Yıl: 2021 Cilt: 0 Sayı: 46 Sayfa Aralığı: 163 - 179 Metin Dili: Türkçe DOI: 10.30794/pausbed.874414 İndeks Tarihi: 29-07-2022

TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI

Öz:
Terörizm tecrübe edilen dönemin en önemli güvenlik meselelerinden birini oluşturmaktadır. İnsani, ulusal, bölgesel veuluslararası düzeylerde ciddi bir tehdit olarak terörizmle ve imkân ve kabiliyetleri olağandışı bir gelişme gösteren terörörgütleriyle mücadele de bu bağlamda ciddi bir sorun olarak öne çıkmaktadır. Bu çalışmada açık kaynak istihbaratının terörlemücadele içindeki rolü ele alınmaktadır. İstihbaratta toplamada başvurulan pek çok yöntem ve teknik bulunmaktadır. Açıkkaynak istihbaratını özel kılan ise toplama faaliyetlerinde maliyet, erişilebilirlik, yasallık ve risk gibi kıstaslardaki avantajıdır.Terör örgütlerine karşı yürütülen mücadelede açık kaynaklardan toplananlar, istihbarat çarkına işlerlik kazandıran önemligirdilerdir. Çalışmada öncelikle istihbaratta toplama ve açık kaynak istihbaratı üzerine geniş bir çerçeve çizilecektir. Böylecebu konuda yapılacak araştırmalar için Türkçe literatüre mütevazı bir katkı sunulması planlamaktadır. İkinci bölümde iseterörle mücadele kapsamında istihbaratın rolü ve toplama faaliyetlerinde açık kaynak analizinin önemi ortaya konulmayaçalışılacaktır. Burada terör örgütleri ve faaliyetleriyle ilgili nelerin, nasıl ve ne ölçüde toplanılabildiği ifade edilecektir. Buradakaranlık internet konusunu da vurgu yapılacaktır. Çalışma, terörle mücadele-açık kaynak istihbaratı ilişkisinin yer aldığı birlisteleme ve değerlendirme ile sona erecektir.
Anahtar Kelime:

APPLICATION TO INTELLIGENCE IN COUNTERTTERORISM:THE USE OF OPEN SOURCE INTELLIGENCE

Öz:
Terrorism constitutes one of the most important security issues of the period experienced. The fight against terrorism as a serious threat at humanitarian, national, regional and international levels, and against terrorist organizations, whose capabilities and capabilities have shown an unusual development, also stands out as a serious problem in this context. This study examines the role of open source intelligence in the fight against terrorism. There are many methods and techniques used in intelligence gathering. What makes open source intelligence special is its advantage in terms of cost, accessibility, legality and risk in collection activities. In the fight against terrorist organizations, those gathered from open sources are important inputs that make the intelligence circle operational. In the study, first of all, a broad framework will be drawn on intelligence gathering and open source intelligence. Thus, it is planned to make a modest contribution to the Turkish literature on this subject. In the second part, the role of intelligence in counterterrorism applications and the importance of open source analysis in collection activities will be tried to be revealed. Here, what, how and to what extent can be gathered regarding terrorist organizations and their activities will be expressed. The issue of dark internet will also be emphasized here. The study will end with a listing and evaluation of the counterterrorism-open source intelligence relationship.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • Acar, Ü. (2011). İstihbarat, Akçağ, Ankara.
  • Ackerman, G. ve Burnham, M. (2019). “Towards A Definition of Terrorist Ideology”, Terrorism and Political Violance, 1-30.
  • Amble, J. C. (2014). “Jihad Online: What Militant Groups Say About Themselves and What It Means for the Counterterrorism Strategy”, Open Source Intelligence in the Twenty-First Century: New Approaches and Oppurtunities (Ed: C. Hobbes, M. Moran ve D. Salisbury), Palgrave Macmillian, Londra, 168-184.
  • Bellaby, R. (2012). “What’s the Harm? The Ethics of Intelligence Collection”, Intelligence and National Security, 27/1, 93-117.
  • Benes, L. (2013). “OSINT, New Technologies, Education: Expanding Opportunities and Threats- A New Paradigm”, Journal of Strategic Security, 6/3, 22-37.
  • Bimfort, M. T. (1958). “A Definition of Intelligence”, Studies in Intelligence, 2, 73-78.
  • Bolz, F., Dudonis, K. J. ve Schulz, D. P. (2002). The Counterterrorism Handbook: Tactics, Procedures, and Techiques, CRC Press, Boca Raton.
  • Breakspear, A. (2013). “A New Definition of Intelligence”, Intelligence and National Security, 28/5, 678-693.
  • Brown, K. E. ve Pearson, E. (2019). “Social Media, Online Environment and Terrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 149-164.
  • Bury, P. ve Chertoff, M. (2020). “New Intelligence Strategies for a New Decade”, The RUSI Journal, 165/4, 42-53.
  • Cammaert, P. C. (2003). “Intelligence in Peacekeeping Operations: Lessons for the Future”, Peacekeeping Intelligence: Emerging Concepts for the Future (Ed: B., de Jong; W. Platje, ve R. D. Steele), OSS International Press, Oakton, 11-30.
  • Carment, D., Rudner, M. ve Heide, R. L. (2006). “Peacekeeping Intelligence: Extending Partnership and Boundaries for Peacekeeping”, Peace Keeping Intelligence: New Players, Extended Boundaries (Ed: D. Carment ve R. Martin), Routledge, New York, 1-14.
  • Chen, H. (2011). “From Terrorism Informatics to Dark Web Reaserch”, Counterrorism and Open Source Intelligence (Ed:U. K. Wiil), Viyana: Springer, 316-341.
  • Clark, J. R. (2007). Intelligence and National Security: A Reference Handbook, Praeger, Westport.
  • Cormac, R. (2013). “Much Do About Nothing: Terrorism, Intelligence and the Mechanics of Threat Exaggeration”, Terrorism and Political Violance, 25/3, 476-493.
  • Crelinsten, R. (2019). “Conceptualising Counterterrorism”, Routledge Handbook of Terrorism and Counterterrosim (Ed: A. Silke), Routledge, Londra, 363-374.
  • Draeger, W. R. (2009). “Take Advantage of OSINT”, Military Intelligence Professional Bulletin, 35/3, 39-44.
  • Drake, C. J. M. (1998). Terrorist’s Target Selection, St. Martin’s Press, New York
  • Eijkman, Q. A. M. ve Weggemans, D. (2013). “Open Source Intelligence and Privacy Dilemmas: Is It Time to Reassess State Accountability”, Security and Human Rights, 23/4, 285-296.
  • Eldridge, E., Hobbs, C. ve Moran, M. (2018). “Fusing Algorithms and Analysts: Open-source Intelligence in the Age of ‘Big Data’”, Intelligence and National Security, 33/3, 391-406.
  • Farson, S. (1989). “Schools of Thought: National Perceptions of Intelligence”, Conflict Quarterly, 9/2, 52-104.
  • Ganor, B. (2020). “Is One Man’s Terrorist Another Man’s Freedom Fighter?”, Police Practice and Research: An International Journal, 3/4, 287-304.
  • Gibson, S. (2004). “Open Source Intelligence”, The RUSI Journal, 149/1, 16-22.
  • Glassman, M. ve Kang, M. J. (2012). “Intelligence in the Internet Age: The Emergence and Evolution of Open Source Intelligence (OSINT)”, Computers in Human Computer, 28, 673-682.
  • Gruters, P. C. ve Gruters, K. T. (2018). “Publicly Avaible Information: Modernizing Defense Open Source Information”, Special Operation Journal, 4/1, 97-102.
  • Gunaratna, R. (2007). “Ideology in Terrorism and Counter Terrorism: Lessons From Al Qaeda”, The Ideological War on Terror: Worldwide Strategies on Counter-terrorism (Ed: A. Aldis ve G. P. Herd), Routledge, Londra, 21-34.
  • Gutfraind, A. (2011), “Targeting By Transnational Terrorist Groups”, Counterrorism and Open Source Intelligence (Ed: U. K. Wiil), Springer, Viyana, 9-32.
  • Hassan, N. A. ve Hijazi, R. (2018). Open Source Intelligence Methods and Tools: A Pracitcal Guide to Online Intelligece, Apress, New York.
  • Henricks, S. C. (2017). “Social Media, Publicly Avalaible Information, and the Intelligence Community”, American Intelligence Journal, 34/1, 21-31.
  • Herman, M. (1996). Intelligence Power in Peace and War, Cambridge University Press, Cambridge.
  • Hoffman, B. (2006). Inside Terrorism, Cambridge University Press, New York.
  • Hribar, G., Podbregar, I. ve Ivanusa, T. (2014). “OSINT: A ‘Grey Zone’?”, International Journal of Intelligence and Counterintelligence, 27/3, 529-549.
  • Hulnick, A. S. (2002). “The Downside of Open Source Intelligece”, International Journal of Inteligence and Counterintelligence, 15/4, 565-579.
  • Hulnick, A. S. (2006). “What’s Wrong with the Intelligence Cycle”, Intelligence and National Security, 21/6, 959- 979.
  • Hulnick, A. S. (2010). “The Dilemma of Open Source Intelligence: Is OSINT Really Intelligence”, The Oxford Handbook of National Security Intelligence (Ed: L. K. Johnson), Oxford University Press, Oxford, 229.
  • Ilardi, G. J. (2009). “The 9/11 Attacks: A Study of Al-Qaeda’s Use of Intelligence and Counterintelligence”, Studies in Conflict and Terrorism, 32/3, 171-187.
  • Johnson, L. K. (2010). “National Security Intelligence”, The Oxford Handbook of National Security Intelligence (Ed. L. K. Johnson),: Oxford University Press, Oxford, 3-32.
  • Kent, S. (1949). Strategic Intelligence for American World Policy, Princeton University Press, Princeton.
  • Lerner, K. L. ve Lerner, B. W. (Eds.) (2004). Encyclopedia of Espionage, Intelligence, and Scurity: Volume 1-2-3, Thomson Gale, Detroit.
  • Lowenthal, M. M. (2009). Intelligence: From Secret to Policy, CQ Press, Washington.
  • Marlo, F. H. (1999). “WMD Terrorism and US Intelligence Collection”, Terrorism and Political Violance, 11/3, 53- 71.
  • Miller, J. A. (2005). “Turning Open Source Data Into Knowledge About Global Threats”, American Inelligence Journal, 23, 74-78.
  • Mtsweni, J.; Mutemwa, M. ve Mkhonto, N. (2016). “Development of Cyber-Threat Intelligence-Sharing Model from Big Data Sources”, Journal of Information Warfare, 15/3, 56-68.
  • NATO (2001). Open Source Intelligence Handbook, The North Atlantic Treaty Organization.
  • Newman, E. (2006). “Exploring the ‘Roots Causes’ of Terrorism”, Studies in Conflict and Terrorism, 29/8, 749-772.
  • Omand, D., Barlett, J. ve Miller, C. (2012). “Introducing Social Media Intelligence (SOCMINT)”, Intelligence and National Security, 27/6, 801-823.
  • Özdağ, Ü. (2013). “Açık Kaynak İstihbaratı”, Dünyayı Yöneten Güç İstihbarat Bilimi (Ed: S. Yılmaz), Kripto, Ankara, 137-154.
  • Price, B. (2017). “Terrorism As Cancer: How to Combat an Incurable Disease”, Terrorism and Political Violance, 31/5, 1096-1120.
  • Quiggin, T. (2007). Seeing the Invisible: National Security Intelligence in an Uncertain Age, World Scientific Publishing, New Jersey.
  • Richards, J. (2019). “Intelligence and Counterterrorism”, Routledge Handbook of Terrorism and Counterterrorsim (Ed:A. Silke), Routledge, Londra, 395-405.
  • Richey, M. K. ve Binz, M. (2015). “Open Source Collection Methods for Indetifying Radical Extremists Using Social Media”, International Journal of Intelligence and Counterintelligence, 28/2, 347-364.
  • Rineheart, J. (2010). “Counterterrorism and Counterinsurgency”, Perspectives on Terrorism, 4/5, 31-47.
  • Saadat, S. Y. (2020). “International Cooperation for Counter-terrorism: A Strategic Perspective”, Journal of Policing, Intelligence and Counter Terrorism, 15/1, 83-93.
  • Sevendsen, A. (2008). “The Globalization of Intelligence Since 9/11: Frameworks and Operational Parameter”, Cambridge Review of International Relations, 21/1, 129-144.
  • Shaffer, R. (2015). “Counter-Terrorism Intelligence, Policy and Theory Since 9/11”, Terrorism and Political Violence, 27/2, 368-375.
