Terörizm ve Siber Uzay

Author :  

Year-Number: 2022-102
Yayımlanma Tarihi: 2022-09-30 22:16:19.0
Language : Türkçe
Konu : Uluslararası İlişkiler
Number of pages: 3100-3112
Mendeley EndNote Alıntı Yap

Abstract

Bu çalışma terörizmin siber uzayda ne amaçla ne oranda ve nasıl faaliyet gösterdiğini ortaya koymayı amaçlamaktadır. Bu amaçla yapılan araştırmadaki motivasyon, terörizm ile internet ve siber uzay arasındaki ilişkinin güncel mevcut durumunun tespitiyle hem kavramsal hem de politik çalışmalara bir alt yapı oluşturma hedefimizdir. Çalışmanın hipotezi, terörizmin her geçen zaman siber uzayda varlığını ve etkinliğini artırdığıdır. Hipotez testinde kullanılan yöntem olarak literatür taraması ve örnek olayların analizi yoluyla bilimsel verilerden faydalanılmıştır. Bu konuda alanda kaleme alınmış yerli literatürün ötesinde yabancı literatür de incelenmiştir. Zira bu konudaki güncel literatür ağırlıklı olarak İngilizcedir. Hipotez testinde aynı zamanda sayısal ve oransal veriler de kullanılarak veri çeşitliliğinin ve objektifliğinin ortaya konulmasına çalışılmıştır. Araştırma neticesinde terörizmin siber uzayı her geçen gün daha fazla oranda ve yoğunlukta kullanıldığı anlaşılmıştır. Terörizmin günümüzde siber uzayı, haklı gördükleri davalarının propagandasını yapmak, örgüt içi iletişim kurmak, örgüte yeni üye kazanmak, eylemler gerçekleştirmek için bilgi ve istihbarat toplamak ve paylaşmak, örgüt içi eğitim vermek hem eylemsel hem de örgütsel planlama yapmak ve örgüt içi koordinasyonu sağlamak, eylemlerin ve örgütün finansmanını sağlamak amaçları ile kullandığı sonuçlarına ulaşılmıştır.

Keywords

Abstract

This study aims to reveal how and for what purpose terrorism operates in cyberspace. The motivation in the research conducted for this purpose is to establish an infrastructure for both conceptual and political studies by determining the current state of the relationship between terrorism and internet and cyberspace. The hypothesis of the study is that terrorism increases its presence and effectiveness in cyberspace with each passing day. As the method used in hypothesis testing, scientific data was used through literature review and analysis of case studies. In addition to the domestic literature on this subject, foreign literature has also been examined. Because the current literature on this subject is mainly in English. In the hypothesis test, numerical and proportional data were also used to reveal the diversity and objectivity of the data. As a result of the research, it has been understood that terrorism uses cyberspace more and more every day. Today, cyberspace of terrorism is used to propagate the cases they deem justified, to communicate within the organization, to recruit new members to the organization, to gather and share information and intelligence to carry out actions, to provide in-organization training, to make both operational and organizational planning and to ensure intra-organizational coordination. It has been reached the results that the organization uses it for the purpose of financing.

Keywords


  • 1. Al-Bayati, T. H., (2017), A New Counterterrorism Strategy: A New Counterterrorism Strategy: Why the World Failed to Stop Al Qaeda and ISIS/ISIL, and How to Defeat Terrorists, CA, USA, ABC-CLIO.

  • 2. Amidror, Y., (2008), The Internet and Terrorism, Gal, C. S. - Kantor, P. B. - Shapira, B., (eds.), Security Informatics and Terrorism: Patrolling the Web, Amsterdam, The Netherlands, IOS Press.

  • 3. Anderson, A., (2004), Risk, Terrorism, and the Internet, Clarke, D., (ed.), Technology and Terrorism, USA, Transaction Publishers.

  • 4. Anderson, R. A., (2020), Online Utilization for Terrorist Self-Radcalization Purposes, Vacca, J. R., (ed.), Online Terrorist Propaganda, Recruitment, and Radicalization, NY, USA, CRC Press.

  • 5. Atkins, S. E., (2004), Encyclopedia of Modern Worldwide Extremists and Extremist Groups, Westport, USA, Greenwood Publishing.

