Logo
    Search

    146: ANOM

    en-usJune 04, 2024

    Podcast Summary

    • Connected device surveillanceAdvanced spyware can turn seemingly ordinary devices into covert listening devices, emphasizing the importance of being aware of privacy features and securing digital communications.

      Advanced spyware, such as the CIA's Weeping Angel, can turn seemingly ordinary devices like Samsung smart TVs into covert listening devices without the user's knowledge. This is a reminder that our connected devices may have hidden capabilities and vulnerabilities that could potentially be exploited for surveillance. It's crucial to be aware of the privacy features of our technology and to use them effectively. The story of Weeping Angel also highlights the importance of securing our digital communications and being cautious about the data we share online. Additionally, the interviewee, Joseph Cox, emphasizes the significance of privacy in our digital lives and the importance of staying informed about the latest privacy trends and technologies.

    • Privacy vs Criminal ActivityA seemingly secure messaging app, Anom, was secretly used by law enforcement to gain access to encrypted conversations between criminals, blurring the lines between privacy and criminal activity.

      Anom, a seemingly private and secure messaging app hidden within a calculator app, was actually a tool used by law enforcement to gain access to encrypted conversations between criminals. The creator of Anom, AFGHU, was a tech expert in the criminal underground who had previously sold encrypted phones to criminals. Anom marketed itself as the Rolls Royce of encrypted phone industry, promising end-to-end encryption and no data sharing with law enforcement. However, Anom had a hidden feature that sent a blind carbon copy of every message to Anom's servers, allowing law enforcement to have access to the conversations. The deal between AFGHU and law enforcement allowed them access to these messages in exchange for leniency if AFGHU faced charges. This example highlights the complex and often blurred lines between privacy, security, and criminal activity. It also raises questions about the ethics and legality of such undercover operations.

    • Law Enforcement EthicsLaw enforcement agencies paid for access to encrypted devices, raising ethical concerns and potential risks to civil liberties and the rule of law.

      During an undercover operation to investigate criminal activities using encrypted communication devices, the law enforcement agencies found themselves in a complex situation where they had to balance the need for intelligence gathering with the potential risks of revealing their involvement. The agencies, including the FBI and AFP, paid the creator of the encrypted communication company, AFGOO, for access to the devices and infrastructure. This arrangement raised ethical concerns, as the agencies were essentially running a tech company for criminals while lying about the source of their intelligence. The operation, known as Anom, was kept secret from the developers and suppliers involved. The ends justifying the means argument is questionable, as past operations like Fast and the Furious have shown that such tactics can lead to unintended consequences and harm. The implications of these tactics on civil liberties and the rule of law are significant and deserve further scrutiny.

    • Encrypted communicationsThird parties can gain unauthorized access to encrypted communications for archiving or monitoring purposes, raising ethical concerns and questions about transparency and consent

      While companies and individuals may believe they are communicating securely through encrypted apps, there may be hidden third parties with access to those communications for archiving or monitoring purposes. This was the case with Anom, an encrypted communications platform marketed to businesses, which was secretly being used and exploited by law enforcement agencies and criminals alike. The developers believed they were creating a secure platform with archiving capabilities for businesses, but were unaware that the phones were being sold to criminals and the archiving feature was being used by law enforcement. This example highlights the complex interplay between technology, privacy, and law enforcement, and raises important questions about transparency, consent, and the ethical implications of such practices.

    • Digital Surveillance and PrivacyThe FBI's use of mass surveillance raises ethical concerns, potentially violating individual privacy and the 4th Amendment, highlighting the need for clear boundaries between defense and offense in the digital realm.

      The line between defense and offense in digital surveillance can be blurry, and the implications for individual privacy are significant. The FBI's use of mass surveillance in the name of defense raises ethical concerns, particularly when it comes to the collection and storage of data from innocent individuals. The comparison to physical intrusion highlights the importance of maintaining privacy standards in the digital realm. The potential for mass spying, even if targeted at criminals, can lead to a slippery slope towards government overreach and a violation of individual rights. The 4th Amendment, which protects citizens against unreasonable searches and seizures, is crucial in maintaining this balance. The FBI's use of hollaibot to analyze all chat messages without individual warrants could potentially be in violation of the 4th Amendment. Ultimately, the conversation around digital surveillance and privacy is an urgent one that needs to be had as a society.

    • AI-assisted surveillanceThe FBI's use of AI-powered HOLA iBot interface allowed them to quickly identify threats and save lives in the encrypted communication platform Anom, but presented ethical dilemmas and legal challenges

      During the operation of the encrypted communication platform Anom, law enforcement agencies, including the FBI, faced an unprecedented challenge in dealing with vast amounts of data related to criminal activities, including drug trafficking and threats to life. To manage this data, the FBI developed an advanced surveillance interface named HOLA iBot, which allowed them to visualize connections between users and use AI to search for coded messages. This was crucial as criminals used code words and pseudonyms to evade detection. The interface helped law enforcement agencies save lives by quickly identifying threats and acting on them. However, the use of this tool also presented ethical dilemmas, as it sometimes involved saving the lives of criminals and dealing with the potential backlash from criminal organizations. Additionally, the FBI encountered difficulties in accessing communications on Anom that originated from within the United States due to legal restrictions, creating a complex situation for law enforcement.

    • FBI's ethical dilemmas in investigating cybercrimeThe FBI's operation to gain access to encrypted messages for drug investigations faced ethical dilemmas and resistance, raising questions about the role of law enforcement in the digital age and the implications for privacy, security, and societal norms.

      The approval of the FBI to gain access to encrypted messages for drug investigations faced significant resistance from some prosecutors and a lengthy delay in approval from the Office of Enforcement Operations. This situation led to ethical dilemmas regarding the use of hacking and secretly running a tech company to facilitate crime investigations. The FBI's role as a tech backbone of organized crime raises questions about their ethical responsibility. The implications of this story are vast, and it introduces many ethical, legal, and societal questions that need to be addressed in an open debate. The FBI's operation, Operation Trojan Shield, which involved the creation and operation of its own encrypted communication company, Anom, to investigate criminal activities, raises concerns about privacy, security, and the role of law enforcement in the digital age. The success of this operation, which involved the arrest of over 10,000 individuals, also highlights the need for continued innovation and international cooperation in law enforcement to combat cybercrime.

    • Cybercrime InvestigationsLaw enforcement actively investigate cybercrimes and stay updated on hackers' tactics through conferences and collaborations with Dutch authorities.

      Law enforcement are actively investigating cybercrimes and working to stay updated on the latest tactics used by hackers. Journalist Joseph Cox shares this insight from his book, "Dark Wire," which he obtained by attending law enforcement conferences. The Dutch authorities confirmed this ongoing effort. The story delves deeper into the complex world of cybercrime and the cat-and-mouse game between law enforcement and hackers. To learn more about this intriguing topic, read "Dark Wire" by Joseph Cox. The episode was created by The Bit Bumbler, Jack Rhysider, with editing by Tristan Ledger and mixing by Proximity Sounder. An old computer with an IP address of "1" was a reminder of the importance of staying informed about cybersecurity. This is a snapshot of the Darknet Diaries podcast.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices