Police Encounter Confused Gang Suspected of International Smuggling Linked to UK’s “Large” Phone Heist

Police have disrupted an international network believed to be smuggling tens of thousands of stolen phones from the UK, marking their most significant effort against phone theft in London, according to law enforcement officials.

The criminal organization is thought to have smuggled as many as 40,000 stolen mobile phones from the UK to China in the past year, claiming that up to 40% of all mobile phones stolen in the capital were involved.

The police initiated Operation Echosteep in December 2024 after intercepting a shipment containing about 1,000 iPhones destined for Hong Kong at a warehouse located near Heathrow Airport.


According to police, nearly all the recovered phones had been reported stolen.

Authorities intercepted additional shipments and utilized forensic evidence from the packages to identify suspects.

After apprehending a man with 10 stolen mobile phones at Heathrow on September 20, he was charged with possession of stolen goods, the police unit reported.

During the investigation, officers also found two iPads, two laptops, and two Rolex watches.

Further investigation indicated that the same individual had made over 200 trips between London and Algeria in the past two years, according to police.

Three days later, two other men in their 30s were arrested in northeast London on suspicion of possessing stolen property.

Numerous mobile phones were discovered in vehicles, with approximately 2,000 additional devices located at properties linked to the suspects.

These individuals were subsequently charged and detained, police confirmed.

Additionally, two more men in their 30s were arrested on September 25 on allegations of money laundering and handling stolen goods.

Officers also seized several stolen devices during their search operations.

Police mentioned that one man had indicated that further investigations were ongoing.


In total, officers have arrested 46 individuals over two weeks, including 11 arrests related to a criminal gang involved in the theft of new iPhone 17 delivery vans.

An additional 15 arrests were made last week on suspicions of theft, handling stolen goods, and conspiracy to commit theft, according to the Metropolitan Police.

More than 30 suspicious devices were also uncovered while searching 28 locations in London and Hertfordshire.

London Mayor Sadiq Khan expressed gratitude to the police for “addressing concerns in London,” noting a 13% and 14% decrease in crime rates this year.

“This operation is undeniably the largest of its kind in British history, and it was humbling to witness the Met’s efforts in targeting leaders of international smuggling operations as well as street-level robbers,” Khan commented.

However, he urged the mobile phone industry to collaborate with law enforcement to make it challenging for smugglers to utilize stolen devices.

“Criminals are profiting millions by reusing stolen mobile phones and selling them abroad, granting others access to cloud services,” he remarked. “The current situation is simply too simple and too lucrative.

“We will persist in urging the mobile phone industry to take rapid action to prevent this crime by making it impossible to use stolen devices.”

“To effectively combat this issue and create a safer London for all, we require coordinated global action.”

“We are pleased to report that we have made significant progress in understanding the importance of these efforts,” stated Det Insp Mark Gavin, Senior Investigation Officer at Operation Echosteep.

Gavin highlighted that smugglers are particularly targeting Apple products due to their high profitability overseas, with handsets fetching up to £300 and stolen devices selling for as much as $5,000 (£3,710) in China.

This increase in phone theft is mirrored in numerous cities globally, with around 80,000 devices reported stolen in London last year, according to the Met.

Commander Andrew Featherstone, the Met’s lead on phone theft, stated:

Source: www.theguardian.com

Can Any Nation Safeguard Against Ukrainian-Style Drone Smuggling?

Image captured by a Ukrainian drone during operation

upi/alamy

On June 1, Ukraine made headlines with a daring strike on Russian air bases. Utilizing inexpensive, compact drones concealed within trucks that had ventured deep into Russian territory, Ukraine successfully targeted numerous strategic bombers capable of carrying nuclear weapons, resulting in a loss of $7 billion in military assets.

The drone swarm operation, dubbed Operation Spider-Web, showcased remarkable military strategy while also exposing the vulnerabilities that defense leaders globally may soon confront.

“Currently, there’s a 100% likelihood of a small drone assault on air bases in the US or UK,” stated Robert Bunker, a consultant for US firm C/O Futures. “A group with intention and capability is needed. This is a very modest expectation.”

The Ukrainian security service SBU reported that 117 first-person view drones were deployed in the attack, each carrying several kilograms of explosives provided by racing quadcopters. Last year, countries produced approximately 1.5 million of these drones for battlefield applications, each costing a few hundred dollars. Although they typically have a range of about 20 km, Operation Spider-Web demonstrated their capability to reach target areas and operate remotely.

The assault did not catch US defense analysts off-guard. According to Zachary Karenbourne, who authored a 2019 analysis on potential threats to strategic bombers: “Ukraine’s operation had a much broader scope and impact than I anticipated. I initially believed such an attack was merely part of a larger assault on enemy nuclear assets, but Ukraine managed to neutralize 34% of its nuclear bomber fleet with an exceptionally coordinated effort.”

What steps should nations undertake to shield themselves against comparable assaults? Generally, there are three strategies: physical barriers, electronic defenses, and kinetic measures.

The initial approach seems straightforward—erect physical defenses to deter drones. Some Russian aircraft targeted by Ukraine were stationed in bays protected by concrete blast walls or earthen berms meant to shield against ground explosions. However, these measures do not safeguard against aerial strikes. Russia is currently racing to construct hardened aircraft shelters, which are costly, running into millions and sufficiently large for fighters. There was an assumption that larger strategic bombers could forgo this protection, as they were expected to remain distant from frontlines and threats.

Anti-drone nets represent a more economical solution and have been adopted by both Ukraine and Russia in battlefield scenarios. Reportedly, Russian authorities have recommended implementing such barriers in airspace. However, following the Ukrainian strike, the challenge is that these nets can be easily dismantled.

“The net provides decent defense against initial UAS [Uncrewed Aerial System] attacks,” Bunker notes. Yet, given the low cost of drones, attackers can launch a first wave to neutralize the net before proceeding with subsequent strikes.

What about electronic defenses? Both Russia and Ukraine are currently utilizing jamming technologies to disrupt the communication between drones and their operators. While this can be effective in wartime, jammers typically function over limited ranges, necessitating comprehensive coverage of the airbase. “They need to be deployed and monitored around the clock,” Bunker indicates.

This approach has its complications. The operations of Spider-Web employed commercial mobile networks, but attackers can utilize any frequency to command the drone, so blanket jamming of all channels might not be feasible. “Jammers can disrupt friendly communications,” warns Karenbourne. “To forestall such assaults, we may have to endure increased risks to our own operations.”

Moreover, the SBU claims that the drones were designed to anticipate jamming and were outfitted with AI systems enabling them to reach their targets autonomously. Such drones are virtually impervious to jamming.

This leaves kinetic measures as a final defense. Known as shooting down drones, Russian airfields were fortified against conventional aerial attacks via surface-to-air missile systems and mobile anti-aircraft units, but these were ill-equipped to detect or engage small drones.

“A weaponry system designed for this task demands advanced acquisition and targeting capabilities to be effective against armed drones,” Bunker states. “If operated by humans, they need to be distributed strategically across the facility for defense and manned continuously.”

Auto-defense mechanisms present promising options, and Ukraine is already deploying AI-driven anti-drone machine gun turrets to safeguard cities from Russian assaults involving substantial Shahed drones. However, at an expense of around $100,000 each, these turrets can be easily surpassed by smaller, more affordable drones utilized in the Spider-Web operation. “A swarm of drones could well succeed,” Karenbourne admits.

In summary, while there is no definitive solution, militaries urgently need to discover ways to mitigate this looming threat. A recent statement from a US Air Force General to the Senate Committee noted that in 2024 alone, over 350 unauthorized drones infiltrated military installations across the United States. Moreover, American bases in the UK have reported similar drone incursions.

“While many may be hobbyists, at least some are definitely adversaries,” adds Karenbourne. These hostile drones are likely engaging in intelligence-gathering rather than attempts to strike. “If we were in a conflict with China, that might change dramatically.”

This indicates that operations akin to Spider-Web could easily be replicated, in Russia or elsewhere. “This issue extends far beyond a significant vulnerability,” Bunker concludes. “Current defenses cannot be adequately reinforced. The situation is deteriorating rapidly.”

Topics:

Source: www.newscientist.com