from 404 Media
Hello, and welcome to the four zero four Media Podcast where we bring you unparalleled access to hidden worlds both online and IRL. Four zero four Media is a journalist and a company that needs your support to subscribe. Go to 404media.co, as well as bonus content every single week. Subscribers also get access to additional episodes where we respond to their best comments, and they get early access to our interview series too, like this episode. Gain access to that content at 404media.co.
Joseph:So today, I'm speaking with Mike Bobbitt who was stationed in The Hague during the Anom operation. This was the largest STING operation ever. It is when the FBI secretly ran an encrypted phone company in order to wiretap the world, capture the communications of organized criminals. They basically ran a tech company for drug traffickers and hit them. So there's a fair bit of context that you need before you go into this interview.
Joseph:Some of you may know this because you may have read my book, Dark Wire, that's all about this operation and Mike comes up in that book repeatedly. Or maybe you're new to this world. But to step back for a minute, for years, criminals have used encrypted phones. Like, it used to be pages, right, then burner phones or a pay phone if you watch The Wire or something like that. That's just not how it works really now that we're well into the twenty first century.
Joseph:Drug traffickers, hitmen, money launderers, they use these devices which send well, at first it was end to end encrypted emails, then it became instant messages and now actually a lot of them are based on the signal protocol. Often they'll have the camera removed, the microphone as well, the GPS functionality and the idea is that this is a device I can securely communicate with my fellow drug traffickers to organize my shipments or my assassination attempts or whatever and reduce the attack surface. So if law enforcement do try to hack into it or do try to intercept my communications, there's much less material for them to get. So going back, I think in around 2008, there is a company called Phantom Secure. It is selling these sorts of devices on the BlackBerry handsets.
Joseph:The FBI starts investigating that company. It eventually shuts down Phantom Secure and there's a vacuum after that. Right? Because these drug traffickers, there were thousands of them on Phantom Secure, they need to quickly find another provider. Now some of them probably went to Sky, which is this massively popular encrypted phone company as well, but another player emerged.
Joseph:So in the wake of the Phantom Secure shutdown, somebody who sold phones to Phantom and for Sky actually came to the FBI with this really extraordinary offer saying, hey, I'm making the next generation of encrypted phone and I want to offer it to the FBI for you to use your investigations. And of course, there was money involved, a promise to, you know, drop or lower sentence of charges this person may or may not be facing now or in the future. There was a transaction there, obviously, but this company was called Anon. So the FBI took it rather than trying to place a backdoor into an existing phone company because they did try to do that Phantom Secure. They were just gonna run the tech company themselves, know, actually fund it, help it grow as much as they could.
Joseph:They didn't want to entrapment. They didn't wanna sell the phones to specific people, but they wanted it to spread organically. So they put in a backdoor that collects all of the messages sent across the NOM and the videos and the photos and the GPS location as well and things get going. And NOM starts in Australia. It's very small, very much word-of-mouth, you know, single digit devices to start and then dozens and then it becomes more and more popular until eventually, you know, the Italian mafia are using it inside Australia.
Joseph:Biker gangs or the Comacheros are using it, these really hyper violent gangs, Hells Angels as well. So it starts there and then eventually, because of the globalized nature of organized crime, the criminals using these phones, well, they need to get them over to Europe now where their collaborators and their coconspirators are, these people need to be able to communicate. You can only message someone on a Nom if you're also on a Nom. There's no cross pollination between these phone networks. So a Nom with the FBI's backdoor starts to move to Europe and that's where Mike, the person I'm speaking to in this interview comes in.
Joseph:In his role, he was relaying intelligence between San Diego FBI with that field office leading the Anom operation and Dutch authorities. Then his role does get a lot more involved as you'll hear and he sort of walks us through the Enom operation from the time when Enom lands in Europe. If you do want the rest of the story, of course, check out my book, Dark Wire, and there's plenty of coverage on 404media.co as well. I'll put some links below. But other than that, here's the interview.
Joseph:I hope you enjoy. Thank you so much for joining us and you're going to tell us all about Anom. I really, really appreciate it.
Michael:You're welcome. It's good to see you again, Joseph.
Joseph:Absolutely. So listeners have just heard me explain the beginning of Anom, you know, the FBI launching its own encrypted phone company or rather taking one over and then growing it through various means. How it started in Australia, then eventually it lands in Europe. And that's where you come into the story. And we will get to that.
Joseph:But to back up a little bit, can you tell us how you got into the FBI and the sort of work you were doing for the bureau before Operation Trojan Shield? Like, what were you doing in the FBI before that?
Michael:Sure. Well, my story is it it it starts when I'm in university, and I really have no idea what I wanted to do. I had always been drawn to serve my country, but the military was not something I'd considered even though my father had been in the army. And between that and the fact that I I became bored very easily, and I knew I needed something with a lot of variety. So the idea of being a special agent with the FBI was introduced to me, and I began to pursue it.
Michael:And that led to a change in my my field of study to become a CPA. I worked for Deloitte for just three years, and then I was fortunate enough that the FBI started hiring again during that period, and I was able to join. That would that was in 1998.
Joseph:Sure. So what start what sort of places and and investigations are you doing at the start? Like, what do they give to a new agent in 1998?
Michael:It's funny you asked that. At the time, it was still the the war on drugs was still really moving. So a lot of agents from my new agents class were going to Southern Border. And so I went to Houston. And I was it was really a fantastic time, and I was fortunate to join the squad.
Michael:DS six was the name of the squad. And we were to say we were a young squad was an understatement. We had one journeyman investigator. He, I think, only had five years in the FBI. Everybody else had three years or less.
Michael:We were squad of 12. I think there were three or four other probationary agents like myself. My training agent had just gotten off probation months before, and I really had no context for what we were doing. We were addressing some of the most prolific Colombian cartels and Mexican cartels. I really had no appreciation.
Michael:I didn't know what the Gulf Cartel was and was fortunate to join two other case agents that were working the golf cartel and end up dismantling the golf cartel. And then had the opportunity to work on some Colombian terrorist organizations myself, following on from some really talented investigators that had started the case previous. It as a young agent, really no appreciation for what I was dropped into. Had the opportunity to go overseas, worked in Budapest, Hungary, working Russian organized crime for quite a while. Then moved to Thailand after six years, spent two years in Thailand, then found my way to Denver and worked cyber intrusions, corruption, gangs, hate crimes, and a variety of other a variety of other violations.
Michael:And then at the very end, my family and I, we decided it might be nice to try to go overseas again. I had about eighteen years in the FBI at that point and found ourselves fortunate once again, and we're in The Netherlands working with the Dutch National Police and Europol.
Joseph:Yeah. That makes sense. How exactly do you end up at The Hague? Does Does just like the role come up and you can apply for it or or it's offered to you? Like like, how does that work exactly?
Michael:It's a good question. The FBI has a large presence overseas. We have representatives in every country or representing the FBI in every country for all criminal violations, national security matters, counterterrorism matters. But the numbers tend to be fairly low, so it's a very competitive position to obtain. It is and so I really count myself fortunate to have had the opportunity to to go overseas again to The Netherlands and find myself in The Hague.
Michael:And so this was a position I applied for and then was given it was a specific position sponsored by the criminal investigative division of the FBI and for the specific person, purpose of working organized crime, that would be dark web matters, encrypted communications, some of your traditional oligarchs, thieves in law, things like that.
Joseph:Yeah. And, of course, encrypted communications becomes very, very relevant a short while later. And, I mean, we'll get to that. Just before that, you you become a a legal attache. Right?
Joseph:That's what the the title or of this role is. Can you describe what exactly the the the point of that position is? Like, as you say, the FBI is all over the world. It has outposts and and offices globally. What is the purpose and the role of a legal attache?
Michael:Sure. It's a good question. So the legal attache, who actually would have been my boss, I was an assistant to the legal attache. Right. The legal attache is the FBI director's representative to that country.
Michael:So they represent the entire FBI. They're the voice of the FBI to manage all the FBI's work with that country. So we're working very closely with the domestic security services, foreign intelligence services, and obviously law enforcement in that country.
