Working with overseas law enforcement officers, the FBI has arrested eight accused of supplying An0m encrypted phones to organized crime groups.
Their arrests follow joint police operations in 16 countries, resulting in over 500 arrests of criminals involved in drug trafficking, money laundering, and violent crime.
Criminal gangs were unaware that the FBI controlled the An0m phone network and that police could read encrypted messages for at least 18 months.
Six law enforcement officials have also been arrested for tipping off criminal groups about police investigations.
Racketeering
The US is seeking to prosecute nine individuals accused of knowingly selling An0m encrypted phones to organized crime groups.
An indictment published yesterday names 17 people accused of running an operation to supply phones and provide technical support to criminal gangs.
They are accused of racketeering and conspiracy, multiple offenses of trafficking controlled substances, and money laundering.
The phones were used to distribute illegal drugs to Australia, Asia, Europe, the United States, and Canada and to launder money.
Administrators, agents, and distributors in the US legal document allegedly described the An0m phones to potential clients as” ” designed by criminals for criminals”.
The people named included Joseph Hakan Ayik, a Turkish citizen who is accused of influencing criminal associates to use encrypted phones.
Australian law enforcement officials say undercover agents gave him access to an An0m phone. He recommended the phones to other associates, unaware that the FBI controlled them.
Commissioner Reece Kershaw of the Australian Federal Police said yesterday that he was likely to be at risk from the criminals he supplied.” Given the threat, he probably faceshe’ss best off handing himself into us as soon as he can”
According to the indictment, Joseph Hakan Ayik, Dominico Catanzariti, an Australian citizen, and Maximilian Rivkin, a Swedish citizen, act as administrators for the An0m network.
They were able to initiate new subscriptions to An0m, remove accounts, and remotely wipe and reset devices to remove evidence of money laundering and drug crime.
The indictment names Erkan Yusef Dogan and Baris Tukel, Australians living in Turkey alongside Ayik and Rivkin, as “influencers” who encouraged the criminal underworld to use the encrypted devices.
They have” built a reputation for their knowledge and expertise in the hardened encrypted device field and use that power, knowledge, and expertise” to influence others.
Distributors named
The indictment lists Abdelhakim Aharchaou and Seyyed Hossein Hosseini, both Dutch citizens, Alexander Dmitrienko, a Finish citizen living in Spain, and Shane Geoffrey May, an Australian living in Indonesia, as distributors of the phones.
Also named are Edwin Dharmendra Kumar, an Australian; Omar Malik and Miwand Zakhimi, both citizens of the Netherlands; and Osemah Elhassan, an Australian living in Columbia.
According to the indictment, distributors, and agents sold An0m devices and collected subscription fees based on different geographic regions’ schedules.
The European fee was around €1,000 to 1,500 Euros, AUD 1,700 in Australia, and CAD 1,700 for a six-month subscription.
Phones sold for Bitcoin
Payments were made in Bitcoin and other cryptocurrencies to protect the user’s anonymity and were laundered through shell companies to hide the proceeds.
The individuals allegedly targeted people involved in international drug trafficking, money laundering, and other crimes.
They told customers that An0m was not subject to US law or the Patriot Act to build trust for An0m as a secure system for illegal activity.
The administrators, distributors, and agents remained anonymous even from each other and their clients, communicating using a system of names and email handles.
They suspended the service to phones and remotely deleted their contents if they suspected law enforcement or an informant was using the device as part of an investigation.
Criminals are accused of selling over 12,000 An0m encrypted devices and services to over 300 crime syndicates in over 100 countries.
The FBI, working with the Australian Federal Police, covertly harvested more than 27 million messages in near real-time.
In one case, a criminal group sent pictures showing hundreds of kilograms of cocaine hidden in shipments of pineapples and bananas. Another image showed drugs hidden in cans of tuna.
The FBI had access to copies of messages from the phones that were copied to a server outside the USA.
The agency reviewed the messages for criminal activity and passed them on to other countries concerned to investigate.
Phantom Secure takedown
This investigation began after the FBI dismantled Canada-based encrypted device company Phantom Secure in 2018, forcing many criminals to seek alternative devices.
An0m became more popular after police shut down the EncroChat encrypted phone network in 2020,
In March 2021, a takedown operation into another encrypted phone network, Sky ECC, led to more criminals adopting An0m.
Corrupt law enforcement officials also used the An0m platform to communicate with transnational criminal organizations.
They passed crime groups sensitive information and notified them of pending law enforcement action, said Suzanne Turner, FBI agent responsible for the San Diego Field Office yesterday.” “These crimes resulted in the arrest of six law enforcement officers yesterday and dozens of cases opened during the courstigation” to, ” a press conference.