Operation Trojan Shield | |
---|---|
Part of Operation Ironside | |
Operation Name | Operation Trojan Shield |
part of | Operation Ironside |
Roster | |
Planned by | U.S. Federal Bureau of Investigation, Europol, Australian Federal Police, and others |
Executed by | United States, Australia, Europol+ |
Countries Participated | Sweden, United States, Australia, United Kingdom, New Zealand, Germany, Netherlands, |
# of Countries Participated | 16 |
Mission | |
Target | organized criminal networks that use encrypted communication devices |
Objective | Surveillance of criminal activity |
Method | Honeypot communication device with security backdoor |
Timeline | |
Date begin | 2018 |
Date end | 2021 |
Date executed |
|
Results | |
Suspects | Germany:150 |
Arrests | 1,119+
|
Miscellaneous Results |
|
Accounting |
The ANOM (also stylized as AN0M or ΛNØM) sting operation (known as Operation Trojan Shield (stylized TRØJAN SHIELD) or Operation Ironside) is a collaboration by law enforcement agencies from several countries, running between 2018 and 2021, that intercepted millions of messages sent through the supposedly secure smartphone-based proprietary messaging app ANOM. The ANOM service was widely used by criminals, but instead of providing secure communication, it was actually a trojan horse covertly distributed by the United States Federal Bureau of Investigation (FBI) and the Australian Federal Police (AFP), enabling them to monitor all communications. Through collaboration with other law enforcement agencies worldwide, the operation resulted in the arrest of over 800 suspects allegedly involved in criminal activity, in 16 countries. Among the arrested people were alleged members of Australian-based Italian mafia, Albanian organised crime, outlaw motorcycle clubs, drug syndicates and other organised crime groups.
© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search