FBI arrests distributors accused of selling An0m encrypted phones to crime groups

0
358
Oracle enhances customer experience platform with a B2B refresh

Source is ComputerWeekly.com

The FBI, working with overseas law enforcement officers have arrested eight people accused of suppling An0m encrypted phones to organised crime groups.

Their arrests follow joint police operations in 16 countries which resulted in over 500 arrests of criminals involved in drug trafficking, money laundering and violent crime.

Criminal gangs were unaware that the An0m phone network was controlled by the FBI and that police were able to read encrypted messages for at least 18 months.

Six law enforcement officials have also been arrested for tipping off criminal groups about police investigations.

Racketeering

The US is seeking the prosecution of a further nine individuals who are accused of knowingly selling An0m encrypted phones to organised crime groups.

An indictment published yesterday names 17 people accused of running an operation to supply phones and provide technical support to criminal gangs.

They are accused of racketeering and conspiracy, multiple offences of trafficking controlled substances and money laundering.

The phones were used to distribute illegal drugs to Australia, Asia, Europe, the United States and Canada and to launder money.

Administrators, agents and distributors named in the US legal document allegedly described the An0m phones to potential clients as “designed by criminals for criminals”.

The people named included Joseph Hakan Ayik, a Turkish citizen who is accused of influencing criminal associates to use the encrypted phones.

Australian law enforcement officials say that he was given access to an An0m phone by undercover agents. He went on to recommend the phones to other associates, unaware that they were controlled by the FBI.

Commissioner Reece Kershaw of the Australian Federal Police said yesterday that he was likely to be at risk from the criminals he supplied. “Given the threat probably he faces he’s best-off handing himself into us as soon as he can.”

According to the indictment, Joseph Hakan Ayik, Dominico Catanzariti, an Australian citizen and Maximilian Rivkin, a Swedish citizen, acted as administrators for the An0m network.

They were able to initiate new subscriptions to An0m, to remove accounts and had the ability to remotely wipe and reset devices to remove evidence of money laundering and drug crime.

The indictment names Erkan Yusef Dogan and Baris Tukel, Australians living in Turkey alongside Ayik and Rivkin, as “influencers” who encouraged the criminal underworld to use the encrypted devices.

They have “built a reputation for their knowledge and expertise in the hardened encrypted device field and use that power, knowledge and expertise” to influence others.

Distributors named

The indictment lists Abdelhakim Aharchaou and Seyyed Hossein Hosseini, both Dutch citizens, Alexander Dmitrienko, a Finish citizen living in Spain and Shane Geoffrey May, an Australian living in Indonesia as distributors of the phones.

Also named are Edwin Harmendra Kumar, an Australian, Omar Malik and Miwand Zakhimi, both citizens of the Netherlands, and Osemah Elhassen, an Australian living in Columbia.

According to the indictment, distributors and agents sold An0m devices and collected subscription fees based on a schedule for different geographic regions.

The fee in Europe was around €1,000 to €1,500 Euros $1,700 AUD in Australia, and $1,700 CAD for a six month subscription.

Phones sold for Bitcoin

Payments were made in Bitcoin and other cryptocurrencies to protect the users anonymity, and were laundered through shell companies to hide the proceeds.

The individuals allegedly targeted people who were involved in international drug trafficking, money laundering and other crimes.

They told customers that An0m was not subject to US law or the Patriot Act, to build up trust for An0m as a secure system for illegal activity.

The administrators, distributors and agents remained anonymous even from each other and their clients, communicating using a system of names and email handles.

They suspended the service to phones and remotely deleted their contents if they suspected law enforcement or an informant was using the device as part of an investigation.

Criminals are accused of selling more than 12,000 An0m encrypted devices and services to over 300 crime syndicates operating in over 100 countries.

The FBI, working with the Australian Federal Police, covertly harvested more than 27 million messages in near real time.

In one case a criminal group sent pictures showing hundreds of kilograms of cocaine hidden in shipments of pineapples and bananas. Another image showed drugs hidden in cans of tuna.

The FBI had access to copies of messages from the phones which were copied to a server based outside the USA.

The agency reviewed the messages for criminal activity and passed them on to other countries concerned to investigate.

Phantom Secure takedown

This investigation began after Canada-based encrypted device company Phantom Secure was dismantled by the FBI in 2018, forcing many criminals to seek alternative devices.

An0m became more popular after police shut down the EncroChat encrypted phone network in 2020,

In March 2021, a takedown operation into another encrypted phone network, Sky ECC, led to more criminals adopting An0m.

The An0m platform was also used by corrupt law enforcement officials to communicate with transnational criminal organizations.

They passed crime groups sensitive information and notify them of pending law enforcement action, said Suzanne Turner, FBI agent responsible for the San Diego Field Office yesterday.

“These crimes resulted in the arrest of six law enforcement officers yesterday and dozens of cases opened during the course of the investigation,” she said.

Source is ComputerWeekly.com

Vorig artikelTech Shakes Up the Supermarket
Volgend artikelPipeline Investigation Upends Idea That Bitcoin Is Untraceable