Recent claims regarding Canada’s involvement in a project named ‘Operation Atlantic’ aimed at combating cryptocurrency phishing scams have yet to receive official confirmation. A review of public records, including those from INTERPOL, relevant Canadian law enforcement agencies, and the social platform Telegram, has found no publicly available information to substantiate the existence of this operation or its name.
The claims suggest that Canada has jointly launched a special initiative called ‘Operation Atlantic’ to curb cryptocurrency phishing schemes, placing Telegram within the framework of this operation. However, existing public materials do not provide any specific action reports, and embedded research content has failed to uncover official documents or traceable law enforcement records supporting these details.
Key Points Summary
For readers, the core question is not the existence of phishing itself (which is well-documented), but the authenticity and traceability of this specific ‘Operation Atlantic’ report. Based on the available materials, the answer is negative.
Statement Content and Missing Elements

The reported claims indicate that Canada has joined ‘Operation Atlantic’ and mention Telegram, aiming to prevent cryptocurrency phishing scams. Such phrasing implies a formal operation, a public report, and traceable law enforcement records. However, these elements are absent in the current research. Neither official notifications from the Canadian government, announcements from the Royal Canadian Mounted Police (RCMP), updates from the Canadian Anti-Fraud Centre, consultations from the Cyber Security Centre, nor statements from INTERPOL or Telegram mention the name ‘Operation Atlantic’ or confirm Canada’s participation.
Distinguishing this point is crucial, as some imprecise rewrites may repeatedly mention the operation’s name without specifying the issuing agency, publication date, or jurisdiction. In this case, the lack of a clearly named official report is the core issue, rather than a simple absence of information sources.
Confirmed Law Enforcement Action Points to ‘Operation Synergia II’, Not ‘Operation Atlantic’
In the existing official records, the most compelling anti-phishing information comes from a statement released by INTERPOL on November 5, 2024, regarding ‘Operation Synergia II’. INTERPOL stated that this operation took place from April 1 to August 31, 2024, primarily targeting phishing, information theft, and ransomware threats.
The statement also mentioned that law enforcement agencies from 95 member countries collaborated with private sector partners in this operation. During the operation, approximately 30,000 suspicious IP addresses were identified, over 22,000 malicious IP addresses or servers were removed, 59 servers were seized, and 41 arrests were made.

Neal Jetton, head of INTERPOL’s Cybercrime Division, succinctly captured the scale of the issue in a brief comment: “The global nature of cybercrime requires a global response.” This statement aptly describes the confirmed operation but does not validate the independent claims of ‘Operation Atlantic’.
The publicly available statement on ‘Operation Synergia II’ is detailed enough to serve as a reference benchmark. It showcases the model of confirmed cross-border cybercrime operations: including dates, targets, jurisdiction, removal quantities, seized items, and arrest numbers.
However, the statement does not mention Canada, nor does it reference Telegram, and it certainly does not describe any operation named ‘Operation Atlantic’.
Canada and Telegram Related to Fraud Prevention, but Not Evidence for This Statement
Although Canada and Telegram play significant roles in fraud prevention, this does not directly prove the authenticity of the ‘Operation Atlantic’ report. Previous evidence indicates that real fraudulent activities...

