Podchaser Logo
Home
ANOM

ANOM

Released Tuesday, 4th June 2024
 1 person rated this episode
ANOM

ANOM

ANOM

ANOM

Tuesday, 4th June 2024
 1 person rated this episode
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

So I was looking through wiki leaks the

0:02

other day as one does rate. And

0:04

I came across something that I found

0:06

rather fascinating. There's a thing that the

0:09

Cia, a developer called Weeping Angel. So.

0:11

If you have a Samsung Smart Tv,

0:14

there's a really odd feature in it's

0:16

called fake off. And. When the

0:18

Tv as on, you can push mute

0:20

one eight to ten power and the

0:23

Tv appears to turn off, but it

0:25

doesn't. Now. The smart Tvs often

0:27

have a microphone Belgians you can give

0:29

them voice commands and when the Tv

0:31

is off the mike isn't listening but

0:33

when the T V is in fake

0:35

off the mike is still active. So

0:38

at the Cia I did was they

0:40

develop some kind of spyware for the

0:42

Samsung Smart Tv or it would record

0:44

the audio from the make and store

0:46

it on the Tv. So. I

0:48

imagine a scenario is that a Cia

0:50

agent would wanna play a listening device

0:52

and someone's bedroom and goes in but

0:55

then sees oh they've gotta Samsung Smart

0:57

Tv which is already a listening device.

0:59

No need to leave behind a bug

1:01

that might get discovered. Let's just live

1:03

off the land has they say? So

1:05

the Cia agent uploads the spyware onto

1:07

the Tv and and puts the Tv

1:09

and fake off mode. And. Leaves.

1:12

And. The Tv sets. They're recording all

1:15

the audio in the room but appears

1:17

to be off. And. Then the

1:19

Cia agent can remotely connect back to

1:21

the Tv and get the audio files

1:23

or come into the room later and

1:25

retrieve them off the Tv. It's Wildwoods

1:27

by Gear is developed by the Federal

1:29

authorities, isn't it? These.

1:35

Are true stories from the dark side of

1:37

the internet? I'm.

1:42

Jack resign her. This

1:44

is Dark Net Diaries. This.

2:03

Episode sponsored by Rocket Money I must

2:05

you think you're paying and subscriptions every

2:07

month? The. Answers? Probably more than that

2:09

because if you're anything like me, you have

2:11

subscriptions you forgotten about you. But this is

2:13

a Rocket Money can save time and money

2:15

from you and me. Rocket Money as a

2:17

personal finance app that fines and cancel your

2:20

unwanted subscriptions, monitors you're spending and helps lower

2:22

your bills so that you can grow your

2:24

savings. I love how the dashboard shows me

2:26

this month spending compared to last month so

2:28

I can clearly see my spending habits. Plus,

2:30

to help me create a custom budget and

2:32

keep my spending on track, Rocket Money has

2:34

over five million users and as as a

2:36

total of five hundred million dollars and canceled.

2:38

Subscriptions saving members up to seven

2:40

hundred and forty dollars a year

2:43

from using all the apps features.

2:45

Stop wasting money on things you

2:47

don't use. Cancel your unwanted subscriptions

2:49

Like going to Rocket money.com/dark That's

2:52

that's Rockets money.com/darkness Rocket Money dot

2:54

Com slash Darkness. This

3:00

episode is sponsored by Threat Locker these

3:03

days, One wrong click the button can

3:05

lead to a catastrophic cyber attack on

3:07

your organization and nobody has time to

3:09

keep training poor Doris and accounting And

3:11

what not to click. Cyber. Attacks

3:13

are devastating to businesses and without

3:16

the correct solution in place, your

3:18

operation remains at risk. Threat Locker

3:20

has built an endpoint protection platform

3:22

that strengthens your infrastructure from the

3:25

ground up with a zero trust

3:27

security posture that protects business critical

3:29

data for also mitigating cyberattacks. Threat.

3:32

Lockers allow listing ring fencing, swords

3:34

control, elevation control, and network control

3:36

solutions to name a few. give

3:38

you a more secure approach to

3:40

blocking the exploits of known and

3:42

unknown threats and application form abilities

3:44

working together to deny applications had

3:46

default but inbound network traffic and

3:48

ringfencing your applications. Threat: Locker provides

3:50

zero trust control at the Colonel

3:52

level. If you're looking for a

3:54

practice solution that will keep your

3:56

business better protected in the face

3:58

of cyber attacks. Check

4:00

out for lockers. Cyber

4:03

Heroes at W W

4:06

W.threat A locker.com That's

4:08

Threats Locker Dot Com.

4:14

Why? Don't you start by tone as you name

4:16

and when you do. My

4:18

name's Joseph Cox. I'm the

4:20

author Old Stock Wire and

4:22

I'm also a cofounder and

4:25

journalist as thorough for media.

4:27

He was for a for doing. So.

4:29

Sorry for is a group

4:31

of four of us myself,

4:34

season Kepler and I noom

4:36

a big and Samantha Coal

4:38

and we're all former Sas

4:40

members. Advice is motherboard the

4:42

technology sites. Unfortunately, Vice made

4:44

some very poor material decisions

4:46

from the executives. And die

4:48

company is now bankrupt The we left

4:51

to make our own company. Where will

4:53

we? We want to continue doing tech

4:55

investigations, We want to continue telling stories.

4:57

and how about we do it in

4:59

the ways where we own the company,

5:01

you know? So we can only major

5:04

elicit decisions and editorial ones that we

5:06

can make business ones as well in

5:08

the hope that we can just keep

5:10

on doing what we love doing. Which

5:12

is another thing stories, verifying information and

5:14

publishing stuff is in the public interest.

5:17

Well you've You've created quite a name for

5:19

yourself over the years. I always see your

5:22

name popping up and and other books I

5:24

can article mentions of Cox said this and

5:26

are another story here as coding you and

5:28

different things so I'm just really well done

5:31

on your journalism. What? this latest project you

5:33

working on. Dark. We're so so

5:35

I started being a stark wire and

5:37

I was a psych, oh my God,

5:40

this is just amazing and I was

5:42

hoping we could talk about. As

5:45

course I mean I have

5:47

been working on this book

5:49

for. Free. Maybe four years

5:51

at this point? Speaking to. Essentially

5:54

every sort of person involved in

5:56

the does does law enforcement as

5:58

also a lot of. Very

6:00

dangerous people that. I

6:03

don't think I'd ever be more obsessed with a

6:05

story. I mean, I'm sure if the I've never

6:07

be more obsessed with the story than this one.

6:09

So this is an incredibly nuanced story, which is

6:11

going to fill your head with a lot of

6:14

questions. I know, I did that to me, but

6:16

let's first start with some context. I

6:18

am not a criminal, but I make a

6:20

lot of effort to be private and secure.

6:22

and the first time I'm in an effort

6:25

to have a privacy phone was after read

6:27

an article by Joseph. He was using an

6:29

ipod touch and did all his phone calls

6:31

over why fights? The main advantage here is

6:33

that there's no Sim card in an ipod

6:36

touch. It basically has all the features of

6:38

an I phone. just know Sim card so

6:40

that means nobody can same swap you. But

6:42

also, Sim cards are notorious for beginning out

6:45

to cell towers and giving fairly accurate location.

6:47

The that's a. Cellphone providers and as

6:49

even if your phone is always using

6:51

a Vpn because Sim cards communicate with

6:53

cell towers using these ban technology which

6:56

operates completely outside a Vpn So this

6:58

Ipod Touch was the mean phone that

7:00

Joseph was using to keep private. That.

7:03

That's. Be my life So years of

7:06

this point? Yeah you. You use that

7:08

as like a secure phone Raped. Yes,

7:11

For years I use an ipod Touches

7:13

to devise a know it moves onto

7:15

the I Pad mini because the I

7:17

no longer supporters. Unfortunately. When. Apple

7:19

Stop supporting the Ipod Touch. I switched

7:22

over to Graphene O S which is

7:24

a fork of Android. It's an open

7:26

source projects with a lot more privacy

7:28

features added in and unlike Android the

7:30

don't send everything I do back to

7:32

Google my messaging app of choices signal

7:34

which I can also make phone calls

7:36

with because signal is end to end

7:38

encrypted which means the people at Signal

7:41

can't see my message is only the

7:43

receiver of who I'm chatting with can

7:45

and I do so much more to

7:47

remain private online so you can see.

7:49

Joseph and I We take our mobile

7:51

privacy very seriously and we want the

7:53

best there is. And then

7:56

one day Joseph heard about this

7:58

new privacy phone calls. A

8:00

Non. So

8:03

I call it an encrypted

8:05

phone, which is simultaneously. A

8:08

helpful term but and Elsinore a helpful

8:10

at all for free To really have

8:12

a terminal disease for it's by yes

8:15

it's a combination the same se had

8:17

a secure communications app that allows you

8:19

to send and to encrypt messages to

8:22

to one another with photos. Voice

8:24

memos and will have a very

8:26

much like a signal or a

8:28

Muslim what sap or free. My

8:31

role was as a rights and

8:33

he also was a custom. Own

8:36

Operating Systems. It is based.

