{"id":1628,"date":"2021-06-10T10:57:58","date_gmt":"2021-06-10T14:57:58","guid":{"rendered":"http:\/\/ielrblog.com\/?p=1628"},"modified":"2021-06-10T10:57:58","modified_gmt":"2021-06-10T14:57:58","slug":"anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap","status":"publish","type":"post","link":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/","title":{"rendered":"ANOM: A global covert investigation conducted through an encrypted app trap"},"content":{"rendered":"<p>Sara Kaufman<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a><\/p>\n<p>On June 8, 2021, the Federal Bureau of Investigation (FBI) and Australia\u2019s Federal Police (AFP) publicly announced the arrests of more than 800 individuals utilizing a FBI-controlled encrypted platform to facilitate their criminal activities.<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>\u00a0 ANOM, a highly popular encryption platform amongst criminals worldwide, was secretly used as a surveillance tool in an investigation known as \u201cOperation Trojan Shield\u201d in order to discreetly observe and curtail the criminal activities in Australia and beyond.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a><\/p>\n<p>As technology has grown over the years, criminals have utilized hardened encrypted devices as a tool to obstruct any federal investigations against them.\u00a0 Encrypted devices are tools that both send and retrieve encrypted electronic communications, allowing criminals to openly discuss their activities with confidence that their contents will remain secure.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a>\u00a0 For many years, contents in encrypted devices did in fact remain secure; communication was often limited to a self-selected group of individuals using the same encryption platform.\u00a0 Law enforcement agents therefore would be unable to collect evidence regarding the conversations that criminals were having on their encrypted devices.<\/p>\n<p>Companies that provided these encrypted devices were generally aware that their target audience is utilizing their products for criminal activity; in March 2018, the CEO of Phantom Secure, Vincent Ramos, and four other principals of the company were indicted for aiding and abetting the distribution of cocaine. \u00a0During his plea hearing in October 2018, Ramos admitted that Phantom Secure laundered drug trafficking proceeds, as well as aided and abetted the importation, exportation, and distribution of illegal substances across international borders.<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a>\u00a0 Phantom Secure was not the first, nor would it be the last, of the many encrypted devices to appear on the black market to plan and executive criminal activity.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Operation Trojan Shield<\/em><\/p>\n<p>While the FBI previously dismantled hardened encryption companies utilized amongst criminals to communicate \u2013 such as Phantom Secure &#8211; new platforms would emerge as substitutes for their predecessors.\u00a0 In \u201cOperation Trojan Shield,\u201d various European law enforcement agencies, the FBI and AFP collaborated with a confidential source to construct, market, and upkeep the next encrypted communication platform to arise on the black market.<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a><\/p>\n<p>The devices themselves were encrypted but the FBI, AFP, and the confidential source collaborated to build a master key into the existing encryption system.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a>\u00a0 This allowed law enforcement to decrypt and store messages as they were transmitted.\u00a0 For devices located outside of the U.S., an encrypted \u201cBCC\u201d of each sent message is routed to an \u201ciBot\u201d server located outside of the U.S.\u00a0 The message is then decrypted with the master key and then immediately re-encrypted with the FBI encryption code.\u00a0 The newly encrypted message is then passed to a second FBI-owned iBot server to be decrypted for viewing within the U.S.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a>\u00a0 Given the high level of technical care and expertise needed to set up this master key process, the collaboration between the FBI, AFP, confidant, and other European law enforcement agencies was needed to ensure that ANOM could be launched effectively and discreetly within criminal networks.<\/p>\n<p>ANOM could only be used on devices sold within the black market and were stripped of the ability to make calls or send emails.\u00a0 In order to get a hold of an ANOM-encrypted device, each criminal had to be green-lighted by another criminal who was already using the software.<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a>\u00a0 Each ANOM user was identified by a Jabber Identification \u2013 similar to a smartphone PIN \u2013 was chosen by each user to identify themselves as opposed to using their real names.<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a>\u00a0 The high level of exclusivity and security behind ANOM increased the confidence that users that their communications would remain private.<\/p>\n<p><em>Results of the investigation<\/em><\/p>\n<p>As high-profile criminals such as Hakan Ayik praised ANOM and encouraged its use to their associates, thousands of criminals worldwide began utilizing ANOM devices to openly discuss their activities.\u00a0 Between October 2019 and May 2021, a total of 11,800 ANOM devices were registered in over 90 countries, with the highest number of users based in Germany, the Netherlands, Spain, Australia, and Serbia.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a><\/p>\n<p>Considering the strong reputation that ANOM had amongst criminals, plans to import, export, or distribute drugs were sent between encrypted devices without the use of coded language.<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a>\u00a0 Text messages shown in a search warrant affidavit filed May 18, 2021, display open conversation regarding cocaine hidden in French diplomatic packages or underneath layers of bananas in shipping trucks.