Bylock Uygulaması Teknik Raporunu

Total Page:16

File Type:pdf, Size:1020Kb

Bylock Uygulaması Teknik Raporunu ByLock Uygulaması Teknk Raporunu İNCELEME RAPORU İÇİNDEKİLER TANIMLAR VE KISALTMALAR .......................................................................................6 1. GİRİŞ ...................................................................................................................................7 2. BYLOCK UYGULAMASI ...............................................................................................8 BYLOCK NEDİR?............................................................................................................................8 KRONOLOJİ .....................................................................................................................................8 3. MİT’İN BYLOCK RAPORU’NDAKİ ÇELİŞKİLER ..............................................10 3.1. KRİPTOSUZ HABERLEŞME UYGULAMASİ OLUR MU? .............................................10 9 adet IP adresine ait TLS sertifikaları bulunmuştur..................................................................11 ByLock programında uluslararası SSL güvenlik sertifikası kullanmadığı...................................11 Uygulamay kayıt anında kullanıcı adının bizzat temin edilmesinin gerekmesi............................11 Uygulamada sesli arama, mesaj, mail gibi ihtiyaçlar karşılandığı için örgüy üyeleri başka bir yazılıma ıhtıyaç duymuyorlar.......................................................................................................12 ByLock uygulaması mesajları otomatik olarak silme özelliğine haizdir......................................12 Kullanıcılar çok uzun haneli parolalar girerek kendilerini gizliyorlar........................................13 ByLock programı belli bir süre sonra Apple Store ve Google Play Store’den kalktığı için kullanıcılar kendilerini gizlemeyi amaçlamışlardır.........................................................................................14 3.2 GİZLİLİK KONUSU................................................................................................................15 3.3. KULLANICI ŞİFRELERİNİ ÇÖZMEK YILLAR ALIR ......................................................20 3.4. BYLOCK SUNUCULARININ ELDE EDİLME YÖNTEMİ USULSÜZ MÜ? ...................21 3.5. BYLOCK İSTİSNA BÎR UYGULAMA Mİ? .........................................................................22 3.6. ANONİMLİK ............................................................................................................................23 3.7. IP KİRALAMA İŞLEMLERİNİN PAYSERA İLE YAPILMASI...........................................24 3.8. İNDİRME VE KULLANMA KARMAŞASİ ..........................................................................25 3.9 IP ÇAKIŞMASI.........................................................................................................................26 3.10. SUNUCU ANALİZLERİ TÜRKÇE KODLARIN BULUNMASI.................................27 3.11. ÇÖZÜMLENEN İÇERİKLERİN TÜRKÇE OLMASI.....................................................27 3.12. KULLANICI ADLARININ TÜRKÇE OLMASI .............................................................28 3.13. SESLİ İLETİŞİM İÇERİĞİ YOK ....................................................................................29 3.14. ANLIK MESAJ İÇERİKLERİ ............................................................................................29 Örnek Mesaj İçerikleri Verinin Tam Bir Örneklemi ...................................................................29 İçerikler 110 Günlük: Kasım 2015 - Şubat 2016 .........................................................................31 3.15. LOG TABLOSU ...................................................................................................................32 3.15.1. Aralık 2015 Öncesi Log Kayıtları Yok ..............................................................................33 3.15.2. IP lerin Tamamına Yakını Yurtdışı Kaynaklı ....................................................................33 3.15.3 Uygulama Loglarından Kimlik Tespiti Sorunları .........................................................36 3.16. RAPORDAKİ SON DEĞERLENDİRME ........................................................................37 ByLock İncelenmesi İçin Bağımsız Bilirkişilere Neden Gönderilmeli? .......................................38 2 4. BYLOCK UYGULAMASIYLA İLGİLİ HABERLER ...........................................39 4.1 BASIN VE YAYIN ORGANLARINDA MAHKEME VE KAMUOYUNU ETKİLEMEYE YÖNELİK ÇIKAN EN MEŞHUR HABERLER ........................................................................39 4.1.1 ByLock’u CIA kendi için yazdı, sonra FETÖ’ye verdi, sunucu Amerika’da .......................39 4.1.2. Veritabanı (sunucu) Kanada’da .......................................................................................39 4.1.3. ByLock sunucusu Litvanya’da; MİT, David Keynes’i uydurma sanmış ...........................39 4.1.4. Aydınlık gazetesinin haberine göre ..................................................................................39 4.1.5. Yeni Akit Gazetesinde çıkan haberde ise ...........................................................................40 4.1.6. 29.07.2016’da Wall Street Journal’de çıkan haber ..........................................................40 4.2 SOSYAL MEDYADA ÇIKAN HABERLER ...................................................................40 4.2.1 www.mynet.com isimli sitede çıkan haber ........................................................................40 4.3. DEĞİŞİK PARTİLERE MENSUP KİŞİLERCE YAPILAN AÇIKLAMALAR ..........40 4.3.1. ByLock’u CIA değil TÜBİTAK yazmış! .............................................................................40 4.3.2. Adalet Bakanı Bekir Bozdağ ise, ABD ziyaretinde yapmış olduğu açıklamada ................41 4.3.3. ‘Elim değdi indirdim, Apple Store’dan indirdim demeleri mümkün değil’ ........................41 4.3.4. “1 Dolar’ın seri numarası ByLock’a giriş şifresi” ............................................................41 4.3.5. CHP Bilgi ve İletişim Teknolojileri Genel Başkan Yardımcılığı’nın raporunda ...............41 5. HUKUKİ DURUM .........................................................................................................42 5.1 MİT TARAFINDAN ÇÖZÜLDÜĞÜ İDDİA EDİLEN BYLOCK İLETİŞİM BİLGİLERİ CEZA YARGILAMASINDA DELİL NİTELİĞİNİ TAŞIYOR MU?....................................42 5.1.1. İLETİŞİMİN DİNLENMESİ VE KAYDA ALINMASI .................................................42 Anayasa Mahkemesi’nin 2014/149 E – 151 K Sayılı Kararı .....................................................43 Anayasa Mahkemesi’nin 8.12.2015 Tarih Ve 2015/112 K Sayılı Kararı .....................................43 İstihbarî Bilginin Delil Niteliği Yok ...........................................................................................44 KANUNA AYKIRI BULGULAR DELİL OLARAK KABUL EDİLEMEZ ...........................45 Deliller Hukuka uygun yollarla elde edilmeli ...........................................................................46 Çelişmeli yargılama ve delillerin doğrudan doğruyalığı ilkeleri hk. Yargıtay İçtihatları .........47 Ceza Hukuku Profesörü ERSAN ŞEN’in mütalaası ...................................................................47 5.1.2. İLETİŞİMİN TESPİTİ .........................................................................................................48 “ByLock Modülüne” için mahkeme kararı ile bir delil toplama veya tespiti yoktur ..................49 Yargıtay Ceza Genel Kurulu’nun İletişimin Tespiti ve Fikir Özgürlüğü hk. İçtihatları .........50 6. ÖZETLE ...........................................................................................................................54 6.1. BYLOCK KULLANICI LİSTELERİNDEKİ BÜYÜK HATA ............................................54 6.2. NEDEN ERİŞİM SAĞLAYICILAR TARAFINDAN HER BİR IP ADRESİ İÇİN YÜZLER- CE KİŞİNİN İSMİ VERİLMİŞ VE BU DURUM KAMUOYUNDAN SAKLANMIŞTIR? .......55 6.3. BYLOCK PROGRAMININ DEĞERLENDİRMESİ ....................................................56 6.3.1 SADECE BELLİ BİR GRUBA (FETÖ/PDY) MI AİT? ................................................56 6.3.2 HABERLEŞME ÖZGÜRLÜĞÜ AÇISINDAN DEĞERLENDİRME .........................56 6.3.3 İNTERNET MESAJLAŞMA PROGRAMI OLARAK DEĞERLENDİRME .............57 a) Sunucu Bilgisayar (Server) açısından ....................................................................................57 b) Mobil Cihazlar Açısından ........................................................................................................57 6.3.4. ERİŞİM SAĞLAYICILAR AÇISINDAN DEĞERLENDİRME ...................................58 6.3.5. TELEKOMÜNİKASYON YOLUYLA İLETİŞİMİN DÜZENLENMESİNE İLİŞKİN 3 YÖNETMELİK KAPSAMINDA DEĞERLENDİRME ............................................................58 6.3.6 MİT’İN GÖREV ALANI AÇISINDAN DEĞERLENDİRME ......................................59 6.3.7 VERİ/DELİL GÜVENLİĞİ AÇISINDAN DEĞERLENDİRME ....................................59 Tersine Mühendislik ..................................................................................................................59 ByLock Sunucusunun Kırılması .................................................................................................59 6.4. BYLOCK KULLANICILARI TERÖR ÖRGÜTÜ ÜYESİ KABUL EDİLEBİLİR Mİ? ..60 7. SONUÇ VE DEĞERLENDİRME ..................................................................................62 8. TEVSİİ TAHKİKAT TALEBİ ........................................................................................64 KAYNAKLAR
Recommended publications
  • 2019 Tcc Flnaraujo.Pdf
    UNIVERSIDADE FEDERAL DO CEARÁ CAMPUS QUIXADÁ CENTRO DE REDES DE COMPUTADORES FRANCISCA LUZIA NOGUEIRA ARAÚJO ANÁLISE DE QoS EM APLICAÇÕES VoIP EM DISPOSITIVOS MÓVEIS QUIXADÁ 2019 FRANCISCA LUZIA NOGUEIRA ARAÚJO ANÁLISE DE QoS EM APLICAÇÕES VoIP EM DISPOSITIVOS MÓVEIS Trabalho de Conclusão de Curso submetido à Coordenação do Curso Superior de Tecnologia em Redes de Computadores da Universidade Federal do Ceará, como requisito parcial à obtenção do grau de Tecnóloga. Área de concentração: Computação. Orientador: Prof. Dr. Arthur de Castro Callado. QUIXADÁ 2019 Dados Internacionais de Catalogação na Publicação Universidade Federal do Ceará Biblioteca Universitária Gerada automaticamente pelo módulo Catalog, mediante os dados fornecidos pelo(a) autor(a) A689a Araújo, Francisca Luzia Nogueira. Análise de QoS em aplicações VoIP em dispositivos móveis / Francisca Luzia Nogueira Araújo. – 2019. 34 f. : il. color. Trabalho de Conclusão de Curso (graduação) – Universidade Federal do Ceará, Campus de Quixadá, Curso de Redes de Computadores, Quixadá, 2019. Orientação: Prof. Dr. Arthur de Castro Callado. 1. Quality of service. 2. Telefonia IP. 3. WhatsApp (Rede social on-line). 4. SOMA Messenger. 5. Avaliação perceptiva da qualidade da fala. I. Título. CDD 004.6 FRANCISCA LUZIA NOGUEIRA ARAÚJO ANÁLISE DE QoS EM APLICAÇÔES VoIP EM DISPOSITIVOS MÓVEIS Trabalho de Conclusão de Curso submetido à Coordenação do Curso Superior de Tecnologia em Redes de Computadores da Universidade Federal do Ceará, como requisito parcial à obtenção do grau de Tecnóloga. Área de concentração: Computação Aprovada em: ___/___/______. BANCA EXAMINADORA ________________________________________ Prof. Dr. Arthur de Castro Callado(Orientador) Universidade Federal do Ceará (UFC) _________________________________________ Prof. Me. Antonio Rafael Braga Universidade Federal do Ceará (UFC) _________________________________________ Prof.
