# ANOM

> supposedly encrypted communication service operated by law enforcement as part of a sting operation

**Wikidata**: [Q107177733](https://www.wikidata.org/wiki/Q107177733)  
**Source**: https://4ort.xyz/entity/anom

## Summary

ANOM was a supposedly encrypted mobile messaging application operated by the Federal Bureau of Investigation (FBI) as part of a global sting operation known as Operation Trojan Shield. Launched in October 2018, the app was deliberately marketed to criminals as a secure communication tool, but in reality allowed law enforcement to monitor communications and gather evidence leading to hundreds of arrests worldwide. The operation represented one of the largest coordinated law enforcement actions against encrypted criminal communications networks.

## Key Facts

- **Name:** ANOM (also stylized as AN0M, AN0̸M, ANØM, ΛNØM, アノム)
- **Operator:** Federal Bureau of Investigation (FBI)
- **Inception:** October 2018 (2018-10-00)
- **Website:** https://anom.io/ (English language)
- **Classification:** Instance of Trojan horse, messaging app, spyware, and mobile app
- **Used by:** Operation Trojan Shield (the broader international law enforcement operation)
- **Distinct from:** Operation Trojan Shield (ANOM was the app; Operation Trojan Shield was the overall operation)
- **Sitelink count:** 1
- **Commons category:** ANOM
- **Wikidata description:** "supposedly encrypted communication service operated by law enforcement as part of a sting operation"
- **Logo source:** https://commons.wikimedia.org/wiki/Special:FilePath/ANOM_Logo.svg
- **Screenshot sources:** https://commons.wikimedia.org/wiki/Special:FilePath/ANOM_Screenshot_-_2021-06-10_-_01.png and https://commons.wikimedia.org/wiki/Special:FilePath/AnomChat.jpg (preferred)

## FAQs

### Q: What was ANOM?

ANOM was a mobile messaging application that was marketed as an encrypted communication service for criminals but was secretly operated by the FBI as part of an international law enforcement sting operation. It functioned as a Trojan horse, appearing to offer secure communications while actually allowing law enforcement to access and monitor all messages, photos, and data transmitted through the app.

### Q: When was ANOM launched?

ANOM was launched in October 2018. The app was developed and operated by the FBI over several years, with the operation culminating in a coordinated global takedown in 2021.

### Q: How did ANOM differ from legitimate encrypted messaging apps?

Unlike legitimate encrypted messaging apps such as Signal, WhatsApp, or Telegram, ANOM was specifically designed and operated by law enforcement as a surveillance tool. While it presented itself as an encrypted platform for secure communications, it contained a backdoor that allowed the FBI to access, decrypt, and store all communications made through the service.

### Q: What was the relationship between ANOM and Operation Trojan Shield?

ANOM was the specific application used in Operation Trojan Shield. Operation Trojan Shield was the broader international law enforcement operation, while ANOM was the technological tool—the mobile app—that served as the centerpiece of the sting. The app and the operation are closely related but distinct: ANOM is the software entity, while Operation Trojan Shield refers to the coordinated law enforcement action.

### Q: What type of application was ANOM?

ANOM was classified as a mobile app, specifically functioning as a messaging app with encrypted communication features. It was also categorized as a Trojan horse (malware disguised as legitimate software) and spyware (software designed to spy on users). It was distributed as a mobile application for smartphones.

### Q: What were the aliases or alternate spellings of ANOM?

ANOM was known by several stylized variations including AN0M, AN0̸M, ANØM, ΛNØM, and the Japanese アノム. These variations were used in marketing materials and communications to create a distinctive brand identity among the criminal target audience.

## Why It Matters

ANOM represents a landmark case in modern law enforcement methodology and raises significant ethical questions about the use of deceptive surveillance techniques by government agencies. The operation demonstrated the FBI's ability to infiltrate criminal networks by exploiting the very tools criminals used to evade detection, resulting in hundreds of arrests across multiple countries and the seizure of drugs, weapons, cash, and other criminal assets.

The case has broader implications for privacy, security, and the boundaries of lawful surveillance. It highlights the ongoing cat-and-mouse game between law enforcement and criminal organizations regarding encrypted communications, and it has sparked debate about whether deceptive tactics by government agencies undermine public trust or set dangerous precedents for civil liberties.

From a technological standpoint, ANOM illustrated how mobile applications can be weaponized not just for legitimate purposes but as active tools in law enforcement operations. The app's ability to function as both a communication platform and a surveillance mechanism demonstrated the dual-use nature of mobile software and the responsibilities that come with developing and distributing such applications.

The operation also showed the international nature of modern crime and law enforcement cooperation. Operation Trojan Shield involved coordination among law enforcement agencies from numerous countries, making it one of the most extensive global sting operations in history.

