EncroChat
{{short description|Communications network and service provider}}
{{Lead too short|date=January 2023}}
{{Use dmy dates|date=July 2020}}
{{Infobox company
| name = EncroChat
| logo = EncroChat logo.png
| logo_caption =
| image_caption =
| type =
| founded = 2016
| founder =
| hq_location_city =
| hq_location_country =
| area_served = Worldwide
| key_people =
| industry = Computer software
| products =
| revenue =
| operating_income =
| net_income =
| assets =
| equity =
| num_employees =
| parent =
| subsid =
| website =
}}
EncroChat was a Europe-based communications network and service provider that offered modified smartphones allowing encrypted communication among subscribers. It was used primarily by organized crime members to plan criminal activities. Police infiltrated the network between at least March and June 2020 during a Europe-wide investigation. An unidentified source associated with EncroChat announced on the night of 12–13 June 2020 that the company would cease operations because of the police operation.{{Cite news |last=Wright |first=Robert |date=2 July 2020 |title=Hundreds arrested across Europe as French police crack encrypted network |work=The Financial Times |url=https://www.ft.com/content/7006913f-be3d-49b5-8ba7-7c5b78b551b2 }}
The service had around 60,000 subscribers at the time of its closure.{{Cite news |author= |date=7 July 2020 |title=Six arrested after 'Dutch torture chambers' found |work=BBC News |url=https://www.bbc.com/news/world-europe-53325388}}{{Cite news |last=Kennedy |first=Rachael |date=2 July 2020 |title=EU authorities penetrate phone network in huge organised crime sting |work=Euronews |url=https://www.euronews.com/2020/07/02/encrochat-european-authorities-compromise-phone-network-to-arrest-untouchable-criminals-in}} In the UK the National Crime Agency led an operation resulting in over 2,600 arrests and 1,384 criminal charges. {{cite journal |last1=Griffith |first1= Cerian|last2=Jackson |first2=Adam |date=2024 |title=Digital Evidence, Police Investigations, and Lesson Learned from EncroChat |url= |journal=CrimLR |volume= |issue=7 |pages=436–457 |doi= |access-date=}}
Background
- https://www.malwarebytes.com/blog/news/2020/07/encrochat-system-eavesdropped-on-by-law-enforcement
- https://kamransolicitors.co.uk/encrochat/
handsets emerged in 2016 as a replacement for a previously disabled end-to-end encrypted service.{{Cite news |last=Evans |first=Martin |date=2 July 2020 |title=Hundreds of gangsters arrested as police crack criminals' private messaging network |work=The Daily Telegraph |url=https://www.telegraph.co.uk/news/2020/07/02/hundreds-kingpin-gangsters-arrested-police-crack-encrypted-messaging}} The company had revealed on 31 December 2015 the Version 115 of EncroChat OS, which appears to be the first public release of their operating system.{{Cite news |title=New Release of EncroChat OS|date=31 December 2015 |publisher=Encrochat News |url=http://www.encrochat.network:80/news |website=EncroChat.network |archive-url=https://web.archive.org/web/20160107072512/http://www.encrochat.network/news |archive-date=7 January 2016 }} The earliest version of the company's website archived by the Wayback Machine dates to 23 September 2015.{{Cite web |date=23 September 2015 |title=EncroChat proudly releases the new standard for privacy |url=http://www.encrochat.network/ |website=EncroChat.network|archive-url=https://web.archive.org/web/20150923111438/http://www.encrochat.network/ |archive-date=23 September 2015 }}
According to a May 2019 report by the Gloucester Citizen, EncroChat was originally developed for "celebrities who feared their phone conversations were being hacked".{{Cite news |last=Hughes |first=Janet |date=21 May 2019 |title=The £3,000 a year encrypted mobiles with kill pills used by gangs |work=Gloucester Citizen |url=https://www.gloucestershirelive.co.uk/news/gloucester-news/3000-year-encrypted-mobile-phones-2883942}} In the 2015 murder of English mobster Paul Massey, the killers used a similar service providing encrypted BlackBerry phones based on PGP. After the Dutch and Canadian police compromised their server in 2016, EncroChat turned into a popular alternative among criminals for its security-oriented services in 2017–2018.{{Cite news |last=Hamilton |first=Fiona |date=3 July 2020 |title=Encrochat breach will make criminals wary |work=The Times |url=https://www.thetimes.com/uk/article/encrochat-breach-will-make-criminals-wary-3mzm3wc3q |issn=0140-0460}}{{Cite web |last=Scheerhout |first=John |date=9 July 2020 |title=The 'secret server' used in killing of John Kinsella and what it says about guns |url=https://www.manchestereveningnews.co.uk/news/greater-manchester-news/secret-server-used-killing-john-18563462|website=Manchester Evening News}}
The founders and owners of EncroChat are not known. According to Dutch journalist Jan Meeus, a Dutch organized crime gang was involved and financed the developers.{{cite web |url=https://www.spiegel.de/panorama/justiz/spiegel-tv-vom-15-03-2021-entschluesselt-das-geheime-tagebuch-der-organisierten-kriminalitaet-a-763ec429-299b-432d-8a85-61de9fa384de |title=Entschlüsselt: Das geheime Tagebuch der Organisierten Kriminalität |language=de |trans-title=Decrypted: The secret diary of organized crime |type=video |work=Der Spiegel |date=2021-03-15 |access-date=2022-05-14}}
