FBI Encrypted Devices Were Sold To Crime Groups

Share post:

Authorities recently revealed that the FBI and Australian Federal Police secretly operated an “encrypted device company” called “Anom,” which sold 12,000 smartphones to crime syndicates worldwide.

These phones were originally secure devices that relayed all messages to a server owned by the FBI.

The FBI has weaponized what the Android modding community has been doing for years.

Some Android phones have unlockable bootloaders that can be used to erase the original operating system and replace it with a custom build of an operating system called a custom ROM.

FBI’s custom ROM displays an “ArcaneOS” boot screen, and it replaced the normal Google Android distribution with the FBI’s skin of Android 10.

The selling point for alleged criminal groups was that the security-oriented devices had a lot of fun security theater.

A “pin scrambling” feature would change the order of the lock screen numbers so that no one could guess the code based on screen smudges.

The compromised phones of the FBI show some red flags that a tech-savvy user should recognize.

When launching an Android phone, the first check that happens is Verified Boot, which ensures that the operating system is cryptographically signed by the device manufacturer, which guarantees that it has not been tampered with.

If a device fails verified boot, either because it has an unlocked bootloader or a newly locked bootloader with manipulated software, it will display a message during startup. In this case, the FBI devices will display a message saying, “Your device is loading a different operating system,” complete with a yellow exclamation mark and a link to a Google support page at g.co/ABH.

The FBI modified a lot of the core Android operating system by removing helpful Android settings that could reveal the device’s true purpose.

The system settings for apps, storage and accounts have all been removed and there is now no way to see a list of all installed system apps where users might discover something suspicious like “FBI_Spyware.APK.”

The FBI also deleted the “Location” settings to prevent users from turning off GPS tracking.

The device also has the Play Store or other Google apps, and except for a watch and the calculator app which leads to a compromised chat app, no other apps worked.

For more information, read the original story in Arstechnica.

Featured Tech Jobs


Related articles

Cyber Security Today, Week in Review for Friday, December 8, 2023

This episode features discussion on cyber attacks against OT networks, the discovery of exposed servers with medical images and  why outdated Microsoft Exchange servers are s

Canadian mid-sized firms pay an average $1.13 million to ransomware gangs

Survey for Palo Alto Networks also shows fewer firms willing to pay da

Cyber Security Today, Dec. 8, 2023 – Ransomware is increasingly impacting OT systems, and more

This episode reports on how hackers break into AWS cloud instances, fake anti-Ukraine online ads  using photos of celebrities

Canadian privacy czars release principles for responsible development of AI

The principles remind AI developers they have to follow Canadian data pr

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways