CYBER TERRORISM FROM THE CRIMINAL LAW PERSPECTIVE

Siber terörizm, ulusal ve uluslararası seviyede tehdit olarak kabul edilmektedir. Bunun nedeni, siber saldırıların dünyanın herhangi bir yerinden gelebilmesi ve gizlenebilmesidir. İnternet, kimsenin üzerinde tamamen egemenlik kuramadığı, devletlerin, şirketlerin ve kişilerin sahip olamadığı bir yapıdır. Bunun sonucu olarak siber ortam, sınırasahip değildir. Siber terörizmin sınırları aşan yapısı, yargılama konularını önemli bir tartışma alanı yapmaktadır. Siber terörizm, özel çaba gerektiren, olabildiğince kapsamlı strateji ve politika üretilelerek mücadele edilmesi gereken bir konudur. Bu mücadele, ceza hukuku sistemi de dâhil tüm tarafların çabalarını içermektedir. Ceza hukuku sisteminin yeni gelişmelere uyum sağlaması gerekmektedir. Fakat, hangi kuralın geliştirilmesi gerektiğini tartışmadan önce, siber terörizm teriminin bir ceza hukuku terimi olarak açıklanması önem arz etmektedir. Çünkü, kelimeler hukuk biliminin vazgeçilmez malzemesidir. Bu çalışmada, siber terörizm bir ceza hukuku terimi olarak incelenmiş ve Türk Ceza Hukukunda siber teröristler tarafından işlenecebilecek suçlar tartışılmıştır.

Ceza Hukuku Açısından Siber Terörizm *

Cyber terrorism has been recognized as a threat at national and international level. The reason of that cyber attacks can come from anywhere on the globe and be easily hidden. The Internet is not a single entity; no government, company, or individual owns it. As a result, cyber space has no border. The transnational character of cyber terrorism makes jurisdictional issues an important area of concern. Responding to cyber terrorism requires special efforts and developing strategies and policies that need to be as inclusive as possible. It includes bringing efforts from all parties, including criminal law system. The criminal law system must adapt to new development. But, before discussing what rules should be developed, it is important to explain cyber terrorism as a criminal law term. Because words are inevitable instruments of jurisprudence. In this study, cyber terrorism as a criminal law term has been examined and discussed which crimes in Turkish Penal Law can be committed by cyber terrorist.

