Fact-checked by Grok 2 weeks ago

EncroChat

EncroChat was a commercial encrypted communications service offering modified Android smartphones equipped with end-to-end encryption for text messaging, voice calls via EncroTalk, and secure note-taking through EncroNotes, designed to facilitate anonymous and tamper-resistant exchanges primarily among organized crime groups coordinating activities like drug importation and distribution. Operational from approximately 2016 until its abrupt shutdown in June 2020, EncroChat boasted tens of thousands of users across Europe, with devices typically leased for periods like six months at premium prices exceeding £1,000, incorporating hardware modifications such as disabled microphones and cameras during off-hours, self-destruct timers for messages, and remote wipe capabilities to evade detection. The platform's demise stemmed from Operation Emma, an international effort spearheaded by French and Dutch authorities with Europol coordination, which infiltrated the network's servers—located in France—to intercept over 100 million messages in real time, yielding actionable intelligence on criminal operations and culminating in more than 6,500 arrests, the seizure of nearly €900 million in criminal assets, and the disruption of thousands of illicit conspiracies by mid-2023. This takedown exemplified law enforcement's strategic exploitation of centralized server vulnerabilities in ostensibly secure systems, though it sparked debates over evidence admissibility in trials due to the cross-border hacking methods employed, with subsequent European Court of Justice rulings affirming conditions for such data sharing while highlighting tensions between security imperatives and procedural safeguards.

Origins and Background

Founding and Initial Setup

EncroChat was founded in as a Europe-based specializing in modified smartphones designed for encrypted communications. The company operated primarily from the , presenting itself as a secure platform for privacy-focused users, though its handsets quickly gained notoriety among criminal elements seeking untraceable messaging. Servers supporting the network were hosted in , which later became central to scrutiny. The identities of EncroChat's founders and owners have not been publicly disclosed, contributing to its opaque operational structure. Dutch journalist Jan Meeus has reported that a organized crime syndicate played a role in financing and supporting the platform's developers, suggesting early ties to illicit networks that shaped its market. Initial setup involved distributing customized Android-based devices, such as models derived from the BQ Aquaris X2, pre-installed with proprietary that disabled standard applications, microphones, cameras, and GPS to minimize forensic vulnerabilities. Users subscribed for ongoing , paying approximately €1,000 for a and €700–€1,500 monthly, with devices activated through a network of resellers to maintain . From inception, EncroChat emphasized and features like remote wiping and message self-deletion after a set period, marketed as defenses against . The platform's architecture relied on a centralized server model for and message routing, which operators claimed ensured invulnerability to , though this design later proved exploitable. French authorities first detected EncroChat devices in criminal seizures in 2017, prompting investigations into the company's alleged facilitation of .

Growth and Market Positioning

EncroChat achieved rapid expansion after its launch in approximately , reaching around 60,000 subscribers globally by 2020. This growth reflected surging demand from syndicates seeking alternatives to standard smartphones, which had become susceptible to tools capable of extracting data from seized devices. The platform's user base concentrated heavily in , where it facilitated coordination among criminal networks involved in drug trafficking and other illicit activities, with operations spanning multiple countries. Market positioning centered on a specialized niche of "dark phones" marketed explicitly to high-echelon criminals, emphasizing hardware modifications like disabled cameras and microphones alongside software for self-destructing messages and remote wipes. Devices retailed for about €1,000 each, targeting users willing to invest in purportedly unbreachable communications for operational security. EncroChat differentiated itself through claims of offshore server hosting and resistant to , building a reputation as a go-to tool for figures who viewed it as superior to mainstream apps. In a fragmented of encrypted providers, EncroChat held a leading position in , competing with rivals such as Sky ECC and appealing to groups like Italian mafia affiliates through its focus on anonymity over consumer-friendly features. Its exclusivity to serious —eschewing legitimate users—reinforced perceptions of reliability, as evidenced by open discussions of deals, , and on the network, which prosecutors later described as indicative of users' confidence in its safeguards.

Technical Design and Security Claims

Hardware Modifications

EncroChat handsets, known as "carbon units," were derived from standard smartphones, with the Aquaris X2 model frequently cited as a base device released in 2018 by a manufacturer. These modifications prioritized by physically removing or disabling key hardware components vulnerable to , including the GPS chip, camera, , and USB port, thereby eliminating capabilities for location tracking, visual or audio recording, and unauthorized data extraction. To enforce software exclusivity, EncroChat embedded custom certificates directly into the , ensuring that only the proprietary EncroChat operating system could boot successfully, which required low-level alterations and partnerships with device manufacturers. Devices supported dual-boot functionality, allowing users to switch between the secure EncroChat OS—optimized for encrypted messaging—and a vanilla OS for routine, non-sensitive activities, accessible via specific button combinations to maintain . Standard features, such as calls over cellular networks, were disabled, restricting communication to Wi-Fi-based encrypted channels. These alterations rendered the phones non-functional for conventional use outside the EncroChat ecosystem, with costs reflecting the customization: approximately €1,000–1,500 for a six-month subscription including the modified . While intended to thwart forensic , such hardware constraints inadvertently limited and increased dependency on the EncroChat .

Software Features and Encryption Protocols


EncroChat operated on modified Android devices featuring a dual-boot system, enabling users to alternate between a standard Android operating system for routine functions and a proprietary secure mode dedicated to encrypted communications. In secure mode, software restrictions disabled access to GPS, camera, and microphone functionalities, preventing location tracking and multimedia recording. The platform included a suite of applications such as the EncroChat messaging app, EncroTalk for voice-over-IP calls limited to 30 minutes per six-month subscription period, and EncroNotes for storing encrypted data. Additional features encompassed ephemeral messaging with automatic deletion, remote wipe capabilities for administrators, and user-initiated panic wipes activated via a specific six-character PIN or key combination. Devices required hardware-specific certificates to run the software, ensuring exclusivity to authorized handsets.
The encryption protocols centered on utilizing the , an open-source framework providing and secure key exchange, implemented within custom EncroChat applications. Messages were encrypted on the user device prior to transmission, routed through EncroChat servers acting solely as message brokers without decryption access. Supplementary security included 15-character passwords for application access and PGP encryption for email communications. While marketed as proprietary military-grade encryption, core protections relied on the Signal Protocol's established cryptographic standards, with no identified flaws in the protocol itself during analyses. Transmission occurred over machine-to-machine SIM plans for , with data stored in full-disk encrypted virtual machines on servers.

Claimed Invulnerability and Anti-Forensic Measures

EncroChat marketed its service as impervious to unauthorized access and interception, asserting that its proprietary protocols, combined with a closed , rendered communications secure against state-level and attempts. The platform emphasized no long-term on servers, with messages transmitted via ephemeral relays in that purportedly left no recoverable logs accessible to third parties. These claims positioned EncroChat as a fortress for sensitive exchanges, with the provider charging approximately €1,500 for six months of device access to underscore the purported robustness of its defenses. To counter forensic analysis, EncroChat devices incorporated multiple anti-forensic mechanisms designed to eliminate digital traces upon detection of threats. A prominent feature was the "panic wipe," triggered by entering a specific PIN, which instantly erased all local data including messages, contacts, and application states, rendering the device inert for evidence recovery. Complementing this, remote wipe functionality enabled administrators or authorized users to commandeer and delete data across the network, activated in response to suspected compromises. Messages supported timers, automatically purging content after transmission or viewing, while an "advanced burn" option allowed senders to remotely force deletion of messages from recipients' devices via a countdown mechanism. Hardware alterations further bolstered these claims by stripping standard smartphone components vulnerable to exploitation: GPS modules, cameras, microphones, and sometimes SIM card slots were removed or disabled to preclude location tracking, audio interception, or standard cellular forensics. The custom operating system overlay enforced these restrictions, with no persistent storage of identifiers like IMEI or user profiles that could link devices to individuals. Collectively, these measures aimed to thwart physical seizures and digital extractions, promoting the narrative of total evidentiary destruction even under duress.

Adoption by Criminal Networks

Primary Users and Motivations

The primary users of EncroChat were members of groups (OCGs), with a significant concentration in , where the platform facilitated coordination among networks involved in high-level illicit activities. Law enforcement assessments indicate that approximately 60,000 individuals subscribed to the service globally, with around 10,000 users in the alone by June 2020, predominantly leveraging it for criminal purposes rather than legitimate privacy needs. French authorities estimated that 90% of users were engaged in illegal operations, corroborated by post-infiltration analysis revealing the platform's role in enabling communications among hierarchical criminal structures. These users, often operating in drug cartels, smuggling rings, and violence-prone gangs, spanned countries like , the , , and the , where EncroChat devices were distributed through underground channels. Data from intercepted messages showed heavy involvement in cocaine and other narcotics importation from , with users discussing logistics for multi-ton shipments, storage, and distribution networks. Additional applications included firearms trafficking, via or cash couriers, and planning violent enforcements, underscoring the platform's appeal to mid- to upper-tier operatives who required reliable, tamper-resistant tools for operational secrecy. Motivations centered on evading traditional , as users perceived EncroChat's custom hardware—featuring remote wipe capabilities, no camera or microphone, and —as impervious to , allowing candid discussions of sensitive plans that would otherwise risk exposure via standard mobile networks. This perceived invulnerability encouraged a shift from less secure alternatives, with OCGs adopting the service to scale operations efficiently, such as real-time deal negotiations and , in an environment of intensifying pressure on conventional communications. Quantitative breakdowns from Europol's review of extracted data highlight that 34.8% of users belonged to general OCGs and 33.29% to drug trafficking syndicates, reflecting a deliberate choice for tools that prioritized operational continuity over cost or convenience.

Scale of Criminal Exploitation

EncroChat attracted approximately 60,000 subscribers worldwide by the time of its compromise in , with the platform's modified handsets serving as the primary tool for among criminal actors. Around 10,000 of these users were based in the alone, reflecting heavy adoption in for coordinating large-scale illicit operations. The service's appeal stemmed from its customization for anonymity, including features like remote wiping and self-destructing messages, which criminals exploited to evade traditional . The platform facilitated an immense volume of criminal communications, with law enforcement intercepting more than one billion encrypted messages between users during the operation. Analysis of user profiles indicated that roughly 35% were affiliated with organized crime rings and another 33% with drug trafficking groups, underscoring its role as a dedicated infrastructure for serious offenses rather than general-purpose messaging. Messages routinely detailed logistics for importing and distributing controlled substances, money laundering schemes, and violent enforcement activities, such as threats and orders for assaults, demonstrating the platform's centrality to operational planning across transnational networks. This scale highlighted EncroChat's position as a preferred tool for high-level criminals seeking to insulate their activities from interception. Geographically, exploitation was concentrated in , with significant clusters in , the , and the , where users leveraged the service to manage multi-ton drug shipments and associated financial flows. The noted that EncroChat's user base was almost entirely devoted to illicit commodity distribution, particularly Class A drugs like and , with minimal evidence of legitimate adoption. This exclusivity amplified its value to syndicates, enabling real-time coordination that sustained billion-euro enterprises until the network's exposure.

Law Enforcement Intervention

Intelligence Gathering and Planning

The French Gendarmerie Nationale recommenced investigations into EncroChat in 2017 after repeatedly seizing modified devices during operations against groups, which revealed the service's operational servers were hosted in , . This intelligence prompted technical analysis of the network's infrastructure, identifying vulnerabilities in its server-based architecture that facilitated encrypted messaging via the . By 2019, authorities had cultivated infiltration capabilities, opening a case at to coordinate cross-border efforts and sharing preliminary data with law enforcement, whose expertise in complemented operational leads. Planning crystallized in April 2020 with the formation of a Joint Investigation Team (JIT) between and the , backed by and , under Operation Emma; an Operational Taskforce EMMA was simultaneously established at 's headquarters in to centralize data processing and generate actionable intelligence for 17 European countries and additional partners. The core infiltration strategy relied on compromising the servers, where investigators, with Dutch technical assistance, installed via a simulated software update to devices upon connection, bypassing end-to-end encryption by capturing data pre-transmission. This measure, authorized by a investigating under domestic intrusion laws, enabled of over 115 million messages from approximately 60,000 users across 122 countries between March and June 2020, without alerting the network's administrators initially. Coordination emphasized phased execution to maximize disruption while containing leaks, including secure data pipelines for analysis by agencies like the UK's and Germany's Bundeskriminalamt, facilitated by European Investigation Orders and mutual legal assistance protocols to synchronize post-compromise arrests and asset seizures upon network shutdown in late June 2020.

