{"id":14719,"date":"2018-10-03T14:16:21","date_gmt":"2018-10-03T14:16:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29376\/CEO-Pleads-Guilty-To-Selling-Encrypted-Phones-To-Organized-Crime.html"},"modified":"2018-10-03T14:16:21","modified_gmt":"2018-10-03T14:16:21","slug":"ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/","title":{"rendered":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5bb4a6b68186540006d83dcf\/lede\/1538566106086-1520864295721-1.jpeg?crop=0.9955555555555555xw:1xh;center,center&amp;resize=1200:*\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Caption: A screenshot of a post from a Phantom Secure reseller on Instagram. Image: Instagram.<\/p>\n<div readability=\"145.30244530245\">\n<p>In March, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a34b7b\/phantom-secure-sinaloa-drug-cartel-encrypted-blackberry\" target=\"_blank\">Motherboard reported<\/a> that the FBI had arrested the CEO of Phantom Secure, a company selling custom, encrypted phones, and which allegedly provided them to high end organized criminal groups including the Sinaloa drug cartel. On Tuesday, Vincent Ramos, the CEO, pleaded guilty to running a criminal enterprise that facilitated drug trafficking, specifically through the sale of these encrypted phones.<\/p>\n<p>The news is the latest legal skirmish in the so-called \u2018going dark\u2019 debate, where law enforcement say they are hampered from viewing criminals\u2019 communications due to encryption and other security protections. The plea is also a blow to an industry that has operated with relative openness for years.<\/p>\n<p>\u201cIn his plea agreement, Ramos admitted that he and his co-conspirators facilitated the distribution of cocaine, heroin, and methamphetamine to locations around the world including in the United States, Australia, Mexico, Canada, Thailand and Europe by supplying narcotics traffickers with Phantom Secure encrypted communications devices designed to thwart law enforcement,\u201d <a href=\"https:\/\/www.justice.gov\/usao-sdca\/pr\/ceo-encrypted-communications-company-pleads-guilty-tooperating-criminal-enterprise\" target=\"_blank\">a press release<\/a> from the United States Attorney\u2019s Office in the Southern District of California, published Tuesday, reads.<\/p>\n<p class=\"article__blockquote\"><strong><em>Do you have a tip about the secure phone industry?<\/em><\/strong> <strong><em>You can contact this reporter securely and in confidence on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.<\/em><\/strong><\/p>\n<p>Ramos has agreed to an $80 million forfeiture money judgment, as well as giving up tens of millions of dollars of other assets, including cryptocurrency and bank accounts, a Lamborghini, multiple properties, and gold coins, the press release adds.<\/p>\n<p>Phantom would take BlackBerry devices and load them with Pretty Good Privacy (PGP) software for sending encrypted messages, and also had the capability to remotely wipe phones seized by law enforcement. The company also removed the microphone, camera and GPS functionality from the phones, and routed the messages through overseas servers, <a href=\"https:\/\/www.documentcloud.org\/documents\/4406486-Vincent-Ramos-Complaint.html\" target=\"_blank\">according to the criminal complaint<\/a> against Ramos and his co-conspirators. Those defendants, Kim Augustus Rodd, Younes Nasri, Michael Gamboa, and Christopher Poquiz, are <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/9kg93p\/phantom-secure-sinaloa-cartel-four-indicted-blackberry\" target=\"_blank\">still on the run<\/a>.<\/p>\n<p>As <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/a34b7b\/phantom-secure-sinaloa-drug-cartel-encrypted-blackberry\" target=\"_blank\">Motherboard previously reported<\/a>, Phantom Secure had customers across the world. One source familiar with the secure phone industry said Phantom sold devices in Mexico, Cuba, and Venezuela, as well as to the Hell Angels gang.<\/p>\n<p>Crucially, in the complaint against Ramos and his co-conspirators, prosecutors alleged Phantom was not simply incidental to a crime, in the same way Apple or Google may be when providing encryption for their own phones or communication services, but that Phantom deliberately and explicitly facilitated criminal activity. As part of the investigation into Ramos, Royal Canadian Mounted Police (RCMP)\u2014which worked in collaboration with the FBI and Australian authorities\u2014went undercover posing as drug traffickers and recorded Ramos saying \u201cWe made it\u2014we made it specifically for this [drug trafficking] too.\u201d<\/p>\n<p>One source inside industry, and who provided Motherboard with details of Ramos\u2019 arrest before they were public, previously said \u201cFBI are flexing their muscle.\u201d<\/p>\n<p>US Attorney Adam Braverman said in the press release that \u201cThe Phantom Secure encrypted communication service was designed with one purpose\u2014to provide drug traffickers and other violent criminals with a secure means by which to communicate openly about criminal activity without fear of detection by law enforcement.\u201d<\/p>\n<p>\u201cAs a result of this investigation, Phantom Secure has been dismantled and its CEO Vincent Ramos now faces a significant prison sentence. The United States will investigate and prosecute anyone who provides support, in any form, to criminal organizations, including those who try to help criminal organizations \u2018go dark\u2019 on law enforcement,\u201d he added.<\/p>\n<p>In the aftermath of the Phantom bust, other companies in the secure phone space have tried to legitimize their own operations, and separate themselves from any criminal activity.<\/p>\n<p>\u201cAll phone companies I know have all tightened up,\u201d a source familiar with the industry told Motherboard on Wednesday. Motherboard granted the source anonymity to speak candidly about internal industry developments. As <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/kzxag3\/secure-phone-sinaloa-cartel-clamp-down\" target=\"_blank\">Motherboard reported in March<\/a>, this included the companies providing SIM cards to the phone firms checking who their own customers were, as well as Copperhead OS, a security-focused Android operating system, telling its resellers to resist use by criminal groups.<\/p>\n<p>A lawyer representing Ramos did not immediately respond to a request for comment.<\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29376\/CEO-Pleads-Guilty-To-Selling-Encrypted-Phones-To-Organized-Crime.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14720,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3764],"class_list":["post-14719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyphonecybercrimefraudfbicryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-03T14:16:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"846\" \/>\n\t<meta property=\"og:image:height\" content=\"476\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime\",\"datePublished\":\"2018-10-03T14:16:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg\",\"keywords\":[\"headline,privacy,phone,cybercrime,fraud,fbi,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/\",\"name\":\"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg\",\"datePublished\":\"2018-10-03T14:16:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg\",\"width\":846,\"height\":476},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,phone,cybercrime,fraud,fbi,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyphonecybercrimefraudfbicryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/","og_locale":"en_US","og_type":"article","og_title":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-03T14:16:21+00:00","og_image":[{"width":846,"height":476,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime","datePublished":"2018-10-03T14:16:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg","keywords":["headline,privacy,phone,cybercrime,fraud,fbi,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/","url":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/","name":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg","datePublished":"2018-10-03T14:16:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime.jpg","width":846,"height":476},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ceo-pleads-guilty-to-selling-encrypted-phones-to-organized-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,phone,cybercrime,fraud,fbi,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyphonecybercrimefraudfbicryptography\/"},{"@type":"ListItem","position":3,"name":"CEO Pleads Guilty To Selling Encrypted Phones To Organized Crime"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14719"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14720"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}