Criminal Messaging App Leads To Widespread Arrests

A massive international sting, involving at least 17 countries, including the US, has arrested suspects, the seizure of 8 tons of cocaine and more than $48 million and over 800 suspected criminals have been arrested after being hoodwinked into using an FBI-run encrypted messaging app says the FBI and this is a continuation of Operation Trojan Shield. 

This operation by Australia and the FBI and other organisations, saw devices with the ANOM app secretly distributed among criminals, allowing police to monitor their discussions about drug smuggling, money laundering and even murder plots and the scale of the cooperation between so many different countries made this operation very important.

US law enforcement first became involved in the development of an encrypted device network called ANOM, a technology perceived to be a secure encrypted messaging app that customised cell phones to remove all their capabilities, including voice and camera functions, apart from the technology. The app was then sold to organised crime officials, without them being aware that they were being monitored. Those crime officials then distributed phones containing the app to associates, believing the phones to be secure,

The Australian Federal Police began developing the technology that allowed law enforcement to access and read messages sent on a platform covertly run by the FBI, Australian Federal Police Commander Jennifer Hurst said. "The captured data has given the AFP evidence and unique insights into how organised crime works in Australia and internationally, how they move drugs, money, guns and organise murders," she said. 

Three years later, the investigation involving 9,000 law enforcement officers from 17 countries saw authorities monitor 27 million messages from 12,000 devices in 100 countries and track the activities of more than 300 organised crime groups.

The targets included drug gangs and people with links to the mafia and drugs, weapons, luxury vehicles and cash were also seized in the operation. This included eight tons of cocaine, 250 guns and more than $48m (£34m) in various worldwide currencies and crypto currencies. Australian Prime Minister Scott Morrison said the operation had "struck a heavy blow against organised crime" around the world. 

The FBI began operating the ANOM network, most likely using  criminal insiders who covertly distributed devices with the chat app among the criminal underworld via informants.

The idea for the operation came after two other encrypted platforms were taken down by law enforcement agencies, leaving criminal gangs in the market for new secure phones. These devices were initially used by well known criminals, giving other criminals the confidence to use the platform. "You had to know a criminal to get hold of one of these customised phones. The phones couldn't ring or email. You could only communicate with someone on the same platform," the Australian police explained.

Australian fugitive and alleged drug trafficker Hakan Ayik was key to the sting, having unwittingly recommended the app to criminal associates after being given a handset by undercover officers, police said. Dubbed the "Facebook gangster" by Australian media outlets, Ayik is seen in social media photographs with large tattoos and a muscular physique., although he has been in hiding in Turkey since evading arrest, as he may be in danger after  unwittingly helped the FBI with their sting.

In total, some 12,000 encrypted devices were used by around 300 criminal syndicates in more than 100 countries. Officers were able to read millions of messages in "real time" describing murder plots, mass drug import plans and other schemes.  

In Australia, 224 people were arrested including members of outlaw motorcycle gangs, mafia groups, Asian crime syndicates, and serious and organised crime groups. Police said they also seized three tonnes of drugs and A$45m  in cash and acted on 20 "threats to kill", potentially saving the lives of a "significant number of innocent bystanders".

For  a decade, organised crime groups have used phones like Phantom Secure to organize drug deals, the murder of rivals and laundering illicit earnings without detection. Among many of the phones’ features, content can be remotely wiped if they are seized. But as one model was put out of business, new ones would enter the lucrative market. The FBI decided it would launch its own, inserting a master key into the devices that attached to each message and enabled law enforcement officers to decrypt and store them as they were transmitted.

Europol:     Reuters:      BBC:       NBC:         AoL:        The Blaze:     Phoenix Star:       Stuff:

You Might Also Read:

Police First Hack Then Demolish Organised Crime Gangs:

 

« The Cyber Revolution’s Effects on International Trade
Closing The Space Between Cybercrime & Cybersecurity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.