“Trojan Horse” application triggers global action against organized crime

At least 250 people around the world have been arrested in an international police operation that used “Trojan horse” technology to target drug dealers, mafia and other organized criminal organizations.

Australian police said on Tuesday that they undermined 21 murder conspiracies, seized 3.7 tons of drugs and secretly monitored encrypted communication platforms used by criminal gangs.

The FBI obtained access to the AN0M platform, enabling the Australian police to monitor more than 25 million pieces of information in real time. Australian and American investigators said at a joint press conference that these communications allegedly described in detail murder conspiracy, drug smuggling and other illegal activities. detailed Three years of police operations.

According to the police, 9,000 police officers participated in coordinated raids in multiple countries, with 224 arrests in Australia and 35 arrests in New Zealand. Details of police operations in Germany, the United States and other countries will be announced later on Tuesday.

Australian Prime Minister Scott Morrison said that this international operation marked a watershed in law enforcement.

He said: “As part of the global action, the Australian government has dealt a heavy blow to organized crime-not only in this country, but also in organized crime around the world.”

The police assassination operation marked the latest use of spyware and Trojan horse software by law enforcement authorities during the investigation of organized crime and criminal activities. Terrorist organization.

The AN0M application is installed on a mobile phone without any other functions. Mobile phones purchased on the black market cannot make calls or send emails. Australian police said in a statement that they can only send messages to another device with an organized crime app.

The police said that these devices spread organically and are becoming more and more popular among criminals. They are confident in the security of the application because the high-profile organized criminals guarantee its integrity.

Greg Barton, a counter-terrorism expert at Deakin University in Melbourne, said that deploying Trojan horse software on modified mobile phones is a brilliant example of using social engineering to combat organized crime.

He said: “The Australian police authorities and their police authorities around the world will have a deeper understanding of organized crime activities and disrupt their operations for a period of time.”

“These are important temporary victories in the endless cat-and-mouse battle with criminals.”

Source link

Recommended For You

About the Author: Agnes Zang