>>9856399 LB
PART 2 OF 2
"Who was behind EncroChat? The identities of the people running EncroChat are currently unknown."
Oh, really? Alright.
"Leaked documents obtained by Motherboard revealed that EncroChat's phones were modified Android devices, many of them based on the BQ Aquaris X2 - an Android phone released in 2018 by a Spanish electronics company…
… Physical modifications to the devices also meant the camera, microphone, GPS transponder and USB port were removed.
Additionally, users could enter a PIN code which would immediately delete all of the messages on the device - as would happen in the event that wrong passwords were repeatedly entered.
These functions "apparently were specially developed to make it possible to quickly erase compromising messages, for example at the time of arrest by the police", according to Europol.
"In addition, the device could be erased from a distance by the reseller/helpdesk," the agency added."
"How did the authorities crack down on it?
The encrypted messaging system first came to the attention of the French Gendarmerie in 2017, which said it was regularly finding the phones when conducting operations against organised crime gangs.
They eventually discovered that EncroChat was operating from servers based in France and were eventually able "to put a technical device in place" which allowed them to access the encrypted messages sent over the company's network.
Although it isn't clear what this device was, it suggests the investigators were able to deploy some form of technical implant on the network rather than break the encryption protecting the messages in transit."
Further digs:
https://www.vice.com/en_us/article/3aza95/how-police-took-over-encrochat-hacked
"Only now is the astonishing scale of the operation coming into focus: It represents one of the largest law enforcement infiltrations of a communications network predominantly used by criminals ever, with Encrochat users spreading beyond Europe to the Middle East and elsewhere. French, Dutch, and other European agencies monitored and investigated "more than a hundred million encrypted messages" sent between Encrochat users in real time, leading to arrests in the UK, Norway, Sweden, France, and the Netherlands, a team of international law enforcement agencies announced Thursday."
Discussion of encrypted phones from 2017:
https://www.thedailybeast.com/meet-danny-the-guy-selling-encrypted-phones-to-organized-crime
http://www.eurojust.europa.eu/press/PressReleases/Pages/2020/2020-07-02b.aspx
EncroChat:
https://cointelegraph.com/news/authorities-take-down-biggest-criminal-chat-network-yet
Five Eyes enters the scene
"… This comes a week after a bill that, in essence, would ban end-to-end encryption was introduced to the Senate. The same issue was recently raised in the ministerial meeting of the nations that make up the “Five Eye” intelligence community — Australia, Canada, New Zealand, United Kingdom and United States:
“We discussed the vital importance of collaboration between governments and the digital industry to address concerns with end-to-end encryption where it impacts public safety and the lawful access to information necessary to prevent or investigate serious crimes.”
Taking this into consideration, it is possible that this bust is part of the coordinated campaign to discredit privacy-preserving technologies in the eyes of the general public. If this indeed is the case, then we would expect to see more similar announcements in the coming months."