8:38

On Android some what is actually

8:41

a fork of Graphene O S

8:43

the privacy focused operating systems apparently

8:45

and norm. It also removes all

8:47

Cps functionality so that they will

8:49

be no way for law enforcement

8:51

or Google or sort of third

8:53

party apps to track the locations

8:56

of those devices. I think the

8:58

features of unarmed are amazing. I

9:00

mean it took Graphene O S

9:02

the phone operating system I already

9:04

use which is considered great already

9:06

for privacy and it made it

9:08

even. More lockdown? What?

9:11

And the features just kept going. Like for

9:13

instance, a Nom had it's own little end

9:15

encryption chat app they'll tense but it was

9:17

in his secrets. But the thing is they're

9:19

all these dummy apps on the phone. like

9:21

if you look at the phone it has

9:23

tinder on there and candy crush. they look

9:25

like normal apps but they're just decoys they

9:27

didn't really work. And another app you'd see

9:30

on the home screen was a calculator app

9:32

which work just fine like a regular calculator

9:34

except if you were to open a calculator

9:36

apps and punch in a certain code. That's.

9:38

When it would open up the secret

9:41

unarmed Chad messaging app, it was hidden

9:43

beneath a few layers of obfuscation. With

9:46

hey that's pretty good if you're having

9:48

a private conversations and I don't know

9:50

of an abusive partners such as your

9:52

phone from the brothers for your messages

9:54

or issue criminals. a police officer does

9:56

this or border a system or something

9:58

like that. so there's that. There's

10:00

also voice scrambling, so.

10:03

You know how on signal you can

10:05

send a voice know for one another

10:07

and that's very popular. Another messaging apps

10:10

on a non you could do away

10:12

with add either like a high pitched

10:14

distortion or a low. the stores and

10:16

to as well. And now with Moscow

10:18

your real voice sounded like who is

10:20

the brainchild behind and on who created

10:23

this thing. So. A norm

10:25

was created by someone called ask if. I.

10:27

Have to be a little

10:29

be careful about was a

10:31

say about them for reasons

10:33

that will get in suits

10:35

but they are from what

10:37

I've learned a pretty sources

10:39

New Jersey Tech expert for

10:41

the Criminal Underground. They were

10:43

connected to a very well

10:45

known criminal code. I can

10:47

I it's who a one

10:49

point was Australia's most Wanted

10:51

Man and this Ascii character

10:53

cells or did cell phones

10:55

in this space before. Eventually

10:58

deciding, well, I'm.

11:00

Gonna go make my own. Like,

11:02

rather than working underneath other sellers

11:04

and sorts of other and tryptophan

11:07

companies, I'm going to create my

11:09

own tech startup for the Criminal

11:11

Underground. For. The Criminal Underground

11:13

wait a minute was linked. All

11:15

the features of the phone's they're

11:18

all sign. None of them are

11:20

illegal, but if you're specifically making

11:22

a phone for criminals knowingly and

11:25

purpose see helping criminal conduct their

11:27

crimes. Now. Suddenly what

11:29

ask it was doing was illegal.

11:31

Ah yes legally it's very messy

11:33

because it's not illegal generally speaking

11:35

to saddle use and except messaging

11:37

app which is a good thing

11:39

to be clear like that should

11:41

not be illegal. But a lot

11:43

of these companies in the i

11:45

would say savior part of the

11:47

encryption industry this thing that differentiates

11:50

the miss a day. The. Zebra

11:52

at least facilitate crime as an it's

11:54

not like signal whose uses with of

11:56

course into criminals or even Apple I

11:58

message or something just because. They're very

12:00

popular. One is the tag lines

12:02

was do I think he was.

12:05

Designed. For criminals by criminals, health

12:07

issues, just asking for trouble rarely

12:09

eats. Burnham had all of those

12:11

sorts of bells and whistles you

12:14

would expect. Seen a wiping the

12:16

phone, all of us or something

12:18

and it really positioned itself as

12:20

sources. The Royals Royce of

12:22

the encrypt his own industry if

12:24

you want is a super secure

12:26

device from a company that didn't

12:28

care if you're a criminal if

12:30

anything and likes the size, you're

12:32

a criminal you could turn to

12:34

and I'm. So. I learned from

12:36

the bucks at this is quite a lucrative

12:38

underground criminal industry. A Nom was not the

12:41

only one years and you gotta read the

12:43

book about what happened. All the other encrypted

12:45

phone companies like each of the competitors have

12:47

just as wild and crazy have a story

12:49

of what was going on with the knobs

12:52

and Joseph does a great job of giving

12:54

you a tour of this whole criminal encrypted

12:56

phone industry. But. It bugs me

12:58

because like I said, I'm not a

13:00

criminals, but I love having a highly

13:02

secure phone with the best privacy you

13:05

can get. so it's a weird line

13:07

for me that this is even a

13:09

criminal industry. And

13:11

skylight of someone started a hammer

13:13

company sally Hammers but it was

13:15

just selling hammers to criminals to

13:17

kill people with. And and

13:19

had like seeds there's on it like

13:21

non slip handle for when blood gets

13:24

on it or blunt side for smashing

13:26

stalls and fork side for stabbing through

13:28

stomachs and really assess the hammer. That's

13:30

no different than any other hammer but

13:33

it has the sole intention of being

13:35

for criminals to cause pain and injury

13:37

and the company works exclusively with criminals

13:39

to find ways to improve it. Like

13:42

why why not just make a great

13:44

hammer that the whole world issues? Why

13:46

make these secure phones for criminals. Privacy.

13:49

And security is important to the whole

13:51

world, not just criminals. Anyway,

13:54

so a nom was this really

13:56

sleek super a private phone that

13:58

you could buy and have. Secure

14:00

chat with others and was

14:02

purpose made for criminals. Dies

14:04

basically was a gnome was

14:06

pitching itself as to his

14:08

customers and even suis sellers.

14:10

A was saying your messages

14:12

will be ends when encrypted.

14:14

We can't see what's going

14:17

on. We won't turn over

14:19

data to law enforcement or

14:21

service or outside the reach

14:23

of the five eyes. all

14:25

of a normal sources marketing

14:27

and privacy benefit see with

14:29

expects except. Of course, thousand

14:31

troops. His Asom was doing

14:33

something else in the background.

14:36

On. So out, where are they doing? So.

14:39

Is. Very very interesting on on

14:42

on the technical level and

14:44

was it is answer and

14:46

nom. Basically created a ghosts

14:48

contacts that was added to

14:50

every conversation and it received

14:52

a a blind carbon copy

14:54

A B C C as

14:56

every message sent across the

14:59

platform. So when criminal Lay

15:01

was talking to come the

15:03

be about cocaine shipments the

15:05

was secretly being census to

15:07

the norm. Other users were.

15:09

None the wiser, it was

15:11

like having a spy in

15:13

everybody's. Pockets. In their

15:16

back pocket. looking over their shows they could just

15:18

see into effort. So. While

15:20

it's true, it was and and

15:22

encrypted. It. Was also and an

15:24

encrypted directly to announcer fierce yes

15:26

it is is is almost is

15:28

end to end to end. Encrypted

15:30

doesn't have an end in the.

15:34

So the steroid just tech a

15:36

ninety degree turn. The phone was

15:38

not actually as private as it

15:40

was advertising itself to me by

15:42

hold On Tight because we're taking

15:44

another ninety degree turn right now.

15:46

You gotta ask yourself, why was

15:49

unarmed wanting copies of every message?

15:51

No, I don't think a nom

15:53

or ask who cared about looking

15:55

at people's heads? However, ask who

15:57

knew the value of these messages.

16:00

And decided to make a very

16:02

odd deal to let someone see

16:04

those chats. And. I'm

16:06

not sure how the logic went down

16:08

here we we really don't know how

16:10

this deal was made, but my best

16:13

guess is since Ask You wasn't a

16:15

stranger to being a criminal himself and

16:17

he may have thought this whole encrypted

16:19

phone business is actually illegal and to

16:21

go very wrong for him at some

16:23

point and he needed a plan. Really

16:26

don't know where it's I wanna think

16:29

he was a brilliant business person that

16:31

just played every one perfectly. but ask

16:33

who's lawyer advised him to make a

16:36

deal with the F B I and

16:38

let them see the encrypted stats. This

16:41

way the F B I

16:43

would appreciate ask who and

16:45

not tried to arrest him

16:47

so why not ask his

16:49

lawyer his house he foresees

16:51

would you want to use

16:53

a Norm in your investigations

16:55

are in exchange for you

16:57

know leniency is as do

17:00

as a faces charges race

17:02

he became the wholesomeness. Bargaining.

