Tech Won't Save Us - How the FBI Tapped the Encrypted Chats of Criminals Around the World w/ Joseph Cox

Episode Date: June 6, 2024

Paris Marx is joined by Joseph Cox to discuss how the FBI created an encrypted phone company called Anom to read criminals’ messages and eventually carry out the largest international sting operatio...n by law enforcement.Joseph Cox is the author of Dark Wire: The Incredible True Story of the Largest Sting Operation Ever and the host of the 404 Media Podcast.Tech Won’t Save Us offers a critical perspective on tech, its worldview, and wider society with the goal of inspiring people to demand better tech and a better world. Support the show on Patreon.The podcast is made in partnership with The Nation. Production is by Eric Wickham. Transcripts are by Brigitte Pawliw-Fry.Also mentioned in this episode:Read an excerpt of Dark Wire at Wired.Joseph wrote about the revelation that Lithuania hosted the Anom interception server and provided the intercepted messages to the FBI.Support the show

Transcript
Discussion (0)
Starting point is 00:00:00 This wasn't just an operation to gather evidence and arrest people. It was like, we want to fundamentally shift how criminals think about encryption. Hello and welcome to Tech Won't Save Us, made in partnership with The Nation magazine. I'm your host, Paris Marks, and this week my guest is Joseph Cox. Joseph is the author of Dark Wire, the incredible true story of the largest sting operation ever, and the host of the 404 Media podcast. This is an absolutely fascinating conversation that gets into the story of how the FBI created its own encrypted phone platform to target criminals around the world and ultimately work with other law enforcement agencies to share those messages and that information
Starting point is 00:00:58 to target criminal networks that were operating in Europe, in Australia, and many other parts of the world, of course. This was honestly a story that I had never even encountered before, I guess because I'm not so much in these circles where these sorts of things are discussed. So when I picked up Joseph's book, I could hardly put it down because this story was so compelling. And of course, the way that Joseph has written it is so deeply reported and has so much perspective on both the sides of the criminals who were doing these drug operations and these kidnappings and assassinations, but also on the side of the law enforcement who are watching these things, who are trying to set up these networks, who were trying to break the encryption on other encrypted phones, and were ultimately seeking to disrupt these criminal networks and the criminal activity that was happening within their jurisdictions. The story is not only a fascinating one, but it also brings up really big questions as to whether authorities
Starting point is 00:01:57 should be doing things like this, should be carrying out these sorts of major projects, what it means for broader privacy if it starts to move away from networks that are just used by criminals into ones that are used by much more of the general public, and the broader question of how law enforcement, but also how criminal networks work in the 21st century, and how both of them are adapting to these new digital technologies and everything that is being thrown at us. So as I say, I found this conversation absolutely fascinating. I think you will too. I don't see a need for me to go on much more about it and we should just get into the conversation. So if you enjoy it, make sure to leave a five-star review on your podcast platform of choice. You can
Starting point is 00:02:38 also share the show on social media or with any friends or colleagues who you think would learn from it. And if you want to support the work that goes into making the show every week, where you can get a shout out, some stickers if you want, and access to our ad-free RSS feed as we begin to introduce some ads into the main feed of the show, you can join supporters like Joe in Arlington, Virginia, Jor from Slovenia, and Jim from South Carolina by going to patreon.com slash techwontsaveus where you can become a supporter as well. Thanks so much and enjoy this week's conversation.
Starting point is 00:03:04 Joseph, welcome to Tech Won't Save Us. Thank you so much for having me. I'm very excited to chat. You know, you contacted me a few months ago about the book. When I heard about it, I was like, this seems interesting. I'm not like super sure if it's like in my wheelhouse. And then I started digging into it and like I could hardly put it down because it's so fascinating. And you know, I was saying to you before we started recording, I think that you've found a way to present a kind of tech story about this involving the police that makes me actually kind of empathize with the police and feel like I'm on their side, which just feels wild. Yeah, it's a very, very complicated story.
Starting point is 00:03:39 And as I said, just before we started recording, when privacy people read it, they're horrified. And then when people who lean more on the side of law enforcement, they find it amazing and fascinating. And then I think there'll be a lot of readers, myself included, after writing the book, who sit in the middle and they're kind of confused about what we're supposed to make of this because it has implications for everybody. Yeah, I think that is absolutely true, right? I was reading aspects of it and I was like, Whoa, holy shit. But then other aspects where I was like, yeah, this is great. They're getting the criminals, you know, right? Like, and maybe that partly comes from like, you know, watching these police shows that we're all used to watching over such a long
Starting point is 00:04:16 period of time, and how this kind of like, you know, also gives us this idea of how these things all work. But I'm wondering, you know, we'll get into the details of this story, but how did this whole kind of case and how did this whole idea of these encrypted phones and the involvement of authorities like the FBI, how did this all get on your radar? It got on my radar because I found an obscure Dutch crime blog in around 2016. And people on there were talking about these PGP blackberries. And I'm like, what the hell is a PGP Blackberry? It turns out it's an ordinary Blackberry that they've installed pretty good privacy email encryption software on. And as I started digging, it turned out that a lot of the top tier criminals were not using ordinary Apple or Google devices. They were using these highly
Starting point is 00:05:03 customized phones, which not only had email encryption software, they had the microphone removed, the GPS taken out, the camera as well, like really extreme modifications. And I just became completely obsessed with this industry, like in the same sort of way that someone would cover Facebook as a beat. I started covering the weird world of encrypted phones for criminals. And I definitely approached it from the perspective of the criminals and of the people who make these phones. I haven't really interacted with law enforcement much up until writing this book. I've always spoken to hackers, drug traffickers, smugglers, hitmen, all of that sort of thing. So I came from there. And I think nobody,
Starting point is 00:05:47 no journalists, at least, had really messaged these companies before or just asked, like, hey, so what are you doing with these? And some got back to me, some threatened me, as is just the nature of this sort of story. But I developed sources in this community. And that led to me learning about Phantom Secure, which is one of these companies being shut down by the FBI before the FBI actually announced it. And then all of these other side stories. And it basically meant that when the Anom story, which is what Dark Wire is primarily about, I was very well positioned to tap into all of my sources and be like, well, what actually really
Starting point is 00:06:25 happened here? Yeah. And that really comes through in the book as well. Like the quality of the stories that you tell, you know, the depth that you get into, it is very apparent from the book itself. And listen, you might not have been on the Facebook beat, but someone needs to be on the encrypted phone beat, which is much more unique and probably interesting as well. If we go back, like when does the criminal use of these encrypted phones and the beginning of using specific phones that are designed for their needs, when does that really start to emerge and when does that start to become popularized? Yeah, it starts to happen after BlackBerry becomes popular. I mean, we all know about
Starting point is 00:07:00 President Obama having his BlackBerry. When I was growing up, having a BlackBerry was sort of a status symbol among my friends. I never had enough money to buy one. I never had one either. No, I could not afford that. But it was clearly a status symbol. And then criminals started to use it because it had BlackBerry Messenger. And that was seen as more secure. It was sort of more a direct form of messaging and scrambled. I wouldn't say
Starting point is 00:07:26 encrypted, but the messages were scrambled. And then the cops got wise to that and they did all of these sorts of operations around BlackBerry Messenger. And then that's when the criminals started to, well, let's customize the phones a little bit so we can still use them, but we can be a step ahead of what the authorities are doing. And it's this constant cat and mouse game, as it always has been with law enforcement and criminals, right? We've had burners, we've had pagers, we've had pay phones, whatever. And now we have very sophisticated cryptography installed onto a customized device. It's always that cat and mouse game. And that's sort of the lineage that leads to these very expensive very
Starting point is 00:08:05 customized phones one of the things that stood out obviously because i am in canada is how at least early on a lot of this seems connected to canada obviously blackberry is a canadian company phantom secure as you're talking about i believe is based out of or was based out of vancouver i think sky which is another one of these encrypted phone companies, is Vancouver-based as well. Is there a particular reason why a lot of this seemed to be coming out of Canada? It's really fascinating that so much of it is localised in Canada, both on the law enforcement side and the company side. It's kind of hard to tell, but my read on it is that, rightly so, it's not actually illegal to make one of these encrypted phones. It's not illegal in and of itself to sell an encrypted phone.