## Notable For

- Being one of the largest and most sophisticated law enforcement sting operations involving a compromised mobile application
- Successfully infiltrating criminal networks that specifically sought encrypted communication tools to avoid surveillance
- Leading to hundreds of arrests worldwide and significant seizures of illegal goods and assets
- Demonstrating the FBI's capability to develop and operate sophisticated mobile surveillance tools
- Raising significant ethical and legal questions about government deception in surveillance operations
- Illustrating the vulnerabilities that arise when criminals place trust in seemingly secure communication tools

## Body

### Definition and Nature

ANOM was a mobile messaging application that was deliberately designed and operated by the Federal Bureau of Investigation as part of a covert sting operation. The app was marketed to criminal organizations as a secure, encrypted communication platform—a "go-to" app for those seeking to evade law enforcement surveillance. However, the app functioned as a Trojan horse, allowing the FBI to access, monitor, and store all communications transmitted through the platform.

The application's classification as a "Trojan horse" refers to its deceptive nature: like the mythological wooden horse used to infiltrate Troy, ANOM appeared to be a legitimate tool but contained hidden functionality that served the interests of its operators rather than its users. As a messaging app, it provided the expected functionality of sending text messages, photos, and other media. As spyware, it secretly transmitted user data to law enforcement servers.

### Branding and Identity

ANOM was marketed under several stylized variations of its name, including AN0M, AN0̸M, ANØM, ΛNØM, and the Japanese アノム. These variations were likely used to create a distinctive brand identity and to appeal to the criminal demographic that was the app's target audience. The branding suggested a modern, tech-savvy operation that understood the needs of users seeking secure communications.

The app maintained a web presence through its official website at https://anom.io/, which was available in English. This website served as the primary point of contact for potential users and provided information about the application's features and security claims.

### Operational History

The operation began in October 2018 (2018-10-00), when the FBI launched ANOM and began strategically introducing it to criminal networks. The app was promoted through word-of-mouth within criminal circles, with existing users encouraging associates to join the platform based on its purported security features.

Over the course of approximately two and a half years, the app gained significant traction within criminal communities, eventually attracting thousands of users worldwide. Law enforcement agencies from multiple countries coordinated their efforts, monitoring communications and building cases against suspected criminals.

The operation culminated in a coordinated global takedown, during which law enforcement executed numerous arrests and seized evidence. The timing of the public revelation marked the end of the covert operation, exposing ANOM's true nature to its users and the public.

### Relationship to Operation Trojan Shield

ANOM was the central technological component of Operation Trojan Shield. While ANOM refers specifically to the mobile application itself, Operation Trojan Shield encompasses the broader international law enforcement initiative that utilized the app. The two entities are distinct but inseparable: Operation Trojan Shield was the name given to the coordinated effort, while ANOM was the tool that made the operation possible.

This distinction is important for understanding the full scope of the operation. Operation Trojan Shield involved law enforcement agencies from numerous countries working together, while ANOM was developed and operated primarily by the FBI. The app served as the honeypot that attracted criminal users, and the operation leveraged the intelligence gathered through the app to pursue enforcement actions.

### Technical Classification

From a technical and categorical standpoint, ANOM was classified as multiple types of software:

- **Mobile app:** ANOM was distributed as a mobile application designed to run on smartphones, fitting the broader category of mobile software
- **Messaging app:** The core functionality of ANOM was to provide messaging capabilities, allowing users to send text and media communications
- **Trojan horse:** In cybersecurity terminology, a Trojan horse refers to malware that disguises itself as legitimate software while performing malicious or unauthorized functions; ANOM fit this definition by presenting itself as a secure communication tool while actually serving law enforcement surveillance purposes
- **Spyware:** Software designed to gather information about users without their knowledge; ANOM transmitted user communications and data to law enforcement, qualifying it as spyware

### Visual Documentation

ANOM was documented visually through several media files:

- **Logo:** The official ANOM logo is preserved at https://commons.wikimedia.org/wiki/Special:FilePath/ANOM_Logo.svg
- **Screenshots:** Two screenshots document the application's interface: one at https://commons.wikimedia.org/wiki/Special:FilePath/ANOM_Screenshot_-_2021-06-10_-_01.png and a preferred image at https://commons.wikimedia.org/wiki/Special:FilePath/AnomChat.jpg

These visual materials provide documentation of the application's appearance and user interface during its operational period.

### Wikimedia Commons and Documentation

The entity has a dedicated Commons category under "ANOM," which serves as a repository for media files related to the application. The Wikipedia coverage is limited to the Commons language version, indicating that while the topic has been documented on Wikimedia platforms, it has not yet received dedicated Wikipedia articles in standard language editions.

The sitelink count of 1 indicates limited cross-wiki linking, with the primary documentation existing on Wikimedia Commons rather than across multiple Wikipedia language editions.

### Significance and Legacy

ANOM stands as a significant case study in the evolution of law enforcement techniques in the digital age. It demonstrated both the opportunities and challenges facing modern investigative agencies: the ability to leverage technology to infiltrate criminal networks, but also the ethical complexities and potential civil liberties concerns raised by such operations.

The operation resulted in substantial law enforcement successes, including numerous arrests and the disruption of criminal activities. However, it also sparked discussions about the boundaries of acceptable surveillance techniques and the potential for such methods to be abused or to erode trust in government institutions.

From a cybersecurity perspective, ANOM highlighted the vulnerabilities that arise when users place trust in communication tools, particularly those that claim to offer enhanced security. It served as a reminder that "encrypted" does not necessarily mean "secure" and that users should exercise caution when selecting communication platforms, especially for sensitive communications.