ULUSLARARASI HUKUKTA DEVLETLERĠN SORUMLULUĞU BAĞLAMINDA SĠBER SALDIRILARIN ATFEDĠLEBĠLĠRLĠĞĠ MESELESĠ

Siber saldırıların atfedilebilirliği, çok boyutlu bir mesele olup konunun birbirini besleyen teknik, politik ve hukuki boyutları bulunmaktadır. Bu çalıĢmada, uluslararası hukukta siber saldırıların herhangi bir devlete isnat edilip edilemeyeceği hususu, uluslararası hukukun siber uzaya Ģamil olup olmadığı tartıĢmalarına da değinilmek suretiyle uluslararası hukuktaki mevcut atfedilebilirlik kuralları üzerinden açıklanmaktadır. Bu bağlamda, öncelikle siber uzaya iliĢkin teorik ve kavramsal bir çerçeve çizilmekte; siber saldırıların türleri ve güncel örnekleri üzerinde durularak konu daha somut hale getirilmektedir. Akabinde uluslararası hukukta devletlerin sorumluluğuna iliĢkin uluslararası mahkeme kararları, uluslararası teamül hukuku kuralları, uluslararası kurumların görüĢleri, devletlerin beyanları ve doktrin ıĢığında siber saldırıların devletlere atfedilebilirliği meselesi irdelenmektedir.

THE ATTRIBUTABILITY OF CYBER ATTACKS IN THE CONTEXT OF STATE RESPONSIBILITY IN INTERNATIONAL LAW

The attribution of cyber attacks is a multidimensional issue that has technical, political and legal aspects feding each other. In this article, the issue of whether a cyber attack can be attributed to any state in international law is explained through the existing rules of attribution in international law, by also referring to the debates on whether international law is inclusive of cyberspace. In this context, the issue is made more concrete by drawing a theoretical and conceptual framework regarding cyber space and focusing on the types and current examples of cyber attacks. Subsequently, the issue of attribution of cyber attacks to states is examined in the light of decisions of international courts, rules of customary international law, opinions of international institutions, official statements of states and the doctrin regarding states‟ responsibility in international law.

___

BANKS William, “State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0”, Texas Law Review, vol 95, no. 7, 2017, ss. 1487-1514.

BARKHAM Jason, “Information Warfare and International Law on the Use of Force”, New York University Journal of International Law and Politics, vol. 34, no. 1, Fall 2001, ss. 57-114.

BUCHAN Russel, Cyber Espionage and International Law, Hart Publishing, Oxford, 2019.

CLARK David D. / LANDAU Susan, “Untangling Attribution”, Harvard National Security Journal, vol. 2, no. 2, 2011 ss. 323-352.

CRAWFORD James, Brownlie’s Principles of Public International Law, 8th Edition, Oxford University Press, Oxford, 2012.

CRAWFORD James, The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries, Cambridge University Press, Cambridge, 2002.

CZOSSECK Christian / GEERS Kenneth (Ed.), The Virtual Battlefield: Perspectives on Cyber Warfare, IOS Press, Amsterdam, 2009.

DARAS Nicholas J. (Ed.), Cyber Security and Information Warfare, Nova Science Publishers, New York, 2019.

DELERUE François, “Reinterpretation or Contestation of International Law in Cyberspace?”, Israel Law Review, vol. 52, no. 3, 2019, ss. 295-326. DROEGE Cordula, “Get off My Cloud: Cyber Warfare, International Humanitarian law, and the Protection of Civilians”, International Review of the Red Cross, vol. 94, no. 886, Summer 2012, ss. 533-578.

GARNER Bryan A. (Ed. in Chief), Black’s Law Dictionary, Ninth Edition, Thomson/West, St. Paul, 2009.

GREEN James A. (Ed.), Cyber Warfare: A Multidisciplinary Analysis, Routledge, New York, London, 2015.

I.C.J, “Case Concerning Military and Paramilitary Activities Against Nicaragua (Nicaragua v. United States of America)”, I.C.J. Reports 1986, ss. 14-150.

I.C.J., “Case Concerning Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda)”, I.C.J. Reports 2005, ss. 168-283.

I.C.J., “Case Concerning the Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v. Serbia and Montenegro)”, I.C.J. Reports 2007, ss. 43-240

I.C.J., “Case Concerning the Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Croatia v. Serbia)”, I.C.J. Reports 2015, ss. 3-154.

I.C.J., “Case Concerning United States Diplomatic and Consular Staff in Tehran (United States of America v. Iran)”, I.C.J. Reports 1980, Judgment of 24 May 1980, ss. 3-46.

I.C.J., “The Corfu Channel Case (The United Kingdom v. Albania)”, Merits, Judgment of April 9th, 1949, I.C.J. Reports 1949, ss. 4-169

ICTY, Prosecutor v. Duško Tadić (Appeal Judgment), Case No. IT-94-1-A, 15 Temmuz 1999. KITTICHAISAREE Kriangsak, Public International Law of Cyberspace, Springer, Cham, 2017.

LIN Herbert S., “Offensive Cyber Operations and the Use of Force”, Journal of National Security Law & Policy, vol. 4, no. 1, 2010, ss. 63-86.

MACAK Kubo, “Decoding Article 8 of the International Law Commission‟s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors”, Journal of Conflict & Security Law, vol. 21, no. 3, 2016, ss. 405-426.

MALPHRUS Stephen R., “Statement to Congress, May 18, 2000: The „I Love You‟ Computer Virus and the Financial Services Industry”, Federal Reserve Bulletin, Issue: July, 2000, ss. 459-462.

MCGAVRAN Wolfgang, “Intended Consequences: Regulating Cyber Attacks”, Tulane Journal of Technology and Intellectual Property, vol. 12, no. 1, 2009, ss. 259-276.

O‟CONNELL Mary Ellen, “Cyber Security without Cyber War”, Journal of Conflict and Security Law, vol. 17, no. 2, 2012, ss. 187-210.

OPPENHEIM Lawrence, International Law: A Treatise, Vol. 1-Peace (Ed. Ronald F. Roxburgh), Third Edition, Longmans, Green and Co., London, 1920.

PAYNE Thomas, “Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations”, Lewis & Clark Law Review, vol. 20, no. 2, 2016, ss. 683-715.

RID Thomas, Cyber War Will Not Take Place, Oxford University Press, New York, 2013.

ROSCINI Marco, Cyber Operations and the Use of Force in International Law, Oxford University Press, New York, 2014.

SCHMITT Michael N. (Ed.), Tallinn Manuel on the International Law Applicable to Cyber Warfare, Cambridge University Press, New York, 2013.

SCHMITT Michael N. / VIHUL Liis (Ed.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge University Press, New York, 2017.

SCHMITT Michael N. / VIHUL Liis, “Proxy Wars in Cyberspace: The Evolving International Law of Attribution”, Fletcher Security Review, vol. 1, no. 2, Spring 2014, ss. 53-72.

Secrétariat Général de la Défense et de la Sécurité Nationale, “Revue stratégique de cyberdéfense”, 12 ġubat 2018, ET: 31 Mayıs 2020.

SHACKELFORD Scott J., “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law”, Berkeley Journal of International Law, vol 27, no. 1, 2009, ss. 192-252.

SHAW Malcolm N., International Law, Sixth Edition, Cambridge University Press, New York, 2008.

SPRINGER Paul J. (Ed.), Encyclopedia of Cyber Warfare, ABC-CLIO, Santa Barbara, 2017.

STEVENS Sharon R., “Internet War Crimes Tribunals and Security in an Interconnected World”, Transnational Law & Contemporary Problems, vol. 18, no. 3, Fall 2009, ss. 657-720.

SWANSON Lesley, “The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict”, Loyola of Los Angeles International and Comparative Law Review, vol. 32, no. 2, Spring 2010, ss. 303-334.

TANODOMDEJ Papawadee, “The Tallinn Manuals and the Making of the International Law on Cyber Operations”, Masaryk University Journal of Law and Technology, vol. 13, no. 1, Summer 2019, ss. 67-86.

TSAGOURIAS Nicholas, “Cyber Attacks, Self-Defence and the Problem of Attribution”, Journal of Conflict and Security Law, vol. 17, no. 2, 2012, ss. 229- 244.

U. N. General Assembly, “Developments in the Field of Information and Telecommunications in the Context of International Security”, Report of the SecretaryGeneral, U.N. Doc. A/68/156/Add.1, 9 Eylül 2013.

U.N. General Assembly, “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security”, Note by the Secretary- General, U.N. Doc. A/68/98, 24 Haziran 2013.

U.N. General Assembly, “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security”, Note by the Secretary-General, U.N. Doc. A/70/174, 22 Temmuz 2015.

U.N. International Law Commission (ILC), “Report of the International Law Commission on the Work of Its Fifty-third Session (23 April-1 June and 2 July10 August 2001)”, Official Records of the General Assembly, Fifty-sixth session, Supplement No.10, U. N. Doc. A/56/10, 2001. United Nations, “Statute of the International Court of Justice”, United Nations Treaty Collection, San Francisco, 1945, < https://www.icj-cij.org/en/statute> ET: 31 Mayıs 2020.

VALERIANO Brandon / MANESS Ryan C., Cyber War versus Cyber Realities: Cyber Conflict in the International System, Oxford University Press, New York, 2015.

VENTRE Daniel, Cyberespace et acteurs du cyberconflit, Hermès science publications/Lavoisier, Paris, 2011.

WEITZ Benjamin, “Updating the Law of Targeting for an Era of Cyberwarfare”, University of Pennsylvania Journal of International Law, vol. 40, no. 3, Spring 2019, ss. 735-780.

WHYTE Christopher / MAZANEC Brian, Understanding Cyber-Warfare: Politics, Policy and Strategy, Routledge, London, New York, 2019.

WINTERFIELD Steve / ANDRESS Jason (Ed.), The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Syngresss, Boston, 2013.

WORTHAM Anna, “Should Cyber Exploitation Ever Constitute a Demonstration of Hostile Intent That May Violate UN Charter Provisions Prohibiting the Threat or Use of Force?”, Federal Communications Law Journal, vol. 64, no. 3, 2012, ss. 644-660.

ZETTER Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, Crown Publishers, New York, 2014.