The Ankara Chief Public Prosecutor’s Office launched a critical Signal operation targeting the FETÖ/PDY armed terrorist organization. As a result of meticulous work carried out by the National Intelligence Organization (MIT), the secret communication networks of members of the organization were deciphered.
Who is involved in the Signal operation?
Simultaneous raids were conducted in five different provinces on the orders of the Chief Public Prosecutor’s Office. Detention warrants were issued for a total of 19 suspects, and the institutions where the names on the list worked drew attention. Among the suspects were two employees of TÜBİTAK, one of ASELSAN, one of Türk Telekom, and one of the Turkish Energy, Nuclear and Mining Research Council (TENMAK).

The MIT Directorate obtained this critical information by examining the digital materials of a previously captured member of the organization. Expert teams managed to decrypt the encryption on the seized devices using specialized methods. This revealed the full details of the organizational correspondence conducted through the application.
Under normal circumstances, Signal doesn’t store messages on its servers thanks to its end-to-end encryption protocol. However, this latest development proves that digital forensics analysis of physically seized devices can yield results. The investigation is being furthered and continues by teams from the Ankara Provincial Police Department.
So, what are your thoughts on the Signal operation? Share your thoughts with us in the comments!

