GÜÇ KULLANIMI OLARAK SİBER FAALİYETLER: ULUSLARARASI HUKUKUN SİBER UZAYA UYGULANABİLİRLİĞİ
Devletlerin siber yeteneklerini geliştirerek artırmaları, bizzat silahlı kuvvetleri bünyesinde siber birimler ihdas etmeleri, bir takım vekil aktörleri kendileri adına siber saldırılar gerçekleştirmesi konusunda desteklemeleri, benzer şekilde sivil direniş veya terör gruplarının artan oranda siber yeteneklere yatırım yapması uluslararası arenada siber uzayı yeni bir cephe olarak öne çıkarmıştır. Bu meyanda, yakın zamanda Kuzey Kore ABD'ye olan husumetini Sony adlı şirkete siber saldırı düzenleyerek tevcih etmiş, arkasında Çin'in olduğu düşünülen Mirai korsanları ABD'de Twitter, Spotify, Amazon, Reddit, Yelp ve Netflix'e ait internet sitelerini karartıp işlem göremez hale getirmiş, İsrail ve ABD imzasını taşıyan Stuxnet adlı siber saldırıya maruz kalan İran hızlıca kendi siber ordusunu oluşturmaya başlamış, Rusya NATO ile mücadelede siber uzayı yeni bir cephe olarak ilan etmiş, bunun üzerine NATO Genel Sekreteri Jens Stoltenberg NATO ülkelerine yönelik bir siber saldırı halinde kolektif savunmayı öngören 5. maddeyi işletebileceklerini açıklamıştır. Uluslararası ilişkilerde seyreden rekabet ve gerginliğin siber uzaya da taşındığını gösteren tüm bu gelişmeler, aktörlerin siber uzayda güç kullanma kapasitelerine işaret etmekte ve konunun güç kullanma hukukunu düzenleyen uluslararası hukuk kuralları muvacehesinde irdelenmesini zaruri kılmaktadır.
(CYBER OPERATIONS AS THE USE OF FORCE: THE APPLICABILITY OF INTERNATIONAL LAW TO CYBER SPACE)
Cyberspace has emerged as a new front in international fora with States incrementally developing their cyber capabilities, creating cyber units within their armed forces along with hiring proxies to conduct cyber-attacks on their behalf, and with rebel groups or terrorist organizations increasingly investing in cyber capabilities. Note that, in the recent past, North Korea expressed its animosity against the US through carrying out a cyber-attack on Sony. Besides, Mirai hackers which appear to be backed up by China knocked offline a whole group of major websites, including Twitter, Spotify, Amazon, Reddit, Yelp, Netflix, and The New York Times by a massive DDoS attack. Iran rapidly formed its own cyber army right after it had been exposed to Stuxnet cyber-attack allegedly initiated jointly by Israel and the US. Likewise, Russia has articulated the cyber space as a new front in its warfare, and in turn, NATO Secretary-General Jens Stoltenberg warned that cyberattack against a NATO member can trigger collective defense enshrined in article 5 of the Alliance Treaty. All these developments suggesting the transmission of rivalry and tensions looming over international relations into the cyber-space, point out the actors' readiness to resort to the use of force in cyber space and requires, therefore, to analyze the issue under the international law governing the use of force.
___
- Abass, A., Complete International Law: Text, Cases, and Materials, Oxford University Press, New York 2012.
- Arend Anthony, "International Law and the Preemptive Use of Military Force", The Washington Quarterly 26(2), 2003.
- Blake Duncan & Imburgia Joseph, "'Bloodless Weapons'? The Need to Conduct Legal
- Reviews of Certain Capabilities and the Implications of Defining Them as 'Weapons'", Air Force Law Review, Vol. 66, 2010.
- Birleşmiş Milletler Antlaşması, http://www.ombudsman.gov.tr/D732173C-78B5-46FD-BDACE5A94E1EB49C/FinalDownload/DownloadIdC1C6CFA9EA554A0925FF14D5F9C6E2D1/D732173C-78B5-46FDBDAC-E5A94E1EB49C/contents/files/35501-Birlesmis-MilletlerAntlasmasi.pdf, Erişim: 20 Mayıs 2014.