17:05

Chip essentially. Okay,

17:08

so. That's

17:12

quite a leap. They are I am. It takes me I'm beat.

17:14

such as kind of. Be

17:16

like okay. That's. The how

17:19

the new things going rate it's. It's

17:21

it's. a jump. Yeah and

17:23

this is very quickly done in the

17:25

books and does not because I'm sort

17:28

of glazing. So for it's because this

17:30

has happened with the Christmas with and

17:32

of that's just the series of events

17:34

that happen south. I don't know whether

17:36

that was always a plan or something

17:39

like that was. it may be always

17:41

in the back of a school mind.

17:43

I don't know. That's very very quickly

17:45

and gnome was put on the table

17:48

to be F B I back in

17:50

around Twenty a team I think is

17:52

when these conversations were happening in the

17:54

F B I and the Australian Federal

17:57

Police. Yes! And The Australian

17:59

Federal Police for. And for years

18:01

they've been really stymied by Encrypt

18:03

is owned. They probably even more

18:05

than the Sp I in Australia.

18:08

These sorts of phones are incredibly

18:10

common among organized crime groups. Know

18:12

the you have the Italian Mafia

18:14

over there in Australia, them using

18:16

it's yours, the house, the biker

18:19

gangs I, the Com It's Arrows

18:21

and the Hell's Angels. And they

18:23

all use these sorts of phones.

18:25

And for years is no, you

18:27

know, more than a decade this.

18:30

Points: The A S P in

18:32

particular has been running into these

18:34

phones again and again and again

18:36

said the idea. Of. A back

18:38

door? In. And

18:40

encrypt iphone is incredibly attractive to them.

18:42

I mean why Been told is that

18:44

when the A as the agents were

18:46

told about this possibility in the plan

18:48

to go ahead they look like they

18:50

would kids on Christmas morning. So.

18:54

A deal was made the F

18:56

B I and A F P.

18:58

Australian Federal Police guy access to

19:01

all the encrypted messages going across

19:03

a arm. And.

19:05

This is where I start to

19:07

have a million questions. Whose as

19:10

as as as as Cooper's since

19:12

an undercover cop acting like a

19:14

fellow criminal but really working with

19:16

the feds? What? Kind of criminal. Make

19:18

deals with the feds like this. Is

19:20

this gets discovered. His whole business has

19:23

ruined. Or is asking

19:25

a brilliant business person cashing in

19:27

on both sides as a fence

19:29

making money off criminals and federal

19:31

police. At the same time. Maybe.

19:34

He's playing some forty chess, trying to

19:36

be a few moves ahead of everyone.

19:39

There's. A lot of unanswered questions yes of the A

19:42

of P were the first to get access to this

19:44

and they were looking to the logs and were like.

19:47

Ah, Says nothing

19:49

here. Because. And I

19:51

was just a startup companies and and how many

19:53

users yet the With the product already in the

19:55

and for sex in place it was time to

19:57

start marketing the saying. The next plan was. Figure

20:00

out how to get these a

20:02

non phones in the hands of

20:04

criminals specifically criminals and I guess

20:06

now I'm starting to see why

20:09

this phone was purpose made for

20:11

criminals. So the F B, I

20:13

and A of P could see

20:15

what everyone was the winds so

20:17

it starts when ask you the

20:19

crates of a gnome of his

20:22

the phones to a particular phones

20:24

hello/drug trafficker in Australia his name

20:26

is to Monaco Sincerity and he

20:28

used to sell Phantom. Secure Phones

20:30

one of those earlier companies and when

20:33

that company was shot down he obviously

20:35

doesn't really have any phones to sell.

20:37

Well lo and behold he comes ask

20:39

do with one. Looks like it's gonna

20:42

be the hottest new phone on the

20:44

market. so the he provides some of

20:46

those phones to to Censor Se and

20:49

just starts using them into start talking

20:51

about the myspace in the rounds. I

20:53

think initially the phones right he just

20:55

given free to test and Ciresi. It's

20:58

almost like a source of. Goober

21:00

technique, Silicon Valley Gross technique. I don't

21:02

know just to get out there for

21:04

free and Bills will figure out the

21:06

laws will figure out the market later,

21:08

but we just want to get devices

21:10

into people's hands. basically. Early

21:14

users were like in the phones

21:16

word was getting out about him

21:19

and more orders were being made,

21:21

chat messages started to show up

21:23

and F P C what was

21:25

happening. At least be Australians we

21:27

A T it was relatives the

21:29

real time instantaneous you know they

21:32

could see that's oh become it's

21:34

arrows are talking about Pc of

21:36

this of this gang is talking

21:38

about. Doing a weapon

21:40

sort of of like high caliber

21:43

assault rifles as his time in

21:45

this case of a was really

21:47

like peeling back the curtain on

21:50

these conversations. With if

21:52

he's like sexually resting people. Were they just

21:54

watching trying to figure out what to do?

21:56

It. As a

21:58

saw sea ice tea. Haha

22:00

no I'm sick hi the intelligence

22:02

services Massive tradeoff constantly throughout this

22:05

entire story which is that okay

22:07

you have a joint or foe

22:09

the housing that from that to

22:11

us to earth and wins us

22:13

some information because if you go

22:15

to Laos too quickly you're going

22:17

is still have become obvious to

22:19

the criminals or something bad is

22:21

going on Police to them. Yeah.

22:25

Yeah, I found this syncing all

22:27

reading the book. Hi interesting us.

22:31

Oh my gosh, there's there's had some crime going

22:33

on here. we can see it happening. When.

22:35

We do. The weights,

22:38

the pats dance because you have to

22:40

have some sort of good reason why

22:42

how you knew that was happening and

22:44

if it was wow we've got access

22:46

to those the any or shots and

22:48

your phone's then that's gonna just ruin

22:50

the whole company so they really have

22:52

to be very careful and I'm surprised

22:54

it wasn't just some A of P

22:56

officer like I'm not going to be

22:59

care if I'm gonna their dominant ghosts

23:01

stop this drug deal and and just

23:03

not and understand the intricacies of it.

23:06

Yeah. He

23:08

got to the point where the people

23:10

I've spoken to the lawful since officials

23:12

around the world they had to do

23:14

stuff like basically like they have to.

23:17

Make. The story whereas like okay we

23:19

are finally going to strike on this

23:22

drug lab or this drug warehouse or

23:24

whatever because is so large and we

23:26

have to act but we go into

23:28

rights, intelligence and such a way. They

23:31

look like it's coming from and informants

23:33

are sourced I there's going to be

23:35

no mention of the norms, no mention

23:37

of a backdoor and you know from

23:39

a lot of for perspective that's great

23:42

in okay we we managed to get

23:44

the drugs and arrest the people of

23:46

was as a while without revealing a

23:48

you know d the secret about the

23:51

norms. On the flipside, there is a

23:53

justice issue there. Universe: basically parallel construction.

23:56

It's. Very complicated. He gets rain nuance

23:58

by do think this. There's a Libertarian.

24:00

this would be a little bit aghast at

24:03

sort of the tradeoffs. The were being mesa

24:05

on a daily basis. I

24:08

think everyone's aghast at the whole summer he

24:10

spoke. I. Shall

24:12

Be Sincere is a situation where

24:14

the Federal Police are lying on

24:17

the record. About whether get

24:19

their intelligence from. Our the citizens

24:21

of that country okay with that Here

24:23

in the Us during cord your Ass

24:25

to swear that you're telling the truth.

24:28

The cops weren't telling the truth here. Are.

24:30

Against not yet telling the truth. We

24:32

learned later how the did get this

24:34

information but the evidence and he's earlier

24:36

cheeses did not mention a nom. But.

24:39

Additionally, they were working with this

24:41

criminal. Ask who to get these

24:43

messages and I call him a

24:45

criminal because if someone makes an

24:47

app exclusively for criminals to conduct

24:49

Grimes with than historically, that's criminal

24:51

behavior. To. Lose our school

24:53

and when the doubly start making

24:55

business deals with criminals. Is

24:58

their proper oversight years? Is this

25:00

within best practices for the Feds

25:02

points of the policy that allows

25:04

this. This. Just doesn't sit

25:06

right with me. And you might

25:08

say to me jag the ends justify the

25:10

means of all this results in a take

25:13

down have a lot of criminals than it's

25:15

okay for them the lie and to back

25:17

alley deals with criminals. Really?

