Image: Cathryn Virginia
Registration, education and action. We're supporting voting in partnership with iamavoter.com, a nonpartisan movement encouraging voting, and civic engagement.
Advertisement
Encrochat was an encrypted phone company that took base Android units, made physical alterations to them, and added its own software. Encrochat devices sent messages with end-to-end encryption, meaning only the intended recipient was supposed to be able to read them. The phones also had a remote wipe feature, letting users destroy communications if they lost physical control of the device, as well as a dual-boot system that let users open an innocuous looking operating system, or the second one containing their more sensitive information.The phones were particularly popular with criminals, including drug traffickers and hitmen. There are indications Encrochat may have had legitimate users too, however.Other Encrochat customers are allegedly those involved in corruption, including police themselves, the press release suggests. Van Essen said in the press release that corruption is "unmistakably present."Do you know anything else about Encrochat or impacted cases? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.
Advertisement
One of the sources for Motherboard's earlier investigation into the Encrochat operation, and who is not a law enforcement official but is close to criminal users of the encrypted phone network, previously said corrupt individuals used the devices.Encrypted phone companies themselves have received information from law enforcement bodies in the past. During an investigation into Phantom Secure, which sold customized BlackBerries to the privacy conscious and then later criminals, authorities found that a top Royal Canadian Mounted Police (RCMP) official had provided the company with information.On Tuesday, Motherboard published more details on the malware used to infect Encrochat devices. As well as message content, it could also harvest GPS locations, usernames, passwords, and more."Criminal investigations into possible corruption are currently underway and there are likely to be more in the near future."