Background on the “Market” for Encrypted Criminal Communications
In this section we discuss different providers of encrypted communications, differences between them, and patterns of entry and exit. This background is helpful when thinking about how Anom fits into possible product markets.
Criminals have always been interested in secure communications, and enforcers have always been interested in accessing those communications. With the widespread adoption of smartphones in the early 2000s, many criminals began using encrypted messaging services such as BlackBerry Messenger that were provided by consumer-facing enterprises. Some used these services on standard handsets, relying on the app on the handset being encrypted and the app provider being unwilling to work with law enforcement. Others went a step further and used modified handsets that contained additional security measures.
Firms with integrated hardware and software solutions have entered (and exited) the broader encrypted communications space on a regular basis, as have app-only firms. Over the past decade, a number of firms focused on selling dedicated hardware and software solutions to transnational criminal enterprises. Those firms included Phantom Secure, Encrochat, Ennetcom, MPC, beStealth, Ciphr, Sky ECC, No. 1 BC, and Anom, among others. This is the group of competitors that Dark Wire, and the FBI and its international counterparts focused on.
In reviewing these products’ history, Dark Wire tells a story of quick substitution of communication methods in the world of transnational crime. For example, in 2016, Netherlands police announced that they had obtained traffic from the Danish encrypted handset company Ennetcom, which was then shut down. At the time, Ennetcom was reported to have around 19,000 users. One group of criminal users in Scotland then vertically integrated, forming their own company, MPC, which subsequently began offering service to others. The pattern of one encrypted device’s death precipitating the growth of others is a theme throughout Dark Wire. As of 2018, MPC in its turn was estimated to have around 5,000 users.
Other former Ennetcom customers went to a company called Phantom Secure, which sold modified BlackBerry smartphones that had the camera, microphone and GPS physically removed. Phantom Secure phones’ only local functionality was encrypted text messaging. The company also marketed the ability to remotely wipe users’ handsets as part of the sales pitch for the product.
The CEO of Phantom Secure was a citizen of Canada, where his company’s operations were legal. However, during a 2018 visit to Las Vegas, the FBI cornered him. He was kept in a hotel room for several days while the FBI sought to cut a deal for access to the Phantom Secure servers. The CEO escaped, however, shutting down the company’s servers while making a run for Canada. He was captured just short of the border because of his purchase and use of a prepaid “burner” phone—which, ironically, he expected to be secure—to contact executives of his company. More specifically, the FBI obtained the phone number of the burner phone when the CEO used it to contact other Phantom Secure executives. The FBI then followed the phone as it pinged cell towers on the way towards Canada. The CEO was captured just short of the border when he stopped to get lunch. Phantom Secure then shut its operations down permanently. Reports on its user base vary, but the FBI estimated Phantom Secure had around 20,000 users at the time.
The user estimates for Ennetcom, MPC and Phantom Secure are rather striking in that they are quite low when compared to mass-market encrypted communications apps like BlackBerry Messenger, Telegraph, WhatsApp or Signal, which had tens or hundreds of millions of users, of whom presumably the great majority are not engaged in criminal activity. For an antitrust practitioner, this raises the question of whether there are identifiable consumers that want specialty hardware/software solutions so much that they constitute an antitrust market? In other words, if Ennetcom, MPC and Phantom Secure had merged, could they have raised prices by a small but significant amount without precipitating an unprofitable shift of use to BlackBerry Messenger, Telegraph and other mass-market commercial options?
Although police and federal law enforcement agencies like the FBI do not normally concern themselves with hypothetical monopolist tests, this was nonetheless an important question for law enforcement. When they breached, or shut down, one encrypted phone company, what competitive alternative did criminal users have, and could law enforcement follow them to their new communications solution? Or, even better, could the FBI and law enforcement get ahead of the problem and offer criminals a place to go that law enforcement already controlled?
For this strategy to truly succeed, there would have to be significant substitution between the products, i.e., the FBI-controlled product would be the closest substitute for the soon-to-be-shut-down products, thus shutting down rivals would move the great majority of criminal traffic onto an FBI-controlled network. From the perspective of an antitrust economist, this can be seen as a hope that there was an antitrust market for dedicated devices enabling encrypted communications, which the FBI wanted to monopolize. Of course, any amount of diversion would still mean criminals whose communications the FBI would have complete access to, but, all else equal, the more criminals diverted the better.
A Story of Market Entry: FBI Development of Anom
After the failure to flip the Phantom Secure CEO, the FBI was approached later in 2018 by an app developer with an audacious plan. This developer had been getting ready to launch his own encrypted phone service. Concerned about his legal exposure if he proceeded, he proposed that instead the FBI develop, launch and manage the product. Doing so involved significant legal questions, but the FBI resolved those questions to its satisfaction. In brief, the FBI worked out an arrangement where data gathered abroad during the operation would go to the law enforcement agency of a third party country, which would—in most cases—then provide the data to the FBI. The sting was on. The product would be called Anom.
The FBI was deliberately trying to develop a product that would attract criminals—and only criminals. Furthermore, the FBI needed a product and feature set that its consumers would think was functioning in the way intended and doing well enough to be an attractive product to criminals, but not to non-criminal consumers, but was also actually doing the opposite of what was claimed in terms of security and data privacy without that deception being easily detectable. As one FBI agent noted, “[n]o one would actually use Anom if it were an inferior product.” The product itself consisted of two parts: 1) an Android device running a customized operating system, and 2) the encrypted messaging app itself, called Anom.
On the software side, the FBI began with a well-regarded open source security-oriented operating system called GrapheneOS. They modified it into their own operating system called ArcaneOS. This was installed onto Android phones. Although GPS was not physically disabled as in Phantom Secure’s phones, Anom marketed that its ArcaneOS shut off GPS. That was not true. In fact, not only was an Anom phone’s GPS not shut off, but the Anom app automatically attached precise latitude and longitude to every message before transmitting it to law enforcement. Anom also marketed that its servers were located outside of the EU and the Five Eyes alliance countries (US, UK, Australia, NZ, Canada), thus making it more difficult for enforcers to access them. Of course, the servers were in fact controlled (indirectly) by the FBI. And it appears that at least some of the servers were, in fact, located in Five Eyes alliance countries.
Handset production was originally done at a single facility under the FBI’s control in Hong Kong, using inexpensive or refurbished phones. Later, as production ramped up, literal black boxes were used to install the operating system and the Anom app. As discussed later, the tools of production were eventually stolen and then cloned by distributors during fights among distributors for control of particular geographic markets.
The Anom messaging app itself had a variety of functions. To begin with, the app was hidden behind what looked like a calculator. You typed a passcode into the calculator and the messaging app would come up. Other (claimed) functionality was added over time based on requests from customers, sometimes copying popular features from apps like WhatsApp.
Raising Rivals’ Costs and Attempted Monopolization
Setting up Anom was an achievement in and of itself. The FBI and its partners lacked experience running an encrypted phone business (or, really, any start-up). Once established, Anom pursued an objective just like a rational profit-seeking firm would; it was just that Anom sought to maximize information acquisition from a particular group of customers—criminals—as opposed to profits.
To do this, the FBI needed to compete “on the merits” by offering a product that at least was perceived as delivering higher value than its competitors. Unlike firms operating in aboveboard markets, the FBI could help Anom succeed by degrading or destroying its competitors—“raising rivals’ costs.” The FBI had tools available to destroy or degrade its competitors that went well beyond what antitrust economists might normally see. That is, the FBI and its various international law enforcement allies could potentially speed adoption of Anom by diminishing the quality, or even viability, of competitors by directly expropriating their assets and imprisoning their executives. As noted in Dark Wire: “[W]hat if law enforcement knocked out Anom’s competition in the secure phone industry? If the FBI closed down Sky [another encrypted phone service] entirely, like it had with Phantom Secure, those customers wouldn’t just call it quits and go home. They would find a new provider. Lying in wait to happily take on those clients would be Anom.”
Two of the larger encrypted phone providers that competed with Anom were Sky and Encrochat. Both were shut down by enforcers while Anom was operating, providing natural experiments as to diversion rates.
According to Europol, “EncroChat phones were presented to customers as guaranteeing perfect anonymity (no device or SIM card association on the customer’s account, acquisition under conditions guaranteeing the absence of traceability) and perfect discretion both of the encrypted interface (dual operating system, the encrypted interface being hidden so as not to be detectable) and the terminal itself (removal of the camera, microphone, GPS and USB port).” EncroChat sold its 1000€ phones internationally, and offered subscriptions and 24/7 support. Unfortunately for EncroChat users, the French police had taken over an Encrochat server in France and used it to push malware onto Encrochat phones. As explained in Dark Wire, “Encrochat users felt something was wrong but couldn’t put their finger on what. In pockets of Europe, the police pulled gang members off the street. The cops seems to be everywhere the criminals turned. . . . [Users] complained to Encrochat, who started to investigate.”
EncroChat obtained one of the impacted phones in June 2020 and discovered the French police’s malware. EncroChat pushed an update to customers’ phones within 48 hours, but ultimately closed itself down the same month. At that time, EncroChat had about 60,000 users.
Like EncroChat, Sky ECC “bill[ed] itself as the ‘most secure messaging platform you can buy’ and [was] so confident of the impregnability of its systems that it offer[ed] a handsome reward for anyone who [could] break the encryption of one of its phones.” It offered a feature set similar to Anom’s claimed feature set, including self-destructing messages, group chat, ability to hide the app as a calculator, and a secure vault for on-phone storage. Sky ECC ensured that, on the handsets it provided, all apps were blocked except its own app, and the handset could only be used to communicate with other Sky ECC phones. One additional feature was that if the phone was not accessed properly in a certain period of time, the phone would erase itself.
Notwithstanding Sky’s promises of impregnability, European enforcers ultimately were able to access communications for some, but not all, Sky ECC users—about 70,000 of them. This became public in February 2021, and Sky ECC shut its servers down shortly thereafter. Sky ECC had about 170,000 users worldwide.
The sudden endings of EncroChat and Sky ECC provide natural experiments as to diversion and market definition. Data are sparse, but the results may be surprising, depending on whether one shares the FBI’s priors about (criminal) consumer preferences.
When discussing the ending of EncroChat and Sky ECC, it is important to know that Anom itself was shut down in June 2021—a voluntary decision by enforcers, but one driven by legal considerations (e.g., the Lithuanian court order providing for transfer of the traffic to the FBI was expiring in June), as well as increasing suspicions and revelations about Anom’s covert activities. Here is a brief timeline: