{"id":5715,"date":"2025-05-13T18:56:04","date_gmt":"2025-05-13T15:56:04","guid":{"rendered":"https:\/\/kriminalbilisim.com\/bylock-investigations\/"},"modified":"2025-09-23T00:59:19","modified_gmt":"2025-09-22T21:59:19","slug":"bylock-investigations","status":"publish","type":"page","link":"https:\/\/kriminalbilisim.com\/en\/bylock-investigations\/","title":{"rendered":"ByLock Investigations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5715\" class=\"elementor elementor-5715 elementor-2182\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-349f970 e-flex e-con-boxed e-con e-parent\" data-id=\"349f970\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c735aa2 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"c735aa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<div class=\"elementor-toc__header-title\">\n\t\t\t\tContents\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__c735aa2\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__c735aa2\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__c735aa2\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-385dd47 e-flex e-con-boxed e-con e-parent\" data-id=\"385dd47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2350f5 elementor-widget elementor-widget-text-editor\" data-id=\"f2350f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"\" data-start=\"346\" data-end=\"420\"><span style=\"color: #000000;\">ByLock Examination and Digital Forensics Solutions with CDR, CGNAT, GPRS Data<\/span><\/h1><p data-start=\"422\" data-end=\"477\"><span style=\"color: #000000;\">Digital Evidence Analysis with Next Generation Criminal Solutions<\/span><\/p><p data-start=\"422\" data-end=\"477\"><span style=\"color: #000000;\">ByLock Evidence Analysis and Digital Forensics Reports | Scientific and Impartial Examination <\/span><\/p><p data-start=\"422\" data-end=\"477\"><span style=\"color: #000000;\">Get expert digital forensics consulting on <strong>ByLock Investigations<\/strong>, ByLock detection, User ID deficiency, CDR analyses, and digital evidence validity. Strengthen your defense with scientific reports. <\/span><\/p><p class=\"\" data-start=\"479\" data-end=\"839\"><span style=\"color: #000000;\"><strong data-start=\"479\" data-end=\"524\">ByLock Investigations,<\/strong> <b>ByLock<\/b> is a smartphone application that allows anonymous users to exchange encrypted messages. As DNA Criminal and Digital Forensics Consultancy, we provide expert solutions for technical verification, evaluation, and usability of digital evidence in judicial processes. We conduct impartial and scientifically-based analyses in forensic investigations using critical data sources such as CDR, <a style=\"color: #000000;\" href=\"https:\/\/www.turk.net\/blog\/cgnat-carrier-grade-nat-nedir\/\" target=\"_blank\" rel=\"nofollow noopener\">CGNAT<\/a> and GPRS, particularly focusing on ByLock.  <\/span><\/p><hr class=\"\" data-start=\"841\" data-end=\"844\"><h2 class=\"\" data-start=\"938\" data-end=\"956\"><span style=\"color: #000000;\">What is <a href=\"https:\/\/tr.wikipedia.org\/wiki\/ByLock#G%C3%BClen_Hareketi&#039;yle_ili%C5%9Fkisi\" rel=\"nofollow noopener\" target=\"_blank\">ByLock<\/a>?<\/span><\/h2><p class=\"\" data-start=\"957\" data-end=\"1106\"><span style=\"color: #000000;\">ByLock (also known publicly as &#8220;Baylock&#8221;) was an encrypted mobile messaging application used between 2014-2016. The application allowed: <\/span><\/p><ul data-start=\"1108\" data-end=\"1224\"><li class=\"\" data-start=\"1108\" data-end=\"1136\"><p class=\"\" data-start=\"1110\" data-end=\"1136\"><span style=\"color: #000000;\">Encrypted instant messaging<\/span><\/p><\/li><li class=\"\" data-start=\"1137\" data-end=\"1162\"><p class=\"\" data-start=\"1139\" data-end=\"1162\"><span style=\"color: #000000;\">Encrypted voice calls<\/span><\/p><\/li><li class=\"\" data-start=\"1163\" data-end=\"1182\"><p class=\"\" data-start=\"1165\" data-end=\"1182\"><span style=\"color: #000000;\">File sharing<\/span><\/p><\/li><li class=\"\" data-start=\"1183\" data-end=\"1202\"><p class=\"\" data-start=\"1185\" data-end=\"1202\"><span style=\"color: #000000;\">Group chats<\/span><\/p><\/li><li class=\"\" data-start=\"1203\" data-end=\"1224\"><p class=\"\" data-start=\"1205\" data-end=\"1224\"><span style=\"color: #000000;\">Email sending<\/span><\/p><\/li><\/ul><p class=\"\" data-start=\"1226\" data-end=\"1370\"><span style=\"color: #000000;\">It was determined that more than 500,000 people had downloaded it before it was removed from the App Store and Google Play. <\/span><\/p><p data-start=\"864\" data-end=\"1173\"><span style=\"color: #000000;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2226\" src=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockGiris-300x88.jpg\" alt=\"bylock analysis\" width=\"641\" height=\"188\" title=\"\" srcset=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockGiris-300x88.jpg 300w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockGiris-768x225.jpg 768w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockGiris.jpg 983w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/span><\/p><hr class=\"\" data-start=\"1175\" data-end=\"1178\"><h2 class=\"\" data-start=\"1377\" data-end=\"1417\"><span style=\"color: #000000;\">How is ByLock Usage Detected?<\/span><\/h2><p class=\"\" data-start=\"1419\" data-end=\"1562\"><span style=\"color: #000000;\">Technical detection of ByLock usage requires multi-faceted digital data analysis in accordance with <strong data-start=\"1461\" data-end=\"1490\">Supreme Court ByLock decisions<\/strong>. These include: <\/span><\/p><ul data-start=\"1564\" data-end=\"1827\"><li class=\"\" data-start=\"1564\" data-end=\"1611\"><p class=\"\" data-start=\"1566\" data-end=\"1611\"><span style=\"color: #000000;\"><strong data-start=\"1566\" data-end=\"1609\">ByLock Detection and Assessment Report<\/strong><\/span><\/p><\/li><li class=\"\" data-start=\"1612\" data-end=\"1661\"><p class=\"\" data-start=\"1614\" data-end=\"1661\"><span style=\"color: #000000;\"><strong data-start=\"1614\" data-end=\"1659\">BTK-sourced CGNAT, CDR, and GPRS records<\/strong><\/span><\/p><\/li><li class=\"\" data-start=\"1662\" data-end=\"1728\"><p class=\"\" data-start=\"1664\" data-end=\"1728\"><span style=\"color: #000000;\"><strong data-start=\"1664\" data-end=\"1726\">Device examinations (ByLock application or data remnants)<\/strong><\/span><\/p><\/li><li class=\"\" data-start=\"1729\" data-end=\"1778\"><p class=\"\" data-start=\"1731\" data-end=\"1778\"><span style=\"color: #000000;\"><strong data-start=\"1731\" data-end=\"1776\">GBS (Geographic Based Query) Reports<\/strong><\/span><\/p><\/li><li class=\"\" data-start=\"1779\" data-end=\"1827\"><p class=\"\" data-start=\"1781\" data-end=\"1827\"><span style=\"color: #000000;\"><strong data-start=\"1781\" data-end=\"1825\">Indictment and court reasoned decisions<\/strong><\/span><\/p><\/li><\/ul><p class=\"\" data-start=\"1829\" data-end=\"2041\"><span style=\"color: #000000;\">A ByLock user must have installed the application on their device, registered, and connected to ByLock servers via IP. All operations are logged with a system-assigned <strong data-start=\"2011\" data-end=\"2021\">UserID<\/strong>. <\/span><\/p><p data-start=\"1567\" data-end=\"1827\"><span style=\"color: #000000;\"><img decoding=\"async\" class=\"aligncenter wp-image-2222 size-large\" src=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockInceleme-1024x333.jpg\" alt=\"bylock data\" width=\"1024\" height=\"333\" title=\"\" srcset=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockInceleme-1024x333.jpg 1024w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockInceleme-300x98.jpg 300w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockInceleme-768x250.jpg 768w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockInceleme.jpg 1187w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/span><\/p><hr class=\"\" data-start=\"1829\" data-end=\"1832\"><h2 class=\"\" data-start=\"1834\" data-end=\"1847\"><span style=\"color: #000000;\">What is CDR?<\/span><\/h2><p class=\"\" data-start=\"1849\" data-end=\"1980\"><span style=\"color: #000000;\">CDR (Historical Traffic Search) is phone call and messaging traffic data kept by GSM operators. These records include: <\/span><\/p><ul data-start=\"1982\" data-end=\"2105\"><li class=\"\" data-start=\"1982\" data-end=\"2007\"><p class=\"\" data-start=\"1984\" data-end=\"2007\"><span style=\"color: #000000;\">Dialed numbers<\/span><\/p><\/li><li class=\"\" data-start=\"2008\" data-end=\"2033\"><p class=\"\" data-start=\"2010\" data-end=\"2033\"><span style=\"color: #000000;\">Call date and duration<\/span><\/p><\/li><li class=\"\" data-start=\"2034\" data-end=\"2069\"><p class=\"\" data-start=\"2036\" data-end=\"2069\"><span style=\"color: #000000;\">Connected base stations<\/span><\/p><\/li><li class=\"\" data-start=\"2070\" data-end=\"2105\"><p class=\"\" data-start=\"2072\" data-end=\"2105\"><span style=\"color: #000000;\">Device IMEI information<\/span><\/p><\/li><\/ul><p class=\"\" data-start=\"2107\" data-end=\"2235\"><span style=\"color: #000000;\">and many other details. According to <a style=\"color: #000000;\" href=\"https:\/\/www.mevzuat.gov.tr\/mevzuat?MevzuatNo=5651&amp;MevzuatTur=1&amp;MevzuatTertip=5\" target=\"_blank\" rel=\"noopener nofollow\"><strong data-start=\"2148\" data-end=\"2168\">Law No. 5651<\/strong><\/a>, CDR data must be stored for a minimum of 6 months and a maximum of 2 years. <\/span><\/p><hr class=\"\" data-start=\"2237\" data-end=\"2240\"><p data-start=\"2242\" data-end=\"2274\"><span style=\"color: #000000;\"><img decoding=\"async\" class=\"aligncenter wp-image-2190 size-full\" src=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/CGNAT3.jpg\" alt=\"\" width=\"1166\" height=\"151\" title=\"\" srcset=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/CGNAT3.jpg 1166w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/CGNAT3-300x39.jpg 300w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/CGNAT3-1024x133.jpg 1024w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/CGNAT3-768x99.jpg 768w\" sizes=\"(max-width: 1166px) 100vw, 1166px\" \/><\/span><\/p><h2 class=\"\" data-start=\"2470\" data-end=\"2502\"><span style=\"color: #000000;\">What are CGNAT and GPRS Data?<\/span><\/h2><h3 class=\"\" data-start=\"2504\" data-end=\"2542\"><span style=\"color: #000000;\">What is CGNAT (Carrier Grade NAT)?<\/span><\/h3><p class=\"\" data-start=\"2543\" data-end=\"2870\"><span style=\"color: #000000;\">CGNAT is a system that allows multiple users to be assigned to a single IP address. However, access records are differentiated by unique <strong data-start=\"2655\" data-end=\"2672\">port numbers<\/strong> for each user. This enables the detection of which websites different people using the same IP connected to. Connections to ByLock IP addresses are examined using this data.   <\/span><\/p><h3 class=\"\" data-start=\"2872\" data-end=\"2898\"><span style=\"color: #000000;\">What is GPRS Data?<\/span><\/h3><p class=\"\" data-start=\"2899\" data-end=\"2956\"><span style=\"color: #000000;\">GPRS records contain GSM internet usage details:<\/span><\/p><ul data-start=\"2958\" data-end=\"3128\"><li class=\"\" data-start=\"2958\" data-end=\"2996\"><p class=\"\" data-start=\"2960\" data-end=\"2996\"><span style=\"color: #000000;\">Connection start and end time<\/span><\/p><\/li><li class=\"\" data-start=\"2997\" data-end=\"3021\"><p class=\"\" data-start=\"2999\" data-end=\"3021\"><span style=\"color: #000000;\">IP address used<\/span><\/p><\/li><li class=\"\" data-start=\"3022\" data-end=\"3039\"><p class=\"\" data-start=\"3024\" data-end=\"3039\"><span style=\"color: #000000;\">IMEI number<\/span><\/p><\/li><li class=\"\" data-start=\"3040\" data-end=\"3066\"><p class=\"\" data-start=\"3042\" data-end=\"3066\"><span style=\"color: #000000;\">Accessed web pages<\/span><\/p><\/li><li class=\"\" data-start=\"3067\" data-end=\"3100\"><p class=\"\" data-start=\"3069\" data-end=\"3100\"><span style=\"color: #000000;\">Data download-upload amount<\/span><\/p><\/li><li class=\"\" data-start=\"3101\" data-end=\"3128\"><p class=\"\" data-start=\"3103\" data-end=\"3128\"><span style=\"color: #000000;\">Base station information<\/span><\/p><\/li><\/ul><p class=\"\" data-start=\"3130\" data-end=\"3242\"><span style=\"color: #000000;\">In <strong data-start=\"3130\" data-end=\"3158\">ByLock investigations<\/strong>, server connections are technically verified through these records.<\/span><\/p><hr class=\"\" data-start=\"2875\" data-end=\"2878\"><h2 class=\"\" data-start=\"3249\" data-end=\"3304\"><span style=\"color: #000000;\">Supreme Court ByLock Decisions and Evidence Evaluation<\/span><\/h2><p class=\"\" data-start=\"3306\" data-end=\"3442\"><span style=\"color: #000000;\">In recent Supreme Court decisions regarding ByLock cases, it has been emphasized that CGNAT data alone cannot be sufficient evidence, and must be accompanied by:<\/span><\/p><ul data-start=\"3444\" data-end=\"3599\"><li class=\"\" data-start=\"3444\" data-end=\"3469\"><p class=\"\" data-start=\"3446\" data-end=\"3469\"><span style=\"color: #000000;\"><strong data-start=\"3446\" data-end=\"3466\">IP log records<\/strong>,<\/span><\/p><\/li><li class=\"\" data-start=\"3470\" data-end=\"3516\"><p class=\"\" data-start=\"3472\" data-end=\"3516\"><span style=\"color: #000000;\"><strong data-start=\"3472\" data-end=\"3513\">User identity (UserID) matches<\/strong>,<\/span><\/p><\/li><li class=\"\" data-start=\"3517\" data-end=\"3599\"><p class=\"\" data-start=\"3519\" data-end=\"3599\"><span style=\"color: #000000;\"><strong data-start=\"3519\" data-end=\"3563\">Physical findings obtained from the device<\/strong>.<\/span><\/p><\/li><\/ul><p class=\"\" data-start=\"3601\" data-end=\"3709\"><span style=\"color: #000000;\">Therefore, it is crucial that all data used in judicial processes be based on scientific analysis.<\/span><\/p><h2 class=\"\" data-start=\"3716\" data-end=\"3766\"><span style=\"color: #000000;\">Expert Support in Digital Forensics and ByLock Analysis<\/span><\/h2><p class=\"\" data-start=\"3768\" data-end=\"3919\"><span style=\"color: #000000;\">In technical accusations like ByLock, without proper analysis, there is a risk of prosecution with illegal evidence. As <a style=\"color: #000000;\" href=\"\/\">DNA Criminal and Digital Forensics<\/a>, we:<\/span><\/p><ul data-start=\"3921\" data-end=\"4116\"><li class=\"\" data-start=\"3921\" data-end=\"3983\"><p class=\"\" data-start=\"3923\" data-end=\"3983\"><span style=\"color: #000000;\">Perform detailed data analysis with digital forensics engineering,<\/span><\/p><\/li><li class=\"\" data-start=\"3984\" data-end=\"4054\"><p class=\"\" data-start=\"3986\" data-end=\"4054\"><span style=\"color: #000000;\">Examine investigation-related digital data using scientific methods,<\/span><\/p><\/li><li class=\"\" data-start=\"4055\" data-end=\"4116\"><p class=\"\" data-start=\"4057\" data-end=\"4116\"><span style=\"color: #000000;\">Prepare court-admissible <strong data-start=\"4079\" data-end=\"4102\">expert reports<\/strong>.<\/span><\/p><\/li><li data-start=\"4055\" data-end=\"4116\"><p><span style=\"color: #000000;\">Technical Report is also presented with <strong>Legal DEFENSE<\/strong>.<\/span><\/p><\/li><li data-start=\"4055\" data-end=\"4116\"><p><span style=\"color: #000000;\">Technical and legal examination of cases requires a careful and meticulous process. For the best SOLUTION and RESULT-ORIENTED examination of your problems <em>under expert guidance<\/em>, you can contact us 24\/7 for Next Generation Criminal Solutions <em>and consulting (WhatsApp<\/em> 552 676 11 00<em>)<\/em>. <\/span><\/p><\/li><\/ul><hr class=\"\" data-start=\"3170\" data-end=\"3173\"><h2 class=\"\" data-start=\"3175\" data-end=\"3197\"><span style=\"color: #000000;\">Why DNA Criminal and Digital Forensics?<\/span><\/h2><p><span style=\"color: #000000;\">\u2705 Expert technical consulting in ByLock cases<\/span><br data-start=\"4196\" data-end=\"4199\"><span style=\"color: #000000;\">\u2705 Scientific analysis of CGNAT, CDR, and GPRS data<\/span><br data-start=\"4252\" data-end=\"4255\"><span style=\"color: #000000;\">\u2705 Evidence evaluation in accordance with Supreme Court precedents<\/span><br data-start=\"4309\" data-end=\"4312\"><span style=\"color: #000000;\">\u2705 Impartial and technical expert reports<\/span><br data-start=\"4356\" data-end=\"4359\"><span style=\"color: #000000;\">\u2705 Detailed examination against technical traps such as ByLock, Mor Beyin, VPN routing<\/span><\/p><p><span style=\"color: #000000;\">\u2705 Preparation of court-admissible expert reports<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0dc2158 e-flex e-con-boxed e-con e-parent\" data-id=\"0dc2158\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b4fe18 elementor-widget elementor-widget-image\" data-id=\"0b4fe18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"371\" src=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/bylock.webp\" class=\"attachment-full size-full wp-image-5716\" alt=\"Bylock Application\" srcset=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/bylock.webp 660w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/bylock-300x169.webp 300w\" sizes=\"(max-width: 660px) 100vw, 660px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b340e5 e-flex e-con-boxed e-con e-parent\" data-id=\"7b340e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4eb357 elementor-widget elementor-widget-text-editor\" data-id=\"b4eb357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #000000;\">Frequently Asked Questions<\/span><\/h2><article class=\"text-token-text-primary w-full\" dir=\"auto\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"false\"><div class=\"text-base my-auto mx-auto py-5 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[72rem]:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto flex max-w-(--thread-content-max-width) flex-1 text-base gap-4 md:gap-5 lg:gap-6 group\/turn-messages focus-visible:outline-hidden\" tabindex=\"-1\"><div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"relative flex-col gap-1 md:gap-3\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"0cfc97ae-c5a1-4894-9893-efdc8fb48f72\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light\"><h3 class=\"\" data-start=\"3777\" data-end=\"3840\"><span style=\"color: #000000;\">Can someone be accused without having ByLock installed on their device?<\/span><\/h3><p class=\"\" data-start=\"3842\" data-end=\"4000\"><span style=\"color: #000000;\">No. Without IP connection, registration (Register), user identity (UserID), and usage logs in the ByLock Server database, suspicion alone is not sufficient. <\/span><\/p><h3 class=\"\" data-start=\"4002\" data-end=\"4041\"><span style=\"color: #000000;\">How reliable are CGNAT records?<\/span><\/h3><p class=\"\" data-start=\"4043\" data-end=\"4211\"><span style=\"color: #000000;\">Operators are legally required to maintain these records. However, since the same IP address can be assigned to multiple users, <strong data-start=\"4163\" data-end=\"4188\">port number analysis<\/strong> is critically important. <\/span><\/p><hr class=\"\" data-start=\"4213\" data-end=\"4216\"><h3 data-start=\"4218\" data-end=\"4400\"><strong><span style=\"color: #000000;\">Frequently Asked Questions (FAQ)<\/span><\/strong><\/h3><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/article><article class=\"text-token-text-primary w-full\" dir=\"auto\" data-testid=\"conversation-turn-4\" data-scroll-anchor=\"true\"><div class=\"text-base my-auto mx-auto py-5 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[72rem]:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto flex max-w-(--thread-content-max-width) flex-1 text-base gap-4 md:gap-5 lg:gap-6 group\/turn-messages focus-visible:outline-hidden\" tabindex=\"-1\"><div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"relative flex-col gap-1 md:gap-3\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"c4a1dfbc-312e-4d44-840a-09a32fa1f984\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light\"><h3 class=\"\" data-start=\"330\" data-end=\"370\"><span style=\"color: #000000;\">1. <strong data-start=\"337\" data-end=\"368\">What is ByLock and what is it used for?<\/strong><\/span><\/h3><p class=\"\" data-start=\"371\" data-end=\"594\"><span style=\"color: #000000;\">ByLock is a mobile application that provides encrypted messaging and voice communication. It was actively used between 2014-2016. User identities and connections are stored encrypted on a special server.  <\/span><\/p><hr class=\"\" data-start=\"596\" data-end=\"599\"><h3 class=\"\" data-start=\"601\" data-end=\"660\"><span style=\"color: #000000;\">2. <strong data-start=\"608\" data-end=\"658\">How can it be determined if someone used ByLock?<\/strong><\/span><\/h3><p class=\"\" data-start=\"661\" data-end=\"873\"><span style=\"color: #000000;\">ByLock usage is determined through analysis of multiple technical evidence including CGNAT and GPRS records from BTK, IP log data from the ByLock server, user ID, and application remnants found on the device.<\/span><\/p><hr class=\"\" data-start=\"875\" data-end=\"878\"><h3 class=\"\" data-start=\"880\" data-end=\"927\"><span style=\"color: #000000;\">3. <strong data-start=\"887\" data-end=\"925\">What are CDR records and what are they used for?<\/strong><\/span><\/h3><p class=\"\" data-start=\"928\" data-end=\"1167\"><span style=\"color: #000000;\">CDR (Historical Traffic Search) records contain details such as time, duration, number, and base station information for calls made by a GSM subscriber. They are used for tracking person location and communication in judicial investigations. <\/span><\/p><hr class=\"\" data-start=\"1169\" data-end=\"1172\"><h3 class=\"\" data-start=\"1174\" data-end=\"1226\"><span style=\"color: #000000;\">4. <strong data-start=\"1181\" data-end=\"1224\">What are CGNAT records and why are they important?<\/strong><\/span><\/h3><p class=\"\" data-start=\"1227\" data-end=\"1500\"><span style=\"color: #000000;\">CGNAT is a system that assigns the same IP address to multiple users. Therefore, CGNAT records, which must be kept with port numbers, show which subscriber connected to which site and when through an IP. This is critical for identity verification in applications like ByLock.  <\/span><\/p><hr class=\"\" data-start=\"1502\" data-end=\"1505\"><h3 class=\"\" data-start=\"1507\" data-end=\"1570\"><span style=\"color: #000000;\">5. <strong data-start=\"1514\" data-end=\"1568\">Is it possible to appear in the system without using ByLock?<\/strong><\/span><\/h3><p class=\"\" data-start=\"1571\" data-end=\"1816\"><span style=\"color: #000000;\">Yes. Connections redirected to ByLock servers through VPN, shared network usage, or some mobile advertising SDKs can be detected. Therefore, connection alone is not considered definitive evidence; detailed technical analysis is required.  <\/span><\/p><hr class=\"\" data-start=\"1818\" data-end=\"1821\"><h3 class=\"\" data-start=\"1823\" data-end=\"1883\"><span style=\"color: #000000;\">6. <strong data-start=\"1830\" data-end=\"1881\">What can be understood from BTK CGNAT and GPRS records?<\/strong><\/span><\/h3><p class=\"\" data-start=\"1884\" data-end=\"2129\"><span style=\"color: #000000;\">These records reveal details such as which IP a user connected with, at what time, to which server, the IMEI information used, data package amount, and base station information. These records are used for verification in ByLock usage. <\/span><\/p><hr class=\"\" data-start=\"2131\" data-end=\"2134\"><h3 class=\"\" data-start=\"2136\" data-end=\"2213\"><span style=\"color: #000000;\">7. <strong data-start=\"2143\" data-end=\"2211\">Can someone be accused even if ByLock is not found on their phone?<\/strong><\/span><\/h3><p class=\"\" data-start=\"2214\" data-end=\"2462\"><span style=\"color: #000000;\">Even without the application installed, if server connections and registration processes are detected, usage claims can be made. However, these claims must be supported by technical data. Device examination, IP log record, and user ID matching must be performed.  <\/span><\/p><hr class=\"\" data-start=\"2464\" data-end=\"2467\"><h3 class=\"\" data-start=\"2469\" data-end=\"2559\"><span style=\"color: #000000;\">8. <strong data-start=\"2476\" data-end=\"2557\">Do you provide digital forensics support to people accused of using ByLock?