Euro Security Watch with Mathew J. Schwartz

Cybercrime , Encryption & Key Management , Enterprise Mobility Management / BYOD

Dutch Police Bust 'Cryptophone' Operation

Another Secure Service - As Allegedly Marketed to Criminals - Fails to Deliver
Dutch Police Bust 'Cryptophone' Operation
Aart Garssen, head of the Regional Investigation Service in the Eastern Netherlands, announces the operation against BlackBox and its users.

Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits.

See Also: Live Webinar | Navigating Identity Threats: Detection & Response Strategies for Modern Security Challenges

Encrypted messaging handset provider BlackBox's supposedly secure communications network was dismantled after Dutch police seized its server. The operation also allowed the cops to read more than 258,000 encrypted chat messages sent by users of BlackBox IronPhones, which used a customized version of OTR Messaging - for off-the-record - called IronChat to supposedly offer end-to-end encryption for messages.

Dutch police say they discovered the cryptophone operation while investigating an alleged money laundering operation.

Police didn't just shut down the network. Instead, they seized a server and began monitoring the service.

"We had sufficient evidence that these phones were used among criminals. We have succeeded in intercepting encrypted communication messages between these phones, decrypting them and having them live for some time," Dutch police said on Tuesday. "This has not only given us a unique insight into existing criminal networks; we have also been able to intercept drugs, weapons and money."

Police say their investigation has already allowed them to bust a drugs lab in Enschede, Netherlands, and make 14 arrests, including a 46-year-old man from Lingewaard who's suspected of running the cryptophone company, as well as his alleged partner, a 52-year-old man from Boxtel.

Police have also seized €90,000 in cash (equivalent to $103,000) and automatic weapons and drugs, including large amounts of MDMA and cocaine, as well as machines, stamps and labels apparently used for shipping them.

Cached view of BlackBox's now-offline reseller page, which carried a supposed testimonial from Edward Snowden. Snowden, however, says he never endorsed BlackBox, and indeed has never done a paid endorsement. (Source: Internet Archive)

Why Police Revealed Operation

"This operation has given us a unique glimpse into a criminal world in which criminal acts were openly discussed," said Aart Garssen, head of the Regional Investigation Service in the Eastern Netherlands, at a Tuesday press conference.

BlackBox's website now resolves to this seizure notice.

He said police had decided to reveal their operation to forestall violence, after BlackBox users started to voice suspicions about each other - which police learned about thanks to monitoring the IronChat message traffic - following people being arrested.

"They suspected each other of leaking information to the police," Garssen says. "This mistrust among the users of the phones toward each other can lead to reprisals. Now, we're making it clear that the police intervened [by using] intercepted communications."

Dutch police later issued a follow-up statement, saying the decision to unmask the operation was made, in part, because the reprisals posed an "unacceptable" public safety risk. "Criminal reprisals can affect not only the criminals involved, but also innocent bystanders," it said.

Encrypted App Offering

Police say BlackBox IronPhones looked like smartphones, but with much reduced functionality; they can only send and receive messages and images, and only with other cryptophones. Their supposed security didn't come cheap - subscriptions cost €1500 for six months.

"On the device there is also a panic button via which all data can be deleted at once," police say.

"Secure mobile communications is here. Our IronPhone smartphone lets you securely communicate with other IronPhones and IronBoxes through proven secure off-the-record encryption," Blackbox's product page said. (Source of cached page: Internet Archive)

BlackBox's marketing materials claimed that the company's products had been endorsed by National Security Agency whistleblower Edward Snowden. But Snowden has refuted that claim.

Some Crypto Phone Services Under Fire

The BlackBox IronPhone takedown isn't the first time that police have shuttered a cryptophone service for alleged criminal ties.

In March, the U.S. Department of Justice charged five individuals with running a secure smartphone service called Phantom Secure that was designed and marketed to help criminals evade law enforcement agencies (see: Feds: Secure Smartphone Service Helped Drug Cartels).

Authorities charged the men with providing the phones to individuals who used them to ship cocaine and MDMA from the U.S. to Australia and Canada. Six-month subscriptions for the devices ran about $2,000 or $3,000. The FBI said users of the service included a known member of Mexico's Sinaloa Cartel.

Smartphones marketed by Phantom Secure (Source: Phantom Secure website)

Phantom Secure purchased handsets from BlackBerry and other manufacturers, then removed "the hardware and software responsible for all external architecture, including voice communication, microphone, GPS navigation, camera, internet and Messenger service," according to a federal complaint.

The Phantom Secure team would then install Pretty Good Privacy encryption software and the Advanced Encryption Standard cipher - for encrypting and decrypting data - on top of an email program, it said. All communications were allegedly routed through virtual proxies and encrypted servers in such locations as Hong Kong and Panama, with the company's marketing materials proclaiming that "Panama does not cooperate with any other country's inquiries."

Points of Potential Failure

Services such as BlackBox and Phantom Secure, if they are marketed to criminals, become an obvious target for law enforcement takedowns. And despite their marketing claims, they may be far from impervious to such efforts.

The IronChat app (Source: Bitdefender)

Even the legitimate VPN service called HideMyAss.com had limits, as LulzSec member Cody Kretsinger learned to his peril in 2011, when the U.K.-based service complied with a law enforcement records request that unmasked Kretsinger's activities. He was jailed for one year in 2013 for hacking Sony Pictures.

The same goes for so-called darknet websites that can only be reached by using the anonymizing Tor browser and which only accept payment in bitcoin or other cryptocurrencies, such as monero.

While all of that would seem to provide a degree of anonymity, authorities have some cryptocurrency-tracing abilities, especially when virtual currencies get converted to cash. In addition, darknet markets, even if they're hosted using bulletproof services, must still be remotely administered. Also, if users buy physical goods, such as drugs, they must be shipped from sellers to buyers, all of which poses an operational security risk (see: Glove Use Key to Arrest of Alleged Darknet Drug Trafficker).

That makes for a long list of potential flaws or missteps for police to exploit.

Tough Times After AlphaBay

Last year, for example, the FBI on July 4 seized darknet marketplace AlphaBay, which processed more than $1 billion in narcotics sales, after identifying its Thai-based administrator, who made multiple OPSEC fails (see: One Simple Error Led to AlphaBay Admin's Downfall).

After AlphaBay went dark, many users switched to rival marketplace Hansa, which processed about 1,000 orders per day, mostly for hard drugs.

Unbeknownst to Hansa users, however, Dutch police had already seized that site two weeks before AlphaBay went dark. As users moved from AlphaBay to Hansa, police watched everything they did.

"The Dutch police collected valuable information on high-value targets and delivery addresses for a large number of orders," Europol, the EU's law enforcement intelligence agency, said at the time. "Some 10,000 foreign addresses of Hansa market buyers were passed on to Europol."

Cybercrime intelligence experts say the dramatic seizures of those marketplaces led many criminals to move to encrypted apps for doing business.

But with police showing that they can infiltrate service providers and sites, eavesdrop on even darknet markets, as well as turn ringleaders into informants, for criminals seeking services that purport to offer anonymity and promise ironclad information security, caveat emptor.



About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.