    [Show full text]
  • ANNALISA ALBASINI Translator/Proofreader/Editor/SEO Specialist/QA Linguist – (English > Italian)
    ANNALISA ALBASINI Translator/Proofreader/Editor/SEO Specialist/QA Linguist – (English > Italian) Personal details Nationality: Italian E-mail: [email protected] VAT number: IT02053090227 LinkedIn: https://www.linkedin.com/in/annalisa-albasini-010b02a/ Personal profile I am an Italian mother tongue freelance translator, editor, SEO specialist and QA linguist (English >Italian) with 12 years’ full-time experience (7,000,000+ translated words) in fields better illustrated below. Professional experience -Website localization: website interfaces. Main projects: Delta Airlines (transportation and travel – 565,000 words), OneWorld Alliance (transportation and travel – 138,000 words), MotionPoint (computer science – 89,000 words), InterRail (transportation and travel – 146,000 words); Merrill Lynch (banking/finance – 90,000 words), Rosetta Stone (language learning – 38,000 words), OMatter (Oakley – eyewear – 174,000 words), Joint Commission International (medical/healthcare – 62,000 words), Nalco (water treatment and process improvement company – 104,000 words), OneSight (Luxottica Group Foundation – 11,000 words), Quest (IT/software – 36,000 words), Fitness Anywhere (sport – 22,000 words), Akamai (IT, 39,000 words), Citigroup (financial - 27,000 words), SkyTeam Alliance (transportation and travel – 88,000 words), Deckers (Teva/UGG Australia –fashion/e-commerce – 69,000 words), CIT Group (banking/finance - 19,000 words), ProTranslating (translation services - 11,000 words), TRW (Automotive - 9,000 words), Troll (Spanish Lighting Company –
    [Show full text]
  • Download Kakao Onto Pc Kakaostory for PC
    download kakao onto pc KakaoStory for PC. BrowserCam introduces Kakaostory for PC (computer) free download. Even if Kakaostory app is developed for the Android operating system in addition to iOS by Kakao Corporation. you possibly can install Kakaostory on PC for windows computer. Have you ever wondered how can one download Kakaostory PC? Dont worry, we shall break it down for you into straight forward steps. KakaoStory is a social networking platform and it has got a lot of active users from South Korea. So if you’re not a native of Korea, it’s time that you get connected with the Korean people by using the KakaoStory app on your Android devices. The Discover feature in this app is what we loved the most as it allows you explore new posts, stories and of course, new friends too. Well, who knows? You might find a loved one with the Discover feature in the KakaoStory app. So get ready to discover loads of creative content and new people in KakaoStory. The shooting mode in the app lets you make the images and videos appealing without leaving the app or using any other photo editing app. You can easily tweak the photos with stickers, filter, effects etc in the shooting mode. With this, you’ll get a better photo/video to add it on your posts and stories on the KakaoStory app. Feed option seems to be a bit complex, at least for us. Of course, we haven’t used the app much so it might be a different case with regular users.
    [Show full text]
  • Download Multii Mess 11.5
    Download multii mess 11.5 click here to download Yahoo messenger is an app meant to bring people together by the use of its easy to use messaging techniques. You need to have a yahoo id in order to use it. download yahoo multi messenger, yahoo multi messenger, yahoo multi messenger Yahoo Multi Messenger free hosted by Uptodown Download here. Multi Messenger 11 Download - Login to Multiple YM Accounts Tested on Yahoo Messenger us (April 12 ), 5 Yahoo. Free Download ym multi messenger patch - A multi Yahoo! Messenger patch for the ones that just cannot help it being restricted to just one. With Y!Multi Messenger you can start several sessions of Yahoo! Messenger. Download Y!Multi Messenger for free and use various accounts simultaneously. Download Y! Multi Messenger free. This application will allow you to run multiple instances of Yahoo! Messenger. Multi mess, în limajul deja împământenit printr utilizatorii de la noi, este un simplu program care ii permite unui utilizator sa deschida în acelaşi timp mai multe. YMulti Messenger (formerly Y! Multi Messenger) download page. Download Messenger ID's at the same time, using Yahoo Multi Messenger. Everyone knows what is Yahoo Multi Messenger and what is good, so do not go into details. Why use Yahoo Multi Messenger? For friends. Yahoo - MB (Freeware). Version: Size: MB. Date Added: May 31, License: Freeware. Languages: Multi-languages. Publisher. Download Yahoo Multi Messenger 9 and 8 Free. You can download Yahoo Multi Messenger 9.x and 8.x Free at the links that we give you below. Yahoo Messenger este unul dintre cele mai cunoscute programe gratuite de instant messaging avand foarte multi utilizatori in toata lumea.
    [Show full text]
  • Expert Witness Report on Bylock Investigation
    Expert Witness Report on ByLock Investigation 13 September 2017 Version: 1.0 Status: Final Pages: 33 Author: Fox-IT Classification: PUBLIC PUBLIC This document is classified as PUBLIC. Fox-IT BV Olof Palmestraat 6 2616 LM Delft Postbus 638 2600 AP Delft Nederland Telephone: +31 (0)15 284 7999 Fax: +31 (0)15 284 7990 E-mail: [email protected] Internet: www.fox-it.com Copyright © 2017 Fox-IT BV All rights reserved. No part of this document shall be reproduced, stored in a retrieval system or transmitted by any means without written permission from Fox-IT. Violations will be prosecuted by applicable law. The general service conditions of Fox-IT B.V. apply to this documentation. Trademark Fox-IT and the Fox-IT logo are trademarks of Fox-IT B.V. All other trademarks mentioned in this document are owned by the mentioned legacy body or organization. PUBLIC - 2 DOCUMENT MANAGEMENT Version Management Project name : BREEZEWOOD Subject : Expert witness report on ByLock investigation Date : 13 September 2017 Version : 1.0 Status : Final Authors : Fox-IT This version replaces all previous versions of this document. Please destroy all previous copies! PUBLIC - 3 TABLE OF CONTENTS 1 Introduction 5 2 Issues Addressed 6 3 Approach 7 3.1 Analysis of MIT investigation and report 7 3.2 Fact-checking 7 4 Findings 8 4.1 What is Fox-IT’s opinion on the investigation methodology used by MIT in the ByLock investigation? 8 4.1.1 Transparency and evidence authenticity 8 4.1.2 Application servers and the ByLock.net domain 9 4.1.3 Open-source research 10 4.1.4 Sub-conclusions
    [Show full text]
  • Mensajería Gratuita Y Grupal CIENCIA Y CIENCIA Y TECNOLOGÍA Llega a México SOMA Messenger
    CADA PÁGINA UN MUNDO Las plataformas del hartazgo INDIGNARSE, UN FENÓMENO VIRAL ¡Ya me cansé! #YACHOLE El Siglo de Torreón DIRECTORIO CARTA EDITORIAL DIRECTORA-FUNDADORA Olga de Juambelz y Horcasitas EDITOR Yohan Uribe Jiménez COEDITORA Jessica Ayala Barbosa COEDITORA DE FOTOGRAFÍA Aída Moya Ruelas COEDITOR GRÁFICO Amauri Solís Valadez facebook.com/RevistaSigloNuevo @Siglo_Nuevo [email protected] COLABORADORES Adela Celorio / Adriana Guadalupe Miranda Angélica López Gándara Antonio Álvarez Mesta / Cecilia Lavalle Christian Sida / Eduardo Valenzuela Fidencio Treviño Maldonado i bien es cierto que en el inter- Y es justo en esa última idea, Gaby Vargas / Iván Hernández Jesús Tovar / Liliana Ayala net y las redes sociales se en- la concepción de una voz colectiva, Marcela Pámanes / Mayra Villegas Burgette cuentran todo tipo de opinio- donde las redes sociales muestran Miguel Báez Durán / Paulina Hernández S nes, algunas acertadas, otras con su lado más atronador: un látigo Rafael Blando / Saúl Rodríguez Saúl Rosales / Sergio Sarmiento fundamento y muchas sin sentido, con miles de colas a la espera de Silvestre Faya / Víctor Félix el actuar de la vida pública nacional algún error, de algún traspié, de parece ser mejor medido a través la enésima muestra de incompe- PUBLICIDAD TORREÓN: Gustavo Torres de un meme que de una columna tencia, de la contradicción insul- Tel: (871) 711-30-80 Ext. 1208 de opinión. Y es que aunque la tante, del sinsentido galopante. El PUBLICIDAD DURANGO: mala declaración de un funcionario hartazgo nunca tuvo un espacio de Jorge Galaviz Tel: (618) 813-70-44 o la metida de pata del político desahogo tan adecuado como la red.
    [Show full text]
  • General Country of Origin Information Report Turkey
    General Country of Origin Information Report Turkey March 2021 Page 1 of 86 General Country of Origin Information Report | March 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 86 General Country of Origin Information Report | March 2021 Table of contents Publication details ............................................................................................2 Table of contents .............................................................................................3 Introduction ....................................................................................................6 1 Country information .................................................................................... 9 1.1 Introduction ....................................................................................................9 1.1.1 Political context ...............................................................................................9 1.1.2 Presidential decrees and student protest ............................................................9 1.1.3 Groups that attract negative attention.............................................................. 10 1.1.4 Economic downturn and the corona pandemic ................................................... 11 1.2 Security situation
    [Show full text]
  • Content Search Made Within the Disk Image of Phone Belonging to Taner KILIC and the Expert Opinion
    13/07/2017 Content Search Made within the Disk Image of Phone Belonging to Taner KILIC And the Expert Opinion Dear Atty. ..........................., This report is written following your request to detect whether the ByLock messaging application, which allegedly established connection over a line belonging to your client Taner Kilic, was installed to his phone, and whether there were traces of this application on the phone if the application was installed and removed. The findings of examination, technical information and other important issues are submitted for your review in this report. T. Koray Peksayar B.Sc. in Mechanical Eng. – M.Sc. in Information Tech. Information and Digital Forensic Expert – Chartered Judicial Expert ITU M.Sc. Dip. No. 76-387 Content Search Made within the Disc Image of Phone Belonging to Taner KILIC and the Expert Opinion - T. Koray Peksayar Page 1/40 About the Expert I was born in Istanbul in 1975. I completed the preparatory school, middle school and high school at Nişantaşı Anatolian High School. I graduated from Nişantaşı Anatolian High School Science-Mathematics branch. I completed my undergraduate education at Istanbul University, Faculty of Engineering, and Department of Mechanical Engineering. I received my graduate education on Information Technologies at Istanbul Technical University Informatics Institute. I began to work on electronics, computers and network systems as an amateur in my middle school years, and at the end of my high school years I started to work as a professional. During the last 3 years of my undergraduate education and during my graduate studies, I continued my professional work on computer and network systems.
    [Show full text]
  • Mobile Insights Quarter 3 - 2015
    Mobile Insights Quarter 3 - 2015 By: Deepti Chafekar & Hope Armstrong For any inquiries, email [email protected]. © Quettra, Inc. 2015 Contents Intro 4 Highlights 4 Methodology 5 Trends 6 Shopping Apps Continue to Rise Around the World 6 Selfie Apps Are Clicking in India and South America 9 Dubsmash Slowing Down in the USA and South America, Continues Growth in Asia 11 Facebook Lite is Gaining Traction in Africa, Asia and South America 14 Uber Dominates USA, Continues to Race With Ola in India 15 Dropbox Sees a Drop in USA and Asia 16 Agar.io is Conquering Cells Across the Globe 17 “Saga” Apps from King See a Surge in Installs in Europe 18 Rovio is Making a Global Comeback With Angry Birds 2 19 The State of Games: Casual Games Popular Worldwide 20 App Landscape Insights 21 Top Apps by Installs 22 Top Apps by Daily Active Usage 23 Top Paid Apps by Installs 24 Top Paid Apps by Daily Active Usage 25 Top Apps by Install Growth 26 Bottom Apps by Install Growth 27 Top Apps by Daily Usage Growth 28 Bottom Apps by Daily Usage Growth 29 quettra.com © Quettra 2015 | Q3 Report 2 Co-Used Apps 30 Region Insights 34 Top Apps in North America 35 Top Apps in Europe 36 Top Apps in Asia 37 Top Apps in South America 38 Top Categories by Installs per Region 40 Top Categories by Daily Active Users per Region 41 Category Insights 43 Top Categories by Installs 44 Top Categories by Daily Active Usage 45 Category Growth 46 Personas & Interests 49 Personas 50 Top Apps by Persona: Photo & Video Enthusiasts 51 Top Apps by Persona: Sports Fans 52 Top Apps by Persona: News & Magazine Readers 53 Top Apps by Persona: Casual & Social Gamers 54 Top Apps by Persona: Bargain Shoppers 55 Top Interests by Installs 56 Top Interests by Daily Active Usage 57 Conclusion 58 quettra.com © Quettra 2015 | Q3 Report 3 Intro This report analyzes the user/app relationship and identifies global and regional trends observed this Highlights quarter.