  • 6. Atwan, A. B., (2015), Islamic State: The Digital Caliphate, CA, USA, Univercity of California Press.

  • 7. Baldi, S. - Gelbstein, E. - Kurbalija, J., (2003), Hacktivism, Cyber-terrorism and Cyberwar: The Activities of the Uncivil Society in Cyberspace, Switzerland, Diplo Foundation.

  • 8. Barrett, R., (2012), The Use of the Internet for Terrorist Purposes, NY, USA, United Nations Office on Drugs and Crime in Collaboration with the United Nations Counter-Terrorism Implementation Task Force Publishing and Library Section.

  • 9. Belausteguigoitia, M., (2016), On Line, Off Line and In Line: The Zapatista Rebellion and the Uses of Technology by Indian Women, Landzelius, K., (ed.), Native on the Net: Indigenous and Diasporic Peoples in the Virtual Age, London, UK, Routledge.

  • 10. Bennett, B. T., (2007), Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel, New Jersey, USA, John Wiley & Sons.

  • 11. Bocij, P., (2006), The Dark Side of the Internet, Westport, CT, USA, Praeger Publishers.

  • 12. Bockstette, C., (2008), Jihadist Terrorist Use of Strategic Communication Management Techniques, Germany, DIANE Publishing.

  • 13. Boletsi, M., (2013), Barbarism and Its Discontents, CA, USA, Stanford University Press.

  • 14. Bowman-Grieve, L., (2011), The Internet and Terrorism: Pathways towards Terrorism and Counter-Terrorism, Silke, A., (ed.), The Psychology of Counter-Terrorism, London, UK, Routledge.

  • 15. Carruthers, S. L., (1996), Reporting Terrorism: The British State and the Media, 1919-94, Stewart, I. - Carruthers, S. L., (eds.), War, Culture, and the Media: Representations of the Military in 20th Century Britian, England, Fairleigh Dickinson University Press.

  • 17. Chen, H., (2012), Dark Web: Exploring and Data Mining the Dark Side of the Web, NY, USA, Springer Science & Business Media.

  • 18. Cohen-Almagor, R., (2017), Jihad Online: How do Terrorists Use the Internet?, Freire, F. C., et al., (eds.), Media and Metamedia Management, Switzerland, Springer.

  • 19. Combs, C. C., (2006), The Media as a Showcase for Terrorism, Forest, J. J. F., (ed.), Teaching Terror: Strategic and Tactical Learning in the Terrorist World, NY, USA, Rowman & Littlefield Publishers.

  • 20. Conway, M., (2004), Cyberterrorism: Media Myth or Clear and Present Danger?, Irwin, J., (ed.), War and Virtual War: The Challenges to Communities, Amsterdam, The Netherlands, Rodopi.

  • 21. Conway, M., (2006), “Terrorism and the Internet: New Media—New Threat?”, Parliamentary Affairs, Volume 59, Issue 2, April 2006, ss. 283–298.

  • 22. Cottee, S., (2019), ISIS and the Pornography of Violence, London, UK, Anthem Press.

  • 23. Cruickshank, P., (2014), The 2006 Airline Plot, Hoffman, B. - Reinares, F., (eds.), The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden's Death, NY, USA, Columbia University Press.

  • 24. Darling, D., (2016), Perspectives on the Insurgency, Steed, B. L., (ed.), Voices of the Iraq War: Contemporary Accounts of Daily Life: Contemporary Accounts od Daily Life, CA, USA, ABC-CLIO.

  • 25. Denning, D. E., (2010), Terror’s Web: How the Internet is Transforming Terrorism, Jewkes, Y. - Yar, M., (eds.), Handbook of Internet Crime, NY, USA, Routledge.

  • 26. Denning, D. E., “Whither Cyber Terror?”, http://essays.ssrc.org/10yearsafter911/whither-cyber-terror/, (24.01.2016).

  • 27. Don, B. W., et al., (2007), Network Technologies for Networked Terrorists, CA, USA, Rand Corporation.

  • 28. Dyson, W. E., (2015), Terrorism: An Investigator's Handbook, Fourth Edition, London, UK, Routledge.