___

  • A. Sinks, Michael, Cyber Warfare and International Law 3 (April 2008) (unpublished research paper, Air University, Air Command and Staff College), https://www.afresearch.org/skins/RIMS/display.aspx?moduleid=be0e99f3-fc 56-4ccb-8dfe-670c0822a153& mode=user&action=researchproject&objectid =1120f215-38a9-4829-bb7a-33de2e42ec12 (noting that the National Military Strategy for Cyberspace Operations defines cyberspace as “a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructure”), access date 23.3.2013. Antolin-Jenkins, Vida M., “Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places?”, Naval Law Review, V.51, Y.2005, p.132-136. Brenner, Susan W., “Technological Change and The Evolution of Criminal Law: “At Light Speed”: Attribution and Response To Cybercrime/Terrorism/ Warfare”, Journal of Criminal Law & Criminology V.97, Winter, 2007, p.379- 475. Brickey, Jonalan, “Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace”, http://www.ctc.usma.edu/posts/defining-cyberterrorism-capturing-a-broad-range-of-activities-in-cyberspace, access date 15.3.2013. Charvat, Jpiag, “Cyber Terrorism: A New Dimension in Battlespace”, http:// www.ccdcoe.org/publications/virtualbattlefield/05_CHARVAT_Cyber%20 Terrorism.pdf, access date 29.3.2013.
  • Collin, Barry C., “The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge”, Remarks at the 11th Annual International Symposium on Criminal Justice Issues, http://afgen.com/terrorism1.html, access date 15.3.2013.
  • “Cyber Crime”, FBI, http://www.fbi.gov/about-us/investigate/cyber, access date 23.3.2013.
  • Denning, Doroty E., “Is Cyber Terror Next?”, http://essays.ssrc.org/sept11/essays/denning.htm, access date 25.3.2013.
  • Denning, Doroty E., “Cyberterrorism: The Logic Bomb versus the Truck Bomb”, Global Dialogue, Volume 2, Number 4, Autumn 2000, http://www. worlddialogue.org/content.php?id=111, access date 15.5.2013.
  • Gordon, Sarah & Ford, Richard, “On the Definition and Classification of Cybercrime”, J. Computer Virology, No:1, Y.2006, p.13-20.
  • Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf, access date 10.2.2013.
  • Krasavin, Serge, “What is cyber-terrorism?”, http://www.crime-research.org/ library/Cyber-terrorism.htm, access date 12.3.2013.
  • Latin Dictionary, http://www.latin-dictionary.net/definition/37010/terreo-terrere-terrui-territus, access date 22.3.2013.
  • Ozeren, S., Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment (Unpublished Dissertation for Doctor of Philosophy), University of North Texas, 2005.
  • Perera, Rohan, “Declaration on Measures to Eliminate International Terrorism”, 1994, http://untreaty.un.org/cod/avl/ha/dot/dot.html, access date 23.3.2013.
  • Pollitt, M.M., “Cyberterrorism: Fact or Fancy?”, Proceedings of the 20 National Information Systems Security Conference, October 1997, p.285-289.
  • “Prospective Analysis on Trends in Cybercrime from 2011 to 2020”, French National Gendarmerie (Agence Nationale de Sécurité des Systèmes d’Information (ANSSI), http://www.mcafee.com/hk/resources/white-papers/wptrends-in-cybercrime-2011-2020.pdf, access date 22.3.2013.
  • Swanson, Lesley, “The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict”, Loyola of Los Angeles International & Comparative Law Review, V.32, Y.Spring 2010, p.303- 333.
  • The Arab Convention for the Suppression of Terrorism, adopted by the Council of Arab Ministers of the Interior and the Council of Arab Ministers of Justice, Cairo, April 1998, http://www.al-bab.com/arab/docs/league/terrorism98. htm, access date 23.3.2013.
  • The Council of Europe Convention on Cybercrime, similarly, covers a broad range of criminal activity committed by means of a computer, including “action directed against the confidentiality, integrity and availability of computer systems, networks and computer data as well as the misuse of such systems, networks and data.” Council of Europe, ETS No. 185, Convention on Cybercrime, Budapest (November 23, 2001), entered into force July 1, 2004, http:// conventions.coe.int/Treaty/EN/Treaties/Html/185.htm, access date 23.3.2013.
  • The European Union Council Framework Decision 2002/475 on Combating A. Sinks, Michael, Cyber Warfare and International Law 3 (April 2008) (unpublished research paper, Air University, Air Command and Staff College), https://www.afresearch.org/skins/RIMS/display.aspx?moduleid=be0e99f3-fc 56-4ccb-8dfe-670c0822a153& mode=user&action=researchproject&objectid =1120f215-38a9-4829-bb7a-33de2e42ec12 (noting that the National Military Strategy for Cyberspace Operations defines cyberspace as “a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructure”), access date 23.3.2013.
  • Antolin-Jenkins, Vida M., “Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places?”, Naval Law Review, V.51, Y.2005, p.132-136.
  • Brenner, Susan W., “Technological Change and The Evolution of Criminal Law: “At Light Speed”: Attribution and Response To Cybercrime/Terrorism/ Warfare”, Journal of Criminal Law & Criminology V.97, Winter, 2007, p.379- 475.
  • Brickey, Jonalan, “Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace”, http://www.ctc.usma.edu/posts/defining-cyberterrorism-capturing-a-broad-range-of-activities-in-cyberspace, access date 15.3.2013.
  • Charvat, Jpiag, “Cyber Terrorism: A New Dimension in Battlespace”, http:// www.ccdcoe.org/publications/virtualbattlefield/05_CHARVAT_Cyber%20 Terrorism.pdf, access date 29.3.2013.
  • Collin, Barry C., “The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge”, Remarks at the 11th Annual International Symposium on Criminal Justice Issues, http://afgen.com/terrorism1.html, access date 15.3.2013.
  • “Cyber Crime”, FBI, http://www.fbi.gov/about-us/investigate/cyber, access date 23.3.2013.
  • Denning, Doroty E., “Is Cyber Terror Next?”, http://essays.ssrc.org/sept11/essays/denning.htm, access date 25.3.2013.
