Stuxnet saldırısı ve Abd'nin siber savaş stratejisi: Uluslararası hukukta kuvvet kullanmaktan kaçınma ilkesi çerçevesinde bir değerlendirme

Stuxnet attack and cyber war strategy of the united states: An assesment within the principle of the prohibition of the Use of force in international law

___

  • Anderson, Kenneth, “United Nations Collective Security and the United States Security Guarantee in an Age of Rising Multipolarity: The Security Council as the Talking Shop of the Nations”, Chicago Journal of International Law, Vol.10, No.1 (2009).
  • Chen,Thomas, M. Stuxnet, The Real Start of Cyber Warfare?, IEEE Network (November/December 2010).
  • Collins, Sean McCombie, Stephen, “Stuxnet: The Emergence of a New Cyber Weapon And Its Implications” Journal of Policing, Intelligence and Counter Terrorism, Vol.7, No.1 (April 2012).
  • Farwell, James, Rohozinski, P. Rafal, “Stuxnet and The Future of Cyber War”, Survival Vol.53, No.1 (February-March 2011).
  • Gervais, Michael, “Cyber Attacks and the Laws of War”, Berkeley Journal of International Law, Vol.30, Issue 2 (2012).
  • Gürkaynak, Muharrem, İren, Adem Ali, “Reel Dünyada Sanal Açmaz: Siber Alanda Uluslararası İlişkiler”, Süleyman Demirel Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi, C.16, S.2 (2011).
  • Hoisington, Matthew, “Cyberwarfare and The Use of Force Giving Rise to The Right of Self-Defense”, Boston College International & Comparative Law Review, Vol. 32 (2009).
  • Inbar, Efraim “The “No Choice War” Debate in Israel”, Journal of Strategic Studies, March (1989).
  • Jenkins, Ryan, “Is Stuxnet Physical? Does It matter?” Journal of Military Ethics, Vol.12, No.1 (2013).
  • Langner, Ralph “Stuxnet: Dissecting a Cyberwarfare Weapon”, Journal IEEE Security and Privacy, Vol.9, Issue3 (May/June 2011).
  • Lin, Herbert S., “Cyber Conflict and İnternational Humanitarian Law”, International Review of the Red Cross, Vol.94, No.886 (Summer 2012).
  • Lin, Herbert S., “Offensive Cyber Operations and the Use of Force”, Journal of National Security Law & Policy, Vol.4, No.63 (2010).
  • Lin, Herbert S., “Offensive Cyber Operations and the Use of Force”, Journal of National Security Law & Policy, Vol.4. No.63 (2010).
  • Lynn III., William J., “Defending a New Domain: The Pentagon’s Cyberstrategy”, Foreign Affairs Vol.89, No.5 (2010).
  • Mcgraw, Gary “Cyber War is Inevitable (Unless We Build Security In)” The Journal of Strategic Studies, Vol.36, No.1 (2013).
  • Ophardt, Jonathan A., “Cyber Warfare and the Crime Of Aggression: The Need For Individual Accountability on Tomorrow’s Battlefield”, Duke Law & Technology Review Vol.9, No.3 (2010).
  • Peterson, Dale “Offensive Cyber Weapons: Construction, Development, and Employment”, The Journal of Strategic Studies, Vol.36, No.1, (2013).
  • Remus, Titiriga, “Cyber Attacks and International Law of Armed Conflicts; A “Jus Ad Bellum” Perspective”, Journal of International Commercial Law and Technology, Vol.8, No.3 (July, 2013).
  • Todd, Graham H. “Armed Attack in Cyberspace: Deterring Asymmetric Warfare With an Asymmetric Definition”, Vol.64, Cyber Law Edition, The Air Force Law Review, (2009).
  • Türkay Şeyda, “Siber Savaş Hukuku ve Uygulanma Sorunsalı”, İstanbul Üniversitesi Hukuk Fakültesi Mecmuası, C. LXXI, S. 1, s.1177-1228, (2013).
  • Kitaplar
  • Brownlie, Ian, International Law and The Use of Force by States, Oxford University Press, Oxford, 1963.
  • de Wet, Erika, Vidmar, Jure, eds., Hierarchy in International Law: The Place of Human Rights, Antonios Tzanakopoulos, “Collective Security and Human Rights”, Oxford University Press, Oxford, 2012.
  • Dinstein, Yoram, War, Aggression and Self-Defence, Cambridge University Press, 4th ed., Cambridge, 2005.
  • Garesi, Seven Bernhard, Varwick, Johannes, The United Nations, An Introduction, Palgrave MacMillan, New York, 2005.
  • Jennings, Robert, Watts, Arthur, (eds.), Oppenheim’s International Law, Ninth Edition, Oxford University Press, Oxford, 1991.
  • López-Jacoiste, Eugenia, The UN Collective Security System and its Relationship with Economic Sanctions and Human Rights, Max Planck Yearbook of United Nations Law (Armin von Bogdandy, Rüdiger Wolfrum, eds.).
  • Middlemas, Keith, Barnes, John, Baldwin: A Biography, Littlehampton Book Services Ltd., Worthing, 1969.
  • Operational Law Handbook, International & Operational Law Depertmant, The Judge Advocate General’s Legal Center, U.S. Army, Charlotsville, 2007.
  • Owens, William A. Dam, Kenneth, Lin, W. Herbert, (ed.), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Committee on Offensive Information Warfare, National Research Council, The National Academies Press, Washington, DC (2009).
  • Taşdemir, Fatma, Uluslararası Terörizme Karşı Devletlerin Kuvvete Başvurma Yetkisi, USAK, Ankara, 2006.
  • Raporlar/Tezler
  • Albright, David, Brannan, Paul, Walrond, Christina, Stuxnet Malware and Natanz: Update of ISIS Report (December 22, 2010) Applications, USAF Academy, Colorado (June 1999).
  • Ashmore, William, C. Impact of Alleged Russian Cyber Attacks, School of Advanced Military Studies, Fort Leavenworth. (2009).
  • Cheek, Gary H., Effects-Based Operations: The End of Dominant Maneuver? Carlisle Barracks, U.S. Army War College, (April 2002).
  • Chen, Thomas M., Stuxnet, The Real Start of Cyber Warfare?, IEEE Network (November/December 2010).
  • Clapper, James R., Statement for The Record Worldwide Threat Assessment Of The US Intelligence Community, Senate Select Committee On Intelligence (2013).
  • Deptula, David A., Effects-Based Operations: Change in the Nature of Warfare, Aerospace Education Foundation, Arlington (2001).
  • Falliere, Nicolas, Murchu, Liam O., Chien, Eric, W32.Stuxnet Dossier Symantec Security Response, Symantec (February 2011).
  • Langner, Ralph, To Kill a Centrifuge A Technical Analysis of What Stuxnet’s Creators Tried to Achieve, The Langner Group, (November 2013).
  • Mann III, Edward C., Endersby, Gaiy, Searle, Thomas R., Thinking Effects: Effects-Based Methodology for Joint Operations, Air University, College of Aerospace Doctrine, Research and Education Paper, No.15 (October 2002).
  • Mele, Stefano, Cyber-Weapons: Legal and Strategic Aspects, Italian Institute of Strategic Studies “Niccolò Machiavelli”, Rome, (June 2013).
  • Mueller, Karl P., Castillo, Jasen J, Morgan, Forrest E., Pegahi, Negeen, Rosen, Brian, Striking First: Preemptive and Preventive Attack in U.S. National Security Policy, RAND Corporation (2006).
  • Schmitt, Michael N., Computer Network Attack and The Use of Force in International Law: Thoughts on A Normative Framework, Research Publication 1 Information Series, Institute for Information Technology. Sharp, Sr., Walter Gary, Cyberspace and The Use of Force, Ageis Research Corp, Falls Church (1999).
