Screengrab by NPR
The criminals texted each other about drug deals and money laundering, confident in special encrypted devices dubbed “Anom.” There was just one problem for the crime rings: the FBI was being copied on every message — millions of them worldwide. In fact, the agency had sent the Anom devices into the black market in the first place.
Those are the details and allegations that are now emerging about Operation Trojan Shield, an international effort coordinated by the FBI that has resulted in more than 800 arrests.
Authorities have also seized more than 8 tons of cocaine, with 22 tons of cannabis and several tons of other drugs, along with “55 luxury vehicles and over $48 million in various worldwide currencies and cryptocurrencies,” the European law enforcement agency Europol says.
It’s “one of the largest and most sophisticated law enforcement operations to date in the fight against encrypted criminal activities,” the agency adds.
With the help of Europol, the FBI identified “over 300 distinct TCOs using Anom, including Italian organized crime, Outlaw Motorcycle Gangs, and various international narcotics source, transportation, and distribution cells,” according to a search warrant affidavit filed in court by Nicholas Cheviron, an FBI special agent in San Diego. The document was unsealed on Monday.
The document includes transcripts of smugglers’ conversations, in which they name their prices and handling fees and describe their methods. Many of them also sent snapshots to each other, showing packages of cocaine and other drugs.
Screengrab by NPR
Since late 2018, the smuggling rings had come to rely on the Anom devices, which were touted as being able to send secure, encrypted messages in a closed digital environment, along with the promise that their data would be wiped remotely if they fell into the hands of the police.
But from early on, the devices’ developer was collaborating with the FBI — and as their use spread, they surreptitiously sent copies of the criminals’ messages to the FBI, the Australian Federal Police, and other agencies.
The FBI gained a real-time window into the lucrative world of international organized crime in 2018, after its San Diego office busted Phantom Secure, a company that provided hardened encrypted devices to criminal organizations. Its CEO, Vincent Ramos, pleaded guilty; other company leaders were also indicted.
The FBI agents in San Diego then recruited a confidential source who said they were working on a “next generation” encrypted device, according to Cheviron’s affidavit. That source also had ties to Phantom Secure’s shadowy distribution network — and they agreed to let the FBI take control of the new device and help it spread.
“Before the device could be put to use,” Cheviron said in the court filing, agencies in the U.S. and Australia worked with the source to build “a master key into the existing encryption system which surreptitiously attaches to each message and enables law enforcement to decrypt and store the message as it is transmitted.”
Cheviron added, “A user of Anom is unaware of this capability.”
From its first foothold in Australia, the Anom network spread to more than 100 countries, Europol says, adding that police agencies were able to obtain some 27 million messages.
In addition to drug offenses, the Australian Federal Police says it disrupted 20 different threats to kill people.
Police agencies in Australia now have “years of intelligence and evidence” because of the wealth of information gleaned from the platform, AFP Commissioner Reece Kershaw said. Further charges are also likely, including public corruption — a result, in some cases, of the messages’ details about officials who were willing to aid smugglers.
Law enforcement agencies were in a unique position to help the new Anom device find its market. In recent years, they’ve taken down three similar networks — Phantom Secure, EncroChat and, earlier this year, Sky Global — boosting criminals’ demand for a new alternative. In many cases, Anom filled that void.
“The top five countries where Anom devices are currently used are Germany, the Netherlands, Spain, Australia, and Serbia,” the FBI affidavit states.