Özgün Law Firm

Özgün Law Firm

THE OFFENCE OF UNAUTHORISED ACCESS TO INFORMATION SYSTEMS AND INVESTIGATION METHODS

THE OFFENCE OF UNAUTHORISED ACCESS TO INFORMATION SYSTEMS AND INVESTIGATION METHODS

What Constitutes Cybercrimes?

Cybercrimes have emerged within the legal landscape in tandem with the advancements in the modern electronic world. The proliferation of artificial intelligence and the ubiquitous presence of technological devices, such as mobile phones, computers, and smartwatches, in our daily lives have paved the way for these tools to be exploited for criminal activities.

Individuals, who leverage the proliferation of information devices in various domains to enhance their lives, have increasingly adopted these technological tools as instruments for criminal activities, particularly in the realm of electronic commerce, encompassing activities such as online shopping and sales.

At this juncture, cybercrimes can be defined as a broad spectrum of offences perpetrated within the electronic environment, utilising technological devices such as computers, telephones, and POS devices. Hence posing potential cyber security breaches. Essentially, cybercrimes encompass the unauthorised access to information systems through electronic connections facilitated by technological tools, either physically or via the internet.

Regarding the information system, the Turkish Criminal Procedure, in accordance with the ruling of the Criminal General Assembly of the Court of Cassation dated 25.11.2014, bearing the Basis number 2013/448 and numbered 2014/524, defines it as follows: “…The information system, as expounded in the rationale of Article 243 of the Turkish Penal Code (TPC), refers to magnetic systems that enable the collection and storage of data, subsequently subjecting them to automatic processes.”

Cybercrime is defined in German case law as, “Intentional attacks against individuals or groups with the aim of causing harm to their dignity or inflicting direct or indirect physical or mental harm on the victim. These attacks are carried out using contemporary communication channels, such as the Internet (e.g., chat rooms, emails, bulletin boards, and groups), and mobile phones (SMS/MMS) [1].”

This type of crime can give rise to both national and international security and economic legal disputes. Cybersecurity vulnerabilities in information systems can be exposed through various offences such as infringement of privacy, violation of copyrights, fraud, exploitation, and intelligence-related crimes, among others.

History of Cybercrimes

While the use of informatics has been ingrained in human activities for an extensive period, it was not until the 1960s that technology began to be employed as a criminal instrument, subsequently recognised as a criminal offence and subject to penalties. The pursuit of military and economic superiority, both on a national and international scale, contributed to the evolution of the information system, thereby giving rise to these cybercrimes.

Firstly, the compilation of personal data and the establishment of databanks raised privacy concerns. During the 1970s, cybercrimes began to be perpetrated as states recognised the potential to infiltrate the data of their own citizens and subsequently breach the information systems of other states.

The legal recognition of cybercrimes emerged in 1977 in the United States of America, the birthplace of computer, when the topic was deliberated in the United States Congress, leading to the creation of the first draft law.

Cybercrimes in the International Legal System

In the context of the international legal system, cybercrimes are generally categorised into two main types. These are recognised as "crimes targeting computer networks and devices" and "crimes committed by using computer networks and devices."

Crimes targeting computer networks and devices include:

·       Computer viruses

·       Denial-of-service attacks (DoS)

·       Malicious software

Crimes committed by using computer networks and devices include:

·       Cyber monitoring

·       Fraud and identity theft

·       Information theft

·       Theft of personal network information (for example, username, login password, credit card information and so forth)

Cybercrimes in the Turkish Criminal Law System

The advancement of information technologies has permeated every aspect of our lives, giving rise to a multitude of new criminal activities. Consequently, many nations have found it necessary to enact legal provisions in the realm of informatics, updating and amending their legislations accordingly. In Turkey, this category of offences was first introduced in 1991 through Law No. 3756. within the TPC No. 5237, the provisions pertaining to cybercrimes are examined under the title "Crimes Committed in the Field of Informatics."

In the tenth chapter of the TPC, titled "Offences in the Field of Informatics," specific provisions have been established to address various acts, such as unauthorised access to information systems, system obstruction, disruption, data destruction or alteration, as well as the misuse of bank and credit cards.

Accordingly, the cybercrimes examined in the TPC compass:

• Unauthorised access to the information system (Article 243 of the TPC)

• The offence of obstructing, disrupting, rendering inaccessible, destroying, or altering the system (Article 244 of the TPC)

• The offence of misusing a debit or credit card (Article 245 of the TPC)

• The offence of using a prohibited device or programme (Article 245/a of the TPC)

The Offence of Obstruction, Disruption of the System, Data Destruction or Alteration

Article 244 of the TPC states the following:

“(1) Any person who obstructs or disrupts the proper functioning of an information system shall be subject to imprisonment for a term of one to five years.

(2) Any person who corrupts, destroys, alters, or renders inaccessible the data within an information system, introduces data into the system, or transmits existing data to another location shall be subject to imprisonment for a term of six months to three years.

(3) If this act is committed against the information system of a bank, credit institution, public institution, or organisation, the imposed penalty shall be increased by half.

(4) If the acts defined in the previous paragraphs are committed for the purpose of gaining an unfair advantage, either for oneself or someone else, in addition to any other applicable offence, the person shall be subject to imprisonment for a term ranging from six months to two years and a judicial fine of up to five thousand days.”

As a side note, in Turkish law, "gün" (day) is a unit of measurement used for certain fines. The phrase "beş bin güne kadar adli para cezası" translates to "a judicial fine of up to five thousand days" in English. In this context, the fine is calculated based on a certain daily rate multiplied by the number of days, up to a maximum of five thousand days. This method of calculating fines in terms of "gün" (days) is unique to Turkish law and is different from the more common practice of specifying a monetary amount as a fine. The daily rate is determined based on the financial situation of the offender, and the number of days is decided by the court based on the severity of the offence.

With the enactment of this article, the intentional damage to information systems has been criminalised. The partial or complete destruction, alteration, or modification of data and programmes within information systems has constituted the offence of damaging property against information systems [2].

Offence of Misuse of Debit or Credit Cards

Article 245 of the TPC states the following:

"(1) Amended: 29.06.2005-5377-27.Art) Any person who acquires or possesses a debit or credit card belonging to another person, through any means whatsoever, and utilises it for personal gain or on behalf of another, without the consent of the cardholder or the person authorised to use the card, shall be subject to imprisonment for a term ranging from six months to three years, along with a judicial fine of up to five thousand days."

(2) Any person who manufactures, sells, transfers, purchases, or receives forged or counterfeit debit or credit cards and associates them with bank accounts belonging to others shall be subject to imprisonment for a term ranging from three to seven years, along with a judicial fine of up to ten thousand days.

(3) Any person who gains personal benefit or benefits someone else by using a forged or counterfeited debit or credit card shall be subject to imprisonment for a term ranging from four to eight years, in addition to a judicial fine of up to five thousand days, unless the act constitutes another offence warranting a more severe penalty.

(4) If the offence referred to in the first clause is committed to the detriment of:

a) One of the spouses for whom a separation order has not been issued.

b) One of the next of kin, one of the relatives in-law, or one of the adoptive or adopted children.

c) One of the siblings living together in the same dwelling.

No penalty shall be imposed on the related relative.

(5) (Additional Clause: 06.12.2006-5560/11. Art) The provisions of this law concerning effective repentance for offences against assets shall be applicable to acts falling within the scope of the first clause.”

In the preamble of this article, the unlawful acts resulting from the misuse of debit and credit cards are penalised. However, this type of crime aims to cause financial loss to the bank or credit card holders, resulting in gains for the perpetrators of the offence.

Use of Prohibited Devices and Programmes in Cybercrimes

Article 245/A of the TPC states the following:

"(Amendment: 24/3/2016-6698/30 Art.)

(1) If a device, computer programme, password, or other security code is specifically designed or created for the commission of the offences listed in this Section and other offences that can be facilitated through information systems, the individual who manufactures, imports, ships, transports, stores, accepts, sells, offers for sale, purchases, distributes to others, or possesses such items shall be subject to imprisonment for a term ranging from one year to three years, along with a judicial fine of up to five thousand days."

In the rationale of this article, it is clarified that the offence occurs when a device, computer programme, password, or other security code is specifically designed or created for committing cybercrimes or other offences facilitated through information systems, and the offence is committed by engaging in at least one of the acts outlined in the aforementioned article.

Offence of Unauthorised Access to an Information System

Article 243 of the TPC states the following:

“(1) Any person who unlawfully enters or remains in the whole or part of an information system shall be subject to imprisonment for a term of up to one year or a judicial fine.

(2) If the acts defined in the preceding clause are committed in relation to systems that can be utilised for a fee, the penalty to be imposed shall be reduced by up to half.

(3) If the data contained in the system are destroyed or altered as a result of this act, the person shall be subject to imprisonment for a term ranging from six months to two years.

(4) Any person who unlawfully monitors the data transfers within an information system or between information systems by technical means without entering the system shall be subject to imprisonment for a term ranging from one year to three years.”

This provision addresses the commission of a crime through unauthorised access to the whole or part of an information system and remaining there without lawful authorisation. The provision does not specifically require the processing of any data or other actions apart from the unlawful entry into the system. Therefore, the focus is on the act of entering the system, which results in a violation of the security of the information system.

Evaluation of the Offence of Unauthorised Access to an Information System under Article 243 of the TPC

The "Offence of Unauthorised Access to an Information System," examined within the framework of Article 243 of the TPC, occurs when an individual unlawfully enters into an information system and continues to remain there. Third clause of this article addresses the "destruction or modification of informatics data", indicating the establishment of the aggravated form of the offence.

The act of gaining an access to an information system refers to entering and remotely connecting to the data in the information system by direct or indirect means.

Commission of the Offence of Gaining Unauthorised Access to the Information System

Unauthorised access to information systems encompasses various actions. In today's rapidly advancing digital world, new security vulnerabilities emerge regularly.

Some well-known actions for gaining unauthorised access to systems include computer hacking, phishing attacks, computer viruses and worms, ransomware, keylogging programmes, distributed denial-of-service (DDoS) attacks, social engineering attacks, inadvertent receipt of malicious emails, unlawful content provision, trojan horses, logic bombs, network worms, hidden backdoors, eavesdropping, information viruses, identity theft, and numerous others achieved via forcing or exploiting weaknesses in the information system.

For legal analysis, the interpretation of the term ‘access’ plays a pivotal role. While there have been differing views within the Court of Cassation, the term ‘access’ has been favoured, particularly based on regulations stemming from Law No. 5651 on the Regulation of Internet Publications and Combating Crimes Committed through These Publications. In this context, ‘access’ signifies "gaining the opportunity to use the internet by connecting to the internet environment by any means."

In the verdict of the 8th Criminal Chamber of the Court of Cassation dated 07.05.2014 and bearing the Basis number 2013/10402 and the Decision number 2014/11836, the term ‘access’ was used instead of ‘entry’ which clarified the offence. Moreover, it was adjudicated that this offence involves gaining unauthorised access to someone else's system, closely or remotely monitoring the data within, and providing access in a manner that is deemed unfair.

"... Accessing an information system means gaining entry to some or all of the data contained in the system, either physically or remotely through another device. To achieve unauthorised access, lax security measures or vulnerabilities in existing security protocols may be exploited. Access can be obtained over the network by utilising viruses (in the form of attachments such as funny pictures, celebratory cards, or audio and video files), trojan horses, macro viruses, worms, or by exploiting system vulnerabilities in any way. Unauthorised access to computer data and systems is also referred to as ‘computer intrusion’, ‘code breaking’ or ‘computer hacking.’ This offence can be committed by gaining access to someone else's computer and viewing the data within or by logging into the information system through a network. The method of communication (wired or wireless) or the distance (close or far) does not affect the characterisation of the offence. However, in cases where an email or file is sent to an information system, this situation may not be considered as access since there is no entry into the information system; only data is sent. Furthermore, accessing the operating system (Windows, Linux, etc.) of the victim's personal computer by another internet user without the victim's consent will also constitute an offence..."

IP addresses play a significant role in establishing the ownership of access to a specific system. Through IP addresses, it becomes possible to determine which systems computers are connected to, when, where, and on whose behalf an unauthorised access occurred. IP addresses help in detecting the crime through serving as distinguishing features for computer programmes, much like identity numbers, which is beneficial for the victim. In accordance with the decision of the 8th Criminal Chamber of the Court of Cassation dated 16.04.2014 and bearing the Basis number 2013/4668 and the Decision number 2014/9860:

“In cases where IP addresses alone are insufficient, GSM companies can assign a single IP address to multiple individuals by using port forwarding. Each computer programme uses a separate port for communication. Consequently, for programme communication within the computer, an IP address and a port number are required and presented as an IP address and a port number. When accessed, the port information, which is not legally mandated to be retained, can aid in determining the specific individual who used an IP address assigned to multiple people at the time of the offence.”

The Legal Principle Protected by the Offence of Unauthorised Access to the Information System

The ‘legal principle protected’ in question pertains to the rights or interests of the victim whose data and information have been breached due to the unauthorised access. Consequently, when individuals' information systems are unlawfully accessed, it not only undermines the trust in the justice system but also constitutes an intrusion of individuals' privacy.