Joseph:Yeah. So you become you you enter that role and you're in The Netherlands and you're how how long are you doing work there before a nom comes up? Is it like a couple of years, something like that?
Michael:It's a couple of weeks, actually.
Joseph:Oh, wow.
Michael:But but I didn't know. I didn't know it was a nom. So in my in my handoff with my predecessor, he's taking me to meetings, and he says, you need to come meet this unit, of the Dutch National Police. We've been handing we've been passing them some intelligence from FBI San Diego. It's a it's a fairly sensitive operation related to organized crime, and that process should continue.
Michael:And so it was just in the first couple weeks with no context, no idea where the information is coming from, just that the FBI is passing intelligence to the specific unit of the Dutch National Police.
Joseph:Yeah. So they haven't told you yet that there's this phone company called Anom, and the FBI is secretly running it. When do they tell you that and sort of what was your reaction to learning that this wasn't just an ordinary operation? This was, oh, the FBI is running a tech company, basically.
Michael:It was actually quite a bit later. You may you may or may not know, but the FBI takes information security pretty seriously. So there are things even though you have the highest level clearances, if you don't have a need to know even within a specific investigation, you won't be privy to that information. So I knew I knew FBI San Diego was collecting intelligence. I didn't know how.
Michael:At first, I suspected it was through a human source. As I passed more and more information to the Dutch and that information began to broaden, it became apparent to me that it was technical collection, but I didn't know anything more than that, and I didn't ask. So it wasn't until quite a bit later, a few a couple months later, where more and more was being passed, and it became clear to me that they were collecting from telephones. But I didn't know even then, I didn't know the nature of the telephones. I had never heard the name Anam.
Michael:And then and then, obviously, once we started to push into expanding with our Dutch partners and then push into Europol, that's when things became more clear.
Joseph:So you're getting this information as you say at the start. It's like, maybe that's a human source then there's a lot of it. So it would be a very prolific human source to provide all of this information. That sort of theory goes out the window. But your you and the Dutch authorities start acting on this information like the way we've spoken about before is that you would get these phone calls from your colleagues at FBI San Diego and they would relay some sort of piece of information.
Joseph:Maybe there's a drug shipment going on. Maybe there's some sort of threat to life. I mean, in some cases, even the kidnapping. Right? Can you walk us through what you were doing there?
Joseph:You would get the phone call or receive the information some other way. What happened then when you got the information?
Michael:Sure. So I moved from passing information just on one particular cell, one particular I'm sorry. We have a name for them, it's just Syndicate. Syndicate. Thank you so much, Joseph.
Michael:I'm glad you remember the case better than I do. I was only passing information on one particular syndicate when it became clear that there were additional syndicates that the Dutch needed this intelligence on, and they they continued to go to that same unit. And so in this process, not only did I get access to Ola IBOT myself and started to search some of these syndicates that related to The Netherlands, But, obviously, FBI San Diego continue they were calling me, as you say, and saying, by the way, there is a a drug shipment coming in. Two days from now, it will arrive into The Netherlands. Can you please work with the Dutch and see if they can action it and do it in a way that will preserve the integrity of the collection platform?
Michael:So this is when I was beginning to learn what Anam really was, how it had been pushed out, the vastness of it. And so was part of the work, sort of making sure that drug shipments enforcement action was occurring in a safe manner, in a secure manner to serve our Dutch colleagues as well as continue the integrity of the platform. Sometimes this became more challenging as, as you say, there were threats to life. This was one of the primary responsibilities of the FBI to review all the information that was coming in and ensure that a NAAM was not being used to facilitate somebody being killed. But those would come to me at all times, day or night.
Michael:I would reach out to a specific point of contact within the Dutch. We would work out how this would unfold. He would contact the tactical units that would action this. We would agree on what information would be passed, what wouldn't be passed, what the nature of their tactical operation would include as not to, well, say, to keep our subjects off the path of where they may be getting compromised and and help them to think, maybe somebody turned us in. Maybe there's a snitch someplace.
