Description
Encrypted communications are important for everyone, even if you have nothing to hide. But they're also important when you're trying to hide global criminal operations. Drug smugglers and money launderers have special needs when it comes to secure messaging. Several phone companies were created to address this market. Unfortunately for the criminals, the most popular one - Anom - was secretly run by the FBI. Today Joseph Cox from 404 Media will tell us about this astoundingly audacious sting operation, which is the basis for his book, Dark Wire.
Interview Notes
Order Dark Wire: https://a.co/d/h9o7ump
Anom website (right before take down): https://web.archive.org/web/20210507151115/http://anom.io/
Phantom Secure website (circa 2017): https://web.archive.org/web/20170330122723/http://phantomsecure.com/
Vice Anom story: https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor
Anom phone video: https://www.youtube.com/watch?v=EA1KS-xh0n0
Operation Trojan Shield: https://en.wikipedia.org/wiki/Operation_Trojan_Shield
Trojan Shield press conference: https://www.youtube.com/watch?v=S89O0nis_ss
Encrochat: https://en.wikipedia.org/wiki/EncroChat
Further Info
Send me your questions! https://fdsd.me/qna
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Subscribe to the newsletter: https://fdsd.me/newsletter
Become a patron! https://www.patreon.com/FirewallsDontStopDragons
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Support our mission! https://fdsd.me/support
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:54: Migrating to Mastodon
0:02:24: Embracing the dark... mode
0:02:45: Countdown to 400
0:03:28: Interview setup
0:04:30: How did this all start with you on an obscure forum for criminals?
0:08:34: What was Operation Trojan Shield?
0:10:49: How did the FBI start a secure phone company?
0:12:41: What were some of Anom's key tech features?
0:15:26: Where did they get the Arcane Operating System?
0:17:56: How did the 'duress' feature work?
0:20:18: How did Anom copy encrypted messages without being detected?
0:24:35: How were these phones marketed to criminals?
0:28:10: What does these phones cost?
0:30:09: What were the legal aspects for this multi-national operation?
0:34:49: How did they use this intelligence without revealing the source?
0:39:38: Did the criminals ever suspect the phones?
0:42:04: How did this all come to an end?
0:46:14: So, are we 'going dark' or not?
0:49:27: What lessons did the FBI take away from all this?
0:51:36: Can we still trust things like Signal and Proton?
0:55:39: What's your next big story or book?
Holiday shopping season is here! And today I'll give you the highlights of my annual Best & Worst Gift Guide for 2024, with regard to privacy and security. The worst offenders may not surprise you, though some have actually gotten worse since just last year. And I have a few new suggestions...
Published 11/18/24
Device manufacturers are breathing new life into old mundane products by connecting them to the internet, giving us the ability to monitor and control them from anywhere. However, this connection to the cloud works both ways. Not only do device makers now have unprecedented access to our usage...
Published 11/11/24