Tech Won't Save Us - How the FBI Tapped the Encrypted Chats of Criminals Around the World w/ Joseph Cox
Episode Date: June 6, 2024Paris Marx is joined by Joseph Cox to discuss how the FBI created an encrypted phone company called Anom to read criminals’ messages and eventually carry out the largest international sting operatio...n by law enforcement.Joseph Cox is the author of Dark Wire: The Incredible True Story of the Largest Sting Operation Ever and the host of the 404 Media Podcast.Tech Won’t Save Us offers a critical perspective on tech, its worldview, and wider society with the goal of inspiring people to demand better tech and a better world. Support the show on Patreon.The podcast is made in partnership with The Nation. Production is by Eric Wickham. Transcripts are by Brigitte Pawliw-Fry.Also mentioned in this episode:Read an excerpt of Dark Wire at Wired.Joseph wrote about the revelation that Lithuania hosted the Anom interception server and provided the intercepted messages to the FBI.Support the show
Transcript
Discussion (0)
This wasn't just an operation to gather evidence and arrest people.
It was like, we want to fundamentally shift how criminals think about encryption.
Hello and welcome to Tech Won't Save Us, made in partnership with The Nation magazine.
I'm your host, Paris Marks, and this week my guest is Joseph Cox.
Joseph is the author of Dark Wire, the incredible true story of the largest sting operation ever,
and the host of the 404 Media podcast. This is an absolutely fascinating conversation that gets into the story of how the FBI created
its own encrypted phone platform to target criminals around the world and ultimately
work with other law enforcement agencies to share those messages and that information
to target criminal networks that were operating in Europe, in Australia, and many other parts
of the world, of course.
This was honestly a story that I had never even encountered before, I guess because I'm not so
much in these circles where these sorts of things are discussed. So when I picked up Joseph's book,
I could hardly put it down because this story was so compelling. And of course, the way that
Joseph has written it is so deeply reported and has so much perspective on both the sides of the criminals who were doing these drug operations and these kidnappings and assassinations, but also on the side of the law enforcement who are watching these things, who are trying to set up these networks, who were trying to break the encryption on other encrypted phones, and were ultimately seeking to disrupt these criminal
networks and the criminal activity that was happening within their jurisdictions. The story
is not only a fascinating one, but it also brings up really big questions as to whether authorities
should be doing things like this, should be carrying out these sorts of major projects,
what it means for broader privacy if it starts to move away from
networks that are just used by criminals into ones that are used by much more of the general public,
and the broader question of how law enforcement, but also how criminal networks work in the 21st
century, and how both of them are adapting to these new digital technologies and everything
that is being thrown at us. So as I say, I found this conversation absolutely fascinating. I think you will too.
I don't see a need for me to go on much more about it and we should just get into the conversation.
So if you enjoy it, make sure to leave a five-star review on your podcast platform of choice. You can
also share the show on social media or with any friends or colleagues who you think would learn
from it. And if you want to support the work that goes into making the show every week,
where you can get a shout out, some stickers if you want,
and access to our ad-free RSS feed as we begin to introduce some ads into the main feed of the show,
you can join supporters like Joe in Arlington, Virginia,
Jor from Slovenia, and Jim from South Carolina by going to patreon.com slash techwontsaveus
where you can become a supporter as well.
Thanks so much and enjoy this week's conversation.
Joseph, welcome to Tech Won't Save Us. Thank you so much for having me.
I'm very excited to chat. You know, you contacted me a few months ago about the book.
When I heard about it, I was like, this seems interesting. I'm not like super sure if it's
like in my wheelhouse. And then I started digging into it and like I could hardly put it down
because it's so fascinating. And you know, I was saying to you before we started recording, I think that you've found a way
to present a kind of tech story about this involving the police that makes me actually
kind of empathize with the police and feel like I'm on their side, which just feels wild.
Yeah, it's a very, very complicated story.
And as I said, just before we started recording, when privacy people read it, they're horrified.
And then when people who lean more on the side of law enforcement, they find it amazing and
fascinating. And then I think there'll be a lot of readers, myself included, after writing the book,
who sit in the middle and they're kind of confused about what we're supposed to make of this because
it has implications for everybody. Yeah, I think that is absolutely true,
right? I was reading aspects of it and I was like, Whoa, holy shit. But then other aspects where I was like, yeah,
this is great. They're getting the criminals, you know, right? Like, and maybe that partly comes
from like, you know, watching these police shows that we're all used to watching over such a long
period of time, and how this kind of like, you know, also gives us this idea of how these things
all work. But I'm wondering, you know, we'll get into the details of this story, but how did this whole kind of case and how did this whole idea of these encrypted phones and
the involvement of authorities like the FBI, how did this all get on your radar?
It got on my radar because I found an obscure Dutch crime blog in around 2016. And people on
there were talking about these PGP blackberries. And I'm like, what the hell is a PGP
Blackberry? It turns out it's an ordinary Blackberry that they've installed pretty good
privacy email encryption software on. And as I started digging, it turned out that a lot of the
top tier criminals were not using ordinary Apple or Google devices. They were using these highly
customized phones,
which not only had email encryption software, they had the microphone removed, the GPS taken out,
the camera as well, like really extreme modifications. And I just became completely
obsessed with this industry, like in the same sort of way that someone would cover Facebook as a beat.
I started covering the weird world of encrypted phones for
criminals. And I definitely approached it from the perspective of the criminals and of the people who
make these phones. I haven't really interacted with law enforcement much up until writing this
book. I've always spoken to hackers, drug traffickers, smugglers, hitmen, all of that sort of thing. So I came from there. And I think nobody,
no journalists, at least, had really messaged these companies before or just asked, like,
hey, so what are you doing with these? And some got back to me, some threatened me,
as is just the nature of this sort of story. But I developed sources in this community.
And that led to me learning about Phantom Secure,
which is one of these companies being shut down by the FBI before the FBI actually announced it.
And then all of these other side stories. And it basically meant that when the Anom story,
which is what Dark Wire is primarily about, I was very well positioned to tap into all of my
sources and be like, well, what actually really
happened here? Yeah. And that really comes through in the book as well. Like the quality of the
stories that you tell, you know, the depth that you get into, it is very apparent from the book
itself. And listen, you might not have been on the Facebook beat, but someone needs to be on
the encrypted phone beat, which is much more unique and probably interesting as well.
If we go back, like when does the criminal use of these
encrypted phones and the beginning of using specific phones that are designed for their
needs, when does that really start to emerge and when does that start to become popularized?
Yeah, it starts to happen after BlackBerry becomes popular. I mean, we all know about
President Obama having his BlackBerry. When I was growing up, having a BlackBerry was sort of a status symbol among my friends.
I never had enough money to buy one.
I never had one either.
No, I could not afford that.
But it was clearly a status symbol.
And then criminals started to use it because it had BlackBerry Messenger.
And that was seen as more secure.
It was sort of more a direct form of messaging and scrambled. I wouldn't say
encrypted, but the messages were scrambled. And then the cops got wise to that and they did all
of these sorts of operations around BlackBerry Messenger. And then that's when the criminals
started to, well, let's customize the phones a little bit so we can still use them, but we can
be a step ahead of what the authorities are doing. And it's this constant cat and mouse
game, as it always has been with law enforcement and criminals, right? We've had burners, we've
had pagers, we've had pay phones, whatever. And now we have very sophisticated cryptography
installed onto a customized device. It's always that cat and mouse game. And that's sort of the
lineage that leads to these very expensive very
customized phones one of the things that stood out obviously because i am in canada is how at
least early on a lot of this seems connected to canada obviously blackberry is a canadian company
phantom secure as you're talking about i believe is based out of or was based out of vancouver
i think sky which is another one of these encrypted phone companies, is Vancouver-based as well. Is there a particular reason why a lot of this seemed to be coming out
of Canada? It's really fascinating that so much of it is localised in Canada, both on the law
enforcement side and the company side. It's kind of hard to tell, but my read on it is that,
rightly so, it's not actually illegal to make one of these encrypted phones. It's not illegal in and
of itself to sell an encrypted phone.
I don't think any of us really want to live in a world where you can get criminally prosecuted
for making what is code designed to mask messages.
Don't really need to go down that.
I'll just take that as it is.
But it's not illegal to do that in Canada.
So that's where a lot of these companies started to spring up.
I imagine it also has something to do with BlackBerry also being from the country as well,
right? And they could more easily just get used to the technology and manipulate it. But as you say,
the Royal Canadian Mounted Police were really some of the leaders when it came to
targeting criminal use of BlackBerry devices. They did this really audacious operation where they somehow obtained
the global decryption key for BlackBerry Messenger, which means they had a key to unlock,
well, an infinite number of safes all over the world. It didn't just have to be in Canada.
And that's actually sort of a preamble for a norm, because I think it just shows sort of the extreme
lengths that law enforcement are
prepared to go to access encrypted messages. Even if the format of those messages then changes over
the coming years and decades, the police will really push the envelope when it comes to encryption.
Yeah, and it is a fascinating story. And just to be clear, Anom is the company that ends up
getting started by the FBI, which we'll talk about in just a minute.
But I was hoping you could give us a bit more detail on how the use of these phones and the design of these phones actually evolves.
Because you're talking about there how early on a lot of these were kind of BlackBerrys and then eventually modified BlackBerrys.
But obviously, as the broader expectation for smartphones starts to change because, you know, we get the iPhones and the Androids and they start to become more advanced.
I'm sure criminals want a lot of those features as well. So how does that kind of affect the way that these encrypted phones evolve over time and the way that these companies are making
them? Yeah. So Phantom Secure, one of those companies that was doing encrypted customized
BlackBerrys, they just sold encrypted emails and it got to the point where their customers just
expected more. Other companies were coming out with Android smartphones where you could send voice messages or make calls.
You could send photos across, all of the sort of stuff that we take for absolute granted when it
comes to consumer communications. Criminals want to send photos too. They want to send emojis or
whatever. So Phantom Secure sort of fell out of favor because it wasn't
prepared to innovate. And then you had other companies such as EncroChat and then Sky,
one you mentioned, they also started using iPhones. And it is almost like there is this entire
shadow industry, which has product launches and rebrands and new features just like Google or Apple or whatever. Maybe some people look
forward to seeing the new ultra-thin iPad or whatever. These criminals look forward to,
oh wow, there's a voice scrambler on these phones now? That's really, really cool.
And these criminals have intense brand loyalty. I mean, I was even told about some people getting
tattoos of specific brands. And that's because there is a status symbol here as well, as in, if you do not have
an encrypted phone, you're not a real criminal. As in, I've literally seen that quote in some
messages as well. It's a logistical benefit, as in, well, we can hide our messages from the police.
But then if you're in a meeting with somebody and you put a customized phone on the table,
oh, I'm dealing with the real deal here.
Fascinating.
You know, obviously, when we kind of go buy our iPhones or Android phones or whatever,
we go to the Apple store or we go to the telecommunications company's local store,
whichever telecom company operates in your jurisdiction.
That's where we get our phones.
That's how it works. How does it work to get your hands on one of these encrypted phones?
Typically, it's with a reseller, and often it is in person. You can go to some shops and buy them,
but they are, for lack of a better way of putting it, and they also describe this themselves,
spy shops. So you might go to Amsterdam and on one side, there'll be
GPS trackers, bugs for putting in cars, anti-bug tools as well. And then maybe behind the counter
or maybe elsewhere, there will be some of the encrypted phones. That's sort of the only
context in which you're going to buy these phones in which it resembles anything like buying a
normal one. Ordinarily, it's going to be word of mouth through your criminal network who wants to work with another one, or you want to
join a criminal network. You have to be on the same phone as everybody else because they're
typically closed networks. You'll get introduced to a reseller and you'll go buy it in person or
it'll get shipped to you. That word of mouth network has a couple of benefits in that it keeps the customer base insular and
you're not really going to have cops coming in and that sort of thing, at least ideally.
And then for the criminals, it also gives them someone to blame if things go wrong. It's like
if a criminal downloads Signal and buys an iPhone, what are they going to do if they get caught?
Yell at Tim Cook or like yell at
Signal? I mean, maybe they might, and that could be very scary. But what they can do here is they
can go to the resellers, you sold me a phone that was bad, or they broke the encryption or something,
this is your fault. And there can be repercussions for that.
Right. Yeah. It could be scary repercussions, I'm sure, depending on the person who we're
talking about. So you talked about how the RCMP in Canada got this key for the BlackBerry messengers, and that started to
compromise BlackBerry's and forced these criminals to go in a different direction,
have very specific phones. How does law enforcement more generally start to really
target these encrypted phone companies and start to kind of take them down? They start by trying to get insiders. They start by trying to flip the sellers or maybe the people
who are the higher echelons of the organization and try to get closer to them. In the case of
Phantom Secure, they tried a few different things, but the thing that eventually worked was that
the Australian police had a Phantom Secure reseller or distributor. They
flipped them and told the distributor, you need to get close to the CEO, a man called Vincent Ramos.
A long series of events leads to Ramos saying some very incriminating stuff in an undercover
meeting with law enforcement officials. And they arrest him. They do try to flip Ramos to put a
backdoor into Phantom Secure.
They're not successful. He escapes. There's a very dramatic escape when he's trying to get to
the Canadian border, and I won't spoil exactly what happens, but that's what they try to do.
They try to flip the people to then flip the code. What law enforcement really want is a backdoor in
one of these systems because Phantom Secure had 10,000 users, the vast majority
of which appeared to be criminals. If you're a law enforcement officer, imagine getting access
to those messages. It would be an intelligence goldmine. I really can't think of anything more
valuable to law enforcement than getting a backdoor in an encrypted phone company.
One of the things I was fascinated about as I was reading it is you were describing how
when they're going after Ramos and he kind of flees the scene and he's headed toward
the Canadian border, the authorities are actually like, oh my God, I wish he had gone to Mexico
because it would have been so much easier to get him back from Mexico.
And if he crosses into Canada, it'll be so much harder.
And I had never really considered that before.
I mean, same. I was surprised when people I spoke to told me that. And it's because sort of what you mentioned earlier about these companies based in Canada, he's a Canadian
citizen going back to Canada where making or selling the phones is not a crime. That's going
to be tricky for the American authorities. Whereas if they run to Mexico, they'll find a way to grab them, you know, pretty easily.
Yeah, definitely. In the book, you talk about how, you know, once Phantom Secure is taken down,
there's kind of a two pronged approach that the authorities and the FBI in particular,
well, I guess not just the FBI, but you know, European police and people like that as well,
really try to carry out in order to get into these encrypted phone companies and to figure out what these criminals are actually doing.
And one path is, you know, trying to actually crack these existing companies, you know,
the skies and the anchor chats, as you were talking about, but then they also get presented
this opportunity to actually have control over an encrypted phone company without people
knowing.
How is it that they start to head down these different paths to try to crack these companies
and these broader criminal networks? So after Phantom Secure is shut down by the FBI,
it's very, very clear to people in the industry that sell these phones that they could be next.
You know, this is a watershed moment. The FBI is not messing around anymore. The gold rush of
selling phones to
these criminals looks like it's over, or at least the end of it's going to start.
So someone in that industry who uses the name Afgu then reaches out to the FBI and says,
look, I'm making my own company. It's called Anom. It's not really fully developed yet. It
doesn't really have many customers,
but would you like this for you to use in your own investigations? I said earlier about
how I can't imagine anything more valuable to law enforcement than the backdoor in a
crypto phone company. I lied. This is more valuable. You get to run the company yourself
and put in whatever backdoor you want. That is what was
on the table. In return, AFGU would get a lighter sentence for whatever charges they
may or may not have got prosecuted with later. But this is like the ultimate ace that AFGU
played and basically handed the FBI and their partners, the Australian Federal Police,
a tech company. A tech company for criminals that the FBI now had to
figure out how to run. They had to run the sort of phone tech gadget startup of the criminal
underworld. When I was reading about the FBI's involvement in that and getting it set up,
obviously they had AFGU and this team that he put together to kind of help get it started and
run it and things like that.
But I was like, man, they always say like the government can't run a tech company and doesn't understand tech. And here's like the FBI running an encrypted phone company that becomes like
globally used before it finally gets shut down. The Department of Justice is not usually a place
for move fast and break things. And there were issues with the main DOJ that the book gets
into later. But for the most part, these FBI agents and the prosecutors from San Diego just
ran with it. And I mean, even one of them, Andrew Young, told me to slightly paraphrase,
the idea was that let's just keep going until someone tells us to stop. And they thought that
was going to happen at various points, but they were like, fuck it, let's just go because this opportunity will probably never
present itself again. And so how does Anom and this company get off the ground, but also take
advantage of the fall of Phantom Secure and questions about some of these other companies
to really start to grow and get those phones out there. Yeah. So when Phantom Secure shuts down, there is obviously a big vacuum. This was one of the
biggest companies in the space. Sinaloa Cartel used it and a bunch of other criminal networks.
Anom was very well positioned to fill that vacuum. AFCU already had connections in the
criminal underworld, especially to someone called Hakan Ayik,
who listeners may not be familiar with, but he is, I guess still is, the most wanted man
from Australia, a top tier, multi-billion dollar drug trafficker. And Anam starts first by seeding
a few phones in Australia, literally just five, a handful. It then gets spread around. But very
quickly, more people want to get on this phone, more people want to a handful. They then get spread around. But very quickly,
more people want to get on this phone, more people want to use it, and especially people
overseas want to use it. Because of course, the globalised nature of organised crime today is that
people do not stay in their own territories. And if they do, they simply work with people
from other territories as well. The idea of organized crime groups is an old idea
now. It's very much organized crime networks. And AFGU starts to get these inquiries like,
hey, my people overseas want to get on a NOM as well, and we need them to be on the platform.
Can you help us out? And of course, agrees with the FBI in the background, encouraging all of
this as well. But Hakan comes in,
the very high tier drug trafficker, and he is the one who really helps Anom explode,
especially in Europe, but people he brings in also globally as well. You need these drug trafficking
influencers, which is what law enforcement calls them, as ambassadors for your product.
I said it was a brand, the status thing. What is a better endorsement of your product than the most wanted man in
Australia using your phone? Yeah, absolutely. And around when is this really happening? Is
the FBI setting up this company and it's starting to get in people's hands? What's the timeline here?
So it starts in around 2018 and stuff is a little bit slow for the first few months, but come
a year, people are talking about it by the fall of 2019. And that is when the FBI itself starts
to actually get access to the messages as well. Up until this point, it's just been the AFP for
various legal reasons. The FBI then gets access in 2019 and they can finally start reading the
messages that are coming
in from all over the world, basically, by that point. Yeah. And you talked about how, obviously,
this is an operation that was kind of led by the FBI, but they very early on partner with the AFP,
the Australian Federal Police, because of a lot of work that's going on down there. And as you
talked about these connections that exist between Australia and these larger criminal networks.
What I was thinking, you know, again, coming from this Canadian perspective that I have,
is when we were talking about Phantom Secure and the arrest of Ramos, you know, you had the
American authorities along with the Australians and the Canadians involved. And there was a
suggestion or, you know, it was confirmed that Canadians had actually kind of given information to Ramos to let him know that,
you know, he was kind of being targeted or whatever, so he could get away.
Were the Canadians excluded from this broader operation in part because of that? Or was there
any suggestion from it? Or is there another reason why they just tried to go with the
Australians to start? I haven't seen any evidence of that's the reason why Canada was
not broadly included in the norm. They are mentioned much later in the press release thanking
them, but their role certainly was not as large as the FBI's or the AFP's. And what you're referring
to is that, of course, there was a very high profile case in Canada where a civilian senior
intelligence officer leaked information to Ramos, which,
even if it didn't necessarily help his case, it could have, and that was a serious security threat.
I think more the reason that the AFP took the lead was, one, because the AFP has been stymied
by encrypted phones for decades by this point. Serious biker gangs use them. You have the
Comacheros, which are very violent, Hells Angels, the Banditos, all of the Serious biker gangs use them. You have the Comacheros, which are very
violent, Hells Angels, the Banditos, all of the sort of biker gangs you would expect. And they
have straight up assassinations planned on these platforms. It really is a massive problem in that
country. So I think that's the first reason. The second is just like sort of a more boring legal
one. Australia recently had a relatively new surveillance law that basically
allowed this to happen. And they were like, we're allowed to monitor all of these phones if they
have a nexus to Australia. And it acted as something of a beta test for the FBI, also because
some of the American officials felt the DOJ wouldn't go with the plan if it hadn't been
proven to work. So let's just use
Australia as a nice little test tube and they can figure out what it's doing, prove it works,
and then the FBI will step in and start doing it there.
Yeah, because this becomes a really key part of the story that you tell, right? The FBI is
spearheading this operation, is ensuring that this company can run and this whole operation is
taking place and eventually bringing in international partners. But they get the kind of legal authority to start looking at these messages that are being
sent outside of the United States. But if I understand it, they never ever actually get
the authority to look at stuff that's happening within the country, right?
That's basically the compromise that the FBI and the San Diego prosecutors had to accept, the DOJ was not prepared to allow monitoring of Anom
messages inside the US by the FBI, because that brings up massive fourth amendment or wiretapping
issues, depending on what legal route you're going to take. So they found a workaround.
They put into the code that whenever there was an Anom phone on US soil, the messages would not be sent
to the FBI. They would still be sent to the Australian Federal Police, and they agreed to
monitor those messages for threats to life, which is somebody trying to assassinate somebody else,
somebody saying, I'm going to kill you, all of that sort of thing. The AFP would then provide
a tip-off about that threat to life, and then maybe
the FBI could act or something like that. It was, in its simplest terms, I absolutely think it's
fair to say, it was a workaround. It was a legal workaround so that Anom phones in the US would
still be monitored for certain content. It just wasn't the FBI doing it.
Yeah. As I understand it, there are some other restrictions that they put on what they could actually monitor. They were obviously going after criminals, but then other
people would get these phones as well because they were engaging with criminals or new criminals.
And they had certain regulations on what they were kind of ethically or legally allowed to look at
beyond just Americans, right? Yeah. So the FBI treated it ethically as a wiretap, even though it was this massive
data harvesting operation, basically unprecedented. They treated it like a normal wiretap in that
if a lawyer got the phones, they would really try not to look at those. If a civilian got the phones,
which is what happened, they would try not to monitor those as well. But to be clear,
there was sort of no legal barrier to the FBI
doing that because the way they set it up technically and legally, this massive dump of
messages came every Monday, Wednesday, and Friday with basically no strings attached, except don't
look at phones in America. So they could rummage all they want. And of course, that did lead to a
ton of drug shipments and all of that sort of stuff
being seized. Also raises some pretty serious questions about, do you want to allow a law
enforcement agency or its partners unfettered access to a platform? And the FBI's argument is
that Anom was for criminals. So anybody on this platform is fair game. That's their argument, at least.
Yeah, no, I see that. And we can talk about that a bit more later and the broader ramifications of
that. But as the FBI and as the AFP started to receive more of these messages, started to
be monitoring what was happening on this encrypted phone platform network, whatever we want to call
it, what did they start to find? Did they learn important things by having access to the communications
of these criminals? The FBI and its partners found basically that the communications were
overwhelmingly criminal in nature. I found this myself when I eventually got copies of the Anon
messages and I would go through them. It's just drug deal after drug deal, shipment after shipment, assassination after assassination.
So they're getting all of this sort of intelligence on how the drugs are being packaged and all
of these sort of unusual techniques like putting them into stone slabs and lumber and all of
these other very fantastical techniques, where they're being shipped from,
where they're being shipped to, who is selling them, where they're being sold, the entire
supply chain, as much as they could, of multi-ton cocaine deals. You just do not get
this sort of visibility normally. Then there's the money laundering and the safe houses.
There's the people who are ordering the hits. There's the massive public corruption at ports or inside government offices
as well, where, I mean, Andrew Young, the prosecutor I mentioned, he was blown away
by how much corruption was going on. And that's especially something that you just don't really
hear about normally. That is a really hidden part of the international drug trade,
but Anom, and then later some other operations into Sky and EncroChat, really revealed some of
that. Yeah. And of course, as you would expect, that is essential to ensure that these drugs and
kind of other things can move, but it's probably even harder to suss out than finding the actual
criminals who are behind these things, right?
Yeah, I think that this is what they really, really wanted, is the corruption side especially.
I mean, US officials told me that as much, and that's why they were so determined to also do
this in the US. They wanted to get the guys who don't get caught, the guys who never come
on law enforcement's radar because they are actually
smart and they are actually using pretty sophisticated technology. That's the sort of
people that the San Diego FBI wanted to get. And they did get a lot of them, but they definitely
didn't get all of them because of that restriction on not monitoring in the US.
Yeah. You talked about how it's not so much just criminal gangs, but criminal networks today, right? As these criminal organizations operate around the world and have connections to people everywhere, and as these encrypted phones, these Anom phones from this FBI-run company started going global as well, they started to see the extent of those networks and how far they actually went and the connections between
them. Can you talk a bit about how far that went and how global in scale these criminal networks
actually are? Yeah. So that drug trafficker I mentioned, Hakan Ayik, who was very important
to Anand's growth, he eventually makes what Australian law enforcement called the Aussie
cartel. And ordinarily, you may have one criminal group
smuggling, I don't know, methamphetamine, then you'll have another one smuggling cocaine.
What Hakan and other members of the Aussie Cartel did, they came together to put not a total
monopoly, but to gain control of a very large chunk of drug importation into Australia. And
that allows you to set the routes, allows you to set the price.
It allows you to potentially lower violence
because people aren't screwing each other over.
And this involves people who would usually kill each other
if they were in the same room.
You know, Hakan Ayik is heavily linked
to the Kromacheros biker gang.
And then the Hells Angels are like also part
of this super cartel.
And you have very similar stuff happening in Dubai as well,
where you'll have Irish gangsters like the Killahans
then working with gangsters from the Netherlands as well.
And they sort of all bring their own skills, resources,
investment money as well.
And they can then communicate and plan on a much larger,
grander scale than they ever could just by themselves. These crime groups
may have longstanding rivalries, but there's something that brings them all together, and
that's obviously getting more money. Yeah, of course. One of the things that
I was surprised to learn from the book, and maybe should have realized, was just how much
Dubai was really a centre for a lot of these criminal groups and how a lot of
these criminals, when they started to feel the heat in their own jurisdictions, would look to
Dubai as somewhere where they could go and feel quite secure that they were going to escape
authorities if they did that. Yeah, Dubai is a fascinating place because what happens is in the
criminal underworld, you'll have these hidey holes or these relative safe havens.
Thailand used to be one of them. Marbella, some people still do that. Especially over the last 10 years, tons of criminals have gone to Dubai for various reasons. One being lack of taxation,
I guess that's one way to put it. That always helps.
Yes, that always helps, especially when you have hundreds of millions, if not billions of dirty
cash, the ease of which of buying real estate is a big one as well. But then of course,
Dubai's somewhat adversarial to nonchalant relationship with foreign law enforcement
partners. And this has changed pretty quickly over the past two or three years,
where Dubai authorities are now actually arresting people on behalf of the AFP or the Dutch authorities.
And then they will extradite them and it'll be a big win for the Dubai police.
But that was only very, very recent.
And up until then, Dubai was a playground, a sort of business conference room,
and just a great place to have a high quality of life if you were a serious organized criminal.
You could do all of those things you could escape the authorities and also go to some fancy hotel
and meet your gangster comrades you know yeah it seemed like one of the big risks though was that
dubai authorities don't like encrypted messaging and so some of these folks who sold encrypted
phones or even used them needed to like watch out because sure they were criminals and they were doing all this kind of criminal activity or involved in it that maybe the Dubai
authorities would like overlook but because they were doing like encrypted messaging that was a
problem yeah there's a scene in the book where a particular a nom seller is arrested and so is one
of his resellers because they're trying to sell, I think he's technically selling EncoChat devices at the time, but he also plans to sell Anom devices later. And I think that's
just a fascinating tension in that Dubai is this relative safe haven for criminals.
But then if you sell encrypted phones, whoa, whoa, whoa, you can't do that. It's way too far. We're
going to clamp down on you. Again, that's sort of changing again because they are now extraditing
more of the criminals. But it's just very funny that they went after the encryption first rather than the drug
traffickers. Yeah, it is funny. You know, obviously, at a certain point, the number of messages that
are coming into Anam as the user base is growing becomes far too much for the FBI or the AFP to
handle on their own. And they start to build this kind of broader network and these
relationships with other, in particular, European countries and European authorities. And eventually
they move up to Europol with this broader operation that's bringing a lot of this in.
How does that broader operation work? And how does that start to use this information to go after
some of these criminals?
Yeah. So it starts when the FBI is getting all of these messages that are obviously not in English because an arm is worldwide and it's all over the place. So they're getting stuff in Swedish,
they're getting it in Dutch, German, et cetera. And initially the FBI starts sharing with just
the Swedes, just the Dutch, and then the Germans a little bit later.
But it becomes clear that to actually have pretty good impact with Anom, they need to have
much more coordination. In the case of EncroChat, which was eventually hacked by European authorities,
they got a bunch of messages, they distributed them. There was something of a bottleneck in which
some of the European officials were just feeding out their intelligence to other agencies. The FBI over NOM, they wanted
to do something different. They wanted everybody in the same room that ended up being Europol,
as you said, talking across the table from one another so we can really coordinate and take
these people down. It's very similar to how you have these super cartels who are meeting face-to-face in Dubai
over a hotel conference table or whatever. Now you have the police basically doing the same thing,
but over a conference table in Europol. And that's, I think, one of the big reasons why
they were actually able to generate so much impact with this operation. And it was something like 16
countries in the end. You've got Austria, the UK is in there as well. Basically, any sort of country you would expect to be
involved probably was, but they crucially did not include some countries such as Serbia,
because that is where I believe a lot of the public corruption took place.
We're obviously talking about it very openly now. At the time, this was a massive secret. And not only was it a secret in the FBI, now it's a secret among 16 other agencies. And
I'm genuinely shocked that it didn't completely leak, to be honest.
Yeah. I believe the book said the Italians were excluded from that as well, right?
Yeah. I don't know why. I don't know why exactly. But what that meant was that when the FBI
was really pivotal to capturing a very high tier Italian mob boss, they fed over the intelligence,
action was taken in Brazil to get this guy. And that leaves the Italians going,
why the hell is the FBI giving us this information? How do they know this? And all
these sorts of questions. And the FBI obviously does not answer them and just carries on. It's
just doing its own thing. And like, here's like one of your most wanted criminals, but we're not
going to tell you why, you know? Yeah. You know, you mentioned how the FBI really wanted to bring
everyone into the same room because these networks were operating across European borders or even
beyond, but a lot of these
authorities were still operating in their own jurisdictions and didn't have that same degree
of communication. Obviously, Europol was created to create some of that. Is there any suggestion
that this operation has changed how these agencies work together after that because
they had this experience of doing this with the Anom kind of operation?
So Europol and European authorities in general have definitely been cooperating more and more over the years. Anom is not the only case where that's happened. There's tons of
human trafficking or other drug trafficking cases. I wouldn't say Anom was the only one.