  • 29. Edwards, J. A., (2019), The Myth of the Caliph: Suffering and Redemption in the Rhetoric os ISIS, Krona, M. - Pennington, R., (eds.), The Media World of ISIS, Indiana, USA, Indiana University Press.

  • 30. Fawdah, Y. - Fouda, Y. - Fielding, N., (2003), Masterminds of Terror: The Truth Behind the Most Devastating Terrorist Attack The World has ever Seen, NY, USA, Arcade Publishing.

  • 31. Fedotov, Y., “The Use of the Internet for Terrorist Purposes”, United Nations, September 2012, https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf, (28.01.2019).

  • 32. Forest, J. J. F., (2009), Knowledge Transfer and Shared Learning among Armed Groups, Norwitz, J. H., (ed.), Pirates, Terrorists, and Warlords: The History, Influence, and Future ofArmed Groups Around the World, NY, USA, Skyhorse Publishing Inc.

  • 33. Freeman, M., (2016), Sources of Terrorist Financing: Theory and Typology, Freeman, M., (ed.), Financing Terrorism: Case Studies, NY, USA, Routledge.

  • 34. Freiburger, T. - Crane, J. S., (2011), The Internet as a Terrorist’s Tool: A Social Learning Perspective, Jaishankar, K., (ed.), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, NY, USA, CRC Press.

  • 35. Gendron, A., (2016), The Call to Jihad:Charismatic Preachers adn the Internet, Aly, A., et al., (eds.), Violent Extremism Online: New Perspectives on Terrorism and the Internet, London, UK, Routledge.

  • 36. Gill, P., (2015), Lone-Actor Terrorists: A Behavioural Analysis, London, UK, Routledge.

  • 37. Goodman, M., (2015), Future Crimes, London, Great Britain, Penguin Random House.

  • 38. Gunaratna, R. (2017), “Global Threat Forecast”, Counter Terrorist Trends and Analyses, January 2017, Volume 9, Issue 1, ss. 1-79.

  • 39. Hansen, S. J., (2013), Al-Shabaab in Somalia: The History and Ideology of a Militant Islamist Group, 2005- 2012, NY, USA, Oxford University Press.

  • 40. Hardcastle, D. A., (2011), Community Practice: Theories and Skills for Social Workers, Third Editon, Oxford, UK, Oxford University Press.

  • 41. Hesterman, J. L., (2013), The Terrorist-Criminal Nexus: An Alliance of International Drug Cartels Organized Crime, and Terror Groups, USA, CRC Press.

  • 42. Hill, J. B. - Marion, N. E., (2016), Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century, CA, USA, ABC-CLIO.

  • 43. Hoffman, B., (2006), “The Use of the Interent by Islamic Extremists”, ss. 1-23, http://www.rand.org/content/dam/rand/pubs/testimonies/2006/RAND_CT262-1.pdf, (23.07.2019).

  • 44. Hoffman, B., (2006), Inside Terrorism, NY, USA, Columbia University Press.

  • 45. Jarmon, J. A. - Yannakogeorgos, P., (2018), The Cyber Threat and Globalization: The Impact on U.S. National and International Security, Maryland, USA, Rowman & Littlefield.

  • 46. Johnson, T. A., (2008), The War on Terrorism: A Collision of Values, Strategies, and Societies, NY, USA, CRC Press.

  • 47. Jones, S. G., (2014), Al-Qaeda Terrorism in Afghanistan, Bruce Hoffman - Fernando Reinares, (eds.), The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden's Death, NY, USA, Columbia University Press.

  • 48. Kello, L., (2017), The Virtual Weapon and International Order, USA, Yale University Press.

  • 49. Kramer, F. D. - Wentz, L. K., (2008), Cyber Influence and International Security, Washington D.C., USA,

  • 50. Krovel, R., (2016), Insurgency in the Age of the Internet: The Case of the Zapatistas, Fahlenbrach, K. - Sivertsen, E. - Werenskjold, R., (eds.), Media and Revolt: Strategies and Performances from the 1960s to the Present, Oxford, UK, Berghahn Books.

  • 51. Lachow, I., “Cyber Terrorism: Menace or Myth?”, http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap- 19.pdf, (26.02.2019).

