Energy News  
CYBER WARS
Risky undercover work key in ANOM police coup
By Didier LAURAS
Paris (AFP) June 10, 2021

In bamboozling criminal networks into embracing a bogus encrypted messaging app, police relied on cutting-edge tech to outflank gangsters in the sting that has become known as ANOM.

In the operation some 12,000 phones were turned into listening devices, resulting in stunning success with more than 800 arrests worldwide so far.

But none of it could have worked without the oldest of law enforcement ruses: An inside man tasked with winning the trust of a suspicious and ruthless underworld.

"Human intelligence at the end of the day is still needed," said Vanda Felbab-Brown, an organised crime researcher at the Brookings Institute in Washington.

"What signals often give you is a technical picture, a picture of the network. It rarely gives you strategic intelligence: how do these people think, how do they make decisions," she said.

The ANOM sting was devised in 2018, when the FBI infiltrated and shut down the Canada-based Phantom Secure encryption service that had supplied its modified phones to crime syndicates.

It recruited a former Phantom developer to build the ANOM service and then made drug traffickers, arms sellers and others believe that they were a safe option for carrying out business.

The Trojan Shield operation, carried out with Australian police, prevented around 150 murders, foiled several narcotics shipments and led to seizures of 250 weapons and $48 million in currency, officials announced this week.

"This is quite a honeypot," said Bryce Pardo, a drug crime and policy researcher at the Rand Corporation, referring to systems that surreptitiously monitor and capture network data.

"I'm guessing a lot of people are smashing their devices and probably going into hiding," he said.

- Trust no one? -

The fact that hardened criminals, hypervigilant and wary by nature, were taken in by the sting will have others wonder whether they can trust anybody.

"It instills a very high level of insecurity at the highest level of groups, and they will become very distrustful of each other," Felbab-Brown said.

The uncertainty, the arrests and disrupted deals are likely to pay dividends for law enforcement for months.

In effect, the ground has shifted under criminals' feet -- How to communicate? Are risky face-to-face meetings going to be required more often? And how to know if the next encryption service to emerge will truly be secure?

"It makes it difficult for these groups to persist with those kind of operations," Felbab-Brown said.

Rival groups that were not ensnared by the ANOM deception could take advantage of the situation, expanding their operations or moving into new markets or territory.

"It certainly opens the possibility of significant changes in the global criminal landscape," said Jake Harrington, a former FBI officer now with the Center for Strategic and International Studies in Washington.

- 'Primitive methods' -

Adding a landmark technological coup to a classic sting is likely to become standard operating procedure for police agencies hoping to keep up with increasingly sophisticated criminal networks.

"This is the first time where law enforcement designed and rolled out an encrypted chat service on its own," Pardo said. "That fact alone may scare other criminal groups from using encrypted chat services."

It will also force changes to other time-tested techniques for underworld dealings.

A park meeting with a conspirator wearing sandals and a T-shirt to prove he is not wearing a wire, for example, will be just as important as enlisting IT specialists to devise new covert communication techniques.

For intelligence agents, figuring out how to track deals made with bitcoins will be as essential as keeping an eye on handovers of bags full of cash.

And while ANOM illustrated the huge role played by new technologies, it also proved that grooming undercover recruits remains key for making inroads against organised crime.

"We'll be combining super-modern technologies with very primitive methods," Felbab-Brown said.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The Space Media Network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceMediaNetwork Contributor
$5 Billed Once


credit card or paypal
SpaceMediaNetwork Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Tough fight looms against ransomware 'epidemic'
Washington (AFP) June 8, 2021
The latest wave of ransomware attacks hitting the United States and globally portends a difficult battle against hackers, even as government and the private sector ramp up defenses. The attacks hitting the Colonial Pipeline and the major JBS meatpacking operations are examples of a burgeoning cybercrime industry with the potential to inflict pain and extract profits by impacting "critical" networks, experts say. Other recent targets include local governments, hospitals, insurers, a ferry system ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Seaweed experts launch global group to restore kelp forests with new technique

Environmental concerns propel research into marine biofuels

Transforming CO2 into light-emitting carbon

Saving the climate with solar fuel

CYBER WARS
Chile inaugurates Latin America's first thermosolar plant

Major advance in fabrication of low-cost solar cells also locks up greenhouse gases

Using AI at the first line of defence for portable solar and battery powered security systems

Holograms increase solar energy yield

CYBER WARS
US to open California coast to wind power

US approves its biggest offshore wind farm yet

Vertical turbines could be the future for wind farms

Researchers working to further develop monopile production for offshore wind farms

CYBER WARS
S.Africa intensifies power cuts as winter demand climbs

Clean investment surge needed to meet climate goals: IEA

G7 steps towards making companies disclose climate risks

Putin orders govt to have emissions reduction plan by October

CYBER WARS
Engineers design battery to power flying cars

Compound commonly found in candles lights the way to grid-scale energy storage

China's artificial sun brings nuclear fusion energy closer

Highview Power Developing 2 GWh of Liquid Air Long Duration Energy Storage Projects in Spain

CYBER WARS
Sri Lanka sued over ship disaster as possible oil spill looms

Indonesian women take on plastic waste brick by brick

Sri Lanka recovers black box from sinking ship, aborts dive

Biden administration will restore key environmental protections

CYBER WARS
Activists block controversial pipeline on US-Canada border

MITEI researchers build a supply chain model to support the hydrogen economy

Shell to speed up carbon reduction after Dutch ruling

Blocked by Biden, Canadian company drops Keystone pipeline

CYBER WARS
InSight Mars Lander Gets a power boost

NASA's Curiosity rover captures shining clouds on Mars

Surviving an in-flight anomaly: what happened on Ingenuity's 6th flight

Newly discovered glaciers could aid human survival on Mars









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.