The U.S. Secret Service says it dismantled a network of electronic devices located throughout the tri-state area that were being used to conduct multiple telecommunications-related threats directed towards senior U.S. government officials. The agency says it represented an imminent threat to its protective operations.
This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites, federal officials said.
Phone farms, also known as bot farms, are used by bad actors to simulate real phones for scams, phone spoofing or cyber attacks. Here’s what you need to know.
In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises.
While forensic examination of these devices is ongoing, early analysis indicates cellular communications between a well-funded group and individuals known to federal law enforcement. The group wasn’t clear.
These devices were concentrated within 35 miles of the global meeting of the United Nations General Assembly now underway in New York City. Given the timing, location and potential for significant disruption to New York telecommunications posed by these devices, the agency says it moved urgently to disrupt the network.
U.S. Secret Service Director Sean Curran said in a statement that the potential disruption posed by the device network “cannot be overstated.”
“The U.S. Secret Service’s protective mission is all about prevention, and this investigation makes it clear to potential bad actors that imminent threats to our protectees will be immediately investigated, tracked down and dismantled,” Curran said.
The investigation is ongoing.



