Part 2/10:
At the core of Operation Trojan Shield lies a deceptively simple tool: an encrypted phone. These specialized devices are often equipped with advanced privacy features and are popular among politicians, military personnel, and especially criminals, who prefer to keep their communications under wraps. Traditional consumer phones are modified to prioritize user privacy, creating a lucrative market for these devices, with some costing as much as $22,000 for a six-month subscription.