cybersécurité

The FBI’s phone for criminals included a custom version of Android

The phones the FBI sold to crooks for a sting operation weren’t just running a custom app — it appears the operating system was also tweaked for those goals. Motherboard has obtained one of the « Anom » phones (really, a modified Pixel 4a), and its mysterious « ArcaneOS » has a number of customizations that you wouldn’t necessarily expect, even for a privacy-oriented phone.

For one, there are no app stores. You also can’t toggle location tracking. And don’t think you can simply flash the device with third-party firmware to make it behave more like normal phones — the bootloader is locked even though the startup screen tells you the device has been modified.

Some user said Anom was based on the existing GrapheneOS, but Anom may have lied to buyers about the software to instill a false sense of trust.

The interface does include some security features that would appeal to the criminal target audience, including a hidden chat app (accessed through the « calculator » when it worked) and PIN scrambling. A wipe code feature that lets you erase a phone from the lock screen is also present, although the Justice Department clearly didn’t like that feature when it charged some Anom developers with alleged obstruction of law enforcement.

At least one second-hand Anom phone owner say they got a Pixel 3a, suggesting the FBI transitioned to different devices as the sting unfolded.

You wouldn’t want to buy one of these devices, then, even for curiosity’s sake. However, it’s now clear just how far the FBI went to bust criminals. The agency wanted to give unsuspecting drug dealers the impression they were using a true encrypted phone, right down to the OS, even as the device quietly exposed messages to law enforcement agents.

Veille-cyber

Recent Posts

Les 7 menaces cyber les plus fréquentes en entreprise

Introduction La cybersécurité est devenue une priorité stratégique pour toutes les entreprises, grandes ou petites.…

3 jours ago

Cybersécurité : Vers une montée en compétence des établissements de santé grâce aux exercices de crise

Cybersécurité : les établissements de santé renforcent leur défense grâce aux exercices de crise Face…

2 semaines ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

2 semaines ago

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

2 semaines ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

2 semaines ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

2 semaines ago

This website uses cookies.