logo
Individual Application Türkçe

(Ferhat Kara [GK], B. No: 2018/15231, 4/6/2020, § …)
The decisions and judgments made available via the
Decisions/Judgments Database may be subject to editorial revision.
   


 

 

 

 

REPUBLIC OF TURKEY

CONSTITUTIONAL COURT

 

 

PLENARY

 

JUDGMENT

 

FERHAT KARA

(Application no. 2018/15231)

 

4 June 2020

 

PLENARY

 

JUDGMENT

 

 

President       

:

Zühtü ARSLAN

Vice President                       

:

Hasan Tahsin GÖKCAN

Vice President                       

:

Kadir ÖZKAYA

Justices          

:

Serdar ÖZGÜLDÜR

 

 

Burhan ÜSTÜN

 

 

Engin YILDIRIM

 

 

Hicabi DURSUN

 

 

Celal Mümtaz AKINCI

 

 

Muammer TOPAL

 

 

M. Emin KUZ

 

 

Rıdvan GÜLEÇ

 

 

Recai AKYEL

 

 

Yusuf Şevki HAKYEMEZ

 

 

Yıldız SEFERİNOĞLU

 

 

Selahaddin MENTEŞ

Rapporteurs 

:

Akif YILDIRIM

 

 

Hüseyin Özgür SEVİMLİ

 

 

Aydın ŞİMŞEK

Applicant      

:

Ferhat KARA

 

I. SUBJECT-MATTER OF THE APPLICATION

1. The application concerns the alleged violation of the right to a fair trial on the ground that the data obtained from the ByLock application had been collected illegally and was relied on as a sole or decisive evidence for the applicant’s conviction and that the relevant digital data were not brought before the court.

II. APPLICATION PROCESS

2. The application was lodged on 20 April 2018.

3. The application was submitted to the Commission after the preliminary examination of the application form and annexes thereto under administrative procedure.

4. The Commission declared the application inadmissible in so far as it was related to the allegations other than the alleged violation of the right to a fair trial. The Commission also held that the examination as to the admissibility of the relevant part of the application be carried out by the Section and that the applicant’s request for legal aid be accepted.

5. The Presiding Judge of the Section decided that the examination on the admissibility and merits of the application be made concurrently.

6. A copy of the application was sent to the Ministry of Justice (“the Ministry”) in order to receive its observations on the application. The Ministry submitted its observations.

7. The applicant submitted his counter-statements in time.

8. The First Section decided to relinquish jurisdiction in favour of the Plenary pursuant to Article 28 § 3 of the Internal Regulations of the Court (“Internal Regulations”).

III. THE FACTS

9. As stated in the application form and annexes thereto and in accordance with the information and documents available on the National Judiciary Informatics System (“the UYAP”), the facts of the case may be summarized as follows:

A. Overview

1. Activities and Characteristics of the Fetullahist Terrorist Organisation/Parallel State Structure

10. In Turkey, there is a structure established by Fetullah Gülen, which has been operating since 1960s. It has been defined as a religious group until recent years and called by the names such as “the Community”, “the Gülen’s Community”, “the Fetullah Gülen’s Community”, “the Hizmet Movement”, “the Volunteers’ Movement” and “the Fellowship” (see Aydın Yavuz and Others [Plenary], no. 2016/22169, 20 June 2017, § 22).

11. The impugned structure was organised especially in public institutions and organisations. In addition, it carried out legitimate activities in different social, cultural and economic fields, especially in terms of education and religion. As part of these activities, it operated private teaching institutions, schools, universities, associations, foundations, trade unions, professional chambers, economic foundations, financial institutions, newspapers, journals, TV channels, radio channels, web-sites and hospitals, thereby became considerably effective in the civilian sphere. Besides, this is an illegal structure either hidden behind these legal institutions or organised and operated separately and independently from the legal structure, especially carrying out activities in public sphere (see Aydın Yavuz and Others, § 26; and Mustafa Baldır, no. 2016/29354, 4 April 2018, § 75).

12. On the other hand, many investigations and prosecutions have been carried out especially after 2013 regarding the organisation and activities of this structure, since its actions and activities have been, for a long time, a matter of debate in society. In this scope, it has been found that the members of this structure, in accordance with the purpose of the structure, committed acts such as destroying evidence, wiretapping the phones of public institutions and high-level State officials, disclosing State’s intelligence activities, obtaining questions in advance of the exams held for employment or promotion in public institutions and distributing these questions to its members. In the relevant investigation and prosecution documents, this structure has been referred to as “the Fetullahist Terrorist Organisation” (“the FETÖ”) and/or “the Parallel State Structure” (“the PDY”) (see Aydın Yavuz and Others, §§ 22, 27).

13. In the investigations and prosecutions within the scope of which hundreds of persons were detained on remand, it has been indicated that the FETÖ/PDY is a terrorist organisation, and it has been claimed that the persons against whom legal action has been taken would be sentenced for the offences of, inter alia, “establishing, managing or being a member of an armed terrorist organisation” and “attempting to overthrow the Government of the Republic of Turkey or to prevent it from performing its duties”, as well as some other offences (see Aydın Yavuz and Others, § 28).

14. In this context, it has been asserted that many cases leading to intense public debates such as “Şemdinli”, “Ergenekon”, “Balyoz (Sledgehammer)”, “Askeri Casusluk (Military Spying)”, “Devrimci Karargah (Revolutionist Military Headquarters)”, “Oda TV” and “Şike (Match-fixing)” cases were directed at discharging certain public officers who were taking office in several public institutions and organisations, notably the TAF. They also aimed at officers who were not members of this structure and at repressing persons considered to act against the interests of the organisation in different civil platforms (see Aydın Yavuz and Others, § 29). Alleged improper actions in these cases have also been dealt with in the Constitutional Court’s judgments finding a violation (see, among others, Sencer Başat and Others [Plenary], no. 2013/7800, 18 June 2014; Yavuz Pehlivan and Others [Plenary], no. 2013/2312, 4 June 2015; and Yankı Bağcıoğlu and Others [Plenary], no. 2014/253, 9 January 2015).

15. In the same vein, an investigation was launched by the public prosecutors, judges and law enforcement officers stated to have relations with the FETÖ/PDY against certain politicians, their relatives and certain businessmen known to the public, on the ground that they had allegedly been involved in corruption, and certain protective measures were taken with regard to these persons during the operations carried out at the end of 2013. These operations that are known to the public as the 17-25 December investigations were considered by the public authorities as well as investigation authorities and judicial authorities as an organisational activity of the FETÖ/PDY to overthrow the Government. Afterwards, administrative/judicial measures and sanctions were imposed on the members of the judiciary and law enforcement officers involved in these operations (see Aydın Yavuz and Others, § 30; and Hüseyin Korkmaz, no. 2014/16835, 18 July 2018, § 76). The Constitutional Court has also rendered many decisions confirming the lawfulness of the detention of certain law enforcement officials involved in these investigation processes as well as members of the judiciary ordering their release (see, among others, Hikmet Kopar and Others [Plenary], no. 2014/14061, 8 April 2015, §§ 74-87; Mehmet Fatih Yiğit and Others, no. 2014/16838, 9 September 2015, §§ 62-75; Abdulkerim Anaçoğlu and Others, no. 2014/15469, 17 July 2018, 46-66; and Mustafa Başer and Metin Özçelik, no. 2015/7908, 20 January 2016, §§ 134-161).

16. In addition, the trucks loaded with the supplies belonging to the National Intelligence Organisation (“the MİT”) were stopped and searched, respectively in Kırıkhan District of Hatay Province on 1 January 2014 and at the Sirkeli Tool Booths Ceyhan District of Adana Province on 19 January 2014, by the law enforcement officers who were stated to be member of the FETÖ/PDY, in accordance with the instructions given by the public prosecutors who were stated to have relations with this structure, (for further information concerning the relevant events, see Süleyman Bağrıyanık and Others, no. 2015/9756, 16 November 2016, §§ 12-50). The public authorities as well as investigation authorities and judicial authorities considered the events pertaining to stopping and searching the MİT trucks as an organisational activity intended to create a public opinion to the effect that the State of the Republic of Turkey aided terrorist organisations, thereby leading to the trial of the Government members. Subsequently, the members of the judiciary and law enforcement officers involved in these operations were subject to judicial/administrative measures and sanctions. The Constitutional Court also ruled that the detention of certain members of the judiciary and law enforcement officers involved in these investigation processes had been lawful (see, among others, Süleyman Bağrıyanık and Others, §§ 198-244; and Gökhan Bakışkan and Others, no. 2015/7782, 9 January 2019, §§ 43-60).

17. With the indictment issued by the Ankara Chief Public Prosecutor’s Office on 6 June 2016 concerning the senior executives of the organisation, a criminal action was filed against 73 executives of the organisation including Fetullah Gülen, on the ground that they had established an armed organisation and attempted to overthrow the Government of the Republic of Turkey and to prevent it from performing its duties. In this indictment, comprehensive determinations and assessments were made regarding the threat posed by the organisation on the national security, and in this context, it was specified that the fight against the FETÖ/PDY had been a matter of existence and non-existence for the State (see Aydın Yavuz and Others, § 31).

18. In addition, the threat posed by the FETÖ/PDY at national level was also discussed in the decisions, statements and practices of the security units of the State. In this sense, the State officials explained that the structure in question had been posing a threat to the security of the country. Such assessments were also included in the resolutions of the National Security Council (“the MGK”). Since the beginning of 2014, the MGK has been defined this structure as “the structure threatening public peace and national security”, “the illegal structure within the State”, “the parallel structure disturbing public peace and conducting illegal activities at home and abroad through its structure appearing to be legal”, “the parallel state structure”, “the parallel state structure acting in collaboration with terrorist organisations” and as “a terrorist organisation”. The MGK’s resolutions in question were announced to the public through press releases. Besides, in 2014, the FETÖ/PDY was mentioned in the National Security Policy Document as “the Parallel State Structure” under the heading of “Illegal Structures Appearing to Be Legal”. On 8 January 2016, the Gendarmerie General Command included the FETÖ/PDY in the current list of terrorist organisations (see Aydın Yavuz and Others, § 33).

19. Moreover, disciplinary proceedings were conducted against a great number of public officials due to their relations with the FETÖ/PDY, notably the members of the judiciary and police officers, and various disciplinary sanctions including the dismissal from public service or administrative sanctions were imposed in respect of many public officials. Furthermore, certain administrative measures were also applied in respect of certain business organisations, financial institutions and media outlets considered to have connections with the FETÖ/PDY (for further information, see Aydın Yavuz and Others, §§ 34, 35).

20. On 15 July 2016 Turkey faced a military coup attempt, therefore a state of emergency was declared across the country, which ended on 19 July 2018. Relying on the factual grounds, both public authorities and judicial authorities considered that the FETÖ/PDY was behind the coup attempt (for further information on the coup attempt and its plotter, see Aydın Yavuz and Others, §§ 12-25). During and after the coup attempt, investigations were carried out by the chief public prosecutors’ offices into the organisation of the FETÖ/PDY in public institutions, as well as its organisation in different fields such as education, health, trade, civil society and media, even if they were not directly related to the coup attempt, and many people were taken into custody and subsequently detained (see Aydın Yavuz and Others, § 51; and Mehmet Hasan Altan (2) [Plenary], no. 2016/23672, 11 January 2018, § 12).

21. It was accepted in many judicial decisions that the FETÖ/PDY had been organised in parallel to the current administrative system with a view to taking over the constitutional institutions of the State for re-shaping the State, society and citizens in accordance with its ideology and for managing the economy and social and political life through an oligarchic group. The judicial authorities also set forth that the FETÖ/PDY had many characteristics such as confidentiality, cell-type structuring, infiltrating public institutions and organisations, attributing holiness to itself, and acting on the basis of obedience and devotion, and that this organisation was far more difficult and complex structure than the others (for general characteristics of the FETÖ/PDY, see Aydın Yavuz and Others, § 26; for the type of structuring in judicial bodies, see Selçuk Özdemir [Plenary], no. 2016/49158, 26 July 2017, § 22; and Alparslan Altan [Plenary], no. 2016/15586, 11 January 2018, § 11).

22. The methods suggested by the FETÖ/PDY, as an organisation based on confidentiality, to its members were the security measures that may be described as resisting the intelligence. In this regard, Fetullah Gülen, the founder and leader of the FETÖ/PDY delivered instructions to the members of the organisation, which was “If service is a prayer, measure is the ablution for it. Service without measures is like a prayer without ablution”. Among the methods used by the organisation to ensure confidentiality, as in many other terrorist organisations, there was the use of code names. According to the findings of the investigation and prosecution authorities, the main method used by the FETÖ/PDY in terms of communication in order not to be uncovered was the face-to-face communication, and in cases where this was not possible, it was the communication through encrypted programs. According to the instruction of the leader of the organisation, "Those who make phone calls betray the service". Therefore, it was forbidden to make ordinary phone calls for the organisational communication (for further information in this regard, see the decision of the 9th Criminal Chamber of the Court of Cassation, no. E.2018/12, K.2019/45, 28 March 2019). For this reason, strong encrypted programs were developed in order to be used in the organisational communication.

2. Conceptual Information regarding the ByLock Application

23. It was determined during the investigations and prosecutions related to the organisation, especially after the coup attempt, that the ByLock application had been created by the FETÖ/PDY for organisational communication and that it was one of the communication methods used by the members of the organisation. Since the data concerning the ByLock application has been used as evidence in the convictions of many people who have been tried for crimes related to the FETÖ/PDY, it is necessary to know what the concepts such as IMEI number, general and individual IP number and user-ID mean in order to be able to understand how the relevant data is obtained from the application, as well as the structure and general features of the application (The relevant information is based on the decision of the 9th Criminal Chamber of the Court of Cassation (first instance) dated 14 February 2019 and numbered E.2017/45, K.2019/11 and the “Analysis Report on the ByLock Intra-Organisational Communication Application” [Analysis Report on ByLock] submitted by the General Directorate of Security to the Ankara Chief Public Prosecutor’s Office).

i. IMEI (international mobile equipment identity) number: Internet-enabled devices, such as mobile phones, tablets and computers, have a unique/individual IMEI code which is like a fingerprint of the device. The IMEI code consists of a 14 digit number and can be increased to 16 digits with an SV code on new generation devices. The expansion of the IMEI code is IMEI: AA-BBBBBB-CCCCCC-D (or DD). According to this;

- The letters (A) and (B) represent the type allocation code (TAC). This code is a non-unique/non-individual number, as it identifies only the brand and model of each mobile phone or device with 3G connectivity (for example, the TAC code of iPhone 5 is 01-332700 and the TAC code of Samsung Galaxy S2 is 35-853704).

- The letter (C) represents a unique/individual serial number determined by the manufacturer for the device. This 6-digit number is the real identity of the device. The letter (D) (or DD) is the SV code, which is usually the 15th and 16th digits of the IMEI number in new generation devices and has no identifying value for the device. In this context, in order to understand certain allegations concerning the determination of IMEI numbers, it should not be ignored that the IMEI numbers of old model phones are copied especially to the smuggled smart phones to use them in the country without any problem. In the operator records of such a device, its own IMEI number does not appear, instead, the IMEI number copied from the other device appears. Therefore, the authenticity of the allegations that the phone in question has not been developed with a technology that enables the installment and use of the ByLock application is investigated, bearing in mind the possibility of copying the IMEI number.

ii. IP Number (IP): It is the initials of the concept of internet protocol. This address is the unique/individual ID number of the device, which determines the service provider or network of a device assigned to each computer that is directly connected to the internet in the IP range of the country it is in and the place where the device connects to the internet. Internet service provider defines a unique IP address for each device connected to the internet. IP address also allows a digital device to communicate with another digital device through the internet.

iii. Target IP: It is the IP address of the server enabling access to the internet. Target port is the accessed port number of the server from which the internet is accessed. According to the findings of the investigation authorities, the target port of the ByLock server is 443.

- IP addresses are divided into two as static and dynamic: Static IP address is a permanent IP address that never changes as is the ones given to ADSL subscribers. Static IP addresses are assigned to the computer manually by an admin. Dynamic IP address, on the other hand, is a temporary IP address that is re-identified to the device whenever it connects to the internet. Dynamic IP addresses are automatically assigned by the computer interface or server software.

- IP addresses can also be identified by the service provider as static. However, even if it is dynamic, an IP address is assigned to only one subscriber at the same time. In other words, an IP address given to someone connecting to the internet is not given -technically- to another subscriber at the same time. When the user exits the internet, the same IP address returns to the common pool, and then it is assigned to another person connecting to the internet until he exits.

iv. General IP address: IP address that is used in WAN (wide area network) and can be assigned to more than one device through NAT (network address translation) method. The matter of how many different devices will be assigned the same general IP address at the same time may differ among operators.

v. Individual IP address: There is the IP address that is used in LAN (local area network), which is unique for each device as of the time it is allocated and that has no access to the internet. This IP address is assigned individually to each device by the GSM operator for use in the operator network and serves to distinguish -through the system- the users connected to that GSM operator.

vi. HTS Records: They are the access records that contain the information about the subscriber’s incoming/outgoing calls as well as sent/received SMS (CDR), which are kept at the time of making/receiving calls as well as sending/receiving SMS and stop when such activities end. Records of incoming/outgoing calls and sent/received messages are created based on the information related to the base station that is used when the call starts (for the former) and during the messaging process (for the latter). In the control and confirmation of the subscriptions, the location information of the voice network is taken as the basis, which accurately shows the location of the people during the connection.

vii. VPN (Virtual Private Network): The general name of the protocols that enable computers, which cannot establish a local network, to connect to each other over the internet via the local network and that ensure the security of connection through the encryption method. It is not possible, with the current technological opportunities, to determine the subscribers that use VPN.

viii. NAT (Network Address Translation): The name of the method to convert the IP address of the computer to another desired address. NAT protocol has been developed for cases where existing IP addresses are insufficient.

ix. CGNAT (Carrier Grade NAT): The information on when, how many times and from which address the IP addresses of the ByLock server (target) are connected to. By matching the general IP and private IP addresses that are assigned to the user by the GSM operator and that are included in the CGNAT records, the date as well as the time period when the user had access to the target IP (logged-in) can be determined.

24. In addition to this information, it is necessary that there are at least three signals related to a given IP address (in the CGNAT records) in order to accept that a website requiring subscription information (ID and password) or an IP address of an online program has been accessed successfully. In order for a successful connection, there should be a third signal. This process is as the following: The first signal indicates that the username and password entered by the user have been sent to the server. The second signal indicates that a positive or negative response has been transmitted to the user after checking in the database the subscription information (ID and password matching) sent by the user to the server. As for the third signal, it occurs when the subscription information (ID and password matching) entered by the user has been checked and the user has been allowed to enter the system. Then, the user logs in (for further information, see the decision of the 9th Criminal Chamber of the Court of Cassation (first instance) dated 7 February 2019 and numbered E.2017/13, K.2019/7).

3. Identification of the ByLock Program, Its Notification to the Judicial Authorities and the Judicial Process

25. Within the scope of the works carried out by the MİT in accordance with Articles 4 and 6 of the Law no. 2937 on the State Intelligence Services and the National Intelligence Organisation, dated 1 January 1983, a mobile application called ByLock (ByLock: Chat and Talk) with its main server abroad and the servers with which this application had communicated were subject to detailed technical studies. As a result of these studies, which were carried out by using technical intelligence procedures, tools as well as methods peculiar to the MİT, some data related to this program that was considered to have been used by the FETÖ/PDY was obtained.

26. The MİT submitted to the Ankara Chief Public Prosecutor's Office the hard disk containing the obtained digital data about the ByLock program and the flash disk containing the list of the ByLock subscribers who had connected to the application as well as the ByLock Application Technical Report it had issued.

27. Subsequently, the Ankara Chief Public Prosecutor's Office requested the Ankara 4th Magistrate Judge to order the examination, copying and analysis of the relevant (digital) materials in accordance with Article 134 of the Code of Criminal Procedure no. 5271 dated 4 December 2004. In its letter, the Chief Public Prosecutor's Office requested that in accordance with the said article, a Sony branded HD-B1 model hard disk with serial number bBW3DEK69121056 and the code 1173d7a09195cf0274ce24f0d69ede96 written on its front side and a Kingston branded data traveller on which the code DTIG4/8GB 04570-700.A00LF5V 0S7455704 was written be examined, two copies of them be made available and the records on the copies be transcribed into text.

28. The Ankara 4th Magistrate Judge accepted the aforesaid request in accordance with Article 134 of Code no. 5271 and ordered that “a copy of the digital materials be sent to the Ankara Chief Public Prosecutor’s Office in order for them to be analysed, copied, subject to expert examination and transcribed into text”. Subsequent to the decision of the magistrate judge, two experts copied the images in the hard disk and flash disk. This process was recorded by a camera in the presence of a judge.

29. The Ankara Chief Public Prosecutor’s Office sent a letter to the General Directorate of Security, Department of Anti-Smuggling and Organised Crime (“the EGM-KOM”), instructing them to conduct the necessary research and investigation procedures and issue a report including the findings reached, relying on the decision of the Ankara 4th Magistrate Judge.

30. The EGM-KOM created a working group consisting of the staff assigned by the EGM-KOM, the Anti-Terrorism Department (“the TEM”), the Intelligence Department and the Anti-Cyber Crimes Department for the analysis of the received data (the hard disk containing the ByLock data and the flash disk containing the subscriber list) and for a report to be issued in this regard. In this scope, an interface program was used to export the ByLock data, and thus, the examination of the relevant data was started.

31. Meanwhile, within the scope of a trial conducted by the 16th Criminal Chamber of the Court of Cassation, information on the technical features of the ByLock application was requested from the EGM-KOM. Having issued a report, the EGM-KOM sent the report to the relevant Chamber. The report, after giving detailed information about the nature and other features of the ByLock communication system, provided information on the number of users of the said application, friend groups and message and e-mail contents.

32. Subsequently, the Ankara Chief Public Prosecutor’s Office requested from the Information and Communication Technologies Authority (“the BTK”) the reports pertaining to how many times the subscribers included in the list of those determined to have had connected to the ByLock IP addresses had connected to these addresses (CGNAT data).

33. In the meantime, a new version of the subscriber list, which was updated by the MİT through a detailed examination, was sent to the Ankara Chief Public Prosecutor’s Office again. Upon the request of the Chief Public Prosecutor's Office, the Ankara 5th Magistrate Judge ordered that an analysis be made on the digital material, which was G4 branded data traveller with serial number DTİG4/8GB 04570-760B00LF 5V 0S 7575458 and TAIWAN written on it, in accordance with Article 134 of Code no. 5271, that the images stored in it would be copied and that they would be transcribed into text. In line with this decision, the copying process of the said material was carried out in the presence of the public prosecutor and two forensic IT specialists also during a video recording.

34. Afterwards, the Ankara Chief Public Prosecutor’s Office, having sent the subscriber list to the BTK, requested information in order to identify the personal information of the subscribers of the updated numbers connecting to the ByLock server.

35. The subscription information related to the connecting GSM numbers and ADSL numbers were also received from the BTK on different dates and sent to the Ankara Chief Public Prosecutor's Office. Subsequently, the EGM-KOM, using the subscription information received from the Ankara Chief Public Prosecutor's Office, created a new table of "userid_list" (user list).

36. Upon the instruction given by the Ankara Chief Public Prosecutor’s Office to the EGM-KOM, the CGNAT data of 123,111 GSM numbers sent by the BTK (information on when and how many times the IP addresses on the ByLock server were connected to) was started to be distributed to the provincial units of the EGM-KOM in order for them to be sent to the provincial chief public prosecutors’ offices. Since the connections through the VPN program does not have Turkey IP, the CGNAT records of the connections made by the real ByLock users to the IPs on the ByLock server by using VPN program could not be accessed. The accessed CGNAT records belonged the connections that had been made from Turkey IPs to the target IPs on the ByLock server without using a VPN or that could be identified as a result of getting a Turkey IP again as a result of the VPN’s being disabled during the connection from Turkey through a VPN.

37. Meanwhile, an investigation was launched by the Ankara Chief Public Prosecutor's Office into the allegations and news that the users of the address named “Morbeyin and related applications had directly connected to the ByLock IP through the codes in the background and that some people who had not had a ByLock record (not actually a ByLock user) had been punished unjustly. In this regard, an examination group was created, which consisted of the officials from the Anti-Cyber Crimes Department, the Scientific and Technological Research Council of Turkey (“the TUBITAK”) and the BTK. During the investigation, it was found that the FETÖ/PDY, bearing in mind the possibility that the ByLock application might be used as evidence against it in the future and, in that vein, in order to prevent the disclosure of the real users of the ByLock application and to direct irrelevant persons to this program, thereby reducing the authenticity of such evidence, had created a software in 2014 named Morbeyin. According to the further findings of the prosecutor, when a user entered the applications such as qibla compass, prayer time, prayer listening, reading the Quran and various dictionaries, the Morbeyin software enabled the device, where the said applications had been opened, to connect to the IPs on the ByLock server for a few seconds without the knowledge and will of the user. As a result of the detailed examination in this respect, it was determined that the users of 11.480 GSM numbers, which had similar features in terms of connection and data parameters, had been directed to the IPs on the ByLock server outside their will. For this reason, they were ultimately removed from the lists.

38. Upon the instruction given by the Ankara Chief Public Prosecutor’s Office to the EGM-KOM, the CGNAT data pertaining to 123,111 GSM numbers sent by the BTK was started to be distributed to the provincial units of the EGM-KOM in order for them to be sent to the provincial chief public prosecutors’ offices.

4. Installment and Use of the ByLock Application

39. Investigation units/authorities issued –addressing to the judicial authorities– technical and chronological reports containing comprehensive information about the technical features of the ByLock application ensuring its confidentiality, the manner it was used, the way it was encoded, the method of its installment on a device, its areas of usage as well as its purpose. In this context, a report issued by the General Directorate of Security in order to clarify some issues related to the ByLock application was also submitted to the Ankara Chief Public Prosecutor's Office. Besides, the MİT also issued a technical report related to the data obtained.