  • Shulsky, A. ve Schmitt, G. J. (2002). Silent Warfare: Understanding the World of Intelligence, Potomac Books, Washington.
  • Sims, J. (2007). “Intelligence to Counter Terror: The Importance of All-Source Fusion”, Intelligence and National Security, 22/1, 38-56.
  • Smelser, N. J. (2007). The Faces of Terrorism: Social and Psychological Dimensions, Princeton University Press, Princeton.
  • Steele, R. (1995). “The Importance of Open Source Intelligence to the Military”, International Journal of Intelligence and CounterIntelligence, 8/4, 457-470.
  • Steele, R. (2010). “Human Intelligence: All Humans, All Minds, All the Time”, Strategic Studies Institute, 17.
  • Stepanova, E. (2008). “Terrorism in Asymmetrical Conflict: Ideological and Structural Aspects”, SIPRI Research Report 23, Oxford University Press, Oxford.
  • Stottlemyre, S. A. (2015). “HUMINT, OSINT, or Something New? Defining Crowdsourced Intelligence”, International Journal of Intelligence and Counterintelligence, 28/3, 578-589.
  • Stout, M. ve Warner, M. (2018). “Intelligence is As Intelligence Does”, Intelligence and National Security, 33/4, 517-526.
  • Treverton, G. F. (2004). Reshaping National Intelligence for An Age of Information, Cambridge University Press, Cambridge.
  • Wark, W. K. (1993). “Introduction: The Study of Espionage: Past, Present, Future”, Intelligence and National Security, 8/3, 1-13.
  • Warner, M. (2002). “Wanted: A Definition of Intelligence”, Studies in Intelligence, 46/3, 15-22.
  • Wibberley, S. ve Miller, C. (2014). “Detecting Events from Twitter: Situational Awareness in the Age of Social Media”, Open Source Intelligence in the Twenty-First Century: New Approaches and Oppurtunities (Ed: C. Hobbes, M. Moran ve D. Salisbury), Palgrave Macmillian, Londra.
  • Wiil, U. K. (2011). “Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies”, , Counterrorism and Open Source Intelligence (Ed: U. K. Wiil), Springer, Viyana, 1-9.
  • Williamson, M. (2009). Terrorism, War and International Law: The Legality of the Use of Force Against Afghanistan in 2001, Ashgate, Surrey.
  • Yılmaz, S. (2019). Temel İstihbarat: Toplama, Analiz ve Operasyonlar, Kripto, Ankara.
APA Çıtak E (2021). TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. , 163 - 179. 10.30794/pausbed.874414
Chicago Çıtak Emre TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. (2021): 163 - 179. 10.30794/pausbed.874414
MLA Çıtak Emre TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. , 2021, ss.163 - 179. 10.30794/pausbed.874414
AMA Çıtak E TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. . 2021; 163 - 179. 10.30794/pausbed.874414
Vancouver Çıtak E TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. . 2021; 163 - 179. 10.30794/pausbed.874414
IEEE Çıtak E "TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI." , ss.163 - 179, 2021. 10.30794/pausbed.874414
ISNAD Çıtak, Emre. "TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI". (2021), 163-179. https://doi.org/10.30794/pausbed.874414
APA Çıtak E (2021). TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 0(46), 163 - 179. 10.30794/pausbed.874414
Chicago Çıtak Emre TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi 0, no.46 (2021): 163 - 179. 10.30794/pausbed.874414
MLA Çıtak Emre TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, vol.0, no.46, 2021, ss.163 - 179. 10.30794/pausbed.874414
AMA Çıtak E TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi. 2021; 0(46): 163 - 179. 10.30794/pausbed.874414
Vancouver Çıtak E TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI. Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi. 2021; 0(46): 163 - 179. 10.30794/pausbed.874414
IEEE Çıtak E "TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI." Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 0, ss.163 - 179, 2021. 10.30794/pausbed.874414
ISNAD Çıtak, Emre. "TERÖRLE MÜCADELEDE İSTİHBARATA BAŞVURU: AÇIK KAYNAK İSTİHBARATININ KULLANIMI". Pamukkale Üniversitesi Sosyal Bilimler Enstitüsü Dergisi 46 (2021), 163-179. https://doi.org/10.30794/pausbed.874414