  • 52. Lewis, J. A., (2002), “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats”, Center for Strategic and International Studies, December 2002, pp. 1-12.

  • 53. Macklin, G., “The Christchurch Attacks: Livestream Terror in the Viral Video Age”, July 2019, https://ctc.usma.edu/christchurch-attacks-livestream-terror-viral-video-age/, (14.10.2019).

  • 54. Mair, D., (2016), #Westgate: A Case Study – How al- Shabaab used Twitter During an ongoing Attack, Aly, A., et al., (eds.), Violent Extremism Online: New Perspectives on Terrorism and the Internet, NY, USA, Routledge.

  • 55. Mantel, B. (2010), Terrorism and the Internet: Should Web Sites That Promote Terrorism Be Shut Down?, Jost, K., et al., (eds.), Issues in Terrorism and Homeland Security: Selections From CQ Researcher, Second Edition, California, USA, SAGE.

  • 56. Mantel, B., (2009), “Terrorism and the Internet”, CQ Resarcher, November 2009, Volume 3, Issue 11, ss. 129- 153.

  • 57. Miller, A. - Stivachtis, Y. A., (2020), Public-Private Partnerships and the Private Sector’s Role in Countering the Use of the Internet for Terrorist Purposes, Vacca, J. R., (ed.), Online Terrorist Propaganda, Recruitment, and Radicalization, USA, CRC Press.

  • 58. Moghadam, A., (2008), The Globalization of Martyrdom: Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks, Baltimore, USA, Johns Hopkins University Press.

  • 59. Mogire, E., (2011), Victims as Security Threats: Refugee Impact on Host State Security in Africa, Farnham, UK, Ashgate Publishing.

  • 60. Nail, T., (2012), Returning to Revolution, Edinburg, UK, Edinburg University Press.

  • 61. OECD, “Money Laundering and Terrorist Financing Awareness Handbook for Tax Examiners and Tax Auditors”, https://www.oecd.org/tax/crime/money-laundering-and-terroristfinancing-awareness-handbook-fortax-examiners-and-tax-auditors.pdf, (18.12.2019).

  • 62. Pitman, T., (2013), Latin American Cyberprotest: Before and After the Zapatistas, Taylor, C. - Pitman, T., (eds.), Latin American Cyberculture and Cyberliterature, Liverpol, UK, Liverpool University Press.

  • 63. Ploch, L., (2010), Countering Terrorism in East Africa: The U. S. Response, Wshington, D.C., USA, DIANE Publishing.

  • 64. PoKempner, D., (2017), The Internet is Not the Enemy, Human Rights Watch, World Report 2017: Events of 2016, USA, Seven Stories Press.

  • 65. Prince, J., (2016), Psychological Aspects of Cyber Hate and Cyber Terrorism, Awan, I. - Blakemore, B., (eds.), Policing Cyber Hate, Cyber Threats and Cyber Terrorism, NY, USA, Routledge.

  • 66. Ramsay, G., (2013), Jihadi Culture on the World Wide Web, USA, Bloomsbury Publishing.

  • 67. Reilly, P., (2006), Civil Society, the Internet and Terrorism, Oates, S. - Owen, D. - Gibson, R. K., (eds.), The Internet and Politics: Citizens, Voters and Activists, NY, USA, Routledge.

  • 68. Ronfeldt, D., et al., (1998), The Zapatista ‘Social Netwar’ in Mexico, CA, USA, RAND.

  • 69. Royce, E. R., (2015), The Evolution of Terrorist Propaganda: The Paris Attack and Social Media, Washington, USA, U.S. Government Publishing Office.

  • 70. Rustad, M. - Daftary, C., (2002), E-business Legal Handbook, USA, Aspen Law & Business.

  • 71. Ryder, N., (2015), The Financial War on Terrorism: A Review of Counter-Terrorist Financing Strategies since 2001, NY, USA, Routledge.

  • 72. Sageman, M., (2004), Understanding Terror Networks, USA, University of Pennsylvania Press.

  • 73. Schmid, A. P. - Graaf, J., (1982), Violance as Communication: Insurgent Terrorism and the Western News Media, Beverly Hills, CA, USA, SAGE.