40. In addition, the decisions of the Court of Cassation contained certain findings and assessments regarding the ByLock communication program on the basis of the facts and evidence reached during the investigation/prosecution processes and especially the reports issued by the investigation unit, also regard being had to the organisational form and other characteristics of the FETÖ/PDY. The findings and assessments regarding the installment and use of the ByLock program, which are specified in the decisions of the Court of Cassation as well as the reports issued during the investigations into the ByLock application, can be summarised as follows:

i. ByLock is an application that allows communication over the internet. Internet (online) connection is required to access the application. Users cannot send messages, e-mails or data, if internet connection is not available.

ii. Pursuant to the ByLock Analysis Report, the ByLock application took place in general application stores in early 2014 and was used in various versions until early months of 2016. In the forensic and technical reports, relying on the information obtained from open source investigations, it is stated that the ByLock software was released so that it could be downloaded from the Google Play for phones with Android operating system and Apple Store for phones with IOS operating system. The program was launched on Google Play in early 2014 and made available in various versions until early months of 2016.

iii. According to judicial and technical reports, the ByLock application has two basic versions that can be called Series 1 and Series 2 running on Android operating system. There is no difference in downloading the series of the ByLock application from Google Play and Apple Store. ByLock Analysis Report gives detailed information about ByLock's version and dates of update. According to the aforementioned report, the main difference between the versions of ByLock is that the login password has been made more complex. There is no substantial difference between the versions regarding the steps to be followed to communicate with someone after downloading the program.

iv. It is necessary to install the program in order to sign up for the Bylock application. However, its installment on a device is not sufficient for its use. When the ByLock application is run for the first time, a screen with the options of sign up or log in appears, and the user is asked to create a user name and password.

v. It has been established as a result of the source code analyses that the application also has the feature of creating a login password by drawing a pattern. Therefore, after creating a username and password, the user must also create a cryptographic key by drawing random patterns on the screen with his finger and this information must be transmitted to the application server in an encyrpted manner. Thus, the user, who signs up the ByLock communication system, is automatically assigned a special registration number (user-ID number) by the system. The created number is unique and the numbers consecutive to this number are assigned to a new user. Thus, the maximum protection of user information as well as communication security is ensured.

vi. No personal information (phone number, identity number, e-mail address, etc.) is requested while creating a user account on the ByLock application. Furthermore, as opposed to global and commercial applications of similar nature, there is no process for verification of the user account (SMS password authentication, e-mail authentication, etc.). According to the judicial authorities, these are the measures taken for hampering the identification of the real users.

vii. The ByLock application also has no password recovery extension which enables the users who have forgotten their password to sign up again and get a new user-ID number. In other words, the user is given a new user-ID each time he signs up. Therefore, it is possible for one person to have more than one user-ID. For example, a person whose first user-ID was 54334 has been found to have the second user-ID which is 183441. Besides, it is also possible for a person to have more than one user-ID for such reasons that he has got another user-ID with different user information to login the application on another device or that he has been assigned to another position within the organisation.

viii. Registration is not enough to communicate with the other users registered in the system. It is not possible to add users by searching by phone number or first and last name on the ByLock communication system. The application is not synchronized with the contact list on the phone. In other words, the ByLock communication system, unlike common applications, does not have a feature that enables the persons in the contact list of the phone to be automatically added to the application.

ix. In order for the users to communicate with each other, both parties must first learn face-to-face or through a means (such as a courier, another messaging program, a ByLock user, and etc.) each other’s user names/codes and they must add each other as a friend. Unlike common commercial applications, it is not possible to add a person, whose username/code is unknown, to another person’s contact list and to contact him without his confirmation.

x. As stated in the ByLock Analysis Report, the content of the message between the ByLock users with 68555 User-ID and 462950 User-ID on 27 December 2015 at 9.12 p.m. was “Brother click on this message and download it, then install it from the ByLock downloads in the files, create your own passwords and add me 176299; when adding, write “a secret you both share 1234”. As it is understood from the statement "a secret you both share 1234" in the message, in order to be able to be added to the ByLock friends list, it is necessary to know the user name of the other party, as well as a password assigned by the system or asked to be assigned by the user.

41. As regards the findings and assessments above concerning the installation and use of the ByLock application, the relevant parts of the statements obtained during the judicial investigation and prosecution processes are as follows:

i. The relevant part of the statement of suspect A.A., taken on 28 December 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Adıyaman Chief Public Prosecutor's Office is as the following:

"In March or April 2014, those on duty were asked to use the communication program called ByLock. This situation was conveyed to us by the Regional EC [Education Consultant,] and he installed this program on my phone via the internet or Bluetooth at the regional ED meeting … Provincial supervisors installed this program, and then everyone installed this program for those in charge under them, thereby expanding the communication network. The ByLock program was not installed for everyone, but rather for senior officials. The lower level officials, who heard of the program over time, also started using it. As far as I know, this program was used by special units and was later expanded to the regional units. This program was used by people who added each other, whereby an automatic ID number was assigned.”

ii. The relevant part of the statement of suspect E.G., taken on 21 October 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8111 conducted by the Adıyaman Chief Public Prosecutor's Office is as the following:

"In the past three years, as a crisis was about to outbreak, the community began to take more strict measures. I heard about the ByLock, one of the highest levels of these measures, 7-8 months before. As the Gaziantep Regional Meetings have not been attended intensively for precautionary purposes since 2015, the Provincial ECs attending these meetings were instructed by the region about the use of the ByLock. As a result of these instructions, the Provincial EC… had given the flash memory card in which the program had been installed to another EC [Mrs. D.B.K.İ.]. She told me that according to the region’s instruction, I had to install the ByLock program, therefore, she installed it on my phone, and I started to use it. Along with the Bylock program, a reset program as well as an encrypted note-taking program were installed on my phone. She said that with this program installed on the phone upon the instruction of the community in order to prevent the written documents from being seized by the police in a possible operation, the information to be written on such documents would be able to be written on the mobile phone, so that no documents could be found in a police operation… I wondered this feature and applied it. Thereupon, I saw that my phone reset itself in seconds, the program was deleted, and the phone was returned to the factory default settings… When the program is installed, it assigns an ID to the phone where it is installed. In order to add someone, the Add tab is opened and the ID of the person to be added, consisting of 6-digit numbers, is written. The name of the person you want to add is written in the section “Name of the person to be added” in the line below; since the community uses code names, generally the code name of the relevant person is written in this section. In the next line, it is requested to write a mutual number in the section “Keyword between you and the person you will add”. We were told that the longer this number was, the more difficult it would be to decipher the system. After entering this number, when you press the “invite” button at the bottom, a message is sent to the phone of the person to be added. When the message is opened, the button “enter verification” appears and it is requested to enter the keyword. Since the keyword is determined mutually, the program will be installed to the phone by entering the keyword.

As far as I learned, the ByLock program was previously used only by private service units, namely military personnel, police officers, judges and prosecutors and court personnel. It has been used by civilians for about a year. While this program was installed on our phones, we were told “It is a program developed by our brothers (“abi”), it is safe”. Gaziantep district meetings could not be held for a period due to the measures taken by the community for the crisis. Since this program has the feature of creating a group as in WhatsApp, the regional and provincial ECs once organised a meeting in this way at a predetermined time. I witnessed this. The person who has the ByLock program on his phone must be in a certain position in the community, that is, he must be in a high position.

...

No sim card was required to install the ByLock application on a phone. The community was warning about this. They made us buy a modem wi-fi with an internet line on behalf of someone else. For a while, we connected in this way. They even went further in terms of measure and told us not to use modem wi-fi but to connect from internet cafes or workplaces having an open wi-fi. As the ByLock is a messaging program, I think it can be installed also on desktop or tablet computers besides mobile phones.

I have just remembered that there was another program in the flash in which ByLock had been downloaded; it was a VPN program. After this program is installed on the phone, if it is opened before ByLock, a key image appears on the top of the screen, which shows that the program is running. Then a country name is entered. Whatever the entered country is, it is shown as if the user connected the internet from that country. This was among the programs they had given us. "

iii. The relevant part of the statement of suspect E.K., taken in the presence of his lawyer, within the scope of the investigation no. 2016/6898 conducted by the Adıyaman Chief Public Prosecutor's Office is as the following:

"The ByLock application was started to be used in April 2014. The use of the ByLock application was introduced as an agenda item. At the material time I was the Grand Regional Head Responsible for Students within the organisation (“the BBTM”). If I remember correctly, our education consultant [A.A.] had told. I probably conveyed the agenda to my Inferiors who were Responsible for Students within the organisation (“the BTMs”) ... ByLock was initially downloaded and installed from the Play Store. Afterwards, it was installed by transferring from one phone to another through the application sharing method. I had downloaded it from the Play Store and installed it on my phone. An automatic ID number appeared when the program was first opened. The program was run by first creating a password and entering it on the phone. Also, a VPN program had to be installed and run in order to run the ByLock application. ByLock did not work if the VPN was not running despite being installed. No information such as GSM number, ID number, name, etc. was required to install the program. You only had to give your ID number to the person you wanted to communicate with. The latter would also tell you his own ID number. When the other party entered your ID number, you received no warning or notification on your phone. If you entered the ID number of the other party as well, then you both could communicate with each other. Along with the ID number of the other party, a desired name was entered in the program's contact list. It was possible to send mass messages to the people in your contact list. The program only allowed text messaging. Besides mobile phones, some people installed it also on their tablet computers and used the program there. It allowed messaging via the internet of the GSM line inserted into the mobile phone or by connecting to another internet service provider such as ADSL. … This program was used until late 2015. The messages received through the program were automatically deleted after 3 days ... Entering the ByLock system and messaging through the system was allowed on another phone or tablet computer in which ByLock had already been installed, on condition of using own ID number and password. … We were not able to enter the ByLock application in late 2015. We were told that ByLock had been removed. However, we were not provided with any information as to who had removed it and why it had been removed.

iv. The relevant part of the statement of suspect A.M., taken on 8 December 2016, in the presence of his lawyer, within the scope of the investigation no. 2015/154 conducted by the Siirt Chief Public Prosecutor's Office is as the following:

"As far as I remember, in September 2014, this person installed the program called ByLock on my phone via Bluetooth ... As far as I remember, in March - April 2015, E. told us that the ByLock program had been uncovered and was no longer safe. Therefore, he told us to delete the program from our phones … ByLock had been installed on everyone’s phone in the community.”

v. The relevant part of the statement of suspect H.K., taken on 27 November 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/3196 conducted by the Siirt Chief Public Prosecutor's Office is as the following:

"A. with the code name A. … told me in 2015 that “we will now use this program for communication, and we will no longer use phone”, and he installed a program on my mobile phone … It does not matter whether the people I will add on this program are within my phone’s contact list. When I press the (+) sign to add someone in the program, the name or code of the person to be added, which is registered in the system, is requested. At the later stage, the password of the relevant person is also requested. After entering the requested information, “1” is written as the last confirmation code. Subsequently, a confirmation message is sent to the relevant person. When that person also writes “1” as the confirmation code, both parties add each other in their ByLock lists.”

vi. The relevant part of the statement of suspect E.E., taken on 13 January 2017, in the presence of his lawyer, within the scope of the investigation no. 2017/184 conducted by the Kırşehir Chief Public Prosecutor's Office is as the following:

"As far as I remember, in 2015, upon the instruction of S.B., our chairman of the board of trustees, S. told us to download a program called “Super VPN” from Google Play Store on our phones for security purposes. Then we downloaded the ByLock program from Google Play Store. First the “Super VPN” program was activated, and then a password was created when ByLock was first opened. A nickname was created, then a random image was drawn on the screen, and the program was opened. As for creating a group on the program, either a barcode was scanned, or a nickname was entered. Persons were added. While sending a message, it could be sent to only one person or a group. We were told that this program was an encrypted program where we could send messages to each other and that no one could decipher this program.”

vii. The relevant part of the statement of suspect M.K., taken on 23 October 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/5772 conducted by the Giresun Chief Public Prosecutor's Office is as the following:

"In 2015, R.Y. told me “There is program for situations where we cannot speak comfortably. I will install it on your phone”. I said okay. He sent me, via Bluetooth, the set-up of the ByLock program the name of which I learned after installing it. He installed it on my phone … First, he added himself on the program for enabling me to have a conversation with him on this program ... We were communicating through this program only when they called me somewhere. Apart from this, there was no routine conversation or chat environment. It was a communication program installed in order not to be followed as R.Y. expressed. ... To use this program, it was first necessary to add the ID of the person you wanted to communicate with. In order start communication, there was a code known by the parties mutually. After entering this code once, the relevant person could be contacted continuously. Conversations were deleted every 24 hours.”

viii. The relevant part of the statement of suspect A.M., taken on 17 October 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Bingöl Chief Public Prosecutor's Office is as the following:

"Upon organisational meetings being fewer after 17-25 December, a program called ByLock was introduced in order to motivate the members and prevent them from quitting. This was told me for the first time when I went to a meeting in H. Dormitory. In 2014, Y.C. invited the provincial supervisors to H. Dormitory. We gathered there as the community heads responsible for 14 different institutions ... Here someone I did not know told us about the ByLock system. He asked our phone numbers and sent us a link via Bluetooth. He installed the program on my mobile phone. After various processes, he gave me a login password. He told us how to add others and how to include them in the system ... After the meeting, we were told to install the program for the others we trusted ... When there was a correspondence, the nickname appeared, and the conversation was automatically deleted within 24 hours”

ix. The relevant part of the statement of suspect E.D., taken on 27 August 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8112 conducted by the Erzincan Chief Public Prosecutor's Office is as the following:

"In 2013 … Provincial Security Imam Mr. S. gave me instructions to install the online program called ByLock for the members of the community and to communicate with them through this program. At that time, I downloaded this program from Google Play and installed it. This program first requests you to create a username and a password. After performing these, the program is installed and becomes active after you move your finger on the screen as if you draw a pattern for a while.

After the program is opened, the username of the person you want to communicate with and the password to be entered mutually are determined. After this password is given to the other party, the parties can add each other and start a conversation. This program is used for correspondence rather than a video chat.”

x. The relevant part of the statement of suspect A.I., taken on 26 October 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Erzurum Chief Public Prosecutor's Office is as the following:

"In early 2014, my husband/wife … installed an encrypted messaging program called ByLock. My husband/wife also installed this program on his/her own phone. He/she downloaded this program from Google Play. The logo of the program looked like a blue prism. It required a username and a password. I created a username as well as a password myself. It was a password that should be at least 8 digits consisting of letters and numbers. I could change this password and username myself. We used this program in order to ensure communication within the Hizmet (service), to share Fetullah GÜLEN's notes as well as the notes from the program called ‘Bam Teli’ and to ensure communication between us. In short, we shared the subjects related to the organisation via this program … N. a superior within the organisation told me that we would, from then on, communicate with each other through a program called ByLock as the ordinary phone calls would cause trouble.”

xi. The relevant part of the statement of suspect İ.Y., taken on 9 January 2017, in the presence of his lawyer, within the scope of the investigation no. 2016/1530 conducted by the Bayburt Chief Public Prosecutor's Office is as the following:

"In Bayburt, from 2009 until 2015, I attended the “sohbet” activities (periodic gatherings organised by the group) of those Fetullahist. During these gatherings, I heard that deputy police chiefs İ.A. and M.Ç. working at the police school were using ByLock … A person named H., who was responsible for the group I was in within the Gülen community and who was a teacher working in a private school, installed a special communication program on my mobile phone via Buletooth from his own mobile phone … Its symbol was the same as the symbol of WhatsApp … However, this program was different from the normal WhatsApp program. It was not accessible by anyone, and only the private persons allowed to install it could use it.”

xii. The relevant part of the statement of suspect E.E., taken on 27 December 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8111 conducted by the Gümüşhane Chief Public Prosecutor's Office is as the following:

"In May 2014, Y. who was responsible for reading rooms ... collected the phones of the persons who were responsible for reading houses and the name of whom I stated above, during a meeting and told that we were going to communicate with each other through this program and installed the ByLock program for the friends there and gave everyone a password to open the program separately. In this program, everyone has an ID number; in order to add someone, an ID number is entered, and a request is sent to the person to be added. In order for the target person to be able to open this request, he has to know also the password created by the sender for the adding process. After entering this password, he can see the sender of the request and accept it. In this way, the list is created.”

xiii. The relevant part of the statement of suspect M.A., taken on 22 November 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8111 conducted by the Trabzon Chief Public Prosecutor's Office is as the following:

"The individuals within the community first used Line, Coco and WhatsApp. Recently, some people in the community used the BYLOCK program ... In May 2015, when I bought a smartphone, District Imam A. … took my phone and downloaded the ByLock program from Play Store. In addition, he downloaded another program, the name of which I cannot remember, to open the ByLock program … He told me how to use the program and added his own address. He also told me to create a password to enter the ByLock program, and I entered the program by creating a password. I do not know how he downloaded the ByLock program on my phone and whether there were any other technical issues he was engaged in.”

xiv. The relevant part of the statement of suspect U.S., taken on 4 September 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/90080 conducted by the İzmir Chief Public Prosecutor's Office is as the following:

"M.Ö. told us at a meeting to download this program … he told us that we had to use the program called ByLock in order not to be uncovered. I met M.Ö. somewhere which I do not remember now. He sent me via Bluetooth the APK file of this program.

When I opened the APK file on my phone, the installation screen appeared immediately. After the installation process, the screen was opened, and I created a user-name and a password as required …

1- First of all, you have to be near the person who will install the program for you.

2- After coming side by side, the APK file of the program is sent via Bluetooth.

3- After the person near you has installed the APK file, you will tell him your ID number

4- After he has entered the ID number, he creates a password and tells it to the person with whom he wishes to contact. The person wished to be contacted with sends a simple number (usually, the number “1” is used; there is no speciality in determining this number). When you open the confirmation screen for the request sent by this person, you can start communicating with him by entering the password and username created by him.

5- As a result, anyone who does not know the ID number and password as well as who does not have an APK file cannot use this program.

6- You need to write a username for the person you will add to the system. A new name can also be written, provided that the username is the same as the one entered by the person suggesting the third person in question.”

xv. The relevant part of the statement of suspect Y.U., taken on 12 August 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Konya Chief Public Prosecutor's Office is as the following:

"The ByLock program was started to be widely used within the Fetullah GÜLEN community after the 17-25 December events. I had never heard of this program before the events of December 17-25. I also had never heard of such a program being used, neither in the community nor outside. After the events of December 17-25, S.B., who was the responsible manager of O. Eğitim A.Ş. and the unofficial manager responsible for Ö. Student Dormitories, told me that the subsequent meetings of the community would be held via the ByLock program and asked me to turn on the Bluetooth on my phone. I turned on the Bluetooth on my phone, and he sent a data file from his phone via Bluetooth to my phone ... When the program was opened, username and password was requested. I created a new username and a password and entered the system. It automatically gave me an ID number consisting of 5-6 digits as far as I remember … I learned how to add people on this program. He told me, by showing, that this program was used only for correspondence on the internet, that no voice or video call could be made, that it could not be downloaded from the internet in any way, and that it could only be installed by sending a data file via Bluetooth. The ByLock program looked like Gmail on the phone’s screen; however, when it was tapped on, the ByLock program was opened. He told me that the program had been created by the Fetullah GÜLEN community and that it was known and used only by the members of the community. Hence, I learnt how the program was installed and used.”

xvi. The relevant part of the statement of suspect A.K., taken on 20 August 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Konya Chief Public Prosecutor's Office is as the following:

“Those who were in superior positions within the community such as state imams, grand regional imams and people working in the guidance service used the ByLock program. They used to talk to the regional imams at the lower level, like me, on the phone. However, one day H.Y. told all regional imams to install the ByLock program on their phones. Regional imams installed this program on their phones. H.Y. helped me install the program on my phone via his Bluetooth.”

xvii. The relevant part of the statement of suspect İ.S., taken on 23 October 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Samsun Chief Public Prosecutor's Office is as the following:

"I did not know about the ByLock program that was being used for secret communication within the organisation until I went to the province of S. After all, the ByLock program was first used within the organisation in March 2014. İ.T. had installed this program on my mobile phone for the first time via Bluetooth from his own phone. He told me that we would no longer communicate by phone but through this program. Afterwards, when I was appointed as the group imam, I was told to install this program for also my group members. Thereupon, I told my group members that we would no longer communicate by phone but through the ByLock program that had been developed for this purpose. Hence, I suggested installing this program on their phones."

xviii. The relevant part of the statement of suspect A.A., taken on 15 February 2017, in the presence of his lawyer, within the scope of the investigation no. 2016/14839 conducted by the Malatya Chief Public Prosecutor's Office is as the following:

"As far as I remember, in the summer of 2015 ... I installed the ByLock program on my phone upon being assigned with the task of being responsible for military high school students. During the meeting, S.A. sent me a setup file via Bluetooth … My phone was on F. He installed the program through the received file and gave me the phone. When I tapped on the program, it requested a username and a password. After entering this information, the program opened. My code name was first A. Having started dealing with military students, my new code name was Z.İ. To communicate with someone else, a reference code was required. It was necessary to inform the person -wished to be added to the contact list- this reference code in advance. In this way, the other party would accept the request for communication by entering the reference code previously notified and then start communicating through ByLock. Along with the ByLock, a program called VPN was also installed on my phone. Before opening the ByLock program, we would open the VPN and enter the ByLock program via the VPN. F.U. had told me that this was a safer way.”

xix. The relevant part of the statement of suspect M.T., taken on 18 January 2017, in the presence of his lawyer, within the scope of the investigation no. 2017/14839 conducted by the Malatya Chief Public Prosecutor's Office is as the following:

"We used ByLock at the end of January 2016 … As far as I could learn, the ByLock program worked as follows: Each user had a code, and this code was identified to the contact list of the program. A., C., H. and the police officer E. were included in my contact list. I had to create a code in order to message someone from this contact list. I would give this code to the other person and when he entered the code we would start messaging.”

xx. The relevant part of the statement of suspect S.D., taken on 24 October 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Karaman Chief Public Prosecutor's Office is as the following:

"I installed this program having downloaded it from Play Store. I first run the VPN and then entered the ByLock Program … The secret conversations related to the issues such as the places where the gathering activities would be held or related to the names of students were made on this program by messaging. We were told that we could make any correspondence here. We used this program until 2015. The program was updated in 2015. However, this update could not be downloaded from Play Store. The organisation's top-level officials gave it to the lower level officials in the form of APK file. A.A. downloaded it on my phone from his own phone via Bluetooth in the same way. He told me to download it for also others in the same way. Therefore, I also downloaded it for the abovementioned persons who were under my responsibility. About 1 month after this procedure, E. (K) A. Y. told me that a WhatsApp-looking ByLock Program had been released. He installed it on my phone. I downloaded it also for my friends in the same way. It was forbidden to install this program for the persons I was responsible for ... This program could be installed by BTMs, İLCİLER and higher-level individuals. In December 2015, this program could not be accessed via VPN. E. (K) A. Y. told me that the program had been deciphered and therefore we would no longer use it.”

xxi. The relevant part of the statement of suspect A.B., taken on 13 February 2017, in the presence of his lawyer, within the scope of the investigation no. 2017/4259 conducted by the Denizli Chief Public Prosecutor's Office is as the following:

"As far as I remember, Ç. had installed it on my phone via Bluetooth. He carried out the installment process himself including creating password. I do not know how the program was activated. When I went near İ.K. and Ç., they gave me a paper on which a username and password was written … They were the persons who installed the ByLock program, in the district, for those close to the organisation. This program was first used by people in superior positions such as provincial and district brothers (“abi”). Then we received a notification that we called the agenda. It was told that the people in the province of D. were indiscreet and spoke everything on the phone; therefore, this program was needed to be installed. It was therefore installed on my phone … The icon of the program which was installed on my phone was blue coloured and I do not remember whether there was any letter on it; however, “ByLock” was written below. When I tapped on this icon, a screen appeared where a username and a password was requested. I run the program by entering the password given to me. First, an empty screen appeared. Then, when I moved my fingers on the screen, the program was opened. The users appeared …

Even if the ByLock program was installed on both parties’ phones, and even if a question was asked through the program, the other party could not answer. First, the person who asked the question would call the other party through the program called KAKAO, and the latter would suspend the call and write his answer through Bylock … In the city centre, two separate ByLock programs had been installed on especially superior persons’ phones. In one of them, the persons whom they knew as well as who might have relations with the organisation were added. In the second one, there were people related to their duties. When the police caught them, they would show the former. A woman named … advised us to install two separate ByLock program.”

xxii. The relevant part of the statement of M.O. taken during the prosecution process, as stated in the decision of the 8th Chamber of the Antalya Assize Court dated 1 November 2017 and numbered E.2017/275, K.2017/83, is as the following:

"I used the ByLock program. I downloaded it from Google Play Store in summer 2014. When I wrote ByLock and entered my Gmail account, I could download it on my mobile phone. After I installed the program, it gave me an ID number. In order to be able to communicate with someone else, I had to know the relevant person’s ID number and enter it to the system … When I downloaded this program, I heard from my friends in the community that such a program was being used within the community. I heard about the ByLock program in this way. As I have stated, I downloaded it from the internet, as well as installed and used it … If ByLock was used in 2 different devices with different ID numbers, then 2 different names would be given.”

xxiii. The relevant part of the statement of F.M. taken within the scope of the investigation process as well as confirmed by him also during the prosecution process, as stated in the decision of the 2nd Chamber of the Samsun Assize Court dated 23 March 2018 and numbered E.2017/52, K.2018/103, is as the following:

"In December 2010, I was assigned by A.K. as the group imam of the 94s term among the superiors from the Academy within the Security Directorate, which was qualified as a special unit, in the province of A. … Having started to use the ByLock program … I also installed the program on F.’s phone and we started to communicate with each other through this program … When the ByLock program was first released, it was not available on Google Play. A. downloaded the program on my phone via Bluetooth. I downloaded it on the F.’s phone in the same way. However, after using this program for a while, A. told me that it could also be downloaded from Google Play. As the program was already available on my phone, I did not download it. As for the operation of the program, it automatically gives an ID number after the installation process. When these ID numbers are entered mutually with the other party, the conversation starts. A conversation can never be made without entering the ID numbers mutually."

5. General Features of the ByLock Program

42. The features of the ByLock application with reference to the reports issued by the investigation units as well as the decisions of the Court of Cassation regarding the application can be summarized as follows:

a. Messaging

43. Instant messaging is possible via ByLock. This feature allows people who add each other as friends to message each other in the same time period. In order to add someone to the ByLock friends list, the username/user code of the other party must be known. Accordingly, after the users add another member of the organisation to their contact list through the abovementioned method, the confirmation of the other party is requested, and if it is confirmed, then the parties can establish a communication and send messages to each other.

44. There is another section called nickname on the ‘add friends’ screen. This section allows for giving another nickname to the person added as friend. As stated in the judicial decisions, the data included in the technical reports as well as stated to have been kept in the table named roster were the nicknames entered by the users in this section.

45. While other common messaging applications continue running in the background as long as an internet connection is available and notify the user when a message is received, the ByLock application requires that the program is open (running) in order to receive a message, even if an internet connection is available. As stated in technical and judicial reports as well as court decisions, this feature of the program, which imposes a burden on the user and results in difficulties in its use and which is indeed not functional, indicates that the program was not developed with commercial concerns. In addition, it is evaluated that the said feature is a reflection of the efforts of the FETÖ/PDY, an organisation based on confidentiality, to hide itself and its members.

46. In the friends lists created on the program, there are people associated with the organisation. For example, as stated in the Bylock Analysis Report, it was discovered that an important part of the 240 people in the friends list of T.A. (user-ID: 5176) was the senior executives of the organisation and that he had no relatives in his friends list except for his wife who was also a ByLock user.

47. When the contents of the messages which were analysed by the investigation units were examined, it was found that there were messages in which the organisation members were asked to give importance to the measures as well as the confidentiality. In this context, it has been determined that almost all of the analysed messages were not related to daily issues, but the organisational contacts and activities of the FETÖ/PDY. In addition, it has been observed in the contents of the messages as well as in the friends lists that the individuals were usually referred to by their code names within the organisation. Some of the message contents were related to the following issues:

i. Sharing the instructions and opinions of the organisation leader Fethullah Gülen.

ii. Sharing information about the FETÖ/PDY members against whom operations were carried out and who were uncovered, as well as notifying beforehand the operations to be carried out. Followings are some of the messages included in the ByLock Analysis Report:

- The messaging between 180428 user-ID and 78138 user-ID on 26 August 2015 at 05:42 p.m. was "We have heard that certain teams have been created against institutions. Is this operation that operation?";

- The message sent by 97204 user-ID on 6 January 2016 at 12:51 a.m. was "They will carry out an operation on 1 November.";

- The messaging between 359010 user-ID and 482423 user-ID on 16 December 2015 at. 12:07 p.m. was "Brother, there is a person in this unit who will get information. It is said that if it is heard, they will mess up. It is very serious.”;

- The messaging between 359931 user-ID and 235342 user-ID on 6 December 2015 at 10:27 p.m. was "There will be an operation tomorrow. Media will be needed.”;

- The messaging between 154559 user-ID and 177112 user-ID on 15 January 2016 at 08:07 a.m. was "Dear brothers, when they asked about the reason for the 1 dollars found on different people during custody processes in Turkey, they figured out that it was related to our Leader. Therefore, it would be better if especially the friends who go to and come from Turkey act responsibly in this regard and do not carry dollars and HE [Hodja Efendi] signed clocks in their wallets. I hope they will not have problems due to such reasonable doubts”.

iii. Not being present in places where there was a possibility of operation and prior cleaning of important digital data in these places by the persons responsible for searching and scanning such data (ATM). For example, the messaging between 324030 user-ID and 144401 user-ID on 30 December 2015 at 09:29 p.m. was “Hey friends! There will be an extensive car and body search in İzmir. It will continue for a week. Please be very careful! Make sure that the mails on your phones will not be open on the road and that there will be no document with you related to the service. Besides, there will be no cd or diamond [Fetullah Gülen's books] with you”.

iv. Organisations made for finding places for the organisation members to hide within the country and for ensuring them to flee abroad.

v. Release of the suspects/accused within the scope of the investigations and prosecutions conducted into the FETÖ/PDY by judges and public prosecutors (for a decision in this respect, see Mustafa Başer and Metin Özçelik; and Hüseyin Korkmaz). For example, as stated in the ByLock Analysis Report, former judge F.K. (76026 user-ID) communicated with civilian S.G. (203391 user-ID) and gave information to him about the investigation files. This conversation was as the following:

- The messages sent on 16 December 2015 between 09:35 p.m. and 10:58 p.m. were "Brother, the file will be sent tomorrow", "The prosecutor dealing with it is İ.Ş.", "Tomorrow I will deal with the challenge of Judge H.", "The expert report within the file is insufficient", "The revenge of 1 December is also awaited in the nearby provinces", "I hope there will be no problem” … “If they are 3-5 detainees, I can release them taking into consideration the time they have spent imprisoned. If the other judges’ opinions will be the same as the ones set forth today, there will be no problem", "The objection will definitely come before me” / “Brother, are there any other operations in the province of A.?” / “If it is referred tomorrow or Friday, then I am already on duty" / "We will see if they have arranged it” / “Brother, this the one said to be the most serious”, “M. left all of them. M.A. will issue an arrest warrant against someone" / "Who was the prosecutor?", " Is it possible for us to reach a document related to this issue?" / "What kind of document "...".

- The message sent on 18 December 2015 at 09:54 p.m. was "Brother, can you write about the developments?”

- The messages sent on 20 December 2015 between 04:14 p.m. and 07:34 p.m. were “Brother …”, “1- Are 5 detained persons from the terrorist organisation … or have they been detained for the offences of forgery and fraud? 2- Has the public prosecutor’s office objected to you, requesting the detention of those released?”;

- The messages sent on 21 December 2015 between 12:40 a.m. and 09:38 p.m. were “Brother, those detained are from the organisation”, “The objection of the public prosecutor’s office regarding the persons who were released is before me. Their detention is requested again. Today, I must make a decision. I will examine the files and dismiss them”, “Brother, I dismissed the request for arrest. I released two persons. I was towards evening, I have not got the reactions yet”, “We will see tomorrow how the reactions will be. I think this file will never be taken outside my office”.

vi. Blacklisting of those expressing opinions against the FETÖ/PDY or fighting against the structure. For example, the message sent by suspect A.K., a ByLock user, on 14 February 2016 at 10.27 p.m. was “It should be determined which chief public prosecutors, which deputy chief public prosecutors, prosecutors and judges in which province are enthusiastic about this issue and who are their sources of motivation … All these should be identified and even uncovered, if needed”.

vii. Notification of the fact that in case of disclosure of the ByLock communication system, it will no longer be used, and alternative applications such as Eagle, Dingdong and Tango will be used.

viii. Holding benevolence (“himmet”/money collected by the FETÖ/PDY from its members regularly) meetings; providing money for the organisation members who have been suspended or dismissed from their offices; and changing the adresses where the members of the organisation will meet.

ix. Sharing certain web-site addresses carrying out activities for creating an impression that Turkey is supporting terrorism (for an attempt related to this purpose of the organisation, see Süleyman Bağrıyanık and Others) and supporting the questionnaires available on these websites.

x. Preparation of legal texts for the members of the FETÖ/PDY in order for them to use in their defences as well as appointment of lawyers for them. For example, the messaging between 14444 user-ID and 18491 user-ID on 1 January 2016 at 02:33 p.m. was "The 16th Criminal Chamber of the Court of Cassation, having ordered the continuation of the detention on remand, set the date for hearing on 21 January 2016 … With a view to extending the process; 1- rendering the panel of judges unable to give a decision, with such requests as recusal, release or challenge against decisions. If there is someone, within the panel of judges, who had previously worked with B. or Ö., there is either sincerity or hostility between us. It can be said that “I refuse this”. It can also be said to the judges respectively on different dates that “You have not worked in the field of organised crimes. If you had worked, you would have known that. Anyone may know that” within the scope of the immunity of defence. Hence, after the panel files a criminal complaint for defamation, it can be said that there has occurred hostility between us and therefore we request for recusal. 2- Getting the public prosecutor (or a TRT speaker if needed) to read the indictment as a whole. Even this will take a lot of time. 3- It was not possible to ask questions to the witnesses who were heard upon instruction. It should be requested that they be heard directly or via the Sound and Video Information System (SEGBIS) before the panel of judges where we are also present. 4- For the recusal of the judge, it is necessary to request that the applicants’ lawyers be heard as witnesses. 5- Time should be requested to examine all files in the country and add their certified copies to this file as well as to make a defence against the information and documents included in the file. 6- The statements of the Chief Supervisor from the Supreme Council of Judges and Prosecutors who conducted the process for detention as well as all judges and prosecutors taking part in this process should be requested as witnesses (It should be precisely said “We request that this person should be heard for a given specific issue). 7- The legal expert to be appointed by the panel of judges for the failure of the execution of court decisions should be identified, the file in its entirety should be submitted, and it should be requested that the legal aspects as regards the detention of judges for judicial decisions be determined. 8- It may be told, if requested, that “We request that a legal professor … expert be heard at the next hearing”. At least 10 different experts (lawyer, faculty member including assistant doctor) at 10 hearings may be heard in this regard. 9- Time may be requested to appoint an expert lawyer to evaluate all statements and evidence. 10- All articles and opinions on the visual and printed media related to the incident that is the subject-matter of the case should be printed out and included in the file (in order to expand the file). 11- I am of the opinion that it is necessary to work actively in order to ensure that foreign press as well as foreign law associations also follow up these cases, and that the defence arguments of those convicted of Sledgehammer (Balyoz) and Ergenekon operations and of those serving on behalf of Adnan Hodja should be applied in order to show that there is not an easy touch, without causing a new trouble”.

xi. Planning of how the Government will be overthrown illegally, what the role of the members of the judiciary and security units having connection with the organisation will be, how the senior public officials will be forced to resign and how the media outlets and civil society will be taken under control. In this context, it was found that some of the senior members of the organisation had messaged among each other as the following, as stated in the decision of the 16th Criminal Chamber of the Court of Cassation –in its capacity as the first instance court– dated 24 April 2017 and numbered E.2015/3, K.2017/3: ““Things will not go back to normal without taking 2000 persons, elections will not be useful” said HE [Hodja Efendi] / “Things will not go right without walking to the palace and stoning and toppling that man” / “Actually, they all may be done in one morning” / “3 prosecutors will issue the indictment, the police will take into custody on grounds of reasonable suspicion” / “The judges will be arranged on the second day and it will finish” / “If you also take the members of the Council (Supreme Council of Judges and Prosecutors) and the media, you will make everything done in 1 day” / “Everything will change in a week” / “Then you will take over the country” / “Why did we conduct the 17/25 [17-25 December investigations] then?” / “There is preparation now” / “They make a list of the people who will be taken” / “I do not exactly know the manner, maybe the soldiers will enter directly” / “Oh snap! Who will fight?” / “Not as much as it was in Egypt” / “I mentioned that one morning … ” / “The issue of taking all of them” / “the Emn (group of persons infiltrated the security directorate) turned it into a project to present it to Hodja Efendi” / “I think we have to make a move full steam ahead”/ “It has been many years that we have been working for this” / “If it is not today …” / “Now this issue should be resolved” / “You mean we should keep waiting” / Emn says that if we are allowed, we can even do that before the soldiers enter” / “It is better to blockade them for security reasons” / “Then resignation and going abroad” / “Same as the members of the Council” / “All the media will be appointed trustees on the first day” / “The headlines will be “We have returned from the abyss, the chaos is over, and etc.”” / “It is 100 times more legal than now” / “If things are not in your favour, then you will say “State is my brother”” / “Things may be in order within one year” / “Now soldier means us” / “There is no external voice there” / “But it will happen anyway, if Hodja Efendi wants”, “If you gather 1000 people, it will be enough in the morning”, “Those who will not be taken into custody are ministers and etc.” / “You will blockade them as a measure for safety of life” / “The coup will not occur” / “The prosecutor will order custody”, “He will directly write to the garrisons” / “1 prosecutor is enough” / “The remaining falls to the law enforcement officers” / “I sent this scenario having written it in detail”, “It is three files” / “ISIS, treason and 17-25 December” / “Even President may legally order custody” / “Then they will be asked to resign under blockade” / “Those who will refuse will be sent to Imralı or abroad” / “All media will be appointed trustees at the same time” / “Who would be the perpetrator of 17-25” “If it could have been made completely” / “We will say that our service (Hizmet)is not a party to this process, and that this is completely a legal issue” / “A haber (a TV channel) will make news in the evening such as “Turkey have returned from the abbys, It has recovered, and etc.”, the man’s palace and money will be uncovered …” / “Hodja Efendi said there is nothing to do with those men within the country” / “In fact, there are 3 possibilities”, “1st is to apply the project, 2nd is to wait for the divine protection by keeping silent, and 3rd is to continue like in 80s as a small criminalized group”.

b. Feature of Communication by E-mail

48. Communication by e-mail via ByLock is a feature that allows for sharing longer texts compared to instant (short) messaging. This function of the application can be described as closed circuit. This feature allows for sending or forwarding e-mails individually or collectively only among the program users. The investigation bodies could not obtain data indicating that e-mails have been sent from an account with ByLock extension to the accounts with Yahoo, Hotmail, Gmail, Outlook and etc. extensions or vice versa.

49. It is considered that this feature of the program was mostly used to share the instructions, opinions as well as the alleged dreams of the FETÖ/PDY leader Fetullah Gülen and to motivate the members of the organisation. Some of the organisational abbreviations specified by the members of the organisation in their statements had also been used in their messages and e-mails (DCE - Study home brother/sister, BTM - Regional head responsible for students, BBTM - Grand regional head responsible for students, EC - Education consultant, T - Code of judges and prosecutors, which is T1, T2 .... T5 according to their professional years, and A – Code for those who was promoted from being a lawyer to be a judge or prosecutor, which was also classified as A1, A2 ...). Some e-mail contents as part of the organisational communication were found to have been related to the following issues:

i. With a view to putting the Republic of Turkey in a difficult position at the international level, creating an impression that it supports terrorism.

ii. Sharing certain web-site addresses carrying out activities for this purpose and supporting of the questionnaires available on these websites by the members of the organisation by using VPN, that is to say, by showing that e-mails are sent from abroad.

iii. Forwarding the information, motivating words and instructions received from the leader of the terrorist organisation among the users. In this context, –as stated in the decision of the 8th Criminal Chamber of the Samsun Regional Court of Appeal, dated 15 May 2019 and numbered E.2019/302, K.2019/583– as regards the organisational communication by e-mail, some of the e-mails belonging to H.B., who was found to have been provincial imam within the organisation and who has been convicted of establishing and managing a terrorist organisation, which had been forwarded many times and included in the Bylock Identification and Assessment Report (“the ByLock Report”) are as follows:

- “Dream of a worker working in Kırıkkale. We were in a hall with workers in Kırıkkale. Hodja Efendi was making a speech. In the cinevision, there were the names, in a green list, of those who supported Bank Asya and the services in hard times. He said that this was the list of those who would go to heaven … There was also a red list, which was the list of those who had left … His speech was about these issues … At the end of his speech, he asked “Is there anyone who have questions?” … One of our brothers asked that when the process would end ... He smiled and told “I was waiting for this question” ... He said that the answer to this question would be given by the owner of the process namely our Prophet (peace be upon him) who was sitting in the next room … Our Prophet (peace be upon him) spoke from the next room: “It will continue until those who are outside reach the same level as the ones inside … (In terms of spiritual life)”.

- “Brothers, appointment of trustees to the institutions is seriously on the agenda and they started to come quickly. In this process: 1- We must follow the following issues carefully, cold-bloodedly and without creating a panic atmosphere. 2- General cleaning should be done urgently in all companies and institutions. 3- There should be no unofficial work and transaction in institutions. 4- No interviews or meetings should be held, except for the works and transactions of the institution. 5- Anyone who is not actually or officially in charge in the institution should not use the institution as a work office. 6- There should be no informal and undocumented money entry into and exit from the institution, which may leave the institution and service in a difficult situation before the trustee. 7- Board members, founder representatives and shareholders of the company should be informed by the company’s lawyers and financial advisors”.

- “When writing names in ByLock, never write real names. Everyone should write in a manner they can understand. Make sure that nobody can be reached in the event of a disclosure. It is very important. Let's correct it right now”.

- “We are in the final of a 100-year-old movie. Look at the role that God gave you in the final. Maintain a stance worthy of the final! This process is OVER (at the end of summer) !!! Now we are in the phase of EXAM, until all characters come to light and the reals are completely distinguished from the fakes. The complete elimination of this trouble is possible if the prayer deserved as a result of the sufferings experienced during this process prevails the prayer of the other party. Now the most fortunate ones among seven billion people in the world are those who are bound and determined for the service in this process and have not changed sides!!! If you knew what it would bestow you beyond the veil, you will be thrilled to pieces!!! Especially, if you knew the blessing for those who are arrested, you would have yourself arrested!!! But facilitating the work of the tyrant is rudeness towards Allah.”

- “Hodja Efendi got general information about “Selam Tevhid” and “Tahşiye” cases at the private meeting. He said, ‘I always pray for those in the Yusufiye Madrasah.’ ‘This process will end soon.’, ‘This is not my personal conviction, also the USA, Russia and internal dynamics agreed on their leaving.’

- “Friends, so far detentions have mostly been due to the seized documents, lists of sacrificial, scholarships, donations, benevolence, trustees and course group, misstatements, panic, starting to testify before the lawyer arrives, technical information materials (CD, computer, laptop etc.), arrests and complaints. If you pay a careful attention, you can see that most of them are information, documents and technical materials ... In other words, they are the evidence obtained through a good search and examination. What is the reason for this? Which thoughts are revealing us?... The thought that ‘nothing will happen to us’. The consideration that ‘I have made the necessary cleaning’, ‘What comes out of this ...’ , ‘It will take a very long time until it will touch on us …’, ‘I die but I cannot leave them’, (for example, a photograph taken together with Hodja Efendi)These are special memories for me ... These are very precious; you cannot know how valuable they are ... These will be needed for service next year ... I will keep the lists somewhere and thus I will not forget them ... They searched several times but found nothing … I consent to everything. If I am sent to prison, then I will serve the sentence … We have not found this work by chance … We have made great efforts for this service … Look at yourself! I am already clean ... I also consent if I am executed … Even the jinn cannot find me in the place where I hide ... Soon this process will be over ... I know someone in some places. I will tell him to help us ...’ Friends, fire doesn't just burn the place it fell, it burns all of us. "

- “They obtained such information that the important lists are stored in flash memory inside the cevşens. They definitely look at the cevşens during house searches, including those which are on the necks. It is useful to make a general warning.”

- “They are investigating the loans received from other banks for Bank Asya, and they also seized 6 laptops the owners of which are indefinite. There may be a trouble in this sense. Is there anything to do?”

- “Brother, which institutions have been searched for?... What have been seized as evidence? … Was there anything likely to cause a trouble? Did the press come? Was any image taken? Will it appear on the news? Can we get detailed information?”

- “1) The budgets of the units are independent and autonomous in provinces. 2) The budgets of the units are determined by provincial servant and the person responsible for the unit; however, if any dispute arises between them in this respect, the regional servant and the person responsible for the unit will determine it. As for changing the personnel, the approval of the servant as well as of the person responsible for the personnel is required. The goals are set by the co-decision of the provincial servant and the person responsible for the unit. Outside the provinces, the units will not collect revenues from the provinces. In the provinces, the surplus of the unit budgets we have agreed since the summer will be granted to the provincial servants. The only ones who will be responsible in terms of the payments to be made by countries will be the provincial servants. Thus, the countries will not have to contact many addressees. Everyone will comply with these rules. If there is a different procedure, it will be corrected by speaking.”

- “We urgently removed and broke the hard disks in the computers of those responsible for students (‘talebeciler’). We must buy new flash disks and insert new hard disks into computers. The prices of hard disk and flash disk each is 150 Turkish liras. In total, we must set 300 TL budget for each person. We have taken the promise that they will not tell and grant this new system to anyone. We should not give it to anywhere other than the students system.”

c. Feature of Creating Groups

50. Names of the groups (such as Women in the Region (“Bölge Bayan”), Those responsible for Surveyors (“Etütçüler”), Abi responsible for houses (“Ev abileri”), Imams (“İmamlarım”), Those responsible for Schools (“Okulcular”), 8 abi (“8 abiler”), Those responsible for 8 units (“8 birimciler”), 8 big regions (“8 büyük bölge”), Those responsible for regions (“Bölgeciler”), Those responsible for graduates (“Mezuncular”), Those responsible for students (“Talebeciler”), Those responsible for universities (“Üniversiteciler”), Voluntary Subscribers of Zaman Newspaper (“Zaman Gönüllüler”), Responsible (“Mesul”), Those responsible (“Mesuller”) and Marriage (“İzdivaç”)) in the application, through which a group communication is possible, are consistent with the specific literature of the organisation, which is frequently used by itself, and its cell-type hierarchical structure. In addition, it has been understood that the names of the groups created by members of the organisation in the ByLock application and the classifications in the evidence other than the ByLock were similar. As explained in the "Report on the Confidential Structuring of the FETÖ Armed Terrorist Organisation in the Security Directorate” issued by the EGM-KOM Department, the expressions/coding such as general manager – manager – teacher – guide - zb (group leader) which were determined by the organisation were also among the names of the groups created in the ByLock program.”

d. Feature of Voice Call

51. Among the data obtained regarding the ByLock program, there are records of the logs pertaining to the voice calls. Among the source codes of the application, a Turkish expression, namely sesli arama, is also available. The technical units within the investigation authorities have concluded, relying on this data, that the ByLock application allowed its users to have voice calls with each other. With reference to the digital data obtained, information on the date and time of the calls made by many users via the application and whether the said calls were successful has been reached.

e. Feature of Sending Images/Documents

52. The technical units, having examined the data related to the application, have concluded that the program also allowed for sending images and/or documents. Thanks to this feature, members of the organisation were able to send organisational images and documents without the need for any other means of communication.

53. It has been determined that the members of the organisation shared files with .apk extension, which enabled the ByLock application to appear not with its own icon but with the icons of commonly used programs (especially, WhatsApp, Google, etc.). According to the assessments of judicial authorities, the purpose of such an act was to ensure that the ByLock application was not seen by those other than the members of the organisation while sending data and document as well as to prevent the disclosure of the fact that the ByLock application was being used for a secret purpose.

6. The Features of the ByLock Application that Distinguish It from the Others

54. The Court of Cassation compared the ByLock program with the other common messaging programs in its decisions where it considered all elements concerning the program together. The judicial authorities, having evaluated the structure and general features of the ByLock application, together with the statements taken as well as the other evidence collected, have concluded that this program was made available exclusively for the members of the FETÖ/PDY under the cover of a global application.

a. Institutional and Commercial Character of the Application

i. The ByLock program was not designed for commercial purposes. In this context, it could not be established whether there was an attempt to promote the program, nor is there any data indicating that there were efforts to increase the number of its users. While many of the internet-based instant messaging applications aim to increase their brand values and earnings by reaching as many users as possible, the ByLock application, instead, targeted a certain number of users based on anonymity. It has been determined in the content analysis of the messages that the program was desired to be hidden from third parties and that it was also desired to prevent the identification of the connections made to ByLock servers.

ii. Payments concerning the transactions (such as renting a server and an IP) carried out for the operation of this application by way of renting a server in another country were made anonymously. Moreover, there is no reference about the previous works of the person who has developed and released the ByLock application. Nor is there accessible contact information about him.

b. Protection of User Information and Communication Security

i. ByLock, which requires its users to know some personal information in order to communicate with others as well as requires the parties to add each other as friends by using such information, is a program where each message is encrypted with a different crypto key. This encryption method aims at preventing third parties from accessing such information without permission (hacking) in case of transfer of information between the users.

ii. ByLock communication system operated through a server with the IP address 46.166.160.137. It has been determined that nine IP addresses allocated to a company engaged in renting servers in another country were also used in various versions of the ByLock application. According to the judicial authorities, renting more than one IP address serves the purpose of making it difficult to identify the users.

iii. It is required to know the username/code of the other party in order to be able to communicate through ByLock. Accordingly, unlike common commercial applications, it is not possible to add to the contact list a user whose username/code is unknown and to contact him without his confirmation.

iv. The ByLock system is designed in a way to ensure that the messages are received after opening the application so that the irrelevant persons will not hear about the application and will not read the received messages accidentally. In the ByLock application, there is a closed circuit system for e-mails as well, which can be used only by ByLock users. The large part of the contents of the messages and e-mails are related to the organisational correspondence.

v. Unlike common messaging applications, ByLock does not offer fast communication to its users. In order for communication, it is not enough to install the program. It is also required to complete the installation and confirmation processes carried out in a certain and confidential manner. While registering the application, it is paid attention not to write real names as usernames. Failure to use verification criteria for a new user will make it difficult to identify the user. In other words, the fact that no personal information is requested during registration indicates that anonymity is sought to be ensured, thereby making it difficult to identify the user.

vi. Messages sent/received through the “ByLock” are automatically deleted from the device after a certain period of time. Even if the users forget to delete any data, the ByLock system has been designed to take the necessary precautions. Thus, even in case of seizure of the device within the scope of an investigation, access to the persons in the user list of the application as well as to the previous messages in the application is blocked.

vii. Data related to the server and communication is saved in an encyrpted manner in the application database, which is another measure taken for preventing the identification of users as well as for ensuring the safety of communication.

viii. The users accessing the application from Turkey are forced to access via VPN in order to conceal their identities and communication.

c. Whether ByLock is a Global Application

i. It has been determined that most of the users of the ByLock application were from Turkey.

ii. The server manager of the ByLock application announced that he had blocked the access of some IP addresses from the Middle East to the application. In spite of this, it has been found that almost all of the blockings concerning the ByLock application concerned the IP addresses originating in Turkey. Accordingly, the connections from the Middle East were in fact the connections from Turkey. This is an indication of the fact that the application did not appeal to global audience.

iii. Source codes of the application include certain Turkish phrases. In this scope, among the source codes of the system, there are Turkish phrases such as “yetkiniz yok (you are not authorized)”, “dosya (file)”, “posta (mail)” and “sesli arama (voice call)”. In addition, a large part of the user names, group names and the passwords broken are in Turkish. Moreover, almost all of the deciphered contents of the communication made via ByLock are in Turkish.

iv. There was a substantial increase in the queries made through search engines as from the date when access to the ByLock application through Turkish IP addresses was blocked.

v. Web-based posts concerning the ByLock application were mainly shared through fake accounts, and these posts were in favour of the FETÖ/PDY. The application, which was used by a large group of users, had not been known by the Turkish society or abroad before the coup attempt of 15 July.

vi. Even if the program was placed in general application markets under the cover of a global application, it required a special installation process and there was no user manual in this regard. The FETÖ/PDY, having allowed the ByLock application to be downloaded from general application stores in early 2014, made it obligatory to install this application on phones or electronic/mobile devices through means such as external memory, memory cards or Bluetooth, instead of downloading it from general application stores, fearing that its users might be identified by judicial authorities. In this regard, the message sent by 135707 user-ID on 9 December 2015 at 09:17 p.m. was “Salaam, our big sisters are downloading the ByLock application from Google Play to install it on their phones. It is absolutely wrong, and those who have done this need to format their phones. Bylock or Turquoise should be sent via Bluetooth. That’s because the applications downloaded from Google Play are taken to the surveillance list”.

vii. Unlike common commercial messaging applications, sections such as user manual, frequently asked questions and feedback area are not available in the ByLock application. According to the judicial authorities' assessment, this is an indication of the fact that the ByLock application was not accessible to everyone but to those who would use it within the organisation.