25:20

What? About Fast and Furious This was

25:22

a real operation done by the

25:24

Asia Alcohol, Tobacco and Firearms were

25:26

the set up weapons deals with criminals

25:28

so they could track where these

25:30

weapons are going and ultimately try

25:32

to arrest a bunch of weapons

25:34

sellers. Yeah. Well it all went

25:36

wrong. The A T F made weapons

25:39

deals but lost. Track of the guns

25:41

that were sold. They didn't make

25:43

significant arrests and basically. Armed the

25:45

very criminals they were trying to find

25:47

and arrest. This. Ultimately resulted

25:50

in a border Patrol agent. Getting

25:52

killed and at the scene of the crime.

25:54

Was one of the guns as the

25:56

eight yes sold to criminals. The.

25:59

Ends Did. Not justify the means

26:01

hear. The. Fast and furious.

26:03

Operation was a big. Mishap.

26:06

And it showed how the

26:08

Hf was operating without proper

26:10

strategies or oversight or following

26:12

policies put in place. Where

26:15

what was the deal? de de de de f

26:17

b I take ownership of it or how did

26:19

they were is their licensees. Synthetic.

26:22

This light licensing and elements of

26:24

it is so the the deal

26:26

itself is between us to. And

26:29

Us authorities and got paid something

26:31

like a hundred and twenty thousand

26:34

dollars and then sixty thousand dollars

26:36

for some travel expenses. I think

26:38

his hair was phrased and in

26:40

some as the the documents bucks

26:42

a non basically became an S

26:45

I. Tech company from wife

26:47

means holes from people was direct

26:49

involvement. You know, Dsp. I was

26:51

picking up the bill they were

26:53

paying for infrastructure. That's they were

26:56

paying for hardware Android hardware for

26:58

the phones city apt to be

27:00

flashed on. They were. they will

27:02

running a tech company. anything. That's

27:04

just the craziest thing. Head And

27:06

beyond that, they were running a

27:08

tech company for criminals. Yet.

27:11

And and and it's fascinating to that ask

27:13

who was somehow able to control the company

27:15

in a way that all the developers and

27:17

suppliers and shippers and every what they've since

27:19

test. The distributors had no idea that the

27:21

F B, I or A of P was

27:23

involved I or even that there was a

27:26

man in the middle or me. What was

27:28

that was the the kind of the thoughts

27:30

at the going on in the developers had.

27:32

did they know that they were building man

27:34

in the middle encrypted didn't end encryption or

27:36

what was whether they think. So.

27:39

Yeah, I've spoken to people who

27:41

actually causes the atom basically made

27:43

the phone and these were completely

27:45

ordinary developers. You know when I

27:47

spoke to to a cool as

27:49

it's in the books by used

27:51

to different names are super to

27:53

buried and cease but a sound

27:55

like a freelance and gig online

27:57

about the security me the cases

27:59

that. They get involved and they

28:01

doing normal closing like they've done a

28:03

million times before for an Android apps

28:05

and what they're told us that we

28:08

make this app and we salute to

28:10

businesses. We sell it to corporations to

28:12

protect their communications and as part of

28:14

their companies like to be absurd old.

28:16

it's their the messages you know and

28:18

thus very common in banking. Very common

28:20

in financials. Us will sing for legal

28:23

reasons. I found that part to be

28:25

interesting. I didn't realize how com and

28:27

that was So the other day I

28:29

was looking. To see if on google

28:31

has any sort of and and encryption

28:33

in their chats and I didn't think

28:36

they did but they're like we do.

28:39

Not like was a suit set a

28:41

sign Me up and it's like well

28:43

what we have is for businesses, enterprise

28:45

and the what we the way we

28:47

have it set up is that the

28:49

admin of the Count can see all

28:51

the messages that your users are sending

28:53

encrypted and else I would hold on

28:55

a sec since why would you have

28:57

a man in the middle of an

28:59

encrypted thing and then I read your

29:01

book and I was like oh this

29:03

is more common than I realize where

29:05

companies do like friend since I think

29:07

you mentioned you know federal federal agencies.

29:09

Have to be able to pull up

29:11

any communications, emails, chat, messages and stuff

29:14

in case there's indictments or subpoenas. What

29:16

Did What was talked about federally or

29:18

even state agencies and least in the

29:20

U S. Him. And this

29:22

stuff has to be archived. And of

29:24

it's a new encrypted. you can't archive it in

29:26

a proper way so there is a reason to

29:28

get in and take a look at. I don't

29:30

know this. This kind of just surprised me. Yeah,

29:34

I mean Customs and Border

29:36

Protection part of Dhs. They

29:38

use wicca, the encrypted after

29:40

many people be familiar with

29:42

for the use and and

29:44

surprise old government versions which

29:46

yes it's encrypted. Buy a

29:48

house that extra archiving functions

29:50

and the. Developers have

29:52

a Gnome. That's what they thought they

29:54

were building. They thought they were building

29:57

a communications platform. For. Businesses to.

30:00

Talk about securely have the messages archives

30:02

to so dense. For whatever reason, the

30:04

administrative can go through them at a

30:06

later date. That's what they thought they

30:08

were doing. Well, they weren't so which

30:11

was bad as opposed to being sold

30:13

to criminals and the archiving features actually.

30:15

for the F B I ask you

30:17

left out the L A when are

30:19

telling the developers about Less Enemy just

30:22

very briefly on their legs The composite

30:24

the compartmentalization the ask ask you did

30:26

I think is very interesting as in

30:28

like they were the people's. Designing the

30:30

up a neighbor sort of in

30:32

their own silence that with them people

30:35

making custom fork of casino s

30:37

the Android operating system and it

30:39

was those people and then some or

30:41

else they were the you know

30:43

the criminal resellers on the grounds and

30:45

like these groups never really communicated

30:47

with one another and I'm surprised it

30:50

didn't leak. To be perfectly honest

30:52

I am genuinely surprised but somehow a

30:54

managed to say a secrets a

30:56

least for a long time. Too.

31:00

Many secrets Sea Tac astronomy.

31:03

I mean, think about it's new criminals

31:05

think they're the ones being the most

31:07

secretive years. They've got these super private

31:09

unarmed phones which you need a pin

31:11

to unlock and then go to a

31:13

dummy calculator app to punch in a

31:15

secret code to get into the chat

31:17

apps there and and encrypted right then.

31:19

They're doing things like disguising their voice

31:21

and having disappearing messages and being super

31:23

secretive about their crimes, trusting unarmed with

31:26

all their secrets. And

31:28

there's ask who who is secretly scooping

31:30

up all these messages and lines, his

31:32

developers of who these customers are. And

31:34

then there's the F B I have

31:36

p who are secretly reading them off

31:39

and secretly making business deals for the

31:41

school. I mean did you know that

31:43

the F B I was operating had

31:45

sex start up? Which. Was a

31:48

phone purposely built for criminals he

31:50

used. message each other it's secrets

31:52

or attempt from you and they're

31:54

still see to. Loud.

31:58

Criminals. Had no idea. We're

32:00

being played, so unarmed phones just kept

32:02

spreading. They ended up making their way

32:04

to some criminals in Europe and things

32:06

really started the heat up there. The.

32:10

Phone so popping up in Europe

32:12

and that's when Bruce sort of

32:14

the Swedish police get involved in

32:16

and also the ducks they are

32:18

the two main European agencies. Stuff

32:20

says come forward because I simply

32:23

where the phones are ending up

32:25

and of a Cvs P doesn't

32:27

really have to six and a

32:29

super star Sweden, oh the Netherlands

32:31

and the Us be Ice elite

32:33

although they are reading the messages

32:35

by this points that don't exist

32:38

for a start and Vsp I.

32:40

Can't really go over and start

32:42

arresting people in the Netherlands On

32:44

is not a no surprise so

32:46

they decide to share some of

32:48

the intelligence with the Swedish and

32:50

Ads Us counterpart say starts to

32:52

mirror was going on in Australia

32:54

with skill more intelligence gathering in

32:56

the rest. here in the rest

32:58

the space still very much under

33:00

wraps even though more remove cop

33:02

sitting luton. Some.

33:04

Crazy things started happening with the arm at

33:06

this point. it takes more and more ninety

33:09

degree turns. I'm not even going to get

33:11

into what happened in Europe or South America

33:13

are Turkey's I'll simply say that there were

33:15

a few criminals that love this a non

33:17

phone so much that they tried to purchase

33:20

ownership of then companies and eventually to started

33:22

calling themselves the Ceo of Unarmed. Would.

33:24

Soup when a major underground criminal as saying

33:26

he's the Ceo of an ounce, it really

33:29

legitimize of the phone for other criminals wanna

33:31

buy? It's so the unarmed phones were starting

33:33

to grow wings and take on a life

33:35

of their own in Europe at this point

33:37

I've read. I think tens

33:39

if not hundreds of thousands of.

33:42

A non messages and messages from

33:44

of provides as well And what

33:47

emerges from reading those is there's

33:49

a lot of people who sell

33:51

is encrypted phones in a particular

33:53

markets or territories they treated like

33:55

having a drug territory like in

33:57

the same way the somebody may

33:59

be. A the wholesale

34:01

distribution for. You.

34:04

Know a certain part of Sweden

34:06

or may and Serb Ceo or

34:08

something like that. These

34:10

phone dealers treats their products in

34:12

the same source of way. I'm

34:14

A so I want to shift gears her

34:16

to the F B isis so that that

34:18

a lot of questions about what the have

34:20

be us to enhance first of on. Fb.

34:23

I handles internal.

34:26

Threats To The United States.

34:29

They're not the Cia which

34:31

is doing international investigation. So.

34:34

I don't even understand why the F B

34:36

I would be looking at foreign has it's

34:38

isn't the first place. yeah I think this

34:40

is something. the are lots of people reading

34:43

the book is in there as. An

34:45

issue with basically Athena in a way

34:47

to put him which is like why

34:49

is this Us law enforcement agencies intercepting

34:51

and reading messages from all over the

34:53

wells and the best answer I have

34:56

is that while this to the source

34:58

of the legal one which is that

35:00

in the Fourth amendment's only protects people

35:02

on American soil right where you have.

35:04

To get a Sosa sees a warrant to go

35:06

free communications or a wire samples or orbs was

35:08

as a right not to get suits at the

35:10

cooks. The

35:13

F B I just on the the

35:15

for overseas and that's basically source of

35:17

the loopholes of the use where they

35:19

were able to go through all of

35:21

the status. The second one is like.

35:24

Source: Of a. How they

35:26

see themselves or maybe or how they

35:28

see their their ethical obligation as well.

35:31

But like the prosecutors I've spoken to

35:33

her involved in this case, they just

35:35

simply see this as a good thing

35:37

and they want to go out. And

35:39

they want to shut down all of

35:41

these criminal gangs. They want to intercept

35:44

them. I think that there are valid

35:46

questions about you know national sovereignty and

35:48

with us or to things but that

35:50

is what the F B I set

35:52

out to do. They set out see

35:55

why atop the wells essentially. And they

35:57

were very, very successful. Other. So

36:01

many questions I have at this point now many phones

36:04

when the u so the F b I kind of

36:06

really look at us since since chats even if they

36:08

wanted. But. The F B I was

36:10

heavily involved with unarmed. Creating

36:13

this start. Up Basically funding is

36:15

creating the infrastructure, actively monitoring the

36:17

messages and it just makes me

36:20

wonder. Have they solved all

36:22

the cases in the U S Or

36:24

and seats? Because to start a tech

36:26

companies. And collecting and analyzing and

36:28

reporting intelligence so that you could give.

36:31

It to other countries. First

36:33

six, a lot of time and

36:35

resources. so whose idea was it

36:37

to divert as the I resources

36:40

to focus on stopping crimes and.

36:42

Sweden. And

36:45

Australia? I mean, It

36:47

it it is. Polly the doing

36:50

it because they can. They can

36:52

monitor these communications patrons. Yes, they

36:54

can't go arrest people themselves, but

36:56

then they can provide an intelligence

36:58

to foreign partners. I mean is

37:00

is source of a over use

37:02

cliche this point. You know the

37:05

idea of America being the will

37:07

police or whatever, but there is.

37:10

Better. Than elements of us stereotypes

37:12

is in that Vsp I went out.

37:15

And they collect. All these messages are

37:17

all around the world. even though they

37:19

couldn't months ago was going on America's

37:21

this is sources the seem to policing

37:24

though we're in now and I wasn't

37:26

really debate about it but it was

37:28

just like one day. So several days

37:31

over the past few years police of

37:33

just decided to they're going to stack

37:35

or of always intercept communications all around

37:37

the world basically ends. We didn't really

37:40

get a chance to talk about that

37:42

as a society about whether that's something

37:44

we once. Maybe since we do like I

37:46

don't know but we can't have a conversation the

37:48

less we know what's going on and as kind

37:51

of was hoping to do with this book. Pause.

37:54

And consider this the Sp

37:56

Eyes fundamental mandate is to

37:58

protect and defend. A nation

38:00

from threats. Defend. However,

38:04

In this story, they've gone on

38:06

the offense in the name of

38:08

defects. And this difference

38:11

is worth noticing. I

38:13

mean imagine you're defending yourself in some legal

38:15

battles and you're worried you might lose because

38:17

of some surprise thing, the opposition my bring

38:19

up. So to defend yourself better, you decide

38:22

to break into the other lawyers office and

38:24

steal all their notes that they have on

38:26

the case. or hack into their phones and

38:28

see their chat messages. All

38:30

so you can better defend

38:33

yourself. Well, this tactic would

38:35

be unequivocally unethical. Yet.

38:38

The F B I strategy

38:40

here is to penetrate private

38:42

chats in pursuit of criminal

38:44

activities. It's crossing that boundary

38:46

from passive monitoring to act

38:49

as intrusion. And I think

38:51

it's important to be aware when that

38:53

boundary gets cross because we never see

38:55

them cross it. Since. It's

38:57

always done in the shadows, If. The

39:00

Fk for to cross a boundary

39:02

in the physical world. It would

39:04

be akin to them secretly breaking

39:06

into thousands of homes, rummaging through

39:09

personal belongings because they're trying to

39:11

detect crime. This wouldn't be

39:13

acceptable. So why then, should our digital

39:15

lives be subject to a lower standard

39:17

of privacy? I guess. Cfp

39:20

I use all kinds of spank

39:22

your though across threshold all the

39:24

time, like wire tapping and planting

39:26

bugs. They're always covertly reaching in

39:28

the someone's communication and taken it.

39:30

But I think what's different about

39:32

this story is the mass surveillance

39:35

aspect to it's all. messages for

39:37

all users were being collected and

39:39

stored. And it wasn't stored in

39:41

the F B. I stayed obese, exactly. But

39:43

the F B I was funding this company

39:46

who was collecting at all. I

39:48

remember when the Snowden revelations came out.

39:50

The An Essay and Gchq were trying

39:52

to collect massive amounts of data flowing

39:54

over the internet, not targeting a specific

39:57

person, just grabbing everything. Which means a

39:59

lot of. Dawn criminals were getting their

40:01

d to analyze and I wonder. Is

40:04

that offensive as well? It's

40:06

mass spying at least, and I

40:08

for one, don't approve of government's

40:10

doing mass spying on their citizens.

40:13

But this is crazy ethical dilemma

40:15

because what if the mass spying

40:17

is just on the criminals? I

40:19

think that's. Is something

40:21

the. Crips. Increases and

40:23

bribes to expose. whispers in the booth were

40:26

worried about, which is that some of them.

40:28

Are less worries about. The.

40:31

Specific case of an old boss them

40:33

out to be clear, but they're more

40:35

worried about. well, what happens now if

40:37

we haven't Network has ninety percent criminal

40:39

and ten percent normal users. Is that

40:41

a fair? Targets? I don't know what

40:44

happens when they move to sixty sixty,

40:46

you know, and there's a really good

40:48

close in Their from must agree in

40:50

the Crib Zola. Just and he says

40:52

bass, Well, maybe fifty percent of the

40:54

criminals on this network doing really really

40:56

bad stuff like trafficking or whatever and

40:58

and fifty percent are doing like are

41:00

there no. Copyright infringement or song lyrics

41:03

Something that I don't think people really

41:05

care about in the eyes of law

41:07

enforcement. Is that says August. And

41:10

that's the discussion when or having and we need

41:12

to have that as quickly as possible because of

41:14

wisdom or force them to just gonna go Had

41:16

do. People. Sometimes say to

41:18

me when we're talking about government surveillance

41:20

at they've got nothing to hide. And

41:23

they are worried about it. Or.

41:25

With those people. Are really

41:28

saying is that they're always

41:30

going to comply with the

41:32

government. No. Matter what, They're.

41:35

Never going to have dissenting

41:37

views are protests, and honestly,

41:39

I've never met anyone who

41:41

one hundred percent agrees with

41:43

the government's know Madison leadership.

41:46

It's important that we preserve

41:49

our freedom to have opposing

41:51

views with the government watching

41:53

us, Because the thing is,

41:55

if we're being watched, it

41:58

seems is our actions. Gosh

42:00

in this story the F B I themselves

42:02

as does to hide. And they can't

42:04

spy on people in the U S without

42:06

proper warrants and stuff. But they were circumventing

42:08

this rule by providing intelligence to other countries

42:11

and then those countries providing intelligence. Back to

42:13

the F B I go to it's it's

42:15

It's a worry those big were in the

42:17

third ones in. in this case it was

42:19

ice. Even though the F B I can

42:22

look of phones in America B A S

42:24

P agrees to keep an eye on the

42:26

ones on American soil for for us to

42:28

lice and you know on one hand you

42:30

to say this will. It's good the As

42:32

P were monitoring. that's. And nobody go

42:35

hurts hopefully on new friends. Well

42:37

why did the field scout warrants

42:39

do themselves feel? We're. Gonna take

42:41

a quick ad break that see with us because

42:43

since well clearly you can see there's a ticking

42:45

time bomb going on at this point. This.

