SİBER SAVAŞLARDA JUS AD BELLUM VE JUS IN BELLO

Savaş kavramı, Soğuk Savaş dönemiyle birlikte dönüşmeye başlamış, yakın dönemde de Amerika Birleşik Devletleri’nin güttüğü “teröre karşı savaş politikası” ile bu durum perçinlenmiştir. Bu kavramsal dönüşüm çerçevesinde savaşların sadece devletler arasında gerçekleştiği artık düşünülmemektedir. Karakter olarak asimetrik ve genellikle sınırlı bir savaş alanından yoksun olan yeni savaşlar geleneksel savaşı tamamen değiştirememiş fakat geleneksel savaşlardaki tanımları ve ayırımları bulanıklaştırmış ve yeni kavramlar eklemiştir. Kavramsal dönüşümler ve yeni özellikler çerçevesinde ortaya çıkan yeni gri alanlar, uluslararası hukukun mevcut kuralları ve uygulanması açısından bazı zorlukları ve/veya sorunları da beraberinde getirmektedir. Ne var ki, uluslararası hukukun normatif gelişimi ve uygulamaları uluslararası politikadan bağımsız bir şekilde gerçekleşmemektedir. Bu çerçevede, bu makalede özellikle Uluslararası İlişkiler literatüründe az çalışılmış bir konu olan yeni savaşlarda jus ad bellum ve jus in bello prensiplerinin uygulanabilirliği siber savaşlar/saldırılar özelinde irdelenmekte ve Estonya, Gürcistan ve Stuxnet vakaları üzerinden literatürdeki örneklerinden farklı olarak “karşı çıkma kuramı” çerçevesinde tartışılmaktadır.

JUS AD BELLUM AND JUS IN BELLO IN CYBER WARS

The concept of war has been transforming since the Cold War period, and such transformation has been strengthened by “the war against terror” policy of the United States of America. In light of this conceptual transformation, it is no longer argued that wars take place only between states. New wars—which are asymmetric and do not have a limited war zone—have not changed traditional wars all together, instead, they have blurred the definitions and distinctions pertaining to traditional wars and added new concepts. The grey zones that have emerged due to these transformations have also led to the rise of new challenges and problems related to the implementation of the rules of international law. The normative evolution of international law and its implementations do not take place independently of international politics. In this vein, this article focuses on a question that has been underexplored especially in the International Relations literature, namely the applicability of jus ad bellum and jus in bello in new wars through the lenses of contestation theory. To this end, in its attempt to contribute the existing literature, it discusses how norms are contested in instances of cyber wars/attacks with reference to the specific cases of Estonia, Georgia and Stuxnet.

___

  • Allenby, Braden R. (2014), “Are New Technologies Undermining the Laws of War?”, Bulletin of the Atomic Scientists, 70 (1): 21-31.
  • Baker-Beall, Christopher (2014), “The evolution of the European Union’s ‘fight against terrorism’ discourse: Constructing the terrorist ‘other’”, Cooperation and Conflict, 49 (2): 212-238.
  • Barnard-Willis, David ve Debi Ashenden (2012), “Virtual Space: Cyber War, Cyber Terror, and Risk”, Space and Culture, 15 (2): 110-123.
  • Bassiouni, Cherif M. (2008), “The New Wars and the Crisis of Compliance with the Law of Armed Conflict by Non-State Actors”, The Journal of Criminal Law and Criminology, 98 (3): 711-810.
  • Birleşmiş Milletler (1945), Birleşmiş Milletler Antlaşması ve Uluslararası Adalet Divanı Statüsü, https://www.ombudsman.gov.tr/contents/files/6535501- Birlesmis-Milletler-Antlasmasi.pdf (29.11.2019).
  • Birleşmiş Milletler Genel Kurulu (BMGK), (14 Aralık 1974), “Definition of Aggression, United Nations General Assembly”, Karar 3314 (XXIX).
  • Birleşmiş Milletler Genel Kurulu (BMGK) (30 Temmuz 2010), “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security”, A/65/201.
  • Birleşmiş Milletler Genel Kurulu (BMGK) (24 Haziran 2013), “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security”, A/68/98.
  • Birleşmiş Milletler Genel Kurulu (BMGK) (22 Temmuz 2015), “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security”, A/70/174.
  • Brenner, Joel F. (2013), “Eyes wide shut: The growing threat of cyber attacks on industrial control systems”, Bulletin of Atomic Scientists, 69 (5): 15-20.
  • Cavelty, Myriam Dunn ve Victor Manuer (2010), The Routledge Handbook of Security Studies (New York: Routledge).
  • Charmatz, Jan P. ve Harold M. Witt (1953), “Repatriation of Prisoners of War and the 1949 Geneva Convention”, Yale Law Journal, 62 (3): 391-415.
  • Choucri, Nazli (2000), Cyberpolitics in International Relations: Context, Connectivity and Content (Cambridge: MIT Press).
  • Choucri, Nazli ve Daniel Goldsmith (2012), “Lost in Cyberspace: Harnessing the Internet, International Relations, and Global Security”, Bulletin of the Atomic Scientists, 68 (2): 70-77.
  • Clapper, James R. (2016), “Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community”, https://www.dni.gov/files/documents/SASC_Unclassified_ 2016_ATA_SFR_FINAL.pdf (28.05.2018).
  • Clarke, Richard A. ve Robert Knake (2012), Cyber War: The Next Threat to National Security and What to Do About It (New York: Harper Collins).
  • Coverdale, John F. (2004), “An Introduction to the Just War Tradition”, Pace International Law Review, 16 (2): 221-277.
  • Daniel III, J. Furman ve Brian A. Smith (2015), “Burke and Clausewitz on the Limitation of War”, Journal of International Political Theory, 11 (3): 313-330.
  • Deibert, Ronald (2011), “Tracking the Emerging Arms Race in Cyberspace”, Bulletin of the Atomic Scientist, 67 (1): 1-8.
  • Delerue, François (2017), “State Responses to Cyber Operations”, Global Relations Forum Young Academics Program Policy Paper Series 5.
  • Dolan, Chris J. (2005), “Waging War Against Iraq: Jus ad Bellum Considerations”, Politics and Ethics Review, 1 (2): 158-176.
  • Doswald-Beck, Louise (1987), “The Civilian in the Crossfire”, Journal of Peace Research, 24 (3): 251-262.
  • Ebert, Hannes ve Tim Maurer (2013), “Contested Cyberspace and Rising Powers”, Third World Quarterly, 34 (6): 1054-1074.
  • Echevarria II, Antulio J. (2007), “On the Clausewitz of the Cold War Reconsidering the Primacy of policy in On War”, Armed Forces & Society, 34 (1): 90-108.
  • Eriksson, Johan ve Giampiero Giacomello (2006), “The Information Revolution, Security, and International Relations: (IR)relevant Theory?”, International Political Science Review, 27 (3): 221-244.
  • Farwell, James P. ve Rafal Rohozinski (2011), “Stuxnet and the Future of Cyber War”, Survival, 53 (1): 23-40.
  • Fildes, Jonathan (23 Eylül 2010), “Stuxnet worm ‘targeted high-value Iranian assets’”, BBC News, http://www.bbc.com/news/ technology-11388018 (15.11.2018).
  • Finlay, Christopher J. (2010), “Terrorism Resistance, and the Idea of ‘Unlawful Combatancy’”, Ethics & International Affairs, 24 (1): 91-104.
  • Franck, Thomas M. (2004), “Criminals, Combatants, or What? An Examination of the Role of Law in Responding to the Threat of Terror”, The American Journal of International Law, 98 (4): 686-688.
  • Gartzke, Erik (2013), “The Myth of Cyber war: Bringing War in Cyberspace Back Down to Earth”, International Security, 38 (2): 41-73.
  • Gentry, Caron E. ve Amy E. Eckert (2014), The Future of Just War (Athen: University of Georgia Press).
  • Giles, Keir (2012), “Russia’s Public Stance on Cyberspace Issues”, 4th International Conference on Cyber Conflict, 63-75.
  • Giles, Keir (2012), “Russian Cyber Security: Concepts and Current Activity”, Conflict Studies Research Centre–Chatham House, 1-3.
  • Gregory, Derek (2011), “The Everywhere War”, The Geographical Journal, 177 (3): 238-250.
  • Guillaume, Xavier, Rune S. Andersen ve Juha A. Vuori (2016), “Paint It Black: Colours and Social Meaning of the Battlefield”, European Journal of International Relations, 22 (1): 49-71.
  • Guzzini, Stephan (2005), “The Concept of Power: A Constructivist Analysis”, Millennium Journal of International Studies, 33 (3): 495-521.
  • Haas, Marcel de (2009), “NATO-Russia Relations after the Georgian Conflict”, Atlantisch Perspectiefrre, 33 (7): 4-9.
