#crimephones
Explore tagged Tumblr posts
mostlysignssomeportents · 5 months ago
Text
Joseph Cox’s “Dark Wire”
Tumblr media
NEXT WEEKEND (June 7–9), I'm in AMHERST, NEW YORK to keynote the 25th Annual Media Ecology Association Convention and accept the Neil Postman Award for Career Achievement in Public Intellectual Activity.
Tumblr media
No one was better positioned to tell the tale of the largest sting operation in world history than veteran tech reporter Joseph Cox, and tell it he did, in Dark Wire, released today:
https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691/
Cox – who was one of Motherboard's star cybersecurity reporters before leaving to co-found 404 Media – has spent years on the crimephone beat, tracking vendors who sold modded phones (first Blackberries, then Android phones) to criminal syndicates with the promise that they couldn't be wiretapped by law-enforcement.
It's possible that some of these phones were secure over long timescales, but all the ones we know about are ones that law enforcement eventually caught up with, usually by capturing the company's top founders explicitly stating that the phones were sold to assist in the commission of crimes, and admitting to remote-wiping phones to obstruct law-enforcement options. It's hard to prove intent but it gets a lot easier when the criminal puts that intent into writing (that's true of tech executives, too!):
https://pluralistic.net/2023/09/03/big-tech-cant-stop-telling-on-itself/
But after a particularly spectacular bust landed one of the top crimephone sales reps in the FBI's power, they got a genuinely weird idea: why not start their own crimephone company?
The plan was to build an incredibly secure, best-of-breed crimephone, one with every feature that a criminal would want to truly insulate themselves from law enforcement while still offering everything a criminal could need to plan and execute crimes.
They would tap into the network of crimephone distributors around the world, not telling them who they were truly selling for – nor that every one of these phones had a back-door that allowed law-enforcement to access every single message, photo and file.
This is the beginning of an incredible tale that is really two incredible tales. The first is the story of the FBI and its partners as they scaled up Anom, their best-of-breed crimephone business. This is a (nearly) classic startup tale, full of all-nighters, heroic battles against the odds, and the terror and exhilaration of "hockey-stick" growth.
The difference between this startup and the others we're already familiar with is obvious: the FBI and its global partners are acting under a totally different set of constraints to normal startup founders. For one thing, their true mission and identity must be kept totally secret. For another, they have to navigate the bureaucratic barriers of not one, but many governments and their courts, constitutions and procedures.
Finally, there are the stakes: while the bulk of the crimes that the FBI targets with Anom are just the usual futile war-on-drugs nonsense (albeit at a never-before seen scale), they also routinely encounter murders, kidnappings, tortures, firebombings, and other serious crimes, either in the planning phase, or after they have been committed. They have to make moment-to-moment calls about when and whether to do something about these, as each action taken based on intercepts from Anom threatens to tip the FBI's hand.
That's one of the startup stories in Cox's book. The other one is the crime startup, the one that the hapless criminal syndicates that sign up to distribute Anom devices find themselves in the middle of. They, too, are experiencing hockey-stick growth. They, too, have a fantastically lucrative tiger by the tail. And they, too, have a unique set of challenges that make this startup different from any other.
The obvious difference is that they are involved in global criminal conspiracies. They have to both grow and remain hidden. The tradecraft and skullduggery are fascinating, in the manner of any great crime procedural tale. But there's another constraint: these criminals are competing with one another to corner the market on these incredibly lucrative phones. Being part of violent, global criminal conspiracies, they don't confine themselves to the normal Silicon Valley crimes of violating antitrust law – they are engaged in all-out warfare.
These two startups are, of course, the same startup, but only one side knows it. As Cox weaves these two tales together – along with glimpses into the lives of the hapless gig-work developers in Asia who are developing and maintaining the Anom platform – we get front seat in a series of high-speed, high-stakes near-collisions between these two groups.
And it's not always the cops who have the advantage. When an ambitious mobster figures out how to clone the "black boxes" that initialize new Anom phones, the FBI are caught flatfooted as the number of Anom devices in the hands of criminals balloons, producing a volume of intercepts that vastly exceeds their processing capacity.
Cox has been on this story for a decade, and it shows. He has impeccable sourcing and encyclopedic access to the court records and other public details that allow him to reproduce many of the most dramatic scenes in the Anom caper verbatim. This really shines in the final section of the book, when the FBI and its partners decide to roll up the company with a series of global arrests that culminate in a triumphant press-conference in which the true masters of Anom are revealed.