Michael:Perhaps there's a camera outside. I don't know what it is, but we don't want them to think that it's their encrypted communication platform.
Joseph:Yeah. There's a few different tensions there where even though you've got the information and maybe at this point and or later on, you personally know it's a norm, maybe even the Dutch officials that you're communicating with know as well. But say, the SWAT team on the ground or whatever, they're probably not going to know it's a norm because you don't want that information to leak out. Right? That's one way it could potentially leak out is, you know, through lower ranking people just potentially.
Joseph:Right? The other tension is that if you move too aggressively and too quickly on like a certain shipment or some sort of other activity going on, it could become very obvious that it's the phones that have been compromised. How how did you deal with that tension of, well, let's not go too hard, but we still wanna do our jobs as well. Like, how did you deal with that?
Michael:Well, first of all, the Dutch are incredible professionals in this field. They had a lot of experience with encrypted communications in the past. They have a lot of experience with handling large drug trafficking networks in the past. And then on top of it, I would say the unit that I was dealing with was perhaps the best of the best. I mean, they really were professional, not only in their capabilities, but in their collaboration.
Michael:And so we had a level of understanding that once they came to understand, and I sat down with the leader of that unit, I told him exactly what this was, the degree of partnership that we wanted, the access we wanted them to have through FBI San Diego and Ola Ibot. They wanted the platform to stay strong for as long as possible as well. They could see the value in this. And so we just had a natural strong partnership there, and with that motivation to work together to find solutions. So you pull as many tools out of your toolbox as you can.
Michael:When you send that tactical team out there, obviously, they need to be safe. They need all the details that they could possibly have. But you provide instructions, and you say, hey, lead them to believe that maybe there was a tracker on the car. Make it look like you pulled a tracker off the car. And now they they think that's where this is coming from.
Michael:Or maybe plant the notion that somebody's brother or family member may have called the police and accidentally said something. So you use different techniques, and they seem very simple, but you layer them together so that you can plant doubt in their head. They already wanna believe that this platform is not able to be compromised, and so they're already going that way. There were times where you would ask them to take additional steps, so know the load is coming in, say, through a Dutch port, but it's headed to Poland or it's headed to Germany. And we would ask the Dutch, can you not take it off here?
Michael:Because that's where the devices are. Can you work with the Germans and let it transit all the way into that particular town, that target town in Germany, and then take it off there? Because they'll never then connect that seizure back to the group that has the encrypted devices. And with these partnerships, it was just amazing when these professionals were able to do that. Sometimes you can't, and I think you wrote about it in the book, Joseph, where you get a call, hey, there's a lab and it's sitting right next to a kid's daycare.
Michael:And it's just do what you gotta do. You know? You you make it as safe as you can, as quickly as you can, and you hope the platform can endure that. And and, obviously, obviously, we we did. Did.
Michael:So
Joseph:Yeah. Yeah. There are a few examples in this overarching story in the book where authorities just had to act basically. There wasn't really maybe the time or the space to well, let's let this drug shipment go slightly and then other authorities can get it. As you say, if there's a lab above a daycare or whatever, authorities are gonna want to act.
Joseph:Just to stress, letting drugs walk, that's the phrase, right, obviously made famous by shows like The Wire and that sort of thing. I mean, I remember speaking to some of, you know, your colleagues in San Diego and they understood that's a controversial practice ordinarily. Now we're doing it on an international scale and it paid off in many respects, right? Tons of drugs seized, all of that, but it's not a decision that should be taken lightly. Don't think people took it lightly either.
Joseph:Right? It's just like very complicated decisions going on that people had to deal with every single day. Can you briefly describe I mean, I'm not expecting you to remember the maybe the names of specific criminals or anything. I mean, I could. Maybe I'll get into that later.
Joseph:But what sort of tier of criminal are we talking about that was using a norm? Are these, like, low level guys? Are they pretty high level? Like, what was your impression of the sorts of criminals that were using this up?
Michael:That's a great question. And the answer to the question also highlighted It it it really turned the light, I should say, on the vastness of the number of criminals in this category. We assumed and when I say we, this was long before I was involved, the the case agents in San Diego and all their their partners early on assumed based off of previous platforms that we would only have the highest level of criminal groups. Obviously, there would be users that were using the encrypted devices that were were mules, that were just transporting money, and things like that. But but because of the cost of the device, because of the the as you know, you couldn't just run down to Best Buy and pick them up, you had to buy them from a criminal group, and those groups were at high levels.
Michael:You only had the highest level of criminals utilizing these networks. And so we assumed there would be x number of groups that would use them. We had no idea just how many high level criminal groups were out there, and I think all our partner countries were shocked by that. And and and it just it goes to show that they they need communication devices desperately. They need means to to complain and execute their their drug trafficking, murder for hire, money laundering, corruption, everything that we found.
Joseph:Yeah. I think it was an official Europol I spoke to about it who said, you know, they had some sort of understanding of the criminal the organized criminal underworld and it was X number billion dollars or whatever. And then when a norm happened and then the related investigations into EncroChat and Sky as well, which were in a way all part of a single overarching campaign to undermine the crypto phone industry for criminals. When those were done, this official said, well, they basically tripled our estimate of actually how big the criminal underworld was. Yeah.
Joseph:So it's not even just revealing specific criminals. It's revealing, oh, this is the actual scale of what we're dealing with here. Do do you agree with that? Is that is that kind of what you were seeing as well?
Michael:Yeah. There's no question. I mean, the the the math had to change because no one expected those numbers to show up. And the and and we were not seeing one kilo, two kilo. We were seeing thousand kilos, 5,000 kilos, 2,000 kilos.
Michael:The the numbers were amazing. The number of of attempted murders were amazing. I mean, you just we didn't expect to see that level of of criminality.
Joseph:Yeah. And Andrew Young, who was at one point the lead prosecutor on this case before he left the DOJ, he was also, you know, blown away by the public corruption, which you don't really ever see that because there are people in positions of power, in positions of authority who are abusing and exploiting that position. So they pretty rarely get caught, but a nom, encro chat, that sort of thing, it revealed that capacity as well. So you're getting all these tips. You're acting on them.
Joseph:Eventually, as you say, the the Dutch were actually given direct access to Holler iBot as well, But that can only go so far as well. Eventually, Europol as a a much larger organization becomes involved. Can you just walk us through how that comes about Europol's involvement and like why bring them in? Why do this very complicated and very large sort of collaborative effort?
Michael:Sure. As you may know, FBI San Diego's original plan was to bring all these partner countries from all the relationships that they intended to capitalize on from the different legal attitudes around the world, these trusted partners. They wanted to bring them all to San Diego. And there was this little thing called COVID and Right. It it messed that up as well and really had a big impact.
Michael:And so, at the time, we weren't able to bring those partners into The United States. It just wasn't going to be possible. And so, FBI San Diego, they thought, well, maybe it's easier if most of our partners are European partners, and they can and we can travel within Europe. What if we take them to one central place? So we proposed as a group different locations, and then they came to me and said, Mike, it just makes sense.
Michael:Could we set up something, some sort of group at Europol where we could bring all the partners together? And I don't remember how many there were at the time, about half as many as we ended with. Frankly, it sounded like an awful lot of work to me, and I was not interested. I also knew this would be difficult because Europol is a place where you go to share information. You do it in an open fashion.
Michael:It is about bringing together as many people as possible and getting things actioned quickly. But what we needed in this case was a very surgical, close hold way to share very specific information among a very small group. And we needed to do it in a way where perhaps specific people from a partner country were there receiving information, but even their Europol representative didn't know. They didn't even know why they were there. And and so there were a lot of sensitivities on how we would build this.
Michael:Well, fortunately, I had some great, great partners at Europol, some great partners with the Dutch and with the Swedes that kind of helped marshal this and put this together into an operational task force. And that's exactly what we decided to do.
