Recurring |
unknown |
The software failure incident related to EncroChat shutting down due to a breach in its infrastructure and subsequent law enforcement hacking operation is a unique case that does not directly indicate a similar incident happening again at one specific organization or multiple organizations. Therefore, the articles do not provide information on similar incidents happening again within the same organization or with its products and services. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase is evident in the case of EncroChat, an encrypted platform used by criminals. The platform was designed with specific features such as encrypted chat apps, stripped-out GPS sensors, microphones, and cameras to ensure security and anonymity for criminal activities [102242]. The platform was marketed as providing an 'end-to-end security solution' with a guarantee of anonymity, positioning itself as a legitimate company with users in over 140 countries [102242]. However, despite these design features, the platform was ultimately used for criminal purposes, including drug operations, human trafficking, and ordering murders, highlighting a failure in the design phase to prevent misuse [102242].
(b) The software failure incident related to the operation phase is seen in the issues faced by EncroChat users with their devices not wiping correctly. In May, there were reports of tech support issues around EncroChat phones not wiping correctly, and a month later, malware was discovered on one of Encrochat's 'X2' devices that disabled the phone's factory reset and recorded the screen lock password [102242]. This indicates a failure in the operation phase, where users encountered difficulties in properly operating and maintaining the security of their devices, leading to vulnerabilities and potential breaches [102242]. |
Boundary (Internal/External) |
within_system |
(a) within_system: The software failure incident related to EncroChat can be categorized as within_system. The failure was due to contributing factors that originated from within the system itself, such as the presence of malware on the devices, tech support issues, and the panic wipe feature that could delete all data on the device [102242]. These internal factors led to the decision to shut down the service permanently. |
Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident in this case can be attributed to non-human actions, specifically the presence of malware on the Encrochat devices. The articles mention that in May, there were tech support issues with Encrochat phones not wiping correctly, and later, malware was discovered on one of the devices. The malware was designed to conceal itself, disable factory reset, record passwords, and clone application data [102242].
(b) Additionally, human actions played a role in the failure incident as well. The articles highlight that the company behind Encrochat sent out text messages to users warning them to dispose of their phones due to a breach in the phone network's infrastructure. Furthermore, there were reports of a former soldier and criminal from Belfast under police investigation for selling encrypted phones to criminals [102242]. |
Dimension (Hardware/Software) |
hardware, software |
(a) The software failure incident occurring due to hardware:
- The EncroChat encrypted platform used specially-designed handsets that had their GPS sensors, microphones, and cameras stripped out [Article 102242].
- The handsets had no camera, USB data port, GPS, or microphone to enhance security [Article 102242].
(b) The software failure incident occurring due to software:
- Encrochat faced issues with tech support around phones not wiping correctly [Article 102242].
- Malware was discovered on one of Encrochat's 'X2' devices, designed to conceal itself, disable factory reset, record passwords, and clone application data [Article 102242].
- Encrochat sent out a text message to users warning them of attacks and advising them to dispose of their devices [Article 102242]. |
Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident related to the EncroChat platform can be categorized as malicious. The platform was designed for criminal purposes, allowing criminals to communicate securely and engage in illegal activities such as setting up drug deals and hiring hitmen [102242]. The platform was used by organized crime groups for illegal operations, and the company behind EncroChat positioned itself as a legitimate business while facilitating criminal activities [102242]. The platform's messaging system was used by hitmen to carry out assassinations [102242]. Additionally, there were reports of malware being installed on EncroChat devices to conceal itself, disable factory resets, record passwords, and clone application data [102242].
(b) The software failure incident was non-malicious in the sense that the failure itself was not illegal. The platform was designed to be secure against unwanted outside access, and in the UK, it was used purely for criminal purposes by top-level criminals [102242]. The failure was not due to a flaw or mistake in the software itself but rather the criminal intent behind its usage. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The intent of the software failure incident:
- The software failure incident related to EncroChat, an encrypted platform used by criminals, was primarily due to poor decisions made by the company. The platform was designed to be secure against unwanted outside access and was used purely for criminal purposes, such as drug operations, human trafficking, and ordering murders [102242].
- EncroChat marketed itself as a legitimate company with promises of end-to-end security and guaranteed anonymity, but it was later revealed that the platform was being used for illegal activities. The company's decision to provide encrypted phones to criminals and position itself as a secure communication network for criminal enterprises ultimately led to its shutdown and the arrest of numerous individuals involved in criminal activities [102242]. |
Capability (Incompetence/Accidental) |
development_incompetence, accidental |
(a) The software failure incident related to development incompetence can be seen in the case of EncroChat, an encrypted platform used by criminals for communication. The platform was designed to be secure against unwanted outside access and was used purely for criminal purposes in the UK. Despite positioning itself as a legitimate company with promises of end-to-end security and anonymity, it was ultimately shut down after law enforcement hacking operations against its customers [102242].
(b) The accidental aspect of the software failure incident can be observed in the discovery of malware on Encrochat's 'X2' devices. In May, there were tech support issues reported around Encrochat phones not wiping correctly, and a month later, malware was found on one of the devices. The malware was designed to conceal itself, disable factory reset, record passwords, and clone application data. This accidental introduction of malware led to the decision to shut down the service permanently [102242]. |
Duration |
permanent |
The software failure incident related to the EncroChat platform can be categorized as a permanent failure. The company made the decision to shut down its service and business permanently due to attacks carried out by a foreign organization originating in the UK [102242]. This decision indicates that the failure was not temporary but rather a permanent shutdown of the service. |
Behaviour |
crash, omission, timing, value, other |
(a) crash: The software failure incident related to the EncroChat platform can be categorized as a crash. The platform abruptly shut down after a law enforcement hacking operation against its customers, leading to the system losing its state and not performing any of its intended functions [102242].
(b) omission: The failure can also be attributed to omission as the platform failed to perform its intended functions at an instance. EncroChat sent out text messages to clients warning them to dispose of their phones due to a breach in the phone network's infrastructure, indicating a failure to continue its operations as intended [102242].
(c) timing: The timing of the failure can be considered as a factor in this incident. EncroChat realized the game was up three weeks before shutting down and messaged all users to throw away their devices, suggesting that the system performed its intended functions correctly but at a delayed time, leading to its eventual shutdown [102242].
(d) value: The failure can also be linked to the system performing its intended functions incorrectly. EncroChat, which positioned itself as a legitimate company with an 'end-to-end security solution' and 'guaranteed anonymity,' was actually used for criminal purposes, such as drug operations, human trafficking, and ordering murders, showcasing a discrepancy between the intended value and the actual use of the platform [102242].
(e) byzantine: The behavior of the software failure incident does not align with a byzantine failure, which involves inconsistent responses and interactions. The EncroChat platform's shutdown and the subsequent actions taken by law enforcement and the company were more in line with a crash and omission rather than erratic or inconsistent behavior [102242].
(f) other: The other behavior exhibited in this software failure incident could be described as a deliberate shutdown due to external pressure. EncroChat made the decision to shut down permanently following attacks by a foreign organization originating in the UK, indicating a strategic move rather than an unintentional failure [102242]. |