Through a marketing strategy of "relentless online advertising",{{Cite news|last=Cook|first=James|date=2 July 2020|title=How EncroChat became the go-to messaging service for gangsters|work=The Daily Telegraph|url=https://www.telegraph.co.uk/technology/2020/07/02/encrochat-became-go-to-messaging-service-gangsters}} EncroChat rapidly expanded during its four and a half years of existence, benefiting from the closure of its competitors Amsterdam-based PGP Safe (customised BlackBerry)
- https://www.vice.com/en/article/4xknyq/dutch-cops-bust-another-pgp-blackberry-company-for-alleged-money-laundering
- https://blog.cyberwar.nl/2017/05/new-arrests-in-the-netherlands-for-providing-crypto-phones-to-the-underworld/
- https://srslyriskybiz.substack.com/p/crimephones-are-a-cops-best-friend
- https://research.tudelft.nl/files/149820190/s40163_023_00185_4.pdf
- https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-023-00185-4
and Ennetcom.{{Cite news |author= |date=3 July 2020 |title=Cinq questions sur EncroChat, ce réseau de téléphonie chiffrée, utilisé par le crime organisé, et démantelé par la police |language=fr |trans-title=Five questions about EncroChat, this encrypted telephone network, used by organized crime and dismantled by the police |work=France Info |url=https://www.francetvinfo.fr/societe/drogue/cinq-questions-sur-encrochat-ce-reseau-de-telephonie-chiffree-utilise-par-le-crime-organise-et-demantele-par-la-police_4032505.html}} The network eventually reached an estimated 60,000 total subscribers at the time of its closure in June 2020. According to the French National Gendarmerie, 90 percent of subscribers were criminals, and the British National Crime Agency (NCA) said it found no evidence of non-criminals using it.
EncroChat first came to the attention of the media when it was revealed that high-profile criminals Mark Fellows and Steven Boyle had been using the encrypted devices to communicate during the May 2018 gangland murder of John Kinsella in Rainhill, England.{{Cite news |last= |date=26 November 2018 |title=Underworld duo 'murdered in gangland feud' |work=BBC News |url=https://www.bbc.com/news/uk-england-46349187}}{{Cite news |last=Hamilton |first=Fiona |date=2 July 2020 |title=Hundreds of arrests as police crack phone network used by crime bosses |work=The Times |url=https://www.thetimes.com/uk/crime/article/hundreds-of-arrests-as-police-crack-phone-network-used-by-crime-bosses-h85qntqw3|issn=0140-0460 |quote=His trial was told the hits were co-ordinated using Encrochat on a device which cost £1,500 for a six-month contract and was sold on websites visited by those engaged in crime.}} The service resurfaced in the media during the summer of 2020 after law enforcement announced that they had infiltrated the encrypted network and investigative journalist Joseph Cox, who had been reviewing EncroChat for months, published an exposé in Vice Motherboard.
Functionality and services
{{Infobox OS
| name = EncroChat OS
| title = EncroChat OS
| screenshot = File:EncroChatHomeScreen.png
| screenshot_size = 100px
| caption = Homescreen of EncroChat OS
| developer = EncroChat
| working state = Discontinued
| source model = Based on open source Android
| released = {{Start date and age|2015|12|31|df=yes}}
| latest release version =
| latest release date =
| language =
| supported platforms = BQ Aquaris X2
- https://www.gsmarena.com/bq_aquaris_x2-9198.php
- https://imei24.com/description/BQ/Aquaris_X2/
- https://www.notebookcheck.net/BQ-Aquaris-X2-Smartphone-Review.318256.0.html
and others
| license =
}}
The EncroChat service was available for handsets called "carbon units",Andy Killoran [https://archive.today/20240518084431/https://andy-killoran.medium.com/hundreds-face-justice-following-encrypted-system-hack-9afdff689a24Hundreds Face Justice Following Encrypted System Hack] medium.com whose GPS, camera and microphone functions were disabled by the company for privacy reasons. Devices were sold with pre-installed applications, including EncroChat, an OTR-based messaging app which routed conversations through a central server based in France, EncroTalk, a ZRTP-based voice call service, and EncroNotes, which allowed users to write encrypted private notes.{{Cite news |last=Kallenborn |first=Gilbert |date=3 July 2020 |title=Comment les gendarmes ont siphonné EncroChat, la messagerie chiffrée des criminels |language=fr |trans-title=How gendarmes siphoned off EncroChat, the encrypted messaging service of criminals |work=01net |url=https://www.01net.com/actualites/comment-les-gendarmes-ont-siphonne-encrochat-la-messagerie-chiffree-des-criminels-1942589.html}} They generally used modified Android devices, with some models based on the BQ Aquaris X2 phone hardware, others on Samsung devices, and sometimes on non-Android BlackBerry mobile phones.
Devices with EncroChat were able to boot in two modes. When only the power button was pressed to turn the handset on, they booted into a dummy Android home screen. But when the handset was switched on by pressing the power button together with the volume button, the phone booted to a secret, encrypted partition which facilitated secret communication via EncroChat's French servers. A "panic button" feature was available, where a certain PIN inputted to the device via the unlock screen would erase all data on the phone.{{Cite news |last=Corfield |first=Gareth |date=2 July 2020 |title=Euro police forces infiltrated encrypted phone biz – and now 'criminal' EncroChat users are being rounded up |work=The Register |url=https://www.theregister.com/2020/07/02/encrochat_op_venetic_encrypted_phone_arrests}} According to journalist Jurre van Bergen, the IP of EncroChat's server points to French web hosting company OVH. EncroChat's SIM provider was the Dutch telecommunications firm KPN.
EncroChat devices were particularly popular in Europe, although they were also sold in the Middle East and elsewhere in the world. One source told Vice Motherboard that they became the "industry standard" among criminals. They were reported in July 2020 to cost €1,000 (£900) each, then €1,500 (£1,350) for a six-month contract to use EncroChat's service.{{Cite news |last=Shaw |first=Danny |date=2 July 2020 |title=Hundreds arrested as crime chat network cracked |work=BBC News |url=https://www.bbc.com/news/uk-53263310}} EncroChat's website says that the firm had resellers in Amsterdam, Rotterdam, Madrid and Dubai, although Cox describes EncroChat as a "highly secretive" firm which "does not operate like a normal technology company". The phones were reportedly bought via a physical transaction which "looked like a drug deal", and at least one case involves an ex-military operative selling devices in Northern Ireland.{{Cite news |last=Barnes |first=Ciaran |date=29 June 2020 |title=King con ex-soldier Johnny Swales 'sold encoded phones to crime gangs' |work=Belfast Telegraph |url=https://www.belfasttelegraph.co.uk/sunday-life/news/king-con-ex-soldier-johnny-swales-sold-encoded-phones-to-crime-gangs-39320873.html |issn=0307-1235}}
Infiltration
The EncroChat encrypted messaging service and the related customized phones were discovered by France's National Gendarmerie in 2017 when conducting operations against organized crime gangs.{{Cite news |last=Staff |date=2 July 2020 |title=EncroChat: What it is, who was running it, and how did criminals get their encrypted phones? |work=Sky News |url=https://news.sky.com/story/encrochat-what-it-is-who-was-running-it-and-how-did-criminals-get-their-encrypted-phones-12019678}} At the time of the Fellows and Boyle trial in December 2018, the NCA struggled to crack the lock screen passcode, as anything was wiped out after a set number of attempts.
The investigation accelerated in early 2019 after receiving EU funding. At the end of January 2020, a judge in Lille, France, authorized the infiltration of the EncroChat servers.{{cite AV media|url=https://www.spiegel.de/panorama/justiz/organisierte-kriminalitaet-so-knacken-ermittler-die-geheimen-chats-spiegel-tv-a-5f011187-2268-44cf-b154-003efbe070c7 |language=German|title=Wie Ermittler die geheimen Chats von Waffen- und Drogenhändlern knacken |publisher=Spiegel-TV-Doku |date=2021-07-06 |access-date=2022-05-14}} Intelligence and technical collaboration between the NCA, the National Gendarmerie and Dutch police culminated in gaining access to messages after the National Gendarmerie put a "technical tool" on EncroChat's servers in France.{{Cite news |last=Cox |first=Joseph |date=2 July 2020 |title=How Police Secretly Took Over a Global Phone Network for Organised Crime |work=Vice Motherboard |url=https://www.vice.com/en_uk/article/3aza95/how-police-secretly-took-over-a-global-phone-network-for-organised-crime}} The malware allowed them to read messages before they were sent and record lock screen passwords. Messages could be read by law enforcement beginning in April. EncroChat estimated that around 50 percent of devices in Europe were affected in June 2020.
The National Gendarmerie formed a special unit to investigate the hacked information on 15 March 2020, then signed an agreement with the Dutch Police to form a joint investigation team (JIT) on 10 April, co-operating through Eurojust with the support of Europol. The data was distributed by the JIT to other European partners, including the UK, Sweden and Norway. The NCA began to receive information about the content of messages on 1 April 2020, then started to build data analysis technology to automatically "identify and locate offenders by analysing millions of messages and hundreds of thousands of images". The chief of the Dutch National Police Force, {{ill|Jannine van den Berg|nl}}, compared the malware to "sitting at the table where criminals were chatting among themselves". In May 2020, the wipe feature was disabled at distance by law enforcement in some units. The company initially tried to push an update in response to what was initially regarded as a bug, but the devices were struck again by malware altering lock screen passwords.
