Understand your needs
Improve our services
Deliver personalised content
Save your preferences
Analyse visitor interactions
Your consent is voluntary – you can always change you cookie settings here.
Police in the US and Australia used encryption backdoors in a fake “secure” messaging app, leading to hundreds of arrests. While many will argue that the ends justify the means, this operation has highlighted a growing debate around encryption services and law enforcement.
Jun 11, 2021 · 3 min read
In 2018 Australian police and the FBI came up with Operation Greenlight/Trojan Shield. In one of the largest global stings in modern history, more than 800 arrests were made worldwide. The successful operation was possible because of an encrypted messaging app with secretly installed backdoors.
US officials infiltrated the criminal world and distributed smartphones with a pre-installed encrypted communications app called AN0M. The app, developed by the FBI, had a backdoor that allowed Australian police to read the messages their targets were sending in real-time.
In total, 12,000 devices distributed among 300 criminal groups in more than 100 countries were monitored. During a huge worldwide operation, more than 800 arrests were made. The authorities confiscated 30 tons of drugs, millions of dollars in cash, various weapons, and numerous luxury cars.
The AN0M messaging app is essentially a honeypot – software that looks genuine but is secretly a trap designed to catch criminals in the act. Only in this case, it was used to gather the information that allowed authorities to carry out this massive operation.
Operation Greenlight highlights an ongoing argument between lawmakers and privacy-focused companies like NordVPN.
Authorities argue that they will be better equipped to keep the public safe if private companies give them backdoor access to encryption services, like VPNs or anonymous messengers. Along with many privacy advocates, we disagree, for two reasons:
However, Operation Greenlight did not involve these more questionable tactics. Police worked in a highly targeted fashion: instead of forcing backdoor access into apps used by the general public, they distributed smartphones with built-in backdoors directly to known criminals. This could be a step in the right direction.
Privacy and security are things we all want. Law-abiding citizens have a right to both, and can use many tools to protect their data and communications. Backdoors violate these rights.
Yes, wrongdoers use privacy tools and encrypted messengers. But the overwhelming majority of people who benefit from these services aren’t criminals.
Operation Greenlight proved that targeted attacks like these could be the compromise we’re looking for. They are effective for the police, and they don’t put the privacy and security of regular users at risk.
Whether or not this approach becomes the norm remains to be seen. However, we’ll continue to follow the debate, and to advocate for the privacy of the individual.
Want to read more like this?
Get the latest news and tips from NordVPN.