Jump to content

OdaTV: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Dexbot (talk | contribs)
m Bot: Using official website template
Bgs876 (talk | contribs)
added paragraph on Pehlivan investigation with citations
Line 25: Line 25:


Digital documents linking to the [[Ergenekon (organization)|Ergenekon]] conspiracy are the basis of the case against [[Barış Terkoğlu]], [[Ahmet Şık]], [[Nedim Şener]] and the other detainees in the OdaTV case.<ref name=RealDanger>{{cite news|last=Kenyon|first=Peter|url=http://www.npr.org/2012/01/26/145844105/for-turkish-journalists-arrest-is-a-real-danger|accessdate=2012-01-27|title=For Turkish Journalists, Arrest Is A Real Danger|work=npr |date=2012-01-26}}</ref><ref name=rsf>{{cite news|url=http://en.rsf.org/turquie-two-investigative-journalists-19-03-2012,42153.html |accessdate=2012-06-04 |title=Two Investigative Journalists Threatened on Twitter |work=[[Reporters Without Borders]] |date=2012-03-19}}</ref> Examinations of the documents conducted by computer experts at [[Boğaziçi University]], [[Yıldız Technical University]], [[Middle East Technical University]], and the American data processing company ''DataDevastation'' have refuted the validity of the documents, concluding that outside sources targeted the journalists' computers. Rare and malicious computer viruses, including Autorun-BJ and [[Sality|Win32:Malware-gen]], allowed the placement of the documents to go unnoticed by the defendants.<ref>{{citation|last=Marpet|first=Joshua|url=http://cdogangercekler.files.wordpress.com/2011/12/odatv_abd_raporu_23-1-12-2011.pdf|accessdate=2012-06-03|title=ODA-TV HDD#6|work=DataDevastation Report |pages=8–17|date=2011-12-21}}</ref> Another judicial report prepared by the governmental agency [[TÜBİTAK]] also confirmed the infection by malicious viruses but could not confirm or reject any outside intervention.<ref name="Today's Zaman">{{citation|url=http://www.sundayszaman.com/sunday/newsDetail_getNewsById.action?newsId=290553|accessdate=2012-10-18|title=TÜBİTAK says can't conclude if documents in OdaTV case sent via computer virus|date=2012-08-27|work=[[Today's Zaman]]}}</ref>
Digital documents linking to the [[Ergenekon (organization)|Ergenekon]] conspiracy are the basis of the case against [[Barış Terkoğlu]], [[Ahmet Şık]], [[Nedim Şener]] and the other detainees in the OdaTV case.<ref name=RealDanger>{{cite news|last=Kenyon|first=Peter|url=http://www.npr.org/2012/01/26/145844105/for-turkish-journalists-arrest-is-a-real-danger|accessdate=2012-01-27|title=For Turkish Journalists, Arrest Is A Real Danger|work=npr |date=2012-01-26}}</ref><ref name=rsf>{{cite news|url=http://en.rsf.org/turquie-two-investigative-journalists-19-03-2012,42153.html |accessdate=2012-06-04 |title=Two Investigative Journalists Threatened on Twitter |work=[[Reporters Without Borders]] |date=2012-03-19}}</ref> Examinations of the documents conducted by computer experts at [[Boğaziçi University]], [[Yıldız Technical University]], [[Middle East Technical University]], and the American data processing company ''DataDevastation'' have refuted the validity of the documents, concluding that outside sources targeted the journalists' computers. Rare and malicious computer viruses, including Autorun-BJ and [[Sality|Win32:Malware-gen]], allowed the placement of the documents to go unnoticed by the defendants.<ref>{{citation|last=Marpet|first=Joshua|url=http://cdogangercekler.files.wordpress.com/2011/12/odatv_abd_raporu_23-1-12-2011.pdf|accessdate=2012-06-03|title=ODA-TV HDD#6|work=DataDevastation Report |pages=8–17|date=2011-12-21}}</ref> Another judicial report prepared by the governmental agency [[TÜBİTAK]] also confirmed the infection by malicious viruses but could not confirm or reject any outside intervention.<ref name="Today's Zaman">{{citation|url=http://www.sundayszaman.com/sunday/newsDetail_getNewsById.action?newsId=290553|accessdate=2012-10-18|title=TÜBİTAK says can't conclude if documents in OdaTV case sent via computer virus|date=2012-08-27|work=[[Today's Zaman]]}}</ref>

Digital forensics company Arsenal Consulting examined the OdaTV evidence and found that while the malware on [[Barış Pehlivan]]'s OdaTV computer was much more interesting than known prior to Arsenal’s involvement (e.g. the Ahtapot remote access trojan never seen before “in the wild”), it was not responsible for delivery of the incriminating documents. The “Anchors in Relative Time”<ref>{{citation|title=Anchors in Relative Time (ART)|journal=Digital Forensics Magazine|issue=27|date=May 2016|url=https://digitalforensicsmagazine.com/index.php?option=com_content&view=article&id=1064&Itemid=99}}</ref> analysis technique was used to reveal a series of local (physical access) and remote (across the Internet) attacks against his computer. The final two local attacks (on the evenings of February 9 and 11, 2011) resulted in delivery of the incriminating documents to his computer, just prior to its seizure by the [[Turkish National Police]]. Arsenal’s work has been covered by Motherboard<ref>{{cite news|last=Fiscutean|first=Andrada|title=Turkish Journalist Jailed for Terrorism Was Framed, Forensics Report Shows|date=2016-08-22|work=vice|url=https://motherboard.vice.com/read/turkish-journalist-jailed-for-terrorism-was-framed-forensic-report-shows-1}}</ref> and a detailed case study<ref>{{cite web|title=Odatv - A Case Study in Digital Forensics and Sophisticated Evidence Tampering|access-date=2016-11-11|url=https://arsenalexperts.com/Case-Studies/Odatv}}</ref> is under ongoing development.


== References ==
== References ==

Revision as of 19:23, 11 November 2016

odatv.com
Formatonline news
Founded2007
Political alignmentKemalism, Secularism, Left-wing nationalism
LanguageTurkish
Websitewww.odatv.com

odatv.com is a Turkish news website. It was founded in 2007 by Soner Yalçın and Cüneyt Özdemir; Özdemir soon left after a difference of opinion.[1] It was described in 2012 by the Committee to Protect Journalists as "an ultranationalist website harshly critical of the government".[2] Since early 2011 it is the centre of the Odatv case of the Ergenekon trials, with Odatv accused of being the "media arm" of the Ergenekon organization. Eight of its journalists are under indictment in connection with the case, which Reporters without Borders has called "absurd".[3]

Ergenekon case

In February 2011, odatv's offices were raided and some of its staff arrested (including owner Soner Yalçın and executive editor Barış Pehlivan as well as news co-ordinator Doğan Yurdakul, journalist Barış Terkoğlu and others) and accused of links with the Ergenekon organization.[1] Odatv columnists Muhammet Sait Çakır, Coşkun Musluk and Müyesser Uğur were also charged.[4]

Digital documents linking to the Ergenekon conspiracy are the basis of the case against Barış Terkoğlu, Ahmet Şık, Nedim Şener and the other detainees in the OdaTV case.[5][6] Examinations of the documents conducted by computer experts at Boğaziçi University, Yıldız Technical University, Middle East Technical University, and the American data processing company DataDevastation have refuted the validity of the documents, concluding that outside sources targeted the journalists' computers. Rare and malicious computer viruses, including Autorun-BJ and Win32:Malware-gen, allowed the placement of the documents to go unnoticed by the defendants.[7] Another judicial report prepared by the governmental agency TÜBİTAK also confirmed the infection by malicious viruses but could not confirm or reject any outside intervention.[8]

Digital forensics company Arsenal Consulting examined the OdaTV evidence and found that while the malware on Barış Pehlivan's OdaTV computer was much more interesting than known prior to Arsenal’s involvement (e.g. the Ahtapot remote access trojan never seen before “in the wild”), it was not responsible for delivery of the incriminating documents. The “Anchors in Relative Time”[9] analysis technique was used to reveal a series of local (physical access) and remote (across the Internet) attacks against his computer. The final two local attacks (on the evenings of February 9 and 11, 2011) resulted in delivery of the incriminating documents to his computer, just prior to its seizure by the Turkish National Police. Arsenal’s work has been covered by Motherboard[10] and a detailed case study[11] is under ongoing development.

References

  1. ^ a b Cüneyt Özdemir, Hurriyet Daily News, 15 February 2011, Soner Yalçın and the raid on 'odatv.com'
  2. ^ CPJ, 20 September 2012, Bewildering Odatv trial continues in Istanbul
  3. ^ RSF, 6 January 2012, Judicial system presses on with absurd trial of Oda TV journalists
  4. ^ Reporters without Borders, 14 March 2012, Four journalists released but fight goes on for dozens still held
  5. ^ Kenyon, Peter (2012-01-26). "For Turkish Journalists, Arrest Is A Real Danger". npr. Retrieved 2012-01-27.
  6. ^ "Two Investigative Journalists Threatened on Twitter". Reporters Without Borders. 2012-03-19. Retrieved 2012-06-04.
  7. ^ Marpet, Joshua (2011-12-21), "ODA-TV HDD#6" (PDF), DataDevastation Report, pp. 8–17, retrieved 2012-06-03
  8. ^ "TÜBİTAK says can't conclude if documents in OdaTV case sent via computer virus", Today's Zaman, 2012-08-27, retrieved 2012-10-18
  9. ^ "Anchors in Relative Time (ART)", Digital Forensics Magazine (27), May 2016
  10. ^ Fiscutean, Andrada (2016-08-22). "Turkish Journalist Jailed for Terrorism Was Framed, Forensics Report Shows". vice.
  11. ^ "Odatv - A Case Study in Digital Forensics and Sophisticated Evidence Tampering". Retrieved 2016-11-11.