The 2020 Network Compromise

In early 2020, French authorities, led by the Gendarmerie Nationale, infiltrated EncroChat's central servers located in , , as part of a multi-year that began in 2017. This operation, codenamed and coordinated through a Joint Investigation Team (JIT) involving , the , and supported by and , exploited the network's infrastructure to enable real-time interception of encrypted communications. deployed technical measures, including access to the servers that handled message routing and storage, allowing decryption of traffic without compromising end-to-end encryption protocols directly on user devices. The infiltration permitted the capture of approximately 115 million messages exchanged between March and June 2020, providing actionable intelligence on criminal activities across . The compromise relied on the servers' physical and vulnerability, as EncroChat routed all user through these French-hosted systems despite claims of robust . authorities contributed decryption capabilities, potentially via a man-in-the-middle technique developed to process intercepted , while the operation maintained secrecy to avoid alerting administrators. This access revealed messages, photos, and metadata from tens of thousands of devices, exposing coordinated drug trafficking, , and violent plots. The effort was justified by French judicial warrants, emphasizing EncroChat's predominant use by groups, which minimized concerns over incidental collection of non-criminal . EncroChat operators detected anomalous activity on the night of June 12–13, 2020, prompting an emergency shutdown and warnings to users via broadcast messages stating that " authority had penetrated the network." The 74-day window ended abruptly, but the extracted data fueled subsequent analyses shared among 18 European countries and beyond, marking a significant disruption to encrypted criminal communications. No of the precise initial occurred, preserving operational methods for future applications against similar platforms.

Data Extraction and Analysis Techniques

authorities, through the Nationale's cyber intelligence unit, compromised EncroChat's central servers hosted in , , enabling the interception of user communications in plaintext prior to device-side . This infiltration, initiated in mid-March 2020 and sustained until the network's shutdown on June 12, 2020, exploited vulnerabilities in the system's update mechanism to deploy surveillance capabilities, capturing over 120 million messages from approximately 60,000 users. The method bypassed traditional decryption by accessing data at the infrastructure level, where messages were unencrypted during processing or transmission routing, though precise technical details remain classified under provisions. Extracted data was transferred to a Joint Investigation Team (JIT) comprising , , and other European authorities, coordinated by and supported by , for cross-border processing under mutual legal assistance frameworks. Initial pre-processing involved filtering vast datasets by jurisdictional relevance, such as language (e.g., English, , ) and user pseudonyms, to manage the volume exceeding 100 terabytes. Specialized tools developed by agencies like the UK's facilitated bulk data ingestion, de-duplication, and temporal sequencing of messages, enabling chronological reconstruction of conversations. Analysis employed techniques, including live for real-time correlation and on seized EncroChat handsets to verify attributions. utilized graph-based to visualize user connections, identifying co-offending patterns, hierarchies, and syndicates through message like timestamps and handles—e.g., linking pseudonyms such as "BigCheese" to real identities via self-referential content or cross-matches with footage. Keyword searches targeted criminal indicators (e.g., drug slang, transaction codes), supplemented by linguistic profiling and for in communication patterns. Europol's dedicated team cross-referenced intercepted data against existing intelligence databases, enhancing attribution accuracy; for instance, message content referencing specific locations or events was validated against physical arrests yielding matching devices. Challenges in analysis stemmed from EncroChat's anti-forensic features, such as self-deleting messages and lack of geolocation, necessitating probabilistic attribution reliant on contextual rather than direct device linking. Despite these, the techniques yielded actionable , with over 115 million messages dissected to support thousands of prosecutions, though defense challenges have highlighted potential overreach in bulk data handling without individualized warrants.

Immediate Consequences

Network Shutdown and User Alerts

On June 13, 2020, EncroChat operators abruptly terminated the network after detecting unauthorized access by law enforcement agencies, primarily and authorities operating under a joint investigation team supported by . The compromise had allowed interception of encrypted messages for approximately two months prior, compromising the platform's claimed security. Administrators disseminated an urgent broadcast message to the platform's estimated 60,000 users, alerting them to the and directing them to halt all activity, withdraw from communications, and physically destroy their devices to mitigate further exposure. The message asserted that EncroChat's domains had been "illegally seized by government entities" and promised updates via a account, though this portrayal obscured the underlying technical infiltration rather than a domain-level . In the immediate aftermath, EncroChat servers were powered down, rendering the service inoperable and severing connections across its user base, which was predominantly composed of figures relying on the platform for coordinating drug trafficking, , and violent activities. This shutdown marked the culmination of Operation Emma, the European effort that had extracted over 100 million messages, prompting a rapid pivot by criminals to alternative encrypted networks.

Initial Arrest Waves (2020)

Following the EncroChat administrators' detection of the network compromise on June 13, 2020, and subsequent shutdown warning to users, European agencies launched coordinated operations leveraging the intercepted messages. These initial waves, occurring primarily in late and 2020, targeted users implicated in importation, trafficking, firearms distribution, and violent crimes through real-time analysis of the platform's data. In the , the Crime Agency's Venetic resulted in 746 arrests announced on July 2, 2020, with seizures including £54 million in criminal cash, 77 firearms, and over two tonnes of Class A drugs such as and . The operation dismantled multiple groups, with evidence from EncroChat messages directly linking suspects to conspiracies for large-scale drug shipments from and . In the , authorities arrested around 60 individuals in the immediate aftermath, confiscating approximately 10,000 kilograms of intended for distribution across . focused on port-related trafficking hubs, using the data to intercept shipments and disrupt supply chains tied to international cartels. French investigators, originating the infiltration under Operation Emma 95, executed numerous arrests but withheld public disclosure of exact figures in July 2020 to protect ongoing probes. Similar actions occurred in and other nations, contributing to a broader tally of hundreds detained in the first weeks, primarily for narcotics and weapons offenses. These early interventions prevented planned hits and major consignments, though many lower-level users evaded capture by discarding devices as advised.

Long-Term Impacts on Crime Disruption

Asset Seizures and Financial Losses to Criminals

Following the compromise of EncroChat in June 2020, law enforcement operations across Europe and beyond resulted in the seizure of assets valued at approximately €900 million from criminal networks, including €739.7 million in cash and €154.1 million frozen in bank accounts or other holdings. These seizures stemmed from intelligence derived from over 115 million intercepted messages, enabling raids that targeted drug trafficking, money laundering, and related enterprises reliant on the platform. Drug hauls represented a major component of the financial disruption, with authorities confiscating 103.5 tons of , 163.4 tons of , and 30.5 million pills of synthetic narcotics, alongside whose combined street value contributed to the overall economic blow to suppliers and distributors. In the UK, under Operation Venetic led by the , initial seizures included £54 million in criminal cash and over two tons of drugs by mid-2021, with subsequent cases yielding additional recoveries such as £20,000 in cash tied to a £190 million import scheme. Other tangible assets seized encompassed 971 vehicles, 271 properties, and various luxury items, further eroding the operational capital of dismantled syndicates. The frozen funds, in particular, prevented criminals from accessing liquid assets for reinvestment in illicit activities, amplifying losses beyond immediate confiscations. While precise indirect economic impacts—such as foregone revenues from interrupted supply chains—remain unquantified in official reports, the scale of disruptions halted multi-ton drug flows and laundering operations that had sustained organized crime groups across continents.
CategoryQuantity Seized/Frozen
Cash€739.7 million
Frozen Assets/Bank Accounts€154.1 million
103.5 tons
163.4 tons
Synthetic Drug Pills30.5 million
Vehicles971
Properties271
These figures, reported cumulatively as of June 2023, underscore the operation's role in inflicting verifiable financial attrition on EncroChat-dependent networks, though ongoing investigations continue to uncover additional recoveries.

Dismantling of Specific Syndicates

The compromise of EncroChat enabled to infiltrate and dismantle numerous groups (OCGs) across Europe, particularly those engaged in large-scale drug trafficking, by providing direct evidence of operational hierarchies, shipment logistics, and violent enforcement activities. In the , Operation Venetic, coordinated by the (NCA), led to the complete takedown of entire OCGs, with 746 arrests by 2020 and subsequent convictions exposing networks importing and distributing and other drugs. For instance, a Leeds-based specializing in processing and production was dismantled, resulting in the jailing of its final four members in January 2025 after EncroChat messages revealed their production methods and distribution chains. Similarly, a OCG overseeing multi-million-pound imports, including shipments hidden in gas canisters, was disrupted, with key members sentenced in October 2025 for conspiring to supply over 100 kilograms of the drug. In , the operation yielded over 50 arrests in 2020 alone, targeting gangs involved in drug importation and firearms trafficking, effectively crippling their communications and logistics. Across the continent, and Dutch authorities, who spearheaded the network's infiltration, used extracted messages to map and arrest leaders of domestic drug syndicates coordinating Antwerp and Rotterdam port operations, where EncroChat facilitated orders for tons of from . Internationally, the intelligence contributed to actions against transnational mafias, including Italy's 'Ndrangheta, whose members relied on EncroChat for drug ring coordination; a 2023 Europol-supported probe into Europe's largest 'Ndrangheta cocaine network leveraged such encrypted communications data, leading to sentences for key figures despite the platform's prior shutdown. These disruptions extended to ancillary criminal enterprises, such as money laundering and contract killings plotted via the platform, with Europol reporting the identification of thousands of users tied to hierarchical syndicates rather than lone actors. While many dismantled groups remain unnamed publicly to protect ongoing probes, the aggregate impact—over 6,500 arrests worldwide by June 2023—severely fragmented mid-level drug distribution cells in France, the Netherlands, and the UK, reducing operational capacity for cross-border cocaine flows estimated at 100 tonnes seized. The exposure of user identities and transaction details via message analysis proved pivotal, as syndicates had presumed the platform's end-to-end encryption offered impunity.

Evidence Admissibility Rulings

In jurisdictions across , courts have grappled with the admissibility of EncroChat data extracted via remote server compromise by authorities in 2020, raising issues of interception lawfulness, procedural transparency, mutual legal assistance compliance, and Article 6 ECHR fair trial protections. Challenges typically center on the hacking's proportionality, absence of targeted warrants for foreign users, limited defense access to technical methodologies classified under , and post-Brexit data-sharing validity for cases. While many rulings affirm admissibility under principles of mutual trust in EU judicial cooperation—prioritizing evidence utility against —others mandate exclusion where defense rights are demonstrably impaired or domestic procedural safeguards ignored. The Court of Appeal, in a February 5, 2021, judgment, held EncroChat messages admissible, classifying them as stored data intercepted from handsets rather than transmissions under the (), Section 4(4)(b), thus falling outside stricter intercept prohibitions in Section 56. The court rejected defense arguments for exclusion under Police and Criminal Evidence Act 1984, Section 78, or as an , noting the data's acquisition aligned with Schedule 3 IPA provisions for overseas material and did not require a mutual assistance warrant, as French interception preceded any request. Subsequent rulings, including by Mr Justice Dove in early 2021 cases, reinforced this, deeming the evidence reliable absent proof of fabrication. France's (), on November 22, 2022, ruled that intercepted EncroChat data requires a "certificate of truthfulness" from authorities to authenticate its provenance, overturning a 2021 Nancy Court of Appeal decision that had admitted messages and photos without it, citing accessibility under French procedure despite methodological secrecy. The case was remanded to verify the certificate's existence—reportedly absent—potentially invalidating evidence in that narcotics and arms prosecution, though broader French operations proceeded on domestic hacking warrants deemed sufficient for initial admissibility. In the , the upheld EncroChat evidence admissibility on February 14, 2024, in a drugs, , and conviction, relying on the EU mutual trust principle to accept interception's legality without re-litigating it domestically, as the targeted a discrete user cohort rather than bulk . The court found no fair trial breach, as the defendant accessed pertinent data excerpts, dismissing transparency critiques over Dutch JIT involvement. Germany's rulings diverge, with a Regional Court on January 8, 2025, excluding EncroChat data in a drugs trafficking trial, citing unauthorized remote access to German users' handsets—necessitating domestic judicial approval—and violations of the European Investigation Order Directive's notification requirements, compounded by insufficient methodological disclosure impairing defense contestation. This contrasts earlier German acceptances but signals heightened scrutiny, with prosecutors appealing to the . At level, the Court of Justice (CJEU) in Case C-670/22 M.N. (April 30, 2024) clarified that EncroChat-like data transmitted via European Investigation Order (Directive 2014/41/) remains admissible if compliant with the issuing state's , , and domestic —without executing states verifying collection methods—but mandates exclusion where the accused cannot effectively comment on it, enforcing absolute fair trial primacy under Article 47 Charter of Fundamental Rights. National courts must thus assess defense access case-by-case, potentially barring evidence amid opacity in techniques.

Major Convictions and Sentences

In the United Kingdom, Operation Venetic has yielded numerous significant convictions, including Lee McClenaghan, sentenced to 30 years' imprisonment in September 2025 for conspiring to import cocaine worth £48 million using EncroChat communications. His associate, Lea Talbot, received 23 years for the same plot, which involved coordinating large-scale shipments from Turkey. Another notable case involved Philip Waugh, a firearms supplier dubbed "Aceprospect," who was jailed for 26 years and 8 months in 2023 for supplying weapons to organized crime groups via the platform. Shaun Monaghan, leader of a North East England drug network, was sentenced to 27 years in October 2025 for trafficking heroin, cocaine, and amphetamines on a multi-million-pound scale. France, where the network's servers were infiltrated, has seen convictions tied to the initial Operation Emma, though specific individual sentences are less publicly detailed; collective outcomes include hundreds of arrests leading to importation and distribution charges upheld in courts despite admissibility challenges. In the , a key partner in the hack, convictions have included up to 9 years for members of a that constructed hidden facilities for , as ruled in May 2022, with EncroChat messages providing evidence of coordinated and operations. authorities also secured a 15-year term in 2022 for a trafficker involved in international rings documented through platform intercepts. Across Europe, the operation's impact is reflected in aggregate data: by June 2023, reported 7,134 years of total imprisonment from convictions, including 197 high-value targets prosecuted for offenses ranging from Class A conspiracies to firearms trafficking and . In the UK alone, groups like one led by Jamie Rothwell received combined sentences nearing 207 years in August 2025 for and gun distribution networks exposed via EncroChat. These outcomes underscore the platform's role in facilitating verifiable criminal enterprises, with sentences scaled to the volume of handled—often in tons—and associated .

Defense Challenges and Acquittals

Defenses in EncroChat-related trials have frequently contested the attribution of encrypted messages to specific defendants, arguing that usernames or handles extracted from the platform cannot reliably be linked to individuals without corroborative evidence such as device possession or forensic ties. This challenge stems from the platform's design, where users operated anonymously via self-destructing messages and no real-name registration, leaving gaps that prosecutors must bridge with circumstantial links like phone seizures or witness testimony. In cases where such links fail, juries or judges have acquitted, as seen in a May 28, 2024, trial at Maidstone Crown Court, where a defendant was unanimously cleared of cocaine conspiracy charges after jurors deliberated for less than one hour, citing insufficient proof of handle ownership. Additional defenses target the reliability of the hacked data itself, highlighting inaccuracies in its formulation, sorting, and potential contamination during French authorities' infiltration via deployed in 2019–2020. Critics, including legal scholars, have raised fair trial concerns under Article 6 of the , pointing to limited defense access to raw data logs and the absence of standardized protocols, which could allow unchallengeable prosecutorial interpretations. In the , while appellate courts like the Court of Appeal have largely upheld admissibility by classifying interceptions as stored data rather than live transmissions, individual challenges succeed when is questioned, as in a 2024 secured by emphasizing flaws. Procedural objections invoke cross-border data transfer legality, with defenses claiming violations of data protection rules or French interception laws lacking judicial oversight, potentially rendering fruitless under mutual legal assistance treaties. In , the Cour de Cassation has remanded cases for lacking "certificates of veracity" verifying data authenticity, though it affirmed the overall lawfulness of the operation in rulings up to 2022. Acquittals on these grounds remain limited; for instance, in a May 2022 Dutch trial of a gang linked to EncroChat-discovered torture facilities, one was acquitted amid evidentiary disputes, while others received sentences up to 16 years. Overall, while systemic challenges to EncroChat evidence have yielded few wholesale exclusions— with bodies like the European Court of Justice dismissing broader admissibility complaints in 2023–2024—targeted factual defenses have produced sporadic acquittals, underscoring evidentiary vulnerabilities in attributing digital communications to physical actors. These outcomes highlight the platform's role in generating voluminous but circumstantial intelligence, where prosecutorial success hinges on supplementary proof beyond hacked logs.

Cross-Border Jurisdictional Disputes

The infiltration of EncroChat's servers by authorities in 2020 generated evidence used in criminal proceedings across multiple countries, prompting disputes over the legality of cross-border data transmission and admissibility under law. investigators, via a joint investigation team with authorities, intercepted over 120 million messages from approximately 60,000 users spanning more than 120 countries, primarily sharing data through Investigation Orders (EIOs) pursuant to Directive 2014/41/. Defendants in non- jurisdictions argued that the evidence, obtained without equivalent local warrants or oversight, violated national procedural rules and fundamental rights, including privacy under Article 7 of the Charter of Fundamental Rights and fair trial protections under Article 47. In , where EncroChat data featured in over 2,250 investigations leading to 750 arrests, courts diverged on admissibility. The ruled in 2022 that data lawfully gathered in could be used via EIO, emphasizing mutual recognition principles. Conversely, the Berlin Regional Court declared it inadmissible in a January 2025 narcotics case, citing the absence of a judicially issued EIO and potential breaches of German interception laws requiring domestic equivalents. The German rejected a related constitutional complaint in December 2024, upholding admissibility provided fair trial rights were safeguarded, but noted ongoing scrutiny of data reliability and defense access. The Court of Justice of the (CJEU) addressed these tensions in Case C-670/22 M.N. (EncroChat), ruling on April 30, 2024, that public prosecutors may issue EIOs for transmitting evidence lawfully obtained in another , even if the gathering method would not comply with the issuing state's rules. The judgment clarified that admissibility hinges on post-transmission for compliance, rejecting blanket exclusion but permitting national courts to discard evidence if it irreparably undermines fair trials, such as through unverifiable attribution or inadequate defense challenges. This resolved interpretive conflicts under the EIO Directive, prioritizing mutual trust while mandating assessments, though critics from defense groups contended it insufficiently addresses systemic opacity in foreign hacks. Similar challenges arose in the UK, where the Court of Appeal confirmed admissibility in 2021, classifying interceptions as stored data under the Investigatory Powers Act, but faced ECHR applications alleging Article 8 violations. In the , as a co-lead in the , courts generally accepted the evidence with minimal disputes due to direct involvement. These cases underscored tensions between rapid cross-border cooperation—facilitated by and —and national sovereignty, with the CJEU framework reducing but not eliminating variances, as evidenced by persistent acquittals or exclusions in select proceedings.

Comparative Analysis and Legacy

Similar Encrypted Platforms and Their Fates

, a Canada-based provider of modified encrypted devices marketed exclusively to groups for secure communications, was dismantled by the FBI in March 2018 following a multi-year that revealed its role in facilitating drug trafficking and other illicit activities across and . The operation resulted in the arrest of CEO Vincent Ramos, who was convicted in 2019 and sentenced to nine years in prison for conspiring to provide services to drug traffickers, with evidence including undercover purchases and intercepted communications showing the devices' use in coordinating large-scale narcotics shipments. Post-takedown, authorities seized millions in assets linked to the enterprise, including funds in , underscoring the platform's profitability from criminal subscriptions exceeding $10,000 per device. Sky ECC, a Belgian-operated encrypted messaging service using specialized handsets, gained prominence among European criminal networks after EncroChat's compromise in 2020, boasting over 170,000 users worldwide for plotting drug imports, assassinations, and via . In March 2021, a joint French, Belgian, and Dutch operation known as cracked its proprietary , decrypting over one billion messages and leading to the service's shutdown after terminated backend support; this yielded hundreds of arrests, 1.8 tons of seized, and insights into 1,000 ongoing probes across Europe. The decryption stemmed from technical vulnerabilities and server seizures, highlighting Sky ECC's overreliance on a single encryption key despite claims of military-grade security. Subsequent platforms like , a French-developed encrypted app targeting , faced a similar fate in February 2023 when a multinational effort infiltrated its network, arresting 45 suspects and seizing 12 kilograms of drugs and €1.5 million in cash during coordinated raids in and beyond. More recently, , another encrypted service promoted as a secure alternative post-Sky ECC, was taken down in December 2024 by and authorities in a joint operation that disrupted its infrastructure and arrested key operators, preventing its use in facilitating rings. These takedowns reflect a pattern of exploiting backend access, device modifications, or sting operations—such as the FBI's platform in 2021, which posed as secure but relayed messages to authorities, ensnaring 800+ criminals—demonstrating that no proprietary criminal encrypted system has evaded prolonged international scrutiny.

Implications for Future Secure Communications

The compromise of EncroChat in , achieved through a technical intrusion by authorities that injected into the network's update servers, exposed the inherent vulnerabilities of centralized, proprietary encrypted communication platforms marketed to criminal users. This operation captured over 100 million messages from approximately 60,000 devices between March and June , demonstrating that even systems designed with anti-forensic features—like remote wiping and GPS disabling—could be systematically undermined without physical device access. The success relied on exploiting a in the service's , underscoring how reliance on closed ecosystems facilitates large-scale by state actors with advanced capabilities. In response, groups fragmented their communications, shifting toward smaller, invite-only platforms such as Sky ECC (taken down in 2021) and more recent services like and (dismantled in 2024), but this pattern has repeated with repeatedly compromising successors through similar tactics, including server seizures and metadata analysis. Empirical evidence from these operations indicates no durable escape via proprietary alternatives, as centralized elements—servers, billing, or user vetting—remain exploitable, prompting a gradual to decentralized or open-source tools like those based on the Matrix protocol or apps (e.g., Tox or Session). For future secure communications among high-risk users, the EncroChat legacy emphasizes the necessity of eliminating single points of failure through fully distributed architectures, such as blockchain-integrated messaging or ephemeral, device-native without vendor dependencies, though operational realities—like the need for reliable uptime and user onboarding—limit adoption. adaptations, including direct device and international data-sharing under frameworks like the Multidisciplinary Platform Against Criminal Threats (EMPACT), suggest that while itself persists as a barrier to casual , behavioral and infrastructural compromises will continue to erode perceived invulnerability. This dynamic has broader ramifications, as precedents for bulk technical intrusions on criminal networks could normalize expanded techniques, though confined primarily to targeted, non-public services rather than mass-market tools.

Effectiveness of International Law Enforcement Cooperation

The takedown of EncroChat in June 2020 was spearheaded by a Joint Investigation Team (JIT) comprising French and Dutch authorities, with coordination from Europol and Eurojust, enabling the interception and analysis of over 100 million messages from approximately 60,000 users. This framework facilitated real-time data sharing across borders, including to the United Kingdom, Sweden, Norway, Germany, and beyond, reaching operations in 123 countries by 2023. International cooperation yielded substantial operational successes, including 6,558 arrests worldwide, the seizure of assets valued at nearly €900 million, over 100 tonnes of , 160 tonnes of , and three tonnes of as of June 2023—three years post-dismantling. These outcomes disrupted multiple organized crime groups (OCGs) involved in drug trafficking, , and violence, providing with unprecedented insights into criminal networks that spanned continents. Europol's analytical support since 2018 amplified these results by correlating EncroChat data with other intelligence streams, foiling plots and enabling synchronized raids. Despite these gains, effectiveness was tempered by cross-border legal hurdles, particularly in evidence admissibility, as defendants in countries like the and contested the French-originated data for alleged violations of mutual legal assistance protocols and procedural safeguards. While the Court of Justice of the EU affirmed admissibility in certain cases under strict conditions, such as verifying chain-of-custody and user attribution, inconsistencies in national standards led to evidentiary exclusions and appeals, underscoring gaps in EU-wide . Overall, the EncroChat operation exemplified how JITs and centralized agencies like can achieve scale in combating encrypted criminal communications, but persistent jurisdictional frictions reveal the limits of current frameworks, necessitating enhanced pre-agreed evidence-sharing mechanisms to sustain prosecutorial impact without compromising .

References

  1. [1]
    Encrochat: An Introduction - Proximal Consulting
    Nov 18, 2020 · Criminals no longer need to loiter in public phone boxes, talking in some kind of code: instead they can get a military grade encrypted ...
  2. [2]
    EncroChat Hack: Why it Happened and What it Means for the User
    EncroChat offered its users the ability to send encrypted messages, make encrypted call (EncroTalk) and write encrypted notes (EncroNotes). This is achieved ...Missing: platform facts
  3. [3]
    [PDF] The Encrochat Story - New Park Court Chambers
    Jul 13, 2020 · Once enabled with EncroChat, they are believed to have sold for about £1,500 for six months' use. Thus, EncroChat was an expensive and, ...<|control11|><|separator|>
  4. [4]
    Dismantling of an encrypted network sends shockwaves ... - Europol
    Jul 2, 2020 · In early 2020, EncroChat was one of the largest providers of encrypted digital communication with a very high share of users presumably engaged ...
  5. [5]
    Dismantling encrypted criminal EncroChat communications leads to ...
    Jun 27, 2023 · The dismantling of the encrypted communications tool EncroChat, widely used by organised crime groups (OCGs), has so far led to 6 558 arrests worldwide.
  6. [6]
    800 criminals arrested in biggest ever law enforcement operation ...
    Jun 8, 2021 · In July 2020, the EncroChat encrypted platform was dismantled by the Operational Taskforce EMMA (France, the Netherlands). This international ...
  7. [7]
    NCA and police smash thousands of criminal conspiracies after ...
    EncroChat was one of the largest providers of encrypted communications and offered a secure mo b ile phone instant messaging service, b ut an international law ...Missing: facts | Show results with:facts
  8. [8]
    [PDF] Common Challenges in Cybercrime 2024 - Europol - European Union
    Apr 30, 2024 · The EncroChat case is a landmark ruling given by the CJEU on 30 April 2024, which clarifies the conditions for the transmission and use of ...<|separator|>
  9. [9]
    Cops Hacked Thousands of Phones. Was It Legal? - WIRED
    Jan 4, 2023 · Around 60,000 people were signed up to the EncroChat phone network, which was founded in 2016, when it was busted by cops.Missing: initial setup
  10. [10]
    EncroChat: The shadowy Dutch 'tech firm' that sold 'encrypted phones'
    Jul 2, 2020 · The business of secrets: The firm behind EncroChat. EncroChat is based in the Netherlands, but says it had offices in Latin America and Turkey.Missing: origin | Show results with:origin<|control11|><|separator|>
  11. [11]
    EncroChat: What it is, who was running it, and how did criminals get ...
    Jul 3, 2020 · The encrypted messaging system first came to the attention of the French Gendarmerie in 2017, which said it was regularly finding the phones ...Missing: setup | Show results with:setup
  12. [12]
    the hack that changed policing forever - Liverpool Echo
    May 19, 2024 · However, Dutch journalist Jan Meeus claimed a Dutch organised crime group was involved and financed the developers. Following the hack, Vice ...
  13. [13]
    EncroChat Hacked by Police - Schneier on Security -
    Jul 3, 2020 · Encrochat's phones are essentially modified Android devices, with some models using the “BQ Aquaris X2,” an Android handset released in 2018 ...
  14. [14]
    7.2 EncroChat: Dismantling of an encrypted network used ... - Eurojust
    Jul 2, 2020 · A joint investigation to dismantle EncroChat, an encrypted phone network widely used by criminal networks across the European continent and beyond.Missing: timeline | Show results with:timeline
  15. [15]
    [PDF] AI and policing - Europol
    The EncroChat takedown serves as a paradigm for the effective integration of large and complex datasets analytics in combating organised crime.
  16. [16]
    Crooks' Mistaken Bet on Encrypted Phones | The New Yorker
    Apr 17, 2023 · In 1895, a police officer in Manhattan who had once worked for a telephone company, and whose name has been lost to history ... EncroChat and Sky ...
  17. [17]
    Inside the Italian Mafia's Encrypted Phone of Choice - VICE
    May 11, 2023 · 1 BC's main competitors, like Sky and Encrochat. One former No. 1 BC seller told Motherboard the company was at some point “big on the market ...
  18. [18]
    Three years on, EncroChat cryptophone hack nets 6,500 arrests and ...
    Jun 27, 2023 · Eurojust national member for France Baudoin Thouvenot said that the operation to infiltrate EncroChat, which had over 60,000 users, provided ...
  19. [19]
    [PDF] 20240326 Encrochat RWC - IACR
    “It is the contention of the prosecution that the Encrochat system is used exclusively by criminals engaged in serious organised crime. The reasons provided ...<|separator|>
  20. [20]
    How Police Secretly Took Over a Global Phone Network for ... - VICE
    Jul 2, 2020 · On Encrochat, criminals spoke openly and negotiated their deals in granular detail, with price lists, names of customers, and explicit references to the large ...Missing: initial setup
  21. [21]
    EncroChat: What You Need to Know - Harewood Law
    Aug 10, 2020 · On the 13th June 2020, EncroChat, one of the world's largest encrypted communication providers, sent a message to its 60,000 subscribers, 10,000 ...
  22. [22]
    404 Not Found | Europol
    **Insufficient relevant content**
  23. [23]
    The dark phones (Encrochat) — Criminals are building their own ...
    Jul 20, 2020 · We will call them “dark phones”. They now provide a user friendly, ultra secure platform for criminals to exchange and coordinate.Missing: competitors | Show results with:competitors
  24. [24]
    EncroChat: What is it and why did criminals use it? - Cyfor
    EncroChat was one of the world's largest encrypted communications services before it was infiltrated by police forces, disrupting the encrypted network.Missing: history | Show results with:history
  25. [25]
    When Police Are Hackers: Hundreds Charged as Encrypted ...
    no camera, microphone, or GPS — for about $1,100.<|control11|><|separator|>
  26. [26]
    European Police Malware Could Harvest GPS, Messages ... - VICE
    Sep 15, 2020 · Encrochat took a base Android device, installed its own software, and physically removed the GPS, microphone, and camera functionality to lock ...
  27. [27]
    Encrypted Phone Firm Encrochat Used Signal Protocol - VICE
    Mar 23, 2021 · The phones had a feature that would wipe the device's contents if the user entered a specific PIN, and also ran two operating systems side-by- ...Missing: specifications modifications
  28. [28]
    Decoding EncroChat: Admissibility - Pump Court Chambers
    Jan 10, 2022 · The EncroChat service, which guaranteed anonymity for its customers at a charge of approximately £1,500 for the use of a phone for 6 months, was ...
  29. [29]
    EncroPhone - EncroChat network
    Security is guaranteed using our EncroChat Messaging Protocol. This is an end-to-end encryption messaging protocol which provides excellent forward and future ...
  30. [30]
    EncroChat dismantling led to 6,558 arrests and the seizure of $979 ...
    Jun 28, 2023 · The application includes self-destruct messages and a 'remote wipe' feature to remotely wipe data on the handset in case of emergency.
  31. [31]
    EncroChat 1 – An introduction for the uninitiated - Salhan & Company
