'Kraak' is hier inderdaad verwarrend. De FBI kreeg alle details van een in opbouw zijnde app voor een communicatienetwerk in handen van de maker. Wellicht moest er wat gekraakt worden en zeker vond er decryptie van versleutelde berichten (van door de maker gekozen encryptie) plaats, maar de crux is dat de FBI distributie en beheer in eigen handen had.
At the time, the void created by Phantom Secure’s dismantlement provided a new opportunity for criminal users to switch to a new, secure brand of device. The CHS previously distributed both Phantom Secure and Sky Global4devicesto TCOs and had invested a substantial amount of money into the development of a new hardened encrypted device. The CHS offered this next generation device, named “Anom,” to the FBI to use in ongoing and new investigations. The CHS also agreed to offer to distribute Anom devices tosome ofthe CHS’s existing network of distributors of encrypted communications devices, all of whom have direct links to TCOs.
Before the device could be put to use, however, the FBI, AFP,and the CHS built a master key into the existing encryption system which surreptitiously attaches to each message and enables law enforcement to decrypt and store themessage as it is transmitted. A user ofAnomis unaware of this capability.By design, as part of the Trojan Shieldinvestigation, for devices located outside of the United States,5an encrypted “BCC” of the message isrouted to an “iBot” serverlocated outside of the United States, where it is decrypted from the CHS’s encryption code and then immediately re-encrypted with FBI encryption code. The newly encrypted message then passes to a second FBI-owned iBot server, where it is decrypted and its content available for viewing in the first instance.
https://www.justice.gov/u...ase/file/1402426/download
Aangepast dus:
nieuws: FBI-beheer van An0m-communicatienetwerk leidt tot arrestaties in 16 l...