  • Sinopoli, Anthony, F. Cyberwar and International Law: An English School Perspective, Yüksek Lisans Tezi, Government and International Affairs, University of South Florida (2012).
  • Smith, Edward A., Effects-Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War, Office of the Assistant Secretary of Defense, Command & Control Research Program, CCRP, Washington, DC (2006).
  • Talmon, Stefan, A Universal System of Collective Security Based on the Charter of the United Nations: A Commentary on Article 2(6) UN Charter, Bonn Research Papers on Public International Law Paper, No.1, Institute of Public International Law, University of Bonn (20 November 2011).
  • United States General Accounting Office, Critical Infrastructure Protection, Challenges and Efforts to Secure Control Systems, (March 2004).
  • Wagenhals, Lee W., Levis, Alexander H., McCrabb, Maris “Buster”, Effects-Based Operations; A Historical Perspective for a Way Ahead, George Mason University, System Architectures Laboratory, C3I Center, Fairfax, (2003).
  • Bildiriler/Çalışma Kağıtları
  • Iasiello, Emilio, Cyber Attack: A Dull Tool to Shape Foreign Policy, 5th International Conference on Cyber Conflict. (2013).
  • Kara, Mehmet, Çelikkol, Soner, 4. Ağ ve Bilgi Güvenliği Sempozyumu Kritik Altyapılar: Elektrik Üretim ve Dağıtım Sistemleri SCADA Güvenliği, Atılım Üniversitesi, 25-26 Kasım 2011.
  • Karnouskos, Stamatis, Stuxnet Worm Impact on Industrial Cyber- Physical System Security, IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, (2011).
  • Sheng, Su, Yingkun,Wang, Yuyi, Long, Yong, Li, Yu, Jiang, Cyber Attack Impact on Power System Blackout, IET Conference on Reliability of Transmission and Distribution Networks, (22-24 Nov.2011).
  • Uluslararası Antlaşmalar, Uluslararası Mahkeme Kararları ve Uluslararası Kılavuzlar
  • BM Sözleşmesi
  • Briand-Kellogg Paktı
  • Island of Palmas (Netherlands v. United States of America), 2 R.I.A.A. 829, 838, Permenant Court of Arbitration Nicaragua v. United States of America, 1986 I.C.J. 14
  • Tallinn Manual On The International Law Applicable To Cyber Warfare Viyana Andlaşmalar Hukuku Sözleşmesi
  • Devlet Belgeleri
  • Presidential Policy Directive/PPD-20, (2012)
  • Cyberspace Policy Review, (2009)
  • Strategy for Operating in Cyberspace, (2011)
  • The National Strategy to Secure Cyberspace, (February 2003)
  • Comprehensive National Cybersecurity Initiative, (January 2008)
  • Elektronik Kaynaklar
  • http://avalon.law.yale.edu/20th_century/kbpact.asp
  • http://avalon.law.yale.edu/20th_century/leagcov.asp
  • http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.7495
  • http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6109934.
  • http://isis-online.org/isis-reports/detail/stuxnet-malware-and-natanz-update-of- isis-december-22-2010-reportsupa-href1/
  • http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1892888
  • http://www.abajournal.com/magazine/article/what_is_the_role_of_lawyers_in_c yberwarfare/
  • http://www.admiraltylawguide.com/conven/lawoftreaties1969.html
  • http://www.bbc.co.uk/news/world-middle-east-11414483
  • http://www.symantec.com/connect/blogs/stuxnet-breakthrough
  • http://www.tandfonline.com/doi/abs/10.1080/13567888.2011.575612#preview
  • http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/ AR2010022502493.html.
  • http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered- stuxnet/all/
  • http://www.wired.com/threatlevel/2011/07/stuxnet-timeline/
  • http://www.youtube.com/watch?v=_9Gt2Ek4inM.
  • https://www.un.org/en/documents/charter/chapter1.shtml
  • https://www.un.org/en/documents/charter/chapter7.shtml