DEĞİŞİM VE DÖNÜŞÜMÜN EŞİĞİNDE SİBER SAVAŞ
Yıl 2024,
Cilt: 20 Sayı: 67 - Dijital Çağda Siyaset, 200 - 220, 16.12.2024
Şuay Nilhan Açıkalın
,
Tekin Baykız
Öz
İnsanlık tarihi boyunca tehdit ve savaş kavramları içerik ve kapsam bakımından çok çeşitli
dönüşümler geçirmiştir. Savaş kavramı, her ne kadar güç kavramı üzerinden şekillense de son
yüzyılda savaş ve tehdit araç ve yöntemlerindeki en büyük dönüşüm, teknolojik gelişmelerle ortaya
çıkmıştır. 20. yüzyılın başlarında savaş teknolojileri özellikle konvansiyonel savaş çerçevesinde
şekillenirken, özellikle son 20 yılda dijital devrim, geleneksel savaş alanlarının dışında yeni savaş
alanlarının ortaya çıkmasına neden olmuştur. Bu çalışmada, siber savaşın evrimini analiz etmek
ve vaka çalışması çerçevesinde değerlendirmek amaçlanmıştır. Literatür taramaya dayalı bu
çalışmada doküman analizi yöntemiyle 7 farklı örnek olay incelenmiştir. Yapılan çalışma sonucunda
saldırı araçlarının yıllar içinde farklılaştığı ve karmaşıklaştığı görülmüştür. Buna ek olarak siber
savaşın verdiği zarar da çok boyutluluk göstermiştir. İkinci olarak dijitalleşme, bilgi ve iletişim teknolojilerindeki
muazzam artış, güvenlikçi bir bakış açısıyla bilgi sistemlerine bağımlılık yaratmıştır.
Üçüncü ve son olarak siber saldırılar çeşitlilik göstererek artmış olsa da siber savaş kapsamında
geliştirilen savunma sistemlerinde de ilerleme kaydedilmesini sağlamıştır.
Kaynakça
- Ahronheim, A. (2018a, Mart). After a decade Israel admits: We bombed Syria nuclear reactor in
2007—The Jerusalem Post [Newspaper]. The Jerusalem Post. https://www.jpost.com/
Arab-Israeli-Conflict/After-a-decade-Israel-admits-We-bombed-Syria-nuclear-reactorin-
2007-546573
- Ahronheim, A. (2018b, Mart 21). Liberman: Squabbling over credit for strike on Syrian reactor an
“embarrassment”. The Jerusalem Post | JPost.Com. https://www.jpost.com/israel-news/
liberman-praises-israels-strike-on-syrian-reactor-livni-recalls-events-546640
- Aktaş, M. (2023, Mart 7). Unraveling the Moonlight Maze: The State-Sponsored Cyber Espionage
Campaign that Changed…. Medium. https://medium.com/@mertaktas1283/unravelingthe-
moonlight-maze-the-state-sponsored-cyber-espionage-campaign-that-changed-
1a79e129b358
- Beard, M. (2013). Cyberwar and just war theory. Applied ethics, risk, justice and liberty, 1-12.
Bendovschi, A. (2015). Cyber-Attacks- Trends, Patterns and Security Countermeasures.
Procedia Economics and Finance, 28, 2015, 24-31. https://doi.org/10.1016/S2212-
5671(15)01077-1
- Benis, M. (2023, Ocak). (23) Titan Rain: The 2005 Cyber Attacks on the US Department of Defense
| LinkedIn [Blog]. LinkedIn. https://www.linkedin.com/pulse/titan-rain-2005-cyberattacks-
us-department-defense-michael-benis/
- Biernacik, B. (2018). The Fifth Dimension of War–Cyberspace. How to Secure This Area: The
Approach of Selected States and International Organizations to Cybersecurity. Zeszyty
Naukowe Wyższej Szkoły Bankowej w Poznaniu, 83(6), 2018, 63-84.
- Bodmer, S. (2012). Reverse deception: Organized cyber threat counter-exploitation. McGraw-Hill.
Boichak, O. (2021). Digital War: Mediatized Conflicts in Sociological Perspective. in The Oxford
Handbook of Digital Media Sociology. (Ed.) Deana A. R., Sarah S.
- Carr, J. (2012). Inside cyber warfare (2nd ed). O’Reilly.
- CFR. (2019). Tracking State-Sponsored Cyberattacks Around the World. Council on Foreign
Relations. https://www.cfr.org/cyber-operations
- Chinnaraj, S. (2024, Şubat). (22) The Infamous “I Love You” Virus: A Cybersecurity Milestone |
LinkedIn [Blog]. Linkedin. https://www.linkedin.com/pulse/infamous-i-love-you-viruscybersecurity-
milestone-chinnaraj-tbzfc/
- Choucri, N. (2012). Cyberpolitics in International Relations. The MIT Press. https://doi.
org/10.7551/mitpress/7736.001.0001
- Clements, R. (2012, Eylül 10). New details of Israel’s 2007 attack on the Syrian Nuclear reactor
emerge. The Aviationist. https://theaviationist.com/2012/09/10/op-orchard/
- Collins, S., McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its
implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 2012, 80-91.
https://doi.org/10.1080/18335330.2012.653198
- Cyware Labs. (t.y.). Remembering Operation Titan Rain—Titan Rain Cyber Attack. Cyware Labs.
Geliş tarihi 12 Eylül 2024, gönderen https://cyware.com/news/remembering-operationtitan-
rain-c54ad3e4
- Czosseck, C., Ottis, R., Talihärm, A.-M. (2011). Estonia after the 2007 Cyber Attacks: Legal,
Strategic and Organisational Changes in Cyber Security. International Journal of Cyber
Warfare and Terrorism, 1(1), 2011, 24-34. https://doi.org/10.4018/ijcwt.2011010103
- Çelik, Ş. (2013). Stuxnet Saldırısı ve ABD’nin Siber Savaş Stratejisi: Uluslararası Hukukta Kuvvet
Kullanmaktan Kaçınma İlkesi Çerçevesinde Bir Değerlendirme. Dokuz Eylul University Law
Review, 15(1), 2013, Article 1.
- Davis, J. (2007, Ağustos 21). Hackers Take Down the Most Wired Country in Europe | WIRED
[Newspaper]. The Wired. https://www.wired.com/2007/08/ff-estonia/
- Doman, C. (2018, Ocak 22). The First Sophistiated Cyber Attacks: How Operation Moonlight
Maze made history. Medium. https://medium.com/@chris_doman/the-first-sophistiatedcyber-
attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7
Farwell, J. P., Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), 2011,
23-40. https://doi.org/10.1080/00396338.2011.555586
- FBI. (2014, Aralık 19). Update on Sony Investigation—FBI [Press Release]. https://www.fbi.gov/
news/press-releases/update-on-sony-investigation
- Gasparre, R. (2008, Mart 10). The Israeli “E-tack” on Syria – Part II - Airforce Technology.
Airforce Technology. https://www.airforce-technology.com/features/feature1669/
- Grant, P. (2024, Nisan 15). Moonlight Maze: Russian Espionage, Hacking, and Cyber Warfare in
the Lead-Up to the 2016 Election. Medium. https://medium.com/@petergrant_14485/
moonlight-maze-russian-espionage-hacking-and-cyber-warfare-in-the-lead-up-to-the-
2016-election-a8fdbee51309
- Griffin, A. (2017, Haziran 27). Chernobyl’s radiation monitoring system has been hit by
the worldwide cyber attack. The Independent. https://www.independent.co.uk/
tech/chernobyl-ukraine-petya-cyber-attack-hack-nuclear-power-plant-dangerlatest-
a7810941.html
- Gross, J. A. (2018, Mart 21). Ending a decade of silence, Israel confirms it blew up Assad’s nuclear
reactor [Newspaper]. Times of Israel. https://www.timesofisrael.com/ending-a-decadeof-
silence-israel-reveals-it-blew-up-assads-nuclear-reactor/
- Güntay, V. (2017). Uluslararasi Sistem ve Güvenlik Açisindan Değişen Savaş Kurgusu; Siber
Savaş Örneği. Güvenlik Bilimleri Dergisi, 6(2), 2017, 81-108.
- Holat, O. (2021). Yeni medya ve siber savaş kavramları bağlamında Stuxnet saldırısı örneğinin
incelenmesi. Abant Kültürel Araştırmalar Dergisi, 6(11), 2021, 105-121.
- Kaspersky Securelist, A. (t.y.). Moonlight Maze is a historic cyberespionage campaign [Logbook].
APT Kaspersky Securelist. Geliş tarihi 14 Eylül 2024, gönderen https://apt.securelist.com/
apt/moonlight-maze
- Keskin, Ş. (2017). Realizm ve Liberalizm Işığında Siber Savaş ve Alternatif Bir Kavram Olarak
Siber Barış’ın Değerlendirilmesi. TURAN-SAM, 9(35), 2017, 287-297.
- Krajnyk, R. (2024, Mart 10). # 1 - The World’s Worst Computer Virus: The I Love You Virus - ZOO
Repairs x [Blog]. Zoo Computer Repairs. https://www.zoorepairs.com.au/worlds-worstcomputer-
virus/
- Lachow, I. (2011). The Stuxnet Enigma: Implications for the Future of Cybersecurity.
Georgetown Journal of International Affairs, 118-126.
- Landler, M., & Markoff, J. (2007, Mayıs 29). Digital Fears Emerge After Data Siege in Estonia.
- The New York Times. https://www.nytimes.com/2007/05/29/technology/29estonia.html
- Laughland, O., Rushe, D. (2014, Aralık 19). Sony cyber attack linked to North Korean
government hackers, FBI says. The Guardian. https://www.theguardian.com/usnews/
2014/dec/19/north-korea-responsible-sony-hack-us-official
- Li, S. (2023, Eylül 27). How to Prevent Email-Borne Malware: Lessons from I-LOVE-YOU Virus.
Cybersecurity Solutions | Email & Network Security. https://abusix.com/blog/emailsecurity/
how-to-prevent-email-borne-malware-lessons-from-i-love-you-virus/
- Makovsky, D. (2012, Eylül 10). The Silent Strike | The New Yorker [Newspaper]. The New Yorker.
https://www.newyorker.com/magazine/2012/09/17/the-silent-strike
- Nakashima, E. (2016, Haziran 14). Russian government hackers penetrated DNC, stole
opposition research on Trump. Washington Post. https://www.washingtonpost.com/
world/national-security/russian-government-hackers-penetrated-dnc-stole-oppositionresearch-
on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html
- Proofpoint. (2023, Temmuz 10). What Is Privilege Escalation? - Definition, Types, Examples | Proofpoint
US. Proofpoint. https://www.proofpoint.com/us/threat-reference/privilege-escalation
- Ranger, S. (2018, Aralık 4). What is cyberwar? Everything you need to know about the frightening
future of digital conflict | ZDNET. ZDnet. https://www.zdnet.com/article/cyberwar-aguide-
to-the-frightening-future-of-online-conflict/
- Rid, T. (2016, Ekim 20). How Russia Pulled Off the Biggest Election Hack in U.S. History. Esquire.
https://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/
- Roberts, D., Jacobs, B., Yuhas, A. (2016, Temmuz 25). Debbie Wasserman Schultz to resign as
DNC chair as email scandal rocks Democrats. The Guardian. https://www.theguardian.
- com/us-news/2016/jul/24/debbie-wasserman-schultz-resigns-dnc-chair-emails-sanders
Robinson, M., Jones, K., Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers &
Security, (49), 2015, 70-94. https://doi.org/10.1016/j.cose.2014.11.007
- Schwarz, E. (2024, Şubat 12). Unraveling the I Love You Computer Virus on Valentine’s Day—
TriLeafTech. https://trileaftech.com/i-love-you-virus-cybersecurity-lessons/
- Segal, A. (2017). The hacked world order: How nations fight, trade, maneuver, and manipulate in
the digital age (Second edition). PublicAffairs.
- Shakarian, P., Shakarian, J., Ruef, A. (2013). Introduction to cyber-warfare: a multidisciplinary
approach. Amsterdam: Morgan Kaufmann Publishers – Elsevier. s. 2.
- Stark, H. (2009, Kasım 2). The Story of “Operation Orchard”: How Israel Destroyed Syria’s Al
Kibar Nuclear Reactor—DER SPIEGEL [Newspaper]. Der Spiegel. https://www.spiegel.de/
international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-alkibar-
nuclear-reactor-a-658663.html
- The UK National Cyber Security Centre. (2018, Ekim 4). UK exposes Russian cyber attacks. GOV.
UK. https://www.gov.uk/government/news/uk-exposes-russian-cyber-attacks
- The White House. (2016, Aralık 29). Statement by the President on Actions in Response to Russian
Malicious Cyber Activity and Harassment. Whitehouse.Gov. https://obamawhitehouse.
archives.gov/the-press-office/2016/12/29/statement-president-actions-responserussian-
malicious-cyber-activity
- Thornburgh, N. (2005, Ağustos 29). The Invasion of the Chinese Cyberspies. TIME. https://time.
com/archive/6674509/the-invasion-of-the-chinese-cyberspies/
- Traynor, I. (2007, Mayıs 17). Russia accused of unleashing cyberwar to disable Estonia. The
Guardian. https://www.theguardian.com/world/2007/may/17/topstories3.russia
- Vaishnav, C., Choucri, N., Clark, D. (2013). Cyber international relations as an integrated
system. Environment Systems and Decisions, 33(4), 2015, 561-576. https://doi.
org/10.1007/s10669-013-9480-3
- Yayla, M. (2013). Hukuki bir terim olarak siber savaş. Türkiye Barolar Birliği Dergisi, 104, 2013,
177-202.
- Walker, C. (2017, Temmuz 18). Red Alert: Russian Hackers Hit Colorado in “Moonlight Maze”
Invasion. Westword. https://www.westword.com/news/russian-cyberattacks-invadedcolorado-
in-moonlight-maze-campaign-9269380
- Weinberger, S. (2007, Ekim 4). How Israel Spoofed Syria’s Air Defense System. Wired. https://
www.wired.com/2007/10/how-israel-spoo/
- Wikileaks. (2016). WikiLeaks—The Podesta Emails [Wiki]. Wikileaks. https://www.wikileaks.org/
podesta-emails/
- Zetter, K. (2017, Nisan 4). New Evidence Links a 20-Year-Old Hack on the US Government to a
Modern Attack Group. VICE. https://www.vice.com/en/article/moonlight-maze-turla-link/