On the night of 12–13 June 2020, once EncroChat suspected the infiltration by law enforcement had occurred, users received a secret message:
{{blockquote|Today, we had our domain seized illegally by government entities(s). They repurposed our domain to launch an attack to compromise the carbon units. ... Due to the level of sophistication of the attack and the malware code, we can no longer guarantee the security of your device. ... You are advises [sic] to power off and physically dispose your device immediately.}}
A few days later, an "email address long associated with EncroChat" informed Vice Motherboard that the service was shutting down permanently "following several attacks carried out by a foreign organization that seems to originate in the UK"; Cox publicly disclosed excerpts of the email on 22 June.{{Cite news |last=Cox |first=Joseph |date=22 June 2020 |title=Encrypted Phone Network Says It's Shutting Down After Police Hack |work=Vice Motherboard |url=https://www.vice.com/en_uk/article/3aza95/how-police-secretly-took-over-a-global-phone-network-for-organised-crime}} Europol and the National Crime Agency refused to comment at the time. The identity of the persons in charge of EncroChat has not been revealed as of 3 July 2020.{{Cite news |last=Greig |first=Finlay |date=3 July 2020 |title=Encrochat: the top-secret network explained after the NCA helped hack phones of major crime figures and made arrests |work=Edinburgh News |url=https://www.edinburghnews.scotsman.com/news/crime/encrochat-top-secret-network-explained-after-nca-helped-hack-phones-major-crime-figures-and-made-arrests-2903507}}
Impact
= European joint investigation team, 2020 =
The Europol-supported JIT, code named Emma 95 in France and 26Lemont in the Netherlands, allowed the gathering in real time of millions of messages between suspects. Information was also shared with law enforcement in several countries that were not participating in the JIT, including the UK, Sweden and Norway.{{Cite news |last=Cox |first=Kate |date=2 July 2020 |title=Police infiltrate encrypted phones, arrest hundreds in organized crime bust |work=Ars Technica |url=https://arstechnica.com/tech-policy/2020/07/police-infiltrate-encrypted-phones-arrest-hundreds-in-organized-crime-bust}}{{Cite news |author= |date=2 July 2020 |title=Dismantling of an Encrypted Network Sends Shockwaves Through Organised Crime Groups Across Europe |work=Europol |url=https://www.europol.europa.eu/newsroom/news/dismantling-of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe}}
The Dutch police arrested more than 100 suspects and seized more than 8 tonnes of cocaine, around 1.2 tonnes of crystal methamphetamine, 19 synthetic drug laboratories, dozens of guns and luxury cars, and around €20 million in cash.{{Cite news |date=2020-07-07 |title=Dutch Police Arrest 6 Men, Uncover Makeshift Torture Chamber |language=en-US |work=The New York Times |agency=Associated Press |url=https://www.nytimes.com/aponline/2020/07/07/world/europe/ap-eu-netherlands-torture-chamber.html |url-status=dead |archive-url=https://web.archive.org/web/20200710074922/https://www.nytimes.com/aponline/2020/07/07/world/europe/ap-eu-netherlands-torture-chamber.html |archive-date=10 July 2020 |issn=0362-4331}} On 22 June 2020 in a property in Rotterdam, authorities found police uniforms, stolen vehicles, 25 firearms, and 25 kg (55 lb) of drugs in a different property. On 22 June 2020, the Dutch police also discovered a "torture chamber" in a warehouse near the town of {{ill|Wouwse Plantage|nl|Wouwse Plantage (plaats)}} about 7 km (5 miles) east of Bergen op Zoom. The facility, which was still under construction when discovered, consisted of seven cells made out of sound-proofed shipping containers; torture tools were found including a dentist's chair, hedge trimmers, scalpels and pliers. The place was nicknamed by criminals the "treatment room" or the "ebi", in reference to Extra Beveiligde Inrichting (EBI), a Dutch maximum security prison.{{Cite news |agency=Associated Press |date=2020-07-07 |title=Dutch arrests after discovery of 'torture chamber' in sea containers |language=en-GB |work=The Guardian |url=https://www.theguardian.com/world/2020/jul/07/dutch-police-arrest-six-men-after-discovery-of-torture-chamber|issn=0261-3077}}
EncroChat probes in Ireland left criminals scrambling for cover.{{Cite news |last1=Feehan |first1=Conor |last2=Schiller |first2=Robin |last3=Foy |first3=Ken |date=8 July 2020 |title=Daniel Kinahan's mother-in-law's funeral held in Dublin in absence of the self-exiled gang leader |work=Irish Independent |url=https://www.independent.ie/irish-news/daniel-kinahans-mother-in-laws-funeral-held-in-dublin-in-absence-of-the-self-exiled-gang-leader-39351432.html}} €1.1 million worth of cocaine was seized in an Amsterdam flat, and €5.5 million of cannabis in a trailer in County Wexford, both belonging to Irish gangs.{{Cite news |last=Daly |first=Max |date=8 July 2020 |title=What the EncroChat Busts Tell Us About Organised Crime in Europe |language=en |work=Vice News |url=https://www.vice.com/en_us/article/ep4b8m/encrochat-europe-organised-crime-busts-cocaine-guns}} Prominent Irish gang boss Daniel Kinahan was reported to have fled his "safe-haven" of Dubai on 9 July 2020.{{Cite news |last1=Foy |first1=Ken |last2=Feehan |first2=Conor |date=9 July 2020 |title=Gardai probe reports that hunted mob boss Kinahan has fled his safe-haven of Dubai |work=The Herald |url=https://www.herald.ie/news/gardai-probe-reports-that-hunted-mob-boss-kinahan-has-fled-his-safe-haven-of-dubai-39352213.html}}
Arrests were also made in Sweden. French authorities declined to disclose information publicly about the arrests in July 2020.
