The FBI’s Honeypot Phones Were More Widely Distributed in the U.S. Than Previously Thought

One of the weirder stories from last year involved a gargantuan FBI honeypot operation designed to catch crooks all over the world. According to Motherboard, that operation had a bigger imprint in the U.S. than originally believed.

During “Operation Trojan Shield,” the feds used a secret relationship with an encrypted phone company, called Anom, which sold devices exclusively to career criminals looking for a secure way to communicate with one another. The product’s developer, who had previously been busted for drug trafficking, agreed to act as a high-level federal informant and for at least two years sold devices to criminals while also secretly cooperating with authorities. Meanwhile the FBI, along with its international partners, intercepted all of the communications, which allowed them to capture evidence of widespread criminal malfeasance on a global scale.

It made for one helluva weird story when the bureau finally revealed what it had been up to last June, and “Shield” led to the arrest of hundreds of alleged criminals in countries all around the world—many of which are accused of using the phones to organize drug trafficking and other forms of organized crime. The arrests continue to this day.

Keep reading

Author: HP McLovincraft

Seeker of rabbit holes. Pessimist. Libertine. Contrarian. Your huckleberry. Possibly true tales of sanity-blasting horror also known as abject reality. Prepare yourself. Veteran of a thousand psychic wars. I have seen the fnords. Deplatformed on Tumblr and Twitter.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: