$ ~/archive/ play trojan-shield
transcript_decrypted.log
0.0 A smartphone sells for two thousand dollars. It looks
4.425 ordinary. A Google Pixel. Android. Open the
8.519 calculator app. Enter a specific numeric sequence. Press equals.
12.93 The calculator disappears. In its place opens an encrypted
17.341 messaging client. Between late 2018 and June 2021,
21.717 approximately twelve thousand of these devices circulate through
25.824 the global criminal underworld. They are bought by
29.93 Italian mafia cells, Albanian organized crime groups, Australian
34.037 outlaw motorcycle clubs, South American drug trafficking organizations,
38.143 and public officials accepting bribes in at least
42.25 five jurisdictions. Every message sent on every one of those
46.591 phones is copied, in real time, to the Federal Bureau
50.34 of Investigation.
52.774 The phones were designed by the FBI. The network was
56.685 operated by the FBI. The encrypted brand that criminals trusted
60.597 — ANOM — was an American government front. For thirty-three
64.883 months, the United States ran a communications company for the
69.095 international drug trade.
71.412 And read everything. This is a case file
75.534 about the most successful law enforcement sting operation in the
79.524 history of digital communications. The origin of the operation sits
83.584 in an older prosecution. 2018. San Diego. The FBI
87.894 takes down Phantom Secure, a Canadian company that
91.994 had for years sold encrypted BlackBerry devices to
96.093 criminal organizations. Among its customers: the Sinaloa Cartel.
100.193 Phantom Secure's founder, Vincent Ramos, pleads guilty to
104.293 racketeering. The company is dissolved. The takedown creates
108.708 a market vacuum. Criminal organizations, suddenly without their
113.021 preferred communications platform, begin migrating to alternatives — most
117.45 notably Sky Global and EncroChat. These too come under
121.878 eventual law enforcement pressure. EncroChat is penetrated by French
126.306 and Dutch authorities in 2020. Sky Global is indicted
130.734 in March 2021. But before any of that, in
134.99 late 2018, a San Diego field office handler meets with
139.097 a confidential human source. The source is known in court
143.582 filings only by the pseudonym Afgoo. Afgoo had been
147.677 a distributor for Phantom Secure. Facing federal charges, he cooperates
151.851 in exchange for a reduced sentence. He brings with him
156.024 something more valuable than testimony — a product in development.
161.883 A new encrypted communications device. Not yet released.
166.263 Branded ANOM. The San Diego office sees the
170.628 opportunity. Afgoo will introduce the device into his existing
175.059 distribution networks. The FBI and the Australian Federal Police
179.489 will insert themselves into the architecture before launch.
183.743 Every message on the platform will be copied. The operation
187.9 is named Trojan Shield. In Australia, Ironside.
192.204 In Europe, coordinated by Europol, Greenlight.
196.21 The technical architecture is deliberate. ANOM devices are
200.625 Google Pixel smartphones, purchased at retail and then
204.819 re-flashed with a custom Android ROM called ArcaneOS.
209.012 ArcaneOS strips the device of all standard functionality.
213.521 No voice calling. No email. No camera roll
218.007 synchronization. No location services. No third-party app installation.
222.494 No Google account. What remains: a messaging application,
226.824 a basic calculator, a clock, and a settings menu.
231.337 The messaging application is hidden.
235.675 On first power-up, the user is presented with what
239.878 appears to be a locked-down secondary phone. Pressing the
244.082 calculator icon opens a functional calculator. Entering a specific
248.285 mathematical sequence and pressing the equals key triggers a
252.489 hidden handshake. The calculator closes. The encrypted messenger opens.
257.008 The app pairs with other ANOM devices through what
261.196 are advertised as secure proxy servers. Messages are end-to-end
265.383 encrypted between devices. A remote wipe is triggered if
269.571 a specific duress PIN is entered. The number pad
273.76 randomizes between uses to defeat shoulder-surfing. Every security feature
278.004 that a criminal end user would verify in marketing materials
281.795 — is real. There is one additional function. Not
285.876 in the marketing materials. Every outbound message generates a
289.992 silent duplicate. The duplicate is encrypted to a master key
294.09 held by law enforcement. It is routed to a server
298.187 the FBI designates internally as the iBot server. The iBot
302.644 server is not on U.S. soil. This is a
306.87 legal design choice. U.S. Fourth Amendment case law imposes requirements
311.273 on the interception of communications within the United States. Routing
315.675 the collection infrastructure offshore — through a third-country partner —
320.078 allows the surveillance to proceed without triggering those requirements.
324.356 The partner is the Australian Federal Police. The collection
328.722 server operates under Australian legal authority. The intercepted content
333.087 is shared, through mutual legal assistance treaties, back to
337.454 U.S. investigators.
340.108 The architecture is a silent carbon copy. Encryption is honored
343.964 for every adversary of the user — except the one
347.819 the user does not know exists. Distribution is the
351.949 hardest part of the operation. Encrypted phone products
356.381 in this market do not advertise. They spread
360.687 entirely through word-of-mouth referral within criminal networks. A
364.993 cartel lieutenant recommends the device to a distributor.
369.3 A distributor recommends it to another organization. Trust
373.607 propagates through existing criminal trust relationships. Afgoo, the
378.085 confidential source, supplies the initial seeding. He provides the
382.285 first ANOM devices to three of his former Phantom
386.485 Secure distributors in October 2018. Adoption is slow
390.525 through 2019. By October of that year, the network
394.694 has a few hundred users. Then —
398.73 acceleration. In March 2021, French and Dutch law
402.899 enforcement penetrate EncroChat and shut it down. Sky Global
406.95 is indicted by the United States. The remaining encrypted
411.001 phone market consolidates. ANOM, perceived as uncompromised and having
415.051 operated under the radar for over two years, absorbs
419.102 a significant share of the displaced customer base. By
423.493 May 2021, the FBI affidavit states there are eleven
427.754 thousand eight hundred ANOM devices distributed across more than
432.015 one hundred countries. Approximately nine thousand are in active
436.276 use. The network has spread into Australia, Germany, the
440.702 Netherlands, Sweden, Serbia, Finland, Spain, Colombia, and parts of
444.792 the Middle East. The Swedish national police alone hold
448.881 active surveillance on six hundred users. The New Zealand
452.971 police identify fifty-seven.
456.019 Across the full network, Europol will later confirm
460.354 the collection of twenty-seven million individual messages.
464.464 Between 2019 and 2021, the FBI San Diego
468.628 field office builds the operational center. More
472.633 than one hundred agents and analysts, supported
476.601 by eighty linguists, run the daily intelligence
480.568 flow. Translators handle content in Albanian, Italian,
484.536 Mandarin, Serbo-Croatian, Spanish, Arabic, Dutch, German, and
488.503 Turkish. Collection is continuous. Analysis is triaged
492.47 for threat-to-life situations first, operational intelligence second,
496.438 prosecutorial evidence third. The operation produces explicit direct
500.881 quotes. "There is two kilos put inside french diplomatic
505.251 sealed envelopes out of Bogota."
509.047 That is one intercepted message. It refers to a specific
513.419 shipping method used by one organization on one date. In
517.79 isolation, it is useful to investigators in three countries.
522.04 Multiplied by twenty-seven million, across three years, it is
526.305 an intelligence corpus of unprecedented density on the global
530.57 drug trade. Public officials appear in the traffic. Corruption
534.969 investigations open in multiple jurisdictions based solely on ANOM-derived content.
539.447 Port authorities are named. Customs officers are named. Police officials
543.926 in at least four countries are named by the users
548.406 who are paying them.
551.882 The operation is not shut down because of failure. It
555.735 is shut down because of scale. June 7 and 8,
560.119 2021. The United States Department of Justice, Europol,
564.211 and the Australian Federal Police announce the operation
568.302 publicly. The initial numbers are staggering. More than
572.72 eight hundred arrests across sixteen countries in coordinated
576.824 raids. Eight tons of cocaine seized. Twenty-two tons
580.928 of cannabis. Two tons of methamphetamine. Fifty-five luxury
585.032 vehicles. Forty-eight million dollars in cash and cryptocurrency.
589.452 In Sweden alone, one hundred fifty-five arrests. In
593.559 Germany, more than seventy. In the Netherlands, extensive
597.667 operations against an Albanian-linked network. By the time
601.898 prosecutions stabilize in subsequent years, the arrest figure climbs above
606.391 twelve hundred. Seventeen foreign nationals are charged in San Diego
610.883 federal court under the Racketeer Influenced and Corrupt Organizations Act
615.376 — accused of knowingly distributing the ANOM platform to support
619.869 organized crime. As of April 2025, eight of the
624.208 seventeen have been extradited to the United States. All have
628.673 pleaded guilty. The first to be sentenced, Osemah Elhassen, a
633.137 Lebanese-Australian extradited from Colombia, receives sixty-three months in federal prison
637.602 in November 2024. The remainder are in various stages
642.005 of litigation.
644.606 Several defendants have filed motions to dismiss on jurisdictional
648.881 grounds. Their argument: the United States designed a surveillance
653.157 platform, deployed it globally, and used the resulting intercepts
657.432 to prosecute crimes that occurred outside U.S. territory, by
661.708 non-U.S. citizens, under non-U.S. jurisdiction. In September 2024, U.S.
665.983 District Judge Janis Sammartino rules against them. Jurisdiction, she
670.26 finds, is established because ANOM traffic was routed through
674.535 servers that briefly touched American infrastructure — and because
678.811 some of the criminal activity coordinated over the platform
683.086 had a San Diego nexus. The ruling
687.069 establishes a precedent. Digital jurisdiction is
690.944 constructible. Two reasons are given for the public disclosure.
695.38 The first is operational. ANOM's wiretap authorizations were approaching the
699.803 end of their renewal cycle. U.S. courts had permitted the
704.225 collection on a rolling basis, but perpetual renewal of wiretap
708.648 orders against an entire platform — as opposed to individual
713.07 subjects — was legally untested ground the Department of Justice
717.493 did not want to test further. The second reason
721.804 is strategic. The FBI wanted the existence of the operation
726.28 to become public.
729.307 Jamie Arnold, assistant special agent in charge of the San
733.497 Diego field office, states the strategic goal at the announcement.
737.687 "Criminals worldwide will fear that the FBI or another law
741.877 enforcement organization may, in fact, be running their platform."
747.018 The objective was not to maximize any single operation's duration.
751.406 It was to compromise the broader market. Every encrypted phone
755.794 company — legitimate or illicit, present or future — now
760.182 operates under the implicit question of whether its architecture is
764.571 still its own. Trust in the category has structurally
768.73 shifted. Between 2018 and 2021, every major hardened
773.216 encrypted phone platform serving criminal organizations has been
777.5 either dismantled by prosecution, penetrated by intelligence services,
781.784 or secretly operated by them. The market
785.844 category is effectively closed. Criminal organizations adapt. Reporting
790.311 since 2022 indicates a migration toward widely used
794.342 end-to-end encrypted consumer messengers — Signal, Telegram, WhatsApp
798.374 — mixed with operational security practices like device
802.407 rotation and disposable accounts. None of these offers
806.439 the vertically integrated control of a dedicated hardened
810.471 device. All of them offer something better. Ubiquity.
814.504 Cover traffic. The cover of the ordinary user.
818.851 The unresolved elements of the case file are procedural
823.228 and constitutional. The jurisdictional precedent remains contested in
827.431 appellate courts. The legal question of whether a U.S.
831.804 government front company, operated extraterritorially, with collection infrastructure in
836.176 partner nations, can generate evidence admissible against non-U.S. citizens
840.549 for crimes committed abroad — has not been definitively
844.922 resolved. The next encrypted platform operation — if one
849.177 exists — will not be announced. That is the entire
853.494 operating theory. Afgoo, the confidential human source who developed
857.674 ANOM, received a reduced sentence and has never been publicly
861.961 identified. He is, by the terms of his cooperation agreement,
866.249 protected.
868.362 Seventeen defendants remain in various stages of
872.325 U.S. prosecution. Twenty-seven million intercepted messages
876.301 remain in U.S. intelligence archives. Eleven thousand
880.665 eight hundred ANOM handsets were manufactured. A small number have
885.106 surfaced in secondary markets in Lithuania and Australia, purchased secondhand
889.548 by security researchers and reporters. The units still work. The
893.989 hidden calculator function still opens the messenger. The servers no
898.431 longer respond. Fragment Zero will track the case file.
902.689 The deeper question posed by Trojan Shield is not whether
906.322 the FBI will do it again.
910.186 It is whether they already are.
913.303 And which brand it is wearing.

Trojan Shield: How the FBI Sold 12,000 Encrypted Phones to Criminals

2026-05-18
RELATED INVESTIGATIONS
RELATED INVESTIGATIONS