Endpoint //

Authentication

3/16/2018
03:09 PM
50%
50%

Phantom Secure 'Uncrackable Phone' Execs Indicted for RICO Crimes

Executives of Phantom Secure have been indicted on federal RICO charges for encrypting communications among criminals.

"Lie down with dogs, wake up with fleas," the old aphorism goes. "Encrypt for drug traffickers, wake up with indictments," is the version that Phantom Secure might render today. In a series of indictments, a federal grand jury said the CEO and four associates, "... knowingly and intentionally participated in a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale and service of encrypted communications."

According to the FBI, Phantom Secure earned more than $80 million in the last decade providing secure communications for over 20,000 users, all of whom were active in various criminal undertakings. In their product offerings, Phantom Secure took standard smart phones, removed all "civilian" functionality, and replaced it with encrypted email systems that the phones could only use for communicating within the Phantom Secure network of devices.

In a statement, the FBI says, "Given the limited functionality of the phones and the fact that they only operate within a closed network of criminals, all of Phantom Secure's customers are believed to be involved in serious criminal activity." The FBI worked with Australian Federal Police, Royal Canadian Mounted Police, and law enforcement agencies in Panama, Hong Kong, and Thailand to pursue and arrest CEO Vincent Ramos in Bellingham, Wash. The other four Phantom Secure executives named in the indictments are still at large.

In statements, FBI director Christopher Wray said, "'The indictment of Vincent Ramos and his associates is a milestone against transnational crime," while US Attorney Adam Braverman said, "When criminals go dark, and law enforcement cannot monitor their phones or access evidence, crimes cannot be solved, criminals cannot be stopped and lives can be lost. As a result of this groundbreaking prosecution, we will disable the communication infrastructure provided by a criminal enterprise to drug traffickers and other violent criminals."

Ramos will face charges in federal court in San Diego. He and his associates have been charged with Conspiracy to Commit RICO in violation of 18 U.S.C. § 1962 and Conspiracy to Aid and Abet the Distribution of Controlled Substances in violation of 21 U.S.C.  § 841 and 846.

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17283
PUBLISHED: 2018-09-21
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Inject...
CVE-2018-17282
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
CVE-2018-14592
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
CVE-2018-15832
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
CVE-2018-16282
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.