Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    November 18, 2024

    ANOM Sentencing

    A critical player in one of the world’s largest law enforcement sting operations has been sentenced to 63 months in prison.

    Osemah Elhassen, an Australian national residing in Colombia, admitted to participating in a global conspiracy to distribute hardened encrypted communication devices – called ANOM – to criminal organizations, facilitating large-scale drug trafficking and money laundering.

    This sentencing is a significant milestone in “Operation Trojan Shield,” a covert international law enforcement initiative that turned the tools of criminals against them.

    The Trojan Shield Sting

    The operation, spearheaded by the FBI, involved secretly infiltrating and intercepting an encrypted messaging platform known as ANOM. Marketed as a secure communications tool, ANOM became popular among criminal enterprises seeking to evade law enforcement. However, what its users didn’t know was that FBI had gained backdoor access to it.

    Over three years, law enforcement agencies intercepted more than 27 million messages between criminal operatives worldwide. These communications provided real-time insights into drug trafficking, arms deals, and other illicit activities, resulting in the arrests of hundreds of individuals globally when the platform was dismantled in June 2021.

    Operation Trojan Shield, ANOM,
    ANOM encrypted device’s usage worldwide. (Source: FBI)

    Elhassen’s Role in the ANOM Enterprise

    Elhassen, one of 17 defendants indicted in the U.S. for their involvement in the scheme, pleaded guilty in May 2024 to racketeering conspiracy. Court records detail how Elhassen acted as a key distributor of ANOM devices, targeting criminal syndicates operating across the globe. His actions facilitated the importation and distribution of at least 15 kilograms of cocaine and the laundering of proceeds from illegal activities.

    According to prosecutors, Elhassen joined the ANOM enterprise in November 2019. Operating out of Colombia, he actively participated in drug trafficking and money laundering while aiding the enterprise’s other illegal objectives, including obstruction of justice. His distribution of ANOM devices played a pivotal role in enabling criminal organizations to coordinate illicit activities securely—or so they thought.

    A Warning to Criminal Enterprises, But…

    Law enforcement officials have lauded Operation Trojan Shield as a game-changer in combating organized crime. “This case demonstrates that no criminal network is beyond the reach of international cooperation,” said federal prosecutors. By flipping encrypted communication tools into surveillance assets, law enforcement agencies dismantled numerous criminal enterprises that relied on the illusion of secure communications.

    The operation also shows the risks criminals face when placing blind trust in technology. Tools like ANOM, which were specifically designed to cater to illicit activities, ultimately became a liability for their users.

    The success of Operation Trojan Shield raises broader questions about the use of encryption in facilitating crime. While encryption remains a cornerstone of cybersecurity and data privacy, its misuse for illicit purposes complicates the debate over government backdoors and the extent of law enforcement’s reach into encrypted platforms.

    Critics argue that such operations could set a precedent for governments to exploit encryption technologies, potentially undermining the privacy and security of legitimate users. However, proponents contend that targeted operations like this demonstrate the effectiveness of using innovative methods to tackle organized crime without compromising broader encryption standards.

    Elhassen’s sentencing sends a clear message to those who profit from enabling criminal enterprises. By participating in the ANOM enterprise, he not only facilitated drug trafficking but also helped perpetuate an ecosystem of crime that endangered communities worldwide.

    While the dismantling of ANOM and the sentencing of its facilitators represent significant victories for law enforcement, the battle against encrypted criminal networks is far from over. As technology evolves, so do the tactics of criminal enterprises. The challenge for law enforcement will be to stay one step ahead, ensuring that the tools designed to protect privacy are not weaponized for harm.

    Also read: U.S. Extradites and Charges Alleged Phobos Ransomware Admin

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow Coinbase provides trustworthy financial experiences through real-time user clustering with Amazon Neptune
    Next Article T-Mobile Also Hit in China-linked Telecom Network Breaches

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4610 – WordPress WP-Members Membership Plugin Stored Cross-Site Scripting Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability

    Development

    Microsoft: April updates cause Windows Server auth issues

    Security

    Ransomware Group LockBit Claims Responsibility for Cannes Hospital Cyberattack

    Development

    Generate videos in Gemini and Whisk with Veo 2

    Artificial Intelligence

    Highlights

    News & Updates

    Microsoft just “leaked” an Xbox interface mock up which has Steam game integration

    March 20, 2025

    Microsoft’s Xbox app is undergoing rapid development ahead of its partner handheld “Kennan.” This might…

    CSS Carousels

    CSS Carousels

    April 9, 2025

    Like it or not, this open source AI definition take a giant step forward

    August 23, 2024

    CVE-2025-46737 – Cisco SEL Cross-Origin Resource Sharing (CORS) Vulnerability

    May 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.