- Convention (II) with Respect to the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 29 July 1899,http://www.icrc.org/applic/ihl/ihl.nsf/Treaty.xsp?documentId=CD0F6 C83F96FB459C12563CD002D66A1&action=openDocument, Erişim: 26 Mayıs 2014.
- Convention (III) relative to the Opening of Hostilities. The Hague, 18 October 1907, http://www.icrc.org/applic/ihl/ihl.nsf/Treaty.xsp?documentId=BD56907463 617993C12563CD002D6774&action=openDocument, Erişim: 26 Mayıs 2014.
- Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907,http://www.icrc.org/ihl.nsf/385ec082b509e76c41256739003e636d/1d 1726425f6955aec125641e0038bfd6, Erişim: 21 Mayıs 2014.
- Definition of Aggression, General Assembly Resolution 3314 (XXIX), 14 December 1974.
- Dinstein Yoram, War, Aggression And Self-Defence, Grotius Publications Limited, Cambridge. Establisment of the US Cyber Command, US Army Cyber Command, http://www.arcyber.army.mil/history_arcyber.html, Erişim: 21 Mayıs 2014.
- Gorman Siobhan & Barnes Julian, "Cyber Combat: Act of War Pentagon Sets Stage for U.S. to Respond to Computer Sabotage With Military Force", the Wall Street Journal, http://online.wsj.com/news/articles/SB100014240527023045631045763556 23135782718?mg=reno64- wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052 702304563104576355623135782718.html, Erişim: 20 Mayıs 2014.
- Gray Christine, International Law and Use of Force, Oxford University Press, Third Edition, 2004.
- Geiss Robin, "Cyber Warfare: Implications for Non-international Armed Conflicts", International Law Studies, Volume 89, 2013.
- Grisham Lori, "North Korea and the Sony Pictures hack", USA Today, 18.12.2014, http://www.usatoday.com/story/news/nation-now/2014/12/18/sony-hacktimeline-interview-north-korea/20601645/ Erişim: 01.04.2017
- Hathaway Oona, Crootof Rebecca, Levitz Philip, Nix Haley, Nowlan Aileen, Perdue William & Spiegel Julia, "The Law of Cyber Attack", California Law Review, Vol. 100, 2012, s.817-886.
- Henckaerts Jean-Marie & Doswald-Beck Louise, Customary International Humanitarian Law, Volume I, Rules, International Comittee of the Red Cross, Cambridge, 2005.
- Henckaerts Jean-Marie & Doswald-Beck Louise, Uluslararası İnsancıl Teamül (Örf-Adet) Hukuku, Cilt I: Kurallar, Uluslararası Kızılhaç Komitesi, Galatasaray Üniversitesi Yayınları: 66, İstanbul, 2005.
- ICRC Commentary of Art. 3 of Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field. Geneva, 12 August 1949
- http://www.icrc.org/applic/ihl/ihl.nsf/Comment.xsp?viewComments=Look UpCOMART&articleUNID=BAA341028EBFF1E8C12563CD00519E66, Erişim: 21 Mayıs 2014.
- International Committee of the Red Cross, International Humanitarian Law and the challenges of contemporary armed conflicts, Report Document, 31IC/11/5.1.2, Geneva, October 2011.
- International Committee of the Red Cross, How is the Term "Armed Conflict" Defined in International Humanitarian Law?, Opinion paper, March 2008, www.icrc.org/eng/assets/files/other/opinion-paper-armedconflict.pdf: Erişim: 22 Mayıs 2014.
- Jones Sam, "Cyber warfare: Iran opens a new front" FT Times, 26.04.2016. https://www.ft.com/content/15e1acf0-0a47-11e6-b0f1- 61f222853ff3Erişim: 01.04.2017
- Lauterpacht Hersch, Recognition in International Law, Cambridge University Press, Cambridge, 1947.
- Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion of 8 July 1996, International Court of Justice, http://www.icj-cij.org/D732173C78B5-46FD-BDAC-E5A94E1EB49C/FinalDownload/DownloadId82DC79C01083F6D7925F222B1C7E239E/D732173C-78B5-46FD-BDACE5A94E1EB49C/docket/files/95/7495.pdf, Erişim: 21 Mayıs 2014.
