{"id":5869,"date":"2025-09-04T20:46:17","date_gmt":"2025-09-04T17:46:17","guid":{"rendered":"https:\/\/kriminalbilisim.com\/hts-analysis-in-digital-forensics\/"},"modified":"2025-09-23T01:00:48","modified_gmt":"2025-09-22T22:00:48","slug":"hts-analysis-in-digital-forensics","status":"publish","type":"page","link":"https:\/\/kriminalbilisim.com\/en\/hts-analysis-in-digital-forensics\/","title":{"rendered":"HTS Analysis in Digital Forensics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5869\" class=\"elementor elementor-5869 elementor-5053\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd660eb e-flex e-con-boxed e-con e-parent\" data-id=\"fd660eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-262ce4d elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"262ce4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<div class=\"elementor-toc__header-title\">\n\t\t\t\tContents\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__262ce4d\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__262ce4d\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__262ce4d\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66ad199 e-flex e-con-boxed e-con e-parent\" data-id=\"66ad199\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5bb4bef elementor-widget elementor-widget-text-editor\" data-id=\"5bb4bef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 data-start=\"209\" data-end=\"250\"><span style=\"color: #000000;\">Digital Forensics (Digital Evidence Examination)<\/span><\/h1><p data-start=\"251\" data-end=\"306\"><span style=\"color: #000000;\"><em data-start=\"251\" data-end=\"306\">We uncover digital traces using scientific methods.<\/em><\/span><\/p><p data-start=\"308\" data-end=\"874\"><span style=\"color: #000000;\"><strong>HTS Analysis in Digital Forensics<\/strong> is the process of examining digital traces from computers, mobile devices, networks, cloud, IoT, and enterprise systems using <strong data-start=\"413\" data-end=\"429\">legally compliant<\/strong>, <strong data-start=\"431\" data-end=\"450\">reproducible<\/strong>, and <strong data-start=\"454\" data-end=\"466\">scientific<\/strong> methods. As DNA Criminal &amp; Digital Forensics, <strong>HTS Analysis in Digital Forensics<\/strong> creates event timelines, analyzes relevant files and log records, and produces expert reports in areas such as <strong data-start=\"617\" data-end=\"647\">phone traffic analysis<\/strong>, <strong data-start=\"649\" data-end=\"684\">HTS (Communications Traffic Query)<\/strong>, and <strong data-start=\"688\" data-end=\"713\">cell tower analysis<\/strong>. Our goal is to contribute to <strong data-start=\"815\" data-end=\"826\">truth<\/strong> and the right to <strong data-start=\"830\" data-end=\"849\">fair trial<\/strong> by transforming complex data into comprehensible evidence.  <\/span><\/p><hr data-start=\"876\" data-end=\"879\"><h2 data-start=\"881\" data-end=\"905\"><span style=\"color: #000000;\">What is Digital Forensics?<\/span><\/h2><p data-start=\"906\" data-end=\"1200\"><span style=\"color: #000000;\"><strong>HTS Analysis in Digital Forensics<\/strong> covers the entire process of <strong data-start=\"939\" data-end=\"1013\">identification, acquisition (imaging), preservation, analysis, and reporting<\/strong> of digital evidence. These processes adhere to <strong data-start=\"1058\" data-end=\"1098\">chain of custody<\/strong> rules, GDPR, and relevant legislation, thus maintaining the <strong data-start=\"1163\" data-end=\"1191\">integrity and validity<\/strong> of evidence. <\/span><\/p><p data-start=\"1202\" data-end=\"1223\"><span style=\"color: #000000;\"><strong data-start=\"1202\" data-end=\"1223\">Examples of HTS Analysis in Digital Forensics Scope:<\/strong><\/span><\/p><ul data-start=\"1224\" data-end=\"1878\"><li data-start=\"1224\" data-end=\"1314\"><p data-start=\"1226\" data-end=\"1314\"><span style=\"color: #000000;\"><strong data-start=\"1226\" data-end=\"1260\">Computer and Server Examination:<\/strong> Disk imaging, file\/metadata analysis, log correlation<\/span><\/p><\/li><li data-start=\"1315\" data-end=\"1409\"><p data-start=\"1317\" data-end=\"1409\"><span style=\"color: #000000;\"><strong data-start=\"1317\" data-end=\"1342\">Mobile