Joseph Cox, Senior Staff Writer at Motherboard and expert in investigative journalism, dives into the realm of encrypted phones. He discusses the challenges users face with privacy on popular devices and explores the rise of Phantom Secure, which marketed phones to criminals. The conversation highlights the balance between privacy and ethical dilemmas arising from their use. Cox also examines law enforcement's controversial operations against encrypted services like EncroChat and the implications for user privacy and security in our digital age.
Privacy-focused phone options are lacking in the market despite the demand for secure communication devices.
The case of Phantom Secure demonstrates the challenges faced by law enforcement in investigating criminals who use encrypted communication devices.
Supply chain attacks and implementation flaws have allowed law enforcement to infiltrate encrypted phone networks and gather incriminating evidence.
Deep dives
Lack of Privacy in Mobile Phones
The podcast episode discusses the lack of privacy and security in popular mobile phones, such as Google's Android and Apple's iPhone. Both these operating systems collect extensive amounts of user data, violating privacy policies. The host expresses frustration over the absence of privacy-focused phone options in the market, despite the growing demand for secure communication devices. The episode highlights the ongoing battle for privacy and the risks posed by data collection and tracking by both marketing companies and malicious adversaries.
Phantom Secure: A Case of Selling to Criminals
The episode explores the case of Phantom Secure, an encrypted phone company that knowingly sold devices to criminals to facilitate their illegal activities. Unlike traditional smartphones, Phantom Secure phones were modified to remove features such as microphones, GPS, and cameras. The company's servers were used to remotely wipe data on their devices to obstruct law enforcement investigations. The founder of Phantom Secure, Vince Ramos, was arrested and sentenced to nine years in prison under racketeering charges. This case highlights the challenges faced by law enforcement in investigating criminals who use encrypted communication devices.
Supply Chain Attacks and Implementation Flaws
The episode discusses supply chain attacks and implementation flaws in encrypted phone companies. It highlights the case of Sky ECC, where fake devices with malicious apps were introduced into the market, allowing law enforcement to intercept and collect messages from unsuspecting users. Another example is Ennetcom, where Dutch police gained access to the server and decrypted millions of messages due to an implementation issue. These incidents showcase the evolving tactics and capabilities of law enforcement in infiltrating networks and collecting evidence from criminals using encrypted communication devices.
EncroChat: An Innovative Cryptophone Company
EncroChat was a new and cryptophone company that emerged in 2016. Unlike its predecessor, Phantom Secure, EncroChat focused on more than just email, offering a platform for instant messaging with robust security features. The devices were mainly distributed in Europe and the UK and began to draw attention from law enforcement agencies due to their association with criminal activities such as drug trafficking and assassination plots. The French police employed a highly controversial strategy to infiltrate EncroChat by gaining access to one of its servers and pushing a malicious update to users' devices, allowing them to intercept and collect millions of chat messages.
Anom: The FBI's Undercover Operation
Anom, an apparently secure and encrypted phone company, turned out to be an undercover operation orchestrated by the FBI. Operating under the codename Operation Trojan Shield, the FBI teamed up with Australian law enforcement to create a surveillance network using Anom devices, collecting millions of messages. While the extent of arrests resulting from this operation remains unknown, it highlights the extensive efforts law enforcement is willing to undertake to infiltrate encrypted phone networks, even creating their own shady phone company to gather incriminating evidence.
Joseph Cox (https://twitter.com/josephfcox), Senior Staff Writer at Motherboard (https://www.vice.com/en/topic/motherboard), joins us to talk about the world of encrypted phones.
Books
Affiliate links to books:
The Smart Girl’s Guide to Privacy: https://www.amazon.com/gp/product/1593276486/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1593276486&linkCode=as2&tag=tunn01-20&linkId=0a8ee2ca846534f77626757288d77e00
Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.
Support for this show comes from Ping Identity, champions of identity for the global enterprise. Give your users a loveable login solution. Visit www.pingidentity.com/.
View all active sponsors.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode