1. Introduction
2. İSTİHBARATTA GÜNCEL ZORLUKLAR VE AKIMLAR
3. Budish, R., Burkert, H., and Gasser, U. (2018) ‘Encryption Policy and Its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects’, Aegis Series Paper No. 1804. Available at: https://dash.harvard.edu/bitstream/handle/1/36291726/budish_webreadypdf%202.pdf?sequence=1&isAllowed=y (Accessed: 25 August, 2020).
4. Crosston, M. and Valli, F. (2017) An Intelligence Civil War: “HUMINT” vs. “TECHINT”, Cyber, Intelligence, and Security, 1(1), pp. 67–82. Available at: https://www.inss.org.il/wp-content/uploads/2017/03/An-Intelligence-Civil-War-%E2%80%9CHUMINT%E2%80%99%E2%80%9D-vs.-%E2%80%9CTECHINT%E2%80%9D.pdf (Accessed: 25 August, 2020).