In this context, it is evident that the protected legal principle holds a multifaceted nature. Varied perspectives exist regarding the legal subject of the offence, with some asserting that it pertains to a material value. Conversely, alternate viewpoints define the protected legal principle as ‘multifaceted', encompassing the maintenance of public order, privacy of personal life and communication, interests of system proprietors and users, prevention of additional criminal activities, and fortification of information system security. [3]

Beyond the unauthorised access to the information system resulting in the infringement of the right to privacy of multiple individuals, there exists the potential for consequential harm to an individual's assets as the offence continues.

Elements of the Offence of Unauthorised Access to an Information System

A. Material Elements

A.1. Perpetrator

The perpetrator of an offence is referred to as the person who committed the act. In relation to this offence, the legal provision employs the phrase "...anyone who enters or remains..." As such, it is established that the term "anyone" pertains to the individual who gains access to the victim's information system, thereby being the perpetrator of this offence.

According to Article 20 of the Turkish Penal Code, the designation of perpetrator only applies to natural persons, and consequently, criminal penalties can exclusively be imposed upon natural persons. However, if the offender in question is a legal entity, specific security measures relevant to legal entities shall be implemented.

A.    2. Victim

The victim in this offence refers to the individual who has a detriment to or endangerment of their legal interests because of the unauthorised and unconsented access to their information system.

Should the perpetrator's actions result in harm to multiple individuals, all such affected persons shall collectively be called victims.

A.    3. Action

Within the framework of this offence, characterised as an "offence based on alternative actions" or an "offence with alternative elements", it is acknowledged that the commission of the offence occurs once the perpetrator undertakes any of the actions outlined within the legal statute. The offences that can be committed with one of the actions shown as alternatives of each other in the legal definition are called “offences based on alternative actions" or “offences with alternative elements". The offence is perpetrated upon the commission of any one of these alternatives, thereby removing the necessity for the completion of all available optional actions.

The continuation of presence after the entry into the information system may manifest as the perpetrator remains within the system for a while (during which activities such as data manipulation, data monitoring, data flow surveillance, system disruption operations, or inaction might happen). [4]

The duration of the perpetrator's tenure within the information system, and the existence of actions causing harm to the victim during this period, are not pivotal considerations.

This stance is affirmed in the verdict of the 11th Criminal Chamber of the Court of Cassation, dated 26.03.2009, and bearing the Basis number 2008/18190 and the Decision number 2009/3058:

"... In the face of the allegation and acceptance that the defendant unauthorisedly accessed the account of Z. T. T. İmalat Pazarlama Sanayi ve Ticaret Limited Şirketi, where the participant served as an official, at the Denizli branch of Türkiye E. Bankası, yet refrained from transferring funds to an alternate account through manipulation of the said account after its unauthorised access, a verdict through written means (in accordance with Articles 244/4, 35/2 of the Turkish Penal Code No. 5237) without due consideration of the defendant's conduct constituting the offence stipulated within Article 243/1 of the Turkish Penal Code No. 5237, stands contrary to the law, requiring a reversal. It is evident that the offence pertains to offences based on alternative actions or offences with alternative elements..."

 

B. Special Manifestations of the Offence

B.1. Attempt

In accordance with the provisions on attempt outlined in Article 35 of the TPC, the following explanation is provided: "An individual is held accountable for an attempt if they commence the direct perpetration of a crime they intend to commit through overt actions and are unable to bring it to fruition due to uncontrollable circumstances."

Hence, it is adequate for the perpetrator to engage knowingly and wilfully, partially or entirely, in any of the offences based on alternative actions or offences with alternative elements associated with the offence of unauthorised entry, access, or continued presence within the information system, for the offence to be both established and substantiated.

Given that this category of offence falls under "crime of mere action and a crime without a consequential result", the very act of carrying out the actions directly constitutes the offence. Should the initiation of the offence be obstructed by external factors beyond the perpetrator's control, the possibility of an attempt is conceivable. However, it is crucial to acknowledge that voluntary renunciation cannot be invoked in this type of offence, as it centres around the execution of actions, without any sought-after outcome. [5]

      B.2. Complicity

Conversely, complicity refers to a scenario in which the offence is perpetrated by multiple individuals rather than one person. In instances of this nature, the overarching regulations pertaining to complicity shall be invoked, thereby resulting in each of the offenders being prosecuted as ‘co-perpetrators.’

