Menu
En iyi Manavgat Avukatı
  • Anasayfa
  • Biz
  • İletişim
  • Blog
Close Menu
23/07/2022

The Effect of the Bylock Program on the Determination of Punishment

Rabia Ekşi Uncategorized @tr alanya, antalya, law, lawyer, mahmutlar

Supreme
16. Criminal Department

Main : 2017/1800
Decision : 2017/4837
Date : 19.07.2017

(5237 pp. TCK m. 220, 314)

The decision issued by the District Court of Justice is being appealed;

According to the appellant’s adjective, the duration of the application, the nature of the decision and the reason for the appeal, the file was examined and considered as necessary;

Since there were no reasons for the refusal of the appeal request, the essence of the work was moved;

Since the sentences imposed do not have conditions according to the duration, the defendant’s defense’s request for a judicial review must be rejected in accordance with Article 299 of the CMK,

In the examination conducted according to the minutes, documents and justification content reflecting the trial process;
At the end of the trial; defendant Caner I..546 896 ’. .. within the scope of the minutes, bank records and witness statements kept as a result of the calls made at the defendant’s house, where the BYLOCK program was installed on the numbered telephone line, it was DECIDED that he would be punished for membership of the FETO/PDY armed terrorist organization.

SUPREME COURT 16. As detailed in the Criminal Court’s decision No. 2017/3 of 2015/31 2015, the ByLock application is a SYSTEM based on the fact that each message sent is encrypted and transmitted with a different crypto key to provide communication over an internet connection with a powerful crypto system. This communication program is a PROGRAM that is produced as a special software that only members of the organization can use via a special server, which allows members to communicate between themselves using a special encryption method without Deciphering. In summary, ByLock is A SYSTEM that allows you to communicate with the crypto system on the Internet.

Communication of data transmitted between two users in the system ByLock encrypted using the algorithm determined that the crypto chart, crypto-graphic algorithms, a type of public-key/asymmetric encryption algorithm, secret key encryption and one shall be open to the other two made using this encryption when transferring information between users, third parties have access to the information in this way has been found to be a security system to prevent hacking.
Since downloading ByLock is not enough, special installation is required to use this program, registration in the ByLock application is required, downloading from the Internet, portable memory cards, bluetooth applications, etc. as mentioned in the statements, messages and emails, it was understood that downloads were made using USB memory, memory cards and bluetooth by members of the organization. To download the program is not sufficient for messaging, messaging is automatically assigned by the system for the realization registered users, and the specific user ID (identification number) and the number of be known that it should be approved, otherwise people will be added to the list in the content of the messaging will not occur and that, during the recording of the program, it is understood that the user only wants to produce a username and password.

The process of adding friends is CARRIED OUT by entering the personal code called “user name” (code / nickname) given by the user when registering in the said application. There is NO way to add a user by searching Dec phone number or “full name” information on the application. On the other hand, ByLock does NOT have the ABILITY to automatically add people in the phone book to the application, which is one of the equivalent or common messaging applications. In order for users to contact each other on the ByLock application, the parties MUST know each other’s “username/code” information and ADD each other as friends from both sides. In short, since the ID of the person to be spoken to must be added first to use the program, it is UNDERSTOOD that not every person who wants to has the opportunity to use this system at any time.

Voice Dec, e-mail transmission, text messaging and file TRANSFER CAN be PERFORMED on the application. In this way, the communication needs of users organizational in Nature, performed without the need for another tool of communication, communication that is performed on the device for certain periods without the need for manual processing of users in terms of security required for the automatic deletion deletions communication forgets to delete the data even if the system is scheduled to take the necessary measures to, thus, one possible legal action as a result of the application, ByLock, in case of forfeiture of the device, even in the application and other users of the application relating to communication in the user list to block access to historical data, edited data in the application database from the application server also crypto storage and communication, the user’s identification and Prevention of security measures were taken in the nature of the communication, it was determined that for the safety of.

It has been SEEN that the ByLock application PROVIDES services on a server with an IP address of 46.166.160.137. Server administrator 8 additional IP addresses to make it difficult to identify those using the application (46.166.164.176, 46.166.164.177, 46.166.164.178, 46.166.164.179, 46.166.164.180, 46.166.164.181, 46.166.164.182, 46.166.164.183) it has been determined that it has rented and made available;

In the ByLock communication system, it is POSSIBLE to DETERMINE the connection date, the IP address that makes the connection, the number of times the connection was made between which dates, who the Dec were made to, and the content of the communication. Deciphering the connection date, the IP address that made the connection, and determining how many times a connection was made between which dates is SUFFICIENT to determine that the person is part of a special communication system. Determining the content of who the communication is made with is INFORMATION that will HELP determine the person’s position in the structure (terrorist organization). In other words, it is INFORMATION that will help determine a person’s position in the organizational hierarchy (organization manager/ organization member).

Since the ByLock communication system is based on concrete evidence that it is a network created for the use of members of the FETO/PDY armed terrorist organization and is used exclusively by members of this criminal organization, the defendants involved in this network do not need to have the content of interviews with another person/persons within the network.