  • Haataja, Samuli (2019), Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics (New York: Routledge).
  • Hajjar, Lisa (2006), “International Humanitarian Law and ‘Wars on Terror’: A Comparative Analyses of Israeli and American Doctrines and Policies”, Journal of Palestine Studies, 36 (1): 21-42.
  • Herberg-Rothe, Andreas (2009), “Clausewitz’s ‘Wondrous Trinity’ as a Coordinate System of War and Violent Conflict”, International Journal of Conflict and Violence, 3 (2): 204-219.
  • Houweling, Henk W. ve Jan G. Siccama (1988), “The Risk of Compulsory Escalation”, Journal of Peace Research, 25 (1): 43-56.
  • Howe, Brendan (2006), “Normative War-Fighting and the New World Order”, Politics and Ethics Review, 2 (1): 38-61.
  • Kaldor, Mary (1996), “A Cosmopolitan Response to New Wars”, Peace Review: A Journal of Social Justice, 8 (4): 505-514.
  • Kaldor, Mary (2005), “Old Wars, Cold Wars, New Wars, and the War on Terror”, International Politics, 42 (4): 491-498.
  • Kaldor, Mary (2006), “The ‘New War’ in Iraq”, A Journal of Social and Political Theory, 109: 1-27.
  • Kelsey, Jeffrey T.G. (2008), “Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare”, Michigan Law Review, 106 (7): 1421-1451.
  • Kello, Lucas (2013), “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft”, International Security, 38 (2): 7-40.
  • Keohane, Robert O. ve Joseph S. Nye JR. (2000 Bahar), “Globalization: What’s New? What’s Not? (And So What?)”, Foreign Policy, 118: 104-119.
  • Kim, Jasper (2011), “Law of War 2.0: Cyberwar and the Limits of the UN Charter”, Global Policy, 2 (3): 322-328.
  • Kolb, Robert (1997 Ekim), “Origin of the Twin Terms jus ad bellum/jus in bello”, International Review of the Red Cross, 37 (320): 553-562.
  • Kozlowski, Andrzej (2014), “Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan”, European Scientific Journal, 3: 237-245.
  • Lantis, Jeffrey S. (2006), “Strategic Culture: From Clausewitz to Constructivism”, SAIC, 3-31.
  • Lantis, Jeffrey S. ve Daniel J. Bloomberg (2018), “Changing the Code? Norm Contestation and US Antipreneurism in Cyberspace”, International Relations, 32 (2): 149- 172.
  • Lynn III, William J. (2010), “Defending a New Domain”, Foreign Affairs, 89 (5): 97-108.
  • Malender, Erik, Magnus Öberg ve Jonathan Hall (2009), “Are ‘New Wars’ More Atrocious? Battle Severity, Civilians Killed and Forced Migration Before and After the End of the Cold War”, European Journal of International Relations, 15 (3): 505-536.
  • Maurer, Peter (2018), 7 issues that will shape the humanitarian agenda in 2018, ICRC, https://www.icrc.org/en/document/7-issues-will-shape-humanitarianagenda-2018 (20.02.2018).
  • McMahan, Jeff (2004), “Ethics of Killing in War”, Ethics, 114 (4): 693-733.
  • McMahan, Jeff (2010), “Pacifism and Moral Theory”, Diametros, 23: 44-68.
  • McMahan, Jeff (2010), “The Just Distribution of Harm Between Combatants and Noncombatants”, Philosophy & Public Affairs, 38 (4): 342-379.
  • Mearsheimer, John (2016), “Defining a New Security Architecture for Europe that Brings Russia in from the Cold”, Military Review, 96 (3): 27-31.
  • Mello, Patrick A. (2010), “In search of new wars: The debate about a transformation of war”, European Journal of International Relations, 16 (2): 297- 309.
  • Meisels, Tamar (2012), “In Defense of the Defenseless: The Morality of the Laws of War”, Political Studies, 60: 919-935.
  • Mueller III, Rober S. (2013), “Cyber Security: Safeguarding Our Cyberspace”, D. Frank Hsu ve Dorothy Marinucci (Der.), Advances in Cyber Security (New York: Fordham University Press).
  • Murphy, James G. (2014), War’s Ends (Washington DC: Georgetown University Press).
  • Münkler, Herfried (2003 Mart), “The Wars of the 21st Century”, Revue Internationale de la Croix-Rouge/International Review of the Red Cross, 85 (849): 7-22.
