{"id":5726,"date":"2025-05-13T19:14:02","date_gmt":"2025-05-13T16:14:02","guid":{"rendered":"https:\/\/kriminalbilisim.com\/cybercrime\/"},"modified":"2025-09-23T00:59:29","modified_gmt":"2025-09-22T21:59:29","slug":"cybercrime","status":"publish","type":"page","link":"https:\/\/kriminalbilisim.com\/en\/cybercrime\/","title":{"rendered":"Cybercrime"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5726\" class=\"elementor elementor-5726 elementor-2200\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d8c356 e-flex e-con-boxed e-con e-parent\" data-id=\"4d8c356\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfc13d4 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"cfc13d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<div class=\"elementor-toc__header-title\">\n\t\t\t\tContents\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cfc13d4\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cfc13d4\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__cfc13d4\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49b15cd e-flex e-con-boxed e-con e-parent\" data-id=\"49b15cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cd7ad8 elementor-widget elementor-widget-text-editor\" data-id=\"4cd7ad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"576\" data-end=\"603\"><span style=\"color: #000000;\">What is Cybercrime?<\/span><\/h2><p data-start=\"604\" data-end=\"839\"><span style=\"color: #000000;\">While advancing technology and digitalization make life easier, they also provide new opportunities for individuals and groups intending to commit crimes. Therefore, traditional crimes are now being replaced by <strong data-start=\"784\" data-end=\"803\">cybercrime<\/strong> or <strong data-start=\"809\" data-end=\"825\">cyber offenses<\/strong>. <\/span><\/p><p data-start=\"841\" data-end=\"1005\"><span style=\"color: #000000;\"><strong>Cybercrime<\/strong> can be direct attacks on information systems, as well as indirect crimes where systems are used as tools.<\/span><\/p><hr data-start=\"1007\" data-end=\"1010\"><h2 data-start=\"1012\" data-end=\"1057\"><span style=\"color: #000000;\">How many Types of Cybercrime are there in Turkey?<\/span><\/h2><h3 data-start=\"1059\" data-end=\"1100\"><span style=\"color: #000000;\">1. Direct Cybercrime<\/span><\/h3><p data-start=\"1101\" data-end=\"1212\"><span style=\"color: #000000;\">It is regulated under the title &#8220;Crimes in the Field of Information Technology&#8221; in <a href=\"https:\/\/www.mevzuat.gov.tr\/mevzuat?MevzuatNo=5237&amp;MevzuatTur=1&amp;MevzuatTertip=5\" target=\"_blank\" rel=\"noopener nofollow\"><strong data-start=\"1101\" data-end=\"1127\">Turkish Criminal Code (TCK)<\/strong><\/a> with law number 5237:<\/span><\/p><ul data-start=\"1214\" data-end=\"1423\"><li data-start=\"1214\" data-end=\"1268\"><p data-start=\"1216\" data-end=\"1268\"><span style=\"color: #000000;\"><strong data-start=\"1216\" data-end=\"1234\">TCK Article 243:<\/strong> Unauthorized access to information systems<\/span><\/p><\/li><li data-start=\"1269\" data-end=\"1351\"><p data-start=\"1271\" data-end=\"1351\"><span style=\"color: #000000;\"><strong data-start=\"1271\" data-end=\"1289\">TCK Article 244:<\/strong> System interference, corruption, data destruction or alteration<\/span><\/p><\/li><li data-start=\"1352\" data-end=\"1423\"><p data-start=\"1354\" data-end=\"1423\"><span style=\"color: #000000;\"><strong data-start=\"1354\" data-end=\"1372\">TCK Article 245:<\/strong> Misuse of bank or credit cards<\/span><\/p><\/li><\/ul><p data-start=\"1425\" data-end=\"1440\"><span style=\"color: #000000;\"><strong data-start=\"1425\" data-end=\"1438\">Examples:<\/strong><\/span><\/p><ul data-start=\"1441\" data-end=\"1637\"><li data-start=\"1441\" data-end=\"1483\"><p data-start=\"1443\" data-end=\"1483\"><span style=\"color: #000000;\">Unauthorized access to social media accounts<\/span><\/p><\/li><li data-start=\"1484\" data-end=\"1522\"><p data-start=\"1486\" data-end=\"1522\"><span style=\"color: #000000;\">Theft or deletion of data<\/span><\/p><\/li><li data-start=\"1523\" data-end=\"1564\"><p data-start=\"1525\" data-end=\"1564\"><span style=\"color: #000000;\">Copying credit card information<\/span><\/p><\/li><li data-start=\"1565\" data-end=\"1592\"><p data-start=\"1567\" data-end=\"1592\"><span style=\"color: #000000;\">Bank account attacks<\/span><\/p><\/li><li data-start=\"1593\" data-end=\"1637\"><p data-start=\"1595\" data-end=\"1637\"><span style=\"color: #000000;\">Hijacking online gaming accounts<\/span><\/p><\/li><\/ul><p data-start=\"1639\" data-end=\"1756\"><span style=\"color: #000000;\">Since these crimes are considered &#8220;Crimes Against Society,&#8221; the Public Prosecutor&#8217;s Office initiates investigations ex officio.<\/span><\/p><hr data-start=\"1758\" data-end=\"1761\"><h3 data-start=\"1763\" data-end=\"1828\"><span style=\"color: #000000;\">2. Indirect Cybercrime (Crimes Committed Through Information Systems)<\/span><\/h3><p data-start=\"1829\" data-end=\"1916\"><span style=\"color: #000000;\">The target is not the information system itself, but the system is used as a tool to commit the crime.<\/span><\/p><p data-start=\"1918\" data-end=\"1933\"><span style=\"color: #000000;\"><strong data-start=\"1918\" data-end=\"1931\">Examples:<\/strong><\/span><\/p><ul data-start=\"1934\" data-end=\"2119\"><li data-start=\"1934\" data-end=\"1984\"><p data-start=\"1936\" data-end=\"1984\"><span style=\"color: #000000;\">Insult, threat, blackmail through social media<\/span><\/p><\/li><li data-start=\"1985\" data-end=\"2044\"><p data-start=\"1987\" data-end=\"2044\"><span style=\"color: #000000;\">Internet fraud (fake e-commerce sites, etc.)<\/span><\/p><\/li><li data-start=\"2045\" data-end=\"2119\"><p data-start=\"2047\" data-end=\"2119\"><span style=\"color: #000000;\"><strong data-start=\"2082\" data-end=\"2117\">Phishing attacks<\/strong> via email or message<\/span><\/p><\/li><\/ul><hr data-start=\"2121\" data-end=\"2124\"><h2 data-start=\"2126\" data-end=\"2169\"><span style=\"color: #000000;\">Where to Report Cybercrime?<\/span><\/h2><p data-start=\"2170\" data-end=\"2301\"><span style=\"color: #000000;\"><strong data-start=\"2170\" data-end=\"2207\">Collecting evidence before it disappears<\/strong> is crucial. It is recommended to get support from a <strong data-start=\"2246\" data-end=\"2269\">digital forensics expert<\/strong> in this process. <\/span><\/p><p data-start=\"2303\" data-end=\"2344\"><span style=\"color: #000000;\">Places where complaints can be filed:<\/span><\/p><ul data-start=\"2345\" data-end=\"2533\"><li data-start=\"2345\" data-end=\"2409\"><p data-start=\"2347\" data-end=\"2409\"><span style=\"color: #000000;\">Nearest <strong data-start=\"2356\" data-end=\"2377\">Police Department<\/strong> or <strong data-start=\"2383\" data-end=\"2407\">Gendarmerie Command<\/strong><\/span><\/p><\/li><li data-start=\"2410\" data-end=\"2486\"><p data-start=\"2412\" data-end=\"2486\"><span style=\"color: #000000;\"><strong data-start=\"2426\" data-end=\"2447\">Cybercrime Prosecutor&#8217;s Office<\/strong> at courthouses (or Duty Public Prosecutor&#8217;s Office if unavailable)<\/span><\/p><\/li><li data-start=\"2487\" data-end=\"2533\"><p data-start=\"2489\" data-end=\"2533\"><span style=\"color: #000000;\"><strong data-start=\"2489\" data-end=\"2531\">Cybercrime Investigation Department<\/strong><\/span><\/p><\/li><\/ul><hr data-start=\"2535\" data-end=\"2538\"><h2 data-start=\"2540\" data-end=\"2577\"><span style=\"color: #000000;\">Digital Forensics Expertise and Support<\/span><\/h2><p data-start=\"2578\" data-end=\"2731\"><span style=\"color: #000000;\">Digital forensics experts collect, analyze, and report digital evidence in accordance with the law. These reports can be used as evidence in legal proceedings. <\/span><\/p><p data-start=\"2733\" data-end=\"2896\"><span style=\"color: #000000;\">DNA Criminal and Digital Forensics Consultancy provides professional solutions to individuals and organizations regarding <strong data-start=\"2795\" data-end=\"2815\">digital security<\/strong> and <strong data-start=\"2819\" data-end=\"2850\">protection against cybercrime<\/strong>.<\/span><\/p><hr data-start=\"2898\" data-end=\"2901\"><h2 data-start=\"2903\" data-end=\"2953\"><span style=\"color: #000000;\">Frequently Asked Questions (FAQ) &#8211; Cybercrime<\/span><\/h2><p data-start=\"2955\" data-end=\"3058\"><span style=\"color: #000000;\"><strong data-start=\"2955\" data-end=\"2981\">1. What is cybercrime?<\/strong><\/span><br data-start=\"2981\" data-end=\"2984\"><span style=\"color: #000000;\">Crimes committed through computers, internet, or mobile devices.<\/span><\/p><p data-start=\"3060\" data-end=\"3109\"><span style=\"color: #000000;\"><strong data-start=\"3060\" data-end=\"3107\">2. What are the most common cybercrimes?<\/strong><\/span><\/p><ul data-start=\"3110\" data-end=\"3274\"><li data-start=\"3110\" data-end=\"3152\"><p data-start=\"3112\" data-end=\"3152\"><span style=\"color: #000000;\">Threats and insults through social media<\/span><\/p><\/li><li data-start=\"3153\" data-end=\"3184\"><p data-start=\"3155\" data-end=\"3184\"><span style=\"color: #000000;\">Credit card fraud<\/span><\/p><\/li><li data-start=\"3185\" data-end=\"3223\"><p data-start=\"3187\" data-end=\"3223\"><span style=\"color: #000000;\">Identity and account information theft<\/span><\/p><\/li><li data-start=\"3224\" data-end=\"3249\"><p data-start=\"3226\" data-end=\"3249\"><span style=\"color: #000000;\">Online fraud<\/span><\/p><\/li><li data-start=\"3250\" data-end=\"3274\"><p data-start=\"3252\" data-end=\"3274\"><span style=\"color: #000000;\">Phishing attacks<\/span><\/p><\/li><\/ul><p data-start=\"3276\" data-end=\"3393\"><span style=\"color: #000000;\"><strong data-start=\"3276\" data-end=\"3321\">3. Where can cybercrime be reported?<\/strong><\/span><br data-start=\"3321\" data-end=\"3324\"><span style=\"color: #000000;\">To the police, gendarmerie, prosecutor&#8217;s office, or Cybercrime Units.<\/span><\/p><p data-start=\"3395\" data-end=\"3441\"><span style=\"color: #000000;\"><strong data-start=\"3395\" data-end=\"3439\">4. <a href=\"https:\/\/www.mevzuat.gov.tr\/mevzuat?MevzuatNo=5237&amp;MevzuatTur=1&amp;MevzuatTertip=5\" target=\"_blank\" rel=\"noopener nofollow\">What are the penalties for cybercrime<\/a>?<\/strong><\/span><\/p><ul data-start=\"3442\" data-end=\"3619\"><li data-start=\"3442\" data-end=\"3501\"><p data-start=\"3444\" data-end=\"3501\"><span style=\"color: #000000;\"><strong data-start=\"3444\" data-end=\"3456\">TCK 243:<\/strong> Unauthorized system access \u2192 Up to 1 year imprisonment<\/span><\/p><\/li><li data-start=\"3502\" data-end=\"3558\"><p data-start=\"3504\" data-end=\"3558\"><span style=\"color: #000000;\"><strong data-start=\"3504\" data-end=\"3516\">TCK 244:<\/strong> Data destruction\/corruption \u2192 2-6 years imprisonment<\/span><\/p><\/li><li data-start=\"3559\" data-end=\"3619\"><p data-start=\"3561\" data-end=\"3619\"><span style=\"color: #000000;\"><strong data-start=\"3561\" data-end=\"3573\">TCK 245:<\/strong> Credit card fraud \u2192 3-6 years imprisonment<\/span><\/p><\/li><\/ul><p data-start=\"3621\" data-end=\"3754\"><span style=\"color: #000000;\"><strong data-start=\"3621\" data-end=\"3687\">5. Are threats or insults through social media considered cybercrime?<\/strong><\/span><br data-start=\"3687\" data-end=\"3690\"><span style=\"color: #000000;\">Yes. These acts fall under crimes committed through information systems. <\/span><\/p><p data-start=\"3756\" data-end=\"3809\"><span style=\"color: #000000;\"><strong data-start=\"3756\" data-end=\"3807\">6. What evidence is important in cybercrime cases?<\/strong><\/span><\/p><ul data-start=\"3810\" data-end=\"3928\"><li data-start=\"3810\" data-end=\"3846\"><p data-start=\"3812\" data-end=\"3846\"><span style=\"color: #000000;\">Screenshots (with date\/time)<\/span><\/p><\/li><li data-start=\"3847\" data-end=\"3877\"><p data-start=\"3849\" data-end=\"3877\"><span style=\"color: #000000;\">Email and message records<\/span><\/p><\/li><li data-start=\"3878\" data-end=\"3905\"><p data-start=\"3880\" data-end=\"3905\"><span style=\"color: #000000;\">Bank transaction records<\/span><\/p><\/li><li data-start=\"3906\" data-end=\"3928\"><p data-start=\"3908\" data-end=\"3928\"><span style=\"color: #000000;\">IP address logs<\/span><\/p><\/li><\/ul><p data-start=\"3930\" data-end=\"4085\"><span style=\"color: #000000;\"><strong data-start=\"3930\" data-end=\"3978\">7. My identity was stolen, what should I do?<\/strong><\/span><br data-start=\"3978\" data-end=\"3981\"><span style=\"color: #000000;\">Notify banks and institutions, cancel your cards, and file a complaint with the prosecutor&#8217;s office with evidence.<\/span><\/p><h2><span style=\"color: #000000;\">Contact<\/span><\/h2><p><span style=\"color: #000000;\"><strong><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f3af.svg\" alt=\"\ud83c\udfaf\" title=\"\"><\/strong>  For technical support, forensic reporting, and professional defense;<\/span><\/p><p data-start=\"1307\" data-end=\"1415\"><span style=\"color: #0000ff;\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e9.svg\" alt=\"\ud83d\udce9\" width=\"21\" height=\"21\" title=\"\"> <strong data-start=\"1388\" data-end=\"1415\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1390\" data-end=\"1413\">www.kriminalbilisim.com<\/a><\/strong><\/span><\/p><p data-start=\"1417\" data-end=\"1463\"><span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"https:\/\/api.whatsapp.com\/send\/?phone=905526761100&amp;text&amp;type=phone_number&amp;app_absent=0\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4de.svg\" alt=\"\ud83d\udcde\" width=\"24\" height=\"24\" title=\"\"><strong> 0552 676 11 00<\/strong><\/a> \u2013 <img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e7.svg\" alt=\"\ud83d\udce7\" width=\"22\" height=\"22\" title=\"\"> <a style=\"color: #0000ff;\" href=\"https:\/\/mail.google.com\/mail\/u\/0\/?fs=1&amp;tf=cm&amp;source=mailto&amp;to=dna@kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1440\" data-end=\"1463\">dna@kriminalbilisim.com<\/a> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Contents What is Cybercrime? While advancing technology and digitalization make life easier, they also provide new opportunities for individuals and groups intending to commit crimes. Therefore, traditional crimes are now being replaced by cybercrime or cyber offenses. Cybercrime can be direct attacks on information systems, as well as indirect crimes where systems are used as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6755,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5726","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/comments?post=5726"}],"version-history":[{"count":0,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media\/6755"}],"wp:attachment":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media?parent=5726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}