    [Show full text]
  • Globalwebindex Core Survey | Brand List Q1 2021
    GlobalWebIndex Core Survey | Brand List Q1 2021 LUXURY FASHION: ENGAGEMENT** ....... 57 TECHNOLOGY BRANDS: ENGAGEMENT** Contents LUXURY FASHION: ADVOCACY** ............ 57 ......................................................................... 90 RETAILERS** .................................................. 57 TECHNOLOGY BRANDS: AIRLINES: ENGAGEMENT** ....................... 68 CONSIDERATION** ...................................... 90 BANKS / FINANCIAL INSTITUTIONS: AIRLINES: ADVOCACY** ............................. 68 TECHNOLOGY BRANDS: ADVOCACY** .. 90 AWARENESS** ................................................ 3 AUTOMOTIVE: ENGAGEMENT** .............. 72 NAMED SOCIAL MEDIA SERVICES USED * BANKS / FINANCIAL INSTITUTIONS: AUTOMOTIVE: ADVOCACY** ................... 72 ......................................................................... 91 ENGAGEMENT** ............................................. 3 PAYMENT SERVICES .................................... 73 FAVORITE SOCIAL MEDIA SERVICE * ........ 91 BANKS / FINANCIAL INSTITUTIONS: NAMED WEBSITES AND APPS USED ........ 78 MUSIC SERVICES: ENGAGEMENT** .......... 92 ADVOCACY** .................................................. 3 PC / LAPTOP OPERATING SYSTEMS ......... 83 MUSIC SERVICES: ACCOUNT TYPE** ....... 93 SPORTING EVENTS & LEAGUES ................... 8 MOBILE OPERATING SYSTEMS* ................ 83 MUSIC SERVICES: ACCOUNT USAGE**.... 93 SPORTS TEAMS: EUROPEAN FOOTBALL / TABLET OPERATING SYSTEMS .................. 83 INTERNATIONAL TV CHANNEL SOCCER** .....................................................
    [Show full text]
  • Digital Ministry Atlas
    Digital Ministry Atlas The Digital Terrain in 40 of the Least Reached Countries Digital Ministry Atlas: The Digital Terrain in 40 of the Least Reached Countries Version 1.3 (Revised October, 2017) Mobile Ministry Forum (www.mobmin.org) Creative Commons Attribution-Share Alike 4.0 International License You are free to: • Share – copy and redistribute the material in any medium or format • Adapt – remix, transform, and build upon the material for any purpose, even commercially • The licensor cannot revoke these freedoms as long as you follow the license terms (see below) Under the following terms: • Attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in a way that suggests the licensor endorses you or your use • ShareAlike – If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the orginal. • No additional restrictions – You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. Table of Contents Average of Least Reached Countries ........................................................................................................................... 7 Afghanistan .................................................................................................................................................................. 8 Algeria ..........................................................................................................................................................................
    [Show full text]
  • Expert Witness Report on Bylock Investigation
    Expert Witness Report on ByLock Investigation 18 August 2017 Version: 0.1 Status: Draft Pages: 28 Reference: PR-160860 Principal: Fatih Sahinler Author: Ivo Pooters & Gina Doekhie Classification: COMMERCIAL.RESTRICTED COMMERCIAL.RESTRICTED This document is classified as COMMERCIAL.RESTRICTED. Any information published in this document and its appendices is intended exclusively for the addressee(s) as listed on the document management distribution list. Only these addressee(s) and additional persons explicitly granted permissions by any of these originally authorized addressee(s) may read this document. Any use by a party other than the addressee(s) is prohibited. The information contained in this document may be COMMERCIAL.RESTRICTED in nature and fall under a pledge of secrecy. If your name is not listed on the document management page or if you have not obtained the appropriate (written) authorization to read this document from an authorized addressee, you should close this document immediately and return it to its original owner. Misuse of this document or any of its information is prohibited and will be prosecuted to the maximum penalty possible. Fox-IT cannot be held responsible for any misconduct or malicious use of this document by a third party or damage caused by its contained information. Fox-IT BV Olof Palmestraat 6 2616 LM Delft Postbus 638 2600 AP Delft Nederland Telephone: +31 (0)15 284 7999 Fax: +31 (0)15 284 7990 E-mail: [email protected] Internet: www.fox-it.com Copyright © 2017 Fox-IT BV All rights reserved. No part of this document shall be reproduced, stored in a retrieval system or transmitted by any means without written permission from Fox-IT.
    [Show full text]