  • Nakashima, Ellen ve Joby Warrick (2 Haziran 2012), “Stuxnet Was Work of US and Israeli Experts Officials Say”, Washington Post, https://www.washingtonpost.com/world/national-security/stuxnet-was-workof-us-and-israeli-experts-officialssay/2012/06/01/gJQAlnEy6U_story.html (15.11.2018).
  • Naim, Moises (2017), “Why Democracies are at a Disadvantage in Cyber Wars”, Journal of International Affairs, 70 (Special Anniversary Issue): 85-91.
  • NATO (5 Eylül 2014), “Wales Summit Declaration” https://www.nato.int/cps/en/natohq/ official_texts_112964.htm?selectedLocale=en (22.05.2019).
  • Nye JR., Joseph S. (2013), “From Bombs to Bytes: Can our Nuclear History Inform Our Cyber Future?”, Bulletin of the Atomic Scientists, 69 (5): 8-14.
  • Nye JR., Joseph S. ve David A. Welch (2011), Küresel Çatışmayı ve İşbirliğini Anlamak (İstanbul: Türkiye İş Bankası Kültür Yayınları).
  • Pictet, Jean S. (1951), “The New Geneva Conventions for the Protection of War Victims”, The American Journal of International Law, 45 (3): 462–475.
  • Reid, Julian (2003), “Foucault on Clausewitz Conceptualizing the Relationship Between War and Power”, Alternatives, 28: 1-28.
  • Reveron, Derek S. (2012), Cyberspace and National Security (Washington DC: Georgetown University Press).
  • Robinson, Neil (2017), “Cyber Defense at NATO: From Wales to Warsaw and Beyond”, Turkish Policy Quarterly, 16 (3): 133-143.
  • Rosen, David M. (2007), “Child Soldiers, International Humanitarian Law, and the Globalization of Childhood”, American Anthropologist, 109 (2): 296-306.
  • Schmitt, Michael N. (der.) (2017), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge: Cambridge University Press).
  • Schuurman, Bart (2010 Bahar), “Clausewitz and the ‘New Wars’ Scholars”, Parameters, 40 (1): 89-100.
  • Shue, Henry (1978), “Torture”, Philosophy and Public Affairs, 7 (2): 124-143.
  • Swaine, Jon (11 Ağustos 2008), “Georgia: Russia ‘conducting cyber war’”, The Telegraph, https://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Geor gia-Russia-conducting-cyber-war.html (02.05.2019).
  • The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) (2019),
  • Tallinn Manual 2.0, https://ccdcoe.org/research/tallinn-manual/ (29.12.2019).
  • Tikk, Eneken (2010), “Global Cybersecurity-Thinking About the Niche for NATO”, SAIS Review of International Affairs, 30 (2): 105-119.
  • Uluslararası Atom Enerjisi Kurumu (24 Eylül 2005), “Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran”, GOV/2005/77, https://www.iaea.org/sites/default/files/gov2005-77.pdf (22.05.2019).
  • Waldman, Thomas (2010), “Politics and War: Clausewitz’s Paradoxical Equation”, Parameters, 40 (3): 1-12.
  • Walt, Stephen M. (30 Mart 2010), “Is the Cyber Threat Overblown?”, Foreign Policy, https://foreignpolicy.com/2010/03/30/is-the-cyber-threat-overblown/ (15.05.2016).
  • Waterman, Shaun (11 Haziran 2007), “Who Cyber Smacked Estonia?” United Press International, https://www.upi.com/DefenseNews/2007/06/11/Analysis-Who-cyber-smacked-Estonia/26831181580439/ (18.01.2020).
  • Wiener, Antje (2014), A Theory of Contestation (Londra: Springer).
  • Wiener, Antje (2017), “Agency of the Governed in Global International Relations: Access to Norm Validation”, Third World Thematics: A TWQ Journal, (online first): 1-17.
  • Wiener, Antje (2018), “Responsibility Contestations: A Challenge to the Moral Authority of the UN Security Council”, Cornelia Ulbert, Peter Finkenbusch, Elena Sondermann ve Tobias Debiel (Der.), Moral Agency and the Politics of Responsibility (Londra: Routledge): 85-103.
  • Wolff, Jonas ve Lisbeth Zimmermann (2015), “Between Banyans and Battle Scenes: Liberal Norms, Contestation, and the Limits of Critique”, Review of International Studies, 42 (3): 1-22.