
In Türkiye, operators provide internet service to every customer with cgnat. Naturally, spoofing is not possible on these IPs. This may be the explanation for the IP blocks you see on the page you sent. According to my guess, most of the people who download and run spoofer want to do IP spoofing and have unintentionally contributed to the project (yes, I have seen examples recently). If a customer buys a static IP, they are taken to the public zone. Data centers and other customers who buy a public IP or uplink can generally do IP spoofing. Just a rumor, but I heard that an ISP in our country recently (still) dared to attack data centers with IP spoofing over its own infrastructure (still just a rumor).
Depends on your source of authority. If you're constructing a government mandate then you require anyone selling Internet service in Turkey to implement BCP 38 on every paid Internet connection. That means egress filtering everywhere they buy transit or peering service inside or outside of Turkey and ingress filtering everywhere they sell Internet service inside and outside of Turkey. And you set large and escalating fines for every incident where the ISP is found to be in non-compliance. Then you sit back and let capitalism do what it does best: optimize for cost.
I definitely agree. I am not very active in the sector but I am generally luckier than most people in reaching the authorities. The best plan I have in mind right now is to find the network topologies that TTNET, which is the central ISP in Türkiye, provides service to data centers, homes, and other ISPs, and to prepare a report that includes, in its simplest form, what can be done and how, what kind of a threat this poses to the country and the internet environment in general. Then all I have to do is print this report, give it to all the authorities I cross paths with, and run away :D Sorry for the late reply, I spend a lot of time on research, everything you write is very valuable to me. Regards, Taygun