=European joint investigation against Ndrangheta, 2023=
{{Anchor|Operation Eureka}}
In May 2023, "Operation Eureka" led to arrests of 108 people suspected of being involved with 'Ndrangheta in Italy and more than 30 arrests in Germany after 4 years of investigations and having been able to crack EncroChat and SkyEcc.{{Cite news |date=2023-05-05 |title=More than 100 arrested in European anti-mafia raids |language=en |work=DW |url=https://www.dw.com/en/more-than-100-arrested-in-european-anti-mafia-raids/a-65497944 |access-date=2023-05-07}}
= United Kingdom =
{{Infobox law enforcement operation
|name = Operation Venetic
|codename =
|partof =
|image =
|image_upright =
|alt =
|caption =
|type =
|scope = multinational
|planned_by = France, United Kingdom
|initiated_by = France
|executed_by = National Crime Agency
|country_names = United Kingdom, France
|countries_number = 2
|objective = To deploy malicious code to the Encrochat devices, and eavesdrop on criminal communications.
|method = Network Intrusion Technique (NIT)
|target =
|date_begin =
|date_end =
|duration =
|date_executed =
|suspects_number =
|arrested_number = 3,100
|indictments_number =
|complaints_number =
|information_number =
|convictions_number = 1,240
|convictions_appealed =
|other_appeals_number =
|misc_results = Seized £54 million in cash, 751Kg (1655 lb) cocaine,
|initial_budget =
|final_cost =
}}
==== Operation Venetic ====
{{Infobox law enforcement operation
|name = Operation Eternal
|codename =
|partof =
|image =
|image_upright =
|alt =
|caption =
|type =
|scope = multinational
|planned_by = France, United Kingdom
|initiated_by = France
|executed_by = U.K. Metropolitan Police Service
|country_names = United Kingdom, France
|countries_number = 3
|objective =
|method =
|target =
|date_begin =
|date_end =
|duration =
|date_executed =
|suspects_number = 1,400
|arrested_number = 942
|indictments_number =
|complaints_number =
|information_number =
|convictions_number = 426
|convictions_appealed =
|other_appeals_number =
|misc_results = £19 Million Cash, 49 Firearms, 500 rounds of ammunition, 620kg (1400 lb) Class A drugs
|initial_budget =
|final_cost =
}}
Operation Venetic was a British national response initiated by the National Crime Agency (NCA). In June 2020, EncroChat had 10,000 users in the UK alone. As a result of the infiltration of the network, UK police arrested 746 individuals, including major crime bosses, intercepted two tonnes of drugs (with a street value at the time in excess of £100 million), seized £54 million in cash, as well as weapons, including submachine guns, handguns, grenades, an AK-47 assault rifle, and more than 1,800 rounds of ammunition.{{Cite news |last=Reynolds |first=Emma |title=Hundreds arrested after police infiltrate secret criminal phone network |work=CNN |url=https://www.cnn.com/2020/07/02/uk/encrochat-crime-messaging-cracked-intl-gbr-scli/index.html}} More than 28 million tablets of the sedative Etizolam were found in a factory in Rochester, Kent.{{Cite news |last=Dodd |first=Vikram |date=2 July 2020 |title=Hundreds arrested as UK organised crime network is cracked |work=The Guardian |location=London |url=https://www.theguardian.com/uk-news/2020/jul/02/blow-for-uk-organised-as-command-and-control-network-is-hit}} Additionally, 354 kg (780 lb) of cocaine were seized by the Eastern unit in Essex and East Anglia, and 233 kg (514 lb) by the West Midlands unit. Police Scotland seized 164 kg (362 lb) of cocaine, £200,000 of cannabis and £750,000 in cash in several busts. In May 2020, police found two suitcases containing £1.1 million in Sheffield.
- On 24 March 2020 NCA Agent and G3 Operations Manager J. Wayne filled out the Application for a Targeted Equipment Interference Warrant Under the Investigatory Powers Act 2016 form for TEI warrant 91-TEI-0141-2020.
- On 25 March 2020 the NCA applied to their judiciary for an amendment to also scan for wi-fi networks that were adjacent to the infected Encrochat devices.
- On 26 March 2020 the TEI was granted by the Judicial Commissioner. The warrant was further approved by the NCA director-general Dame Lynne Owens QPM CBE.
- As of 8 July 2020, four people had been charged by the NCA with conspiracy to murder. British police claimed to have prevented up to 200 gangland killings, although Vice News noted that "the number of homicides linked to high level organised crime—as opposed to street gangs—in this county is relatively low". Two corrupt law enforcement officers were also arrested as a result of the operation.
- On 22 December 2020, Thomas Maher was jailed for 14 years and 8 months at Liverpool Crown Court.{{Cite news|title=Wealthy Irish haulage boss jailed for 14 years over cash and drugs transportation|url=https://www.irishexaminer.com/news/courtandcrime/arid-40195377.html|date=22 December 2020|access-date=22 December 2020|last=Barlow|first=Eleanor|work=Irish Examiner|agency=PA}}{{Cite news|title=UK haulier ran Europe-wide drug ring from living room|url=https://www.bbc.com/news/uk-55402733|last=Symonds|first=Tom|date=22 December 2020|access-date=22 December 2020|work=BBC News}}{{Cite news|title=Irish haulage boss jailed in UK over transportation of cocaine and cash across Europe|url=https://www.thejournal.ie/irish-haulage-boss-jailed-uk-cocaine-5309097-Dec2020/|date=22 December 2020|access-date=22 December 2020|work=TheJournal.ie|agency=Press Association}} He had pleaded guilty to four counts of conspiracy to commit a crime at an earlier hearing. He was involved in conspiracies to smuggle about £1.5 million (€1.6m) of cocaine from the Netherlands to Ireland as well as laundering about £1 million (€1.09m) in cash between Ireland and the Netherlands. He had used two EncroChat phones, which were not recovered, using the aliases "Satirical" and "Snacker".
- In March 2022 the first murder plot convictions due to EncroChat were secured, against Paul Fontaine and Frankie Sinclair. By that time the NCA said that 2,631 people had been arrested in the UK as part of Operation Venetic; 1,384 had been charged, 260 convicted and over five and a half tons of class A drugs, 165 weapons and £75m in criminal cash had been seized.{{Cite news |title=Two convicted in first murder plot case involving EncroChat messaging system |last=Campbell |first=Duncan|author-link=Duncan Campbell (journalist)|newspaper=The Guardian |date=14 March 2022 |url= https://www.theguardian.com/world/2022/mar/14/two-guilty-of-james-bond-gun-plot-in-encrochat-conviction}}
- By 9 October 2023, Operation Venetic had led to more than 3,100 arrests, 1,240 convictions and a combined 7,938 years in prison sentences. The operation had also recovered 173 firearms, 3459 rounds of ammunition and more than 9 tonnes of class A drugs.{{Cite web |title=MSN |url=https://www.msn.com/ |access-date=2023-10-09 |website=www.msn.com}}
- In November 2023 Natalie Mottram, a former police analyst, was sentenced to almost four years imprisonment for misconduct in public office, perverting the course of justice and unauthorised access to computer material.{{Cite news |title='Corrupt' cop jailed for tipping off pal to EncroChat dragnet |url=https://www.theregister.com/2023/11/04/corrupt_cop_encrochat/ |last=Hardcastle |first=Jessica Lyons |date=2023-11-04 |access-date=2023-11-05 |work=The Register}} She had told a criminal friend that police were monitoring EncroChat messages and that the police had information on him.
===Operation Legality===
The legality of the Targeted Equipment Interference (TEI) warrant (91-TEI-0141-2020) was questioned{{cite news |last1=Goodwin |first1=Bill |title=NCA 'deliberately concealed' information when it applied for EncroChat warrants, tribunal hears |url=https://www.computerweekly.com/news/252525205/NCA-deliberately-concealed-information-when-it-applied-for-EncroChat-warrants-tribunal-hears |access-date=30 April 2024 |publisher=Computer Weekly |date=23 September 2022}} due to the unorthodox nature of the warrant as well as the legal arguments in the affidavit in application of a TEI warrant. There is nothing new in arguing the merits of obtaining the identities of the users of a system and bringing them to justice. Neither is it particularly unusual to exaggerate the number of criminals that will be arrested, or to downplay the number of innocent people that will be affected by the intrusion, however unethical that method may be. However, in this warrant the NCA essentially indicated that if the warrant wasn't granted, then the French would proceed with the operation anyway, and the NCA would be exposed as culpable as to having violated civil and criminal statutes in the United Kingdom. (see page 9) "...there is a significant risk that the NCA is encouraging an offense under the CMA, which may amount to an offence under ss. 44, 45, 46 of the Serious Crime Act 2007 (the "SCA 2007)"..."{{cite web |author1=Lynne Owens |title=Application for a Targeted Equipment Interference Warrant Under Investigatory Powers At 2016/TEI Warrant 91-TEI-0141-2020 |url=https://www.documentcloud.org/documents/20616264-nca-tei-warrant-application |publisher=National Crime Agency |access-date=2 February 2024 |location=United Kingdom |language=English |format=pdf |date=26 March 2020}} In other words, the NCA's arguments for obtaining the warrant was, "if you don't grant this, we could be prosecuted for criminally participating in the hacking of United Kingdom citizens devices." After granting the initial warrant, amendments to the initial warrant were requested on 24 March 2020 to allow for the scanning of wireless access points available to the Encrochat devices.
