Encrochat busted by NCA
Discussion
Murph7355 said:
La Liga said:
I don't want to set them off, but a security priority for Brexit is retaining (if possible) the same relationship with and access to Europol (along with the relevant databases).
Set who off?I voted Leave and think this would be eminently sensible too.
Isn't our intelligence and security service capability well regarded globally too?
It's one part of the on-going negotiation that I hope we manage to pull off.
Having been reading a few bits and pieces about it, I am already being remarketed to by one of the would be successors! Omerta Digital which says it is based in Dundee... and makes "fully encrypted, anti surveillance, security hardened smartphones for privacy concerned individuals & businesses"
Murph7355 said:
Set who off?
I voted Leave and think this would be eminently sensible too.
Isn't our intelligence and security service capability well regarded globally too?
agreed - lets make this thread about Brexit crowd are out todayI voted Leave and think this would be eminently sensible too.
Isn't our intelligence and security service capability well regarded globally too?
its not like Great Britain security services never helped anyone or got help before 1973 is it ? If my history serves me correctly we were very active in europe between 1939 and 1945. I have read loads of stories about our security services being heavily involved with the US during the 'cold war' and i dont think the US a European country.
The only reason the sharing of information will stop is because people like Barnier et al will do it out of spite - never forget that the security of europe and the world will be potentially put at risk by unelected morons like him.
Mannginger said:
The article literally says they knew they'd been compromised:
It could still have been somebody on the inside who enabled it - by the sounds of it the chat servers were compromised, and presumably they pushed a new version of the software which dumped the stored messages out somehow. An insider could have created a weakness to enable the hacking, or assisted in hiding it.Article said:
On 13 June EncroChat realised the platform had been penetrated and sent a message to its users urging them to throw away their handsets.
Given the extreme risks to that person it seems less likely than the security services simply hacking their own way in though.
Earthdweller said:
I’m firmly in the camp of not telling the enemy everything
Some things are better left unsaid
There are mechanisms to protect the methods and the source available in the legal system
I wonder whether it’s another case if politics getting in the way of effective policing
Politicians wanting a “big” success to crow about
It seems this was all kept quite until it was all over. Now all of the users seem to have moved off, due to being aware, the NCA has shared some details. This is a really important part of police work. It reassures the public, and lets the criminals know they are not safe, both because the police now have a big list of users who they can look in to and also because they got in and disrupted the system for three months without being noticed. It will reduce criminals confidence that they are safe.Some things are better left unsaid
There are mechanisms to protect the methods and the source available in the legal system
I wonder whether it’s another case if politics getting in the way of effective policing
Politicians wanting a “big” success to crow about
rxe said:
Problem is, just as in music piracy, every attack makes you stronger. The next system won't have "servers" to attack, will be far more distributed, and much easier to refute your involvement with.
It's difficult to refute it when you have one in your possession. They exist for one reason and one reason only despite the waffle on the sellers website. This will then put the owner under the microscope.A bit like Laser jammers - Not illegal to own per se but everyone knows why you got it !!
I think for any smart criminal it would be best to assume that every method of communication is compromised so go back to old school methods of using dual meanings and code words.
The article mentions that 90% of the French users were criminals but that still leaves 10% which surely have had their data violated in contravention of GDPR?
Looks like they would have been better off just using a distribution non centralised app that has end to end encryption.
The article mentions that 90% of the French users were criminals but that still leaves 10% which surely have had their data violated in contravention of GDPR?
Looks like they would have been better off just using a distribution non centralised app that has end to end encryption.
JPJPJP said:
Having been reading a few bits and pieces about it, I am already being remarketed to by one of the would be successors! Omerta Digital which says it is based in Dundee... and makes "fully encrypted, anti surveillance, security hardened smartphones for privacy concerned individuals & businesses"
Do the handsets come with a free peh?I was really pleased to read this in the news earlier. The police can get quite a bit of criticism at times but I'm chuffed to see them taking out organised crime in such a big way like this. It almost feels like all the income tax I pay is actually toward towards something worthwhile.
JPJPJP said:
I already found it striking how many people were detained and drug labs were rolled up this past month her in the NL. Now we know why.
I am quite surprised that this business, which is they say "The National Crime Agency (NCA) told Sky News that the company itself has not been accused of criminal activity" therefore a legit business can just have its domain name hijacked and then deploy malware on a private network.
Does that mean they can do the same the next time they have an iPhone they want to get into? Sorry Apple, we are taking your domain name.
Don't get me wrong, it's great that a load of scumbags have been caught, but it just doesn't sit right how they went about it. Is that really legal?
Does that mean they can do the same the next time they have an iPhone they want to get into? Sorry Apple, we are taking your domain name.
Don't get me wrong, it's great that a load of scumbags have been caught, but it just doesn't sit right how they went about it. Is that really legal?
andyb28 said:
I am quite surprised that this business, which is they say "The National Crime Agency (NCA) told Sky News that the company itself has not been accused of criminal activity" therefore a legit business can just have its domain name hijacked and then deploy malware on a private network.
Does that mean they can do the same the next time they have an iPhone they want to get into? Sorry Apple, we are taking your domain name.
Don't get me wrong, it's great that a load of scumbags have been caught, but it just doesn't sit right how they went about it. Is that really legal?
Doesn't bother me Does that mean they can do the same the next time they have an iPhone they want to get into? Sorry Apple, we are taking your domain name.
Don't get me wrong, it's great that a load of scumbags have been caught, but it just doesn't sit right how they went about it. Is that really legal?
Condi said:
untakenname said:
The article mentions that 90% of the French users were criminals but that still leaves 10% which surely have had their data violated in contravention of GDPR?
GDPR still allows for law enforcement to use data legitimately. Gassing Station | News, Politics & Economics | Top of Page | What's New | My Stuff