{"id":61109,"date":"2023-12-04T11:16:10","date_gmt":"2023-12-04T02:16:10","guid":{"rendered":"https:\/\/monolith.law\/tr\/?p=61109"},"modified":"2024-03-15T17:36:39","modified_gmt":"2024-03-15T08:36:39","slug":"categories-of-cyber-crime","status":"publish","type":"post","link":"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime","title":{"rendered":"Siber su\u00e7lar\u0131n \u00fc\u00e7 s\u0131n\u0131fland\u0131rmas\u0131 nelerdir? Avukat her model i\u00e7in hasara kar\u015f\u0131 \u00f6nlemleri a\u00e7\u0131kl\u0131yor"},"content":{"rendered":"\n<p>&#8220;Siber su\u00e7&#8221; terimi, g\u00fcnl\u00fck dilde belirli bir yayg\u0131nl\u0131\u011fa sahip olmas\u0131na ra\u011fmen, uluslararas\u0131 d\u00fczeyde &#8220;bilgisayar teknolojisi ve elektronik ileti\u015fim teknolojilerinin k\u00f6t\u00fcye kullan\u0131lmas\u0131yla i\u015flenen su\u00e7lar&#8221; olarak tan\u0131mlanmaktad\u0131r. S\u00f6zde &#8220;hacking (cracking)&#8221; gibi baz\u0131 siber su\u00e7lar, \u015firketlerin de ma\u011fdur olabilece\u011fi su\u00e7lard\u0131r ve b\u00f6yle bir zarara u\u011frad\u0131\u011f\u0131nda, hangi \u00f6nlemlerin al\u0131nmas\u0131 gerekti\u011fi konusunda bir de\u011ferlendirme yap\u0131lmas\u0131 gerekmektedir.<\/p>\n\n\n\n<p>Bu makalede, siber su\u00e7lar\u0131 genel olarak, Japonya&#8217;da yayg\u0131n olarak kullan\u0131lan \u00fc\u00e7 modelle s\u0131n\u0131fland\u0131r\u0131yoruz ve her model i\u00e7in, hangi su\u00e7lara kar\u015f\u0131l\u0131k geldi\u011fi ve bir zarara u\u011fran\u0131ld\u0131\u011f\u0131nda hangi \u00f6nlemlerin al\u0131nabilece\u011fi hakk\u0131nda a\u00e7\u0131klamalar yap\u0131yoruz. Bu s\u0131n\u0131fland\u0131rman\u0131n neden \u00f6nemli oldu\u011funu sorarsan\u0131z,<\/p>\n\n\n\n<ul>\n<li>\u00d6ncelikle, &#8220;ma\u011fdur&#8221; kelimesinin hukuki anlam\u0131nda, bir su\u00e7 i\u015flendi\u011fini &#8220;bildirebiliriz&#8221; ancak, bir zarar raporu veya su\u00e7 duyurusu ile polisi soru\u015fturmaya te\u015fvik etmek zordur.<\/li>\n\n\n\n<li> Hukuki \u00f6nlemlerin bulundu\u011fu su\u00e7larda, polis soru\u015fturmas\u0131na bel ba\u011flamadan, bir avukata ba\u015fvurarak hukuki yollarla su\u00e7luyu belirleyebilir ve su\u00e7ludan tazminat talep edebiliriz.<\/li>\n\n\n\n<li> Kendinizin ma\u011fdur oldu\u011fu ve hukuki bir \u00e7\u00f6z\u00fcm\u00fcn olmad\u0131\u011f\u0131 su\u00e7larda, polis soru\u015fturmas\u0131n\u0131 te\u015fvik etmek durumunda kal\u0131rs\u0131n\u0131z.<\/li>\n<\/ul>\n\n\n\n<p>Yani, &#8220;\u00f6nlemler&#8221; her model i\u00e7in farkl\u0131d\u0131r.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Siber_Suclarin_3_Siniflandirmasi\" title=\"Siber Su\u00e7lar\u0131n 3 S\u0131n\u0131fland\u0131rmas\u0131\">Siber Su\u00e7lar\u0131n 3 S\u0131n\u0131fland\u0131rmas\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Bilgisayar_Suclari_Nedir\" title=\"Bilgisayar Su\u00e7lar\u0131 Nedir\">Bilgisayar Su\u00e7lar\u0131 Nedir<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Elektronik_Bilgisayar_Tahribati_ve_Isleri_Engelleme_Sucu_Nedir\" title=\"Elektronik Bilgisayar Tahribat\u0131 ve \u0130\u015fleri Engelleme Su\u00e7u Nedir?\">Elektronik Bilgisayar Tahribat\u0131 ve \u0130\u015fleri Engelleme Su\u00e7u Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Yasadisi_Erisim_ile_Farki_Nedir\" title=\"Yasad\u0131\u015f\u0131 Eri\u015fim ile Fark\u0131 Nedir?\">Yasad\u0131\u015f\u0131 Eri\u015fim ile Fark\u0131 Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Polis_Tarafindan_Sorusturmayi_Tesvik_Etmek_Icin\" title=\"Polis Taraf\u0131ndan Soru\u015fturmay\u0131 Te\u015fvik Etmek \u0130\u00e7in\">Polis Taraf\u0131ndan Soru\u015fturmay\u0131 Te\u015fvik Etmek \u0130\u00e7in<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Sivil_Cozum_Zor\" title=\"Sivil \u00c7\u00f6z\u00fcm Zor\">Sivil \u00c7\u00f6z\u00fcm Zor<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Ag_Kullanim_Suclari\" title=\"A\u011f Kullan\u0131m Su\u00e7lar\u0131\">A\u011f Kullan\u0131m Su\u00e7lar\u0131<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Internet_Uzerindeki_Iftira_ve_Hakaret_Zararlari\" title=\"\u0130nternet \u00dczerindeki \u0130ftira ve Hakaret Zararlar\u0131\">\u0130nternet \u00dczerindeki \u0130ftira ve Hakaret Zararlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#E-posta_vb_Tekli_Iletisim_Yoluyla_Olusan_Zararlar\" title=\"E-posta vb. Tekli \u0130leti\u015fim Yoluyla Olu\u015fan Zararlar\">E-posta vb. Tekli \u0130leti\u015fim Yoluyla Olu\u015fan Zararlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Mustehcen_Gorseller_veya_Yasadisi_Sitelerden_Kaynaklanan_Zararlar\" title=\" M\u00fcstehcen G\u00f6rseller veya Yasad\u0131\u015f\u0131 Sitelerden Kaynaklanan Zararlar\"> M\u00fcstehcen G\u00f6rseller veya Yasad\u0131\u015f\u0131 Sitelerden Kaynaklanan Zararlar<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Yasadisi_Erisim_Yasasinin_Ihlali\" title=\"Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n \u0130hlali\">Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n \u0130hlali<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Yasadisi_Erisim_Yasasinin_Yasakladigi_Eylemler\" title=\"Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n Yasaklad\u0131\u011f\u0131 Eylemler\">Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n Yasaklad\u0131\u011f\u0131 Eylemler<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/monolith.law\/tr\/it\/categories-of-cyber-crime\/#Polis_Tarafindan_Cozum\" title=\"Polis Taraf\u0131ndan \u00c7\u00f6z\u00fcm\">Polis Taraf\u0131ndan \u00c7\u00f6z\u00fcm<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Siber_Suclarin_3_Siniflandirmasi\"><\/span>Siber Su\u00e7lar\u0131n 3 S\u0131n\u0131fland\u0131rmas\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/categories-of-cyber-crime1-1024x683.jpg\" alt=\"\" class=\"wp-image-8068\" \/><figcaption class=\"wp-element-caption\">\u00dclkemizde genel kabul g\u00f6rm\u00fc\u015f s\u0131n\u0131fland\u0131rmaya g\u00f6re, siber su\u00e7lar \u00fc\u00e7 t\u00fcre ayr\u0131l\u0131r.<\/figcaption><\/figure>\n\n\n\n<p>Yukar\u0131da belirtildi\u011fi gibi, \u00fclkemizde siber su\u00e7lar\u0131n genellikle \u00fc\u00e7e ayr\u0131ld\u0131\u011f\u0131 kabul edilir.<\/p>\n\n\n\n<ul>\n<li>Bilgisayar Su\u00e7lar\u0131: Kesin tan\u0131m\u0131n\u0131 daha sonra a\u00e7\u0131klayaca\u011f\u0131z ancak k\u0131saca, \u015firketlerin i\u015fleyi\u015fini engelleyen su\u00e7 eylemleri<\/li>\n\n\n\n<li> A\u011f Kullan\u0131m Su\u00e7lar\u0131: \u0130nternetin k\u00f6t\u00fcye kullan\u0131lmas\u0131 sonucu i\u015flenen su\u00e7lar<\/li>\n\n\n\n<li> Japon Haks\u0131z Eri\u015fim Yasas\u0131 \u0130hlali: Yani haks\u0131z giri\u015f eylemleri gibi<\/li>\n<\/ul>\n\n\n\n<p>A\u015fa\u011f\u0131da, her birini tek tek a\u00e7\u0131kl\u0131yoruz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bilgisayar_Suclari_Nedir\"><\/span>Bilgisayar Su\u00e7lar\u0131 Nedir<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Elektronik_Bilgisayar_Tahribati_ve_Isleri_Engelleme_Sucu_Nedir\"><\/span>Elektronik Bilgisayar Tahribat\u0131 ve \u0130\u015fleri Engelleme Su\u00e7u Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Ceza Kanunu&#8217;nda belirlenen, elektronik bilgisayar tahribat\u0131 ve i\u015fleri engelleme su\u00e7u, bu t\u00fcr su\u00e7lar\u0131n tipik bir \u00f6rne\u011fidir.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Bir ki\u015finin i\u015flerini y\u00fcr\u00fctmek i\u00e7in kulland\u0131\u011f\u0131 elektronik bilgisayar\u0131 veya bu ama\u00e7la kullan\u0131lan manyetik kay\u0131tlar\u0131 tahrip eden, ya da i\u015flerini y\u00fcr\u00fctmek i\u00e7in kulland\u0131\u011f\u0131 elektronik bilgisayara yan\u0131lt\u0131c\u0131 bilgiler veya hatal\u0131 talimatlar veren, ya da ba\u015fka bir y\u00f6ntemle, elektronik bilgisayar\u0131n kullan\u0131m amac\u0131na uygun hareket etmesini engelleyen veya kullan\u0131m amac\u0131na ayk\u0131r\u0131 hareket etmesini sa\u011flayan ve b\u00f6ylece bir ki\u015finin i\u015flerini engelleyen ki\u015fi, 5 y\u0131la kadar hapis veya 1 milyon yen (yakla\u015f\u0131k 9.000 dolar) alt\u0131nda para cezas\u0131na \u00e7arpt\u0131r\u0131l\u0131r.<br><\/p>\n<cite>Ceza Kanunu Madde 224\/2<\/cite><\/blockquote>\n\n\n\n<p>Bu metin biraz karma\u015f\u0131k olabilir, ancak \u00f6zetle,<\/p>\n\n\n\n<ul>\n<li>\u0130\u015f i\u00e7in kullan\u0131lan bir PC&#8217;yi veya i\u00e7indeki verileri tahrip etmek<\/li>\n\n\n\n<li> \u0130\u015f i\u00e7in kullan\u0131lan bir PC&#8217;ye yan\u0131lt\u0131c\u0131 bilgiler veya beklenmeyen bilgiler g\u00f6ndermek<\/li>\n<\/ul>\n\n\n\n<p>gibi y\u00f6ntemlerle, ilgili PC&#8217;nin beklenmeyen bir i\u015flem yapmas\u0131n\u0131 sa\u011flayarak i\u015fleri engelledi\u011finizde bu su\u00e7 olu\u015fur.<\/p>\n\n\n\n<p>Bu su\u00e7un tipik \u00f6rnekleri, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanmak, ba\u015fkalar\u0131n\u0131n hesaplar\u0131na izinsiz giri\u015f yapmak gibi eylemlerle, online banka hesap bakiyelerini art\u0131rmakt\u0131r. Ayn\u0131 \u015fekilde, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanmak veya giri\u015f bilgilerini izinsiz elde etmek suretiyle, bir \u015firketin web sitesini de\u011fi\u015ftirmek de bu su\u00e7a girer. &#8220;\u0130zinsiz giri\u015f yapma&#8221; eylemi, a\u015fa\u011f\u0131da bahsedilecek olan &#8220;\u0130zinsiz Eri\u015fim Yasas\u0131 \u0130hlali&#8221; su\u00e7 tipine girer, ancak bu su\u00e7 tipi, izinsiz i\u015flemler, de\u011fi\u015fiklikler, silmeler, veri de\u011fi\u015fiklikleri gibi eylemleri kapsar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Yasadisi_Erisim_ile_Farki_Nedir\"><\/span>Yasad\u0131\u015f\u0131 Eri\u015fim ile Fark\u0131 Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Ve bu t\u00fcr su\u00e7lar, mutlaka yasad\u0131\u015f\u0131 giri\u015f eylemlerinin yer almas\u0131na gerek olmadan da ger\u00e7ekle\u015febilir. \u00d6rne\u011fin, tipik bir durum, s\u00f6zde DoS sald\u0131r\u0131s\u0131d\u0131r. B\u00fcy\u00fck miktarda e-posta g\u00f6ndererek e-posta sunucusunda sorunlara neden olmak veya bir web sitesine b\u00fcy\u00fck miktarda eri\u015fim yaparak web sunucusunda sorunlara neden olmak gibi durumlar s\u00f6z konusudur. Bu eylemler, tek tek e-postalar veya eri\u015fimler bak\u0131ld\u0131\u011f\u0131nda yasald\u0131r, ancak b\u00fcy\u00fck miktarda ger\u00e7ekle\u015ftirildi\u011finde sunucu (PC) beklenmeyen i\u015flemler yapar ve ilgili \u015firkete e-posta kullan\u0131lamaz, web sitesi a\u00e7\u0131lamaz gibi zararlar verir. Dolay\u0131s\u0131yla, &#8220;Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131 \u0130hlal Etmiyor, ancak Bilgisayar Tahribat\u0131 ve \u0130\u015fleri Engelleme Su\u00e7u&#8217;na giriyor&#8221; anlam\u0131na gelir. Ayr\u0131ca, bu t\u00fcr su\u00e7larda, Doland\u0131r\u0131c\u0131l\u0131kla \u0130\u015fleri Engelleme Su\u00e7u da sorun olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Polis_Tarafindan_Sorusturmayi_Tesvik_Etmek_Icin\"><\/span>Polis Taraf\u0131ndan Soru\u015fturmay\u0131 Te\u015fvik Etmek \u0130\u00e7in<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/categories-of-cyber-crime2-1024x680.jpg\" alt=\"\" class=\"wp-image-8069\" \/><figcaption class=\"wp-element-caption\">Bilgisayar su\u00e7lar\u0131n\u0131n ma\u011fdurlar\u0131, su\u00e7lular\u0131n polis taraf\u0131ndan tutuklanmas\u0131n\u0131 nas\u0131l sa\u011flar?<\/figcaption><\/figure>\n\n\n\n<p>Bu eylemler, yukar\u0131da belirtildi\u011fi gibi su\u00e7tur ve ayr\u0131ca ilgili \u015firketin ma\u011fduru oldu\u011fu durumlard\u0131r, bu nedenle polis taraf\u0131ndan soru\u015fturma talep etmek m\u00fcmk\u00fcnd\u00fcr. Ancak, ger\u00e7ekten de, Japon polisinin bu t\u00fcr su\u00e7lara kar\u015f\u0131 hareketi iyi de\u011fildir. Bu, teknik sorunlara da ba\u011fl\u0131d\u0131r. \u00d6rne\u011fin, yukar\u0131da basit bir DoS sald\u0131r\u0131s\u0131ndan bahsettik, ancak ger\u00e7ek sald\u0131r\u0131lar genellikle basit bir \u015fekilde, tek bir IP adresinden bir milyon e-posta veya eri\u015fim de\u011fil, bir\u00e7ok IP adresinden, yani sald\u0131r\u0131 kayna\u011f\u0131n\u0131n da\u011f\u0131t\u0131ld\u0131\u011f\u0131 durumlard\u0131r. Bu t\u00fcr sald\u0131r\u0131lara &#8220;DDoS&#8221; denir.<\/p>\n\n\n\n<p>E\u011fer ayn\u0131 IP adresinden \u00e7ok say\u0131da e-posta veya eri\u015fim ger\u00e7ekle\u015fmi\u015fse, bu ayn\u0131 ki\u015fi taraf\u0131ndan yap\u0131lan \u00e7ok say\u0131da eri\u015fimdir ve &#8220;beklenmeyen bilgi&#8221; oldu\u011fu a\u00e7\u0131kt\u0131r. Ancak IP adresleri da\u011f\u0131t\u0131lm\u0131\u015fsa, her bir e-posta veya eri\u015fim kendi ba\u015f\u0131na yasald\u0131r, bu nedenle bunlar\u0131n ayn\u0131 ki\u015fi taraf\u0131ndan yap\u0131ld\u0131\u011f\u0131na dair bir kan\u0131t olmad\u0131k\u00e7a, yasad\u0131\u015f\u0131 bilgi g\u00f6nderimi oldu\u011funu s\u00f6yleyemeyiz. Peki, &#8220;ayn\u0131 ki\u015fi taraf\u0131ndan \u00e7ok say\u0131da e-posta veya eri\u015fim&#8221; oldu\u011funu, s\u0131k\u0131 bir ceza davas\u0131 alt\u0131nda nas\u0131l kan\u0131tlayabiliriz? Bu, polis ve savc\u0131l\u0131k i\u00e7in ger\u00e7ekten zor bir sorundur.<\/p>\n\n\n\n<p>Ayr\u0131ca, ceza davalar\u0131nda, &#8220;su\u00e7 te\u015fkil eden ileti\u015fim (\u00f6rne\u011fin yukar\u0131daki \u00f6rnekte \u00e7ok say\u0131da e-posta g\u00f6nderme) \u015f\u00fcphelinin sahip oldu\u011fu PC&#8217;den yap\u0131ld\u0131&#8221; demek yeterli de\u011fildir. Ceza davalar\u0131nda gereken, &#8220;hangi PC&#8217;den&#8221; de\u011fil, &#8220;kimin eliyle&#8221; oldu\u011fu seviyesindeki bir ger\u00e7ek tespitidir. Ger\u00e7ekten de, ceza davalar\u0131n\u0131n kararlar\u0131nda, bu b\u00f6l\u00fcm, yani &#8220;su\u00e7 eylemi kesinlikle \u015f\u00fcphelinin PC&#8217;sinden yap\u0131ld\u0131, ancak ger\u00e7ekten \u015f\u00fcphelinin kendisinin eliyle mi yap\u0131ld\u0131&#8221; b\u00f6l\u00fcm\u00fcn\u00fcn incelemesini dikkatlice yapanlar az de\u011fildir. Bu t\u00fcr kan\u0131tlama engelleri, tabii ki &#8220;masumiyetin korunmas\u0131&#8221; anlam\u0131nda \u00f6nemlidir, ancak polis ve savc\u0131l\u0131\u011f\u0131, siber su\u00e7lar\u0131n soru\u015fturmas\u0131n\u0131 teredd\u00fct ettiren bir neden olabilir.<\/p>\n\n\n\n<p>Ancak, olay\u0131n meydana gelmesinden hemen sonra, sunucu loglar\u0131n\u0131 vb. ayr\u0131nt\u0131l\u0131 bir \u015fekilde analiz ederek, &#8220;ayn\u0131 ki\u015fi taraf\u0131ndan yap\u0131ld\u0131\u011f\u0131 olas\u0131l\u0131\u011f\u0131 son derece y\u00fcksek&#8221; ve &#8220;ve bu kesinlikle \u015f\u00fcphelinin kendisi taraf\u0131ndan yap\u0131lan bir \u015fey&#8221; gibi kan\u0131tlar\u0131 ortaya \u00e7\u0131karabiliriz. IT teknolojisi ile yap\u0131lan ara\u015ft\u0131rma ve bu ara\u015ft\u0131rman\u0131n hukuki olarak anlaml\u0131 belgelere d\u00f6k\u00fclmesi. Bu iki \u015fey bir araya geldi\u011finde, polis taraf\u0131ndan soru\u015fturmay\u0131 te\u015fvik edebilecek durumlar da olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Sivil_Cozum_Zor\"><\/span>Sivil \u00c7\u00f6z\u00fcm Zor<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Polise ba\u015fvurmadan sivil bir \u00e7\u00f6z\u00fcm bulunabilseydi iyi olurdu, ancak bu t\u00fcr su\u00e7larla ilgili olarak, d\u00fcr\u00fcst olmak gerekirse, sivil \u00f6nlemler yetersizdir.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, b\u00fcy\u00fck miktarda e-posta g\u00f6nderildi\u011fi durumlarda, e-postalar\u0131n (i\u00e7erisindeki e-posta ba\u015fl\u0131klar\u0131n\u0131n) g\u00f6nderenin IP adresini i\u00e7erdi\u011fi i\u00e7in, bu IP adresini kullanan abonenin adresini ve ad\u0131n\u0131 sa\u011flay\u0131c\u0131dan a\u00e7\u0131klamas\u0131n\u0131 istersiniz. Ancak, Japon Sivil Hukuku&#8217;nda (Japon ~ Sivil Hukuku), bu bilgilerin yasal olarak talep edilme hakk\u0131 bulunmamaktad\u0131r. \u0130nternet \u00fczerindeki iftira ve hakaret ma\u011fduriyetleri gibi durumlarda, \u0130nternet Servis Sa\u011flay\u0131c\u0131 Sorumluluk S\u0131n\u0131rlama Yasas\u0131 (Japon ~ \u0130nternet Servis Sa\u011flay\u0131c\u0131 Sorumluluk S\u0131n\u0131rlama Yasas\u0131) kapsam\u0131nda g\u00f6nderen bilgilerini talep etme hakk\u0131n\u0131 kullanabilirsiniz, ancak k\u0131saca, bu talep hakk\u0131 sadece,<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\">Genel halk\u0131n g\u00f6rebilece\u011fi bir yay\u0131n yapmak i\u00e7in ileti\u015fim (tipik olarak, genel halka a\u00e7\u0131k internet forumlar\u0131na hakaret ve iftira i\u00e7eren mesajlar g\u00f6ndermek i\u00e7in kullan\u0131lan ileti\u015fim)<\/p>\n\n\n\n<p>hakk\u0131nda kabul edilmi\u015ftir.<\/p>\n\n\n\n<p>Ger\u00e7ekten de, karma\u015f\u0131k siber su\u00e7 durumlar\u0131nda, polisin soru\u015fturma yapmas\u0131n\u0131 te\u015fvik etmek i\u00e7in genellikle bir dava a\u00e7maktan daha ayr\u0131nt\u0131l\u0131 raporlar gereklidir. Ayr\u0131ca, polise ilk ba\u015fvurudan ger\u00e7ek soru\u015fturma veya tutuklamaya kadar ge\u00e7en s\u00fcre genellikle bir y\u0131l gibi bir s\u00fcre alabilir. Asl\u0131nda, sivil \u00e7\u00f6z\u00fcm\u00fcn daha az zaman alaca\u011f\u0131 ve daha az emek gerektirece\u011fi durumlar da olabilir&#8230; Ancak, bu t\u00fcr su\u00e7lar genellikle sivil \u00e7\u00f6z\u00fcm\u00fcn imkans\u0131z veya \u00e7ok zor oldu\u011fu durumlard\u0131r. Su\u00e7luyu belirleyebilirseniz, \u00f6rne\u011fin web sunucusunda bir sorun olu\u015fmas\u0131 nedeniyle olu\u015fan zararlar i\u00e7in tazminat talep edebilirsiniz, ancak bunun i\u00e7in belirli bir y\u00f6ntem bulunmamaktad\u0131r.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/corporate\/denial-of-service-attack-dos\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/corporate\/denial-of-service-attack-dos[ja]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ag_Kullanim_Suclari\"><\/span>A\u011f Kullan\u0131m Su\u00e7lar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Internet_Uzerindeki_Iftira_ve_Hakaret_Zararlari\"><\/span>\u0130nternet \u00dczerindeki \u0130ftira ve Hakaret Zararlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/categories-of-cyber-crime3-1024x684.jpg\" alt=\"\" class=\"wp-image-8070\" \/><figcaption class=\"wp-element-caption\">\u0130tibar zarar\u0131 da bir siber su\u00e7tur.<\/figcaption><\/figure>\n\n\n\n<p>Bilgisayar su\u00e7lar\u0131ndan farkl\u0131 olarak, bu su\u00e7lar PC veya a\u011flar\u0131 bir ara\u00e7 olarak kullan\u0131r. \u00d6rne\u011fin, internet \u00fczerindeki iftira ve hakaretler, verileri bozmaz, beklenmeyen bilgiler g\u00f6ndermez veya PC&#8217;ye beklenmeyen i\u015flemler yapt\u0131rmaz, ancak internet a\u011f\u0131 kullan\u0131larak ger\u00e7ekle\u015ftirilir.<\/p>\n\n\n\n<p>\u0130ftira ve hakaret i\u00e7eren g\u00f6nderiler \u015fu \u015fekilde s\u0131n\u0131fland\u0131r\u0131l\u0131r:<\/p>\n\n\n\n<ul>\n<li>Hem cezai hem de hukuki olarak yasad\u0131\u015f\u0131 olanlar (tipik \u00f6rnek, itibar zedeleme)<\/li>\n\n\n\n<li>Cezai olarak yasad\u0131\u015f\u0131 olmayan ancak hukuki olarak yasad\u0131\u015f\u0131 olanlar (tipik olarak gizlilik ihlali veya portre haklar\u0131 ihlali)<\/li>\n<\/ul>\n\n\n\n<p>E\u011fer hem cezai hem de hukuki olarak yasad\u0131\u015f\u0131ysa, hukuki yollarla, \u0130nternet Servis Sa\u011flay\u0131c\u0131 Sorumluluk S\u0131n\u0131rlama Yasas\u0131 (Japon ~) \u00fczerinden g\u00f6nderici bilgilerini a\u00e7\u0131\u011fa \u00e7\u0131karmay\u0131 hedefleyebilir veya polisi ara\u015ft\u0131rmay\u0131 te\u015fvik ederek g\u00f6ndericiyi tutuklatma gibi eylemler ger\u00e7ekle\u015ftirebilirsiniz.<\/p>\n\n\n\n<p>Ancak, i\u00e7eri\u011fe ba\u011fl\u0131 olarak, polis genellikle bu t\u00fcr g\u00f6nderilere kar\u015f\u0131 &#8220;sivil m\u00fcdahale&#8221; olarak adland\u0131r\u0131lan bir tutum sergiler ve bu nedenle bu t\u00fcr g\u00f6nderilere kar\u015f\u0131 \u00e7ok aktif bir ara\u015ft\u0131rma yapmaz. Ayr\u0131ca, gizlilik ihlali veya portre haklar\u0131 ihlali ceza hukuku kapsam\u0131nda bir su\u00e7 olmad\u0131\u011f\u0131ndan, hukuki bir \u00e7\u00f6z\u00fcm gereklidir.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/practices\/reputation\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/practices\/reputation[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"E-posta_vb_Tekli_Iletisim_Yoluyla_Olusan_Zararlar\"><\/span>E-posta vb. Tekli \u0130leti\u015fim Yoluyla Olu\u015fan Zararlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/categories-of-cyber-crime5-1024x683.jpg\" alt=\"\" class=\"wp-image-8071\" \/><figcaption class=\"wp-element-caption\">E-posta g\u00f6nderenin hukuki olarak belirlenmesi \u00e7ok zordur.<\/figcaption><\/figure>\n\n\n\n<p>Zor olan, e-posta veya Twitter DM gibi tekli ileti\u015fim ara\u00e7lar\u0131 kullan\u0131larak yap\u0131lan uygunsuz mesaj g\u00f6nderme eylemleridir. \u00d6rne\u011fin, tehdit veya \u015fantaj su\u00e7una denk gelen bir e-posta. \u0130nternet Servis Sa\u011flay\u0131c\u0131 Sorumluluk S\u0131n\u0131rlama Yasas\u0131 (Japon ~) \u00fczerinden g\u00f6nderici bilgilerini a\u00e7\u0131\u011fa \u00e7\u0131karma talebi, yukar\u0131da belirtildi\u011fi gibi, sadece<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Belirsiz bir\u00e7ok ki\u015finin g\u00f6rmesi i\u00e7in yap\u0131lan g\u00f6nderiler (tipik olarak, belirsiz bir\u00e7ok ki\u015fiye a\u00e7\u0131k olan internet forumlar\u0131na hakaret i\u00e7eren mesajlar g\u00f6ndermek i\u00e7in)<\/p>\n<\/blockquote>\n\n\n\n<p>durumunda kullan\u0131labilir. Bu nedenle, bu t\u00fcr ileti\u015fimlerle ilgili olarak, ba\u015ftan hukuki bir \u00e7\u00f6z\u00fcm bulunmamaktad\u0131r ve polis soru\u015fturmas\u0131n\u0131 beklemekten ba\u015fka \u00e7are yoktur. Ancak, internet forumlar\u0131na yaz\u0131lan itibar zedeleyici i\u00e7erikler bile, tekli ileti\u015fim ara\u00e7lar\u0131 kullan\u0131ld\u0131\u011f\u0131nda, itibar zedeleme su\u00e7u olu\u015fmaz. K\u0131sacas\u0131, itibar zedeleme su\u00e7u, belirsiz veya \u00e7ok say\u0131da ki\u015fiye y\u00f6nelik eylemlerle ilgili olarak olu\u015fur. Tekli ileti\u015fim ara\u00e7lar\u0131yla, itibar zedeleme genellikle olu\u015fmaz. Bu t\u00fcr sorunlar hakk\u0131nda ayr\u0131nt\u0131l\u0131 bir a\u00e7\u0131klama ba\u015fka bir makalede bulunmaktad\u0131r.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/email-sender-identification\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/email-sender-identification[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Mustehcen_Gorseller_veya_Yasadisi_Sitelerden_Kaynaklanan_Zararlar\"><\/span> M\u00fcstehcen G\u00f6rseller veya Yasad\u0131\u015f\u0131 Sitelerden Kaynaklanan Zararlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Dahas\u0131, ma\u011fduru olmayan veya ger\u00e7ekte zarar g\u00f6ren \u015firketlerin ma\u011fdur olmad\u0131\u011f\u0131 su\u00e7lar da bu t\u00fcrde dahildir. \u00d6rne\u011fin,<\/p>\n\n\n\n<ul>\n<li>Yeti\u015fkin sitelerinde sans\u00fcrs\u00fcz resimler veya videolar\u0131n yay\u0131nlanmas\u0131 (m\u00fcstehcen g\u00f6rsellerin a\u00e7\u0131k\u00e7a sergilenmesi)<\/li>\n\n\n\n<li>Yasad\u0131\u015f\u0131 kumar sitelerinin reklam\u0131<\/li>\n\n\n\n<li>Marka \u00fcr\u00fcnlerin sat\u0131\u015f\u0131n\u0131 vaat edip asl\u0131nda \u00fcr\u00fcn g\u00f6ndermeyen doland\u0131r\u0131c\u0131l\u0131k siteleri<\/li>\n<\/ul>\n\n\n\n<p>gibi durumlar s\u00f6z konusudur.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, bir \u015firketin kad\u0131nlar tuvaletinde gizli \u00e7ekim yap\u0131ld\u0131 ve gizli \u00e7ekim g\u00f6r\u00fcnt\u00fcleri internete y\u00fcklendi. Bu g\u00f6r\u00fcnt\u00fcler a\u00e7\u0131k\u00e7a belirli bir kad\u0131n\u0131n gizlilik ihlaline (veya portre haklar\u0131 ihlaline) denk gelir, ancak gizlilik ihlali (veya portre haklar\u0131 ihlali) bir su\u00e7 olmad\u0131\u011f\u0131 gibi, gizli \u00e7ekim eylemi bir su\u00e7 olsa bile, gizli \u00e7ekimle \u00e7ekilen foto\u011fraflar\u0131n yay\u0131nlanmas\u0131 hemen bir su\u00e7 olmaz. Bu nedenle, polisten nas\u0131l bir soru\u015fturma talep edilece\u011fi zor bir sorun haline gelir.<\/p>\n\n\n\n<p>Dahas\u0131, yasad\u0131\u015f\u0131 kumar sitelerinin veya doland\u0131r\u0131c\u0131l\u0131k sitelerinin varl\u0131\u011f\u0131 nedeniyle, \u015firketin sat\u0131\u015flar\u0131 d\u00fc\u015fer veya \u015firketin itibar\u0131 d\u00fc\u015ferse, yukar\u0131da belirtilen eylemler, belirli bir ma\u011fdur olmamas\u0131na ra\u011fmen toplum i\u00e7in su\u00e7 olarak kabul edilenler (tipik olarak h\u0131z ihlali veya uyu\u015fturucu d\u00fczenlemeleri gibi) veya do\u011frudan ma\u011fdurlar\u0131 (\u00f6rne\u011fin, belirli doland\u0131r\u0131c\u0131l\u0131k sitesine para \u00f6deyen t\u00fcketiciler) olanlar\u0131 i\u00e7erir. Bu nedenle, bir \u015firket zarar\u0131n\u0131 dile getirse bile, bu sadece ma\u011fdur olmayan bir \u00fc\u00e7\u00fcnc\u00fc taraf\u0131n bildirimi olur. Ayr\u0131ca, &#8220;ma\u011fdur&#8221; olmad\u0131\u011f\u0131ndan, g\u00f6nderici bilgilerini a\u00e7\u0131\u011fa \u00e7\u0131karma talebi gibi belirlemeler, ba\u015ftan kabul edilemez.<\/p>\n\n\n\n<p>Ancak, sahte marka \u00fcr\u00fcnlerin sat\u0131\u015f\u0131 gibi, \u015firketin sahip oldu\u011fu fikri m\u00fclkiyet haklar\u0131n\u0131 (ticari marka haklar\u0131, telif haklar\u0131 vb.) ihlal eden eylemler s\u00f6z konusu oldu\u011funda, \u015firket &#8220;ma\u011fdur&#8221; olarak polis soru\u015fturmas\u0131n\u0131 te\u015fvik edebilir veya hukuki yollarla sat\u0131c\u0131n\u0131n belirlenmesini hedefleyebilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Yasadisi_Erisim_Yasasinin_Ihlali\"><\/span>Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n \u0130hlali<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Yasadisi_Erisim_Yasasinin_Yasakladigi_Eylemler\"><\/span>Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131n\u0131n Yasaklad\u0131\u011f\u0131 Eylemler<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Son olarak, Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131 taraf\u0131ndan yasaklanan eylemlerden bahsedelim. Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131,<\/p>\n\n\n\n<ol>\n<li>Yasad\u0131\u015f\u0131 eri\u015fim eylemleri<\/li>\n\n\n\n<li> Yasad\u0131\u015f\u0131 eri\u015fimi te\u015fvik eden eylemler<\/li>\n\n\n\n<li> Yasad\u0131\u015f\u0131 elde etme ve benzeri eylemler<\/li>\n<\/ol>\n\n\n\n<p>olmak \u00fczere \u00fc\u00e7 t\u00fcr eylemi yasaklar.<\/p>\n\n\n\n<p>Bunlardan ilki olan yasad\u0131\u015f\u0131 eri\u015fim eylemleri genel olarak iki t\u00fcrd\u00fcr:<\/p>\n\n\n\n<ul>\n<li>Taklit eylemleri: Ba\u015fkas\u0131n\u0131n ID&#8217;sini veya \u015fifresini girerek izinsiz bir \u015fekilde o ki\u015fi olarak giri\u015f yapma eylemi<\/li>\n\n\n\n<li> G\u00fcvenlik a\u00e7\u0131\u011f\u0131 sald\u0131r\u0131lar\u0131: G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 k\u00f6t\u00fcye kullanarak, ID veya \u015fifre giri\u015fi gerektirmeden ba\u015fkas\u0131 olarak giri\u015f yapma eylemi<\/li>\n<\/ul>\n\n\n\n<p>\u0130kinci t\u00fcr, yasad\u0131\u015f\u0131 eri\u015fimi te\u015fvik eden eylemler, ba\u015fkas\u0131n\u0131n hesap bilgilerini (ID, \u015fifre vb.) izinsiz bir \u015fekilde ba\u015fkalar\u0131na anlatma veya satma eylemidir.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/categories-of-cyber-crime6-1024x683.jpg\" alt=\"\" class=\"wp-image-8072\" \/><figcaption class=\"wp-element-caption\">\u015eifre h\u0131rs\u0131zl\u0131\u011f\u0131 gibi durumlar bu t\u00fcr eylemlere \u00f6rnektir.<\/figcaption><\/figure>\n\n\n\n<p>Son olarak, \u00fc\u00e7\u00fcnc\u00fc t\u00fcr olan yasad\u0131\u015f\u0131 elde etme ve benzeri eylemler, ba\u015fkas\u0131n\u0131n hesab\u0131n\u0131, \u00f6rne\u011fin bir phishing sitesi gibi ara\u00e7larla giri\u015f yapmaya zorlama veya bu \u015fekilde yasad\u0131\u015f\u0131 elde edilen hesap bilgilerini saklama eylemidir.<\/p>\n\n\n\n<p>Yasad\u0131\u015f\u0131 Eri\u015fim Yasas\u0131 hakk\u0131nda ayr\u0131nt\u0131l\u0131 bir a\u00e7\u0131klama a\u015fa\u011f\u0131daki makalede bulunabilir.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/unauthorized-computer-access\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/unauthorized-computer-access[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Polis_Tarafindan_Cozum\"><\/span>Polis Taraf\u0131ndan \u00c7\u00f6z\u00fcm<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Yasad\u0131\u015f\u0131 eri\u015fim sonucu zarar g\u00f6renlerin de polise ba\u015fvurarak soru\u015fturma ba\u015flatmalar\u0131 gerekmektedir. Ancak, teknik olarak \u00e7ok karma\u015f\u0131k durumlarla kar\u015f\u0131la\u015f\u0131ld\u0131\u011f\u0131ndan, yukar\u0131da bahsedilen bilgisayar su\u00e7lar\u0131 durumunda oldu\u011fu gibi, hem IT hem de hukuk bilgisine sahip ki\u015filerin raporlar haz\u0131rlamas\u0131 gerekmektedir. Aksi takdirde, polis soru\u015fturmas\u0131 pratikte pek ger\u00e7ekle\u015fmez.<\/p>\n\n\n\n<p>Ayr\u0131ca, su\u00e7luyu belirleyebilirsek, ilgili su\u00e7luya kar\u015f\u0131 tazminat talebinde bulunabiliriz. Ancak, su\u00e7luyu sivil yollarla belirlemek de, yukar\u0131da bahsedilen bilgisayar su\u00e7lar\u0131 durumunda oldu\u011fu gibi, olduk\u00e7a zordur.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Siber su\u00e7&#8221; terimi, g\u00fcnl\u00fck dilde belirli bir yayg\u0131nl\u0131\u011fa sahip olmas\u0131na ra\u011fmen, uluslararas\u0131 d\u00fczeyde &#8220;bilgisayar teknolojisi ve elektronik ileti\u015fim teknolojilerinin k\u00f6t\u00fcye kullan\u0131lmas [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":63686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[35,19],"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/61109"}],"collection":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/comments?post=61109"}],"version-history":[{"count":3,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/61109\/revisions"}],"predecessor-version":[{"id":63687,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/61109\/revisions\/63687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/media\/63686"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/media?parent=61109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/categories?post=61109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/tags?post=61109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}