42:50

Episode is sponsored by Exon yes,

42:52

complexity is increasing and I T

42:55

and Cyber Security Controllers with Exxon

42:57

Yes, the system of record for

43:00

all digital infrastructure. The

43:02

Exxon he has platform correlates

43:04

asset data from existing tools

43:06

to provide and always up

43:08

to date inventory. uncover security

43:10

gaps in automate response actions.

43:12

Go to exxonheas.com/darkness to learn

43:14

more and get a demo

43:16

that Exxon yes spelled a

43:18

X Oh and I U

43:21

S x Sony us.com/doctor. Been.

43:26

On phones were getting picked up by

43:28

some criminals in Europe would seeking them

43:30

to Dubai to try to sell on

43:33

their some of the phones landed in

43:35

Dubai and zero part of the Uae

43:37

and you he is very interesting because

43:39

is one of the very few places

43:41

the you're not allows to just go

43:43

around the stalls selling and encrypt iphone

43:45

or encrypted abs if is not approved

43:47

by the government's you can go into

43:49

a lot of trouble you know I

43:51

just sort of in the same way

43:53

as I the Russian Federation right way.

43:56

Why is. Encryption about problem there.

43:58

It has to be approved. By

44:00

the government's is basically a combination

44:02

of the censorship and surveillance a

44:04

sort of posture whereas if you

44:06

are selling and encrypted app that

44:08

the local authorities and national authorities

44:10

do not approvals still not allowed

44:12

to do that and the reason

44:14

being is that body wants to

44:16

be a to access up and

44:18

ask somebody running round selling a

44:20

non phones is not going to

44:22

go on their good side. See.

44:25

It's not completely out of the question

44:27

for your governments to ban encryption to

44:29

force the people of the country to

44:32

use certain apps so they can see

44:34

into it's. This. I think

44:36

is a huge violation of our

44:38

privacy. Luckily in the United States

44:41

we have the Fourth Amendment's of

44:43

the constitution's which states or read

44:45

the whole thing for you. The.

44:47

Right of the people to be

44:49

secure in their persons houses, Papers

44:51

and effects against unreasonable searches and

44:54

seizures shall not be violated and

44:56

no warrants shall issue, but upon

44:58

probable cause supported by oath or

45:00

affirmation and particularly describing the place

45:02

to be searched and the person

45:05

or things to be seized. The.

45:07

Fourth Amendment is needed to

45:10

maintain a balance between national

45:12

security interests. And individual

45:14

rights. It's. A tool

45:16

to make sure that the government

45:19

actions are subject to oversight and

45:21

rounded and legitimate need if we

45:23

eliminate that protect since it creates

45:25

a really dangerous power dynamic. And.

45:28

A slippery slope towards a

45:30

government that abuse of power

45:32

with no accountability. Is

45:35

the Us government did some kind

45:37

of mass surveillance? And was

45:39

searching through all that data. Without.

45:42

A warrant. It seems to

45:44

me it would be in

45:46

direct violation of the Us

45:48

constitution. And yet here's

45:50

a situation where the F B

45:52

I was running as tech startup

45:55

with the entire A gold to

45:57

be snooping on, other users chats,

45:59

watching. Every message to see

46:01

if there was criminal activity.

46:04

There's. No targeted search Your. No.

46:06

Individual warrants were being made. At this

46:08

point they were analyzing. All.

46:11

The chat messages going through a non. Is

46:14

this in violation of the Fourth Amendment's.

46:17

I. Can make a case that it was. And.

46:20

The F B I had that in

46:22

there had to so they were trying

46:24

hard not to peek into any Americans

46:27

messages. The data was

46:29

available in unarmed database, but they

46:31

had to program their system to

46:33

only show them foreign chance. I

46:35

mean I walked through the same

46:37

rooms the Bsp I was reading.

46:39

be no messages in. Sight.

46:42

Obtains screenshots of or Bsp I interface

46:44

looks like so I see your lights.

46:46

I feel like I can put myself

46:48

in the head of subsidies F B

46:51

I agents because I've also read some

46:53

of these messages as well. Rights and

46:55

the system itself is cause holler I

46:57

you log in. Initially it was just

47:00

from the San Diego F B I

47:02

field office but then they made it

47:04

promotes as well for the European partners

47:06

and also because his tweezers people can

47:08

go to the office as much skew

47:11

loggins and a source the green and

47:13

black interface and you can click on

47:15

an individual a norm user. And

47:18

it will show sort of a constellation

47:20

of all of that contact so be

47:22

a circle in the middle and beats

47:24

another so called the person bespoke zeus

47:26

and is another circle with so sort

47:28

of the group chats you can and

47:30

zero in on those is always like

47:32

amount he goes sources interface and then

47:34

once you go to specific user you

47:36

can see the all of her messages.

47:38

You can see all of their photos

47:40

and brother handily. There was also a

47:42

I powered summaries of what was being

47:44

spoken about powers a least in some

47:47

way by Amazon. The F B I

47:49

used my Amazon capability the as you

47:51

can look on the right side of

47:53

the screen and inside. Jerry it's okay

47:55

about a cocaine the hospital or whatever

47:57

it's and sometimes and fab lumps else

47:59

will. Which was just always hilarious

48:01

to me. Experts When it gets to

48:03

the point where there are millions and

48:05

then tens of millions as messages Psp

48:08

I have to turn to sympathies say

48:10

I capabilities consists of wise they're going

48:12

to be swimming and data and by

48:14

the end they were absolutely swimming in.

48:16

Day says there was a real danger.

48:19

Verse. If they did not analyze

48:21

every single Maisons but what would happen

48:23

This the one message about death for

48:26

a golfer than somebody dies That was

48:28

a constant threats and it really really

48:30

ramped up as a non became especially

48:33

more popular. This tool that they were

48:35

using it was it developed by Unarmored

48:37

developed by F B I. Hello!

48:40

I bought was developed by as be

48:43

I computer scientists was made in the

48:45

house as basically like the surveillance interface

48:47

of an. Sounds

48:49

pretty advanced to be able to. I

48:53

eat have this graphical view of who's connected

48:55

to who and then also use a I

48:57

to search for spectrum cause a lot of

48:59

the criminals are you since code words for

49:01

for different drug names and all this kind

49:03

of stuff thing in our Spartan the police.

49:06

And but they're able to a final that.

49:09

Yeah and I mean if you think about

49:11

it like of imagine a a normal wire

49:13

top and like L A or something and

49:15

is one guy talking to another guy in

49:17

a normal phone and the talk about a

49:19

drug deal. and if you're the F B

49:21

I or who as a you have to

49:23

figure out who these people are and that

49:25

might be tricky. you know as you say

49:27

maybe the using codenames, maybe the using pseudonyms

49:29

and then you go about you may be

49:31

a phone location data you figure for the

49:33

or whatever. Now imagine doing that. says.

49:36

Something like twelve thousand people in one

49:38

hundred and sixty different countries. It's like

49:40

I always com picture the task in

49:42

front of him and that's why they

49:45

had to turn city's pretty sophisticated systems

49:47

to figuring out notice what people are

49:49

saying but through the how these people

49:51

even are and they would do that

49:53

in the need for books in of

49:56

the stereotypical grass on the wall and

49:58

Bsp I was his with. The

50:00

the layouts of the from criminal organizations

50:03

and in some cases Cspi doesn't even

50:05

know who these people are assessed. I

50:07

just like. Bo we haven't

50:09

You crime syndicate on the platform This

50:12

star mapping out how they're related to

50:14

one another So you he said you

50:16

know we're looking for that's that's allies

50:19

or what was there was like really

50:21

what they were like let's not let

50:23

that slip through and will release I

50:25

am focus on yeah So as well

50:28

as the drug trafficking the main saying

50:30

that flows across the norm were while

50:32

the F I cause frets a life

50:34

and this is where a criminal organization

50:37

or just individual criminal want to. Harm,

50:39

torture, or in many cases

50:42

kill somebody else and this

50:44

happens across the norm. Constantly.

50:48

To the point where one of

50:50

the F B I agents who

50:52

was reading you know messages of

50:54

says his task was just to

50:56

go through every single image that

50:58

was sent across the platforms and

51:00

often these were weapons or locations

51:02

or targets ends the way was

51:04

described to me it's is that.