Starting point is 00:08:47 I don't think any of us really want to live in a world where you can get criminally prosecuted for making what is code designed to mask messages. Don't really need to go down that. I'll just take that as it is. But it's not illegal to do that in Canada. So that's where a lot of these companies started to spring up. I imagine it also has something to do with BlackBerry also being from the country as well, right? And they could more easily just get used to the technology and manipulate it. But as you say,
Starting point is 00:09:13 the Royal Canadian Mounted Police were really some of the leaders when it came to targeting criminal use of BlackBerry devices. They did this really audacious operation where they somehow obtained the global decryption key for BlackBerry Messenger, which means they had a key to unlock, well, an infinite number of safes all over the world. It didn't just have to be in Canada. And that's actually sort of a preamble for a norm, because I think it just shows sort of the extreme lengths that law enforcement are prepared to go to access encrypted messages. Even if the format of those messages then changes over the coming years and decades, the police will really push the envelope when it comes to encryption.
Starting point is 00:09:58 Yeah, and it is a fascinating story. And just to be clear, Anom is the company that ends up getting started by the FBI, which we'll talk about in just a minute. But I was hoping you could give us a bit more detail on how the use of these phones and the design of these phones actually evolves. Because you're talking about there how early on a lot of these were kind of BlackBerrys and then eventually modified BlackBerrys. But obviously, as the broader expectation for smartphones starts to change because, you know, we get the iPhones and the Androids and they start to become more advanced. I'm sure criminals want a lot of those features as well. So how does that kind of affect the way that these encrypted phones evolve over time and the way that these companies are making them? Yeah. So Phantom Secure, one of those companies that was doing encrypted customized BlackBerrys, they just sold encrypted emails and it got to the point where their customers just
Starting point is 00:10:43 expected more. Other companies were coming out with Android smartphones where you could send voice messages or make calls. You could send photos across, all of the sort of stuff that we take for absolute granted when it comes to consumer communications. Criminals want to send photos too. They want to send emojis or whatever. So Phantom Secure sort of fell out of favor because it wasn't prepared to innovate. And then you had other companies such as EncroChat and then Sky, one you mentioned, they also started using iPhones. And it is almost like there is this entire shadow industry, which has product launches and rebrands and new features just like Google or Apple or whatever. Maybe some people look forward to seeing the new ultra-thin iPad or whatever. These criminals look forward to,
Starting point is 00:11:34 oh wow, there's a voice scrambler on these phones now? That's really, really cool. And these criminals have intense brand loyalty. I mean, I was even told about some people getting tattoos of specific brands. And that's because there is a status symbol here as well, as in, if you do not have an encrypted phone, you're not a real criminal. As in, I've literally seen that quote in some messages as well. It's a logistical benefit, as in, well, we can hide our messages from the police. But then if you're in a meeting with somebody and you put a customized phone on the table, oh, I'm dealing with the real deal here. Fascinating.
Starting point is 00:12:10 You know, obviously, when we kind of go buy our iPhones or Android phones or whatever, we go to the Apple store or we go to the telecommunications company's local store, whichever telecom company operates in your jurisdiction. That's where we get our phones. That's how it works. How does it work to get your hands on one of these encrypted phones? Typically, it's with a reseller, and often it is in person. You can go to some shops and buy them, but they are, for lack of a better way of putting it, and they also describe this themselves, spy shops. So you might go to Amsterdam and on one side, there'll be
Starting point is 00:12:45 GPS trackers, bugs for putting in cars, anti-bug tools as well. And then maybe behind the counter or maybe elsewhere, there will be some of the encrypted phones. That's sort of the only context in which you're going to buy these phones in which it resembles anything like buying a normal one. Ordinarily, it's going to be word of mouth through your criminal network who wants to work with another one, or you want to join a criminal network. You have to be on the same phone as everybody else because they're typically closed networks. You'll get introduced to a reseller and you'll go buy it in person or it'll get shipped to you. That word of mouth network has a couple of benefits in that it keeps the customer base insular and you're not really going to have cops coming in and that sort of thing, at least ideally.
Starting point is 00:13:32 And then for the criminals, it also gives them someone to blame if things go wrong. It's like if a criminal downloads Signal and buys an iPhone, what are they going to do if they get caught? Yell at Tim Cook or like yell at Signal? I mean, maybe they might, and that could be very scary. But what they can do here is they can go to the resellers, you sold me a phone that was bad, or they broke the encryption or something, this is your fault. And there can be repercussions for that. Right. Yeah. It could be scary repercussions, I'm sure, depending on the person who we're talking about. So you talked about how the RCMP in Canada got this key for the BlackBerry messengers, and that started to
Starting point is 00:14:11 compromise BlackBerry's and forced these criminals to go in a different direction, have very specific phones. How does law enforcement more generally start to really target these encrypted phone companies and start to kind of take them down? They start by trying to get insiders. They start by trying to flip the sellers or maybe the people who are the higher echelons of the organization and try to get closer to them. In the case of Phantom Secure, they tried a few different things, but the thing that eventually worked was that the Australian police had a Phantom Secure reseller or distributor. They flipped them and told the distributor, you need to get close to the CEO, a man called Vincent Ramos. A long series of events leads to Ramos saying some very incriminating stuff in an undercover
Starting point is 00:14:57 meeting with law enforcement officials. And they arrest him. They do try to flip Ramos to put a backdoor into Phantom Secure. They're not successful. He escapes. There's a very dramatic escape when he's trying to get to the Canadian border, and I won't spoil exactly what happens, but that's what they try to do. They try to flip the people to then flip the code. What law enforcement really want is a backdoor in one of these systems because Phantom Secure had 10,000 users, the vast majority of which appeared to be criminals. If you're a law enforcement officer, imagine getting access to those messages. It would be an intelligence goldmine. I really can't think of anything more
Starting point is 00:15:39 valuable to law enforcement than getting a backdoor in an encrypted phone company. One of the things I was fascinated about as I was reading it is you were describing how when they're going after Ramos and he kind of flees the scene and he's headed toward the Canadian border, the authorities are actually like, oh my God, I wish he had gone to Mexico because it would have been so much easier to get him back from Mexico. And if he crosses into Canada, it'll be so much harder. And I had never really considered that before. I mean, same. I was surprised when people I spoke to told me that. And it's because sort of what you mentioned earlier about these companies based in Canada, he's a Canadian
Starting point is 00:16:14 citizen going back to Canada where making or selling the phones is not a crime. That's going to be tricky for the American authorities. Whereas if they run to Mexico, they'll find a way to grab them, you know, pretty easily. Yeah, definitely. In the book, you talk about how, you know, once Phantom Secure is taken down, there's kind of a two pronged approach that the authorities and the FBI in particular, well, I guess not just the FBI, but you know, European police and people like that as well, really try to carry out in order to get into these encrypted phone companies and to figure out what these criminals are actually doing. And one path is, you know, trying to actually crack these existing companies, you know, the skies and the anchor chats, as you were talking about, but then they also get presented
Starting point is 00:16:58 this opportunity to actually have control over an encrypted phone company without people knowing. How is it that they start to head down these different paths to try to crack these companies and these broader criminal networks? So after Phantom Secure is shut down by the FBI, it's very, very clear to people in the industry that sell these phones that they could be next. You know, this is a watershed moment. The FBI is not messing around anymore. The gold rush of selling phones to these criminals looks like it's over, or at least the end of it's going to start.
Starting point is 00:17:30 So someone in that industry who uses the name Afgu then reaches out to the FBI and says, look, I'm making my own company. It's called Anom. It's not really fully developed yet. It doesn't really have many customers, but would you like this for you to use in your own investigations? I said earlier about how I can't imagine anything more valuable to law enforcement than the backdoor in a crypto phone company. I lied. This is more valuable. You get to run the company yourself and put in whatever backdoor you want. That is what was on the table. In return, AFGU would get a lighter sentence for whatever charges they
Starting point is 00:18:10 may or may not have got prosecuted with later. But this is like the ultimate ace that AFGU played and basically handed the FBI and their partners, the Australian Federal Police, a tech company. A tech company for criminals that the FBI now had to figure out how to run. They had to run the sort of phone tech gadget startup of the criminal underworld. When I was reading about the FBI's involvement in that and getting it set up, obviously they had AFGU and this team that he put together to kind of help get it started and run it and things like that. But I was like, man, they always say like the government can't run a tech company and doesn't understand tech. And here's like the FBI running an encrypted phone company that becomes like
Starting point is 00:18:54 globally used before it finally gets shut down. The Department of Justice is not usually a place for move fast and break things. And there were issues with the main DOJ that the book gets into later. But for the most part, these FBI agents and the prosecutors from San Diego just ran with it. And I mean, even one of them, Andrew Young, told me to slightly paraphrase, the idea was that let's just keep going until someone tells us to stop. And they thought that was going to happen at various points, but they were like, fuck it, let's just go because this opportunity will probably never present itself again. And so how does Anom and this company get off the ground, but also take advantage of the fall of Phantom Secure and questions about some of these other companies
Starting point is 00:19:41 to really start to grow and get those phones out there. Yeah. So when Phantom Secure shuts down, there is obviously a big vacuum. This was one of the biggest companies in the space. Sinaloa Cartel used it and a bunch of other criminal networks. Anom was very well positioned to fill that vacuum. AFCU already had connections in the criminal underworld, especially to someone called Hakan Ayik, who listeners may not be familiar with, but he is, I guess still is, the most wanted man from Australia, a top tier, multi-billion dollar drug trafficker. And Anam starts first by seeding a few phones in Australia, literally just five, a handful. It then gets spread around. But very quickly, more people want to get on this phone, more people want to a handful. They then get spread around. But very quickly,
Starting point is 00:20:25 more people want to get on this phone, more people want to use it, and especially people overseas want to use it. Because of course, the globalised nature of organised crime today is that people do not stay in their own territories. And if they do, they simply work with people from other territories as well. The idea of organized crime groups is an old idea now. It's very much organized crime networks. And AFGU starts to get these inquiries like, hey, my people overseas want to get on a NOM as well, and we need them to be on the platform. Can you help us out? And of course, agrees with the FBI in the background, encouraging all of this as well. But Hakan comes in,
Starting point is 00:21:05 the very high tier drug trafficker, and he is the one who really helps Anom explode, especially in Europe, but people he brings in also globally as well. You need these drug trafficking influencers, which is what law enforcement calls them, as ambassadors for your product. I said it was a brand, the status thing. What is a better endorsement of your product than the most wanted man in Australia using your phone? Yeah, absolutely. And around when is this really happening? Is the FBI setting up this company and it's starting to get in people's hands? What's the timeline here? So it starts in around 2018 and stuff is a little bit slow for the first few months, but come a year, people are talking about it by the fall of 2019. And that is when the FBI itself starts
Starting point is 00:21:52 to actually get access to the messages as well. Up until this point, it's just been the AFP for various legal reasons. The FBI then gets access in 2019 and they can finally start reading the messages that are coming in from all over the world, basically, by that point. Yeah. And you talked about how, obviously, this is an operation that was kind of led by the FBI, but they very early on partner with the AFP, the Australian Federal Police, because of a lot of work that's going on down there. And as you talked about these connections that exist between Australia and these larger criminal networks. What I was thinking, you know, again, coming from this Canadian perspective that I have,
Starting point is 00:22:34 is when we were talking about Phantom Secure and the arrest of Ramos, you know, you had the American authorities along with the Australians and the Canadians involved. And there was a suggestion or, you know, it was confirmed that Canadians had actually kind of given information to Ramos to let him know that, you know, he was kind of being targeted or whatever, so he could get away. Were the Canadians excluded from this broader operation in part because of that? Or was there any suggestion from it? Or is there another reason why they just tried to go with the Australians to start? I haven't seen any evidence of that's the reason why Canada was not broadly included in the norm. They are mentioned much later in the press release thanking
Starting point is 00:23:11 them, but their role certainly was not as large as the FBI's or the AFP's. And what you're referring to is that, of course, there was a very high profile case in Canada where a civilian senior intelligence officer leaked information to Ramos, which, even if it didn't necessarily help his case, it could have, and that was a serious security threat. I think more the reason that the AFP took the lead was, one, because the AFP has been stymied by encrypted phones for decades by this point. Serious biker gangs use them. You have the Comacheros, which are very violent, Hells Angels, the Banditos, all of the Serious biker gangs use them. You have the Comacheros, which are very violent, Hells Angels, the Banditos, all of the sort of biker gangs you would expect. And they
Starting point is 00:23:50 have straight up assassinations planned on these platforms. It really is a massive problem in that country. So I think that's the first reason. The second is just like sort of a more boring legal one. Australia recently had a relatively new surveillance law that basically allowed this to happen. And they were like, we're allowed to monitor all of these phones if they have a nexus to Australia. And it acted as something of a beta test for the FBI, also because some of the American officials felt the DOJ wouldn't go with the plan if it hadn't been proven to work. So let's just use Australia as a nice little test tube and they can figure out what it's doing, prove it works,
Starting point is 00:24:30 and then the FBI will step in and start doing it there. Yeah, because this becomes a really key part of the story that you tell, right? The FBI is spearheading this operation, is ensuring that this company can run and this whole operation is taking place and eventually bringing in international partners. But they get the kind of legal authority to start looking at these messages that are being sent outside of the United States. But if I understand it, they never ever actually get the authority to look at stuff that's happening within the country, right? That's basically the compromise that the FBI and the San Diego prosecutors had to accept, the DOJ was not prepared to allow monitoring of Anom messages inside the US by the FBI, because that brings up massive fourth amendment or wiretapping
Starting point is 00:25:14 issues, depending on what legal route you're going to take. So they found a workaround. They put into the code that whenever there was an Anom phone on US soil, the messages would not be sent to the FBI. They would still be sent to the Australian Federal Police, and they agreed to monitor those messages for threats to life, which is somebody trying to assassinate somebody else, somebody saying, I'm going to kill you, all of that sort of thing. The AFP would then provide a tip-off about that threat to life, and then maybe the FBI could act or something like that. It was, in its simplest terms, I absolutely think it's fair to say, it was a workaround. It was a legal workaround so that Anom phones in the US would
Starting point is 00:25:56 still be monitored for certain content. It just wasn't the FBI doing it. Yeah. As I understand it, there are some other restrictions that they put on what they could actually monitor. They were obviously going after criminals, but then other people would get these phones as well because they were engaging with criminals or new criminals. And they had certain regulations on what they were kind of ethically or legally allowed to look at beyond just Americans, right? Yeah. So the FBI treated it ethically as a wiretap, even though it was this massive data harvesting operation, basically unprecedented. They treated it like a normal wiretap in that if a lawyer got the phones, they would really try not to look at those. If a civilian got the phones, which is what happened, they would try not to monitor those as well. But to be clear,
Starting point is 00:26:42 there was sort of no legal barrier to the FBI doing that because the way they set it up technically and legally, this massive dump of messages came every Monday, Wednesday, and Friday with basically no strings attached, except don't look at phones in America. So they could rummage all they want. And of course, that did lead to a ton of drug shipments and all of that sort of stuff being seized. Also raises some pretty serious questions about, do you want to allow a law enforcement agency or its partners unfettered access to a platform? And the FBI's argument is that Anom was for criminals. So anybody on this platform is fair game. That's their argument, at least.
Starting point is 00:27:27 Yeah, no, I see that. And we can talk about that a bit more later and the broader ramifications of that. But as the FBI and as the AFP started to receive more of these messages, started to be monitoring what was happening on this encrypted phone platform network, whatever we want to call it, what did they start to find? Did they learn important things by having access to the communications of these criminals? The FBI and its partners found basically that the communications were overwhelmingly criminal in nature. I found this myself when I eventually got copies of the Anon messages and I would go through them. It's just drug deal after drug deal, shipment after shipment, assassination after assassination. So they're getting all of this sort of intelligence on how the drugs are being packaged and all
Starting point is 00:28:15 of these sort of unusual techniques like putting them into stone slabs and lumber and all of these other very fantastical techniques, where they're being shipped from, where they're being shipped to, who is selling them, where they're being sold, the entire supply chain, as much as they could, of multi-ton cocaine deals. You just do not get this sort of visibility normally. Then there's the money laundering and the safe houses. There's the people who are ordering the hits. There's the massive public corruption at ports or inside government offices as well, where, I mean, Andrew Young, the prosecutor I mentioned, he was blown away by how much corruption was going on. And that's especially something that you just don't really
Starting point is 00:29:00 hear about normally. That is a really hidden part of the international drug trade, but Anom, and then later some other operations into Sky and EncroChat, really revealed some of that. Yeah. And of course, as you would expect, that is essential to ensure that these drugs and kind of other things can move, but it's probably even harder to suss out than finding the actual criminals who are behind these things, right? Yeah, I think that this is what they really, really wanted, is the corruption side especially. I mean, US officials told me that as much, and that's why they were so determined to also do this in the US. They wanted to get the guys who don't get caught, the guys who never come
Starting point is 00:29:42 on law enforcement's radar because they are actually smart and they are actually using pretty sophisticated technology. That's the sort of people that the San Diego FBI wanted to get. And they did get a lot of them, but they definitely didn't get all of them because of that restriction on not monitoring in the US. Yeah. You talked about how it's not so much just criminal gangs, but criminal networks today, right? As these criminal organizations operate around the world and have connections to people everywhere, and as these encrypted phones, these Anom phones from this FBI-run company started going global as well, they started to see the extent of those networks and how far they actually went and the connections between them. Can you talk a bit about how far that went and how global in scale these criminal networks actually are? Yeah. So that drug trafficker I mentioned, Hakan Ayik, who was very important to Anand's growth, he eventually makes what Australian law enforcement called the Aussie
Starting point is 00:30:42 cartel. And ordinarily, you may have one criminal group smuggling, I don't know, methamphetamine, then you'll have another one smuggling cocaine. What Hakan and other members of the Aussie Cartel did, they came together to put not a total monopoly, but to gain control of a very large chunk of drug importation into Australia. And that allows you to set the routes, allows you to set the price. It allows you to potentially lower violence because people aren't screwing each other over. And this involves people who would usually kill each other
Starting point is 00:31:14 if they were in the same room. You know, Hakan Ayik is heavily linked to the Kromacheros biker gang. And then the Hells Angels are like also part of this super cartel. And you have very similar stuff happening in Dubai as well, where you'll have Irish gangsters like the Killahans then working with gangsters from the Netherlands as well.
Starting point is 00:31:32 And they sort of all bring their own skills, resources, investment money as well. And they can then communicate and plan on a much larger, grander scale than they ever could just by themselves. These crime groups may have longstanding rivalries, but there's something that brings them all together, and that's obviously getting more money. Yeah, of course. One of the things that I was surprised to learn from the book, and maybe should have realized, was just how much Dubai was really a centre for a lot of these criminal groups and how a lot of
Starting point is 00:32:06 these criminals, when they started to feel the heat in their own jurisdictions, would look to Dubai as somewhere where they could go and feel quite secure that they were going to escape authorities if they did that. Yeah, Dubai is a fascinating place because what happens is in the criminal underworld, you'll have these hidey holes or these relative safe havens. Thailand used to be one of them. Marbella, some people still do that. Especially over the last 10 years, tons of criminals have gone to Dubai for various reasons. One being lack of taxation, I guess that's one way to put it. That always helps. Yes, that always helps, especially when you have hundreds of millions, if not billions of dirty cash, the ease of which of buying real estate is a big one as well. But then of course,
Starting point is 00:32:49 Dubai's somewhat adversarial to nonchalant relationship with foreign law enforcement partners. And this has changed pretty quickly over the past two or three years, where Dubai authorities are now actually arresting people on behalf of the AFP or the Dutch authorities. And then they will extradite them and it'll be a big win for the Dubai police. But that was only very, very recent. And up until then, Dubai was a playground, a sort of business conference room, and just a great place to have a high quality of life if you were a serious organized criminal. You could do all of those things you could escape the authorities and also go to some fancy hotel
Starting point is 00:33:29 and meet your gangster comrades you know yeah it seemed like one of the big risks though was that dubai authorities don't like encrypted messaging and so some of these folks who sold encrypted phones or even used them needed to like watch out because sure they were criminals and they were doing all this kind of criminal activity or involved in it that maybe the Dubai authorities would like overlook but because they were doing like encrypted messaging that was a problem yeah there's a scene in the book where a particular a nom seller is arrested and so is one of his resellers because they're trying to sell, I think he's technically selling EncoChat devices at the time, but he also plans to sell Anom devices later. And I think that's just a fascinating tension in that Dubai is this relative safe haven for criminals. But then if you sell encrypted phones, whoa, whoa, whoa, you can't do that. It's way too far. We're
Starting point is 00:34:19 going to clamp down on you. Again, that's sort of changing again because they are now extraditing more of the criminals. But it's just very funny that they went after the encryption first rather than the drug traffickers. Yeah, it is funny. You know, obviously, at a certain point, the number of messages that are coming into Anam as the user base is growing becomes far too much for the FBI or the AFP to handle on their own. And they start to build this kind of broader network and these relationships with other, in particular, European countries and European authorities. And eventually they move up to Europol with this broader operation that's bringing a lot of this in. How does that broader operation work? And how does that start to use this information to go after
Starting point is 00:35:03 some of these criminals? Yeah. So it starts when the FBI is getting all of these messages that are obviously not in English because an arm is worldwide and it's all over the place. So they're getting stuff in Swedish, they're getting it in Dutch, German, et cetera. And initially the FBI starts sharing with just the Swedes, just the Dutch, and then the Germans a little bit later. But it becomes clear that to actually have pretty good impact with Anom, they need to have much more coordination. In the case of EncroChat, which was eventually hacked by European authorities, they got a bunch of messages, they distributed them. There was something of a bottleneck in which some of the European officials were just feeding out their intelligence to other agencies. The FBI over NOM, they wanted
Starting point is 00:35:50 to do something different. They wanted everybody in the same room that ended up being Europol, as you said, talking across the table from one another so we can really coordinate and take these people down. It's very similar to how you have these super cartels who are meeting face-to-face in Dubai over a hotel conference table or whatever. Now you have the police basically doing the same thing, but over a conference table in Europol. And that's, I think, one of the big reasons why they were actually able to generate so much impact with this operation. And it was something like 16 countries in the end. You've got Austria, the UK is in there as well. Basically, any sort of country you would expect to be involved probably was, but they crucially did not include some countries such as Serbia,
Starting point is 00:36:35 because that is where I believe a lot of the public corruption took place. We're obviously talking about it very openly now. At the time, this was a massive secret. And not only was it a secret in the FBI, now it's a secret among 16 other agencies. And I'm genuinely shocked that it didn't completely leak, to be honest. Yeah. I believe the book said the Italians were excluded from that as well, right? Yeah. I don't know why. I don't know why exactly. But what that meant was that when the FBI was really pivotal to capturing a very high tier Italian mob boss, they fed over the intelligence, action was taken in Brazil to get this guy. And that leaves the Italians going, why the hell is the FBI giving us this information? How do they know this? And all
Starting point is 00:37:24 these sorts of questions. And the FBI obviously does not answer them and just carries on. It's just doing its own thing. And like, here's like one of your most wanted criminals, but we're not going to tell you why, you know? Yeah. You know, you mentioned how the FBI really wanted to bring everyone into the same room because these networks were operating across European borders or even beyond, but a lot of these authorities were still operating in their own jurisdictions and didn't have that same degree of communication. Obviously, Europol was created to create some of that. Is there any suggestion that this operation has changed how these agencies work together after that because
Starting point is 00:38:00 they had this experience of doing this with the Anom kind of operation? So Europol and European authorities in general have definitely been cooperating more and more over the years. Anom is not the only case where that's happened. There's tons of human trafficking or other drug trafficking cases. I wouldn't say Anom was the only one. But this was a massive case where you have these people sat across the table from one another, going through all of this data at once. And I'm sure it showed not just Europol, but very importantly, the FBI, that this is possible and we should probably do more cooperation. There's a couple of people from the FBI in the book who are pretty skeptical of giving it to Europol because,
Starting point is 00:38:45 honestly, they don't think Europol can handle it. They think it would get leaked. It would probably get drowned in European bureaucracy, whereas the FBI is running a tech company. We don't want this regulation. Get out of the way. We want to do whatever we want. It all worked out in the end, relatively so. But I do think if anybody learned from this when it came to cooperation, it was probably the FBI more than anybody. Interesting. Another one that I was surprised to see was not like in those initial countries. You mentioned how the FBI went to Europe and was initially working with Sweden and the Netherlands and Germany, the authorities there was France, because I believe France was
Starting point is 00:39:19 the country whose authorities hacked Sky and maybe EncroChat as well, or maybe that was bigger. So I was wondering why kind of the French were able to get into these networks and then share that information with other authorities, but were not initially brought into this Anom deal, or if you have any idea why that is. Yeah, you're right in that the French military police hacked into EncroChat. Them being military is very key because they're using that to claim this is a national security issue, so we're not going to tell you how we hacked it. We figured it out through various other court documents. It was a malicious update pushed to the phones, but they don't really want to provide any more information than that.
Starting point is 00:39:57 What I would say is that I was surprised at how much the collaboration and bringing countries in was basically built on them being friends. It really was built on these personal relationships where if they didn't already know each other, and they often did, and they then brought that country in, by the end, these people were like great friends, like going to the pub and stuff together. And I found that very strange because when we think of law enforcement, we usually think of it in the terms of systems and agencies and all throughout this, it was just like individual officials just doing what they thought was good or cool or whatever, you know, and that was on the DOJ side. I absolutely think it was on the European side as well. And so you talked about how this operation
Starting point is 00:40:43 really started in 2018 and then really starts to pick up steam in 2019. Obviously, we know what happens in late 2019, early 2020. How does COVID disrupt this whole operation and what they're trying to carry out? Or does it have much of a blip at all? So the FBI had been developing this sort of back-end surveillance system called Holler iBot. I don't know why it's called that, but it does have a little robot as its logo, which I found in some documents, which is really fun. But they were developing that, FBI computer scientists were, because they knew eventually, yes, we do want to give it to foreign partners and they'll need to
Starting point is 00:41:19 remote in, right? They'll need a VPN or an interface or whatever. Then, as you say, COVID happens, and that dramatically speeds up the need for this tool because you can't really go into the office, or at least not many people can. The FBI had to respect this just like we did. So they accelerate production of that, and that allows the FBI officials to remote in and look through the messages that way. Some of them still did go into the office. And there's some very funny scenes where not being used to cleaning their own offices, they have to go and find a vacuum cleaner somewhere in the San Diego FBI field office. And I absolutely loved them telling me that detail. But it sped it up and they had to adapt just like we all had to. And crucially, the criminals had
Starting point is 00:42:04 to adapt to COVID as well, to the point where for money laundering, there were much more dead drops. So criminals would put money in one place, they would leave, somebody else would come pick it up. That way, they're social distancing. They haven't seen each other. They're not face to face. It's like dropping off your DoorDash order or something like that on your step
Starting point is 00:42:21 so you're not talking to the delivery driver. You're dropping off your big stash of cash so someone else can pick it up without seeing you yeah yeah it's there for sandwich it's just five hundred thousand dollars or euros in cash but it's like basically the same thing and then some criminals of course because they're always looking for opportunity they start to try to smuggle drugs in hand sanitizer or in shipments of masks which while everything else is slowing down, shipments of those products are, if anything, they're ramping up, right? So why don't we attach ourselves to those shipments as well? And COVID didn't really impact the drug trade.
Starting point is 00:42:56 It's crazy. It impacted people buying cocaine or ecstasy or whatever, because they literally can't go to nightclubs or festivals or anything else. It didn't really stop the international drug trade. They just found other ways. Yeah. And I imagine if you're thinking about the Australian authorities as well, the criminals down there were probably helped by the fact that Australia had this kind of quarantine measure where a lot of life was quite normal in much of the country for a while. So things could continue and people were still going to the nightclubs and stuff like that. You know, eventually the FBI sets this deadline, this date of June 7th, 2021, where everything is going to be revealed because the number of users on the platform is just growing too great. And also they have this ruling that allows them to
Starting point is 00:43:42 continue funneling data through Lithuania until June 7th. And so instead of trying to get that renewed, they're just going to set that as the date where this is all ending. And the preparations begin for what all of these different authorities who are now involved in this project are going to do and how they're going to use that information. What's the preparation for that kind of big reveal what does that look like yeah things are getting really hectic really crazy one fbi agent in the book is saying things like we just can't do this anymore this is getting out of control it's going to break then more resources come in and then they carry on and it's like this endless loop that's it's going to snap at some point as for the preparations after they set the date there's just a flurry of activity. I've gone through, I think, tens of thousands of pages of police reports from various countries and read them all one by one. Around this time, that's when you see officers going out into the field. They're filming the people they've been reading the messages on for months, if not years at this point. They're following some hotels, they're trailing them in
Starting point is 00:44:45 cars, they're flying drones over them and everything. And they're sort of doing all the techniques you would ordinarily expect in a law enforcement investigation, but on steroids and on an insane deadline. It's like, we have June 7th, it's now April, May or something like that. And we need to gather evidence on these people, not just so we can arrest them, but we can prosecute them. And there's this switch from a non-being an intelligence gathering tool to a judicial tool. And they're going for all of those. And eventually, they get a target list of 800 people that they're going to arrest on a single day. And that's just an insane number to me. Like Sky and EncroChat, they got probably a lot more messages and a lot more intelligence, but Anom
Starting point is 00:45:31 is sort of the single biggest law enforcement sting operation ever, especially on that day. The 800 planned arrests and then eventually 10,000 law enforcement officials are involved. I mean, that's like a small army all over the world acting on that single day. Before we talk about what comes out of that, obviously in the months and the years leading up to June the 7th, law enforcement around the world are using this information to increasingly act on things that they're seeing in these messages and in these voice recordings and these calls and things like that, that they are receiving through the Anom network. Do the criminals ever get wise to the fact that they're using this phone system that is actually
Starting point is 00:46:15 owned by the FBI? So that's the constant tension in that some authorities would say, we have to act, we have to shut down this drug lab, or we have to seize this shipment. And they would have to sort of fabricate some sort of reason, not really for why they want to do it, because they want to get the drugs, but what they say to the suspect, or even sometimes to their own colleagues inside the same agencies. There's one Swedish official who had to lie to her counterpart because he thought, oh, there's a source who's giving you this information when actually it was a norm. She just had to glaze over that. She didn't feel great about that, to be honest. That also brings up a few justice issues as well. It's basically parallel construction, even though eventually when these people are prosecuted,
Starting point is 00:46:58 it is revealed that it's a norm. Criminals, in the context of that flurry of activity, did start to get suspicious of a nom. There was just too much activity happening. If they had been able to zoom out and seen the connection between all of these raids, all of these seizures, they would have realised quickly it was a nom. But eventually, people are telling themselves, something's wrong with this phone. I think someone says it's cursed at one point because their friends got onto it and they immediately got raided. And that's another constant drumbeat in the background of this, which is that the FBI doesn't really want the criminals to figure out what is going on before the FBI gets to
Starting point is 00:47:40 act. Because obviously, they can go and destroy evidence or they can run away or anything like that. But some people do start to get wise. Yeah. Yeah. And so what does June 7th, when they finally undertake this operation, what does that look like? And how does this ultimately get revealed to the world that the FBI has been running this and all these other law enforcement agencies have been involved? So the plan was, as it was told to me, to follow the sun. And that means it starts in Australia. They're doing these, I think, early morning slash late night raids of kicking down doors and
