Merve Seren

Merve Seren

Merve Seren is Assistant Professor at Ankara Yildirim Beyazit University. Her works are concentrated on defense, security and intelligence.
The Changing Dimensions of Turkey's Counterterrorism Policy

The Changing Dimensions of Turkey's Counterterrorism Policy

November 1, 2019
Turkey has a long-standing experience of fighting an uphill battle against a variety of terror groups, which are utterly flexible and can quickly adapt to new conditions.
Defense Trade and Foreign Policy An Interview with CAST Director

Defense, Trade and Foreign Policy: An Interview with CAST Director Ruslan Pukhov

October 30, 2019
Turkey became a very influential actor in the Middle East and Eurasia. But this Turkey was not the master of its own sky. That is why starting from neighbors who can intrude, up to unmanned aerial vehicles, Turkey needs to protect its sovereignty in the skies.
S-400 Sanctions What Will Be the Price Paid by Turkey

S-400 Sanctions: What Will Be the Price Paid by Turkey?

August 26, 2019
Turkish defense industry might have to bear the burden of losses from being removed from the F-35 program and supply chain, but it should continue prioritizing the intellectual investment in the defence industry and learn how to become a “competitive supplier” rather than a “contributing customer”.
An Alternative Vendor for Turkey s Missile Defense Eurosam s

An Alternative Vendor for Turkey’s Missile Defense: Eurosam’s SAMP/T

August 2, 2019
Eurosam’s SAMP/T offer provided a wide range of opportunities compared to other bidders from the U.S., Russia and China. However, one must take into account that arms trade creates a long-term technical, military and political engagement, as well as a strategic cooperation between customers and their suppliers.
F 35 Case Not the First Time Won t be

F–35 Case: Not the First Time, Won’t be the Last

June 11, 2018
If the U.S. Senate approves the bill to punish Ankara, then it will punish its own defense company Lockheed Martin as well. Turkey is one of the company’s biggest customers, with 116 stealth fighters on order.
Securing Turkey s Borders A Proactive Strategy with High-Tech Approach

Securing Turkey’s Borders: A Proactive Strategy with High-Tech Approach

June 14, 2017
The current border security of Turkey is functional and adequate, but needs to be improved by, first, an efficient management system that coordinates the involved institutions of four ministries. Secondly, high-tech products rather than human-based solutions, mainly intelligence capabilities, appear to be an urgent field requirement to detect border threats before they are too close to combat.
Turkey s Domestic Surveillance Balloons vs the US Persistent Threat

Turkey’s Domestic Surveillance Balloons vs. the US Persistent Threat Detection System

May 12, 2017
The indigenously developed surveillance balloons by ASELSAN-OTONOM, and to some extent TURKSAT, seem appropriate for the operational needs of the Turkish Army in comparison to the ones of outer market. They are mobile, small and simple systems to conduct surveillance and reconnaissance tasks in potential combat zones.
Turkey s Prospects and Challenges for a National Missile Defense

Turkey’s Prospects and Challenges for a National Missile Defense System

April 23, 2017
In order to ramp up production based on the use of national resources, thus diversify domestically produced technologies and goods, Turkey has to strengthen and support her defense industry.
Hackers and Cyber-Security in Turkey An Interview with Halil Öztürkci

Hackers and Cyber-Security in Turkey, An Interview with Halil Öztürkci

February 10, 2017
Dr. Merve Seren talks to Halil Öztürkci, a "White Hat" hacker, for The New Turkey about how governments are trying to use the expertise of otherwise malicious cyber attackers to build better defenses.
Turkey Steps Up Counter-Cyber Attack Efforts

Turkey Steps Up Counter-Cyber Attack Efforts

January 24, 2017
According to a report published by Fortinet in August 2016, Turkey placed in the list of top five countries experiencing botnets, malicious software and exploit kits attacks.