51:07

Is. Trying to figure out a possible basically

51:09

as quickly as possible you have to

51:11

take all these disparate pieces of information

51:13

and make you only have a photo

51:15

of a weapon so that indicates there's

51:17

probably going to be fine sense of

51:19

maybe you only have a photo of

51:21

the location is like will something's gonna

51:23

happen there and the sp I was

51:25

have to very very quickly as best

51:28

as I could. Figure. Out this

51:30

puzzle, give information to a foreign authorities

51:32

who couldn't act on it and then

51:34

maybe save people or or navy. No

51:37

I don't think he was always successful

51:39

but he did save lives in the

51:41

process as well Be it's gotta be

51:43

really complex because when you when you

51:46

to see to criminals talk to each

51:48

other over smith said since they're gonna

51:50

easily say i'm gonna kill you man

51:52

assistant that doesn't necessarily mean it's gonna

51:55

kill him but it's just one of

51:57

these this the way our lingo. As

51:59

and. Then the opposite is when you're

52:01

saying okay listen we really need the

52:04

you know off this one person's There's

52:06

also like all kinds of i'm you

52:08

know. Coded

52:11

messages and they're just be like or minus

52:13

one this guy. And like minus one when

52:15

it's minus one. Me: no means didn't. Kill

52:18

him himself. You have to like

52:20

decode this. this that doesn't. That

52:23

must be incredibly difficult. Yeah.

52:25

There's a lot of posturing a man

52:27

for the enormous his eyebrows were. There

52:30

are people do exactly that? like all

52:32

I'm gonna kill him or whatever and

52:34

then you'll come across Messages were like

52:36

they are talking specifically about getting a

52:38

getaway car to drive away from the

52:40

restaurant after they've killed somebody that money

52:42

to rent and air Bnb to hide

52:44

the assassin in lights when he starts

52:46

to get specific and granular. A least

52:48

to me that's when it's like. Oh.

52:51

Okay, we need to actually take this seriously

52:53

and that smokes near the Swedish authorities did

52:55

the ducks as well and especially if be

52:57

on. Your end of. It's

52:59

also while because the typically what

53:02

we're talking when we're looking at

53:04

the or when I when I

53:06

was written a bucket seem like

53:09

this is criminal on criminal gang

53:11

gang activity right and so trying

53:13

to save the life of a

53:15

criminal's is sometimes the same as

53:18

you know moral situation you're dealing

53:20

with here. Yet said

53:22

a pussy has been a complicated ethical

53:24

spot and he pussy A since the

53:26

foreign agencies and same spot as well.

53:28

What thoughts to happen within the F

53:30

B I or as partners was in

53:32

such communications about affects allies the authorities

53:34

with an axe on it's you know

53:37

they would somehow stop the killing in

53:39

there could be in various ways but

53:41

then what would happen with be that

53:43

the criminals will continue talking and they

53:45

would go ah how to the authorities

53:47

know we were going to kill the

53:49

skies and they wouldn't assume it was

53:51

a nom. There was assume there was

53:53

a mole or avast in their organizations and then

53:55

they were trying to kill that persists for them

53:57

be a few as another threat to life. They

54:00

always became like this endless cycle

54:02

of spiral where it started to

54:04

become a sexually difficult for the

54:06

sp I to maintain sambo as

54:09

this is the way they described

54:11

it as there's so many ethical

54:13

and moral dilemmas here. I mean

54:15

so imagine the Ai tool that's

54:17

out there scouring messages looking for

54:19

a threat to life, but the

54:22

tool has to be trained to

54:24

ignore it is it's an American.

54:26

As on the phones as I

54:29

found through reporting this book, they

54:31

absolutely landed on American soil. They

54:33

were enormous Nunes being used inside

54:36

United States. There was a plan.

54:39

To. Start. Sense

54:41

of the F B I just are reading

54:43

those messages. That. It was very

54:45

difficult for them to figure out

54:47

what to do with all this

54:50

information they collected. They are basically

54:52

stumbles in being able to looks

54:54

at Us communications they just didn't

54:56

seem to be be appetites to

54:59

go off the people inside the

55:01

states. Even though the prosecutors me

55:03

agents on the case very very

55:05

much wants to to they were

55:08

ready to do it. They were

55:10

collaborating with a field office and

55:12

Los Angeles' as well. He

55:15

was just a matter of basically pulling the Swiss

55:17

for higher ups and the D O J. Shut

55:20

That down. Essentially, what is I mean, what would

55:22

it would have These hats look like? Does the

55:25

F B I go to. Congress.

55:27

Or why and say like, hey, we've

55:29

got this with okay, I had a

55:32

sit down because I got some crazy

55:34

story to tell us. We've got this.

55:36

We've got this mass surveillance tools that

55:38

we somehow bought from some guy. right

55:41

it's now we now have like view

55:43

into like the whole criminal world here

55:45

in the Us and or a you

55:47

know as as a large of and

55:50

a portion of it's of we would

55:52

like to do a mass arrests because

55:54

we can see this and but we

55:56

don't have the the warrants. We

55:58

need your help at like what does that? Do

56:00

you have any understanding of what those conversations were like?

56:03

Yes, so box happens. When it

56:05

was first approved for the F

56:07

B I to gain access to

56:09

the messages and jumbles was that

56:11

most drugs prosecutors in San Diego

56:13

In a specific meeting I describes

56:15

they were like know, this is

56:17

a ridiculous idea, you can't do

56:19

this and then. Shouted!

56:22

On top of that there were like. Well

56:24

don't even look at the U S chats right

56:26

leg. just look the other way because we don't

56:28

have of approval to even look at. It. Yes

56:31

exactly they would like. Please and look

56:33

at the U S messages we will

56:36

figure bow later fans. What

56:38

happens was was that the prosecutors on

56:40

that day they send their requests to

56:42

a specific parts of the Dj to

56:44

the Office of Enforcement Operations and they're

56:47

the ones who basically approve every why

56:49

are. If you want to wind up

56:51

in the U S they have to

56:53

approve. It ends the prosecutors ah me

56:55

in on cases and that's fans. Ojo

56:58

just sat on it for months And

57:00

months and months. There was clearly like

57:03

this device between sort of the cowboys

57:05

on the norm case and then like

57:07

the seen them or seen people in

57:09

the O J who's like we absolutely

57:11

not. Approving this

57:13

and a nom obviously grew to

57:16

a massive size even. Without

57:18

last but. It could

57:20

have grown even bigger with potentially

57:23

even more disastrous consequences. Yemeni

57:25

legalising like we've been talking. you know it

57:27

in In induces so many ethical dilemmas within

57:30

law enforcement of who will award winning a

57:32

wiretap for this and all this kind of

57:34

stuff at what's allowed and what's not allowed

57:36

and then there's a psych screw it weren't

57:38

alleges, get all the data and will figure

57:41

out what's allowed later. It seems weird. Isn't

57:43

that to go that direction? Yeah.

57:45

I. I I'm still using

57:48

the should be. a debate around was

57:50

a C for the running attack company

57:52

should be allowed the should be. It's

57:54

based on whether we want to be

57:56

of to hack into entire telecommunications providers.

57:58

Maybe the end result of. Conversations that

58:00

we as a society You're okay

58:02

with the tradeoffs, but. I don't

58:05

think ordinary members as the public one

58:07

first even know this is basically happenings.

58:09

The syllables aren't aware of what those

58:11

trade or season are they. How can

58:13

we even have conversations when this is

58:16

basically done in the shadows and then

58:18

everybody moves on. Here. And I

58:20

also just realized how who is the

58:22

sp? I is running a tech company

58:25

that is. Communication

58:27

Platform which is facilitating

58:29

the murder and drug

58:31

deal. Thinks

58:33

they are they responsible for over the

58:35

ones who made this communication possible. Were

58:38

the ones who put the phone in

58:40

your hand to make this. Even

58:43

happen there is there is some

58:45

responsibility there. I

58:47

mean there's no two ways about

58:49

it. The sp isis of a

58:51

taste crime With the developments and

58:53

the ongoing maintenance and the seeker

58:55

running of a norms the sp

58:57

I was eight sets. Backbone.

59:00

Of organized crime. Snow Yes, of

59:02

course they also have the surveillance

59:04

capabilities as well, but they were

59:06

selling a product to criminals and

59:08

the criminals making great use of

59:10

it. Like the ends

59:13

justify the means and some way I

59:15

think those how people who work in

59:17

the operation would fraser and as to

59:20

be ethical responsibility. From

59:22

everybody I've spoken suits they didn't

59:24

take be ethical consideration seriously like

59:26

we're running the stream occasions platforms

59:29

and that's why if a murder

59:31

does slow across the chest we

59:33

need to his response with aggressively

59:35

fans quickly. Now that is always

59:37

work out unfortunately but that was

59:39

the approach they were attending from

59:42

for the end of the day.

59:45

Those. Messages are still on Fb I heard shut

59:47

up. So that I think

59:49

about ask you again. He was making

59:52

a phone for criminals right? Like he

59:54

was working with criminals, listening to their

59:56

requests and adding and features like a

59:58

remote wipe ability. So. Because.

1:00:00

Ask who was making this for criminals.

1:00:03

It meant he was a criminal. Clearly.

1:00:06

right? Get. It was the F B. I

1:00:08

who is the true owners of this

1:00:10

company. So what is that? Take the

1:00:12

as the ice If they were making

1:00:14

something purposely for criminals to use. The.

1:00:17

Implications of the sources keep calling a

1:00:19

glimpse of tell you I have like

1:00:21

a million places. To Love

1:00:24

this book! June

1:00:27

Seventh, Two Thousand Twenty One. Just.

1:00:31

What happens on this day show

1:00:33

So the F B I and

1:00:35

it's foreign This they decide on

1:00:38

dates June Seventh Twenty Twenty one.

1:00:40

The reason for that is that

1:00:42

the country there was sort of

1:00:44

part as a technical infrastructure. Lithuania.

1:00:47

The court order was running

1:00:49

else but basically a know

1:00:51

mrs getting too unwieldy. It

1:00:53

was starting to get out

1:00:55

of the sp ice control.

1:00:59

Sellers. Were pushing into countries as

1:01:02

they wished. Every time the F B

1:01:04

I have more resources to monitor the

1:01:06

messages which was eventually like a hundred

1:01:09

and says he has B I agents

1:01:11

and Turtles than more messages came in.

1:01:13

These last for more resources the have

1:01:16

to be an end Points fans That

1:01:18

was basically the day was pets before

1:01:20

it went over the edge. Or

1:01:24

spoke suits multiple law enforcement

1:01:26

officials who are potholes, bad

1:01:28

dates and. The pressure

1:01:30

and the stress they felt was

1:01:32

incredible. The way was

1:01:34

set up With that he was

1:01:37

almost a global line. This dominoes

1:01:39

starting in Australia and they would

1:01:41

do their arrests first. it would

1:01:43

then move over to Europe and

1:01:46

then they would do their arrests.

1:01:48

and then eventually when people woke

1:01:50

up. ah on the west coast

1:01:52

in San Diego it's Psp. I

1:01:55

would come forward and they would

1:01:57

take credit for running a gnome

1:01:59

state. The. Single

1:02:02

largest law enforcement's action in

1:02:04

any one day. something like

1:02:06

ten thousand police officers were

1:02:09

involved in that one day.

1:02:11

It's in this world spanning

1:02:14

relay race, domino, track of

1:02:16

activity, good morning. I

1:02:20

Randy Grossman on the acting United States

1:02:22

Attorney for the Southern District of California.

1:02:24

Welcome Thank you for being here! We're

1:02:26

here today to announce the unsealing of

1:02:28

a federal indictment by a grand jury

1:02:30

in the Southern District of California. Which.

1:02:32

Charges: seventeen foreign nationals

1:02:34

and facilitating drug trafficking,

1:02:37

money laundering, And. Obstruction

1:02:39

Of Justice. This

1:02:41

is part of a worldwide law

1:02:43

enforcement operation that has resulted in

1:02:46

hundreds of arrests for drug trafficking.

1:02:48

Money. Laundering. Firearms.

1:02:50

Violations and crimes of violence.

1:02:54

These international arrest and the U

1:02:56

charges were possible because of a

1:02:58

San Diego based F B I

1:03:00

investigation like none other in history.

1:03:03

This investigation called Operation Trojan

1:03:06

Shield shined a light into

1:03:08

the shadowy industry of harden

1:03:11

encrypted devices. For.

1:03:13

The first time. The. F B

1:03:15

I developed and operated it's

1:03:17

own harden encrypted device company

1:03:20

called Adam A N O

1:03:22

M As Religion are indictment

1:03:24

criminal organizations and the individual

1:03:26

defendants that we have charge

1:03:28

purchased and distributed annum devices

1:03:31

in an effort to secretly

1:03:33

plan and execute their crimes.

1:03:36

And fat and of distributors.

1:03:39

Administrators. And agents had so

1:03:41

much confidence seat and secrecy of

1:03:44

their devices that they openly marketed

1:03:46

them to other potential users as

1:03:48

designed by criminals. For.

1:03:50

Criminals. But. The

1:03:52

devices. Were. Actually operated by

1:03:54

the F B I. The.

1:03:58

Worldwide implications of this. That's a

1:04:00

geisha and. Are. Staggering. In.

1:04:03

Total, the criminal sold more than

1:04:05

twelve thousand and an encrypted devices

1:04:07

and services to more than three

1:04:10

hundred criminal syndicates operating in over

1:04:12

a hundred different countries. This.

1:04:14

Was an unprecedented operation in terms

1:04:17

of it's massive scale innovative strategy.

1:04:19

International coordination and investigative

1:04:22

achievement. Operation Trojan

1:04:24

Shield has shattered any confidence

1:04:26

criminals may have to the

1:04:29

use of harden encrypted devices.

1:04:31

Saturday any confidence and criminals may have

1:04:34

in the use of encrypted devices. Are

1:04:38

nicer. This is a good take because.

1:04:41

What? About me. Who. To wants

1:04:43

a hardened encrypted device

1:04:45

for you know, privacy

1:04:47

and security. Yes, your

1:04:50

ordinary person. And you're trying

1:04:52

to figure out where an app is Mrs.

1:04:54

Smith or know it can be really, really

1:04:56

hostile. Yes, you look at the owners like

1:04:58

all other sources saying and Skyn I may

1:05:00

be some researchers dig through the codes or

1:05:02

whatever it is birth. Even beyond

1:05:04

that lucky even beyond looking for specific

1:05:07

answers is so that we know the

1:05:09

sp eyes. prepared to do it now,

1:05:11

which changes the conversation. Someone.

1:05:13

Even asked the F B I asked a

1:05:15

press briefing about this. Is

1:05:18

something reckless and it would

1:05:20

get. So. Who.

1:05:23

Knows frame. This will

1:05:25

lead lead all of our armed

1:05:27

criminals guessing of what company out

1:05:29

there is actually a true secure

1:05:32

company and which is run by

1:05:34

potentially the government so we obviously

1:05:36

have the technical technical capability ah

1:05:39

and obviously the international. Partners or

1:05:41

to work these types of cases in

1:05:43

the future. I. Basically believe

1:05:45

the Spr is absolutely exploring more

1:05:47

assists to get some of the

1:05:50

information the books are you snuck

1:05:52

into a law enforcement or be

1:05:54

conference in Vancouver where to with

1:05:56

the agents were talking and towards

1:05:58

the end of that hawk one

1:06:00

of them fed. They look forward

1:06:02

to like what the next version

1:06:04

of operation Frozen Sales which the

1:06:07

a normal operations looks like it's

1:06:09

that's not an agency saying okay

1:06:11

job well done this will go

1:06:13

home Doesn't agency looking for an

1:06:15

even bigger thing to do next

1:06:17

and as well as an arm

1:06:19

that was the sky hack that

1:06:21

was the and protests hacked as

1:06:24

well Absolutely law enforcement are continuing

1:06:26

to push down the through some

1:06:28

in some is this police. Officers

1:06:30

I spoke to told me that the Dutch

1:06:32

authorities told meets we're doing this right now.

1:06:34

Saying. Stasis. While I'm jealous of so

1:06:37

much, you sneak it in law enforcement

1:06:39

officers to get the stories. We skipped

1:06:41

over so much of the book I

1:06:43

purposely left out some of my favorite

1:06:45

parts of the Baptiste. the you can

1:06:47

enjoy a stealth. This story goes deeper

1:06:49

and deeper and deeper and so used

1:06:51

to Do yourself a favor and go

1:06:54

read: Dark Wire by Joseph Cox. A

1:07:06

big thank you to Joseph Tax or

1:07:08

sang the starting with as you find

1:07:10

the link those books dark Wire in

1:07:12

the show notes and sense. Highly recommended.

1:07:14

This episode is created by mean the

1:07:16

bit humbler Zachary Cider are editor is

1:07:18

the silicon sorcerers has done mixing is

1:07:20

done by proximity sanner. Intro music is

1:07:22

done by the Mysteries Break Master Cylinder.

1:07:24

One time I went into a client's

1:07:26

data center to do some work on

1:07:28

their servers and I found a computer

1:07:30

that was so old it's Ip address

1:07:32

was one. The number

1:07:34

one. This is

1:07:36

Dark Net Diaries.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features