7. Organisational Features of the ByLock Application

55. As a result of the studies carried out regarding the ByLock application, the reports issued by the investigation units and the decisions of the Court of Cassation included some findings as regards its relationship with the FETÖ/PDY as well as its organisational aspects. These can be summarized as follows:

i. Some suspects, whose statements were taken after the coup attempt of 15 July, and those accused, who were still on trial, stated that the ByLock application was used exclusively by the members of the FETÖ/PDY as an organisational communication program since the beginning of 2014. In this regard, the content of e-mail correspondence between 43284 user-ID and 43273 user-ID on 28 January 2016 at 06:32 p.m. was “1) We will use the word ‘WhatsApp’ instead of ‘ByLock’ mail. 2) Ravis should be deleted before being forwarded if there is no special purpose. 3) It is inconvenient to send photos, as they remain in the memory of the device. 4) We, especially those using wide screens, should use it outside the sight of the cameras in public places. 5) It is recommended to create a new account in cases of duty change. 6) We should not travel while the whatsaby is running (a technology where hgs and hts match is available) and keep it running in our destination and at nights. 7) Prayers, articles, columns, recommendations and notes should be shared vertically and here, as a clean source, should not be contaminated with horizontal sharing. 8) Technology should be used like ordinary people (an ordinary person does not carry family line, precautionary phone, data line/device and power bank all together). We may carry a tablet and a phone or just a phone (precautionary phone). We should not draw attention by carrying three or five devices like a transformer, both technically and physically. 9) There should be no devices in which the last version cc has not been installed, especially in devices where we use whatsaby. 10. No program other than whatsaby should be used in messaging. Those found to be messaging through another program or a normal line will be accused of imprudence that is a very severe charge. 11) Apks of the files such as whatsaby, cc, vpn and kakao should not be transferred via bluetooth. A sd card or whatsaby may be used for transfer. 12) A google play account or a map program like yandex should not be installed on the device in which we use whatsaby. WhatsApp and whatsaby should never be on the same phone. 13) Never use any application that is not said to be used vertically ...”.

ii. The messages and e-mails, which were obtained from the ByLock, contained certain abbreviations about which the organisation members gave information in their statements and the literature peculiar to the organisation. The necessity, for enabling two users to get in contact, to add each other is regarded as an indication that the ByLock application was developed in pursuance of the clandestine cell-type structure of the organisation. In this framework, a former member of the Council of Judges and Prosecutors (“the CJP”) who has been convicted of membership of the FETÖ/PDY indicated in his statement that the ByLock application had been installed on his phone by another member of the organisation in November 2014, that while the elections of the CJP were taking place in 2014, the organisation used the ByLock program, and the provinces were communicated with through this program (see the decision of the General Assembly of Criminal Chambers of the Court of Cassation, dated 2 July 2019 and numbered E.2019/9.MD-312, K.2019/514).

iii. There are also other findings that the application had been created and developed by the members of the organisation at the very beginning and used for organisational purposes. As stated in the ByLock Analysis Report, as a result of the analysis of the data as regards the first hundred (100) user-ID numbers in the database of ByLock servers;

- The users of five out of the first thirty user-IDs could be identified;

- It has been determined that the User-ID:3 was a computer engineer working in the TUBITAK. In addition to using ByLock, this person is also charged with the membership of the FETÖ/PDY according to some other evidence collected;

- It has been found that the usernames and passwords of User-ID:2, user-ID:3, user-ID:5 were similar to each other, that the relevant user was Turkish due to the user name "dede" (Turkish version of the word “grandfather”) and that therefore the users of these three user-IDs might be the same person;

- It has been found that the passwords of the User-ID:4 and User-ID:6 were “samanyolu” which has a symbolic meaning in the terminology of the organisation and that this word also indicates that the user was Turkish and the application was being used by someone of Turkish origin.

- The users of 53 out of the first hundred (100) user-IDs in the ByLock database could be identified. It has been determined that 15 of these user-IDs were working at different ranks in the intelligence unit of the law enforcement agency and stood trial in cases of illegal wiretapping. 3 user-IDs were subject to investigation/prosecution on the basis of the allegation that they were confidentially responsible for the law enforcement agency on behalf of the FETÖ/PDY.

- In the examinations regarding the contents of the messages/e-mails of the remaining users among the said first hundred (100) user-IDs, other than those mentioned above, it has been found that the User-ID:49 (M.Y.) was Fetullah Gülen’s private secretary who organised those who want to interview with the leader of the organisation, conveyed the relevant information and notes to the leader and also conveyed the instructions he received to the members of the organisation; that the user ID: 63 (M.K.) and the user ID: 100 (M.P.) were the senior officials confidentially responsible for the law enforcement agency on behalf of the FETÖ/PDY; and that they were prosecuted.

- It is evaluated in judicial and technical reports that considering the findings reached regarding the first hundred (100) user-IDs, this application was only used by the members of the FETÖ from the very beginning. Judicial authorities, considering the data related to the relevant user-IDs, have concluded that they were the founder, developer or administrator of the ByLock application.

iv. In addition, as a result of the examination on the contents of the ByLock application as well as the user information, it has been determined that 175 persons who were found, at the end of the investigations and prosecutions conducted against them, to have been the senior executives of the FETÖ; 52 judges and 23 public prosecutors who had attended a number of investigations and prosecutions that are known to the public as Ergenekon, Balyoz (Sledgehammer) and Askerî Casusluk (Military Spying); and 5,922 out of 8,723 persons, who were suspects or accused in the investigations and prosecutions conducted against the confidential structure within the law enforcement agency, were ByLock users.

v. Contents of a number of messages confirmed the findings of the judicial authorities that ByLock was developed and used as an organisational communication tool. Here are some examples of this: The message sent by D.K. with 336365 user-ID on 30 January 2016 at 12:29 p.m. was “They are aware that the Community is using ByLock”, and the message sent by K.A. with 112875 user-ID on 11 January 2016 at 07:29 p.m. was “ByLock is a system that we have ordered for ourselves… In urgent cases, it is turned off and everything is deleted”.

vi. When the messages and e-mails in the ByLock application are examined, it is seen that they contain organisational purposes and contacts instead of daily activities. Some groups referring to the terrorist organisation’s hierarchical structure which is one of its elements were created in the program. The ByLock users, in their posts related to the FETÖ/PDY, also included a lot of information about the organisation, especially the names of the institutions associated with the organisation. In the relevant posts, the words that raised/triggered the levels of revenge and spiritual belief of the members of the organisation, that encouraged them as well as motived them to obey and that praised the leader of the organisation were chosen.

vii. ByLock users have also taken certain measures to conceal their identities. To that end, the users used code names instead of their real names in their messages and contact lists, and they also created long passwords (In this regard, for the findings and statements in the Constitutional Court’s judgments pertaining to the fact that the persons having relations with this structure used code names, see Alparslan Altan, §§ 11, 25, 134, 137; Erdal Tercan [Plenary], no. 2016/15637, 12 April 2018, §§ 16, 34, 151, 152, 153; Recep Uygun, no. 2016/76351, 12 June 2018, § 15; and Mustafa Mendeş, no. 2018/1349, 30 October 2018, § 17).

56. The relevant parts of the statements obtained during judicial investigations or prosecutions regarding the above determinations and assessments concerning the organisational features of ByLock are as follows:

i. The relevant part of the statement of suspect A.A., taken on 28 December 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Adıyaman Chief Public Prosecutor's Office is as the following:

"Those responsible for the units were sharing the events that occurred in their units as well as the news and information they received. For example, if there were any problem about a member of the community, the responsible police officer would convey this situation via ByLock. He could give information as to whether the relevant person was being followed or whether his phone was being wiretapped. I do not know how he got this information.”

ii. The relevant part of the statement of suspect E.G., taken on 21 October 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8111 conducted by the Adıyaman Chief Public Prosecutor's Office is as the following:

“We used to receive motivational messages through these programs ... The reason why these messages were sent was that we would explain the subject matters of these messages to our inferiors.”

iii. The relevant part of the statement of suspect H.K., taken on 30 September 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/1530 conducted by the Bayburt Chief Public Prosecutor's Office is as the following:

The topics of the sohbet activities and the details of gatherings were announced through this program. There were also others, but I don't know what their real names were because they used code names. The topics of the sohbet activities were the books of F. GÜLEN, the video recordings of F. GÜLEN, religious stories and religious issues.”

iv. The relevant part of the statement of suspect F.G., taken on 25 August 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/8111 conducted by the Trabzon Chief Public Prosecutor's Office is as the following:

“We started the sohbet activities together with Y.D. who was working in the G. police department. The date and time of gatherings were notified by A. to the police commissioners H. or Y. through the program the name of which was ByLock and he then gave us this information. He was also sending us quotations from Fethullah GÜLEN's books and epistles from time to time”.

v. The relevant part of the statement of suspect U.S., taken on 4 September 2016, in the presence of his lawyer, within the scope of the investigation no. 2016/90080 conducted by the İzmir Chief Public Prosecutor's Office is as the following:

“As for the contents of messages, we shared information about those who were taken into custody or detained. We also exchanged ideas about how to act in cases of police custody.”

vi. The relevant part of the statement of suspect M.K., taken on 5 September 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Konya Chief Public Prosecutor's Office is as the following:

“In this process ... we were asked to install another program called ByLock on our phones … with the thought that it would be more confidential, since the activities carried out within the community were afraid of being disclosed. ... After installing this program called ByLock, we started to make our all calls and communications regarding the activities of our community through this program, as we had been told to do so.”

vii. The relevant part of the statement of suspect M.T., taken on 13 October 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Samsun Chief Public Prosecutor's Office is as the following:

“One day when I met the relevant person with the code name H. in the student house, he told me that he was using the program called ByLock, that he was messaging with his friends who were staying in students houses through this program, that the program was only used by the members of the community, and that he would install the program on my phone if I wanted … He downloaded the program on my phone via Bluetooth and then installed.”

viii. The relevant part of the statement of suspect A.A., taken on 15 February 2017, in the presence of his lawyer, within the scope of the investigation no. 2016/14839 conducted by the Malatya Chief Public Prosecutor's Office is as the following:

“The time and place of weekly meetings, the situation of university students and houses in the province as well as the military students were talked about through ByLock. In addition, the messages and notes said to have come from Fetullah GÜLEN were shared. Besides, the exaggerated dreams of people named as the mollas of Fetullah GÜLEN in America, which aimed at increasing the motivation of the members of the organisation and preventing them from leaving the organisation, such as ‘Good days are coming. I saw our Prophet in my dream; he has good news for you.’ were told.”

ix. The relevant part of the statement of suspect M.T., taken on 18 January 2017, in the presence of his lawyer, within the scope of the investigation no. 2017/14839 conducted by the Malatya Chief Public Prosecutor's Office is as the following:

“In general, the messages that the organisation wanted to convey to its members, the texts to be read during sohbet activities and the instructions for the members of the organisation were sent to us through ByLock by our superiors … We would convey the messages to our inferiors through ByLock or tell them those, who were not using the ByLock application, during the sohbet activities. Among the received messages, there were also political ones.”

x. The relevant part of the statement of suspect A.S.K., taken on 5 December 2016, in the presence of his lawyer, within the scope of an investigation conducted by the Karaman Chief Public Prosecutor's Office is as the following:

“We were communicating with several people and provincial officers who were in my position, namely those delivered speeches during sohbet activities. We were also communicating with one or two people from the sohbet activities through this program. We were communicating with the person responsible for the group (“grup abisi”) through this program.”

xi. The relevant part of the statement of İ.S.K. taken during the prosecution process, as stated in the decision of the 1st Chamber of the Kırıkkale Assize Court dated 15 September 2017 and numbered E.2017/255, K.2017/244, is as the following:

“I was told to install this program after being told the followings. We were told that there were some in-state powers which were hostile to the service movement and wanted to destroy it, that there was a risk of making us guilty by any manipulation in the digital media, internet and phone we used, and that we should be protected against all these by using this program. Therefore, I was told to install the ByLock program … In addition, motivating messages related to this conflict process would be received. In other words, the messages such as ‘it is almost over, it will be over, hopefully we will be more comfortable’ would be received.”

57. In addition, considering the importance of the ByLock program for the organisation, various defence strategies have been developed by the members of the organisation against possible judicial proceedings for the use of this program. In this context, as stated in the ByLock Analysis Report, as a result of the investigation into the other digital documents which were not related to the ByLock application but seized within the scope of the investigation no. 2017/68532 that was conducted by the Ankara Chief Public Prosecutor's Office, it was found that there had been an instruction text indicating various scenarios as to how the members of the organisation, who were found to have been using the ByLock application, would give statement before the judicial authorities. The said text which is included in the ByLock Analysis Report is as follows:

"WE SHOULD STRICTLY DENY THE EXPRESSIONS SUCH AS ‘YOU HAVE BEEN FOUND TO BE USING BYLOCK’ AS WELL AS THE QUESTIONS TO THIS END. YOU WILL SAY THAT ‘I DO NOT REMEMBER USING A PROGRAM LIKE THAT … OUR GENERAL PRINCIPLE SHOULD BE TO DENY EVERYTHING ... LAWYER BROTHERS SAY: ‘WE WILL DENY, EVEN IF THEY FIND A FLASH DRIVE IN OUR POCKETS’. IF WE ACCEPT EVERYTHING, WE WILL BE IN TROUBLE ... YOU WILL SAY, WITH NO PANIC, THAT ‘I DO NOT REMEMBER’.”

...

Our program may still be available like ByLock, so it is necessary to do a cleaning urgently. Then, what are you going to do? > There are 3 lines on the left on play store where there is the option of ‘my applications’. There are two tabs, which are ‘DOWNLOADED’ and ‘ALL’. In the latter, there are all the programs you have installed. If there are programs there such as Cover me, ByLock, etc., they should be deleted ... Of course, if you restore factory settings and use a new e-mail address everything will have been cleaned.

...

... We can say easily that the content of any of the mentioned programs (eagle, bylock, tango) and the similar programs with such interface or the messages sent/received have still not been deciphered by a technical surveillance or any other method. The necessary measures have been taken technically in this regard. The messages in the press are those shown by a few betrayers to the viles and the correspondence of the persons whose phones were seized unfortunately while the program was open.

... Those whose ByLock IPs have been determined may most probably be subject to judicial proceedings. Things to be done at this stage are listed below:

1. First, our IP addresses and mobile phone numbers connected to these IP addresses are determined. It does not matter which mobile phone we use. Although it is highly probable that the IMEI numbers of our mobile phones on the date when a given server is connected will be added to the file within the scope of such judicial investigation, the persons who are still using those mobile phones should immediately destroy them without selling or giving them to someone else. This issue will later be taken as an argument for our defense (Those who say my phone is very valuable may keep it in a place where it cannot be found. But if it is found, the responsibility is on them). The main purpose here is that the device you used at that time will not be seized by the police. In this image study, rather than reaching the ByLock application, it is aimed to develop arguments such as that this IP study is a conspiracy. That being the case, if the device on which you used the ByLock application in 2014 were seized by the other party, it would provide additional evidence for them.

2. If we have not logged in without VPN as at that time in our mobile phones we are currently using, then there is no problem. The friends who have such phones should protect their phones with a password as usual, and in case of a probable detention ... they should restore factory settings and then give the phone to those concerned.

STEPS TO BE TAKEN DURING THE STATEMENT-TAKING PROCESS: NOTE: The accusation against us will be the membership/leadership of organisation as well as the confidential use of the communication systems of the organisation.

3. First, you will examine the official letter issued by the Telecommunications Communication Presidency (TIB) as well as the document indicating which IP address belongs to whom and on which date. Afterwards, they will say “It has been determined that you have been using the program called ByLock that is the confidential messaging program of the FETÖ7PDY, on your mobile phone no. 0532….. and with the IP no. … For what purpose have you used this program, what instructions did you receive or send through this program? ...

...

REPLY: - SCENARIO 1: First, I reject the claim of organisational messaging attributed to me. I never used such a program. The document before you has been issued by the institution named TIB about which our President said 'It belongs to the FETÖ, is no longer reliable and will be closed’. It is tragicomic that I have been taken into custody for membership of the FETÖ based on the document issued by the said institution. I strictly reject these accusations. I think that this institution deliberately aggrieves the persons who are not member of the FETÖ. Besides, don’t you have to prove in the first place with concrete evidence that the software of the program you have told me about belongs to the FETÖ/PDY and then accuse me, relying on the report issued by a reliable independent/impartial institution indicating that I have really connected to the said program? For years many FETÖ members have been arrested. I am sure that all used the programs called WhatsApp and Kakao. According to you, are the company that released the WhatsApp application as well as many Koreans using the Kakao application members of the FETÖ? You have failed to put forward concrete legal evidence. Besides, you have seized my mobile phone (here we try to misdirect). You will find the program in this mobile phone, if it is really available. … In addition, I have never used a messaging program other than WhatsApp in my life. I am not good at technology…

-SCENARIO 2: (NOTE: This scenario would be more convincing, if preferred by the friends engaging in computers, social media and software and hardware works and hobbies related to these. In this scenario, deleting/installing a program should be explained in a very uncaring manner that it is a very common process.) I remember the program you have told me. I am very interested in technology. I follow the new programs on the related websites. I have been using smart phone since the day it was released and I follow the technology closely to use the phone efficiently. I download many programs from recipe to shopping and social media programs. If I don't like them, I delete the programs. I do not remember the program you have told me. If you tell me who made the software, I may make a comment about it. However, since I am a nationalist person, I usually download the programs released by Turks so that they can make more money. Probably the program you have told is such a program. Besides, you have failed to show me the message I allegedly sent through this program and was also allegedly organisational…

-SCENARIO 3: NOTE: It is worth trying this scenario. I do not remember having installed such a program. But I don’t think the name of the program has been heard so much. As everyone else, I may have wondered it in the Chat program category, downloaded, installed and then deleted it. I think the claim of organisational is funny and unrealistic...

-SCENARIO 4: I have never used such a program. I would have remembered if I had used it. You show me a document where my mobile phone has been identified through IP determination process. I wonder how reliable this document is. Besides, even if it is true, anyone who took my mobile phone may have downloaded this program and then deleted it. You have my phone, look and examine it. You cannot show me a single message that I sent through this program. You only present as evidence a document issued by an institution whose reliability is questionable. I absolutely deny the allegations against me.

SCENARIO 5: IF THE DOCUMENT THAT IS PUT FORWARD WAS NOT A TEXT ISSUED BY THE TIB UPON AN OFFICIAL REQUEST AS WELL AS UPON THE RELEVANT COURT DECISION, BUT A DOCUMENT INCLUDING THE ANALYSIS REPORT ISSUED BY THE MİT/INTELLIGENCE AUTHORITY, THEN WE WILL GIVE A SINGLE ANSWER: THE DOCUMENT YOU HAVE SHOWED ME IS NOT LEGAL, THIS IS JUST AN INTELLIGENCE REPORT. BESIDES, I HAVE NEVER USED SUCH A PROGRAM. I DENY THESE ILLEGAL CLAIMS WHICH ARE NOT BASED ON AN INTELLIGENCE REPORT. NOTE: AT THIS STAGE, ANOTHER SUGGESTED SCENARIO WHICH IS “I DOWNLOADED THE PROGRAM IN ORDER TO MESSAGE A FRIEND LIVING ABROAD, UPON HIS SUGGESTION” MAY SPOIL EVERYTHING. THEY WILL DEFINITELY CONSIDER THAT THE RELEVANT COUNTRY IS THE USA AND THAT YOU HAVE INSTALLED THE PROGRAM IN ORDER TO MESSAGE A SPECIAL PERSON LIVING THERE. THEY WILL THEMSELVES ESTABLISH THE ORGANISATIONAL RELATION WITH THAT PERSON … NEVER FORGET, WE WILL ALWAYS SAY THAT WE DO NOT REMEMBER HAVING INSTALLED SUCH A PROGRAM, AND WE WOULD HAVE REMEMBERED, IF WE HAD INSTALLED AND USED IT.”

8. Nature, Interpretation and Matching of ByLock Data

58. ByLock data, except for digital data like setup file of the ByLock application which was found in the devices of the accused persons seized during the judicial investigations and prosecutions conducted against them, are essentially based on two sources. The primary source is the raw log information including information on ByLock users, user-IDs, messages, e-mails, voice calls and log records pertaining to this information, which were obtained by the MİT. These raw data obtained from ByLock server constitute not the whole but a certain part of the data available on the server. The other source is the CGNAT data pertaining to the internet traffic reports demonstrating accesses from Turkey to ByLock IPs.

59. Raw ByLock data submitted to the Ankara Chief Public Prosecutor’s Office were subject to disk imaging process, and a copy of these data was delivered to the EGM-KOM for examination. Another copy was secured by the evidence unit in a locked safe box. HASH value of the image of the raw data, as indicated in the report issued by the Security Directorate, is 32e17a8f36e426f4af83cce32a0f5087. Such images are secured in locked containers. According to the judicial units, the CGNAT data cannot be altered or impaired as they can be compared with, and thereby checked through other available sources.

60. As indicated in the reports issued by the investigation units, upon being delivered to the EGM-KOM, the ByLOCK data were shared with the provincial units of the security directorate, and thereby the real users of the matched subscribers were identified. The provincial units started to carry out analyses and inquiries so as to identify the real users of ADSL/GSM subscribers having access to ByLock application. These inquiries were performed in consideration of the rosters (a list of names assigned by other users), group information and contents of messages on the basis of the profile information within the ByLock data (username, password, name, general text). It was indicated that all ByLock data obtained with respect to the suspects/accused persons in this way were recorded in a report and appended to the files; and that all recovered data were included in this report.

61. As also indicated in the same reports, the raw data submitted by MİT to the Ankara Chief Public Prosecutor’s Office were not readable, and therefore, they could not be separated on the basis of user-ID without the assistance of an interface program. Raw data from the ByLock database were indexed as separate charts by the database systematic design, and the data available in the charts were interrelated with charts by use of codes included therein. An interface developed upon the instruction of the Ankara Chief Public Prosecutor’s Office operates in a way whereby all data available in the charts based on user-ID are categorised systematically and then recorded in the ByLock Report. These reports are appended to the investigation and prosecution files of the relevant persons who have been revealed to have a user-ID. The data which could not be resolved yet are still under examination. If any finding is obtained during the process, it is then submitted to the incumbent chief public prosecutor’s office.

62. In this sense, it is indicated in these reports that Turkey is in the same time zone with Lithuania, the country where the ByLock server is; that therefore, date/hour information of the ByLock database and that of the users connecting to the ByLock server from Turkey are synchronized. In the same report, technical analyses of the ByLock data on the digital platform, which are also referred to in the judicial decisions, are explained as follows:

“ByLock data are saved in the MySQL database, which is an open-source relational database management system. In order to open these data, MySQL database and one of the database management tools (phpMyAdmin, MySQL Workbench, Heidi Sql and etc.) need to be downloaded. After downloading one of the MySQL database management tools, charts belonging to the ByLock database will become visible. The charts are categorised as 'ACTION', 'ATTACHMENT', 'CALL_HISTORY', 'CHAT', 'CLIENT', 'EXCEPTION', 'SETTING', 'FILE', 'FILE_TRANSFER', 'GROUP_MEMBER', 'LOG', 'MAIL', 'ROSTER', 'USER', 'USER_GROUP' and include data of millions of lines. Data recorded in the charts are based on IDs (number assigned by the program). Information within the ByLock database, which serves the purpose of identifying the ID user, is segmented, and those to whom the IDs belong are identified as a result of the inquiries conducted.

As a result, the PHP-based interface, developed by virtue of the instruction given by the Ankara Chief Public Prosecutor’s Office, sends commands to the charts of the ByLock database in the background and thereby all data pertaining to ID are collected. Then the collected data are analysed and associated. Thus, such information is recorded in a report as a print-out. The interrelation among IDs is established, and by conducting an inquiry by the content, the users of these IDs are identified. Besides, depending on the interrelation between ID and the relevant person, all data in connection with that person are reported.”

63. In assessing the relevant ByLock data, the initial detection date specified in the ByLock subscription list points to the date when the subscribers first connected to the ByLock application server from Turkey without VPN.