An Investigatory Powers Tribunal (IPT) into Operation Venetic was conducted from September 2022 to May 2023. The defence barristers accused the NCA of "Deliberately concealing" information when it applied for the EncroChat warrants. In addition to the issues surrounding the text of the TEI warrant, the defence attorneys argued that the application for a TEI warrant vs. a TI warrant was in and of itself a "serious and fundamental error" and the position was "tenuous at best". “The NCA started with the result they wanted and tried to fit that into the Investigatory Powers Act. They wanted a TEI and nothing else,” a barrister acting for complainants told the court. “Their motive was understandable. They wanted to make the intercept available in court.”
The Investigatory Powers Tribunal (IPT) concluded that the National Crime Agency (NCA) did not deliberately conceal information from the Judicial Commissioner when applying for the Targeted Equipment Interference (TEI) warrant. The tribunal found that the NCA's actions were lawful and that they were not wrong in seeking a TEI warrant instead of a Targeted Interception (TI) warrant. The tribunal dismissed various claims and complaints, declaring that the TEI warrant was lawfully issued and that the NCA did not fail in its duty of candor.{{cite web |title=SF and Ors v NCA IPT 21 05 CH |url=https://investigatorypowerstribunal.org.uk/judgement/sf-and-ors-v-nca-ipt-21-05-ch/ |website=Investigatory Powers Tribunal |publisher=The Investigatory Powers Tribunal |access-date=3 June 2024 |language=en |date=11 May 2023}}
== Operation Eternal ==
Operation Eternal, the London Metropolitan Police arm of the EncroChat operation, described itself as "the most significant operation the Metropolitan Police Service has ever launched against serious and organised crime". Around 1,400 EncroChat users were based in London at the time of its closure in June 2020. The Metropolitan Police seized more than £13.4 million in cash, 16 firearms, more than 500 rounds of ammunition, 620 kg (1400 lb) of Class A drugs, and arrested 171 people.{{Cite web |date=2 July 2020 |title=Murder plots foiled and some of London's most dangerous criminals arrested in joint operation |publisher=Metropolitan Police |url=http://news.met.police.uk/news/murder-plots-foiled-and-some-of-londons-most-dangerous-criminals-arrested-in-joint-operation-406870|url-status=dead|archive-url=https://web.archive.org/web/20200930032326/http://news.met.police.uk/news/murder-plots-foiled-and-some-of-londons-most-dangerous-criminals-arrested-in-joint-operation-406870|archive-date=2020-09-30}} As of 8 July 2020, 113 of them have been charged; 88 face charges of conspiracy to supply Class A drugs, and 16 have been charged with firearms offences.
In September 2020 nine people were arrested after raids in Brighton, Portslade, Kent, and London linked to Operation Eternal.{{Cite news |last=Wadsworth |first=Jo |date=23 September 2020 |title=Three held after Brighton drugs raids based on encrypted message intelligence |work=Brighton & Hove News |url=https://www.brightonandhovenews.org/2020/09/23/three-held-after-brighton-drugs-raids-based-on-encrypted-message-intelligence/ |access-date=24 September 2020}} Three men were arrested in Brighton and Portslade, five men and a woman in Kent and London. They were arrested for a variety of charges, including conspiracy to supply cocaine. Police seized 10 kg (20 lb) of Class A drugs and £60,000.
By 9 October 2023, Operation Eternal had led to 942 arrests and 426 convictions with a combined prison sentences of 3,722 years. Around £19 million in cash had been seized along with more than three tonnes of class A and B drugs and 49 guns.{{Cite web |title=MSN |url=https://www.msn.com/ |access-date=2023-10-09 |website=www.msn.com}}
Convictions
On 21 May 2021, Carl Stewart of Gem Street, Liverpool was sentenced to 13 years and 6 months at Liverpool Crown Court after pleading guilty to attempting to smuggle cocaine, heroin, MDMA and ketamine, as well as transferring criminal property.{{Cite news|title=Feeling blue: drug dealer's 'love of stilton' leads to his arrest|url=https://www.theguardian.com/food/2021/may/24/feeling-blue-drug-dealers-love-of-stilton-leads-to-his-arrest|last=Mistlin|first=Alex|date=24 May 2021|access-date=24 May 2021|work=The Guardian}} He had used EncroChat to transfer large amounts of class A and B drugs under the alias "ToffeeForce" (a reference to Everton F.C.). He was identified from a photo he had sent via Encrochat showing his hands holding a block of Blue Stilton. Police were able to identify him via his fingerprints in the photo.
Vincent Coggins, a boss in the Huyton Firm organized crime group, used EncroChat, and was jailed for 28 years.{{cite news | url=https://www.bbc.com/news/uk-68857143 | title=Huyton Firm: Brutal organised crime group brought down by its own text messages | date=9 May 2024 }}
In July 2024, former Gibraltar international footballer Jason Pusey was sentenced to 11 years in prison for his involvement in a large-scale drug operation, coordinating the supply of significant quantities of cocaine, ketamine, and cannabis.{{Cite web |date=2024-07-03 |title=Met investigation leads to 11-year sentence for footballer intent on flooding south London with drugs |url=https://news.met.police.uk/news/met-investigation-leads-to-11-year-sentence-for-footballer-intent-on-flooding-south-london-with-drugs-485922 |access-date=2024-07-03 |website=Mynewsdesk |language=en}}
Similar products
- The Canada-based company Phantom Secure, which started as a legitimate firm selling modified mobile phones, provided "secure communications to high-level drug traffickers and other criminal organization leaders" according to a 2018 FBI takedown announcement.{{Cite news |last= |date=16 March 2018 |title=International Criminal Communication Service Dismantled: Phantom Secure Helped Drug Traffickers, Organized Crime Worldwide |work=Federal Bureau of Investigation |url=https://www.fbi.gov/news/stories/phantom-secure-takedown-031618}} Its CEO, Vincent Ramos, was sentenced in 2019 to a nine-year prison sentence after telling undercover agents that he created the device to help drug traffickers. Customers included members of the Sinaloa Cartel,{{Cite news |last1=Lamoureux |first1=Mack |last2=Cox |first2=Joseph |date=29 May 2019 |title=CEO Who Sold Encrypted Phones to the Sinaloa Cartel Sentenced to Nine Years |work=Vice Motherboard |url=https://www.vice.com/en_us/article/xwn4vw/ceo-who-sold-encrypted-phones-to-the-sinaloa-cartel-sentenced-to-nine-years}} and the FBI reportedly asked Ramos to plant a backdoor in Phantom Secure's encrypted network, which he refused to do.{{Cite news |last=Cox |first=Joseph |date=18 September 2019 |title=The FBI Tried to Plant a Backdoor in an Encrypted Phone Network |work=Vice Motherboard |url=https://www.vice.com/en_us/article/pa73dz/fbi-tried-to-plant-backdoor-in-encrypted-phone-phantom-secure|quote=A third source told Motherboard 'He never gave law enforcement a backdoor into Phantom Secure. He did not do that.' When pressed on whether the FBI still asked for access, the source, who worked directly on the case, said, 'Basically that's all I want to say. He did not give law enforcement a backdoor into Phantom Secure.' ... One of the sources said Ramos did not have the technical knowledge to implement a backdoor though, and so the FBI asked Ramos to lure another Phantom member who could. Ramos declined, the source said.}}
- The "secure messenger" ANOM was launched after Phantom Secure was shut down, but in 2021 was revealed to be a sting operation run by law enforcement agencies.{{cite news |last1=Corder |first1=Mike |last2=Perry |first2=Nick |url=https://apnews.com/article/europe-technology-a6ac691e26be2efc6e2f4a6974117536 |title=Global sting: FBI-encrypted app tricks organized crime |archive-url=https://web.archive.org/web/20210608103515/https://apnews.com/article/europe-technology-a6ac691e26be2efc6e2f4a6974117536 |archive-date=8 June 2021 |work=Associated Press News |date=8 June 2021}}
- The secure mobile phone company MPC was revealed in 2019 to have been created by Scottish criminals James and Barrie Gillespie. Christopher Hughes, a former employee of the company, is wanted by Dutch police for the murder of criminal turned blogger Martin Kok in December 2016.{{Cite news |last=Cox |first=Joseph |date=24 October 2019 |title=Encrypted Phone Company Helped Plan Crime Blogger's Murder, Cops and Source Say |work=Vice Motherboard |url=https://www.vice.com/en_us/article/kz4yxa/encrypted-phone-company-mpc-helped-martin-kok-murder}}
- Sky ECC was an encrypted chat service by Sky Global, a Canadian service provider. In March 2021, Dutch and Belgian police claimed to have accessed and decrypted the system traffic, leading to numerous arrests.{{Cite news |title=When Sky ECC fell, so too did Belgian crime lords |url=https://www.brusselstimes.com/belgium/159176/cracking-of-sky-ecc-encrypted-messaging-service-brings-down-organised-crime-lords/ |last=Lyons |first=Helen |date=11 March 2021 |access-date=11 March 2021 |work=The Brussels Times}}{{Cite news |title=Lawyers among those arrested in crackdown organised crime |url=https://www.brusselstimes.com/news/belgium-all-news/159284/antwerp-lawyers-among-those-arrested-in-crackdown-organised-crime/ |last=Lyons |first=Helen |date=10 March 2021 |access-date=11 March 2021 |work=The Brussels Times}}{{Cite news |last=Stroobants |first=Jean-Pierre |date=10 March 2021 |title=En Belgique, le réseau de communication Sky ECC infiltré par la police |language=fr |trans-title=In Belgium, the Sky ECC communication network infiltrated by the police |work=Le Monde |url=https://www.lemonde.fr/pixels/article/2021/03/10/en-belgique-le-reseau-de-communication-sky-ecc-infiltre-par-la-police_6072567_4408996.html |access-date=11 March 2021}}
- Ennetcom was a Dutch telecom provider accused of having retailed its customised phones for €1,500 each largely for use by criminals, with traffic of the company's servers (mostly Canada-based) used for routing encrypted messages between its about 19,000 subscribers.
- Ghost was an Australian provider that was raided in 2024.
References
{{Reflist}}
Category:Defunct darknet markets
Category:Distributed computing architecture
Category:End-to-end encryption
Category:Internet architecture
Category:Virtual private networks
Category:Android (operating system) forks
Category:Mobile operating systems
Category:Organized crime in Europe