September 17th, 2024

Australian man charged over allegedly creating app for criminal underworld

The Australian Federal Police arrested Jay Je Yoon Jung for creating the 'Ghost' app used by organized crime for drug trafficking. Operation Kraken seized significant drugs, weapons, and cash, dismantling a major syndicate.

Read original articleLink Icon
Australian man charged over allegedly creating app for criminal underworld

The Australian Federal Police (AFP) conducted a series of dawn raids that led to the arrest of a 32-year-old man, Jay Je Yoon Jung, accused of creating an encrypted messaging app called 'Ghost' for criminal activities. This app was allegedly utilized by various organized crime groups, including Italian, Korean, and Middle Eastern syndicates, to facilitate drug trafficking and other illicit operations. The raids resulted in charges against dozens of individuals for offenses such as drug trafficking, conspiracy, and firearm-related crimes. The operation, named Operation Kraken, has reportedly dismantled a significant criminal syndicate that used the app to coordinate drug importations and even fabricate a false terrorism plot. The AFP seized substantial quantities of illicit drugs, weapons, and cash during the operation, which involved over 700 officers across four states. The investigation revealed that the app had been in use for several years, with the AFP gaining access to 125,000 messages exchanged on the platform. The case highlights the challenges law enforcement faces in combating organized crime using encrypted communication tools.

- Jay Je Yoon Jung, the alleged creator of the 'Ghost' app, has been arrested and charged.

- The AFP's Operation Kraken has dismantled a major crime syndicate involved in drug trafficking.

- The raids resulted in the seizure of 205kg of drugs, 25 weapons, and $1.2 million in cash.

- The 'Ghost' app was used by various organized crime groups for illicit activities.

- The investigation involved collaboration with international law enforcement agencies.

Link Icon 2 comments
By @dhx - 7 months
On the accused

* The article states the accused launched the app 9 years ago at the age of 23. The app previously had the domain ghostecc.com whose historical WHOIS records indicate creation on 2016-04-13, so the dates approximately line up.

* The accused was living with his parents in a property they seemingly purchased in 1996 (when the accused would have been 4 years old) and live in today. From business registration records associated with the property, the family appears to operate a commercial cleaning business as well as a more recently formed skip bin hire business.

The app

* ghostchat.net indicates access to the app was by invitation only (side-loaded and probably Android-only) and the article indicates there were 600+ users. The contact form on ghostchat.net to request access to the app places the USA, Canada, Croatia, Denmark, Finland, Ireland, Mexico, Netherlands, Spain, Sweden and the UK at the top of the list of countries to select in that order, then all other countries are listed alphabetically thereafter.

The technical method used by law enforcement

* "the [accused] man regularly pushing updates to devices with the encrypted app provided [the Australian Federal Police's Covert and Technical Team] with the opportunity they needed."

* "The technical solution created by the AFP used to infiltrate the app is world-first and is a process that couldn't be replicated in countries like Sweden where the app 'Ghost' is also used."

The legal method used by law enforcement

* The article hints that the powers granted in the Surveillance Legislation Amendment (Identify and Disrupt) (SLAID) Bill 2021[1] were possibly used. This legislation allows black bag operations[2] and remote exploitation against premises and computer systems related to the app, and would also critically compel anyone capable of assisting to do so in secret. The legislation also has provisions that almost certainly would be used on every occasion to ensure the methods used are not revealed in the court proceedings.[3] It's perhaps the admissibility of evidence and ability to suppress black bag operation methods that the article hints could be challenged in court for the first time. Although in this case there isn't a well resourced company defending the case and as such it's hard to see how much of a challenge would be presented. The latest government report on use of the SLAID powers[4] should be published in ~November 2024 and seemingly would include mention of the warrants issued in relation to this app. As the arrests just happened today, those results wouldn't be included in the annual report until ~November 2025.

Related discourse on encrypted chat apps

* Patrick Gray from the Risky Business podcast recently interviewed the head of ASIO, Mike Burgess, (also former head of ASD) about encrypted apps just a month ago[5], but the focus of questions was on Assistance and Access (AA) powers, not the separate SLAID powers. This interview provides the latest thinking on encrypted messaging apps in Australia and Patrick asked some pointed questions about how Australia plans to get access to apps such as Signal which are hosted offshore. Another relevant line of questioning for next time would be how SLAID and AA legislation would be of any assistance with apps such as Potato Chat or Ant Messenger which were ousted a few months ago as a preferred communication method for Chinese spies operating in Australia.[6] Patrick did raise the somewhat inevitable trajectory towards censorship and/or outlawing of apps that are out-of-reach of law enforcement, something which is currently being tested with TikTok and Section 230 in the USA.

* The Australian government just a few years ago seemingly conducted a large amount of business using apps such as Signal (preferred app of the prime minister's office)[7] and WhatsApp. Seemingly this use has or is continuing to be replaced with use of Microsoft Teams for internal communications[7], making it easier to now battle mainstream encrypted messaging apps.

References

[1] https://www.aph.gov.au/Parliamentary_Business/Bills_Legislat...

[2] https://en.wikipedia.org/wiki/Black_bag_operation

[3] Example of a likely similar request made in the US to Apple: https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...

[4] https://www.ag.gov.au/crime/publications/surveillance-device...

[5] https://risky.biz/mikeburgess/

[6] https://www.abc.net.au/news/2024-05-13/china-spy-secret-poli...

[7] https://www.pmc.gov.au/sites/default/files/foi-logs/foi-2023...