64. In addition, it is also indicated in the report of the Security Directorate that data pertaining to ByLock application consist of messages and e-mail contents, profile information and incoming/outgoing calls. According to the report, the date written under the section titled First Log Date Determined in the ByLock Report -including the data available on the database- is the first log date which could be recovered with respect to the connections to ByLock server from Turkey. It is further indicated in the report that as the data on the ByLock database are only those which could be recovered (the whole data could not be recovered), 1) such data may show difference, to a certain extent, with the CGNAT records, 2) there may be certain differences between the first and last log date ranges of the log dates written on documents such as the ByLock inquiry result, CGNAT records, ByLock identification and assessment reports, 3) any record as to the access to the system may not be seen in the log chart for any time frame when a message or e-mail was indeed sent/received. It is therefore indicated that no discrepancy could be said to exist among the available data.

65. In that case, it is possible that connections, of a person whose log records with respect to certain actions performed on certain date or dates cannot be reported for not being recovered, to the server for these actions on these dates could be detected through CGNAT data. Besides, it is possible that although there is no CGNAT record for the person who got access to the application with VPN, this process could be logged on the ByLock database. It is further noted that this difference resulting from the inability to obtain all data available on both sources cannot be construed to the effect that there are contradictions among the available data.

66. It is further stated in the technical reports that the Bylock program manager performed certain actions so as to delete log records prior to 15 November 2014. According to the findings of the investigation units, it is possible for any datum on an information system not to disappear unless it is deliberately deleted or overwritten. The recovery process conducted, by the Department for Fight Against Cyber Crimes of the Security Directorate with respect to ByLock database, during the judicial investigation was successfully completed, and log information prior to 15 November 2014 was also obtained. Besides, although it was found out that the person considered to be manager of the ByLock server blocked access of certain Middle East ID addresses to ByLock server on 15 November 2014, connections subsequent to that date were also found through both the log records in the recovered database and the CGNAT data concerning accesses to the server from Turkey.

67. According to the Court of Cassation’s judgments as well as the assessments in the judicial and technical reports, an organisation member may successfully use the ByLock application only when he is informed, by another member of the organisation, of the existence of ByLock application, its use, confidentiality and organisational significance. As also noted in the Security Directorate’s report, there are no sections in the ByLock application such as operating manual, frequently asked questions and feedback. Although a person comes across with different versions of the ByLock program at application stores or on certain websites, he cannot use this program on his own and add other persons as a friend and get in contact with them through the program. It is indicated in the ByLock Analysis Report that this application has been used by the organisation as from the first user-ID number assigned; and that no investigation has been conducted until today by the Ankara Chief Public Prosecutor’s Office against any person merely for downloading ByLock.

B. Process as regards the Applicant

68. The applicant, born in Bolvadin in 1977, was serving as a guardian at the Foça Open Penitentiary Institution at the time when the impugned incidents took place.

69. Upon the denunciation that the court clerks and guardians, who were in relation with the organisation, would engage in provocative actions such as slowdown and arson with a view to interrupting the processes -with respect to the individuals who were taken into custody for their alleged membership of the FETÖ/PDY- before the court houses and penitentiary institutions, the İzmir Chief Public Prosecutor’s Office launched an investigation against 144 prison and probation officers including the applicant.

70. On the other hand, the applicant was dismissed from public office, by virtue of the Decree Law no. 675 on the Measures Taken under the State of Emergency, dated 3 October 2016, as he was in liaison with terrorist organisations or structures, formations or groups which acted, as decided by the National Security Council, against the national security of the State.

71. As no evidence to the effect that the applicant had involved in the said acts which were under investigation could be found, the investigation against him was continued for his alleged membership of an armed terrorist organisation. According to the evidence obtained during the investigation, the applicant was a subscriber to the ByLock application.

72. In the indictment of 22 May 2017, which was issued at the end of the investigation completed by the İzmir Chief Public Prosecutor’s Office, it was indicated that the applicant was revealed, as a result of the inquiry of 28 February 2017 made by the EGM-KOM, to use the ByLock communication program via the GSM number, the applicant had admitted to use, through 4 separate mobile phones. His first access to the ByLock application was on 13 August 2014. The incumbent chief public prosecutor’s office filed a criminal case against the applicant before the 15th Chamber of the İzmir Assize Court (“the court”), reaching the conclusion that he was a member of an armed terrorist organisation, namely the FETÖ/PDY.

73. In the report titled Result of New ByLock Inquiry, which is dated 30 June 2017 and was submitted to the court by the EGM-KOM, it is stated that as indicated in the indictment, the applicant used the ByLock communication program, through his registered GSM number, with 4 different mobile phones IMEI numbers of which were determined; and that he used the program for the first time on 13 August 2014.

74. According to the ByLock Report of 5 June 2017, which was drawn up, by the EGM-KOM, with respect to the applicant and appended to the file, the relevant data created as a result of the applicant’s access to the ByLock server through the GSM number registered in his name and used by him are as follows:

i. user-ID number "114205", username "serhat1299", password "Pl121212@", name "Serhat", message "Do not grieve, indeed Allah is with us (“Allah var gam yok”)!!!", last online date/time "14.01.2016, 20.43.40".

ii. According to the findings categorised as “data” and “log” under the heading “Statistics based on ID no. 114205”, the ByLock account was actively used for correspondence and e-mail. Number of e-mails sent is 68; total number of e-mails is 1.052; number of calls received is 30; number of entries logged is 159; number of received e-mail is 74 (data) and 190 (log); number of outgoing calls is 14; number of friends added is 4; number of received messages is 4 (data) and 172 (log); number of e-mails read is 108; total number of e-mails is 1.052; number of received files is 2; number of messages sent is 7 (data) and 258 (log); and number of e-mails deleted is 3.

iii. It appears that there are 24 data under the heading “Rosters Assigned by Those Adding ID no. 114205”; that some of the ID-users whose real users were identified and who added this ID to their lists were also a guardian like the applicant; and that this user-ID was named as “serhat” and “murat sıngrr” by some of the users.

iv. It appears that there are 25 data under the heading “Rosters Assigned by ID no. 114205 to those Added by this ID” where user-IDs, names and surnames, TR identity numbers and professions of the persons with whom user-ID numbers were matched, as well as user-ID numbers real users of which could not be identified yet, are listed; and that the applicant added some of these persons to his friend list by assigning them with rosters on his own.

v. It appears that there are 5 groups in total under the heading “Groups in which ID no. 114205 Joined and List of Persons in the Group” where user-ID numbers joining to these five groups and the identifying information of the users of these ID-numbers, who could be identified, are indicated. Under the heading “List of Persons Connected to ID no. 114205”, 27 user-ID numbers and identifying information of the users of these ID-numbers, who could be identified, are indicated. Under the heading “List of E-Mails Connected to ID no. 114205”, 24 user-ID numbers and identifying information of the users of these ID-numbers, who could be identified, are indicated.

vi. Under the heading “Correspondences with respect to ID no. 114205”, contents of the messages with the user-ID no. 244869 on 9 September 2015 and between the hours of 05.38.09 p.m. and 06.10.24 p.m. as well as with the user-ID no. 329688, whose real user was identified to be S.A., between 6 June 2015 (as from 11.55.07 p.m.) and 29 October 2015 (until 08.23.08 p.m.) are provided.

vii. Under the heading “E-Mails with respect to ID no. 114205”, there are e-mails which were sent to this ID-number from other users, of which contents have been determined or could not be determined yet as the password could not decrypted. It appears that in the e-mails of which contents could be determined, it is requested that goods and service would be procured from the private enterprises having relation/connection with the organisation, thereby providing support for these enterprises. In these e-mails, the organisation members are provided with information as to the judicial examination conducted into these enterprises, and plans are made concerning the places to be assigned as organisation houses. Besides, the users are warned in these e-mails that common messaging applications have been monitored by the State and all processes conducted through these applications have been recorded. Therefore, the users are advised not to use the common messaging applications. In the e-mails, information as to the investigations and prosecutions conducted against the organisation members is provided, and organisational acts and conducts of these persons are praised; information is provided on the methods applied by the judicial units conducting investigations into the organisation; and advices on defence tactics against these methods are given. It is also requested that internet sites whereby the instructions given, and speeches delivered, by the organisation leader, Fetullah Gülen, are published be followed.

viii. Under the heading “Call Records with respect to ID no. 114205”, findings as to 44 calls made via ByLock application with its other users; under the heading “Log Chart with respect to ID no. 114205”, 159 “login” processes through ByLock communication system performed with an Android device between 8 November 2014 and 14 January 2016; under the heading “All Log Chart with respect to ID no. 114205”, a total of 926 “login” processes through ByLock communication system between 8 November 2014 and 14 January 2016 are listed.

75. The court conducted inquiries into the questions whether the GSM number used by the applicant had connected to the target IP numbers of the ByLock server, as well as if connected, into the information about the relevant base station (CGNAT records) and the devices (IMEI numbers) through which the GSM number in question was used as from the date when he was revealed to use the ByLock application. The outcome of this inquiry was explained as follows by the court:

"In reply to the letter addressed to the Information and Communication Technologies Authority (“the BTK”), it was determined that the first connection to the ByLock app. was 13 August 2014 at 01:34:43 p.m.; that the mobile phone in question received signals from the base station located at İsmet İnönü Mah. … Menemen/İzmir and got in contact many times with several IP addresses through which the ByLock application provided service”.

76. As recorded in the National Judiciary Informatics System (“UYAP”), the BTK’s findings are as follows:

i. IP addresses of the ByLock program, information on contacts made through each IP number assigned by the operator of the GSM number which was registered in the applicant’s name and which the applicant admitted to have used himself (information on general IP, special IP, target port, IMEI number of the relevant device, date, time and base station separately for each contact).

ii. Information to the effect that through the internet of the GSM number owned by the applicant, a total of 12.166 connections to IPS addresses of the ByLock server were made between 13 August 2014 01:34:43 p.m. and 14 January 2016 10:15:46 p.m.; that at the relevant time, the GSM number was within the coverage of base stations located at İsmet İnönü Mah. …. Menemen/İzmir, Foça/İzmir or at other districts of İzmir or at different cities (Before the court, the applicant declared his residential address as İsmet İnönü Mah. ... Menemen/İzmir).

iii. Information to the effect that at the relevant times when IP addresses of the ByLock server were connected, the applicant’s GSM number was used with the devices IMEI numbers of which are indicated in the reports on the ByLock Inquiry results issued by the Security Directorate.

77. The applicant’s trial was completed within two hearings. During the first hearing, the applicant denied the accusations against him, noting that he was provided with any assistance by the members of this organisation neither entering into the public office nor performing his public duties. He further indicated that the GSM number which had a ByLock record was used by himself; that however, he had not used ByLock communication program; that he had not got acquainted with any persons, who were added by the applicant, or who added him, as a friend according to the ByLock Report; that he had nothing to say against the CGNAT records indicating his connections with the ByLock server; and that prior to his mobile phone which was on his body at the time of his arrest, he had used three different mobile phones brands of which were Samsung 3, General Mobile and LG.

78. The applicant’s defence counsel maintained that the findings as to the ByLock program were indeed digital evidence which could be tampered with at any time; that these data were obtained unlawfully; that the ByLock program was not intended for the organisational use and could be downloaded from any open source; and that end-to-end encrypting method was available in almost all of the messaging programs.

79. As a result of the inquiry conducted -via www.turkiye.gov.tr, a web-site operating under the scope of the e-state project- into the applicant’s GSM number and four separate IMEI numbers through which access to the ByLock server was ensured, it was found established that these IMEI numbers belonged to three mobile phones of different brands, which the applicant had mentioned in his defence submissions.

80. By the decision of 8 December 2017, the applicant was sentenced to 7 years and 6 months’ imprisonment for his membership of an armed terrorist organisation. In the reasoning part of the decision, the notion of terrorism is defined at the outset. It then provides explanations as to the establishment, aims pursued by, and the structure of the FETÖ/PDY as well as the ByLock communication program, lawful nature of the data concerning this program, and the fact that it was a program put into the use for the purposes of the said organisation. As the justification underlying the applicant’s conviction, the court relied on the consistency between the ByLock Report and the CGNAT data with respect to the applicant’s GSM subscription as well as on the finding that the applicant used ByLock communication program, which was designed for the use of the FETÖ/PDY members, with the username “serhat1299”.

81. On 31 January 2018, the applicant’s challenge against the first instance decision was dismissed on the merits by the 2nd Chamber of the İzmir Regional Court of Appeal.

82. Examining the appeal request, the Court of Cassation upheld the decision of 28 February 2019 whereby the applicant’s challenge against his conviction was dismissed on the merits.

IV. RELEVANT LAW

A. Domestic Law

1. Legal Provisions

83. The then Article 4 of Law no. 2937 on State Intelligence Services and the National Intelligence Organisation, insofar as relevant, reads as follows:

“Duties of the National Intelligence Organisation are as follows:

a) To create state-wide national security intelligence in respect of the existing and probable activities, performed at home and abroad, against the country, nation and territorial integrity of the Republic of Turkey, its independence, safety, constitutional order and national power; and to report such intelligence to the President, the Prime Minister, the Chief of General Staff, the Secretary General of the National Security Council as well as to the relevant institutions.

i) To gather, record and analyse information, document, news and data concerning foreign intelligence, national defence, counter-terrorism, international offences and cyber security by use of any kind of procedures, means and systems of technical and human intelligence, and to report the intelligence created to the relevant institutions.”

84. Article 6 of Law no. 2937, insofar as relevant, reads as follows:

"In performing its duties hereunder, the National Intelligence Organisation shall be empowered:

a) To establish direct relations with all domestic and foreign institutions and agencies, all organisations and formations as well as persons; to apply appropriate coordination methods.

b) To receive information, documents, data and records from public institutions and organisation, public professional organisations, the institutions and organisations under the Banking Law no. 5411 and dated 19 October 2005, as well as from the other legal persons and institutions with no legal entity. To avail from, and to get in contact with, archives, electronic data processing centres and communication infrastructure of these institutions and organisations. The institutions and organisations, which receive such requests, cannot abstain from fulfilling the request by relying on its own legislation.

...

d) In performing its duties, to adopt clandestine working procedures, principles and methods of covertly working;

...

g) To collect relevant data on foreign intelligence, national defence, terrorism, international offences and cyber safety, which are available on telecommunication channels.”

85. The then Article 134, titled “Search of computers, computer programs and transcripts, back-up and provisional seizure”, of the Turkish Criminal Procedure Code no. 5271 reads as follows:

"(1) Upon the motion of the public prosecutor during an investigation with respect to a crime , the judge shall issue a decision ordering the search of computers and computer programs and records used by the suspect, as well as back-up and transcription of these records, if there is strong indication of guilt based on concrete evidence and it is not possible to obtain the evidence by other means.

(2) If computers, computer programs and computer files/records are inaccessible, as the passwords are not known, or if the hidden information is unreachable, then the computer and equipment that are deemed necessary may be provisionally seized in order to retrieve and to make a back-up of the necessary files. Seized devices shall be returned without delay in cases where the password has been decrypted and the necessary copies are produced.

(3) During the seizure of computers or computer files/records, a back-up of all data included in the system shall be made.

(4) In cases where the suspect or his representative makes a request, a copy of this copied data shall be produced and given to him or to his representative, and such an exchange shall be recorded and signed.

(5) It is also permissible to make a back-up of the entire data or some of the data included in the system, without seizing the computer or the computer files/records. The backed-up data shall be printed on paper and this situation shall be recorded and signed by the related persons.”

86. Article 206 § 2, titled “Presentation of evidence and its rejection”, of Code no. 5271 reads as follows:

"(2) The request of presentation of any evidence shall be denied in the below mentioned cases:

a) If the evidence is unlawfully obtained;

…”

87. Article 217, titled “Power of discretion in relation to evidence”, of Code no. 5271 reads as follows:

"(1) The judge shall only rely upon evidence that is presented at the main hearing and has been discussed in his presence while delivering his judgment. This evidence is subject to free discretion of the conscious opinion of the judge.

(2) The imputed offence may be proven by using all kinds of legally obtained evidence.”

88. Article 314, titled “Armed organisation”, of the Turkish Criminal Code no. 5237 and dated 26 September 2004, insofar as relevant, reads as follows:

"(1) Any person who establishes or commands an armed organisation with the purpose of committing the offences listed in parts four and five of this chapter, shall be sentenced to a penalty of imprisonment for a term of ten to fifteen years.”

(2) Any person who becomes a member of the organisation defined in paragraph one shall be sentenced to a penalty of imprisonment for a term of five to ten years.”

89. Article 1, titled “Definition of terrorism”, of the Anti-Terror Law no. 3713, dated 12 April 1991, reads as follows:

"Terrorism is any kind of act committed by one or more persons belonging to an organisation with the aim of changing the characteristics of the Republic specified in the Constitution, its political, legal, social, secular and economic system, damaging the indivisible unity of the State with its territory and nation, endangering the existence of the Turkish State and Republic, weakening or destroying or seizing the authority of the State, eliminating fundamental rights and freedoms, or damaging the internal and external security of the State, public order or general health by means of using force and violence and by one of the methods of pressure, intimidation, discouragement or threat.”

90. Article 2, titled “Terrorist offender”, of the Anti-Terror Law no. 3713 reads as follows:

"Any member of an organisation founded to attain the aims defined in Article 1, who commits a crime in line with these aims, individually or in concert with others, or any member of such an organisation, even if he has not committed such a crime, is a terrorist offender. Persons, who are not members of a terrorist organisation, but commit a crime on behalf of the organisation, are also deemed to be terrorist offenders.”

2. Judgments rendered by the Court of Cassation

91. The judgment of the General Assembly of the Criminal Chambers of the Court of Cassation, which is numbered E.2017/16.MD-956, K.2017/370 and dated 26 September 2017, contains the following explanations on the FETÖ/PDY:

"The FETÖ/PDY is a typical and sui generis armed terrorist organisation which uses the religion as a front and a means to attain its non-religious earthly purposes; which acts in line with the instructions of the organisation leader having the intent of establishing a new political, economic and social order; which, to that end, primarily aims at having power and acts with great clandestineness -instead of transparency and openness- with a view to being strong and establishing a new order; which uses, as an intelligence organisation, codenames, special communication channels, and money source of which is not known; which tries to convince everyone that such a structuring does never exist and has grown and gained strength to the extent it has succeeded to give such an impression; which on the other hand brands those who are not one of its members as an enemy and thereby motivates its own members; which penetrates into the State from bottom to top, through its members named 'Golden Generation' in pursuit of the principle of seizing the system instead of clashing with it; which gains a certain strength within the State with the advantages offered by the Golden Generation and thereafter deactivates its opponents by means of illegal methods that indeed appear legal; which thereby aims at ensuring social transformation by taking whole sub-elements of the State under control and seizing the system as well as by using the public power it has gained; and which also performs espionage activities.

The FETÖ/PYD armed terrorist organisation, designated to take over all constitutional institutions of the Republic of Turkey by using its human and finance resources -based on a hierarchical structure composed of imams appointed to the advisory board, country, regional, provincial, district, neighbourhood and house units- in line with the organisational interest and ideology, is founded on the principles of 'living covertly, always fearing, not telling the truth, denying the truth'.

Fetullah Gülen, leader of the organisation, -which becomes mobilised collectively through instructions; which acts with the intent of taking control of the public sector notably critical bureaucratic positions exercising the public power; which has illegally placed its own staff, according to the hierarchical order specific to it, within the civil service, judiciary, security directorate, education sector, intelligence units and the army; which has ensured the State organisation to serve for it thanks to the members it has placed in all institutions of the State; and which has so to say formed a parallel structure within the State,- gave the following instructions to the organisation members during his speeches of different dates, which indicates the utmost importance attached to the confidentiality within the organisation:

'Be flexible. Move through their vital points without coming into prominence!; Progress towards the vital points of the system until reaching to all power centres without enabling one to distinguish you!'

'Existence of our fellows in the courthouses, the civil service or other critical institutions and organisations must not be regarded as individual existence. They are our guarantees in these units for the future. To some extent, they are guarantors of our existence.'

'It is not an appropriate time. You must wait until the moment we hump the world and obtain the strength necessary for carrying the world and the moment we would be complete and ready, and the conditions would be appropriate! Especially, we must be much ahead of the opposing party in gaining information.'

'I mean, you do not dominate there; there are other powers. It is advisable to walk along the road in a balanced, attentive, cautious manner by taking into account these powers so that we would not take steps backward…'

' Each step is considered to be early until the moment we would take along the power and strength in all constitutional institutions of Turkey. (...) I have explained my senses and thoughts implicitly within such a crowd. (...) Your secret is your captive; if you disclose it, you would be taken captive by this secret. '

'We must always be cautious. Always take decisions in consultation. Implement the decisions taken by the Council of the Most Exalted (“Başyüceler Şurası”), the main consultation body, (as a matter of fact, the head of Council of the Most Exalted is Fetullah Gülen). We have to get access to their power centres…'

'Tell me one day we have thousand houses in Ankara. Then I would seize the state by the collar, and when the state becomes aware of the risk, there would be nothing to do’.

The organisation even decides the person with whom its members, placed in public institutions and organisations, would marry by interfering with their family lives.

The organisational structure in the public institutions is formed by cells consisting of maximum five persons who are subordinated to the abi (“brother”) within the organisation. The cells are not aware of each other. It is thereby ensured that even if any cell is disclosed, the other cells would continue their activities without being disclosed. The organisation members pursue a strict military discipline within the organisation.

The sole authority and leader within the whole organisation is Fetullah Gülen. He is considered as a universe imam within the organisation. Other executives act with the authority he confers upon them and on his behalf.

Obedience and submission are strict rules that are to be obeyed within the internal hierarchy of the FETÖ/PDY armed terrorist organisation where the understanding of universe imam prevails and which operates as seven-layer pyramidal structure. Submission is the commitment to both the organisation and the leader’s instruction, as well as the duty entrusted.

Hierarchical structure of the organisation is based on horizontal structuring. Intra-layer replacements are possible; however, the replacements above the fourth layer are determined by the leader. Those layers are composed of:

a) First Layer (The Commons): Consisted of those who are dedicated themselves to the organisation with faith and ties of affection and who provide actual and material support. Many of these persons are ensured to consciously or unconsciously serve for the organisation without being involved in the hierarchical structure of the organisation.

b) Second Layer (Faithful Section): The faithful group composed of the officers working at schools, private teaching institutions (dershane), student dormitories, banks, newspaper headquarters, foundations and institutions. These individuals attend the organisational meetings, regularly pay dues and are familiar with the ideology adopted by the organisation.

c) Third Layer (Ideologically Organising Section): Those undertaking duties in unofficial activities, adopts the organisational ideology and disseminates the propaganda of the organisation.

d) Fourth Layer (Inspection and Control Section): Those who are in this layer supervise all organisational service (legal and illegal). Those who are able to attain the required rank in terms of commitment and obedience may be promoted to this layer. Those attaining this layer are among the ones who joined the organisation at a young age. Those who subsequently joined the organisation cannot usually take office herein and the layers above.

e) Fifth Layer (Organising and Executing Section): High level confidentiality is sought. Those within this layer barely know each other. They are appointed by the organisation leader and organise and execute the structure within the State.

f) Sixth Layer (Private Section): Those who are personally appointed by Fetullah Gülen and ensure communication between the leader and subordinate layers and who are entitled to make reassignments within the organisation as well as responsible for dismissals.

g) Seventh Layer (Eminent Section): Those who are directly chosen by the organisation leader. This layer is consisted of 17 individuals. It is the most eminent section of the organisation.

The organisation has paid attention to cell-type horizontal structuring in order not to be disclosed and to prevent the State from revealing the organisational structure. The cells are generally composed of maximum five persons who are subordinated to an “abla” or “abi”. Number of the individuals within the cell is sometimes 3 in some institutions, whereas 1 in certain institutions such as the Turkish Armed Forces (“TAF”). An imam is appointed for each cell.

...

Although the FETÖ/PYD militants penetrating into the Turkish Armed Forces, the Security Directorate and the MİT are a public officer in appearance, their sense of belonging to the organisation dominates their all other belongings and commitments. It has been revealed that the FETÖ/PDY uses the public force, which should have been at the State’s disposal, for its own organisational interests. The organisation members, who have entered into public profession, as a private of the FETÖ/PDY, at the TAF, Security Directorates and National Intelligence Organisation after successfully completing the necessary steps, undergo an ideological training at the end of which they are ready to use their weapons and to use force in line with the instructions given by their hierarchical superior within the FETÖ/PDY. “Persons Dedicated to Service” is defined by the organisation leader as follows: 'the persons affiliating to the organisation must be determined, strong-minded and obedient to the organisational service; must take every responsibility and must not disturb their ambition in case of getting a blow; must prioritize not their own ranks but the rank of the service; must be ready to admit that the duties they would undertake in the course of service may be difficult; and must be ready for sacrificing their own existence, life, beloved ones for the service.'

FETÖ/PDY recruiting its members at the effective units of the Security Directorate as well as within the TAF uses the oppression and intimidation emanating from the authority to apply force and violence, which is inherent in the duties of the Security Directorate and the TAF units. The organisation members’ capacity to use weapons is necessary and sufficient to consider that the offence of an armed terrorist organisation has been committed. As a matter of fact, during the coup attempt of 15 July 2016, the organisation members, who were apparently TAF officials but acted in line with the orders and instructions of the organisation leader, used weapons, and many civilians and public officers were therefore martyred.

The said terrorist organisation has firstly ensured deactivation of the bureaucrats and officials who were considered to pose an obstacle to the organisation and thereafter placed its members in these positions, for the purpose of seizing the military, civil service, security directorates, judiciary and the other public institutions of strategic importance in order to attain its ultimate aims.

...

A criminal organisation may be an illegal structure which is established at the outset to commit an offence. Besides, a non-governmental organisation which functions on a legal basis may subsequently turn into a criminal organisation and even into a terrorist organisation. In this sense, legal existence of an organisation -which has already existed but is not known to public as no judicial decision is taken in its respect- is contingent upon a decision to be issued by the courts. However, the founder, executives or members of the organisation would be held responsible in criminal law as from its foundation date or the date when it became a criminal organisation despite being founded for legitimate aims.”