<\/strong><\/span><\/h3><p class=\"\" data-start=\"2560\" data-end=\"2791\"><span style=\"color: #000000;\">Yes. As DNA Criminal, we perform technical analysis of ByLock, CDR, CGNAT, and GPRS data with our digital forensics experts, prepare expert reports, and provide support for the evaluation of court-admissible evidence. <\/span><\/p><hr class=\"\" data-start=\"2793\" data-end=\"2796\"><h3 class=\"\" data-start=\"2798\" data-end=\"2860\"><span style=\"color: #000000;\">9. <strong data-start=\"2805\" data-end=\"2858\">What documents are required for ByLock examination?<\/strong><\/span><\/h3><ul data-start=\"2861\" data-end=\"3051\"><li class=\"\" data-start=\"2861\" data-end=\"2885\"><p class=\"\" data-start=\"2863\" data-end=\"2885\"><span style=\"color: #000000;\">Prosecutor&#8217;s indictment<\/span><\/p><\/li><li class=\"\" data-start=\"2886\" data-end=\"2922\"><p class=\"\" data-start=\"2888\" data-end=\"2922\"><span style=\"color: #000000;\">Reasoned court decision (if available)<\/span><\/p><\/li><li class=\"\" data-start=\"2923\" data-end=\"2967\"><p class=\"\" data-start=\"2925\" data-end=\"2967\"><span style=\"color: #000000;\">CGNAT, GPRS, CDR data from BTK<\/span><\/p><\/li><li class=\"\" data-start=\"2968\" data-end=\"3011\"><p class=\"\" data-start=\"2970\" data-end=\"3011\"><span style=\"color: #000000;\">ByLock Detection and Assessment Report<\/span><\/p><\/li><li class=\"\" data-start=\"3012\" data-end=\"3051\"><p class=\"\" data-start=\"3014\" data-end=\"3051\"><span style=\"color: #000000;\">GBS (Geographic Based Query) reports<\/span><\/p><\/li><\/ul><hr class=\"\" data-start=\"3053\" data-end=\"3056\"><h3 class=\"\" data-start=\"3058\" data-end=\"3118\"><span style=\"color: #000000;\">10. <strong data-start=\"3066\" data-end=\"3116\">Is a digital forensics report valid in court?<\/strong><\/span><\/h3><p class=\"\" data-start=\"3119\" data-end=\"3362\"><span style=\"color: #000000;\">Yes. Scientific and impartial digital forensics reports prepared by experts can be evaluated as evidence by courts. The methods used in the report, data sources, and technical analyses must be clearly stated.  <\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b410ef e-flex e-con-boxed e-con e-parent\" data-id=\"3b410ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-330469d elementor-widget elementor-widget-text-editor\" data-id=\"330469d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"western\" style=\"text-align: center; line-height: 150%; margin: 6.0pt 0cm 6.0pt 0cm;\" align=\"center\"><b><span style=\"font-size: 12.0pt; line-height: 150%; font-family: 'Times New Roman','serif'; color: #002060;\">DNA CRIMINAL and DIGITAL FORENSICS<\/span><\/b><\/h2><h3 style=\"text-align: center; line-height: 150%; margin: 6.0pt 0cm 6.0pt 0cm;\" align=\"center\"><b><span style=\"color: #00b050;\">Next Generation Criminal Solutions<\/span><\/b><\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2188\" src=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockResim-1-300x86.jpg\" alt=\"bylock investigation\" width=\"527\" height=\"151\" title=\"\" srcset=\"https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockResim-1-300x86.jpg 300w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockResim-1-1024x295.jpg 1024w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockResim-1-768x221.jpg 768w, https:\/\/kriminalbilisim.com\/wp-content\/uploads\/2025\/05\/BylockResim-1.jpg 1230w\" sizes=\"(max-width: 527px) 100vw, 527px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Contents ByLock Examination and Digital Forensics Solutions with CDR, CGNAT, GPRS Data Digital Evidence Analysis with Next Generation Criminal Solutions ByLock Evidence Analysis and Digital Forensics Reports | Scientific and Impartial Examination Get expert digital forensics consulting on ByLock Investigations, ByLock detection, User ID deficiency, CDR analyses, and digital evidence validity. Strengthen your defense with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5715","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/comments?post=5715"}],"version-history":[{"count":0,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5715\/revisions"}],"wp:attachment":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media?parent=5715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}