Joseph:Yeah. And what does that or what did that look on a day to day basis when it starts? Because usually when I think of Europol, and I've covered the agency and the organization in the past, it's sort of what you described. It's like much more a clearinghouse for intelligence that was kind of already gathered maybe somewhat recently or maybe a little bit of a while ago and you just need to get something to the German authorities or whoever. This was a live operation, which I think was pretty unusual for Europol.
Joseph:So you all come there or the countries come here, and you're you're in this building. It's COVID still, right, as you alluded to. So it's quiet in some ways, but also busy in other ways. What did the organization and inside the building look like on a day to day basis when all of these countries have come and they're going through the unknown data?
Michael:Yeah. And we would go through swings where everything would be open and Europole would be really busy and we would struggle to find initially to find a space. A2 was our floor. And then suddenly everything closed. Your hole closes, and we're concerned they're gonna close us down, but no.
Michael:The leadership prevailed, and it was clear we were gonna persist. But that meant no food. You know, we were all eating out of the vending machines every day. It it was quite it was quite entertaining, just all these little extra things that you hadn't thought would complicate what you needed to do as people were coming and going, trying to get tested in and out, making sure that we, you know, we we we were properly spacing and things like that and following some of the regulations. Because we were also concerned.
Michael:We realized COVID could sweep through our entire team and almost shut us down. We almost avoided that entirely. We had a couple little instances and were able to avoid the entire team getting infected. What this looked like was all these countries, I think it was 17 in the end, 17 countries coming together in one long haul with offices on the sides where we had, you know, long tables, we would have meetings, we would come out. So you'd have pairs of countries in all these rooms doing their day to day work, access to Olaibat, collaborating with their countries.
Michael:And so, as I described before how I would work with the Dutch, and we would perhaps suggest, let's get this load to transit through Germany. Well, now as we're at Europol, one of my responsibilities in serving the case agents, I mean, I couldn't do it all on my own, obviously, but was to start this sort of operational collaboration with all the countries that were there. But it became much easier because now we have relationships. Now we didn't have to make phone calls. We were co located and we were able to work things out.
Michael:So you had this amazing exchange of a representative from Sweden coming out and saying, Hey, there's a load coming in. We wanna take it to Germany. No problem. And then the polls would say, Fine. We'll help it transit through.
Michael:And then you just had this you had it happening in front of you, which I'm not sure I could give your readers and listeners a sense of how unique that is. But these are things that are worked out over weeks and months with high level officials. And we're here on the floor of your hole, and people are committing to these extremely sensitive operations, dangerous operations like this. And then it just happens. And next thing we know, it we've had success, and load has been taken off exactly as we'd hoped, and the platform is safe.
Michael:So this was happening day after day after day as we would come together and share and plan talk about what individual's priorities were, what priority targets were, and then make sure those things were getting addressed.
Joseph:Yeah. There were often these meetings where different countries would come and they would highlight, well, this is what we have. And then the FBI would discuss, well, maybe you shouldn't do that one because that might be a bit too loud. I think this one's okay. You know, some countries do things by themselves.
Joseph:Others stick more in that in that framework. But it's incredibly complicated when you have, as you say, more than a dozen countries all trying to do their own thing, but in a way to keep this, you know, very wild operation secure. But you're getting all of these messages by early twenty twenty one. I mean, a norm is really big. It had 12,000 devices over its life cycle, but like 9,000 was sort of the peak, tens of millions of messages, a million messages a day at one point, all of which are not sorry, not all of which.
Joseph:Many of which have images which have to be analyzed because there's a gun or somebody's, you know, unfortunately beaten up body or something like that, like really violent graphic stuff on there. So it's clear that this can't last forever. As much as some of the European partners might want it to, it it it can't simply. So the decision is made to shut down the operation for June 2021. Just to round it off, can you walk me through that that day of when, okay, this is it.
Joseph:We're shutting down Anom now.
Michael:Sure. Certainly in the days leading up to that, there was a lot to be done. First, we needed to sort of coordinate. We had the innovative idea. You may be familiar with how countries exchange information through mutual legal assistance treaties.
Michael:This is a process whereby they submit a request. The Department of Justice reviews it. This can take months or a year to answer. And we knew that wouldn't be okay. We knew and Joseph, forgive me if you don't want this level of detail, but
Joseph:No, no, no. I actually think it's very, very relevant because MLATs weirdly come up a lot in my coverage, especially because a lot of cybercrime stuff now is obviously governed by MLATs Yeah. As well. But but those take a long, long time, so you need to find another arrangement to act on this data a lot more quickly.
Michael:That's right. But there is no other legal arrangement. That is the only avenue through which that country, which is part of OTF Green Line, can get this as evidence. And these countries, it was very clear that when we were approaching takedown, they would want to effect arrests, and they would want to do search warrants. So they would need evidence to support that.
Michael:So the case agents and I discussed that we should build this in reverse. We should write basically write the MLATs for those countries from DOJ's perspective so that DOJ, they would it would be preapproved, and we just have to provide the sort of the jibs in there. That way, when they handed us that inlet on takedown day, they would instantly have all the information that already received as intelligence as evidence, and they would be able to act on it. So we were doing this. We were also building the the media coordination.
Michael:As you know, one of the one of the impacts that FBI San Diego hoped to have was to really erode the faith and trust in encrypted communications. And so they wanted to have immediate impact so that people really could feel this degradation of trust in encrypted communications. And so that need to be coordinated. We wanted all the countries to have sort of a uniform message that would roll out as the sun moved across the globe. So that had to be done.
Michael:And then, obviously, it was prioritizing all the targets. Who's gonna arrest this target? Who's gonna arrest that target? Where are they gonna be? Can you pick this guy up for us?
Michael:Well, he'll actually be in another country. Can they arrange this? Yes. So it was everybody sort of horse trading who's going to arrest whom for whom, and what searches, and what evidence they needed within the group. And then, obviously, there was the stress surrounding would our infrastructure hold up long enough to reach takedown day?
Michael:Would we have so many devices on the platform that it might just fall over? Would it be the same fear that we'd had all along, but now it's bigger and bigger, and there were more and more seizures, and there was more and more discussion about perhaps a non is compromised, perhaps we can't trust it. So would it finally, as some previous platforms had done, would it get out there that the FBI was behind this too early? So all these things were just reaching this crescendo, if you will, might have taken quite a toll on the on the case agents from San Diego, all the all the investigators in San Diego, the analysts, everybody that was involved was was feeling that pressure.
Joseph:Yeah. And some criminal users of Anom did start to suspect the app. There's one major drug drug trafficker who used Anom, Maximilian Rifkin. He used the nickname Microsoft. He never doubted it.
Joseph:He probably put way too much faith and trust into Anom. He was making a lot of money selling the devices, but people he was trafficking drugs with, all of their friends, their drug shipments were being seized and like, it has to be the phones. So they were getting suspicious. Microsoft wasn't. And obviously, that was actually part of his downfall where he said, hey, stop using Sky.
Joseph:Sky is compromised, which did turn out to be true. But he didn't realize if I was running a nom. So you do this takedown day. Where are you the moment this stuff kicks off? Are you sat with the Dutch?
Joseph:Like, where are you? What happens?
Michael:Yep. We knew that obviously, the Australians and the Kiwis would kick off first, and then it would move move towards Europe. We knew the Dutch. We happen to be in The Hague, and we knew the Dutch. We'd worked so closely with them, and they were gonna be targeting some of their, I think it was six or seven high priority targets.
Michael:They had invited us to their operations center, which was a real treat to be able to go and sit there and watch it all unfold. And that was gonna happen, and we'd have time to get back to Europol as the rest of Europe was really executing all their warrants and all the information was coming in. We knew there would be last minute requests either for perhaps a country needed assistance locating a particular device, whatever that happened to be. So we laid this out and we're able to when we could get to the up center and get back. I did get a speeding ticket later as a result of of
Joseph:But you did you did get a speeding ticket?
Michael:Yeah. They just you know, they used cameras, so they just mailed it to me at the at the embassy, and I had to pay it. I was like, oh, you're welcome.
Joseph:Right. Yeah. The the cost of doing business on a day like that.