92. This decision also contains the following explanations as to the features of the ByLock communication system:

"ByLock communication system, which may be used not only by downloading but also upon a special installation process, is designated to ensure communication via internet through a strong encryption method whereby each message is transmitted with a different crypto key. This encryption method has been revealed to be a security system which aims to prevent hacking, by third persons, of the information transmitted among the users. In early 2014, ByLock was available and accessible for everyone at the application stores of the operating systems. However, after it had become no longer available at these stores, the organisation members downloaded it through external hard drive, memory cards and Bluetooth, which was revealed from the statements, messages and e-mails included in the relevant investigation and prosecution files.

ByLock communication system renders service over the server with IP address no. 46.166.160.137. The server manager also rented IP addresses no. 46.166.164.176, 46.166.164.177, 46.166.164.178, 46.166.164.179, 46.166.164.180, 46.166.164.181, 46.166.164.182, 46.166.164.183, with a view to hindering the identification of those who have been using the application.

ByLock communication system was put into service by being rented from ….. company, operating in the field of renting servers in Lithuania, and payments with respect to the server and IP renting processes were made through the method of Paysera by anonymous users. There is no available contact information of the persons who have developed and put into use this application. Nor is there any reference with respect to the works they have previously performed. It has been observed that there has been no initiative to promote the application, thereby number of its users has not increased, and it has not gained commercial value.

Global and commercial instant messaging applications use “certificate-authority signed SSL certificate” whereby the responsibility for the safety of information on users and of the communication is transferred to this authority in return for a payment. However, the ByLock communication system has no certificate-authority signed SSL certificate. It is thereby prevented that certain information on its users as well as the communication traffic be conveyed to any external place other than the ByLock server.

Among the source codes pertaining to the ByLock communication system, there are expressions formulated in Turkish such as 'no authority', 'file', 'mail' and 'voice call'. Likewise, a great part of the usernames, group names and decoded passwords as well as almost all of the deciphered contents within the application are consisting of Turkish expressions.

After its download to smart phones, ByLock communication system may be used only when a username/code and password are created and a dedicated strong cryptographic key, which is created by random hand movements on the phone, is determined. This information is then conveyed to the application server in an encrypted manner. It is thereby aimed to ensure the safety of user information and communication to a maximum extent.

Unlike global and commercial applications, no information specific to the user -such as phone number, identity number, e-mail address- is requested and there is no verification process with a code sent through a SMS or e-mail while signing up for ByLock communication system in order to make the disclosure of the users’ real identities more complicated.

ByLock communication system does not allow for adding a user by making a search with phone number or name-surname. Besides, in the ByLock communication system, there is no feature whereby persons in the phonebook are automatically added to the system which is available in similar applications.

In this application, the users may get in contact with each other by adding the usernames and codes which they have already obtained. Only thereupon, the parties start messaging. In this sense, it appears that even the users themselves do not have the opportunity to use the system whenever they want. Thanks to this setting, the application allows for communication only in conformity with the cell-type structuring.

The ByLock communication system enables encrypted instant messaging, e-mail sending, forming contact list by adding friends, intra-group messaging, encrypted voice calls, transmission of video or document. The users are thereby enabled to communicate with each other for organisational purposes without the need for any other communication means. As the users involve in communication only through the ByLock server, the server manager is thereby enabled to check and control the groups and the contents of the communication within the program.

Even if the users forget to delete any data despite being necessary, the persons in the contact list and the previous messages in the application cannot be accessed in case of any possible judicial process whereby the device is seized, thanks to the ‘automatically delete message’ feature specific to the ByLock communication system, which allows deletion of the messages automatically upon a particular time without the need for any manual operation on the device.

Another security measure taken to prevent the disclosure of the users’ identities and ensuring confidentiality in communication is the encrypted storage of the server and communication data of the ByLock application in the database.

Along with the measures taken by the ByLock system itself, the users have also taken certain measures to conceal their identities. In this sense, they have not used the real names of the persons in the contact list and in their messages and instead used their “codenames” within the organisation. They have also preferred long passwords.

The users getting access to ByLock from Turkey are forced to use VPN with a view to concealing their identities and ensuring confidential communication.

It appears that almost all searches with respect to ByLock through search engines were made from Turkey.

Posts with respect to ByLock via social media and websites were mainly shared through fake accounts.

The ByLock communication system with a great number of users had not been known to the Turkish and foreign public prior to the coup attempt of 15 July 2016.

Almost all the transcribed contents of the communication via ByLock are concerning organisational contacts and activities. In this regard, it has been revealed that the following organisational messages were sent through the ByLock application: any change in the meeting places, giving notice of the operations to be held; provision of secret hiding places within the country for the organisation members; plans made for fleeing abroad; holding benevolence meetings and provision of money for the organisation members suspended or dismissed from office; conveyance of instructions and thoughts of Fethullah Gülen; sharing of web addresses which operates for the purpose of introducing Turkey as a country supporting terrorism and requesting support for the questionnaires available on these web-sites; ensuring the release of suspects or accused persons, by certain judges and prosecutors, within the scope of the investigations and prosecutions conducted into the FETÖ/PDY; ensuring appointment of lawyers for the organisation members; providing information on the organisation members against whom an operation was conducted and whose identities were disclosed; providing information on the places where operations might be conducted and sending warnings that important digital data in such places be disposed of before the relevant officers in charge of searching such materials; blacklisting of those who have expressed unfavourable opinions, or who have struggled, against the FETÖ/PDY in the public institutions; informing the members that if it is disclosed, the use of ByLock communication system would be discontinued, and alternative programs such Eagle, Dingdong and Tango would be used instead; and preparation of legal texts which would be used in the defence of the organisation members.

The names of the groups in the ByLock application, namely Women in the Region (“Bölge Bayan”), Those responsible for Surveyors (“Etütçüler”), Abi responsible for houses (“Ev abileri”), Imams (“İmamlarım”), Those responsible for Schools (“Okulcular”), 8 abi (“8 abiler”), Those responsible for 8 units (“8 birimciler”), 8 big regions (“8 büyük bölge”), Those responsible for regions (“Bölgeciler”), Those responsible for graduates (“Mezuncular”), Those responsible for students (“Talebeciler”), Those responsible for universities (“Üniversiteciler”), Voluntary Subscribers of Zaman Newspaper (“Zaman Gönüllüler”), Responsible (“Mesul”), Those responsible (“Mesuller”) and Marriage (“İzdivaç”), are in concordance with the jargon and cell-type hierarchical structuring of the organisation.

In the aftermath of the coup attempt of 15 July 2016, the suspects under judicial investigation stated that the ByLock communication system had been used by the members of the FETÖ/PDY armed terrorist organisation as an organisational communication means since the beginning of 2014.”

93. In the said judgment, the explanations as to the preventive measure under which the data obtained from ByLock communication system are to be examined are as follows:

"The preventive measure of search, back-up and seizure of computers, computer programs and records is set forth in Article 134 of Code no. 5271. This measure is a special aspect of the preventive measures of ‘search’ and ‘seizure’, which are set forth in Articles 116-134 of Code no. 5271.

...

Computer files cannot be considered to be limited only to hard disk. Such files also cover the databases where the internet service providers store IP numbers of its users and any other access-related information. …

As a matter of fact, the third paragraph, which regulates the back-up procedure, of Article 17 of the Regulation on Judicial and Preventive Searches, titled “search, back-up and seizure of computers, computer programs and files” sets forth that the back-up process shall apply also to the computer networks, other remote computer files/records as well as to removable hardware”, which allows for access to both computers at the incident scene and remote computer files/records.

...

As the records on communication via internet are recorded in the computer file, these communication records may be subject to preventive measures of search, back-up and seizure pursuant to Article 134 § 1 of Code no. 5271. …”

94. The judgment includes the following final assessments as to the ByLock program:

"... The detection of data created through the ByLock communication system does not fall within the scope of Article 135 § 1 of Code no. 5271 or Article 6 § 2 of Law no. 2937, but rather of Article 134 § 1 of Code no. 5271, titled ‘search, back-up and seizure of computers, computer programs and records’.

...

It is possible to determine the date of access, IP address through which access was ensured, the number and dates of contacts, the persons who were communicated with and the contents of communication in the ByLock communication system. In this sense, in cases where the date of access, the relevant IP address and the number of contacts between particular dates have been revealed, the relevant person will be considered to be a part of this private communication system in the particular circumstances of the present case, and the existence of any correspondence between the persons involved in this network with any other person(s) will not be sought for reaching such a conclusion. The identification of the persons who were communicated and the disclosure of the contents of their correspondence will lead to the determination of the hierarchical position of the relevant person within the terrorist organisation (whether a head or a member of the organisation).

As the ByLock communication system is a network which is designed for the members of the FETÖ/PDY armed terrorist organisation and which is used exclusively by certain members of this terrorist organisation, the determination, on the basis of technical data which would lead to a definite conclusion without any suspicion, that the relevant person has become a part of this network in line with the organisational instruction and used it for ensuring confidential communication will constitute an evidence demonstrating the person’s relation with the organisation. …”

95. Relevant part of the judgment no. E.2018/16-417, K.2019/44 and dated 24 January 2019, which was issued by the General Assembly of the Criminal Chambers of the Court of Cassation reads as follows:

"As a result of the examinations over the ByLock database, it has been revealed that the users of IP addresses which are logged in the server may be identified, and User-ID numbers, username and passwords of the users signed up in the ByLock server, the dates of their access to the server (log records), information on the other users adding User-ID (roster records), groups created and joined by the ByLock user, contents of the messages may be partly or wholly detected and transcribed. Therefore, the information included in the ByLock Report -which was issued by the Department of Anti-Smuggling and Organised Crime at the end of the examination on the data partially or wholly detected and which indicates the real identities of the User-ID numbers assigned by the system and how this identification process has been performed- may contain significant information on the real identity of the ByLock user revealed to get involved in the system as well as on his/her hierarchical position within the terrorist organisation.

However, in consideration of the abovementioned technical analyses and chronological report on the ByLock system, it has been observed that as the person getting access to ByLock system (network) connected to the system over the IP numbers not belonging to Turkey, the CGNAT records showing the connections with ByLock IPs may not be obtained, or as the relevant units of the Department of Anti-Smuggling and Organised Crime has been still conducting examinations on the data obtained from ByLock server or despite these examinations, the data concerning the given person cannot be recovered or transcribed, it may be also unable to determine the User-ID number, username, password, log records, roster information or contents of the messages. Nevertheless, even in such cases, as a result of the examination of the data recovered and transcribed with the respect to other users such as roster records and messages and etc., those who have been using the ByLock program but in respect of whom any data has not been found or transcribed yet may also be identified. Thus, the real identity of a User-ID number which cannot be determined at the outset may be revealed. ByLock reports may be issued with respect to User-ID numbers real users of which have been identified in this way.

Besides, it is also possible to match a User-ID number, which has been revealed to get access to, and signed up for, the ByLock system through ADSL or GSM subscription registered in the name of the perpetrator on a date prior to the issuance of the ByLock report, with the perpetrator (subscriber). It may be comprehended from such a report that the relevant subscriber has involved in the system by taking a ByLock User-ID number.”

96. Relevant part of the judgment no. E.2018/16-418, K.2019/513 and dated 27 June 2019, which was issued by the General Assembly of the Criminal Chambers of the Court of Cassation reads as follows:

"CGNAT (HIS) records which contain the internet traffic records of the subscribers having connected to 9 IP addresses of the ByLock server from the IP addresses in Turkey and which are saved by the operators, are a kind of metadata. As such data reveal that the subscriber’s IP address has connected to IP addresses of the ByLock server, they constitute a significant indication of the relevant person’s involvement in the ByLock system. However, they do not provide any information -other than connections, if any, with the IP addresses- as to whether the relevant subscriber has been assigned with a User-ID and if assigned, what this IP number is.

Therefore, also in cases where a given person cannot be matched with a User-ID number as the police inquiry into the data obtained from the ByLock server has not been completed yet or the data related to him cannot be recovered/transcribed, it is possible to detect, through CGNAT records, his connections with IP addresses of the ByLock server. It may be accordingly understood that the person in question has connected to the ByLock system but has not taken yet a User-ID number by creating a username and password and therefore has not involved in the system yet, or that although he has indeed taken a User-ID number, he cannot be matched with this User-ID number as the examinations on the relevant data are still going on or the data cannot be recovered/transcribed. It may be also concluded that the relevant person might be routed to the ByLock servers through traps (such as morbeyin). In this sense, it should be also taken into consideration that the finding to the effect that out of the GSM subscribers who were revealed, by virtue of the CGNAT records, to have connected to IP addresses of the ByLock server, 11.480 subscribers established a connection to the ByLock IP addresses through morbeyin application has been appended to the investigation and prosecution files of the suspects and accused persons.

At this point, in order to ascertain whether the suspect/accused person has been involved in the ByLock system (network), he is to be provided with, and informed of the findings included in, the ByLock report where he has been matched with a User-ID number registered in the ByLock server, or if such a report is not available, with the report showing the ByLock User-ID number revealed to belong to the accused person. Thereafter, he or his defence counsel should be asked to provide explanation if any.

In this regard, the determination to the effect that the suspect/accused person has taken a User-ID number in the ByLock server knowingly and willingly will be necessary and sufficient to accept that he has involved in the ByLock system and thereby got the opportunity of confidential communication which could be granted merely to the members of the said organisation; and that therefore, he is at least a member of the armed terrorist organisation, namely the FETÖ/PDY. Besides, existence of the contents of the communications between the person involved in this network and the other person(s) will not be sought to exist. In respect of the perpetrators involved in the ByLock system, the determination as to the persons with whom they got in contact and the contents of the correspondence will be guiding if the perpetrator is under prosecution for his alleged leadership of an organisation and the available evidence is insufficient to prove that he is a leader of the organisation.

On the other hand, despite the findings included in both of the reports on the User-ID information, in cases where it is maintained that the GSM / ADSL subscriptions -registered in the name of the accused person whose IP addresses have been found to connect to the IP addresses of the ByLock servers- or the devices connecting to internet through these subscriptions have been used, temporarily or permanently, by any other person within or beyond the knowledge and consent of the accused person; that the necessary information -such as password- for internet connection ensured through these subscriptions have been shared with other persons or have been extorted, or in case of any suspicion that the User-ID number belongs to any person other than the identified one, it is required that the reports including User-ID information be taken into consideration in conjunction with the information that will be clearly provided by the accused person with respect to the person allegedly using the accused person’s subscriptions or internet connection passwords, or in conjunction with the data to be obtained as a result of the inquiries; and that, if deemed necessary by the defence submissions of the accused person and the scope of the case-file, CGNAT inquiry records concerning the ADSL or GSM number which belongs to the IP address revealed to have connected to the ByLock IP addresses and which is found to be used by the accused person, the HTS records with respect to the GSM number -if any- as well as the report on the ByLock inquiry results issued by the Department of Anti-Smuggling and Organised Crime be assessed as a whole.”

97. Relevant part of the judgment, no. E.2017/4314, K.2018/3545 and dated 18 October 2018, which was issued by the 16th Criminal Chamber of the Court of Cassation, the appellate authority with respect to the terrorist offences, reads as follows:

" As the ByLock communication system is a network which is designed for the members of the FETÖ/PDY armed terrorist organisation and which is used exclusively by certain members of this terrorist organisation, the determination, on the basis of technical data which would lead to a definite conclusion without any suspicion, that the relevant person has become a part of this network in line with the organisational instruction and used it for confidential communication will constitute an evidence demonstrating the person’s relation with the organisation. In this respect,”

...

... It must be certainly demonstrated, through the ByLock report and the CGNAT records indicating User-ID, password and similar elements, that the relevant person has connected to, and used, the ByLock system with a view to maintaining organisational confidentiality and ensuring communication.

In the present case, the Chamber decided to quash the first instance decision -whereby the accused person was convicted, due to his being user of the ByLock application, on the basis of the report issued by the relevant Department of the Security Directorate at the end of the investigation conducted against military officers who were revealed to have used ‘ByLock and Chat’ application, which was used by the FETÖ/PDY,- as the particular circumstances of his case was to be reconsidered and reassessed given the fact that it was noted by the letter of the Turkish Naval Forces Command, dated 7 November 2016, that the accused person was revealed to be included in the list ‘morbeyin’ as a result of the findings and assessments of the Ankara Chief Public Prosecutor’s Office following the judicial process of the regional court of appeal.”

98. Relevant part of the judgment, no. E.2018/5762, K.2019/749 and dated 11 February 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

"The Chamber decided to quash the first instance decision due to the inadequate inquiry as the relevant inferior court should have rendered the decision in respect of the accused person, who maintained that he had downloaded the ByLock application on his mobile phone but deleted it without having used, after making the detailed ByLock Report available at the hearing for the accused person and his defence counsel, pursuant to Article 217 of Code no. 5271, if it was found established, through technical data, beyond any suspicion that he had used the ByLock application and if the evidence demonstrating his subscription to the ByLock was decisive for the qualification of the imputed offence.”

99. Relevant part of the judgment, no. E.2018/5481, K.2019/891 and dated 14 February 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

"The Chamber decided to quash the first instance decision due to the inadequate inquiry as the relevant inferior court should have rendered the decision in respect of the accused person, who refused to be a user of the ByLock, after making the detailed ByLock report, as well as the examinations results pertaining to digital data obtained from the accused person, available at the hearing for the accused person and his defence counsel and asking them whether they had any comment in this respect if it was found established, through technical data, beyond any suspicion that he had used the ByLock application and if the evidence demonstrating his subscription to the ByLock was decisive for proving the imputed offence, as well as after making the HIS (CGNAT) and HTS records available in the file and the survey and assessment report subject to the examination of a court expert.”

b) As the accused person refused to use ByLock and declared that he used his internet jointly with his home mate named [M.B.], whose name was also included in the investigation file of the Bingöl Chief Public Prosecutor’s Office, the case-file -if a criminal case was filed against M.B.-, otherwise the said investigation should have been included in the accused person’s file, being open to Court of Cassation’s review, and if possible, M.B. should have been duly heard as a witness.”

100. Relevant part of the judgment, no. E.2018/4851, K.2019/2058 and dated 12 March 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

"The Chamber decided to quash the first instance decision whereby the accused person [H.] was convicted as the first instance court should have acquitted her regard being had to the statements given by her husband [Y.İ.] during the prosecution stage ‘the GSM number ……. is registered in my name. I gave it to my wife. However, the mobile phone was always available at home and I sometimes used this number. …. Besides, my wife has not used this phone. I have used it…’; to the fact that the persons whose names are included in the Bylock identification and assessment report on ID number no. '205264', which was issued with respect to the GSM number registered in the name of the accused person’s husband [Y.], were also an officer of the security directorate; to the other evidence available in the file; as well as to the non-existence of the acts of continuous and variable nature, which would -if existed- prove the accused person’s membership of the said organisation…”

101. Relevant part of the judgment, no. E.2019/98, K.2019/3057 and dated 29 April 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

"1- A User-ID number will provide information as to whether a user has directly connected to ByLock server through his GSM number without any routing, and the detailed ByLock identification and assessment report will provide information on the real identity of the user as well as on his position within the organisation and his organisational activities.

2- In cases where a report was issued by the Security Directorate to the effect that the relevant person is a user of the ByLock whose ID number cannot be determined but there are CGNAT records, which are a significant indication of his having used ByLock application, it must be nevertheless borne in mind that CGNAT records may exist also in case of access to the application by way of routing (through morbey or any other means).

...

In the present case, the accused person whose User-ID number could not be determined through the report issued by the relevant Department of the Security Directorate but who was found by virtue of the CGNAT records to get access to ByLock system for 458 times was dismissed from office by a decision taken by the relevant administration while working as a research assistant at the B. University. He was subsequently reinstated by virtue of a Decree-law. However, he was ultimately convicted for being a member of the said organisation for studying at a private teaching institution operated by the FETÖ/PDY during the university admission process was considered as an organisational activity. The Chamber decided to quash the first instance decision due to his conviction which was solely based on insufficient ByLock inquiry reports indicating that he used ByLock as the relevant inferior court should have indeed decided on the legal status of the accused person by awaiting for the conclusion of the ID number inquiries on ByLock data by the relevant departments of the Security Directorate, given the fact that the activities other than the use of ByLock, even if occurred separately or concurrently, are not sufficient to prove that the relevant person has involved in the organisational hierarchy.”

102. Relevant part of the judgment, no. E.2018/4983, K.2019/4707 and dated 3 July 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

"... The Chamber decided to quash the first instance decision due to the inadequate inquiry as the relevant inferior court should have qualified the criminal act in question and decided on the legal status of the accused person by ascertaining whether there was any criminal case filed against the accused person’s husband [Z.A.] -who was revealed to actually use ByLock program according to the username, password and messages as noted in the ByLock Report- and if there was any pending case, by joining it to the present case; if it became final, making the case-file subjected to examination; after asking the relevant departments to determine whether there was any other ByLock registration on the other GSM numbers registered in the name of the accused person or his wife, and if any, ensuring the identification and assessment reports to be issued with respect to these numbers; and ultimately by considering all available evidence as a whole.”

103. Relevant part of the judgment, no. E.2019/4284, K.2019/5832 and dated 7 October 2019, which was issued by the 16th Criminal Chamber of the Court of Cassation, reads as follows:

" The Chamber decided to quash the first instance decision on the ground that it was found established through the identification and assessment reports that the accused person used the ByLock application with ID numbers no. 46420 and 24659; however, it was also accepted that the accused person used ByLock application also through the GSM number 505 485 … 85, which was registered in the name of the accused person’s aunt-in-law, revealed to have had ByLock application but was not proven to be used by the accused person, without conducting the necessary inquiries as to the user of the GSM number.”

104. The judgments rendered by the General Assembly of the Criminal Chambers of the Court of Cassation, the 16th Criminal Chamber of the Court of Cassation and the regional courts of appeal, which concern the examination and investigation processes required to be conducted in consideration of the particular circumstances of each case in order to establish with legal certainty that the accused persons have used ByLock, may be classified as follows:

a. Judgments/Quashing Judgments indicating that the accused person’s use of ByLock must be proven through technical or expert reports

i. Unless substantiated with technical data, the statements that the accused person has been a ByLock user would not be deemed sufficient, and in this sense, the technical reports on this matter must be requested from the relevant authorities and must also be subject to an expert examination if necessary (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/4983, K.2019/4707 and dated 3 July 2019; the judgment of the 2nd Criminal Chamber of the Sakarya Regional Court of Appeal, no. E.2018/252, K.2019/45 and dated 10 January 2019; and the judgment of the 18th Criminal Chamber of the Gaziantep Regional Court of Appeal, no. E.2019/510, K.2020/314 and dated 25 February 2020).

ii. By the nature of the defence submissions and the available evidence in the case-file, the reports on ByLock inquiry results and CGNAT records must not be deemed sufficient to prove the accused person’s use of ByLock (see, among many other authorities, the judgments of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/5974, K.2019/575 and dated 6 February 2019 and no. E.2018/5974, K.2019/575 and dated 29 April 2019; and the judgment of the 2nd Criminal Chamber of the Sakarya Regional Court of Appeal, no. E.2018/235, K.2019/27 and dated 4 January 2019).

iii. The detailed ByLock Report issued by the relevant units must be made available, during the hearing, for the accused person and his defence counsel who should be asked to make comment if they have (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/5710, K.2019/331 and dated 22 January 2019; and the judgment of the 18th Criminal Chamber of the Gaziantep Regional Court of Appeal, no. E.2019/269, K.2020/139 and dated 17 January 2020).

b. Quashing judgments requiring the identification of the real user(s) of the subscriptions revealed to have connected to the IP numbers of ByLock server

i. Within the scope of the claims raised during the defence submissions, it must be ascertained whether the GSM subscriptions in question were registered in the name of the accused person and were active during the dates when ByLock was used (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/5974, K.2019/575 and dated 6 February 2019).

ii. In cases where it is maintained that the GSM and ADSL subscriptions, revealed to have connected to IP addresses of the ByLock servers, or the internet service provided through these subscriptions were used by any person other than the subscriber himself or used jointly by other persons, an inquiry -and an investigation if necessary- must be conducted against these persons who should also be heard as a witness, and the files of the cases conducted against them -if any- must be made available and subject to examination (see, among many other authorities, the judgments of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/5481, K.2019/891 and dated 14 February 2019; no. E.2019/3621, K.2019/6616 and dated 5 November 2019; no. E.2019/4284, K.2019/5832 and dated 7 November 2019; and no. E.2018/4983, K.2019/4707 and dated 3 July 2019; the judgment of the 2nd Criminal Chamber of the Adana Regional Court of Appeal, no. E.2018/1874, K.2018/2147 and dated 13 December 2018; the judgment of the 4th Criminal Chamber of the Ankara Regional Court of Appeal, no. E.2018/3588, K. 2019/71 and dated 31 January 2019; the judgment of the 2nd Criminal Chamber of the Van Regional Court of Appeal, no. E.2019/155, K.2019/136 and dated 11 December 2019; the judgment of the 2nd Criminal Chamber of the Adana Regional Court of Appeal, no. E.2019/1412, K. 2020/51 and dated 22 January 2020; and the judgment of the 18th Criminal Chamber of the Gaziantep Regional Court of Appeal, no. E.2019/471, K.2020/302 and dated 20 February 2020.)

iii. In the face of the defence submissions that the passwords necessary for ensuring access to the internet were extorted, sufficient inquiries into these allegations -if necessary, CGNAT inquiry records pertaining to the ADSL and GSM numbers revealed to have connected to IP addresses of ByLock server and HTS records of the relevant GSM number -if any- as well as the current report on ByLock inquiry results issued by the EGM-KOM must be requested and made available- (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2018/6860, K.2019/3369 and dated 13 May 2019).

iv. The information on the device through which ByLock program was used must be compared with the documents included in the file. It must be ascertained whether IMEI number of the device was copied and an expert report, if found necessary, must be obtained in this respect (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2019/3252, K.2019/5524 and dated 24 September 2019; and the judgment of the 3rd Criminal Chamber of the Gaziantep Regional Court of Appeal, E.2017/1258, K.2017/1232 and dated 11 October 2017.)

c. Quashing judgments requiring the determination whether the accused person connected to ByLock against his will:

i. Legal status of those who have revealed to have connected to ByLock server against their own will due to Morbeyin applications must be reassessed (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, no. E.2017/4314, K.2018/3545 and dated 18 October 2018).

ii. Any allegation raised by the accused person that he connected to ByLock server against his will must be assessed (see, among many other authorities, the judgment of the 16th Criminal Chamber of the Court of Cassation, E.2018/2857, K.2019/3190 and dated 6 May 2019).

d. Judgments/quashing judgments with respect to other claims:

i. In case of any claim that even if there was a match between the accused person’s IP number and ByLock user-ID number, any person other than the accused person has used the ByLock program through the User-ID number in question or in case of any doubt in this respect, the CGNAT records with respect to ByLock as well as HTS records including IMEI number must be obtained from the BTK, with a view to identifying the real user of the User-ID number matched with the accused person; and these records must be assessed in conjunction with all data included in the report on the ByLock inquiry result as well as in the ByLock report (see the judgment of the General Assembly of the Criminal Chambers of the Court of Cassation, no. E.2018/16-418, K.2019/513 and dated 27 June 2019; and the judgment of the 16th Criminal Chamber of the Court of Cassation, E.2019/6556, K.2019/7769 and dated 12 December 2019).

ii. It must be ascertained whether any investigation or prosecution has been conducted against those who exchanged message/e-mail and made voice call with the persons who were added by a User-ID number indicated in the ByLock report or who added this User-ID number; if conducted, the files must be obtained and subject to examination and if necessary, these persons must be heard as a witness (see, among many other authorities, the judgment no. E.2018/1681, K.2019/227 and dated 17 January 2019; and the judgment of the 16th Criminal Chamber of the Court of Cassation, E.2019/368, K.2019/4877 and dated 2 July 2019).

B. International Law

1. Relevant Provisions of the Convention

105. Article 6 § 1 of the European Convention on Human Rights (“the Convention”), insofar as relevant, reads as follows:

"In the determination … of any criminal charge against him, everyone is entitled to a fair and public hearing … by an independent and impartial tribunal established by law.”

2. Established Case-law of the European Court of Human Rights

106. According to the European Court of Human Rights (“the ECHR”), while Article 6 of the Convention guarantees the right to a fair hearing, it does not lay down any rules on the admissibility of evidence as such, which is primarily a matter for regulation under national law (see Jalloh v. Germany [GC], no. 54810/00, 11 July 2006, § 94).

107. In its judgments, the ECHR indicates that it is not its role to determine, as a matter of principle, whether particular types of evidence – including those obtained unlawfully in terms of domestic law –may be admissible or, indeed, whether the applicant was guilty or not. The question which must be answered is whether the proceedings as a whole, including the way in which the evidence was obtained, were fair. This involves an examination of the “unlawfulness” in question and, where violation of another Convention right is concerned, the nature of the violation found (see Jalloh v. Germany, § 95; Ramanauskas v. Lithuania [GC], no. 74420/01, 5 February 2008, § 52; and Khodorkovskiy and Lebedev v. Russia, no. 11082/06, 13772/05, 25 July 2013, § 699).

108. Emphasising that it is not its role to determine whether particular types of evidence may be admissible or, indeed, whether the applicant was guilty or not, the ECHR notes that the question which must be answered is whether the proceedings as a whole, including the way in which the evidence was obtained, were fair. This involves an examination of the “unlawfulness” in question and, where a violation of another Convention right is concerned, the nature of the violation found. In determining whether the proceedings as a whole were fair, regard must also be had to whether the rights of the defence were respected. It must be examined in particular whether the applicant was given the opportunity of challenging the authenticity of the evidence and of opposing its use. In addition, the quality of the evidence must be taken into consideration, including whether the circumstances in which it was obtained cast doubt on its reliability or accuracy. While no problem of fairness necessarily arises where the evidence obtained was unsupported by other material, it may be noted that where the evidence is very strong and there is no risk of its being unreliable, the need for supporting evidence is correspondingly weaker (see Bykov v. Russia [GC], no. 4378/02, 10 March 2009, §§ 89, 90; and Ilgar Mammadov v. Azerbaijan (no.2), no. 919/15, 16 November 2017, §§ 208, 209).

109. From the ECHR’s point of view, when determining whether the proceedings as a whole have been fair, the weight of the public interest in the investigation and punishment of the particular offence in issue may be taken into consideration and may be weighed against the individual interest that the evidence against him be gathered lawfully (see Jalloh v. Germany, § 97). Notably with respect to the examination on the nature of the violation of the Convention found, the ECHR states that, in many cases, the fixing of a listening device was found to be in breach of Article 8 of the Convention as such an interference was unlawful. However, the admission of secretly taped material as evidence -in the particular circumstances of a given case- did not conflict with the requirements of the right to a fair trial guaranteed by Article 6 § 1 of the Convention (see Khan v. the United Kingdom, no. 35394/97, 12 May 2000, §§ 29-35; Bykov v. Russia, §§ 94-105).

110. According to the ECHR, the use of any material obtained without sufficient legal basis in the domestic law, or through unlawful means, as evidence in the proceedings does not, in principle, contravene with the standards of the fairness set forth in Article 6 § 1 of the Convention, provided that the applicant has been afforded necessary procedural safeguards and the relevant material has not been obtained under pressure, under duress or by entrapment which may impair the proceedings (see Chalkley v. the United Kingdom (dec.), no. 63831/00, 26 September 2002).

V. EXAMINATION AND GROUNDS

111. The Constitutional Court, at its session of 4 June 2020, examined the application and decided as follows.

A. Alleged Violation of the Right to a Fair Hearing

1. The Applicant’s Allegations and the Ministry’s Observations

112. The applicant maintained that his right to a fair trial had been violated, stating that the data from ByLock had been obtained unlawfully and was relied on as a substantive basis for his conviction.

113. In its observations, the Ministry of Justice (“the Ministry) made a reference to the examinations and findings as to the ByLock communication system, which are specified in the judgments of the 16th Criminal Chamber of the Court of Cassation (no. E.2015/3, K.2017/3; 27/1443, K.2017/4758), the General Assembly of the Criminal Chambers of the Court of Cassation (no. E.2017/16.MD-956, K.2017/370) as well as the Court’s judgment in the case of Aydın Yavuz and Others. The Ministry further indicated that as a result of the investigation conducted against the applicant for his alleged membership of the FETÖ/PDY, it was found established that ByLock application had been downloaded on, and used through, the mobile phones operated through the GSM subscription that the applicant admitted to being in his use; and that the applicant, represented by a lawyer during the proceedings, had been provided with the opportunity of challenging the authenticity of the evidence against him and opposing its use. The Ministry emphasised that the applicant had been convicted based on his use of ByLock through the GSM subscription and mobile phones that were used by him, which involved no manifest arbitrariness to the extent that would ignore justice and common sense.

114. In his counter-statements against the Ministry’s observations, the applicant asserted that the ByLock data, the underlying ground of his conviction, had been obtained unlawfully; that there were doubts as to the authenticity and reliability of these data, and they could not be therefore used as evidence during the proceedings; and that there were discrepancies between the data included in the ByLock Report and those included in the CGNAT records. He further maintained that the information on the online dates indicating his initial and last connections to ByLock system, which is indicated in these documents, is contradictory; that the date/time information as to e-mails, incoming/outgoing calls of the relevant User-ID number, which is indicated in the ByLock Report, was not consistent with the CGNAT records; and that there were findings as to the records of incoming/outgoing calls with User-ID numbers which are not included in the list. He finally alleged that one of the IP addresses, which he had allegedly connected to, was not indeed assigned to the ByLock server at the relevant time; that according to NAT technology, it was not possible to permanently use the same dynamic IP address; however, according to the findings, he had ensured connection for a long time through the same IP; and that therefore, the findings that he had been using ByLock did not reflect the truth.

2. The Court’s Assessment

115. Article 36 § 1 of the Constitution, titled “Right to legal remedies”, reads as follows:

"Everyone has the right of litigation either as plaintiff or defendant and the right to a fair trial before the courts through legitimate means and procedures. No court shall refuse to hear a case within its jurisdiction.”

116. The Constitutional Court is not bound by the legal qualification of the facts by the applicant and it makes such assessment itself (see Tahir Canan, no. 2012/969, 18 September 2013, § 16). In this sense, the applicant’s allegations were examined from the standpoint of the right to a fair hearing falling under the scope of the right to a fair trial.

a. Admissibility

117. The alleged violation of the right to a fair hearing must be declared admissible for not being manifestly ill-founded and there being no other grounds for its inadmissibility.

b. Merits

i. General Principles

118. The aim of criminal trial is to establish the material truth. However, the inquiries conducted to achieve this aim is not unlimited. Establishment of the material truth lawfully is necessary to ensure criminal justice in an equitable manner. In this sense, obtaining evidence through lawful means is considered as one of the basic principles of the state of law. In this regard, it is explicitly enshrined in Article 38 § 6 of the Constitution that the findings obtained unlawfully cannot be admitted as evidence (see Orhan Kılıç [Plenary], no. 2014/4704, 1 February 2018, § 42).

119. As regards the legislative intention for addition of the notion of “… and the right to a fair trial” to Article 36 of the Constitution, it is emphasized that the right to a fair trial, which is safeguarded also by the international conventions to which Turkey is a party, has been incorporated into the provision. As a matter of fact, the right to a fair hearing is set forth in Article 6 § 1 of the Convention. Likewise, the Constitutional Court has examined, in its several judgments involving assessments under Article 36 of the Constitution, the allegations raised on account of the use of evidence obtained without any legal basis or unlawfully during the proceedings under the right to a fair hearing, one of the safeguards inherent in the right to a fair trial. In these assessments made under Article 36, Article 38 § 6 of the Constitution is also taken into consideration (see Orhan Kılıç, § 43).

120. However, the question of fairness, under the substantive limb, of the establishment of the imputed acts, the interpretation and implementation of legal provisions, the admissibility and assessment of evidence, and the resolution offered for the dispute, by the Court of Cassation and inferior courts in a given case cannot be subject to an examination through individual application. Therefore, in the present case, it is not for the Court to review the lawfulness of the assessment made, and the conclusions reached, by the Court of Cassation and the inferior courts. It primarily falls within the inferior courts’ jurisdiction to consider the available evidence in a particular case and to decide whether the relevant evidence is related to the case (see Orhan Kılıç, § 44).

121. On the other hand, it should be taken into consideration that the use of evidence, which could be prima facie revealed to be obtained without any legal basis or to be unlawfully obtained or which were considered unlawful by the inferior courts, as the sole or decisive evidence during the proceedings may constitute a problem with regard to the right to a fair hearing. In the criminal trial, the way in which the relevant evidence has been obtained and the extent to which it has been relied on in conviction may render unfair the proceedings as a whole (see Orhan Kılıç, § 45).

122. In this sense, the Court’s task is not to ascertain whether certain evidential elements were obtained lawfully, but rather to examine whether the evidence which is prima facie unlawful or which has been found unlawful by the inferior courts has been relied on as the sole or decisive evidence during the proceedings, as well as whether such unlawfulness has had any bearings on the fairness of the proceedings as a whole (see, in the same vein, Yaşar Yılmaz, no. 2013/6183, 19 November 2014, § 46).

123. In making an assessment in this respect, it must be also considered whether the conditions under which the evidence was obtained has casted doubt on its authenticity and reliability (see Güllüzar Erman, no. 2012/542, 4 November 2014, § 61). A fair hearing entails the elimination of doubts as to the authenticity and reliability of the evidence, as well as the grant of an opportunity to effectively challenge to its reliability and authenticity. In this regard, the Court also examines, with regard to the alleged unlawfulness of the evidence, whether the applicants were granted the opportunity of challenging the authenticity of the evidence and opposing its use; whether the principles of equality of arms and the adversarial proceedings were observed; and whether the defence was afforded sufficient safeguards for the protection of their interest (see Orhan Kılıç, §§ 47, 48).

124. The above-cited constitutional requirements are also set forth in the relevant procedural laws. As a matter of fact, Article 217 § 2 of Code no. 5271 provides for “The imputed offence may be proven by using all kinds of legally obtained evidence”. In Article 206 § 2 of the same Code, it is set forth that in cases where the evidence is unlawfully obtained, it shall be denied, and Article 230 § 1 sets out that the evidence which has been relied on as a basis for the conviction and has been denied shall be indicated, and thereby, the evidence which has been included in the file and obtained unlawfully shall be separately and clearly demonstrated (see Orhan Kılıç, § 50).

125. In the examinations of individual applications, the binding norm is the Constitution, and no review as to the lawfulness is not conducted. In assessments as to whether the admission of the evidence obtained without any legal basis or unlawfully has impaired the fairness of the proceedings from the standpoint of the safeguards afforded under Articles 36 and 38 of the Constitution, the particular circumstances of each case must be taken into consideration (see Orhan Kılıç, § 51).

ii. Application of the Principles to the Present Case

 (1) As regards the data obtained from ByLock server

126. The applicant maintained that the ByLock data were obtained through intelligence methods and unlawfully; and that therefore they could not be relied on as evidence in conviction. Accordingly, the nature of the ByLock application as well as the way how it became known to investigation authorities must be primarily ascertained.

127. In the course of the period during which the investigation authorities and the State’s security agencies started to perceive the FETÖ/PDY’s staffing within the public institutions and organisations along with its activities within the different social, cultural and economic areas, notably education and religion, as a threat to the national security, the MİT also conducted inquiries and inspections, within the boundaries of its own field of work, into the FETÖ/PDY’s activities. As a matter of fact, it is laid down in Article 4 § 1 (a) of Law no. 2937 that the MİT is liable to create state-wide national security intelligence in respect of the existing and probable activities, performed at home and abroad, against the territorial integrity, existence, independence, safety, constitutional order and national power of the Republic of Turkey, as well as to report this intelligence to the relevant institutions (see § 83 above).

128. During these inspections and inquiries conducted by the MİT, a foreign-based mobile application, namely ByLock, which was apparently developed to ensure organisational communication among the FETÖ/PDY members was discovered, and it was also found out that there were servers with which the ByLock application was in contact. These findings were subject to detailed technical examinations. The inquiries and inspections conducted into this application by the MİT within its own field of work are not in the form of a judicial investigation. In Article 4 § 1 (i) of Law no. 2937, it is set forth that the MİT is empowered to gather, record and analyse information, documents, news and data on counter-terrorism issues by use of any kind of procedures, means and systems of technical and human intelligence and to report the intelligence created to the relevant institutions (see § 83 above).

129. In Article 6 of the same Law, it is set forth that in performing its duties, the MİT may apply clandestine working procedures, principles and methods as well as collect data on foreign intelligence, national defence, terrorism, international offences and cyber security which are conveyed through telecommunication channels (see § 84 above). It thus appears that the MİT is empowered through this Law to collect information and data on relevant persons and groups by technical means as well as to analyse these information and data, with a view to revealing the terrorist activities in advance without being performed for the purposes of maintaining the constitutional order and national safety of the country.

130. As a matter of fact, it is inevitable, in democratic societies for the protection of fundamental rights and freedoms, to need intelligence agencies and the methods employed by such agencies for effectively fighting against very complex structures such as terrorist organisations and tracking such organisations through covered methods. Therefore, to collect and analyse information about terrorist organisations, with an aim of collapsing them through covered intelligence methods, meet a significant need in democratic societies. Threats against democratic constitutional order may be identified and precautions may be taken against these threats through the information and data obtained by intelligence agencies. In this regard, the MİT is vested, by Articles 4 and 6 of Law no. 2937, with the powers to obtain and analyse information, documents and all other data concerning terrorist offences, which are transmitted through telecommunication channels, by using any kind of intelligence methods, to purchase any computer data available abroad, as well as to report them to the relevant institutions.

131. The organisation of, and activities performed by, the FETÖ/PDY have been a subject of social debate for a long time, and notably in the aftermath of 2013, the investigation authorities and the State’s security agencies started to consider this structure as a threat to national safety (see, §§ 12 and 13 above). In this regard, notably the investigations of 17-25 December and the stopping of MİT trucks are, inter alia, the basic grounds of the conclusion reached by the investigation authorities and the judicial bodies to the effect that the activities of this structure have been intended for overthrowing the Government (see §§ 15 and 16 above). It is further indicated in several investigation/prosecution files that many cases filed/conducted by judicial members, who were considered to have a link with this structure, have been also intended for ensuring or increasing its efficiency within public institutions notably at the TAF as well as within different field of the civil society (see § 14 above). During such a period, the public authorities have, on one hand, issued decisions and carried out practices revealing the illegal aspect of the FETÖ/PDY and taken certain measures against the organisation on the other (see §§ 18 and 19 above).

132. It is not for the Constitutional Court to decide on the lawfulness or expediency of the performance of intelligence activities by the State’s intelligence agencies by considering that the threat posed by FETÖ/PDY to national security turned into an imminent threat. Nor is it the subject-matter of the examination in the present case. The relevant authorities cannot be asked to wait, so as to take the necessary preventive measures, until the realisation of any terrorist threat. It has been comprehended that the complex structure and international nature of the FETÖ/PDY necessitated the performance of certain intelligence activities concerning this organisation before the coup attempt. In this sense, the coup attempt of 15 July demonstrated how great the threat posed by the FETÖ/PDY to national security was and how it turned into a severe risk against the existence and integrity of the nation despite the certain measures taken prior thereto (see, for detailed explanations and assessments, Aydın Yavuz and Others, §§ 12-25; and 212-221).

133. The MİT delivered to judicial/investigation authorities (the Ankara Chief Public Prosecutor’s Office) the FETÖ/PDY-related information of which it had become aware while performing its duties under Articles 4 and 6 of Law no. 2937. This act -whereby the MİT merely informed the competent judicial authorities of concrete information which was related to an issue falling into the scope of its own field of work (counter-terrorism) and which was found out on a legal basis- cannot be construed to the effect that the MİT, an intelligence agency, had engaged in law-enforcement activities. In this sense, it has been observed that the MİT had found out the impugned digital materials not as a result of an inquiry conducted for the purpose of collecting evidence, but within the scope of the intelligence activities conducted to reveal the activities of the FETÖ/PDY during a period when the public authorities, notably the National Security Council, started to perceive the FETÖ/PDY as a threat to the national security.

134. Besides, it must be borne in mind that the Ankara Chief Public Prosecutor’s Office was not provided with hearsay intelligence information which was of abstract and general nature, but rather with digital data regarding a program which was considered to be the covered communication means used by the FETÖ/PDY’s members and heads. The MİT’s notification of the digital materials -found out during an inspection within the scope of its own field of work- to the relevant judicial/investigation authorities in order to have them examined so as to ascertain whether these materials involved any criminal element -thereby revealing the material truth- does not render them unlawful merely on account of the nature of the notifying authority, namely the MİT.

135. The judicial authorities are always entitled to test the data delivered to them and to conduct necessary inquiries, examinations and assessments with respect to the authenticity or reliability of digital materials. In the present case, the incumbent judicial authorities, having received the impugned data, conducted the investigation process by making inspections and inquiries, through the competent law-enforcement units, within the framework of the provisions on search and examination of digital data, which are set out in the relevant procedural law, and in line with the decisions taken by the incumbent judges concerning the necessary preventive measure. Within this process, the necessary information, documents and evidence were obtained from the other relevant institutions and organisations. Besides, the defence has been always provided with the opportunity of challenging the authenticity or reliability of these digital materials and opposing their use, as required by the principles of equality of arms and adversarial proceedings inherent in the right to a fair trial.

136. Consequently, the delivery of the data concerning the ByLock application, which were found out during the intelligence inquiries conducted into a terrorist organisation aiming at overthrowing the constitutional order, to the Ankara Chief Public Prosecutor’s Office for making contribution to revealing the material truth during the investigation and prosecution against this organisation does not involve any prima facie unlawfulness. Nor did the Court of Cassation or the inferior courts make any determination to the effect that this process involved any. On the contrary, the General Assembly of the Criminal Chambers of the Court of Cassation concluded in its several judgments that the way in which the ByLock data were obtained -as evidence- was lawful (see the judgment of the General Assembly of the Criminal Chambers of the Court of Cassation, no. E.2018/16-419, K.2018/661 and dated 20 December 2018). Therefore, the submission, to the Ankara Chief Public Prosecutor’s Office, of the digital materials concerning the ByLock communication system, which were obtained by the MİT within the scope of its legal powers, as well as of the technical report issued in this respect cannot be considered as practice involving a manifest error of judgment or manifest arbitrariness.

(2) As regards the process following the submission of the ByLock data to the judicial authorities

137. A criminal case was filed against the applicant for his alleged membership of the FETÖ/PDY. In the report of 30 June 2017 titled “Result of New ByLock Inquiry”, which was submitted to the relevant court by the EGM-KOM, it is indicated that the applicant used ByLock application several times through the GSM subscription registered in his name and with 4 different mobile phones IMEI numbers of which were determined; and that the first time he signed up for this application is 13 August 2014. The applicant was convicted for being a member of the said terrorist organisation by the court decision of 8 November 2017. In its conviction decision, the court relied on the consistency between the ByLock Report issued in respect of the applicant by the EGM-KOM and the CGNAT data on the GSM number used by him as well as on the applicant’s use of ByLock communication program, designed for the use of the FETÖ/PDY’s members, with his username “serhat1299”. In this decision, it is further indicated that the ByLock program, which was used by the applicant, is the communication network of the FETÖ/PDY and has been developed and used by this organisation; and that in consideration of the features of the program, those using this application have been considered to have connection with the organisation.

138. Accordingly, the decisive evidence underlying the applicant’s conviction is the finding that he was a user of the ByLock. The applicant asserted that the ByLock data were unlawful and therefore could not be a ground for his conviction. Therefore, an assessment must also be conducted as to the period following the submission of the relevant data on ByLock program to the judicial authorities.

139. Upon the submission of the digital materials obtained from the ByLock server and the technical report issued with respect to these materials to the Ankara Chief Public Prosecutor’s Office, the investigation process was thereafter conducted in accordance with Law no. 5271. In this sense, the Ankara Chief Public Prosecutor’s Office requested the Ankara 4th Magistrate Judge to conduct inquiry into, make a back-up and transcribe the digital materials in question pursuant to Article 134 of Code no. 5271. Upon the said the request, the magistrate judge issued an order for “conducting an inquiry, making a back-up and conducting an expert examination as to the digital materials”.

140. Also in the judgment of the General Assembly of the Criminal Chambers of the Court of Cassation, which is no. E.2017/16.MD-956, K.2017/370 and dated 26 September 2017, it is underlined that the data obtained through the ByLock communication system fall under the scope of Article 134 of Code no. 5271. According to this judgment, as the records concerning communication through internet are saved in the computer file, these communication records may be subject to the search, back-up and seizure processes, which are set out as a measure in Article 134 § 1 of Code no. 5271. As noted by the Court of Cassation, the notion of “computer files” stated in Article 134 of Code no. 5271 does in technical sense include not only the records recorded in desktops and laptops but also all digital files that may be available in CDs, DVDs, flash disks, floppy disks as well as in any data processing or data collection means or tools including all removable storages, digital-based mobile devices such as mobile phones and etc.. It has been observed that the determinations and assessments which were made by the Court of Cassation and the inferior courts with respect to the preventive measures applied did not involve any manifest error of judgment and arbitrariness.

141. The judicial authorities conducted the necessary inquiries, examinations and assessments as to the authenticity or reliability of the digital materials submitted, which were also examined and interpreted by the relevant technical units. The defence was also granted the opportunity of challenging the authenticity of the evidence demonstrating that the applicant used ByLock application and opposing its use in accordance with the principles of the equality of arms and adversarial proceedings.

142. Consequently, in the present case, there has been no violation with respect to the allegations that the ByLock data were obtained without any legal basis or unlawfully.

143. For these reasons, the Court has found no violation of the right to a fair hearing under the scope of the right to a fair trial safeguarded by Article 36 of the Constitution.

B. Allegation that the Bylock cannot be relied on as the sole or decisive evidence for conviction

1. The Applicant’s Allegations and the Ministry’s Observations

144. The applicant maintained that his conviction was based on ByLock data as single or decisive evidence, which was unlawful; that the documents issued with respect to ByLock were contradictory, inconsistent and ambiguous; and that these data were nevertheless relied on by the relevant courts as evidence against him. He accordingly alleged that his right to a fair trial had been violated.

145. In its observations, the Ministry pointed to the information and documents indicated by the incumbent court as evidence in the reasoned decision and noted that the applicant and his lawyer had the opportunity of raising their claims and challenges against the impugned data. The Ministry also indicated that it was within the inferior courts’ jurisdiction to assess the evidence.

146. In his counter-statements against the Ministry’s observations, the applicant reiterated the issues noted in the application form and annexes thereto.

2. The Court’s Assessment

147. In Article 148 § 4 of the Constitution, it is set out that the complaints concerning the issues to be examined in appellate review cannot be subject to an examination through individual application. Accordingly, in principle, any question with respect to the establishment of impugned facts, the assessment of the evidence, the interpretation and implementation of provisions of law as well as the fairness of the conclusion reached with respect to the dispute cannot be subject-matter of an individual application. However, the findings and conclusions constituting an interference with the rights and freedoms falling under the scope of individual application and involving a manifest error of judgment or manifest arbitrariness are excluded from this rule (see, among many other authorities, Ahmet Sağlam, no. 2013/3351, 18 September 2013).

148. However, in cases where there is an interference with the fundamental rights and freedoms, it is the Constitutional Court that will assess the effect of the inferior courts’ decisions and assessments on the safeguards provided for in the Constitution. In this respect, any examination to be made, by taking into account the safeguards provided for in the Constitution, as to whether the fundamental rights and freedoms falling into the scope of individual application have been violated cannot be regarded as “an assessment of an issue to be considered in appellate review” (see, Şahin Alpay (2) [Plenary], no. 2018/3007, 15 March 2018, § 53).

149. Besides, the Constitutional Court is entitled, in very exceptional cases, to examine a complaint with respect to the issues to be considered in appellate review, which is not directly related to the fundamental rights and freedoms, without being subject to the above-cited restriction. In very exceptional cases where the fairness of the proceedings has been undermined to a great extent and the procedural safeguards inherent in the right to a fair trial have thereby become dysfunctional, this situation -which is indeed related to the outcome of the proceedings- has by itself turned into a procedural safeguard. Therefore, the Constitutional Court’s examination as to whether the inferior court’s assessments rendered the procedural safeguards dysfunctional and whether the fairness of the proceedings was impaired to a great extent due to manifest arbitrariness does not mean that the Court has dealt with the outcome of the proceedings. As a result, the Constitutional Court may interfere with the inferior courts’ assessments concerning evidence only in case of a practice which is manifestly arbitrary and has rendered dysfunctional the procedural safeguards inherent in the right to a fair trial.

150. In the present case, although the applicant maintained that his right to a fair trial had been breached due to the use of ByLock data as decisive evidence for his conviction, he did not clearly indicate which of the procedural safeguards inherent in the right to a fair trial had been violated. It does not also seem possible to examine the allegation raised by the applicant under any aspect of the procedural safeguards inherent in the right to a fair trial. In this sense, what remains to be determined is whether the inferior court’s reliance on the ByLock data as sole or decisive evidence for the applicant’s conviction is a practice which has completely rendered dysfunctional the procedural safeguards inherent in the right to a fair trial or has been manifestly arbitrary. To that end, the process whereby the ByLock data were relied on as evidence as well as the inferior court’s assessment with respect thereto must be taken into consideration.

151. The investigation units issued technical and chronological reports including comprehensive information on technical features of the ByLock program ensuring its confidentiality, its use, its encryption method, the way how it is downloaded, the fields it is used and its intended purpose and submitted them to the relevant judicial authorities. In these reports, the differences between ByLock program and the common commercial messaging programs as well as the organisational features of the former one are indicated. In this sense, it is indicated therein that the common commercial messaging programs enable for easy download, synchronisation of the persons in the phonebook with the program, identification through phone number and e-mail address and encryption, whereas ByLock program, to the contrary, makes it difficult to download, to be included in the system and to get in contact with persons, and it does not demand, during the signing up process, any personal information which would lead to the identification of the user partially or wholly.

152. Certain abbreviations and organisational literature, which were also mentioned by the organisation members in their statements, were used in the messages and e-mails sent/received through the Bylock program. Seeking mutual consent of two users to enable them to get in contact -adding as a friend- was considered as an indication of the fact that the program was designed in accordance with the cell-type structure of the organisation. It was also admitted in the statements included in the files of investigation and/or prosecution conducted in the aftermath of the coup attempt, as well as in the messages and e-mails sent by the organisation members, that ByLock was a program designed to ensure organisational communication and was used to that end.

153. In the judgment rendered by the General Assembly of the Criminal Chambers of the Court of Cassation, no. E.2017/16.MD-956, K.2017/370 and dated 26 September 2017, it was concluded -in consideration of the technical data and information revealed by the investigation authorities and structuring and characteristics of the FETÖ/PDY- that ByLock was, by its functioning systematics and structure, a program designated and offered for the exclusive use of the FETÖ/PDY members. In the Court of Cassation’s jurisprudence, ByLock communication system is regarded as a network created for the use of the FETÖ/PDY members. Therefore, the finding -through technical data which are beyond any doubt and capable of forming an exact conclusion that the relevant persons have involved in this network upon organisational instruction and it has been used for confidential communication- is admitted as evidence demonstrating the relevant person’s relation with the said organisation (see §§ 94, 97 and 104 above).

154. As inferred from the Court of Cassation’s judgments, the ByLock data are mainly based on two sources. The first one is the data which were obtained from the ByLock server and were then subject to examination by technical units, pursuant to a magistrate judge’s/court’s decision, upon being submitted by the MİT to the judicial authorities. The second one is the CGNAT records demonstrating the IP addresses in Turkey which connected to IP addresses of the Bylock server. In this sense, the judicial bodies relied on the data obtained from the ByLock server, which play a significant role for the identification of the ByLock users and determination of their hierarchical positions within the organisation. It is thereby possible to ascertain the User-ID numbers, usernames and passwords of the users signed up for the ByLock server, the dates of access, IP addresses connected to the server, the number of connections between particular dates and with whom the relevant persons communicated.

155. In these judgments, it is further indicated that CGNAT (HIS) records saved by the operators are a kind of metadata which are used for the exact identification of the ByLock users; that as these records are in the form of summary data, they are considered as a sign and indication and would not per se prove that a given person is a real user of the ByLock application. It is also noted therein that the probability that the relevant persons may have been routed to the ByLock servers against their own will must also be taken into consideration. It is further emphasised that in cases where a given person has been revealed to connect to ByLock server through CGNAT records but has not been matched with a ByLock User-ID number yet, it must be borne in mind that he may either be a real ByLock user or have been routed to the ByLock servers through trap methods (Morbeyin and etc.). The Court of Cassation notes that in such cases, no conviction decision may be issued due to inadequate inquiry (see, §§ 97, 104/c above).

156. As noted in the court decisions as well as in the judicial and technical reports, merely the download of the ByLock application to a device is not sufficient for messaging/communication. At the sign-up stage, the user is required to create a username and password. For sending/receiving messages and ensuring communication, the username/user-code, which has been created by the users in the course of sign-up stage and which is specific to each user, is to be known, and mutual consent is sought for adding a friend. It is not possible to get in contact with any person without two persons’ mutual consent to add each other. In its judgments, the Court of Cassation points to the significant role of the ByLock Report in determination of the legal status of the relevant person. This report is a document which indicates User-ID number, username, password of the user of the ByLock server, log records available in the server and transcription of messages/e-mails if any, as well as the relation between the user and the other users in the groups created or joined by the user. In these judgments, it is accordingly noted that the ByLock report and the documents including CGNAT records are important in proving that the relevant person has signed in and used the ByLock system with a view to ensuring organisational confidentiality and communication (see §§ 97, 104/d-i above).

157. In the judgment of the General Assembly of the Criminal Chambers of the Court of Cassation, no. E.2018/16-418, K.2019/513 and dated 27 June 2019, it is also indicated that despite the finding whereby the User-ID has been matched with the relevant person, there may be doubts as to the fact that the User-ID number indeed belongs to another person in consideration of the other evidence available in the file. Accordingly, in the face of defence submissions that the GSM or ADSL subscription registered in the accused person’s name or the device connecting to internet through these subscriptions has been indeed used by another person or that information -such as password- required for accessing to internet connection through these subscriptions has been shared by the accused person with others or obtained unlawfully by others, necessary inquiries and examinations must be conducted in this respect. The reports including the User-ID information, which were issued by the EGM-KOM, must be assessed in conjunction with the data to be obtained as a result of the inquiries with respect to the person allegedly using the accused person’s subscription or device. If considered necessary for revealing the material truth, the report on the up-to-date report on ByLock inquiry results as well as, if available, the CGNAT and HTS records must be also obtained and examined.

158. According to the judicial and technical reports as well as the Court of Cassation’s judgments, an organisation member is to be informed, by another member of the organisation, of the existence of ByLock application, its organisational significance and confidentiality, how it is downloaded and used, and how a friend is added to get in contact. As also indicated in the inquiries conducted by the judicial units, the ByLock program does not include any sections such as user manual, frequently asked questions and feedbacks. Therefore, any person -who has no relation with the organisation but has downloaded the application, designed to be used for organisational purposes, by change through general application stores and certain websites- cannot use it and get in contact with organisation members by adding them as a friend without the assistance of any other member of the organisation. In the judicial processes, not download of the impugned application, but signing up to it and its use for organisational purposes were relied on. As a matter of fact, according to the findings of the judicial authorities, no investigation was conducted against individuals only for having downloaded the ByLock application to their device. However, in case of any allegation to the contrary, the judicial authorities conducted inquiries in this respect (see § 98 above).

159. In the light of the above-mentioned explanations, the determinations and assessments made by the Court of Cassation and inferior courts as to the ByLock application cannot be said to be devoid of factual basis. In this sense, the inferior courts adopt the evidence-based method (identifying the accused person on the basis of the available evidence) in making assessments as to the ByLock application and matching the data on this application with the accused persons. Moreover, these assessments are based not on a single set of data but on the comparison and ultimately confirmation of several information, documents, records and data obtained from different sources. Those accused have the opportunity, at any time during the investigation and prosecution stages, to challenge the authenticity and soundness of the evidence demonstrating that they are a ByLock user, as well as to raise any kind of claims and requests with respect thereto. Besides, the appellate authorities may also decide to quash any conviction in cases where such allegations have not been sufficiently dealt with (see §§ 97-104 above). Accordingly, it has been concluded that neither the Court of Cassation nor the inferior courts have adopted a categorical approach with respect to the Bylock.

160. In principle, it is for the trial courts to assess the available evidence in a given case and to decide whether the evidence adduced relates to the case. It is not the Constitutional Court’s task to make an assessment in this respect. Therefore, it falls within the inferior courts’ jurisdiction to assess whether a single piece of evidence per se suffices to find established the offence of membership of a criminal organisation. As the inferior courts are in direct relation with the accused person and have the opportunity of a first-hand examination of the evidence, they are in a better position in that regard than the Constitutional Court.

161. In the present case, the inferior court relied on the applicant’s signing up and registry to the ByLock server by obtaining a user-ID, through his own devices and his GSM subscription, and his use of ByLock for ensuring the confidentiality of organisational communication as evidence demonstrating his relation with the organisation. In making this assessment, the court referred to the data obtained from the ByLock server and discovered by the technical units, as well as to the CGNAT records. The applicant’s conviction for his membership of a terrorist organisation based solely on the use of an encrypted communication network, which was apparently used -by its structure, way of use and technical features- merely by the FETÖ/PDY members to ensure organisational confidentiality, cannot be considered as a manifestly arbitrary practice which has completely rendered dysfunctional the procedural safeguards inherent in the right to a fair trial. It has been accordingly concluded that the allegations that ByLock data were relied on as sole or decisive evidence in the conviction were in the form of a complaint that should have been examined at the appellate stage.

162. Finally, the applicant maintained that there were discrepancies in certain ByLock data. In the assessment of the said allegation, it must be taken into consideration -independently of the present application- that the data available on the ByLock server and the CGNAT records could not be fully obtained. Therefore, there may be insubstantial differences among the data concerning the persons, depending on the ability of recovering and transcribing the data obtained from the ByLock database.

163. In the present case, as a result of the technical inquiries, the User-ID number 114205 was matched with the IP numbers used while the accused person connected to ByLock server, and all other data with respect to this User-ID number -which could be recovered- were also included in the ByLock Report. It has been revealed that the devices, which were found -through the report on ByLock inquiry result and CGNAT records- to be used with this GSM subscription, were the mobile phones that the applicant admitted, at the hearing, to having used. According to the inferior court’s finding, the data such as the GSM number and log records indicated in the ByLock Report are so consistent with the CGNAT records that would not cast any doubt on the applicant’s use of ByLock. Therefore, the existence of insubstantial differences between the log records pertaining to the User-ID matched with the applicant and the CGNAT records as well as among certain data included in the different sub-charts related to this User-ID, due to the inability to completely recover the relevant data, does not lead the Court to reach any conclusion to the contrary.

164. For these reasons, this part of the application must be declared inadmissible for being manifestly ill-founded.

C. Alleged failure to bring the digital data before the incumbent court

1. The Applicant’s Allegations and the Ministry’s Observations

165. The applicant maintained that his right to a fair trial had been violated, stating that the relevant digital data had not been brought before the incumbent court.

166. In its observations, the Ministry did not provide any explanation with respect to this allegation.

2. The Court’s Assessment

167. As enshrined in Article 36 of the Constitution, everyone has the rights to self-defence and to a fair trial. The safeguards afforded in pursuance of the right to self-defence are in essence inherent in the right to a fair trial. As regards the legislative intention for addition of the notion of “… and the right to a fair trial” to Article 36 of the Constitution, it is emphasized that the right to a fair trial, which is safeguarded also by the international conventions to which Turkey is a party, is incorporated into the provision. Article 6 § 3 (b) of the Convention sets forth that everyone charged with a criminal offence has the right to have adequate time and facilities for the preparation of his defence (see Ufuk Rifat Çobanoğlu, §§ 35 and 37). Therefore, the right to have adequate time and facilities for the preparation of his defence undoubtedly falls within the scope of the right to a fair trial safeguarded by Article 36 of the Constitution.

168. The notion of necessary facilities for the defence means the requisite facilities which would or may assist the suspect/accused person in his self-defence. The facilities to be afforded to the person charged with a criminal offence are the ones that are requisite for the defence. One of these facilities is to enable the relevant person to access the information and evidence so as to prepare his defence submissions and thereby defend himself before the court in the most appropriate and effective manner as well as to thus influence the outcome of the proceedings. Granting access to the information and evidence likely to lead to the accused person’s acquittal or any reduce in his penalty is among the facilities to be afforded (see, mutatis mutandis, Ufuk Rifat Çobanoğlu, § 45).

169. The right to have necessary time and facilities, which is to be afforded to the defence, is directly related to the principles of equality of arms and adversarial proceedings. The principle of adversarial proceedings entails that the parties be granted the opportunity to have knowledge of, and comment on, the case file. Therefore, in criminal trials, the accused person must be given the opportunity to have knowledge, and to thereby effectively challenge, the observations filed and evidence adduced by the other party, with a view to influencing the court’s decision (see Tahir Gökatalay, no. 2013/1780, 20 March 2014, § 25; and Cezair Akgül, no. 2014/10634, 26 October 2016, §§ 27-31). The principle of equality of arms means that parties of a case shall be subject to the same conditions in terms of procedural rights and that both parties shall be afforded equal opportunities to submit their allegations and arguments before the courts, without placing any party in a disadvantageous position (see Yaşasın Aslan, no. 2013/1134, 16 May 2013, § 32). This principle also entails that the material information -which is submitted and obtained by the prosecution- would be explained; and that in criminal trials, the accused person would not be subject to a legal condition to his detriment (see Yankı Bağcıoğlu and Others, §§ 63 and 64).

170. However, the burden of proof rests on the applicant by substantiating his allegations with respect to the impugned facts by means of adducing the relevant evidence before the Constitutional Court and providing explanations as to the allegedly violated constitutional provisions invoked by him. The applicant is required to indicate, in his application form, the rights or freedoms allegedly breached due to any act, action or negligence of a public authority, the constitutional provisions invoked, the grounds of the alleged violation, the evidence relied on, as well as the practices or decisions allegedly giving rise to violation. The facts as to the violation allegedly caused by a public authority must be summarized chronologically, and the way how the rights safeguarded by the individual application mechanism have been violated, as well as the reasons and evidence with respect thereto, must be explained in the individual application form (see Veli Özdemir, no. 2013/276, 9 January 2014, §§ 19 and 20; and Ünal Yiğit, no. 2013/1075, 30 June 2014, §§ 18 and 19).

171. However, the applicant failed to provide sufficient explanation in his application form as to the said allegation, as well as to substantiate it. In his counter-statements against the Ministry’s observations, he made a reference to certain petitions he had submitted to the inferior courts and requested the Court to take them into consideration. Although he provided explanations, in one of these petitions, as to the failure to bring the digital evidence before the incumbent court, these explanations were made not within the scope of the concrete problems he had encountered during his trial within the context of ByLock data but rather, in general terms, within the scope of his allegation that the relevant ByLock data had been obtained unlawfully. In other words, there is no information and document to the effect that the applicant raised before the inferior courts the concrete problems resulting from the use of ByLock data during his trial and requested the courts to conduct necessary inquiries and examinations; but the inferior courts failed to take any action.

172. For these reasons, as the applicant’s allegation that the relevant digital data had not been brought before the inferior courts was not substantiated, this part of the application must be declared inadmissible for being manifestly ill-founded.

VI. JUDGMENT

For the reasons explained above, the Constitutional Court UNANIMOUSLY held on 4 June 2020 that

A. 1. The alleged violation of the right to a fair hearing be DECLARED ADMISSIBLE;

2. The allegation that the ByLock data could not be relied on as sole or decisive evidence for conviction be DECLARED INADMISSIBLE for being manifestly ill-founded;

3. The alleged failure to bring the relevant digital materials before the inferior courts be DECLARED INADMISSIBLE for being manifestly ill-founded;

B. There was NO VIOLATION of the right to a fair hearing inherent in the right to a fair trial safeguarded by Article 36 of the Constitution;

C. As the payment of the court expenses by the applicant would be unjust pursuant to Article 339 § 2 of the Code of Civil Procedure no. 6100 and dated 12 January 2011, he would BE COMPLETELY EXEMPTED from payment of the court expenses;

D. A copy of the judgment be SENT to the Ministry of Justice.

I. CASE DETAILS

Deciding Body Plenary Assembly
Decision/Judgment Type Merits (non-violation)
Tag
(Ferhat Kara [GK], B. No: 2018/15231, 4/6/2020, § …)
   
Case Title FERHAT KARA
Application No 2018/15231
Date of Application 20/4/2018
Date of Decision/Judgment 4/6/2020
Official Gazette Date/Issue 26/6/2020 - 31167
Press Release Available

II. SUBJECT-MATTER OF THE APPLICATION


 

III. EXAMINATION RESULTS


Right Alleged Violation Conclusion Redress
Right to a fair trial (Criminal Charge) Right to a fair trial (unlawful evidence, manifest error of appreciation, etc.) No violation
Request for appellate review Manifestly ill-founded

IV. RELEVANT LAW



Type of legislation Date/Number of legislation - Name of legislation Article
Law 4
6
5271 Criminal Procedure Law 134
206
217
3713 Anti-Terrorism Law 1
2

3/7/2020

Press Release No: Individual Application 39/20

Press Release concerning the Judgment Finding no Violation of the Right to a Fair Trial due to the Applicant’s Conviction Based Solely on ByLock Data

 

On 4 June 2020, the Plenary of the Constitutional Court found no violation of the right to a fair hearing within the scope of the right to a fair trial safeguarded by Article 36 of the Constitution in the individual application lodged by Ferhat Kara (no. 2018/15231).

 

The Facts

Before dealing with the facts and particular circumstances of the present case, the Court made determinations and assessments concerning the activities performed by, and specific characteristics of, the Fetullahist Terrorist Organisation/Parallel State Structure (“the FETÖ/PDY”). In this sense, the Court provided general explanations as to the technical concepts of the ByLock application, how this application was found out, its notification to the judicial authorities and the judicial process conducted thereafter, as well as general and organisational features of the ByLock application.

The applicant, who was a guardian at the time when the impugned incidents took place, was sentenced to 7 years and 6 months’ imprisonment for his membership of an armed terrorist organisation by the relevant court’s decision issued at the end of the criminal investigation conducted by the incumbent chief public prosecutor’s office in the aftermath of the attempted coup-d’état of 15 July 2016.

The applicant’s conviction was based solely on his use of ByLock communication program which was provided for the use of the FETÖ/PDY members. The applicant’s challenge against his conviction decision before the regional court of appeal was dismissed on the merits. The dismissal decision was also appealed by him; however, the appellate request was also dismissed by the Court of Cassation.

The Applicant’s Allegations

The applicant maintained that the data obtained from the ByLock application had been collected illegally and were relied on as a principal ground in his conviction; that the use of ByLock data as a sole or decisive evidence was unlawful; and that the digital data underlying his conviction were not brought before the court. He accordingly alleged that his right to a fair trial had been violated.

The Court’s Assessment

A. Alleged Violation of the Right to a Fair Hearing

1. As regards the data obtained from the ByLock server

In the course of the period during which the investigation authorities and the State’s security agencies started to perceive the FETÖ/PDY’s staffing within the public institution and organisations along with its activities within the different social, cultural and economic areas, notably education and religion, as a threat to the national security, the National Intelligence Organisation (“the MİT”) also conducted inspections, within the boundaries of its own field of work, into the FETÖ/PDY’s activities.   

During these inspections and inquiries, a foreign-based mobile application, namely ByLock, which was apparently developed to ensure organisational communication among the FETÖ/PDY members was discovered, and it was also found out that there were servers with which this application was in contact.  

It is inevitable, in democratic societies for the protection of fundamental rights and freedoms, to need intelligence agencies and the methods employed by them for the purposes of effectively fighting against very complex structures such as terrorist organisations and tracking such organisations through covered methods. Therefore, to collect and analyse information about terrorist organisations, with an aim of collapsing them through covered intelligence methods, meet a significant need in democratic societies.

The MİT delivered to judicial/investigation authorities the FETÖ/PDY-related information of which it had become aware while performing its duties under Law no. 2937. This act -whereby the MİT merely informed the competent judicial authorities of concrete information which was related to an issue falling into the scope of its own field of work (fight against terrorism) and which was found out on a legal basis- cannot be construed to the effect that the MİT had performed law-enforcement activities. In this sense, it has been observed that the MİT had found out the impugned digital materials not as a result of its inquiries to collect evidence but within the scope of the intelligence activities conducted to reveal the activities of the FETÖ/PDY during a period when the public authorities, notably the National Security Council, started to perceive the FETÖ/PDY as a threat to the national security.

Besides, it must be borne in mind that the incumbent chief public prosecutor’s office was not provided with hearsay intelligence information which was of abstract and general nature, but rather with digital data regarding an application which was considered to be the covered communication means used by the FETÖ/PDY’s members and heads. The MİT’s delivery of the digital materials -found out during an inspection within the scope of its own field of work- to the relevant judicial/investigation authorities in order to have them examined so as to ascertain whether these materials involved any criminal element does not render them unlawful.

Consequently, the delivery of the data concerning the ByLock application, which were found out during the intelligence inquiries conducted into a terrorist organization aiming at overthrowing the constitutional order, to the chief public prosecutor’s office for making contribution to revealing the material truth during the investigation and prosecution against this organisation does not involve any unlawfulness. The submission, to the chief public prosecutor’s office, of the digital materials concerning the ByLock communication system, which were obtained by the MİT within the scope of its legal powers, as well as of the technical report issued in this respect cannot be considered to constitute a manifest error of judgment or manifest arbitrariness. 

(2) As regards the process following the submission of ByLock data to the judicial authorities  

Upon the submission of the digital materials obtained from the ByLock server, the investigation process was thereafter conducted in accordance with Law no. 5271. The judicial authorities made the necessary inquiries, examinations and assessments as to the authenticity or reliability of the digital materials. In pursuance of the relevant court decisions, the available materials were subjected to technical examinations. The defence was also provided, as required by the principles of equality of arms and adversarial proceedings, with the opportunity to challenge the authenticity, as well as to object to the use, of the evidence indicating that the applicant was a ByLock user.

Consequently, in the present case, no violation was found in terms of the allegation that the data obtained through ByLock had been obtained without a legal basis or unlawfully. 

Consequently, the Court has found no violation of the right to a fair hearing inherent in the right to a fair trial safeguarded by Article 36 of the Constitution.

B. Allegation that ByLock Data cannot be the sole or decisive evidence for conviction

The investigation authorities issued, addressing to the judicial authorities, technical and chronological reports including comprehensive information about the technical features of the ByLock application which ensure confidentiality, its use, its encryption, the method how it is downloaded to a device as well as for which purposes it is used. In these reports, the differences between the ByLock application and the other most common instant messaging programs as well as organisational features of the impugned application are mentioned.  

The messages and e-mails, which were obtained from the ByLock, contained certain abbreviations about which the organisation members gave information in their statements and the literature peculiar to the organisation. The necessity, for enabling two users to get in contact, to add each other was regarded as an indication that the ByLock application was developed in pursuance of the clandestine cell-type structure of the organisation. It was further indicated in the statements given by the organisation members within the scope of the investigations conducted in the aftermath of the coup attempt that the ByLock application was a communication program designed to ensure organisational communication through the messages and e-mails sent and received by the organisation members and was used to that end.

As noted in the court decisions as well as in the judicial and technical reports, merely the download of the ByLock application to a device is not sufficient for messaging/communication. For sending/receiving messages and ensuring communication, the username/user-code which was created by the users in the course of registration and which is specific to each user is to be known, and mutual consent is sought for adding a friend. It is not possible to get in contact with any person without two persons’ mutual consent to add each other. In the same vein, as also noted in the court decisions, any person -who has no relation with the organisation but has downloaded the impugned application -designed to be used for organisational purposes- by change through general application stores and certain websites- cannot use it and get in contact with organisation members by adding them as a friend without the assistance of any member of the organisation. In the judicial processes, not download of the impugned application but signing up to it and its use for organisational purposes were relied on. Accordingly, the determinations and assessments made by the Court of Cassation and inferior courts as to the ByLock application cannot be said to be devoid of factual basis.

In the present case, the incumbent court relied on the applicant’s signing up and registry to the ByLock server by obtaining a user-ID, through his own devices and his GSM subscription, and his use of the application for ensuring the confidentiality of organisational communication as evidence demonstrating his relation with the organisation. In making this assessment, the court referred to the data obtained from the ByLock server and discovered by the technical units, as well as to Carrier Grade NAT (CGNAT) records. The applicant’s conviction for his membership of a terrorist organisation based solely on the use of an encrypted communication network, which was apparently used -by its structure, way of use and technical features- merely by the FETÖ/PDY members to ensure organisational confidentiality, cannot be considered as a manifestly arbitrary approach which has completely rendered dysfunctional the procedural safeguards inherent in the right to a fair trial.

Consequently, the Court has declared this part of the application inadmissible for being manifestly ill-founded.

C. Alleged failure of the inferior courts to consider the relevant digital data

The applicant did neither provide a sufficient explanation concerning this allegation nor substantiated it in the application form. Besides, there is no information or document to the effect that although he raised, before the inferior courts, the concrete issues as to the use of the relevant data obtained from the ByLock application during his proceedings and requested the courts to make the necessary inquiries and inspections, the inferior courts remained inactive. 

Consequently, the Court has declared this part of the application inadmissible for being manifestly ill-founded.

This press release prepared by the General Secretariat intends to inform the public and has no binding effect. 
  • pdf
  • yazdir
The Constitutional Court of the Turkish Republic