Logo

    What's the best phone to do crimes on?

    enAugust 16, 2024
    What role does technology play in organized crime today?
    How has podcasting influenced traditional radio production?
    What was the purpose of the FBI's Anom operation?
    What implications arise from using encrypted communication apps?
    Why are targeted hacking methods controversial in law enforcement?

    Podcast Summary

    • Technology and Criminal UnderworldTechnology is transforming the criminal underworld by providing tools for more secretive operations, such as encrypted mobile phones for organized crime.

      Technology continues to shape industries and our lives in significant ways, sometimes bringing about unexpected changes. For instance, eBay Motors leverages technology to provide car parts with guaranteed fit, while podcasting transformed radio production. In the criminal underworld, encrypted mobile phones have become a high-tech weapon, allowing organized crime to operate more secretively. Journalist Joseph Cox has made a career out of speaking to criminals and has seen firsthand how these criminals embrace technology to stay one step ahead. The story of Phantom Secure encrypted phones in Australia's criminal underworld illustrates this trend. As technology advances, it's crucial to understand its implications and adapt accordingly.

    • Anom's criminal reseller networkAnom grew by relying on a criminal reseller network to ensure security and exclusivity, allowing it to cater to the unique needs of criminal clients in the digital age

      Anom, an encrypted phone company, emerged as a new player in the market after Phantom Secure was shut down. Anom differentiated itself by offering advanced security features, such as hidden applications and powerful wipe systems, while also delivering a user-friendly, feature-rich smartphone experience. The company relied on a criminal reseller network for growth, ensuring that only vetted criminals had access to the phones, thereby maintaining security. Hakan Aik, a notorious Australian drug trafficker, played a significant role in Anom's expansion. His success in uniting various criminal organizations under a single network made him an early adopter and a system administrator on the Anom network. The combination of advanced security features and a criminal-exclusive distribution network proved successful for Anom, enabling it to cater to the evolving demands of criminals in the digital age.

    • Criminal InfluencersInfluential figures in the criminal world can significantly promote and grow new norms or technologies, but their influence also makes them high-risk targets for law enforcement

      In the criminal world, just like in legitimate businesses, influencers play a crucial role in promoting and growing new norms or technologies. In this case, a criminal network called Anom, which used an encrypted communication platform, gained significant traction thanks to influential figures like Akan Ayek and Microsoft, who were not only major users but also sellers of the platform. These criminal influencers brought in new users and helped Anom dominate the international crime world. However, their influence also made them high-profile targets, leading to the downfall of some of them, such as Microsoft, when their criminal activities were discovered.

    • Operation Trojan ShieldThe FBI ran a multi-year undercover operation called Anom, posing as an encrypted communication company to catch international criminal syndicates, leading to hundreds of arrests for drug trafficking, money laundering, firearms violations, and crimes of violence.

      The FBI's operation, named Operation Trojan Shield, ran its own encrypted communication company called Anom to catch international criminal syndicates. This company, which was used almost exclusively by criminals, was a multi-year, expensive FBI project. The Bureau cooperated with law enforcement in various countries to make hundreds of arrests for drug trafficking, money laundering, firearms violations, and crimes of violence. The criminals had sold over 12,000 encrypted devices and services to more than 300 criminal syndicates operating in over 100 countries. Despite suspicions about the phones being insecure, the FBI believed Anom to be completely secure. Eventually, a law enforcement agent in San Diego held a press conference to announce the arrests, marking the end for the criminals using Anom. This operation's worldwide implications were staggering.

    • FBI's Anom operationThe FBI gained control of a criminal encrypted communication network, Anom, by taking advantage of a former employee's offer for leniency after the shutdown of Phantom Secure. The operation allowed the FBI to potentially dismantle criminal networks on a global scale.

      The FBI's unprecedented move to run a criminal iPhone company, Anom, was a result of the shutdown of Phantom Secure in 2018. The FBI attempted to gain access to Phantom Secure but was unsuccessful. They then seized an opportunity when a former Phantom Secure employee, Afku, offered them control of Anom in exchange for leniency. This presented a significant opportunity for the FBI as it could potentially expose entire criminal networks through controlling the phones. The FBI outsourced the development of the app to ordinary Android developers, who were unaware they were working for a criminal surveillance apparatus. The developers believed they were working for a legitimate Android development company making an encrypted messaging app for corporations. The FBI's Assistant US Attorney, Andrew Ye, played a key role in this operation, coming from the world of tax and white-collar crime. This unusual approach allowed the FBI to potentially dismantle criminal networks on a global scale.

    • Anom operationThe Anom operation disrupted international drug trafficking and organized crime by targeting the entire industry and investigating corruption and criminal activity, revealing a much larger underworld than previously estimated with extensive public corruption and normalization of violence.

      The Anom operation, led by the FBI, represented a groundbreaking approach to disrupting international drug trafficking and organized crime. Instead of the usual practice of seizing drugs at the border and offering pre-written plea deals, the team aimed to disrupt the entire industry and investigate the vast scale of corruption and criminal activity. The discovery of Anom revealed the underworld to be much larger than previously estimated, with extensive public corruption and an alarming normalization of violence and criminal activity. The content of the intercepted messages was overwhelmingly criminal, with calls for assassinations and other violent acts casually discussed. The sheer callousness and lack of remorse from the criminals involved were striking, and the ethical decision by law enforcement to intervene when threats to life were identified underscores the importance of such operations in protecting public safety.

    • Crime prevention tactics, ethical dilemmasLaw enforcement tactics to prevent crimes on encrypted networks come with ethical dilemmas and challenges, such as the timely sharing of information, potential unintended consequences, and difficult decisions on when to end operations.

      Law enforcement agencies like the FBI use various tactics to prevent crimes and apprehend criminals, including monitoring criminal communications on encrypted networks like Anom. However, the success of such operations comes with challenges and ethical dilemmas. For instance, the timely sharing of information between law enforcement agencies can be crucial in preventing crimes, but it can also lead to unintended consequences, such as the death of innocent people. Additionally, the decision to end such operations, which can involve significant resources and manpower, is not an easy one. The case of Microsoft and Hakana Yek, despite being high-value targets, illustrates the challenges of completely eliminating criminal activities, even with advanced technology and intelligence. Ultimately, the balance between public safety and individual privacy, as well as the potential consequences of law enforcement actions, are complex issues that require careful consideration.

    • Privacy vs. Law EnforcementThe success of law enforcement in disrupting criminal use of encrypted communication platforms has led to concerns about the potential impact on ordinary users' privacy, as some criminals shift to consumer apps.

      The line between privacy and criminal activity can be blurry, and the ongoing battle between law enforcement and encrypted communication platforms raises complex questions about individual privacy and national security. The global drug trade continues to thrive despite large-scale sting operations, leading some to question the effectiveness of current approaches. The arrest of Hakan Aik, a notorious criminal accused of running a global drug empire, highlighted the success of law enforcement in sowing mistrust in encrypted phones used by criminals. However, this success has created a new problem, as some criminals now prefer using consumer platforms like encrypted messaging apps, potentially putting ordinary users' privacy at risk. The debate over the balance between privacy and law enforcement continues, with European legislators proposing legislation to scan encrypted messages for criminal content. Ultimately, it's up to individuals and societies to decide where they stand on this issue and how they want law enforcement to handle consumer privacy platforms.

    • Secure apps and privacyThe use of secure apps can unintentionally make it easier for authorities to access sensitive information, and a more targeted approach with individual warrants may be a more acceptable solution.

      The use of secure apps, while intended to protect user privacy, can unintentionally make it easier for authorities to access sensitive information. This can lead to a compromise of the entire communication platform, as seen with Anom. An alternative suggestion is targeted hacking, which allows the harvesting of specific information in a less invasive manner. However, this raises ethical and practical concerns, as it requires significant resources and expertise. Ultimately, the status quo of mass surveillance is unsustainable, and a more targeted approach, such as requiring law enforcement to obtain individual warrants to access specific devices, may be a more acceptable solution. The use of secure, encrypted apps like Signal has become increasingly popular, with a diverse range of users, including journalists, lawbreakers, and ordinary individuals. The FBI's actions in monitoring encrypted communication networks highlights the need for a more nuanced approach to balancing security and privacy concerns. For those seeking the most secure phone solution, a graphene OS phone and an app like Signal are recommended. However, it's important to note that this advice is not intended for criminal activity. Instead, it reflects the growing concern for individual privacy in an increasingly surveillance-driven world.

    Recent Episodes from Search Engine

    A stubborn lunatic’s guide to making great art

    A stubborn lunatic’s guide to making great art
    25 years ago, The Sopranos, the best television show ever created, premiered. This week, a new documentary called Wise Guy asks the question: how did a show considered so risky & uncommercial even get made? We’re interviewing Wise Guy director Alex Gibney about that question, and about how stubborn lunatics like him and David Chase got to make the projects they wanted to make. Incognito Mode, our ad-free, no-rerun, bonus episode feed. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enSeptember 13, 2024

    Can I microdose veganism?

    Can I microdose veganism?
    If you care about animals, but don't want to stop eating them... what's the least you could do while doing the most good? That question, posed to The Atlantic's Annie Lowrey, leads us to a pair of true crime stories about animals. Turkeys plummeting wildly from the sky and a private investigation involving a small brown cow. Links to Annie Lowrey's Reporting Tossing a Bird That Does Not Fly Out of a Plane The Truth About Organic Milk Links to Live Events Brooklyn Live Event with Freakonomics - Thursday, September 26th Amsterdam Live Event with Podimo - Thursday, October 3rd To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enSeptember 06, 2024

    What's the best phone to do crimes on?

    What's the best phone to do crimes on?
    For years, the must-have phone for the discerning drug trafficker or hitman was a brand you may not have heard of: AN0M. Reporter Joseph Cox tells us the story of the AN0M phone, its sudden rise and shocking fall, and the shadowy group behind its invention. Joseph's new book: Dark Wire. Incognito Mode, our ad-free, no-rerun, bonus episode feed. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enAugust 16, 2024

    Is there a sane way to follow this election?

    Is there a sane way to follow this election?
    We are in an eighty-eight day sprint to the Presidential election. How would you follow this story if you wanted to actually understand something, instead of, like me, just feeling very anxious several times a day? We talk to Ezra Klein about how he follows elections and his own strange role in this election cycle. If you'd like to check out some of Ezra's election coverage this year, here are some good places to start. Democrats Have a Better Option than Biden (February, 2024) Are Democrats Right to Unite Around Kamala Harris? (July, 2024) Is Tim Walz the Midwestern Dad Democrats Need? (August, 2024) And if you'd like ad-free episodes of Search Engine, and bonus episodes, head to searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enAugust 09, 2024

    The End

    The End
    A trip to Greenland, a chance encounter with Coolio, and the end of the world. (This summer we’re publishing some of our favorite episodes from our previous series, Crypto Island.) Support the show over at searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enAugust 02, 2024

    The Kidnapping of Ape #8398

    The Kidnapping of Ape #8398
    An art heist in the crypto world plunges us headfirst into another mystery — why did so many celebrities suddenly start selling us on NFTs last year? (This summer we’re publishing some of our favorite episodes from our previous series, Crypto Island.) Support the show over at searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enJuly 26, 2024

    Genesis

    Genesis
    This week: Bitcoin. We trace it from its humble origins in a .PDF to the movement it has spawned, all over three days at an enormous Bitcoin conference in Miami. (This summer we’re publishing some of our favorite episodes from our previous series, Crypto Island.) Support the show over at searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enJuly 19, 2024

    The Bidding War

    The Bidding War
    A story about a strange auction for perhaps the most valuable piece of paper in America. This summer we’re publishing some of our favorite episodes from our previous series, Crypto Island. Support the show over at searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enJuly 12, 2024

    Why didn’t Chris and Dan get into Berghain? (Part 2)

    Why didn’t Chris and Dan get into Berghain? (Part 2)
    We travel to Germany to trace techno's history from Detroit to Berlin. The story of how, after the Wall fell, Berlin exorcised its brutal past with a very strange, decade-long party. A mission that takes us all the way to the gates of Berghain.  Music Credits: Original composition in this episode by Armen Bazarian. Additional Tracks: Game One - Infiniti, Dead Man Watches The Clock - Marcel Dettmann & Ben Klock, The Call - Marcel Dettmann & Norman Nodge, Quicksand - Marcel Dettmann. Full playlist here. Sven von Thüle: https://soundcloud.com/svt // Der Klang der Familie Gesine Kühne: https://soundcloud.com/wannadosomething Support the show at searchengine.show! To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enJune 26, 2024

    Why didn’t Chris and Dan get into Berghain? (Part 1)

    Why didn’t Chris and Dan get into Berghain? (Part 1)
    Two Americans embark on a quest: fly across an ocean to try to get into the most exclusive nightclub in the world – Berghain. A German techno palace where the line outside can last 8 hours, and the bouncers are merciless in their judgments. The club does not explain how it makes its decisions about who can enter, but one foolish podcaster will try to explain anyway.  Support the show: search engine.show To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
    Search Engine
    enJune 21, 2024