Odatv

odatv.com
Format online news
Founded 2007
Political alignment Kemalism, Secularism, Left-wing nationalism
Language Turkish
Website www.odatv.com

odatv.com is a Turkish news website. It was founded in 2007 by Soner Yalçın and Cüneyt Özdemir; Özdemir soon left after a difference of opinion.[1] It was described in 2012 by the Committee to Protect Journalists as "an ultranationalist website harshly critical of the government".[2] Since early 2011 it is the centre of the Odatv case of the Ergenekon trials, with Odatv accused of being the "media arm" of the Ergenekon organization. Eight of its journalists are under indictment in connection with the case, which Reporters without Borders has called "absurd".[3]

Ergenekon case

In February 2011, odatv's offices were raided and some of its staff arrested (including owner Soner Yalçın and executive editor Barış Pehlivan as well as news co-ordinator Doğan Yurdakul, journalist Barış Terkoğlu and others) and accused of links with the Ergenekon organization.[1] Odatv columnists Muhammet Sait Çakır, Coşkun Musluk and Müyesser Uğur were also charged.[4]

Digital documents linking to the Ergenekon conspiracy are the basis of the case against Barış Terkoğlu, Ahmet Şık, Nedim Şener and the other detainees in the OdaTV case.[5][6] Examinations of the documents conducted by computer experts at Boğaziçi University, Yıldız Technical University, Middle East Technical University, and the American data processing company DataDevastation have refuted the validity of the documents, concluding that outside sources targeted the journalists' computers. Rare and malicious computer viruses, including Autorun-BJ and Win32:Malware-gen, allowed the placement of the documents to go unnoticed by the defendants.[7] Another judicial report prepared by the governmental agency TÜBİTAK also confirmed the infection by malicious viruses but could not confirm or reject any outside intervention.[8]

Digital forensics company Arsenal Consulting examined the OdaTV evidence and found that while the malware on Barış Pehlivan's OdaTV computer was much more interesting than known prior to Arsenal’s involvement (e.g. the Ahtapot remote access trojan never seen before “in the wild”), it was not responsible for delivery of the incriminating documents. The “Anchors in Relative Time”[9] analysis technique was used to reveal a series of local (physical access) and remote (across the Internet) attacks against his computer. The final two local attacks (on the evenings of February 9 and 11, 2011) resulted in delivery of the incriminating documents to his computer, just prior to its seizure by the Turkish National Police. Arsenal’s work has been covered by Motherboard[10] and a detailed case study[11] is under ongoing development.

References

This article is issued from Wikipedia - version of the 11/11/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.