As a privacy and encryption advocate, there were moments in this story that made me a little uncomfortable. There are places where the FBI is chafing at the constitutional limits on its surveillance powers where we can't help buy sympathize with these "good guys" going after "bad guys." But this the the FBI, a lawless, unaccountable secret police who routinely bypass those limits by secretly buying data from sleazy data-brokers, or illegally sharing data with the NSA.
The conclusion really hammers home the point that the FBI's problem isn't constitutional niceties. Despite seizing hundreds of tons of illegal drugs and arresting thousands of high-ranking criminal syndicate bosses, Anom made no difference in the drug trade. Prohibition, after all, just makes criminals more wealthy and powerful. The Anom raids were, at worst, the cost of doing business – and at best, they were a global reset that cleared the board of established actors so that other criminals could seize their turf.
But even though Anom didn't triumph over crime, Dark Wire is a triumph. The book's out today, and there will shortly be a Netflix adaptation based on it, directed by Jason Bateman:
https://deadline.com/2022/09/jason-bateman-netflix-21-laps-dark-wire-surveillance-gangs-movie-1235130444/
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/06/04/anom-nom-nom/the-call-is-coming-from-inside-the-ndrangheta
132 notes · View notes
anxi0us-0p0ssum · 1 year ago
Text
All the Leverage crews use a special thief phone with custom OS coded by Hardison with all the scanning tools and surveillance countermeasures he can cram into it. There is a manual they have to read and they have to pass a test before Hardison will give them one.
Sophie barely remembers she has a smartphone most of the time. She only uses it when she has to actually call someone.
Eliot always has at least two backup phones because his tend to get smashed. They just appear in his car’s glove box or on his entryway table because Hardison knows when the phones fail and he tells Parker to replace them.
Hardison thinks that Parker thinks she’s had the same phone for years, but Hardison has been surreptitiously updating and upgrading hardware in the same case for years because it’s easier than arguing with her. Parker knows every time he does something to her phone, but doesn’t argue about it anymore.
Harry has gotten several lectures about trying to use CrimePhone apps on his iPhone. He lost CrimePhone privileges and had to sit through a lecture and retake the test to get it back when he tried to download TikTok on it. Now he carries it everywhere and answers it if it rings, but otherwise he doesn’t touch it unless they’re working a job.
Breanna took the phone and spent the next three months “optimizing” it before Hardison caught her. About 1/3 of her modifications are now standard across all the Leverage International CrimePhones. Another 1/3 are strictly reserved for other hackers in Leverage Int. Parker made Hardison install the taser mod on her phone and she and Breanna are the only ones who have it.
I just noticed Leverage Redemption has a season 2 when I watched Good Omens last week, and I got to say I love the attention to detail in the first scene. The reporter using an iPhone and Hardison using some kind of android phone is reflective of their characters rather than just behind the scenes licensing stuff. Hardison is a linux and android boy, and his phone probably runs a build that isn't even super common.
79 notes · View notes
mostlysignssomeportents · 1 year ago
Text
This day in history
Tumblr media
Today (May 22), I’m keynoting Public Knowledge’s Emerging Tech conference in DC.
Tomorrow (May 23), I’ll be in TORONTO for a book launch for Red Team Blues that’s part of WEPFest, a benefit for the West End Phoenix, onstage with Dave Bidini (The Rheostatics), Ron Diebert (Citizen Lab) and the whistleblower Dr Nancy Olivieri.
Tumblr media
#20yrsago Dear Hollywood: neener neener neener https://web.archive.org/web/20030524173415/http://www.instapundit.com/archives/009672.php
#20yrsago EFF on Total Info Awareness https://web.archive.org/web/20030528233343/https://www.eff.org/Privacy/TIA/20030523_tia_report_review.php
#15yrsago Villagers from three continents will confront Chevron execs at annual meeting https://web.archive.org/web/20080520120807/https://www.chevrontoxico.com/
#10yrsago How London cops use social media to spy on protest movements https://www.itnews.com.au/news/police-tap-social-media-in-wake-of-london-attack-344319
#10yrsago Vermont passes anti-patent-troll law https://www.cbc.ca/news/business/vermont-enacts-1st-u-s-law-against-patent-trolling-1.1372639
#10yrsago RIAA losing money, firing employees, giving execs raises https://torrentfreak.com/riaa-makes-drastic-employee-cuts-as-revenue-plummets-130522/
#10yrsago Forging £1 coins is apparently profitable https://www.bbc.com/news/uk-england-london-22612487
#5yrsago 500,000 home routers have been infected with VPNFilter, malware that steals data and bricks devices https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/
#5yrsago The FBI’s mountain of uncrackable crimephones was nearly entirely imaginary https://www.emptywheel.net/2018/05/23/did-the-fbi-have-a-chance-to-fix-their-lies-about-encryption-in-2016/
#5yrsago A free internet is a configurable internet https://www.oreilly.com/content/cory-doctorow-on-the-fight-for-a-configurable-and-free-internet/
#5yrsago The Democratic candidate for the Georgia governorship is a Black woman running on an “unapologetic progressive” platform https://web.archive.org/web/20180523065423/https://politics.myajc.com/news/state--regional-govt--politics/georgia-election-stacey-abrams-wins-democratic-primary/eNWNZU440VRD1tQsZ0XY2K/
#5yrsago A hard look at the wastefulness of “proof of work,” the idea at the core of the blockchain https://davidgerard.co.uk/blockchain/2018/05/22/bitcoins-stupendous-power-waste-is-green-apparently-bad-excuses-for-proof-of-work/
#5yrsago Charlie Stross on the “soft genocide” of eugenics-tainted, alt-right climate dystopia https://www.antipope.org/charlie/blog-static/2018/05/happy-21st-century.html
#5yrsago The Computer History Museum just published the sourcecode for Eudora https://computerhistory.org/blog/the-eudora-email-client-source-code/
#5yrsago The company that made Grenfell Tower’s flammable, poisonous insulation used dangerous lies to make hundreds of sales https://www.independent.co.uk/news/uk/home-news/grenfell-tower-fire-latest-inquiry-london-cladding-building-safety-uk-celotex-a8362186.html
#5yrsago Court rules that Trump can’t block people on Twitter https://www.eff.org/press/releases/victory-first-amendment-court-rules-government-officials-who-tweet-public-cant-block
#1yrsago SPACs were hugely successful (for banks) https://pluralistic.net/2022/05/23/you-got-spacced/#the-house-always-wins
Tumblr media
Catch me on tour with Red Team Blues in DC, Toronto, Oxford, Hay, Manchester, Nottingham, London, and Berlin!
Tumblr media Tumblr media
4 notes · View notes
mostlysignssomeportents · 5 years ago
Text
#1yrago The FBI's mountain of uncrackable crimephones was nearly entirely imaginary
Tumblr media
The FBI has been trying to ban working cryptography since the Clinton years, a losing battle whose stakes go up with each passing day as the number of devices that depend on working crypto to secure them and their users goes up and up and up.
The FBI has been working on Congress to help them out with legislation that would ban tech companies from selling products with working crypto. To make the case for this, the Bureau likes to cite statistics about how many uncrackable criminals' phones they have seized and thus how many crimes remain unsolved because of the stubborn intransigence of nerds who refuse to simply NERD HARDER and make a crypto that works 100% of the time, except when the FBI needs it to fail.
Two years ago, the FBI was complaining that it had 880 unbreakable crimephones. Then, last year, the number shot up to 7,775. The Electronic Frontier Foundation filed a Freedom of Information Act request asking how the FBI had come up with this figure, and today the FBI sheepishly admitted to the Washington Post that it had made it up. The "real number" is now thought to be between 1,000 and 2,000 (maybe).
Marcy Wheeler has covered this story for a long time, and her play-by-play is a great backgrounder.
https://boingboing.net/2018/05/23/crimephone-inflation.html
24 notes · View notes
mostlysignssomeportents · 6 years ago
Text
The FBI's mountain of uncrackable crimephones was nearly entirely imaginary
Tumblr media
The FBI has been trying to ban working cryptography since the Clinton years, a losing battle whose stakes go up with each passing day as the number of devices that depend on working crypto to secure them and their users goes up and up and up.
The FBI has been working on Congress to help them out with legislation that would ban tech companies from selling products with working crypto. To make the case for this, the Bureau likes to cite statistics about how many uncrackable criminals' phones they have seized and thus how many crimes remain unsolved because of the stubborn intransigence of nerds who refuse to simply NERD HARDER and make a crypto that works 100% of the time, except when the FBI needs it to fail.
Two years ago, the FBI was complaining that it had 880 unbreakable crimephones. Then, last year, the number shot up to 7,775. The Electronic Frontier Foundation filed a Freedom of Information Act request asking how the FBI had come up with this figure, and today the FBI sheepishly admitted to the Washington Post that it had made it up. The "real number" is now thought to be between 1,000 and 2,000 (maybe).
Marcy Wheeler has covered this story for a long time, and her play-by-play is a great backgrounder.
https://boingboing.net/2018/05/23/crimephone-inflation.html
36 notes · View notes