Can Authorities Use Malware?

Can Law Enforcement develop and run one ; Can they use malware to track?

Encrochat was a company that offered custom phones that sent encrypted end-to-end messages to each other. Encrochat used a basic Android device. She installed her own software and of course removed the GPS, microphone and camera function to further lock the devices.

Encrochat phones had an emergency wipe feature where if one εισήγαγε ένα συγκεκριμένο PIN διέγραφε όλα τα δεδομένα που ήταν αποθηκευμένα στη συσκευή. Οι συσκευές έτρεχαν επίσης δύο λειτουργικά συστήματα που κάθονταν δίπλα-δίπλα. ‘Ενα που φαινόταν αθώο και ένα άλλο που περιείχε τις πιο ευαίσθητες επικοινωνίες των χρηστών.

Motherboard said an Encrochat spokesman said the company was legitimate with customers in 140 countries and wanted to "provide the best technology on the market for a reliable and secure service for any organization or individual who wants to protect its information."

The company had tens of thousands of users around the world but decided to close after the authorities discovered its network breach.

The malware was developed and used by its Authorities s, en masse on Encrochat devices, and was able to collect “all data stored on the device”. That is, messages, geolocation data, usernames, passwords and more, according to a document obtained by Motherboard.

The document provides more details about the Authority's invasion of of Encrochat and the closure of the company at the beginning of the year.

Organized crime groups across Europe and the rest of the world used the network before it was seized, in many cases to facilitate the trafficking of large quantities of drugs. The company is one of the largest mass hacking companies by law enforcement to date. Authorities obtained more than a hundred million encrypted messages.

"The NCA has been working with Gendarmerie on Encrochat for over 18 months, as the servers are hosted in France. "The ultimate goal of this collaboration was to identify and exploit any vulnerabilities in the content acquisition service," the document said, referring to both the UK National Crime Agency and one of France's national police forces.

In addition to geographic location, messages and passwords, the authorities' malware asked infected Encrochat devices to provide a list of WiFi access points that were near the device.

"This command from the implant resulted in us receiving MAC addresses which is the unique number assigned to each Wi-Fi access point and the SSID given to that access point." he says The document.

After the closure of Encrochat the authorities arrested a British killer who killed a leader of a criminal organization and an armed robber, as well as various gangs throughout Europe, including those who used the so-called "so-called"torture chambers“. However, some of the users they were legal.

The French authorities said at the time of the closure of Encrochat that they had the legal power to develop the malware and run the mass hack, which they described as a "technical tool".

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).