<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a><\/p>\n<p>Through the surveillance of ANOM users, law enforcement agencies from the U.S., Australia, and the European Union were able to seize numerous tons of drugs and millions of dollars in cash.<a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a> \u00a0Australian police officers also claim to have acted on 20 \u201cthreats to kill,\u201d thereby protecting many innocent civilians who may have otherwise lost their lives.<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a><\/p>\n<p>Although the criminals that utilized ANOM encrypted devices strongly advocated for their high level of security, this could not be further from the truth.\u00a0 The review of messages sent on ANOM devices has opened numerous high-level public corruption cases internationally, as well as investigations of distributors for money laundering, international drug trafficking, and obstruction of justice.<a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a><\/p>\n<p>While new encrypted platforms used to emerge once their predecessors were taken down by the FBI, Operation Trojan Shield severely damages the trusted foundation of encrypted devices for communications amongst criminal actors.\u00a0 Though the use of new technology such as encryption devices has allowed discreet criminal activity to go undetected, law enforcement across the globe has proven that, with joint efforts, they can utilize the same tools for their benefit.<\/p>\n<p>The current issue of the IELR will have a more comprehensive discussion of the law enforcement initiative and its implications.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Legal assistant, Berliner Corcoran &amp; Rowe LLP; B.A., Amherst College.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Rachel Pannett and Michael Birnbaum, <em>FBI-controlled ANOM app ensnares scores of alleged criminals in global police sting<\/em>, The Washington Post, June 7, 2021, <a href=\"https:\/\/www.washingtonpost.com\/world\/2021\/06\/08\/fbi-app-arrests-australia-crime\">https:\/\/www.washingtonpost.com\/world\/2021\/06\/08\/fbi-app-arrests-australia-crime<\/a>.<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Cheviron Aff. \u00b6 14, May 18, 2021. <a href=\"https:\/\/www.justice.gov\/usao-sdca\/press-release\/file\/1402426\/download\">https:\/\/www.justice.gov\/usao-sdca\/press-release\/file\/1402426\/download<\/a>.<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <em>Cheviron Aff. \u00b6 9,<\/em> <em>supra.<\/em><\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <em>Cheviron Aff.<\/em> <em>\u00b6 10<\/em>, <em>supra.<\/em><\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> Ben Westcott, <em>For years, the underworld thought its phones were safe. They fell for an encrypted app trap,<\/em> CNN, June 9, 2021, <a href=\"https:\/\/www.cnn.com\/2021\/06\/08\/australia\/afp-fbi-anom-app-operation-ironside\/index.html\">https:\/\/www.cnn.com\/2021\/06\/08\/australia\/afp-fbi-ANOM-app-operation-ironside\/index.html<\/a>.<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <em>Cheviron Aff.<\/em> <em>\u00b6 13<\/em>, <em>supra.<\/em><\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> <em>Ben Westcott, supra.<\/em><\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> <em>Cheviron Aff. \u00b6 14, supra.<\/em><\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <em>Cheviron Aff. \u00b6 19, supra.<\/em><\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> <em>Cheviron Aff. \u00b6 29, supra.<\/em><\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> <em>Cheviron Aff. \u00b6 14, supra.<\/em><\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> <em>Ben Westcott, supra.<\/em><\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\"><em><strong>[15]<\/strong><\/em><\/a><em> ANOM: Hundreds arrested in massive global crime sting using messaging app,<\/em> BBC.COM, June 8, 2021, <a href=\"https:\/\/www.bbc.com\/news\/world-57394831\">https:\/\/www.bbc.com\/news\/world-57394831<\/a>.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> <em>Cheviron Aff. \u00b6 20, supra.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sara Kaufman[1] On June 8, 2021, the Federal Bureau of Investigation (FBI) and Australia\u2019s Federal Police (AFP) publicly announced the arrests of more than 800 individuals utilizing a FBI-controlled encrypted platform to facilitate their criminal activities.[2]\u00a0 ANOM, a highly popular encryption platform amongst criminals worldwide, was secretly used as a surveillance tool in an investigation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[79,33,45,14,165,98,164,140,42,153,35,88,77,84,43,3,11,231],"tags":[],"class_list":{"0":"post-1628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-corruption","7":"category-cybercrime","8":"category-cybercrime-and-cryptocurrency","9":"category-data-privacy","10":"category-europol","11":"category-extraterritorial-jurisdiction","12":"category-financial-intelligence","13":"category-fraud","14":"category-governmental-networks","15":"category-illicitfinancing","16":"category-institutional-cooperation","17":"category-international-cooperation","18":"category-international-criminal-law","19":"category-international-evidence-gathering","20":"category-international-regimes","21":"category-transnational-corruption-money-laundering-and-asset-forfeiture","22":"category-transnational-organized-crime-cybercrime-narcotics","23":"category-undercover-sting-operations","24":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog\" \/>\n<meta property=\"og:description\" content=\"Sara Kaufman[1] On June 8, 2021, the Federal Bureau of Investigation (FBI) and Australia\u2019s Federal Police (AFP) publicly announced the arrests of more than 800 individuals utilizing a FBI-controlled encrypted platform to facilitate their criminal activities.[2]\u00a0 ANOM, a highly popular encryption platform amongst criminals worldwide, was secretly used as a surveillance tool in an investigation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/\" \/>\n<meta property=\"og:site_name\" content=\"IELR Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-10T14:57:58+00:00\" \/>\n<meta name=\"author\" content=\"Bruce Zagaris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ielr\" \/>\n<meta name=\"twitter:site\" content=\"@ielr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Zagaris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/\"},\"author\":{\"name\":\"Bruce Zagaris\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\"},\"headline\":\"ANOM: A global covert investigation conducted through an encrypted app trap\",\"datePublished\":\"2021-06-10T14:57:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/\"},\"wordCount\":1047,\"commentCount\":0,\"articleSection\":[\"Corruption\",\"cybercrime\",\"cybercrime and cryptocurrency\",\"Data Privacy\",\"EUROPOL\",\"extraterritorial jurisdiction\",\"financial intelligence\",\"fraud\",\"Governmental networks\",\"illicitfinancing\",\"institutional cooperation\",\"International Cooperation\",\"International Criminal Law\",\"international evidence gathering\",\"international regimes\",\"Transnat'l Corruption, Money Laundering &amp; Asset Forfeiture\",\"Transnat'l Organized Crime, Cybercrime, Narcotics\",\"Undercover Sting Operations\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/\",\"name\":\"ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\"},\"datePublished\":\"2021-06-10T14:57:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2021\\\/06\\\/10\\\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ielrblog.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ANOM: A global covert investigation conducted through an encrypted app trap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/\",\"name\":\"IELR Blog\",\"description\":\"Official Blog of the International Enforcement Law Reporter\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ielrblog.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/e491a7e89d418cb82a8c67687806ab66\",\"name\":\"Bruce Zagaris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g\",\"caption\":\"Bruce Zagaris\"},\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/author\\\/ielrblogadmin1\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/","og_locale":"en_US","og_type":"article","og_title":"ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog","og_description":"Sara Kaufman[1] On June 8, 2021, the Federal Bureau of Investigation (FBI) and Australia\u2019s Federal Police (AFP) publicly announced the arrests of more than 800 individuals utilizing a FBI-controlled encrypted platform to facilitate their criminal activities.[2]\u00a0 ANOM, a highly popular encryption platform amongst criminals worldwide, was secretly used as a surveillance tool in an investigation [&hellip;]","og_url":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/","og_site_name":"IELR Blog","article_publisher":"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks","article_published_time":"2021-06-10T14:57:58+00:00","author":"Bruce Zagaris","twitter_card":"summary_large_image","twitter_creator":"@ielr","twitter_site":"@ielr","twitter_misc":{"Written by":"Bruce Zagaris","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/#article","isPartOf":{"@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/"},"author":{"name":"Bruce Zagaris","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66"},"headline":"ANOM: A global covert investigation conducted through an encrypted app trap","datePublished":"2021-06-10T14:57:58+00:00","mainEntityOfPage":{"@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/"},"wordCount":1047,"commentCount":0,"articleSection":["Corruption","cybercrime","cybercrime and cryptocurrency","Data Privacy","EUROPOL","extraterritorial jurisdiction","financial intelligence","fraud","Governmental networks","illicitfinancing","institutional cooperation","International Cooperation","International Criminal Law","international evidence gathering","international regimes","Transnat'l Corruption, Money Laundering &amp; Asset Forfeiture","Transnat'l Organized Crime, Cybercrime, Narcotics","Undercover Sting Operations"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/","url":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/","name":"ANOM: A global covert investigation conducted through an encrypted app trap | IELR Blog","isPartOf":{"@id":"https:\/\/ielrblog.com\/#website"},"datePublished":"2021-06-10T14:57:58+00:00","author":{"@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66"},"breadcrumb":{"@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ielrblog.com\/index.php\/2021\/06\/10\/anom-a-global-covert-investigation-conducted-through-an-encrypted-app-trap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ielrblog.com\/"},{"@type":"ListItem","position":2,"name":"ANOM: A global covert investigation conducted through an encrypted app trap"}]},{"@type":"WebSite","@id":"https:\/\/ielrblog.com\/#website","url":"https:\/\/ielrblog.com\/","name":"IELR Blog","description":"Official Blog of the International Enforcement Law Reporter","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ielrblog.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/e491a7e89d418cb82a8c67687806ab66","name":"Bruce Zagaris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b88b62733380c051d9ae8ffa877632a9180505d62fe9bcec138e2038ecdcd51?s=96&d=monsterid&r=g","caption":"Bruce Zagaris"},"url":"https:\/\/ielrblog.com\/index.php\/author\/ielrblogadmin1\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pas6ng-qg","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=1628"}],"version-history":[{"count":1,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1628\/revisions"}],"predecessor-version":[{"id":1629,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1628\/revisions\/1629"}],"wp:attachment":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=1628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=1628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=1628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}