Device Examination:<\/strong> WhatsApp\/SMS records, application artifacts, location data<\/span><\/p><\/li><li data-start=\"1410\" data-end=\"1492\"><p data-start=\"1412\" data-end=\"1492\"><span style=\"color: #000000;\"><strong data-start=\"1412\" data-end=\"1436\">Network &amp; Cloud Examination:<\/strong> Firewall, proxy, VPN, and cloud access logs<\/span><\/p><\/li><li data-start=\"1493\" data-end=\"1596\"><p data-start=\"1495\" data-end=\"1596\"><span style=\"color: #000000;\"><strong data-start=\"1495\" data-end=\"1532\">HTS &amp; Phone Traffic Analysis:<\/strong> Call\/SMS traffic, relationship mapping, event time-focused analysis<\/span><\/p><\/li><li data-start=\"1597\" data-end=\"1680\"><p data-start=\"1599\" data-end=\"1680\"><span style=\"color: #000000;\"><strong data-start=\"1599\" data-end=\"1625\">Cell Tower Analysis:<\/strong> Location-focused assessment, coverage area examination<\/span><\/p><\/li><li data-start=\"1681\" data-end=\"1777\"><p data-start=\"1683\" data-end=\"1777\"><span style=\"color: #000000;\"><strong data-start=\"1683\" data-end=\"1725\">Malware Analysis:<\/strong> Infection vector, persistence mechanisms, IOCs<\/span><\/p><\/li><li data-start=\"1778\" data-end=\"1878\"><p data-start=\"1780\" data-end=\"1878\"><span style=\"color: #000000;\"><strong data-start=\"1780\" data-end=\"1814\">E-Discovery &amp; Email Analysis:<\/strong> Email headers, chain verification, keyword searches<\/span><\/p><\/li><\/ul><hr data-start=\"1880\" data-end=\"1883\"><h2 data-start=\"1885\" data-end=\"1931\"><span style=\"color: #000000;\">HTS Analysis in Digital Forensics, when is Digital Forensics Used?<\/span><\/h2><ul data-start=\"1932\" data-end=\"2392\"><li data-start=\"1932\" data-end=\"2028\"><p data-start=\"1934\" data-end=\"2028\"><span style=\"color: #000000;\"><strong data-start=\"1934\" data-end=\"1966\">Felony &amp; Organized Crime:<\/strong> Murder, fraud, cyber attacks, organized structures<\/span><\/p><\/li><li data-start=\"2029\" data-end=\"2118\"><p data-start=\"2031\" data-end=\"2118\"><span style=\"color: #000000;\"><strong data-start=\"2031\" data-end=\"2053\">Corporate Violations:<\/strong> Data leaks, employee misconduct, intellectual property infringement<\/span><\/p><\/li><li data-start=\"2119\" data-end=\"2214\"><p data-start=\"2121\" data-end=\"2214\"><span style=\"color: #000000;\"><strong data-start=\"2121\" data-end=\"2151\">Family Law\/Disputes:<\/strong> Digital evidence support in divorce, custody, compensation cases<\/span><\/p><\/li><li data-start=\"2215\" data-end=\"2305\"><p data-start=\"2217\" data-end=\"2305\"><span style=\"color: #000000;\"><strong data-start=\"2217\" data-end=\"2250\">Cyber Incident Response (DFIR):<\/strong> Breach detection, root cause analysis, damage scope<\/span><\/p><\/li><li data-start=\"2306\" data-end=\"2392\"><p data-start=\"2308\" data-end=\"2392\"><span style=\"color: #000000;\"><strong data-start=\"2308\" data-end=\"2340\">Missing Persons &amp; Threats\/Blackmail:<\/strong> Time-location intersections, communication intensity analysis<\/span><\/p><\/li><\/ul><hr data-start=\"2394\" data-end=\"2397\"><h2 data-start=\"2399\" data-end=\"2434\"><span style=\"color: #000000;\">HTS Analysis in Digital Forensics Process: Step by Step<\/span><\/h2><ol data-start=\"2435\" data-end=\"3134\"><li data-start=\"2435\" data-end=\"2544\"><p data-start=\"2438\" data-end=\"2544\"><span style=\"color: #000000;\"><strong data-start=\"2438\" data-end=\"2468\">Initial Assessment &amp; Scope:<\/strong> Legal requirements and technical objectives are determined; we clarify the question list.<\/span><\/p><\/li><li data-start=\"2545\" data-end=\"2681\"><p data-start=\"2548\" data-end=\"2681\"><span style=\"color: #000000;\"><strong data-start=\"2548\" data-end=\"2585\">Forensic Acquisition:<\/strong> Device\/media is imaged at bit level <strong data-start=\"2598\" data-end=\"2615\">without modification<\/strong>; integrity is verified with hash values.<\/span><\/p><\/li><li data-start=\"2682\" data-end=\"2769\"><p data-start=\"2685\" data-end=\"2769\"><span style=\"color: #000000;\"><strong data-start=\"2685\" data-end=\"2696\">Preservation:<\/strong> Evidence is sealed, storage procedures and access logs are maintained.<\/span><\/p><\/li><li data-start=\"2770\" data-end=\"2922\"><p data-start=\"2773\" data-end=\"2922\"><span style=\"color: #000000;\"><strong data-start=\"2773\" data-end=\"2784\">Analysis:<\/strong> Methods such as timeline analysis, artifact analysis, log correlation, communication network, and <strong data-start=\"2864\" data-end=\"2894\">phone traffic examination<\/strong> are applied.<\/span><\/p><\/li><li data-start=\"2923\" data-end=\"3041\"><p data-start=\"2926\" data-end=\"3041\"><span style=\"color: #000000;\"><strong data-start=\"2926\" data-end=\"2940\">Reporting:<\/strong> Findings are presented <strong data-start=\"3006\" data-end=\"3030\">in expert format<\/strong> with tables, graphs, maps, and screenshots.<\/span><\/p><\/li><li data-start=\"3042\" data-end=\"3134\"><p data-start=\"3045\" data-end=\"3134\"><span style=\"color: #000000;\"><strong data-start=\"3045\" data-end=\"3062\">Expert Opinion:<\/strong> Technical explanation and visual presentation support is provided in court when necessary.<\/span><\/p><\/li><\/ol><p data-start=\"3136\" data-end=\"3257\"><span style=\"color: #000000;\"><strong data-start=\"3136\" data-end=\"3149\">Outputs:<\/strong> Event timeline, file\/directory evidence, user actions, location-communication matches, risks and recommendations.<\/span><\/p><hr data-start=\"3259\" data-end=\"3262\"><h2 data-start=\"3264\" data-end=\"3303\"><span style=\"color: #000000;\">Why DNA Criminal &amp; Digital Forensics for HTS Analysis in Digital Forensics?<\/span><\/h2><ul data-start=\"3304\" data-end=\"3752\"><li data-start=\"3304\" data-end=\"3404\"><p data-start=\"3306\" data-end=\"3404\"><span style=\"color: #000000;\"><strong data-start=\"3306\" data-end=\"3342\">Scientific and Technological Approach:<\/strong> Current forensic tools and methodologies, reproducible processes<\/span><\/p><\/li><li data-start=\"3405\" data-end=\"3496\"><p data-start=\"3407\" data-end=\"3496\"><span style=\"color: #000000;\"><strong data-start=\"3407\" data-end=\"3423\">Legal Compliance:<\/strong> Full compliance with GDPR and relevant legislation; evidence integrity and chain of custody<\/span><\/p><\/li><li data-start=\"3497\" data-end=\"3589\"><p data-start=\"3499\" data-end=\"3589\"><span style=\"color: #000000;\"><strong data-start=\"3499\" data-end=\"3515\">Expert Staff:<\/strong> Experienced team from telecom, cybersecurity, and digital forensics disciplines<\/span><\/p><\/li><li data-start=\"3590\" data-end=\"3675\"><p data-start=\"3592\" data-end=\"3675\"><span style=\"color: #000000;\"><strong data-start=\"3592\" data-end=\"3615\">Comprehensible Reports:<\/strong> Clear language for judges-prosecutors-lawyers, visually-focused presentation<\/span><\/p><\/li><li data-start=\"3676\" data-end=\"3752\"><p data-start=\"3678\" data-end=\"3752\"><span style=\"color: #000000;\"><strong data-start=\"3678\" data-end=\"3699\">Speed &amp; Reliability:<\/strong> We manage processes without delay and preserve evidential value<\/span><\/p><\/li><\/ul><blockquote data-start=\"3754\" data-end=\"3802\"><p data-start=\"3756\" data-end=\"3802\"><span style=\"color: #000000;\"><em data-start=\"3756\" data-end=\"3802\">&#8220;We trace the truth through <strong>digital forensics<\/strong>.&#8221;<\/em><\/span><\/p><\/blockquote><hr data-start=\"3804\" data-end=\"3807\"><h2 data-start=\"3809\" data-end=\"3839\"><span style=\"color: #000000;\">HTS Analysis in Digital Forensics, Frequently Asked Questions (FAQ)<\/span><\/h2><p data-start=\"3841\" data-end=\"4059\"><span style=\"color: #000000;\"><strong data-start=\"3841\" data-end=\"3864\">What is digital forensics?<\/strong><\/span><br data-start=\"3864\" data-end=\"3867\"><span style=\"color: #000000;\">It is the legal acquisition, preservation, analysis, and reporting of digital evidence. It covers areas such as computer, mobile device, network, cloud, and <strong data-start=\"4007\" data-end=\"4037\">phone traffic examination<\/strong>. <\/span><\/p><p data-start=\"4061\" data-end=\"4242\"><span style=\"color: #000000;\"><strong data-start=\"4061\" data-end=\"4100\">Can deleted data be recovered?