The ByLock communication system is a network created for the use of members of the FETO/PDY armed terrorist organization and used exclusively by some members of this criminal organization, as evidenced by the concrete evidence described above; If it is determined by technical data that will lead to a definite conclusion, far from any doubt, that it was included in this network by the organization’s instructions and used for communication purposes to ensure confidentiality, there will be EVIDENCE indicating the person’s connection to the organization …”

1-In this context; the defendant’s use of the ByLock application should be determined by technical data and therefore the defendant C..(TC: 3..) 0546, which is registered on it and which it declares itself to be using.. in line with the date of the ByLock Program No. 35961004294296 the IMEI number from the date of first use until the expiration date 13.10.2015 (the person not being able to identify the expiration date of the minutes dated 23.01.2017) application ByLock on the IP address belongs to (46.166.160.137, 46.166.164.176, 46.166.164.177, 46.166.164.178, 46.166.164.179, 46.166.164.180, 46.166.164.181, 46.166.164.182, 46.166.164.183) how many times will connect you to information and communication technologies authority by writing corresponding GSM muzekker by the company according to the response assessment, the defendant should be evaluated in writing research to be decided by the legal status is missing,

2-According to the admission; in order to determine that the ByLock application, which is one of the decisive evidence taken on the basis of the conviction, was used by the defendant, the LOCAL COURT cannot be decided on the grounds that access to the program will be sufficient to ensure that the members of the terrorist organization upload the installation file among themselves to each other without waiting for the response of the client dated 07 Dec02.2014 and numbered 2006/317, written to the Ankara Police Department;

In violation of the law, the public prosecutor of the court of Appeal Justice Antalya regional counsel and defendant’s objections in this regard since it is seen, for this reason, in accordance with the provision of the CPC 302/2 CORRUPTION, the crime and the defendant defenders considering the tendency of the time he spent in prison for the evacuation of the denial of requests, the continuation of imprisonment the defendant, on 19.07.2017 it’s unanimous.

You can read our articles and petition examples by clicking here.

Mandatory Elements That Should Be Discussed About the Merits What is the Responsibility of the Owner of the Animal

Related Posts

Uncategorized @tr

TBB BAŞKANI SAĞKAN 5 NİSAN AVUKATLAR GÜNÜNDE KONUŞMA YAPTI

Avukatlar, Türkiye Barolar Birliği’nin öncülüğünde 5 Nisan Avukatlar Günü’nde Ankara’da ‘Savunmanın Bağımsızlığı ve Hukuka Saygı’ yürüyüşü yaptı. Barolar adına konuşma yapan Türkiye Barolar Birliği Başkanı Av. R. Erinç Sağkan, “Biz bugün hukuk devletini savunmak için, yargı bağımsızlığını savunmak için buradayız. Bu ses susturulamaz” dedi. “İSTANBUL BAROSU, HUKUKA AYKIRI YARGI KARARLARIYLA GÖREVİNDEN UZAKLAŞTIRILMAK İSTENİYOR” Anıtpark’ta bir […]

Uncategorized @tr

Determination and Recommendations regarding the Main Procedural Problems in Terms of Earthquake-Related Civil Cases

“It is Not Possible to Get Rid of the Responsibility of Those Responsible by Obscuring the Evidence of the Earthquake, On the Contrary, Their Responsibilities Increase” Prof. Dr. Muhammet Özekes (12.02.2023) If the CCP and procedural rules can be applied consciously, correctly and quickly, the judiciary can get out of this earthquake without being in […]

Uncategorized @tr

The Decision of the Council of State that the Consumer Bank Cannot Receive Account Operating Fees

COUNCIL OF STATE 15. apartment Basis: 2014/9570 Verdict: 2018/1194 Plaintiff : Consumer Problems Association Acting Director : Av… Respondent : Banking Regulation and Supervision Agency Acting Director : Av… Summary of the Case: Article 10 of the Regulation on the Procedures and Principles regarding Fees to be Collected from Financial Consumers, which entered into force […]

Uncategorized @tr

Negative Detection Case Based on the Guarantee Bond Claim, Exchange Monitoring Supreme Court Decision

T.C. SUPREME 19. law office MAIN NUMBER: 2016/3357 DECISION NO: 2016/13899 DECISION DATE: 24.10.2016 >> FOREIGN EXCHANGE MONITORING, NEGATIVE DETECTION CASE BASED ON THE CLAIM THAT THE BILL IS A SECURITY BILL, BURDEN OF PROOF AND STATE OF EVIDENCE 6100/m.222/5 6102/m.64 SUMMARY: The case is related to the request for negative determination. The plaintiff has […]

Uncategorized @tr

Traffic Accident, Wearing a Helmet Should Be Reduced by 20% – Supreme Court Decision

T.C SUPREME 17.law office MAIN NUMBER:2017/5716 DECISION NO:2018/1495 DECISION DATE: 01/03/2018 COURT : Court of First Instance >> SINCE THERE IS A MUTUAL DEFECT DUE TO A TRAFFIC ACCIDENT, NOT WEARING A HELMET, IT WILL BE NECESSARY TO MAKE A MUTUAL DEFECT DISCOUNT OF AT LEAST 20% ACCORDING TO ESTABLISHED APPLICATIONS. At the end of […]

Back To Top
manavgat avukat

İletişim:

+905425139898

+902425139898

info@antalya.law

Adres

Hacet Mahallesi, Canlılar Sokak,
Avukatlar İş Merkezi, No: 7, Daire: 2-3
Alanya / Antalya

Copyright © 2020 Aşıkoğlu Hukuk ™ Aşıkoğlu Uluslararası Hukuk Bürosu, Her Hakkı Saklıdır

WhatsApp us