Encrochat busted by NCA

Author
Discussion

pip t

1,365 posts

167 months

Thursday 2nd July 2020
quotequote all
I've never quite understood the point of these services like 'Encrochat' these days.

End to end encrypted messaging services are widely available in the public realm (Signal, Wickr, even bloody WhatsApp) plus pretty highly secured consumer handsets.

Buy payg SIM card with cash. Buy iPhone, or Android if you know how to set it up securely, with cash. Set up without attaching it to any of your 'real name' accounts or services. Ensure you use a decent alphanumeric passcode on your handset. Ensure you don't have iCloud backup turned on. Or Google Drive back up. Hey presto, one pretty anonymous and protected phone, with e2e messaging. Without getting involved with specialist encrypted services, being a customer of which I'd have thought is a pretty big red flag.

Edited by pip t on Thursday 2nd July 23:38

98elise

26,572 posts

161 months

Friday 3rd July 2020
quotequote all
Earthdweller said:
I’m firmly in the camp of not telling the enemy everything

Some things are better left unsaid

There are mechanisms to protect the methods and the source available in the legal system

I wonder whether it’s another case if politics getting in the way of effective policing

Politicians wanting a “big” success to crow about
When the trials start it's the evidence will show that they were able to read their communications. No point trying to hide methods that will become public

If you really believe it's political, then the big news is the raids and the arrests. People like watching police battering doors down and arresting crooks. Intelligence stuff is not glamorous.

I suspect any intelligence methods that won't be exposed the trail, will remain "unsaid". The intelligence services are not stupid. You may even find they are using the press to misdirect the public (and the "enemy") about their methods.

Pothole

34,367 posts

282 months

Friday 3rd July 2020
quotequote all
pip t said:
I've never quite understood the point of these services like 'Encrochat' these days.

End to end encrypted messaging services are widely available in the public realm (Signal, Wickr, even bloody WhatsApp) plus pretty highly secured consumer handsets.

Buy payg SIM card with cash. Buy iPhone, or Android if you know how to set it up securely, with cash. Set up without attaching it to any of your 'real name' accounts or services. Ensure you use a decent alphanumeric passcode on your handset. Ensure you don't have iCloud backup turned on. Or Google Drive back up. Hey presto, one pretty anonymous and protected phone, with e2e messaging. Without getting involved with specialist encrypted services, being a customer of which I'd have thought is a pretty big red flag.

Edited by pip t on Thursday 2nd July 23:38
OCG members don't have a great rep for being clever.

Taita

7,603 posts

203 months

Friday 3rd July 2020
quotequote all
Pothole said:
pip t said:
I've never quite understood the point of these services like 'Encrochat' these days.

End to end encrypted messaging services are widely available in the public realm (Signal, Wickr, even bloody WhatsApp) plus pretty highly secured consumer handsets.

Buy payg SIM card with cash. Buy iPhone, or Android if you know how to set it up securely, with cash. Set up without attaching it to any of your 'real name' accounts or services. Ensure you use a decent alphanumeric passcode on your handset. Ensure you don't have iCloud backup turned on. Or Google Drive back up. Hey presto, one pretty anonymous and protected phone, with e2e messaging. Without getting involved with specialist encrypted services, being a customer of which I'd have thought is a pretty big red flag.

Edited by pip t on Thursday 2nd July 23:38
OCG members don't have a great rep for being clever.
The ones who get caught aren't no :P

Evanivitch

20,075 posts

122 months

Friday 3rd July 2020
quotequote all
pip t said:
I've never quite understood the point of these services like 'Encrochat' these days.
It had additional features, like the ability to clear messages from devices after a set time period, and an e-purge facility to remove all the information immediately.

Also, whilst WhatsApp has been increasingly rigid in its position, as does face constant pressure from UK Government to introduce back door access to the software.

Big Rig

8,852 posts

187 months

Friday 3rd July 2020
quotequote all
Fascinating subject hacking, can anyone explain how they actually did it?

Carl_Manchester

12,196 posts

262 months

Friday 3rd July 2020
quotequote all
GDPR does not apply to you if you are a Esher/Chislehurst Drug Lord kingpin with £5m in cash lying in the bedroom of a council estate terrace house.

My understanding of imessage and whatsapp is even though the messages can’t be handed over to the police a) the phone numbers, location and usernames of source and destination of said messages are i.e if you are in a whatsapp group all the members can be identified b) andriod/iphone handsets can be more easily compromised.

These Encrochat handsets operate more like military hardware, designed to conseal and hide to a much higher level. You don’t know the source, the destination or the location and even if you find one during a drugs raid,
compromising one is much harder. That’s why in the end, the security compromise/hack came from the server side and not the device end.








Murph7355

37,711 posts

256 months

Friday 3rd July 2020
quotequote all
Big Rig said:
Fascinating subject hacking, can anyone explain how they actually did it?
Sent am email to Joe Lag at Pentonville Rd along the lines of "Dear Lag, I'm Mr Umboogoo and I have a business proposition...." or "This is Lloyds Bank. We have important information about the ill gotten gains in your account. Please open the attached spreadsheet/link". Joe Lag does as he's told in the email, plod get his account details. Job jobbed.

Or plod find Joe Lag's phone, turn it on and use 'password1234' et voila.

Modern crypto is very difficult to break if the people implementing are careful. The biggest vulnerabilities are the idiots using the system.

anonymous-user

Original Poster:

54 months

Friday 3rd July 2020
quotequote all
untakenname said:
Condi said:
untakenname said:
The article mentions that 90% of the French users were criminals but that still leaves 10% which surely have had their data violated in contravention of GDPR?
GDPR still allows for law enforcement to use data legitimately.
I'm not sure it does, using the similar reasoning then if people on the same ISP (say BT or Virgin for example) look at something dodgy does that give the crime agency the right to intercept and look through all the users of the ISP's data?
Under the IPA the innocent 10% you're referring to are termed collateral intrusion. The act allows this data to be obtained along with the naughty 90% as long as it's necessary and proportionate to what you're trying to achieve. Any data obtained under collateral intrusion must not be acted upon but must be stored for disclosure in the appropriate secure way. In essence, if your data is collected as collateral intrusion then it ends up in an incredibly secure data base held by a law agency where noting is done with it when it would previously be held on a less secure data base by the service provider.

In the case of the encrochat and the amount of cash, drugs and weapons seized it's certainly proportionate.


clio007

542 posts

225 months

Friday 3rd July 2020
quotequote all
pip t said:
I've never quite understood the point of these services like 'Encrochat' these days.

End to end encrypted messaging services are widely available in the public realm (Signal, Wickr, even bloody WhatsApp) plus pretty highly secured consumer handsets.

Buy payg SIM card with cash. Buy iPhone, or Android if you know how to set it up securely, with cash. Set up without attaching it to any of your 'real name' accounts or services. Ensure you use a decent alphanumeric passcode on your handset. Ensure you don't have iCloud backup turned on. Or Google Drive back up. Hey presto, one pretty anonymous and protected phone, with e2e messaging. Without getting involved with specialist encrypted services, being a customer of which I'd have thought is a pretty big red flag.

Edited by pip t on Thursday 2nd July 23:38
You think its about buying a phone with cash and not entering your real name when logging into your apple accountlaughlaugh

The Police can find out all mobile phones at your address quite easily without them being registered to you. They will know all of the local high level criminals, where they live etc. Thats just basic intelligence.


rxe

6,700 posts

103 months

Friday 3rd July 2020
quotequote all
clio007 said:
You think its about buying a phone with cash and not entering your real name when logging into your apple accountlaughlaugh

The Police can find out all mobile phones at your address quite easily without them being registered to you. They will know all of the local high level criminals, where they live etc. Thats just basic intelligence.
But they have to prove it and that's the challenge.

Systems like Encrochat will not work like ordinary phones. You don't get a message from 0745402040. You get a message from #45m5489-0 - which doesn't resolve to an identity the police can use. You know that this user id is Fred, but anyone casually looking at the phone doesn't know this. The plod know it is your phone, they know it is at the address, but they can't see message history on it, and they can't (normally) "see" the data because it is encrypted. The crim can't be busted for refusing to decrypt because they can decrypt .... and there's nothing there.

You could do the whole thing in software using an app like Signal, which seems pretty robust. It is open source, so you can review the code that is going onto your machine if you have the skills to do so. You remain vulnerable to your endpoint (Fred) saving all his messages and/or working for the police. If I was going to do this, I'd take a version of Signal. modify it to delete on read (enforced), and do whatever I could to make it a closed network for my "gang". If I wanted to be much more secure (proper paranoia level), I'd make it work over bluetooth and make sure local gangs had some physical point that they all passed every week. You wouldn't need the mobile network at that point.


pip t

1,365 posts

167 months

Friday 3rd July 2020
quotequote all
clio007 said:
You think its about buying a phone with cash and not entering your real name when logging into your apple accountlaughlaugh

The Police can find out all mobile phones at your address quite easily without them being registered to you. They will know all of the local high level criminals, where they live etc. Thats just basic intelligence.
That's a fairly gross over simplification of what I said (Which was actually an oversimplification in itself I admit). Indeed, if you just do those two things, there will be little problem in tracing you. However, with judicious use of software, being extremely careful about how you set it up (including what network connections you use to set it up), being extremely careful where you use it, and over what connections, I'd maintain it's possible to get close to an EncroChat type setup without using that kind of service.

rxe said:
But they have to prove it and that's the challenge.

Systems like Encrochat will not work like ordinary phones. You don't get a message from 0745402040. You get a message from #45m5489-0 - which doesn't resolve to an identity the police can use. You know that this user id is Fred, but anyone casually looking at the phone doesn't know this. The plod know it is your phone, they know it is at the address, but they can't see message history on it, and they can't (normally) "see" the data because it is encrypted. The crim can't be busted for refusing to decrypt because they can decrypt .... and there's nothing there.
However if somebody has been competent and disciplined in the set up and use of '0745402040' that can potentially lead to the same kind of dead end as '#45m5489-0.'

rxe said:
You could do the whole thing in software using an app like Signal, which seems pretty robust. It is open source, so you can review the code that is going onto your machine if you have the skills to do so. You remain vulnerable to your endpoint (Fred) saving all his messages and/or working for the police. If I was going to do this, I'd take a version of Signal. modify it to delete on read (enforced), and do whatever I could to make it a closed network for my "gang". If I wanted to be much more secure (proper paranoia level), I'd make it work over bluetooth and make sure local gangs had some physical point that they all passed every week. You wouldn't need the mobile network at that point.
This is my point really. With care and competence it's perfectly possible to set up something with a similar level of protection as a service like EncroChat, without actually becoming a customer of something that may arouse suspicion.

Reading your post of course does lead me to realising the point of the commercial services like EncroChat is that it takes away some of the risk of compromise through the incompetence or sheer laziness of the user. You remove the possibility of someone accidentally turning on or using a software feature that will compromise you on a 'normal' consumer handset.

Perfectly summed up here:

Murph7355 said:
Modern crypto is very difficult to break if the people implementing are careful. The biggest vulnerabilities are the idiots using the system.
EncroChat and the like remove the 'idiot' vulnerability as far as that's possible.

Cheburator mk2

2,991 posts

199 months

Friday 3rd July 2020
quotequote all
Carl_Manchester said:
GDPR does not apply to you if you are a Esher/Chislehurst Drug Lord kingpin with £5m in cash lying in the bedroom of a council estate terrace house.
We do have drug kingpins in Chislehurst (probably with £5mm of cash on hand), but they don't live in council estate terraced houses as there are none in Chislehurst silly

random_username

143 posts

100 months

Friday 3rd July 2020
quotequote all

Big Rig said:
Fascinating subject hacking, can anyone explain how they actually did it?
The vice article talks about them compromising the phones in order to get the data - as someone said earlier you find a vulnerability in the system (eg. you can install additional apps by sending someone a malformed image) - but the volume of data they have collected doesn't make me think that's the way it's been done - it sounds like they compromised a high proportion of the devices rather than just one or two.

If I were to guess, assuming the details in the vice article are accurate, they compromised the system update servers for Encrochat, added in some back doors and monitoring tools to the phone OS and waited for all the phones to get system/application updates, or used redirection / man in the middle attacks to push fake updates to the phones with cooperation of the phone networks.

If you have enough leverage to ensure cooperation from the service providers, that would be the easiest way - you strong arm the "offshore" hosting company into allowing you physical/direct access to their server then off you go..

Ratski83

952 posts

73 months

Friday 3rd July 2020
quotequote all
Big Rig said:
Fascinating subject hacking, can anyone explain how they actually did it?
From what I read French/Dutch Police somehow located the servers and gained access to them and then uploaded some fancy bug which gathered all the data.

It had been going on for a few few months before Encrochat admin's realised and sent the warning message to users.

Interesting to read there was a few bent coppers with handsets.

untakenname

4,969 posts

192 months

Friday 3rd July 2020
quotequote all
Post from 2016 points to the company being government controlled so basically a honeypot set up with the express idea from the start to lure in criminals or if not at the start then very early on in the companies which was probably why no enforcement action was taken against the company.

https://medium.com/@fordnic/evidence-suggests-encr...


View of the webpage from webback machine from the same time as the article above, why any criminal would use it after that I don't know.
https://web.archive.org/web/20160713025449/http://...




sebdangerfield said:
Under the IPA the innocent 10% you're referring to are termed collateral intrusion. The act allows this data to be obtained along with the naughty 90% as long as it's necessary and proportionate to what you're trying to achieve. Any data obtained under collateral intrusion must not be acted upon but must be stored for disclosure in the appropriate secure way. In essence, if your data is collected as collateral intrusion then it ends up in an incredibly secure data base held by a law agency where noting is done with it when it would previously be held on a less secure data base by the service provider.

In the case of the encrochat and the amount of cash, drugs and weapons seized it's certainly proportionate.
Interesting didn't realise that, wonder what percentage is the tipping point for collateral intrusion?

Carl_Manchester

12,196 posts

262 months

Friday 3rd July 2020
quotequote all
Cheburator mk2 said:
Carl_Manchester said:
GDPR does not apply to you if you are a Esher/Chislehurst Drug Lord kingpin with £5m in cash lying in the bedroom of a council estate terrace house.
We do have drug kingpins in Chislehurst (probably with £5mm of cash on hand), but they don't live in council estate terraced houses as there are none in Chislehurst silly
You would be surprised, there are around 500, plenty on the Mottingham border.

easy driving distance from Woodlands Road on Bickley park wink

Dealing is Absolutely endemic in that part of the world and wouldn’t surprise me if a few local stories start popping up on News Shopper related to this bust.

anonymous-user

Original Poster:

54 months

Friday 3rd July 2020
quotequote all
Carl_Manchester said:
Cheburator mk2 said:
Carl_Manchester said:
GDPR does not apply to you if you are a Esher/Chislehurst Drug Lord kingpin with £5m in cash lying in the bedroom of a council estate terrace house.
We do have drug kingpins in Chislehurst (probably with £5mm of cash on hand), but they don't live in council estate terraced houses as there are none in Chislehurst silly
You would be surprised, there are around 500, plenty on the Mottingham border.

easy driving distance from Woodlands Road on Bickley park wink

Dealing is Absolutely endemic in that part of the world and wouldn’t surprise me if a few local stories start popping up on News Shopper related to this bust.
rofl god love the NewsShopper

Digga

40,317 posts

283 months

Friday 3rd July 2020
quotequote all
Carl_Manchester said:
Cheburator mk2 said:
Carl_Manchester said:
GDPR does not apply to you if you are a Esher/Chislehurst Drug Lord kingpin with £5m in cash lying in the bedroom of a council estate terrace house.
We do have drug kingpins in Chislehurst (probably with £5mm of cash on hand), but they don't live in council estate terraced houses as there are none in Chislehurst silly
You would be surprised, there are around 500, plenty on the Mottingham border.

easy driving distance from Woodlands Road on Bickley park wink

Dealing is Absolutely endemic in that part of the world and wouldn’t surprise me if a few local stories start popping up on News Shopper related to this bust.
Talking to a mate about this last night. A friend of his has been involved in the op. Talked about an empty house in W Mids, which had been bought just as a place to store the cash.

Anyway, apropos of the operation overall, kudos to the police and security services. This is a really big deal and will hopefully leave our streets a good deal safer.

The police are getting increasingly innovative and creative in their forensic electronics. It's good to see.

Stussy

1,834 posts

64 months

Friday 3rd July 2020
quotequote all
This is a very interesting video generally about transatlantic cables and data, but also touches on how when an ISP’s data passes through the U.K. it allows direct access to that data by GCHQ.
It does make you wonder just how much of everyday data is analysed and looked at

https://youtu.be/K_nnUbX7uuQ