 255–274). ANU Press.
  • Feldstein, S., & Kot, B. (2023). Introduction. In Why Does the Global Spyware Industry Continue to Thrive?: Trends, Explanations, and Responses (pp. 5–6). Carnegie Endowment for International Peace.
  • Feldman, I. (2015). Gaza as an Open-Air Prison. Middle East Report, 275, 12–14.
  • Feldstein, S. (2019). The Global Expansion of AI Surveillance. The Global Expansion of AI Surveillance. https://carnegie-production-assets.s3.amazonaws.com/static/files/files__WP-Feldstein-AISurveillance_final1.pdf
  • Finlayson, J. G. (2019). The Habermas-Rawls Debate. Columbia University Press.
  • Fischer, J. E. (2006). Defining Dual-Use Technologies. In Stewardship or Censorship?: Balancing Biosecurity, The Public’s Health, and The Benefits of Scientific Openness (pp. 43–45). Stimson Center.
  • Foreign Policy. (2007). Net Effect: How Technology Shapes the World. 162, 92–93.
  • Foreign Policy. (2013). The Surveillance State and Its Discontents. 203, 64–74.
  • Foucault, M. (2008). “Panopticism” from “Discipline & Punish: The Birth of the Prison.” Race/Ethnicity: Multidisciplinary Global Contexts, 2(1), 1–12.
  • Fraser, N. (2018). The Theory of the Public Sphere: The Structural Transformation of the Public Sphere (1962). In H. Brunkhorst, R. Kreide, & C. Lafont (Eds.), The Habermas Handbook (pp. 245–255). Columbia University Press.
  • Fuhrmann, M. (2008). Exporting Mass Destruction? The Determinants of Dual-Use Trade. Journal of Peace Research, 45(5), 633–652.
  • Fuchs, C. (2016). Beyond Habermas: Rethinking Critical Theories of Communication. In Critical Theory of Communication: New Readings of Lukács, Adorno, Marcuse, Honneth and Habermas in the Age of the Internet (Vol. 1, pp. 177–206). University of Westminster Press.
  • Fuchs, C. (2018). Propaganda 2.0: Herman and Chomsky’s Propaganda Model in the Age of the Internet, Big Data and Social Media. In J. Pedro-Carañana, D. Broudy, & J. Klaehn (Eds.), The Propaganda Model Today: Filtering Perception and Awareness (Vol. 8, pp. 71–92). University of Westminster Press.
  • Fürstenau, M. (2025). German police expands use of Palantir surveillance software. Deutsche Welle. https://www.dw.com/en/german-police-expands-use-of-palantir-surveillance-software/a-73497117 Gad, U. P., & Petersen, K. L. (2011). Concepts of politics in securitization studies. Security Dialogue, 42(4/5), 315–328.
  • Galantonu, D. (2016). The Big Brother Fear: Four Perspectives on Surveillance. American Intelligence Journal, 33(1), 59–64.
  • Gallagher, N. W., Rand, L., Entrikin, D., & Aoki, N. (2023). Post-Cold War controls on WMD-related technologies. In The Desirability and Feasibility of Strategic Trade Controls on Emerging Technologies (pp. 33–49). Center for International & Security Studies, U. Maryland.
  • Gelardi, C. (2022). The State Police Want to Crack Your Phone. New York Focus. https://nysfocus.com/2022/11/23/new-york-state-police-phone-surveillance-cellebrite
  • Gouck, J. (2018). The Viewer Society: ‘New Panopticism’, Surveillance, and The Body in Dave Eggers’ The Circle. IJAS Online, 7, 57–64.
  • Goodfriend, S. (2024). Algorithmic Dissent: Militarized Platforms and Palestinian Political Imagination in Jerusalem. Journal of Palestine Studies, 53(3), 36–53.
  • Groot, G. (2020). Schemes, Dreams, and Nightmares: China’s Paradox(Es) Of Trust. In J. Golley, L. Jaivin, B. Hillman, & S. Strange (Eds.), China Dreams (pp. 198–212). ANU Press.
  • Habermas, J., Lennox, S., & Lennox, F. (1974). The Public Sphere: An Encyclopedia Article (1964). New German Critique, 3, 49–55.
  • Habermas, J. (1991). The Structural Transformation of the Public Sphere An Inquiry into a Category of Bourgeois Society. The MIT Press.
  • Herman, E. S., & Chomsky, N. (1988). Manufacturing consent: the political economy of the mass media. Pantheon Books.
  • Hillman, J. E. (2021). “Techno-Authoritarianism: Platform for Repression in China and Abroad.” Center for Strategic and International Studies (CSIS).
  • Hopf, T. (1998). The Promise of Constructivism in International Relations Theory. International Security, 23(1), 171–200.
  • IMARC. (2025). Global Video Surveillance Systems Market to Reach USD 236.9 Billion by 2033, Propelled by Growing Incidences of Theft. https://www.imarcgroup.com/global-video-surveillance-systems-market
  • Jackson, P. T. & Stanfield, J. R. (2004). The Role of the Press in a Democracy: Heterodox Economics and the Propaganda Model. Journal of Economic Issues, 38(2), 475–482.
  • Jewish Voice Ministries International. (2018). Israel’s Unit 8200 Takes on Global Terrorism. https://www.jewishvoice.org/read/blog/israels-unit-8200-takes-global-terrorism
  • Joh, E. E. (2025). Police Technology Experiments. Columbia Law Review, 125(1), 1–28.
  • Jones, M. O. (2025). Lessons from the Digital Coalface in the Post-Truth Age: Researching the Middle East Amid Authenticity Vacuums, Transnational Repression & Disinformation. Daedalus, 154(2), 132–156.
  • JPS. (2015). Selections from the Press. Journal of Palestine Studies, 45(1 (177)), 110–135.
  • Kang D., Grauer, Y. (2025). Silicon Valley enabled brutal mass detention and surveillance in China, internal documents show. The Associated Press. https://www.ap.org/news-highlights/spotlights/2025/silicon-valley-enabled-brutal-mass-detention-and-surveillance-in-china-internal-documents-show/
  • Kania, E. B. (2018). The dual-use dilemma in China’s AI development. In Technological entanglement: Cooperation, competition and the dual-use dilemma in artificial intelligence (pp. 08–09). Australian Strategic Policy Institute.
  • Keene, J. R., Shoenberger, H., Berke, C. K., & Bolls, P. D. (2017). The biological roots of political extremism: Negativity bias, political ideology, and preferences for political news. Politics and the Life Sciences, 36(2), 37–48.
  • Khalil, L. (2020). Digital Authoritarianism, China and C0VID. Lowy Institute for International Policy.
  • Kilgore, J. (2022). E-Carceration, settler colonialism, and the open-air prison. In Understanding E-Carceration: Electronic Monitoring, the Surveillance State, and the Future of Mass Incarceration (pp. 140–152). The New Press.
  • Kirchgaessner, S., Evans, R. and Hughes, S. (2020). UN rapporteur condemns UK hosting of Israeli spyware firm. The Guardian. https://www.theguardian.com/world/2020/feb/07/un-rapporteur-condemns-uk-hosting-of-israeli-spyware-firm
  • Kubovich, Y. (2022). Israeli Troops' New Quota: Add 50 Palestinians to Tracking Database Every Shift. Haaretz. https://www.haaretz.com/israel-news/2022-03-24/ty-article/.premium/soldiers-not-allowed-off-shifts-until-they-enter-50-palestinian-names-in-database/00000180-5ba7-d97e-a7fb-7bf7361c0000
  • Lewis, K. (2021). Social media platforms are complicit in censoring Palestinian voices. The Conversation.https://theconversation.com/social-media-platforms-are-complicit-in-censoring-palestinian-voices-161094
  • Lindblom, C.E. (1982). Another state of mind. American Political Science Review, 76(1), pp.9-21.
  • Lindley, D. (2025). Exposed in Translation: Between Hebrew and English media narratives, Israel hides its war crimes confessions. The New Arab. https://www.newarab.com/opinion/between-hebrew-and-english-israel-hides-war-crimes-confessions
  • Lippmann. W. (1922). Public Opinion. The Macmillan Company. https://en.wikisource.org/wiki/Public_Opinion Loewenstein, A. (2023). The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso.
  • Loewenstein, A., & Corbyn, J. (2024). The Palestine Laboratory: An Update. In R. Michie, A. Feinstein, & P. Rogers (Eds.), Monstrous Anger of the Guns: How the Global Arms Trade is Ruining the World and What We Can Do About It (1st ed., pp. 62–66). Pluto Press.
  • Lukes, S. (1974). Power: A Radical View, Macmillan.
  • Lyon, D. (2019). State and Surveillance. In Governing Cyberspace during a Crisis in Trust: An essay series on the economic potential — and vulnerability — of transformative technologies and cyber security (pp. 21–25). Centre for International Governance Innovation.
  • Margetts, H., John, P., Hale, S., & Yasseri, T. (2016). From Political Turbulence to Chaotic Pluralism. In Political Turbulence: How Social Media Shape Collective Action (pp. 196–228). Princeton University Press.
  • Markowski, R. (2020). On Complexity and Simplism. In H. K. Anheier & I. Begg (Eds.), Ralf Dahrendorf and the European Union 2030: Looking Back, Looking Forward (pp. 91–98). LSE Ideas.
  • Martinez, E.C. (2025). EU sanctions against Israel: here’s what’s on the table. The Conversation. https://theconversation.com/eu-sanctions-against-israel-heres-whats-on-the-table-260982
  • Mayfield, M., & Roaten, M. (2021). Israeli Firm Delivers Advanced Targeting System. National Defense, 105(811), 13. Mckeon, M. (2004). Parsing Habermas’s “Bourgeois Public Sphere.” Criticism, 46(2), 273–277.
  • McMurray, J. (2015). The paradox of information and voter turnout. Public Choice, 165(1/2), 13–23.
  • Missile Technology Control Regime (MTCR). (2017). Annex Handbook. https://www.mtcr.info/download/pictures/5b/4x3ixi033jhup4yyjjuotfb7074as4/mtcr-handbook-2017-indexed-final-digital.pdf
  • Morgus, R. (2019). The Spread of Russia’s Digital Authoritarianism. In N. D. Wright (Ed.), Artificial Intelligence, China, Russia, and the Global Order (pp. 89–97). Air University Press.
  • Müller, J.-W. (2016). The EU’s Democratic Deficit and the Public Sphere. Current History, 115(779), 83–88.
  • Nanz, P. (2018). Public Sphere. In H. Brunkhorst, R. Kreide, & C. Lafont (Eds.), The Habermas Handbook (pp. 605–609). Columbia University Press.
  • Nelson, N., Speranza, L., Deni, J. R., Alden, C., Brattberg, E., Cliff, R., Duckenfield, M., & Ellis, R. E. (2022). Security Risks: Dual-Use Technology in Europe. In China, Europe, and the Pandemic Recession: Beijing’s Investments and Transatlantic Security (pp. 151–198). Strategic Studies Institute, US Army War College.
  • Norwegian Refugee Council. (2018). Gaza: The world’s largest open-air prison. https://www.nrc.no/news/2018/april/gaza-the-worlds-largest-open-air-prison
  • OCHA. (2025). West Bank Movement and Access Update. https://www.ochaopt.org/sites/default/files/Factsheet%20Booklet_Movement_and_Access.pdf
  • Oded, A. (2010). Africa in Israeli Foreign Policy—Expectations and Disenchantment: Historical and Diplomatic Aspects. Israel Studies, 15(3), 121–142
  • OFTA. (2025). Operation Find Them All. https://ofta.cellebrite.com
  • OHCHR. (2025). A/HRC/59/23. Human rights situation in Palestine and other occupied Arab territories. From economy of occupation to economy of genocide Report of the Special Rapporteur on the situation of human rights in the Palestinian territories occupied since 1967, Francesca Albanese.https://www.ohchr.org/sites/default/files/documents/hrbodies/hrcouncil/sessions-regular/session59/advance-version/a-hrc-59-23-aev.pdf
  • OIP. (2025a). OIP selected to build spectrometer for ESA EnVision mission to Venus. https://oipspace.be/2025/05/28/venspec-h-contract-signed/
  • OIP. (2025b.) Company Profile. https://oipspace.be
  • Onuf, N. (2002). Institutions, Intentions and International Relations. Review of International Studies, 28(2), 211–228.
  • Palan, R. (2000). A World of Their Making: An Evaluation of the Constructivist Critique in International Relations. Review of International Studies, 26(4), 575–598.
  • Penney, J., McKune, S., Gill, L., & Deibert, R. J. (2018). Advancing Human-Rights-by-Design in the Dual-Use Technology Industry. Journal of International Affairs, 71(2), 103–110.
  • PI. (2025). Examples of Abuse Timeline. https://privacyinternational.org/abusetimeline
  • Prime Minister's Office. (2025). PM Netanyahu’s remarks at the “Fifty States – One Israel” Event at the Ministry of Foreign Affairs, with the largest delegation of American legislators to ever visit Israel. https://www.gov.il/en/pages/event-one-150925
  • Research and Markets. (2025). Border Security System Market by Platform Type (Fixed Surveillance Systems, Portable Surveillance Systems, Unmanned Aerial Vehicles), Technology (Biometric, Iot, Rfid), Application, Deployment Mode, End User - Global Forecast 2025-2030. https://www.researchandmarkets.com/reports/6011062/border-security-system-market-platform-type?utm_code=kn9fvt&utm_exec=chdomsai
  • Rowland, A. L. (2016). Life-Saving Weapons: The Biolegitimacy of Drone Warfare. Rhetoric and Public Affairs, 19(4), 601–628.
  • Sample, C., Justice, C., & Darraj, E. (2019). A Model for Evaluating Fake News. The Cyber Defense Review, 171–192.
  • Senor, D. & Singer, S. (2009). Start-Up Nation: The Story of Israel's Economic Miracle. Twelve. https://ia600509.us.archive.org/7/items/TheLeanStartupErickRies/start-up_nation_the_stor.pdf
  • Shadle, M. A. (2011). Constructivism. In The Origins of War: A Catholic Perspective (pp. 75–94). Georgetown University Press.
  • Shankar, P., Dixit, P. and Siddiqui, U. (2023). Are social media giants censoring pro-Palestine voices amid Israel’s war? Al Jazeera. https://www.aljazeera.com/features/2023/10/24/shadowbanning-are-social-media-giants-censoring-pro-palestine-voices
  • Shewring, E. (2025). Israel’s Spyware Law: A Step Towards Authoritarianism? German Institute of Global and Area Studies (GIGA).
  • Shlaim, A. (2024). Israel’s War on Gaza. In J. STERN-WEINER (Ed.), Deluge: Gaza and Israel from Crisis to Cataclysm (pp. 13–34). OR Books.
  • Silver, L., Fagan, M., Huang, C., & Clancy, L. (2024). Citizen behavior and individual rights and equality. In What Can Improve Democracy? (pp. 59–69). Pew Research Center.
  • Simon, J., & Mahoney, R. (2022). State Surveillance. In The Infodemic: How Censorship and Lies Made the World Sicker and Less Free (pp. 80–101). Columbia Global Reports.
  • Simons, M. (2025). Israeli spyware company CEO testifies in Meta damages trial. Courthouse News Service. https://www.courthousenews.com/israeli-spyware-company-ceo-testifies-in-meta-damages-trial/
  • Sivakumar, S., & Lukose, L. P. (2017). How to Read, Assess and Write A Research Article. Journal of the Indian Law Institute, 59(2), 123–152.
  • SIPRI. (2023). The SIPRI Top 100 arms-producing and military services companies in the world, 2023. https://www.sipri.org/visualizations/2024/sipri-top-100-arms-producing-and-military-services-companies-world-2023
  • Steiner, G. (1986). Language Under Surveillance: The Writer and The State. The New York Times. https://www.nytimes.com/1986/01/12/books/language-under-surveillance-the-writer-and-the-state.html
  • The American Immigration Council. (2025). ICE to Use ImmigrationOS by Palantir, a New AI System, to Track Immigrants’ Movements. https://www.americanimmigrationcouncil.org/blog/ice-immigrationos-palantir-ai-track-immigrants/
  • The Hague Code of Conduct against Ballistic Missile Proliferation (HCOC). (2002). Text of the HCoC. https://www.hcoc.at/what-is-hcoc/text-of-the-hcoc.html
  • Tkacheva, O., Schwartz, L. H., Libicki, M. C., Taylor, J. E., Martini, J., & Baxter, C. (2013). The Internet in China: Threatened Tool of Expression and Mobilization. In Internet Freedom and Political Space (pp. 93–118). RAND Corporation.