<\/strong><\/span><br data-start=\"4100\" data-end=\"4103\"><span style=\"color: #000000;\">It&#8217;s possible; depends on device type, file system, and overwrite status. Highest success is targeted using forensically-sound methods. <\/span><\/p><p data-start=\"4244\" data-end=\"4463\"><span style=\"color: #000000;\"><strong data-start=\"4244\" data-end=\"4286\">Can WhatsApp\/application contents be retrieved?<\/strong><\/span><br data-start=\"4286\" data-end=\"4289\"><span style=\"color: #000000;\">Application data (databases, media, notification artifacts) can be analyzed depending on device and backup status. HTS records contain <strong data-start=\"4437\" data-end=\"4447\">traffic<\/strong> information, not content. <\/span><\/p><p data-start=\"4465\" data-end=\"4619\"><span style=\"color: #000000;\"><strong data-start=\"4465\" data-end=\"4512\">Does cell tower analysis provide exact addresses?<\/strong><\/span><br data-start=\"4512\" data-end=\"4515\"><span style=\"color: #000000;\">Not exact addresses, but provides <strong data-start=\"4534\" data-end=\"4551\">coverage area<\/strong> and possible region information. Interpreted together with other evidence. <\/span><\/p><p data-start=\"4621\" data-end=\"4808\"><span style=\"color: #000000;\"><strong data-start=\"4621\" data-end=\"4666\">Is a digital forensics report valid in court?<\/strong><\/span><br data-start=\"4666\" data-end=\"4669\"><span style=\"color: #000000;\">When the process follows legal and standard procedures, with complete imaging, hash verification, and reporting steps, the report carries evidential value.<\/span><\/p><p data-start=\"4810\" data-end=\"4972\"><span style=\"color: #000000;\"><strong data-start=\"4810\" data-end=\"4847\">How are duration and cost determined?<\/strong><\/span><br data-start=\"4847\" data-end=\"4850\"><span style=\"color: #000000;\">Device quantity, data volume, encryption status, and legal scope are factors. Plan and proposal are shared after initial assessment. <\/span><\/p><h2><span style=\"color: #000000;\">Contact<\/span><\/h2><p><span style=\"color: #000000;\"><strong><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f3af.svg\" alt=\"\ud83c\udfaf\" title=\"\"><\/strong>  For technical support, forensic reporting, and professional defense;<\/span><\/p><p data-start=\"1307\" data-end=\"1415\"><span style=\"color: #0000ff;\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e9.svg\" alt=\"\ud83d\udce9\" width=\"21\" height=\"21\" title=\"\"> <strong data-start=\"1388\" data-end=\"1415\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1390\" data-end=\"1413\">www.kriminalbilisim.com<\/a><\/strong><\/span><\/p><p data-start=\"1417\" data-end=\"1463\"><span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"https:\/\/api.whatsapp.com\/send\/?phone=905526761100&amp;text&amp;type=phone_number&amp;app_absent=0\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4de.svg\" alt=\"\ud83d\udcde\" width=\"24\" height=\"24\" title=\"\"><strong> 0552 676 11 00<\/strong><\/a> \u2013 <img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e7.svg\" alt=\"\ud83d\udce7\" width=\"22\" height=\"22\" title=\"\"> <a style=\"color: #0000ff;\" href=\"https:\/\/mail.google.com\/mail\/u\/0\/?fs=1&amp;tf=cm&amp;source=mailto&amp;to=dna@kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1440\" data-end=\"1463\">dna@kriminalbilisim.com<\/a> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Contents Digital Forensics (Digital Evidence Examination) We uncover digital traces using scientific methods. HTS Analysis in Digital Forensics is the process of examining digital traces from computers, mobile devices, networks, cloud, IoT, and enterprise systems using legally compliant, reproducible, and scientific methods. As DNA Criminal &amp; Digital Forensics, HTS Analysis in Digital Forensics creates event [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5780,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5869","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/comments?post=5869"}],"version-history":[{"count":0,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5869\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media\/5780"}],"wp:attachment":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media?parent=5869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}