- Lobel Hannah, "Cyber War Inc.: The Law of War Implications of the Private Sector's Role in Cyber Conflict", Texas International Law Journal, Volume 47, Issue 3, s.617-640, 2012.
- Melzer Nils, Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, International Committee of the Red Cross, May 2009, http://www.icrc.org/eng/assets/files/other/icrc-002-0990.pdf, Erişim: 20 Mayıs 2014.
- National Defense Authorization Act for Fiscal Year 2012, One Hundred Twelfth Congress of the United States of America, H. R. 1540, http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS112hr1540enr.pdf, Erişim:22 Mayıs 2014.
- Nicaragua v. USA, Case Concerning the Military and Paramilitary Activities in and against Nicaragua, Merits, Judgement of 27 June 1986, International Court of Justice, http://www.icj-cij.org/D732173C-78B5- 46FD-BDAC-E5A94E1EB49C/FinalDownload/DownloadIdA81FE189F4F8B13301BFD5A1524DE042/D732173C-78B5-46FDBDAC-E5A94E1EB49C/docket/files/70/6503.pdf, Erişim: 21 Mayıs 2014.
- Prosecutor v. Galic, Trial Judgment of ICTY, 5 December 2003, IT-98- 29-T, http://www.icty.org/x/cases/galic/tjug/en/gal-tj031205e.pdf, Erişim: 20 Mayıs 2014.
- Prosecutor v. Haradinaj, Balaj, Brahimaj, Trial Judgement of ICTY, 3 April 2008, IT-04-84-T, http://www.icty.org/x/cases/haradinaj/tjug/en/080403.pdf, Erişim: 21 Mayıs 2014.
- Prosecutor v. Kunarac, Kovac and Vukovic, Judgment, Appeals Chamber, Case No: IT-96-23 & IT-96-23/1-A, 12 June 2002, http://www.icty.org/x/cases/kunarac/acjug/en/kun-aj020612e.pdf, Erişim: 21 Mayıs 2014.
- Prosecutor v. Kupreskic, Trial Judgment of ICTY, 14 January 2000, IT95-16-T, http://www.icty.org/D732173C-78B5-46FD-BDACE5A94E1EB49C/FinalDownload/DownloadId7469B5A933F9D6A001F54482B6B351FD/D732173C-78B5-46FD
- BDAC-E5A94E1EB49C/x/cases/kupreskic/tjug/en/kup-tj000114e.pdf, Erişim: 21 Mayıs 2014.
- Prosecutor v. Rutaganda, Judgment, Appeals Chamber, Case No. ICTR96-3-A, 26 May 2003, http://www.unictr.org/Portals/0/Case/English/Rutaganda/decisions/030526.p df,Erişim:26 Mayıs 2014.
- Prosecutor v. Tadic, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, 2 October 1995, Case No: IT-94-1, http://www.icty.org/x/cases/tadic/acdec/en/51002.htm, Erişim:26 Mayıs 2014.
- Prosecutor v. Tadic, Judgement of 15 July 1999, Appeals Chamber of ICTY, Case No: IT-94-1-A, http://www.icty.org/D732173C-78B5-46FDBDAC-E5A94E1EB49C/FinalDownload/DownloadId52572149B1D62B21E07C313A607D3386/D732173C-78B5-46FD-BDACE5A94E1EB49C/x/cases/tadic/acjug/en/tad-aj990715e.pdf, Erişim:26 Mayıs 2014.
- Richter Chris, "Pre-emptive Self-Defence, International Law and US Policy", Dialogue (2003) 1:2.
- Riley Michael & Robertson Jordan, "Cyberspace Becomes Second Front in Russia's Clash With NATO", Bloomberg, 14.10.2015.
- https://www.bloomberg.com/news/articles/2015-10-14/cyberspacebecomes-second-front-in-russia-s-clash-with-nato, Erişim: 01.04.2017.