Starting point is 00:48:11 arresting bikers, that sort of thing. Eventually, they have a press conference where the Australian authorities announce that, hey, we've been reading messages from Anom. Sort of at the same time as that, the baton has passed to European authorities in Europol, and they start arresting people and they start chasing people down. They have their own press conference as well. By this time, it's very clear to the criminals what was going on. Oh my God, Anom was bugged the entire time. This is a disaster. Many of them are now in a police car or in a jail cell or whatever. And then eventually, later in the day, the DOJ, they come out and they say, we were running it the entire time. And they say a key piece
Starting point is 00:48:51 of information, which I think has implications much more broadly. They didn't just want to arrest people. They wanted to undermine trust in the hardened encrypted phone industry. This wasn't just an operation to gather evidence and arrest people. It was like, we want to fundamentally shift how criminals think about encryption. Yeah. And as I understand it, since Anam has gone down, and obviously Sky and EncroChat were hacked by European authorities, by French military police, that there hasn't been another large encrypted phone company like this before. There are smaller ones, but not anything to this scale. Is that right?
Starting point is 00:49:29 Yeah, there's nothing really big. There was one called Cypher that was very large in Australia, and they just threw in the towel and basically quit the business, presumably thinking they were going to be next. I spoke to people who were inside the company at the time, and to pull it bluntly, they were freaking out essentially inside. Then I ended up speaking to more people who sell encrypted phones after the Anom operation. They said it's basically impossible to get a user base now because everybody suspects, well, is this run by the FBI as well? Is this run by the Dutch or the Australians? There is a massive tinge of paranoia through organized criminal communities now. That's not to say they've stopped using cryptophones, because some definitely still use them,
Starting point is 00:50:16 but everything has changed now, for sure. And so if we look at the broader impacts of this Anom operation and what the FBI did, if we look at the broader impacts of this Anam operation and what the FBI did, if we look at the law enforcement side of it first and the criminal side of it, what ultimately was the broader impacts for law enforcement and for trying to clean up this criminal activity in the various countries where this was being used? Have they really been successful at disrupting what is going on here? Have they been successful in prosecuting a lot of these people and arresting a lot of the people involved with it? What have we seen there? I mean, Anom ended up getting well over a thousand arrests in total. There were
Starting point is 00:50:55 multi-tons of drugs seized, something like 150 weapons, I think, and 150 threat to life mitigators, which is when the police intervened in some sort of way when somebody's life was under threat. That is all, just on a quantitative level, pretty damn successful, right? They arrested a bunch of suspected and now sometimes convicted criminals, to answer that part of the question. That doesn't mean that the war on drugs was over and whatever. I was shocked by some of the sentiment of the European officials I spoke to who, even after doing this operation and the EncroChat and the SkyOne, they started to question, well, is this even the right thing that we're doing? We seized the drug shipments and then
Starting point is 00:51:41 there's just more, which of course goes back to the age-old question of, well, the war of drugs is a massive mistake of resources and ends up with a bunch of people being arrested when maybe they shouldn't. That's basically another discussion. But even with all of those seizures, the drug industry continues. It just soldiers on and it will continue. Yeah, I think it definitely does make us reflect on what is actually needed to stand us out if that's ever even possible and what it looks like to try to get a greater control over what's happening there and to reduce the killings, the crime, the traffic of drugs. And on a political level, whether the policies that we have are the right ones, if those are the sorts of goals that we have, right? But then on the other side of this, there's also the question of the broader implications,
Starting point is 00:52:27 even beyond the criminals, for the ability of law enforcement to do something like this, right? And there's obviously a very strong push in privacy communities to ensure that all of our communications, that everything we do is encrypted and is happening on encrypted platforms
Starting point is 00:52:44 and things like that. What broader reflections do you think that this sort of case kind of forces us to have about a push like that or a movement like that? So Matthew Green, who is a cryptographer, does a really interesting thought experiment at the end of the book. And he has no problem, he told me, with authorities targeting these closed closed basically criminal networks i thought they're using phones that's very stupid hack them whatever what he brought up and i think it's a really really compelling argument or thought experiment is well what happens when it's not entirely criminals is the split 90 criminal 10 innocent and then they're
Starting point is 00:53:23 okay compromising that or is is it 50-50? And he even uses an example of, let's say half the criminals are doing something like copyright theft of song lyrics, something I don't really care about. I don't think many people would care about. And then the other half are hardened top tier drug traffickers. Would the FBI be okay compromising that network? And we don't know the exact answer yet, but by all indications, by me sneaking into a law enforcement conference where an FBI agent said they look forward to the next iteration of this operation, whatever that may be. And in my conversations with the San Diego FBI, when I asked them, well, what about Signal and
Starting point is 00:54:06 that sort of thing, and this is what people are worried about, they say that we believe we should have access to any encrypted messages that we're legally entitled to. And yes, Signal on a technical level does not allow that. Legally, the FBI would argue that it should have access. Now, to be absolutely clear, I'm not saying the FBI has compromised Signal in any way. I use it every single day. I trust it with my security more than any technology products on the planet. But the FBI is not going to stop at a norm. And people I've spoken to who used to use encrypted phones or used to sell encrypted phones, they say people have moved to using apps such as Signal with a customized Android phone. I don't think the FBI or any of his partners are then just going to clap their hands and be like, okay, well, now we won't bother
Starting point is 00:54:55 and we'll go home. They're going to continue. They've told me as much. And I think it's important to say that about Signal as well, because there have been some suggestions recently online pushed by Elon Musk and people like that, that Signal is actually insecure and you should be using Telegram, which is not nearly as secure as Signal is. So just to kind of mention that and put that out there. I wanted to drill down on that point a little bit further with you though, right? Because so we have obviously these law enforcement agencies that want to get access to these communications of criminals that are happening on encrypted platforms. And when we talk about Anom,
Starting point is 00:55:29 that is them really targeting a platform that is basically designed and meant for criminals, where mostly criminals are going to be using it. But do you think that obviously now that criminals do not trust something like that, a network that is just for criminals any longer and are increasingly moving into more consumer products that offer encryption. I think that obviously puts them more at risk, but does the lack of allowing law enforcement to get any access to these sorts of messages then create the further incentive for them to try to do more projects like Anom or to create more surveillance softwares that, you know, certainly might not be breaking the encryption on these apps, but are getting other sorts of ways of surveilling communications onto your phones,
Starting point is 00:56:14 like a Pegasus software or something like that. Like what is kind of the arms race that you think that this gets into? And does it force us to have some consideration of whether there are times when it makes sense for law enforcement to be able to get access to some of this stuff? I think apps or technology platforms or whatever, not providing legally requested information to the authorities absolutely does create an incentive for the FBI or any other agency to find new techniques. That's not me saying I think Signal should hand over data. I'm just saying, yes, that's like the cause and effect, right? In that Signal, or I would argue Telegram a lot, does not work with the authorities, even though it is cryptographically garbage.
Starting point is 00:56:58 It does not readily provide data. Now, that will create, I think, a situation where on one side, you could have authorities doing something like Pegasus, as you say, it's like, well, we can't get data from the app. So we're going to do this thing that's very, very expensive and very on a per target basis. And we'll hack into a phone, we'll get their data, and we'll do it that way. The other side is we're going to do something much broader, and that could be the undermining of a particular app, or it could be something like European legislators and authorities are debating at the moment in Europe, is that, well, we want the scanning of encrypted messages
Starting point is 00:57:36 for child abuse material, which could easily balloon into all sorts of other content. I mean, I think there was a leak to the outlet Balkan Insights where a Europol official admitted as much. They said, yeah, this is good for CSAM, but we would like it for every sort of crime. I mean, they're just saying it now. They're not even hiding it. And maybe there is a third option. Maybe there's a secret third option that I'm not thinking about right now. But when it comes to mass compromising of apps or targeted exploitation of devices, I'm going with the latter personally, because you absolutely have to have a warrant to deploy that tool. It can be in a limited circumstance because it's so expensive to hack iPhones relatively. I don't think either of them are great, but this is the
Starting point is 00:58:21 real world and this is how messy and complicated it is. And I think the idea that, well, the FBI just aren't going to do anything, go home, is naive. They're going to do something. And I think members of the public, civil society, law enforcement journalists, policy makers, policy experts need to continue having that discussion around what one of those options or some sort of other option might be. Yeah, definitely. And one of the things that stood out to me in the book and that we've talked about, of course, is how the FBI was ultimately not able to monitor these messages that were happening in the United States that were being sent in the United States,
Starting point is 00:58:59 because it largely couldn't get the approvals to do that. Obviously, it's a very bureaucratic system. And obviously, there are a lot of problems with US intelligence agencies, US police, US law enforcement. There's no debating that. Does that give you any reassurance about the ability to ensure that these law enforcement agencies don't do the worst possible thing and don't surveil everyone's communications, even if that opportunity is available to them? American police have a ton of different problems, obviously. So I'll, of course, preface it with that. The reason that Anon was not monitored in the US was more because there was a particular part of the DOJ, the Office of Enforcement Operations, OEO, I think, they basically sat on the wiretap orders to do this. The prosecutors of San Diego
Starting point is 00:59:47 had everything set up. They were going to work with the LA agents and officials as well. They sent off the first wiretap request and OEO, which approves all wiretaps in the US, just didn't approve it. They didn't say no, but they also didn't approve it. I think you can look at that a couple of different ways. You could look at it as, well, OEO did its role because it didn't approve this wiretap that it didn't agree with. And that shows that checks and balances work. And that's a good thing. You could frame it like that. Or you could be like, they got in the way of something which could have caught a lot of criminals legitimately. I'm not leaning to either way. All I would say is that when we have even just the hacking tools or these mass monitoring tools, there obviously has to be
Starting point is 01:00:32 massive checks and balances in place to ensure that they're not inappropriately used with any sort of law enforcement technology. I would be very, very scared if there were no checks and balances on this, obviously. And I guess it's a silver lining to some that that never happened for that reason. I would think the San Diego FBI and the prosecutors in San Diego would strongly disagree with that because they were fully prepared to do it. And they thought they had every legal right to. They did believe it was legal to do that. Yeah. I guess in that case, they were looking at this specific network that was used by criminals. And I guess if we're talking about them being able to look at something further,
Starting point is 01:01:12 do you think it gives you reassurance that it wouldn't just be mass surveillance of the broader public, but would be targeted? Or it's hard to say for sure? That's where I get more scared. Where it's not used on a specific network that the overwhelming majority are criminal. And we're talking about just monitoring an encrypted platform. I don't know. I think you possibly need more than nice little checks and balances to help with that. I think that's a discussion we need to have where fundamentally, do we even want law enforcement the capability to do mass monitoring of encrypted platforms like this. And I imagine a lot of people would say they don't want it,
Starting point is 01:01:52 but they're going to try. Yeah, absolutely. Joseph, this has been a really enlightening and fascinating conversation. As I said, I thoroughly enjoyed the book. I thought it was such an interesting read to learn about this broader story and network that honestly I had never heard about before. I missed all the reporting on it back around when this was unveiled. So thanks so much for taking the time to come on the show and for having this chat. I really appreciate it. Same. Thank you so much for having me. Joseph Cox is the author of Darkwire and the host of the 404 Media podcast. Tech Won't Save Us is made in partnership with The Nation magazine and is hosted by me, Paris Marks.
Starting point is 01:02:28 Production is by Eric Wickham and transcripts are by Bridget Palou-Fry. Tech Won't Save Us relies on the support of listeners like you to keep providing critical perspectives on the tech industry. You can join hundreds of other supporters by going to patreon.com slash tech won't save us and making a pledge of your own. Thanks for listening and make sure to come back next week. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.