Yep, and it would appear that's what they're doing:
A:34_acibadem_lg# ping 8.8.4.4 source 195.175.239.100
64 bytes from 8.8.4.4: icmp_seq=1 ttl=250 time=6.58ms.
64 bytes from 8.8.4.4: icmp_seq=2 ttl=250 time=6.55ms.
64 bytes from 8.8.4.4: icmp_seq=3 ttl=250 time=6.52ms.
64 bytes from 8.8.4.4: icmp_seq=4 ttl=250 time=6.93ms.
64 bytes from 8.8.4.4: icmp_seq=5 ttl=250 time=6.57ms.
---- 8.8.4.4 PING Statistics ----
5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min = 6.52ms, avg = 6.63ms, max = 6.93ms, stddev = 0.154ms
A:34_acibadem_lg# ping 8.8.8.8 source 195.175.239.100
PING 8.8.8.8 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=1 ttl=250 time=6.58ms.
64 bytes from 8.8.8.8: icmp_seq=2 ttl=250 time=6.51ms.
64 bytes from 8.8.8.8: icmp_seq=3 ttl=250 time=6.54ms.
64 bytes from 8.8.8.8: icmp_seq=4 ttl=250 time=6.52ms.
64 bytes from 8.8.8.8: icmp_seq=5 ttl=250 time=6.51ms.
---- 8.8.8.8 PING Statistics ----
5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min = 6.51ms, avg = 6.53ms, max = 6.58ms, stddev = 0.044ms
A:34_acibadem_lg# traceroute 8.8.4.4 source 195.175.239.100
traceroute to 8.8.4.4 from 195.175.239.100, 30 hops max, 40 byte packets
1 acbdm-2-1-acbdm-bgp-1.turktelekom.com.tr (212.156.120.49) 7.03 ms 3.57 ms 10.3 ms
2 0.0.0.0 * * *
3 195.175.166.207.static.turktelekom.com.tr (195.175.166.207) 10.3 ms 9.31 ms 12.0 ms
4 cagis-ess1-t4-1-balikesir-t3-2.turktelekom.com.tr.252.156.212.in-addr.arpa (212.156.252.89) 10.4 ms 18.9 ms 12.6 ms
5 ulus-t3-4-ulus-t2-1.turktelekom.com.tr.203.212.81.in-addr.arpa (81.212.203.78) 11.2 ms 10.8 ms 29.7 ms
6 0.0.0.0 * * *
7 0.0.0.0 * * *
...
On a side note, it looks like TT does very little, if any, filtering of announcements they receive from peers so it'd be pretty trivial for one of their peers to do BGP hijacking. :/
Added: Interestingly enough, if I ask TT's LG for the routes it has for 8.8.4.0/24 or 8.8.8.0/24, it throws an error ("Please enter a valid IPv4/IPv6 address!"). I get the same result if I ask for a subnet that doesn't exist in BGP. That makes me guess that they're filtering out the routes from their peers.
Is it possible to claim that you are 8.8.8.8 from within Turkey using some sort of BGP wizardry?