- Rome Statute of the International Criminal Court, Document A/CONF.183/9 of 17 July 1998, http://legal.un.org/icc/statute/romefra.htm, Erişim:22 Mayıs 2014.
- Roscini Marco & Trust Leverhulme, Cyber Operations And the Use of Force in International Law. Oxford University Press, 2014.
- Ruus Kertu, "Cyber War I: Estonia Attacked from Russia", European Affairs: Volume number 9, Issue number 1-2, 2008, s.3.
- Sandoz Yves, Swinarski Cristophe & Zimmerman Bruno, Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, International Committee of the Red Cross, Martinus Nijhoff Publishers, Geneva 1987.
- Schaap Arie, "The Development of Cyber Warfare Operations and Analyzing Its Use Under International Law", The Airforce Law Review Cyber Law Edition, USAF, Volume 64, 2009.
- Schmitt Michael, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Research Publication 1, Information Series, June 1999, http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA471993, Erişim: 20.05.2014.
- Schmitt Michael, International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed, Harvard International Law Journal, Online Volume 54, December 2012, s.13-37.
- Schmitt Michael, Tallinn Manuel on the International Law Applicable to Cyber Warfare, Cambridge University Press, New York, 2013.
- Shaw Malcolm, International Law, Cambridge University Press, Sixth Edition, New York 2008.
- Solomon Solon, "The Dynamic Law of Occupation:Inaugurating International Thematic Constitutionalism", Harvard International Law Journal, December 2012, Volume 54
- Solomon Brian, "Hacked Cameras Were Behind Friday's Massive Web Outage", Forbes, 21.10.2016, https://www.forbes.com/sites/briansolomon/2016/10/21/hacked-camerascyber-attack-hacking-ddos-dyn-twitter-netflix/#392d75624fb7 Erişim: 01.04.2017
- Şentürk H., Çil Z., Sağıroğlu Ş., "Siber Güvenliğin Taarruzi Boyutu ve Uluslararası Hukuk Kurallarının Uygulanabilirliği", Bildiriler Kitabı, 6. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, Eylül 2013, Ankara, s.46-52.
- Taşdemir Fatma, Uluslararası Terörizme Karşı Devletlerin Kuvvete Başvurma Yetkisi, USAK Yayınları: 10 Uluslararası Hukuk Serisi:3, Ankara Nisan 2006.
- The Hague Rules of Air Warfare, The Hague, December 1922-February 1923, http://lawofwar.org/hague_rules_of_air_warfare.htm, Erişim: 20 Mayıs 2014.
- Wilmshurst, Elizabeth, "The Chatham House Principles of International Law on the Use of Force in Self-defence." International and Comparative Law Quarterly 55.04 (2006): 963-972.
- Wright Quincy, "When Does War Exist?", American Journal of International Law, Vol. 26, No. 2, April 1932.
- Vandiver John, "Cyberspace: A new front-line fight for NATO", Stars and Stripes, 14.06.2016. https://www.stripes.com/news/cyberspace-a-new-front-linefight-for-nato-1.414601#.WN9m9rdSDIV Erişim: 01.04.2017.
- Yamaner Melike Batur, Öktem Emre, Kurtdarcan Bleda, Uzun Mehmet, "12 Ağustos 1949 tarihli Cenevre Sözleşmeleri ve Ek Protokolleri", Galatasaray Üniversitesi Hukuk Fakültesi Yayınları:42, http://www.icrc.org/eng/home/languages/turkish/files/sozlesmeleriprotokolleri-conventions-protocols.pdf, Erişim: 18 Mayıs 2014.
- Yayla Mehmet, "Hukuki bir Terim Olarak 'Siber Savaş'", TBB Dergisi 2013 (104), s.177-202.
- Yayla Mehmet, "Uluslararası Hukukta Siber Saldırılara Karşı Kuvvet Kullanma", TBB Dergisi 2013 (107).
- Ziolkowkski Katharina, "Ius Ad Bellum in Cyberspace - Some Thoughts on the 'Shmitt Criteria' for Use of Force", 2012 4th International Conference on Cyber Conflict, C. Czosseck, R. Ottis, K. Ziolkowski (Eds.), s.295-310.