B.3. Cumulation of Offences or Concurrent Offences

The focal point of consideration herein pertains to how this scenario will impact the imposition of criminal penalties in instances where the perpetrator commits multiple offences. This issue will be analysed in accordance with the aforementioned legal provisions (Articles 42-44 of the TPC), and an evaluation shall be made based on the specific circumstances of the case.

A notable circumstance under this category emerges when the offence of unauthorised access to an information system is committed in a chain. An illustration of this involves the perpetrator accessing the victim's information system and subsequently re-entering the same system at distinct intervals, thereby exemplifying the commission of the offence in a chain.

The verdict rendered by the 8th Criminal Chamber of the Court of Cassation, bearing the Basis number 2014/3984 and the Decision number 2014/13848, stands as a precedent ruling:

"...considering the defendant's acknowledgment of accessing to the computer programme owned by the company subsequent to departing from the participating company, and the dossier's documentation revealing his multiple entries into the said programme at separate instances, the defendant's punishment under Articles 243 and 43 of the TPC for the crime of unauthorised access to the information system due to his conduct...".

Considering the verdict of the 12th Criminal Chamber of the Court of Cassation dated 15.09.2014 and bearing the Basis number 2014/649 and the Decision number 2914/17770, regarding the matter of cumulation of offences or concurrent offences, it is deemed judicious to impose a criminal penalty for the offence of unauthorised access to the information system alongside the act of subsequently procuring personal data:

"...There exists no inconsistency in the verdict to convict the defendant, who acquired the electronic email address employed by the involved party for accessing their Facebook account without consent, for the offence of unlawfully disclosing or procuring data. However, it was not taken into consideration that the defendant, after unlawfully entering the exclusive section of the participant's information system, persisted in remaining within the system unlawfully, thereby obstructing the participant's access to the aforementioned section. Consequently, the defendant should also be found guilty of the offence of blocking, disrupting the system, damaging, or altering data, as outlined in Article 244/2 of the TPC....".

C. Enforcement and Competent Authority

The penalty for the offence of unauthorised access to an information system is imprisonment for up to one year or a judicial fine for anyone who unlawfully enters or remains in the whole or part of an information system. These criminal penalties are included in the law for the simple form of cybercrimes. The simple form occurs in the case of entering the information system and exiting without making any changes in the system.

However, as it is understood from the continuation of the provision, if the acts defined in the first paragraph are committed about the systems that can be used for a fee, the penalty to be imposed will be reduced by up to half. Otherwise, in case of destruction or change in the data contained in the system due to the act of the perpetrator, imprisonment from six months to two years shall be sentenced.

A person who unlawfully monitors the data transfers within an information system or between information systems by technical means without entering the system shall be sentenced to imprisonment from one year to three years.

According to Article 11 of the "Law No. 5235 on Establishment, Duties and Authorities of the Courts of First Instance and Regional Courts of Appeal", the criminal courts of first instance are responsible for the cases related to the offence of unauthorised access to the information system in question.

In terms of location, the competent court shall be the court "where the offence is committed" according to the provisions of Article 12 and the following articles of the Code of Criminal Procedure No. 5271 regulating this matter.

D. Investigation Methods

The offence of unauthorised access to an information system falls within the category of offences that necessitate ex officio investigation and prosecution. Consequently, it becomes evident that this type of offence does not hinge upon a formal complaint. The primary rationale behind the legislator's decision to exempt this offence from complaint lies in the objective of upholding societal trust in the justice system and preserving the sanctity of privacy.

The retraction of the victim's complaint concerning this act carries no substantive significance, given that the offence belongs to the category of offences mandating ex officio investigation, thereby ensuring that legal proceedings will persist. In this context, the Prosecutor's Office will initiate the requisite research and investigation pertaining to access to the information system ex officio.

In this instance, the foremost point of determination by the prosecutor will revolve around ascertaining whether the attempt to access the system was carried out remotely or physically.

While various informatics techniques are employed for the elucidation of this specific offence, the prosecution authority will scrutinise methods including IP address identification, examination of log records, analysis of internet layers within the TCP/IP model, CGNAT records, and similar approaches. [6]

IP addresses and log records stand among the most frequently employed evidentiary methods within Turkey's legal proceedings, especially when access to the information system occurs via the internet. Through an investigation based on the particular incident, it is feasible to discern the IP addresses linked to the offence, thus facilitating the identification of the perpetrator.

In instances involving IP points that permit multiple access, such as workplaces, the resolution of offences becomes a matter of debate. Should it prove unfeasible to singularly identify the perpetrator based on an IP address accessible to multiple individuals, the principle of “the accused benefits from the doubt" (a legal principle that underscores the presumption of innocence and dictates that, in cases of uncertainty or doubt, the benefit should be given to the accused) shall be acknowledged. [7]

Otherwise, as a consequence of investigating the perpetrator(s) through the internet service provider, it is feasible to unveil their addresses, address creation dates, and the entities responsible for their creation. Beyond these considerations, the investigation can encompass accessing IP numbers and associated information by means of relevant Telecom Directorates, aiding in the determination of activities and transactions undertaken.

As a matter of fact, according to the verdict of the 8th Criminal Chamber of the Court of Cassation dated 07/05/2013 and bearing the Basis number 2014/19342 and the Decision number 2015/2322:

"In the specific instance; within the case lodged with the allegation that the defendant altered the Facebook address associated with the email address '.......................@hotmail.com,' employed by the involved party, without his knowledge and consent, rendered it inaccessible. The investigative and prosecutorial efforts were insufficient. A conviction was rendered without the requisite collection of evidence concerning the incident. Given the defendant's denial of the accusation, the dossier lacks information regarding the defendant's assertion that others might have accessed to his connection, the potential use of the internet line by individuals other than the defendant, and the verification of the ownership of the email address attributed to him. In light of the participant's assertion that he was unable to access his email address since 27.05.2011, it remains unestablished whether the said address was operational and whether the participant accessed his own address between the aforementioned date and the complaint's filing. The verdict was issued without soliciting the pertinent internet service provider for details on the defendant's logins after 22.05.2011, alterations to the password of the address, and if a password change occurred, the specific date and IP number utilised for the modification."

CONCLUSION

In this day and age, the rapid advancement of technology coupled with individuals' burgeoning inclination to document and retain their data is increasing day by day. Concurrently, as technology becomes more pervasive, the frequency of data entries into information systems has correspondingly risen.

In tandem with the utilisation of these information systems, a concomitant surge in offences associated with information systems has surfaced. Consequently, legal disputes, whether direct or indirect, pertaining to the offence of unauthorised access to information systems, as stipulated by the Turkish Criminal Law System, have become a salient feature both within the realm of jurisprudence and in everyday life.

While acknowledging the nascent jurisprudential landscape and certain loopholes in the penal framework when compared to other jurisdictions within the purview of Information Technology Law, Turkey's Legal System has been progressively incorporating comprehensive penal provisions aimed at safeguarding victims. These provisions align with international regulations and evolving practices, enhancing the Turkish Legal System's capacity to effectively address these matters.

Att. Esranur Kaya

Translated By: Sude Çapoğlu


References:

1. HALDER, D., & JAISHANKAR, K., 2011, Cybercrime and the Victimization of Women: Laws, Rights, and Regulations, Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9.

2. YILMAZ Sacit, Sayılı TCK’nın 244. Maddesinde Düzenlenen Bilişim Alanındaki Suçlar, Access Address: http://tbbdergisi.barobirlik.org.tr/m2011-92-669

3. ERDOĞAN, Yavuz, Türk Ceza Kanunu'nda Bilişim Suçları, 2012/02 Baskı, XVIII+436 sayfa ISBN 978-605-4354-27-6.

4. ÖZGENÇ İzzet, 2014, Türk Ceza Hukuku Genel Hükümler, Seçkin Yayıncılık.

5. KARAKEHYA, Hakan, Türk Ceza Kanunu’nda Bilişim Sistemine Girme Suçu, TBB Dergisi, 2009, Sayı 81, s.19.

6. AKÖZ Burak Cesur, Türk Ceza Kanunu Kapsamında Bilişim Suç ve Cezaları ile Örnek Yargısal Kararların Analizi ve Mevzuat Önerileri, Bilişim Uzmanlığı Tezi, 2018, Ankara, ISBN 978-605-345-141-9. Access address: https://www.btk.gov.tr/uploads/thesis/burak-cesur-akoz-b-uzm-tezi-5d10d910e20e8.pdf

7. İLÇİM Tuncay, Ceza Muhakemesinde IP Adresi, Log Kayıtları, Ekran Çıktısı ve CGNAT (HIS) Verilerinin İspat Değeri. Access address: https://tuncayilcim.av.tr/v5/ceza-muhakemesinde-ip-adresi-log-kayitlari-ekran-ciktisi-ve-cgnat-verilerinin-ispat-degeri/

MAKALEYİ PAYLAŞIN
MAKALEYİ YAZDIRIN