  • Denning, Doroty E., “Cyberterrorism: The Logic Bomb versus the Truck Bomb”, Global Dialogue, Volume 2, Number 4, Autumn 2000, http://www. worlddialogue.org/content.php?id=111, access date 15.5.2013.
  • Gordon, Sarah & Ford, Richard, “On the Definition and Classification of Cybercrime”, J. Computer Virology, No:1, Y.2006, p.13-20.
  • Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf, access date 10.2.2013.
  • Krasavin, Serge, “What is cyber-terrorism?”, http://www.crime-research.org/ library/Cyber-terrorism.htm, access date 12.3.2013.
  • Latin Dictionary, http://www.latin-dictionary.net/definition/37010/terreo-terrere-terrui-territus, access date 22.3.2013.
  • Ozeren, S., Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment (Unpublished Dissertation for Doctor of Philosophy), University of North Texas, 2005.
  • Perera, Rohan, “Declaration on Measures to Eliminate International Terrorism”, 1994, http://untreaty.un.org/cod/avl/ha/dot/dot.html, access date 23.3.2013.
  • Pollitt, M.M., “Cyberterrorism: Fact or Fancy?”, Proceedings of the 20 National Information Systems Security Conference, October 1997, p.285-289.
  • “Prospective Analysis on Trends in Cybercrime from 2011 to 2020”, French National Gendarmerie (Agence Nationale de Sécurité des Systèmes d’Information (ANSSI), http://www.mcafee.com/hk/resources/white-papers/wptrends-in-cybercrime-2011-2020.pdf, access date 22.3.2013.
  • Swanson, Lesley, “The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict”, Loyola of Los Angeles International & Comparative Law Review, V.32, Y.Spring 2010, p.303- 333.
  • The Arab Convention for the Suppression of Terrorism, adopted by the Council of Arab Ministers of the Interior and the Council of Arab Ministers of Justice, Cairo, April 1998, http://www.al-bab.com/arab/docs/league/terrorism98. htm, access date 23.3.2013.
  • The Council of Europe Convention on Cybercrime, similarly, covers a broad range of criminal activity committed by means of a computer, including “action directed against the confidentiality, integrity and availability of computer systems, networks and computer data as well as the misuse of such systems, networks and data.” Council of Europe, ETS No. 185, Convention on Cybercrime, Budapest (November 23, 2001), entered into force July 1, 2004, http:// conventions.coe.int/Treaty/EN/Treaties/Html/185.htm, access date 23.3.2013.
  • The European Union Council Framework Decision 2002/475 on Combating Terrorism, http://www.unhcr.org/refworld/docid/3f5342994.html, access date 23.3.2013.
  • The United Kingdom’s Terrorism Act 2000, Part I, Introductory, Article 1, http://www.legislation.gov.uk/ukpga/2000/11/pdfs/ukpga_20000011_en.pdf, access date 29.2.2013.
  • “The United Nations and The Fight Against Terrorism”, p.8, 30, http://democrats.foreignaffairs.house.gov/archives/109/20061.PDF, access date 23.3.2013.
  • The UN General Assembly Resolution 49/60 (adopted on December 9, 1994), titled “Measures to Eliminate International Terrorism”. UN panel, on March 17, 2005, http://www.ghri.org/GHR-International%20 Definitions.htm, access date 23.3.2013.
  • United Nations Multilingual Terminology Database, http://unterm.un.org/ DGAACS/unterm.nsf/WebView/99B98BDBCBAB096185256E620052EFD3?OpenDocument, access date 10.3.2013. UN Security Council Resolution 1566 (2004), http://www.un.org/News/dh/ infocus/terrorism/sg%20high-level%20panel%20report-terrorism.htm, access date 23.3.2013. U.S. Department Of Justıce, Computer Crime and Intellectual Property Section, Criminal Division, “Prosecutıng Computer Crımes” (2d ed. 2010), http:// www.justice.gov/criminal/cybercrime/ccmanual/ccmanual.pdf, access date 1.3.2013. White, Jonathan R., “Terrorism&Homeland Security”, Cengage Lerarning, Wadsworth, California, 2012. Weimann, G., (2004). How Modern Terrorism Uses the Internet. http://www. usip.org/publications/www terrornet-how-modern-terrorism-uses-internet, access date 04.01.2013. Weimann, G., “Cyberterrorism: The Sum of All Fears?”, Studies in Conflict & Terrorism, 28:2, 2005, p.129-149. Zanini, M. & Edwards, S. J. A., “The Networking of Terror in the Information Age”, In J. Arquilla & D. Ronfelt (Eds), Networks and Netwars, Santa Monica, CA: RAND Corporation, 2001, p.29-60.Terrorism, http://www.unhcr.org/refworld/docid/3f5342994.html, access date 23.3.2013.
  • The United Kingdom’s Terrorism Act 2000, Part I, Introductory, Article 1, http://www.legislation.gov.uk/ukpga/2000/11/pdfs/ukpga_20000011_en.pdf, access date 29.2.2013.
  • “The United Nations and The Fight Against Terrorism”, p.8, 30, http://democrats.foreignaffairs.house.gov/archives/109/20061.PDF, access date 23.3.2013.
  • The UN General Assembly Resolution 49/60 (adopted on December 9, 1994), titled “Measures to Eliminate International Terrorism”. UN panel, on March 17, 2005, http://www.ghri.org/GHR-International%20 Definitions.htm, access date 23.3.2013.
  • United Nations Multilingual Terminology Database, http://unterm.un.org/ DGAACS/unterm.nsf/WebView/99B98BDBCBAB096185256E620052EFD3?OpenDocument, access date 10.3.2013.
  • UN Security Council Resolution 1566 (2004), http://www.un.org/News/dh/ infocus/terrorism/sg%20high-level%20panel%20report-terrorism.htm, access date 23.3.2013.
  • U.S. Department Of Justıce, Computer Crime and Intellectual Property Section, Criminal Division, “Prosecutıng Computer Crımes” (2d ed. 2010), http:// www.justice.gov/criminal/cybercrime/ccmanual/ccmanual.pdf, access date 1.3.2013.
  • White, Jonathan R., “Terrorism&Homeland Security”, Cengage Lerarning, Wadsworth, California, 2012.
  • Weimann, G., (2004). How Modern Terrorism Uses the Internet. http://www. usip.org/publications/www terrornet-how-modern-terrorism-uses-internet, access date 04.01.2013.
  • Weimann, G., “Cyberterrorism: The Sum of All Fears?”, Studies in Conflict & Terrorism, 28:2, 2005, p.129-149.
  • Zanini, M. & Edwards, S. J. A., “The Networking of Terror in the Information Age”, In J. Arquilla & D. Ronfelt (Eds), Networks and Netwars, Santa Monica, CA: RAND Corporation, 2001, p.29-60.