Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned July 27, 2021

<> Embed

@  Email

Report

Uploaded by user
The FBI’s phone for criminals included a custom version of Android
<> Embed @  Email Report

The FBI’s phone for criminals included a custom version of Android

The FBI operated an ‘encrypted’ chat app for organized criminals

Messages intercepted from the “Anom” platform spurred a global crime sting.

Saqib Shah
S. Shah
June 8th, 2021
The FBI's phone for criminals included a custom version of Android | DeviceDaily.com
Yuri Gripas / reuters

The FBI covertly ran an encrypted communications platform for years that allowed it to intercept 20 million messages from international criminal organizations. Hundreds of arrests have been made across 18 countries as part of the investigation known as Operation Trojan Shield. Suspects, including members of the Italian Mafia and outlaw motorcycle gangs, are among those that have been charged. Australian Police, who helped conceive the sting, have arrested 224 offenders and seized 3.7 tonnes of drugs and $44.9 million in cash and assets.

The crackdown was essentially borne out of the demise of a popular encrypted phone service, known as Phantom Secure, according to newly unsealed court documents. After that enterprise was shut down and its CEO arrested in 2018, the FBI used a “source” to peddle a new app, dubbed “Anom,” to criminal networks. Unknown to those who used the devices featuring the platform, the FBI had built a master key into its encryption system. This allowed agents to surreptitiously monitor each message and enabled them to decrypt and store messages as they were transmitted.

Over the following months, the app organically grew on the back of a “beta test” in Australia and the dismantling of two additional encryption phone enterprises, Encrochat and Sky Global. The FBI’s supply-side “source” used this window to distribute Anom devices to criminals who had used those now-defunct messaging channels. The phones grew in popularity within the underworld after high-profile criminals vouched for the app’s integrity, Australian Police noted.

“These criminal influencers put [law enforcement] in the back pocket of hundreds of alleged offenders,” Australian Federal Police commissioner Reece Kershaw said in a statement. “Essentially, they have handcuffed each other by endorsing and trusting AN0M and openly communicating on it – not knowing we were watching the entire time.”

Overall, law enforcement have catalogued the aforementioned 20 million messages from a total of 11,800 devices located in over 90 countries. Breaking down the surveillance process, the FBI said that phones outside of the US routed an encrypted BCC of the message to an “iBot” server. From there, it was decrypted from the encryption code and then immediately re-encrypted with FBI encryption code. The message was then routed to a second FBI-owned iBot server, where it was decrypted and its content made available for viewing.

Each Anom user was also assigned to a particular Jabber Identification (JID) by the FBI’s supply-side source or an Anom administrator. A JID is akin to a PIN in Blackberry Messenger, according to the documents, which describe it “as either a fixed, unique alphanumeric identification or, in the case of more recent devices, a combination of two English words.” Anom users were also able to select their own usernames and could change their list of usernames over time. As part of the operation, the FBI maintained a list of JIDs and corresponding screen names of Anom users.

In all, roughly 9,000 Anom devices are currently active in the wild. According to the FBI, it has identified over 300 transnational criminal organizations using the chat platform. The Australian Police, which helped intercept local messages, said the communications included alleged plots to kill, mass drug trafficking and gun distribution. Additional offenders include those linked to an Asian crime syndicate and Albanian organised crime. Meanwhile, New Zealand Police have made 35 arrests and seized $3.7 million in assets as part of their interlinked operation.

 

https://www.engadget.com/encrypted phonePixel 3athird-party firmwarePixel 4aobtainedFBI sold to crooks

(29)