  • 74. Silke, A., (2010), The Internet&Terrorist Radicalisation: The Psychological Dimension, Dienel, H. L., (ed.), Terrorism and the Internet: Threats, Target Groups, Deradicalisation Strategies, Amsterdam, Netherlands, IOS

  • 75. Singer, P. W. - Friedman, A., (2014), Cybersecurity: What Everyone Needs to Know, NY, USA, Oxford

  • 76. Smith, J. M. - Alarid, M., (2020), Terrorism Recruitment and Radicalization into 21st Century, Vacca, J. R., (ed.), Online Terrorist Propaganda, Recruitment, and Radicalization, NY, USA, CRC Press.

  • 77. Smith, P. J., (2015), The Terrorism Ahead: Confronting Transnational Violence in the Twenty-First, NY, USA, Routledge.

  • 78. Smith, R., (2014), CyberCrime - A Clear and Present Danger The CEO's Guide to Cyber Security, USA, Lulu.

  • 79. Spaaij, R., (2012), Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention, London, UK, Springer Science & Business Media.

  • 80. Stacey, E., (2017), Combating Internet-Enabled Terrorism: Emerging Research and Opportunities, PA, USA, IGI Global.

  • 81. Statista, “Richest terrorist organizations worldwide in 2017 (in million U.S. dollars)”, https://www.statista.com/statistics/950492/richest-terrorist-organizations-worldwide/, (28. 06 .2019).

  • 82. The National Consortium for the Study of Terrorism and Responses to Terrorism (START), “Global Terrorism Index 2018: Measuring the Impact of Terrorism”, http://visionofhumanity.org/app/uploads/2018/12/Global-Terrorism-Index-2018-1.pdf, (03.11.2019).

  • 83. United Nations Offıce on Drugs and Crime, “The Use Of The Internet For Terrorıst Purposes”, https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf, (17.02.2019).

  • 84. Virkar, S., (2016), The Miror Has Two Faces: The terroist use of the Internet and Challenges of Governing Cyberspace, Silva, E., (ed.), National Security and Counterintelligence in the Era of Cyber Espionage, USA,

  • 85. Weimann, G., (2004), Www.terror.net: How Modern Terrorism Uses the Internet, Washington, USA, DIANE

  • 86. Weimann, G., (2006), Terror on the Internet: The New Arena, the New Challenges, Washington, D.C., USA, US Institute of Peace Press.

  • 87. Weimann, G., (2010), Terrorist Facebook: Terrorists and Online Social Networking, Last, M. - Kandel, A., (eds.), Web Intelligence and Security, Amsterdam, Netherlands, IOS Press.

  • 88. Weimann, G., (2014), “New Terrorism and New Media”, Commons Lab of the Woodrow Wilson International Center for Scholars, 2014, Volume 2, ss. 1-20.

  • 89. Weimann, G., “Terror on the Internet – The New Arena, the New Challenges”, The Washington Times, May 22, 2006, http://www.washingtontimes.com/news/2006/may/22/20060522-101437-1668r/, (08.02.2019).

  • 90. Weiss, M. - Hassan, H., (2016), ISIS: Inside the Army of Terror, Updated Edition, NY, USA, Regan Arts.

  • 92. Williams, H. J. - Chandler, N. - Robinson, E., (2018), Trends in the Draw of Americans to Foreign Terrorist Organizations from 9/11 to Today, CA, USA, Rand Corporation.

  • 93. Williams, P., (2007), Warning Indicators and Terrorist Finances, Giraldo, J. K. - Trinkunas, H. A., (eds.), Terrorism Financing and State Responses: A Comparative Perspective, CA, USA, Stanford University Press.

  • 94. Wilson, C., (2008), “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress”, Congressional Research Service (CRS) Report for Congress, January 29, 2008, ss. 1-43.

  • 95. Yannakogeorgos, P .A., (2014), Rethinking the Threat of Cyberterrorism, Chen, T. M. - Jarvis, L. - Macdonald, S., (eds.), Cyberterrorism: Understanding, Assessment, and Response, NY, USA, Springer.

                                                                                                                                                                                                        
  • Article Statistics