But this was a massive case where you have these people sat across the table from one another,
going through all of this data at once. And I'm sure it showed not just Europol,
but very importantly, the FBI, that this is possible and we should probably do more
cooperation. There's a couple of people from the FBI in the book who are pretty skeptical
of giving it to Europol because,
honestly, they don't think Europol can handle it. They think it would get leaked. It would
probably get drowned in European bureaucracy, whereas the FBI is running a tech company.
We don't want this regulation. Get out of the way. We want to do whatever we want.
It all worked out in the end, relatively so. But I do think if anybody learned from this
when it came to cooperation, it was probably the FBI more than
anybody. Interesting. Another one that I was surprised to see was not like in those initial
countries. You mentioned how the FBI went to Europe and was initially working with Sweden
and the Netherlands and Germany, the authorities there was France, because I believe France was
the country whose authorities hacked Sky and maybe EncroChat as well, or maybe that was bigger.
So I was wondering why kind of the French were able to get into these networks and then share that information with other authorities, but were not initially brought into this
Anom deal, or if you have any idea why that is.
Yeah, you're right in that the French military police hacked into EncroChat.
Them being military is very key because they're using that to claim
this is a national security issue, so we're not going to tell you how we hacked it.
We figured it out through various other court documents. It was a malicious update
pushed to the phones, but they don't really want to provide any more information than that.
What I would say is that I was surprised at how much the collaboration and bringing countries in
was basically built on them being friends.
It really was built on these personal relationships where if they didn't already know each other,
and they often did, and they then brought that country in, by the end, these people were like
great friends, like going to the pub and stuff together. And I found that very strange because
when we think of law enforcement, we usually think of it in the terms of systems and agencies and all throughout this, it was just like individual officials just
doing what they thought was good or cool or whatever, you know, and that was on the DOJ side.
I absolutely think it was on the European side as well. And so you talked about how this operation
really started in 2018 and then really
starts to pick up steam in 2019. Obviously, we know what happens in late 2019, early 2020.
How does COVID disrupt this whole operation and what they're trying to carry out? Or does it have
much of a blip at all? So the FBI had been developing this sort of back-end surveillance
system called Holler iBot. I don't
know why it's called that, but it does have a little robot as its logo, which I found in some
documents, which is really fun. But they were developing that, FBI computer scientists were,
because they knew eventually, yes, we do want to give it to foreign partners and they'll need to
remote in, right? They'll need a VPN or an interface or whatever. Then, as you say, COVID happens,
and that dramatically speeds up the need for this tool because you can't really go into the office,
or at least not many people can. The FBI had to respect this just like we did. So they accelerate
production of that, and that allows the FBI officials to remote in and look through the
messages that way. Some of them still did go into the office. And there's some very funny scenes
where not being used to cleaning their own offices, they have to go and find a vacuum cleaner
somewhere in the San Diego FBI field office. And I absolutely loved them telling me that detail.
But it sped it up and they had to adapt just like we all had to. And crucially, the criminals had
to adapt to COVID as well,
to the point where for money laundering, there were much more dead drops.
So criminals would put money in one place, they would leave,
somebody else would come pick it up.
That way, they're social distancing.
They haven't seen each other.
They're not face to face.
It's like dropping off your DoorDash order or something like that on your step
so you're not talking to the delivery driver.
You're dropping off your big stash of cash so someone else can pick it up without seeing you yeah yeah
it's there for sandwich it's just five hundred thousand dollars or euros in cash but it's like
basically the same thing and then some criminals of course because they're always looking for
opportunity they start to try to smuggle drugs in hand sanitizer or in shipments of masks which
while everything else is slowing down,
shipments of those products are, if anything, they're ramping up, right? So why don't we
attach ourselves to those shipments as well? And COVID didn't really impact the drug trade.
It's crazy. It impacted people buying cocaine or ecstasy or whatever, because they literally can't
go to nightclubs or festivals or anything else. It didn't really stop the international drug trade. They just found other ways.
Yeah. And I imagine if you're thinking about the Australian authorities as well,
the criminals down there were probably helped by the fact that Australia had this kind of
quarantine measure where a lot of life was quite normal in much of the country for a while. So
things could continue and people were still going to the nightclubs and stuff like that. You know, eventually the FBI sets this deadline,
this date of June 7th, 2021, where everything is going to be revealed because the number of users
on the platform is just growing too great. And also they have this ruling that allows them to
continue funneling data through Lithuania until June 7th. And so
instead of trying to get that renewed, they're just going to set that as the date where this
is all ending. And the preparations begin for what all of these different authorities who are
now involved in this project are going to do and how they're going to use that information.
What's the preparation for that kind of big reveal what does that look like yeah things are getting really hectic really crazy one fbi agent in the book is saying things like we
just can't do this anymore this is getting out of control it's going to break then more resources
come in and then they carry on and it's like this endless loop that's it's going to snap at some
point as for the preparations after they set the date there's just a flurry of activity. I've gone through, I think, tens of thousands of pages of police reports from various countries and read them all one by one. Around this time, that's when you see officers going out into the field. They're filming the people they've been reading the messages on for months, if not years at this point. They're following some hotels, they're trailing them in
cars, they're flying drones over them and everything. And they're sort of doing all
the techniques you would ordinarily expect in a law enforcement investigation, but on steroids
and on an insane deadline. It's like, we have June 7th, it's now April, May or something like that.
And we need to gather evidence on these people, not just so we can arrest them, but we can prosecute them. And there's this switch from
a non-being an intelligence gathering tool to a judicial tool. And they're going for all of those.
And eventually, they get a target list of 800 people that they're going to arrest on a single
day. And that's just an insane number to me. Like Sky
and EncroChat, they got probably a lot more messages and a lot more intelligence, but Anom
is sort of the single biggest law enforcement sting operation ever, especially on that day.
The 800 planned arrests and then eventually 10,000 law enforcement officials are involved. I mean,
that's like a small army all over the
world acting on that single day. Before we talk about what comes out of that,
obviously in the months and the years leading up to June the 7th, law enforcement around the world
are using this information to increasingly act on things that they're seeing in these messages and
in these voice recordings and these calls and things like that, that they are receiving through the Anom network.
Do the criminals ever get wise to the fact that they're using this phone system that is actually
owned by the FBI? So that's the constant tension in that some authorities would say,
we have to act, we have to shut down this drug lab, or we have to seize this shipment. And they would have to sort of fabricate some sort of reason, not really for
why they want to do it, because they want to get the drugs, but what they say to the suspect,
or even sometimes to their own colleagues inside the same agencies. There's one Swedish official
who had to lie to her counterpart because he thought, oh, there's a source who's giving
you this information when actually it was a norm. She just had to glaze over that.
She didn't feel great about that, to be honest. That also brings up a few justice issues as well.
It's basically parallel construction, even though eventually when these people are prosecuted,
it is revealed that it's a norm. Criminals, in the context of that flurry of activity, did start to get suspicious
of a nom. There was just too much activity happening. If they had been able to zoom out
and seen the connection between all of these raids, all of these seizures, they would have
realised quickly it was a nom. But eventually, people are telling themselves, something's wrong
with this phone. I think someone says it's cursed at one point because their friends got onto it and they
immediately got raided.
And that's another constant drumbeat in the background of this, which is that the FBI
doesn't really want the criminals to figure out what is going on before the FBI gets to
act.
Because obviously, they can go and destroy evidence or they can run away or anything
like that.
But some people do start to get wise. Yeah. Yeah. And so what does June 7th, when they
finally undertake this operation, what does that look like? And how does this ultimately get revealed
to the world that the FBI has been running this and all these other law enforcement agencies have
been involved? So the plan was, as it was told to me, to follow the sun. And that means it starts in Australia.
They're doing these, I think, early morning slash late night raids of kicking down doors and
arresting bikers, that sort of thing. Eventually, they have a press conference where the Australian
authorities announce that, hey, we've been reading messages from Anom. Sort of at the same time as
that, the baton has passed to European authorities
in Europol, and they start arresting people and they start chasing people down. They have their
own press conference as well. By this time, it's very clear to the criminals what was going on.
Oh my God, Anom was bugged the entire time. This is a disaster. Many of them are now in a police
car or in a jail cell or whatever. And then eventually, later in the day, the DOJ,
they come out and they say, we were running it the entire time. And they say a key piece
of information, which I think has implications much more broadly. They didn't just want to
arrest people. They wanted to undermine trust in the hardened encrypted phone industry.
This wasn't just an operation to gather evidence and arrest
people. It was like, we want to fundamentally shift how criminals think about encryption.
Yeah. And as I understand it, since Anam has gone down, and obviously Sky and EncroChat
were hacked by European authorities, by French military police, that there hasn't been another
large encrypted phone company like this
before. There are smaller ones, but not anything to this scale. Is that right?
Yeah, there's nothing really big. There was one called Cypher that was very large in Australia,
and they just threw in the towel and basically quit the business, presumably thinking they were
going to be next. I spoke to people who were inside the company at the time, and to pull it bluntly, they were freaking out essentially inside. Then I ended up speaking to
more people who sell encrypted phones after the Anom operation. They said it's basically
impossible to get a user base now because everybody suspects, well, is this run by the
FBI as well? Is this run by the Dutch or the Australians?
There is a massive tinge of paranoia through organized criminal communities now. That's not
to say they've stopped using cryptophones, because some definitely still use them,
but everything has changed now, for sure. And so if we look at the broader impacts of this
Anom operation and what the FBI did, if we look at the broader impacts of this Anam operation and what the FBI did,
if we look at the law enforcement side of it first and the criminal side of it,
what ultimately was the broader impacts for law enforcement and for trying to clean up this
criminal activity in the various countries where this was being used? Have they really been
successful at disrupting what is going on here? Have they been successful
in prosecuting a lot of these people and arresting a lot of the people involved with it? What have
we seen there? I mean, Anom ended up getting well over a thousand arrests in total. There were
multi-tons of drugs seized, something like 150 weapons, I think, and 150 threat to life
mitigators, which is when the police intervened
in some sort of way when somebody's life was under threat. That is all, just on a quantitative
level, pretty damn successful, right? They arrested a bunch of suspected and now sometimes
convicted criminals, to answer that part of the question. That doesn't mean that the war on drugs was over and whatever.
I was shocked by some of the sentiment of the European officials I spoke to who,
even after doing this operation and the EncroChat and the SkyOne, they started to question,
well, is this even the right thing that we're doing? We seized the drug shipments and then
there's just more, which of course goes back to the age-old question of, well, the war of drugs is a massive mistake of resources and ends up with a bunch of
people being arrested when maybe they shouldn't. That's basically another discussion. But even with
all of those seizures, the drug industry continues. It just soldiers on and it will continue.
Yeah, I think it definitely does make us reflect on what is actually needed to stand us out if that's ever even possible and what it looks like to try to
get a greater control over what's happening there and to reduce the killings, the crime,
the traffic of drugs. And on a political level, whether the policies that we have are the right
ones, if those are the sorts of goals that we have, right? But then on the other side of this,
there's also the question of the broader implications,
even beyond the criminals,
for the ability of law enforcement
to do something like this, right?
And there's obviously a very strong push
in privacy communities to ensure
that all of our communications,
that everything we do is encrypted
and is happening on encrypted platforms
and things like that. What broader
reflections do you think that this sort of case kind of forces us to have about a push like that
or a movement like that? So Matthew Green, who is a cryptographer, does a really interesting
thought experiment at the end of the book. And he has no problem, he told me, with authorities
targeting these closed closed basically criminal
networks i thought they're using phones that's very stupid hack them whatever what he brought
up and i think it's a really really compelling argument or thought experiment is well what
happens when it's not entirely criminals is the split 90 criminal 10 innocent and then they're
okay compromising that or is is it 50-50?
And he even uses an example of, let's say half the criminals are doing something like
copyright theft of song lyrics, something I don't really care about. I don't think many people would
care about. And then the other half are hardened top tier drug traffickers. Would the FBI be okay compromising that network?
And we don't know the exact answer yet, but by all indications, by me sneaking into a law
enforcement conference where an FBI agent said they look forward to the next iteration of this
operation, whatever that may be. And in my conversations with the San Diego FBI, when I
asked them, well, what about Signal and
that sort of thing, and this is what people are worried about, they say that we believe we should
have access to any encrypted messages that we're legally entitled to. And yes, Signal on a technical
level does not allow that. Legally, the FBI would argue that it should have access. Now, to be
absolutely clear, I'm not saying the FBI has compromised Signal in any way. I use it every single day.
I trust it with my security more than any technology products on the planet.
But the FBI is not going to stop at a norm. And people I've spoken to who used to use encrypted
phones or used to sell encrypted phones, they say people have moved to using apps such as Signal with a customized Android phone. I don't think the FBI or any of
his partners are then just going to clap their hands and be like, okay, well, now we won't bother
and we'll go home. They're going to continue. They've told me as much.
And I think it's important to say that about Signal as well, because there have been some
suggestions recently online pushed by Elon Musk and people like that, that Signal is actually insecure and you should be using Telegram,
which is not nearly as secure as Signal is. So just to kind of mention that and put that out
there. I wanted to drill down on that point a little bit further with you though, right? Because
so we have obviously these law enforcement agencies that want to get access to these
communications of
criminals that are happening on encrypted platforms. And when we talk about Anom,
that is them really targeting a platform that is basically designed and meant for criminals,
where mostly criminals are going to be using it. But do you think that obviously now that
criminals do not trust something like that, a network that is just for criminals any longer and are increasingly moving into more consumer products that offer encryption. I think that
obviously puts them more at risk, but does the lack of allowing law enforcement to get any access
to these sorts of messages then create the further incentive for them to try to do more projects like
Anom or to create more
surveillance softwares that, you know, certainly might not be breaking the encryption on these
apps, but are getting other sorts of ways of surveilling communications onto your phones,
like a Pegasus software or something like that. Like what is kind of the arms race that you think
that this gets into? And does it force us to have some consideration of whether there are times when it makes sense for law enforcement to be able to get access
to some of this stuff? I think apps or technology platforms or whatever, not providing
legally requested information to the authorities absolutely does create an incentive for the FBI
or any other agency to find new techniques.
That's not me saying I think Signal should hand over data.
I'm just saying, yes, that's like the cause and effect, right? In that Signal, or I would argue Telegram a lot, does not work with the authorities,
even though it is cryptographically garbage.
It does not readily provide data.
Now, that will create, I think, a situation where on one side,
you could have authorities doing something like Pegasus, as you say, it's like, well,
we can't get data from the app. So we're going to do this thing that's very, very expensive
and very on a per target basis. And we'll hack into a phone, we'll get their data,
and we'll do it that way. The other side is we're going to do something much broader,
and that could be the undermining of a particular app, or it could be something like European legislators and authorities
are debating at the moment in Europe, is that, well, we want the scanning of encrypted messages
for child abuse material, which could easily balloon into all sorts of other content.
I mean, I think there was a leak to the outlet Balkan Insights where a Europol official admitted as much. They said, yeah, this is good for CSAM,
but we would like it for every sort of crime. I mean, they're just saying it now. They're not
even hiding it. And maybe there is a third option. Maybe there's a secret third option
that I'm not thinking about right now. But when it comes to mass compromising of apps
or targeted exploitation of devices, I'm going with the latter personally, because you absolutely
have to have a warrant to deploy that tool. It can be in a limited circumstance because it's so
expensive to hack iPhones relatively. I don't think either of them are great, but this is the
real world and this is how messy and complicated it is. And I think the idea that, well, the FBI just aren't going to do anything, go home, is naive.
They're going to do something.
And I think members of the public, civil society, law enforcement journalists, policy makers,
policy experts need to continue having that discussion around what one of those options
or some sort of
other option might be. Yeah, definitely. And one of the things that stood out to me in the book
and that we've talked about, of course, is how the FBI was ultimately not able to monitor these
messages that were happening in the United States that were being sent in the United States,
because it largely couldn't get the approvals to do that. Obviously, it's a very bureaucratic
system. And obviously, there are a lot of problems with US intelligence agencies, US police, US law
enforcement. There's no debating that. Does that give you any reassurance about the ability to
ensure that these law enforcement agencies don't do the worst possible thing and don't surveil
everyone's communications, even if that opportunity is available to them?
American police have a ton of different problems, obviously. So I'll, of course,
preface it with that. The reason that Anon was not monitored in the US was more because there was a particular part of the DOJ, the Office of Enforcement Operations, OEO, I think,
they basically sat on the wiretap orders to do this. The prosecutors of San Diego
had everything set up. They were going to work with the LA agents and officials as well. They
sent off the first wiretap request and OEO, which approves all wiretaps in the US, just didn't
approve it. They didn't say no, but they also didn't approve it. I think you can look at that
a couple of different ways. You could look at it as, well, OEO did its role because it didn't approve this wiretap that it
didn't agree with. And that shows that checks and balances work. And that's a good thing.
You could frame it like that. Or you could be like, they got in the way of something which
could have caught a lot of criminals legitimately. I'm not leaning to either way. All I would say is that when we
have even just the hacking tools or these mass monitoring tools, there obviously has to be
massive checks and balances in place to ensure that they're not inappropriately used with any
sort of law enforcement technology. I would be very, very scared if there were no checks and balances on this, obviously.
And I guess it's a silver lining to some that that never happened for that reason.
I would think the San Diego FBI and the prosecutors in San Diego would strongly
disagree with that because they were fully prepared to do it. And they thought they had
every legal right to. They did believe it was legal to do that.
Yeah. I guess in that case, they were looking at this specific network that was used by criminals.
And I guess if we're talking about them being able to look at something further,
do you think it gives you reassurance that it wouldn't just be mass surveillance of
the broader public, but would be targeted? Or it's hard to say for sure?
That's where I get more scared. Where it's not used on a specific network that the
overwhelming majority are criminal. And we're talking about just monitoring an encrypted
platform. I don't know. I think you possibly need more than nice little checks and balances
to help with that. I think that's a discussion we need to have where fundamentally, do we even want
law enforcement the capability to do mass monitoring
of encrypted platforms like this. And I imagine a lot of people would say they don't want it,
but they're going to try. Yeah, absolutely. Joseph, this has been a really enlightening
and fascinating conversation. As I said, I thoroughly enjoyed the book. I thought it was
such an interesting read to learn about this broader story and network that honestly I had never heard about before. I missed all
the reporting on it back around when this was unveiled. So thanks so much for taking the time
to come on the show and for having this chat. I really appreciate it.
Same. Thank you so much for having me.
Joseph Cox is the author of Darkwire and the host of the 404 Media podcast.
Tech Won't Save Us is made in partnership with The Nation magazine and is hosted by me, Paris Marks.
Production is by Eric Wickham and transcripts are by Bridget Palou-Fry.
Tech Won't Save Us relies on the support of listeners like you to keep providing critical perspectives on the tech industry.
You can join hundreds of other supporters by going to patreon.com slash tech won't save us and making a pledge of your own.
Thanks for listening and make sure to come back next week. Thank you.