Michael:But that's what that looked like. So we we were able to be at at Europol as it unfolded. And, obviously, there were like first iterations. All the priority targets were hit first. Inevitably, you miss a few.
Michael:They're not at the house you think they are. They're at their girlfriends or their moms. And so as countries were iterating on this and hitting the second hole, the third hole, the fourth hole, this is all coming together. And you know that the platform is going to come down at midnight, And so everybody is it's all hands on deck in all these countries. I think there were 11,012 police officers around the world conducting arrest and search warrants in a coordinated fashion at one time.
Michael:So it was quite amazing. And we just basically sat in our op center and continued to mingle with our partners and make sure everybody had what they needed. And then it just became quieter and quieter and quieter and quieter as everyone understood what was happening.
Joseph:Yeah. Something like, well, as you say, thousands upon thousands of law enforcement officers, hundreds of arrests that day. Anom crossed over the line to a thousand arrests eventually, tons of drugs seized, weapons as well, threats to life mitigated. There's, of course, been a lot of the evidence working through the courts in Germany, Finland, other European countries where some courts have said, no, you can't actually use this evidence. Others and I think I don't have numbers in front of me, but I think the majority have said, yes, you can use it.
Joseph:Australia has ruled, yes, you can use it. As I go to in the book, they didn't do it in The US, first of all, of the novel legal workaround with Lithuania and collecting the messages, but then also it would just be a legal headache to sort of do stuff in in The United States. But this operation happens and then, you know, months, even years later, there there's more. There's X Glue, which was shut down by the Dutch. There was one called Matrix.
Joseph:There's even some other one I can't remember now. So I guess just my last question is what do you think sort of maybe it's too strong a word, but sort of yeah. What do you think the fallout of a nom is? As in law enforcement agents are still doing this sort of thing. They might not be running the company like the FBI did, but they're hacking them or they're compromising them.
Joseph:Like, what's the fallout from Enom, do you think?
Michael:Sure. I mean, I I have to have realistic measures and expectations for the criminal in the world. Until the demand for that which the criminals provide ends, there will be the criminal that provides it. And so they will always find a way. There's no question.
Michael:You know, early on, it was payphones, and then it was cellphones, and then it was switching cellphones, burners. And there will always be that balance between the logistical benefit of being able to communicate openly and freely and the hope for security and safety for their criminal operations. So that will always be the balance of the criminal organization. I do believe that ANAM and Operation Trojan Shield, the work that FBI San Diego did, had a massive impact on this. And in in context of the work that the Dutch and the other countries have done on the previous encrypted communication platforms afterwards, you're right.
Michael:I think the hats will continue. There will always be the question, is another government running another encrypted communication platform? I think it will it'll continue to erode that trust and make them shift from away from safety towards some sort of logistical inconvenience. It'll slow them down a little bit. It'll it'll it'll have a negative impact on them.
Michael:Will they find the new thing? I don't know what that will be. Smoke signals? I don't know. But, yeah, they'll find something new.
Michael:They'll always innovate. And then hopefully, you will see law enforcement, as the FBI did in this case, they will innovate as well. And they will take that long view, and they will put themselves in a position, as it said, be where the hockey puck's gonna be before it gets there. And that's how we continue to have impact in this. I think chasing is always a problem.
Michael:So I think NAAM had a huge impact, and there will always be a next thing. And I'm hopeful that I won't be there, but hopefully the FBI will be.
Joseph:Yeah. Well, I think that's a good place to leave it. Mike, thank you so much for joining us and and running us through that. I really, really appreciate it.
Michael:Yeah. It's been my pleasure.
Joseph:As a reminder, four zero four Media is journalist founded and supported by subscribers. If you do wish to subscribe to four zero four Media and directly support our work, please go to 404media.co. You'll get unlimited access to our articles and an ad free version of this podcast. You'll also get to listen to the subscribes only section where we talk about a bonus story each week. This podcast is made in partnership with Kaleidoscope.
Joseph:Another way to support us is by leaving a five star rating and review for the podcast. That stuff really does help us out. This has been four zero four Media. We'll see you again next time.