  • UK Government. (2025). Country policy and information note: social media, surveillance and sur place activities, Iran. https://www.gov.uk/government/publications/iran-country-policy-and-information-notes/country-policy-and-information-note-social-media-surveillance-and-sur-place-activities-iran-april-2025-accessible
  • UN. (1949). Geneva Convention Relative to the Protection of Civilian Persons in Time of War of 12 August 1949. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.33_GC-IV-EN.pdf
  • UN. (1954). Convention for the Protection of Cultural Property in the Event of Armed Conflict and Protocol I. https://treaties.un.org/doc/Publication/UNTS/Volume%20249/volume-249-I-3511-English.pdf
  • UN. (1968). Treaty on the Non-Proliferation of Nuclear Weapons (NPT). https://treaties.unoda.org/t/npt?_gl=1*136txtx*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxMTQ1NzYkbzIkZzEkdDE3NTQxMTU4MzYkajYwJGwwJGgw
  • UN. (1972). Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction. Opened for Signature at London, Moscow and Washington. 10 April 1972. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.37_conv%20biological%20weapons.pdf
  • UN. (1976). Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques (ENMOD). https://treaties.un.org/doc/Treaties/1978/10/19781005%2000-39%20AM/Ch_XXVI_01p.pdf
  • UN. (1977a). Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), of 8 June 1977. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.34_AP-I-EN.pdf
  • UN. (1977b). Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II), of 8 June 1977. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.35_AP-II-EN.pdf
  • UN. (1993). Convention on the prohibition of the development, production, stockpiling and use of chemical weapons and on their destruction, Paris 13 January 1993. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.42_Conv%20Chemical%20weapons.pdf
  • UN. (1996). Comprehensive Nuclear-Test-Ban Treaty https://treaties.unoda.org/t/ctbt?_gl=1*1ccxsg0*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNTgxMTgkbzMkZzEkdDE3NTQxNTgyNTAkajYwJGwwJGgw
  • UN. (1997). Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction, 18 September 1997. https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.44_convention%20antipersonnel%20mines.pdf
  • UN. (2000). Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict. https://childrenandarmedconflict.un.org/tools-for-action/optional-protocol/
  • UN. (2005). Mine Action and Effective Coordination: The United Nations Inter-Agency Policy. https://www.mineaction.org/sites/default/files/documents/maec.pdf
  • UN. (2008). Convention on Cluster Munitions. https://treaties.un.org/doc/Publication/CTC/26-6.pdf
  • UN. (2013). The Arms Trade Treaty. https://treaties.un.org/doc/Treaties/2013/04/20130410%2012-01%20PM/Ch_XXVI_08.pdf
  • UN. (2017). Treaty on the Prohibition of Nuclear Weapons. https://treaties.unoda.org/t/tpnw?_gl=1*6u2ubx*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNTgxMTgkbzMkZzEkdDE3NTQxNTgyNTAkajYwJGwwJGgw
  • UN. (2025a). UN Mine Action Service (UNMAS). https://www.unmas.org/en
  • UN. (2025b). UN Safeguard Programme. https://unsaferguard.org
  • UNESCO. (1999). Second Protocol to the Hague Convention of 1954 for the Protection of Cultural Property in the Event of Armed Conflict. https://unesdoc.unesco.org/ark:/48223/pf0000130696
  • UNGA. (2002). Measures to Prevent Terrorists from Acquiring Weapons of Mass Destruction. A/C.1/57/L.49/Rev.1. https://digitallibrary.un.org/record/476446?v=pdf
  • UNGA. (2010). Women, Disarmament, Non-proliferation and Arms Control. Resolution 65/69. https://docs.un.org/en/A/RES/65/69
  • UNGA. (2023). Youth, Disarmament and Non-Proliferation. Resolution 78/31. https://docs.un.org/en/A/RES/78/31?_gl=1*1ikzqo7*_ga*NzMxMzE2MTc0LjE3NTQwMjg0NzA.*_ga_TK9BQL5X7Z*czE3NTQxNjM4MDEkbzQkZzAkdDE3NTQxNjM4MDEkajYwJGwwJGgw
  • UNODA. (1980). Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. https://treaties.unoda.org/t/ccw
  • UNSC. (1988). Resolution 620. Secretary-General’s Mechanism for Investigation of Alleged Use of Chemical and Biological Weapons (UNSGM). https://docs.un.org/en/s/res/620(1988)
  • UNSC. (2004). Resolution 1540. https://docs.un.org/en/S/RES/1540(2004)
  • VRI. (2025). OIP Space Instruments. https://vri.vlaanderen/en/members/oip-sensor-systems/
  • Wallerstein, M. B. (1991). Controlling Dual-Use Technologies in the New World Order. Issues in Science and Technology, 7(4), 70–77.
  • Ward, I. (1997). How Democratic Can We Get?: The Internet, the Public Sphere, and Public Discourse. JAC, 17(3), 365–379.
  • Wæver, O. (2011). Politics, security, theory. Security Dialogue, 42(4/5), 465–480.
  • Wendt, A. (1992). Anarchy is what States Make of it: The Social Construction of Power Politics. International Organization, 46(2), 391–425.
  • Who Profits. (2018). “Big Brother” in Jerusalem’s Old City: Israel’s Militarized Visual Surveillance System in Occupied East Jerusalem. https://www.whoprofits.org//writable/uploads/old/uploads/2018/11/surveil-final.pdf
  • Who Profits. (2025). Elbit Systems. https://www.whoprofits.org/companies/company/3794
  • Winston, E. A., Lee, R. G., Monikowski, C., Peterson, R., & Swabey, L. (2023). Contextualizing Assessment. In Beyond Equivalence: Reconceptualizing Interpreting Performance Assessment (pp. 49–58). Gallaudet University Press.
  • Wright, N. D. (Ed.). (2019). Artificial Intelligence and Domestic Political Regimes: Digital Authoritarian, Digital Hybrid, and Digital Democracy. In Artificial Intelligence, China, Russia, and the Global Order (pp. 21–34). Air University Press.
  • Yasur, N. and Ring E. (2024). Drowning in the Flood Social Media Platforms' Management of Harmful and Pro-Terror Content During the October 7th Attack and the Israel-Hamas War. Israel Internet Association. https://en.isoc.org.il/wp-content/uploads/2024/06/ISOC-IL-drowning-in-the-flood-2024.pdf
  • Zahra, R. (2023). Israel helps other countries to spy on their own citizens. Middle East Monitor. https://www.middleeastmonitor.com/20230904-israel-helps-other-countries-to-spy-on-their-own-citizens/
  • Ziółkowski, M. (2004). Commodification of Social Life. Polish Sociological Review, 148, 385–402.
Toplam 169 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Uluslararası İlişkiler (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Burak Şakir Şeker 0000-0002-8536-1790

Erken Görünüm Tarihi 24 Kasım 2025
Yayımlanma Tarihi 3 Aralık 2025
Gönderilme Tarihi 17 Eylül 2025
Kabul Tarihi 4 Kasım 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 12 Sayı: 2

Kaynak Göster

APA Şeker, B. Ş. (2025). State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel. Türkiye Ortadoğu Çalışmaları Dergisi, 12(2). https://doi.org/10.26513/tocd.1785938
AMA Şeker BŞ. State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel. Türkiye Ortadoğu Çalışmaları Dergisi. Kasım 2025;12(2). doi:10.26513/tocd.1785938
Chicago Şeker, Burak Şakir. “State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel”. Türkiye Ortadoğu Çalışmaları Dergisi 12, sy. 2 (Kasım 2025). https://doi.org/10.26513/tocd.1785938.
EndNote Şeker BŞ (01 Kasım 2025) State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel. Türkiye Ortadoğu Çalışmaları Dergisi 12 2
IEEE B. Ş. Şeker, “State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel”, Türkiye Ortadoğu Çalışmaları Dergisi, c. 12, sy. 2, 2025, doi: 10.26513/tocd.1785938.
ISNAD Şeker, Burak Şakir. “State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel”. Türkiye Ortadoğu Çalışmaları Dergisi 12/2 (Kasım2025). https://doi.org/10.26513/tocd.1785938.
JAMA Şeker BŞ. State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel. Türkiye Ortadoğu Çalışmaları Dergisi. 2025;12. doi:10.26513/tocd.1785938.
MLA Şeker, Burak Şakir. “State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel”. Türkiye Ortadoğu Çalışmaları Dergisi, c. 12, sy. 2, 2025, doi:10.26513/tocd.1785938.
Vancouver Şeker BŞ. State Utilization of New Surveillance Technologies and Justification Strategies for the Public: A Case Study of Israel. Türkiye Ortadoğu Çalışmaları Dergisi. 2025;12(2).

Creative Commons Lisansı

TOÇD'nde yayınlanan makaleler Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.