    Oct 19, 2022 · EncroChat was used extensively in serious organised crime, including drug dealing, smuggling, gang violence, firearms offences and people ...Missing: primary motivations
  32. [32]
    Encrochat: Secret network messages can be used in court, judges rule
    Feb 5, 2021 · The National Crime Agency believes Encrochat was mainly used by criminals, often to trade drugs and guns. The judgement will have major ...Missing: primary motivations
  33. [33]
    EncroChat Bust Leads to 6,558 Criminals' Arrests and €900 Million ...
    Jun 27, 2023 · A majority of EncroChat users are said to be members of organized crime rings (34.8) and drug trafficking groups (33.29%). The remainder engaged ...Missing: demographics | Show results with:demographics
  34. [34]
    NCA and police smash thousands of criminal conspiracies after ...
    Jul 2, 2020 · The EncroChat servers have now been shut down. Operation Venetic is the biggest and most significant operation of its kind in the UK ...
  35. [35]
    EncroChat hearings delayed as lawyers seek disclosure on police ...
    Apr 1, 2021 · Belgian and Dutch police disclosed during a press conference on 10 March 2021 that they had intercepted more than one billion encrypted messages ...
  36. [36]
    EncroChat takedown led to 6,500 arrests and $979 million seized
    Jun 27, 2023 · Europol announced today that the takedown of the EncroChat encrypted mobile communications platform has led to the arrest of over 6600 ...<|separator|>
  37. [37]
    ECJ Ruled in EncroChat Case - eucrim
    Aug 12, 2024 · ... EncroChat mobile phones that enabled end-to-end encrypted communication through special software and modified hardware. Looking at the ...
  38. [38]
    Operation Emma - Dismantling EncroChat, an encrypted ... - Europol
    In July 2020, the EncroChat encrypted platform was dismantled by the Operational Taskforce EMMA (France, the Netherlands with the support of Europol).Missing: facts | Show results with:facts
  39. [39]
    EncroChat hack evidence wasn't obtained illegally, High Court of ...
    Nov 13, 2020 · A three year operation by the French and Dutch police and courts, codenamed Operation Emma, resulted in the French imaging an EncroChat ...
  40. [40]
    What happens when the police crack an encrypted phone network ...
    This assertion that EncroChat was built with illegal uses in mind formed an important part of the French police's justification for trying to hack the network.
  41. [41]
    [PDF] Legal aspects of the EncroChat- and SkyECC operation
    Oct 2, 2023 · Subsequently, the Netherlands developed a so-called. 'Man In The Middle technique' (MITM technique), which enabled the decryption of message ...
  42. [42]
    Encrypted phone service 'Encrochat' shutdown leads to 6500 arrests ...
    Jun 27, 2023 · Partial results of Encrochat-linked investigations have previously been announced by French, Dutch, and British police in 2020 and by German ...Missing: demographics | Show results with:demographics
  43. [43]
    Operation Dark Phone: Murder By Text – this jaw-dropping tale of ...
    Jul 26, 2025 · In 2020, international police hacked the encrypted phone network EncroChat, used by organised crime gangs across the globe. For 74 days ...
  44. [44]
    Encrochat: The hacker with a warrant and fair trials? - ScienceDirect
    All communication between Encro-devices was end-to-end encrypted (O'Rourke, 2020) making decryption warrants or server access warrants useless. They support ...
  45. [45]
    Legal Aspects of the EncroChat-Operation - Montaigne Centre Blog
    Jan 9, 2023 · In the EncroChat operation, French law enforcement authorities collected over 120 million messages from 60.000 EncroChat users.
  46. [46]
    The Latest EncroChat ruling from the French 'Supreme Court'
    In June 2020 the EncroChat hack became public knowledge. Courts across Europe have considered the implications and admissibility of data obtained.<|separator|>
  47. [47]
    EncroChat 3: Attribution in EncroChat cases - Salhan & Company
    Dec 1, 2022 · Evidence and attribution within EncroChat cases can be complex. Attribution in particular is difficult as the network disabled standard location services.Missing: methods | Show results with:methods
  48. [48]
    Five years since EncroChat users realised the game was up
    Jun 13, 2025 · Today marks five years since thousands of drug dealers using encrypted devices realised the network they thought was secret had in fact been infiltrated by law ...Missing: modifications | Show results with:modifications
  49. [49]
    Police Arrested Hundreds of Criminals After Hacking Into Encrypted ...
    Jul 3, 2020 · On June 13, EncroChat realized the platform had been penetrated and sent a message to users urging them to throw away their devices as its ...Missing: announcement | Show results with:announcement
  50. [50]
  51. [51]
    In EncroChat scandal, France accuses a little-known Canadian tech ...
    Jun 14, 2024 · ... June, 2020, when EncroChat blasted an emergency message to users. “Today we had our domains seized illegally by government entities,” it ...
  52. [52]
    Hundreds arrested after police infiltrate secret criminal phone network
    Jul 2, 2020 · The NCA said it had made 746 arrests, and seized £54 million ($68 million) in cash, 77 firearms and more than two tons of drugs during the ...Missing: initial | Show results with:initial
  53. [53]
    European police crack encrypted phones, arrest hundreds
    Jul 2, 2020 · Britain's National Crime Agency said it used EncroChat data to launch investigations that led to the arrest of 746 suspects and the seizure of ...
  54. [54]
    Encrochat bust leads to 6500 arrests, seizure of $1B in assets
    Jun 28, 2023 · An international investigation intercepted and analyzed over 115 million conversations that took place over the encrypted messaging platform ...
  55. [55]
    A prison break, a £190m cocaine plot & money laundered through ...
    Mar 7, 2025 · OCP officers arrested Byrne and Devlin in October 2020. At Byrne's address they seized £20,000 in cash from a bedside drawer, correspondence ...Missing: assets | Show results with:assets<|separator|>
  56. [56]
    Operation Venetic: Leeds-based cocaine and amphetamine ...
    Four final members of an organised crime group that peddled drugs and firearms across the north of England have been jailed following a long-running National ...
  57. [57]
    Crime group members sentenced in relation to North East England ...
    Oct 3, 2025 · A group of criminals from the North East who oversaw the importation of large amounts of cocaine – including loads concealed in empty gas ...
  58. [58]
    Operation Venetic: More than 50 arrests in 'unprecedented' crime raids
    Jul 2, 2020 · More than 50 people have been arrested in Scotland as part of a major UK-wide operation which has dismantled several organised crime gangs.
  59. [59]
  60. [60]
    CURIA - Documents
    ### Summary of CJEU Judgment in Case C-670/22 M.N. (EncroChat Data as Evidence)
  61. [61]
    Is evidence obtained from EncroChat admissible in criminal ...
    Feb 10, 2021 · The Court went on to reject the Defence argument that the evidence could not be admitted because the NCA had not applied for a mutual assistance warrant.<|separator|>
  62. [62]
    What France's Supreme Court Decision Re EncroChat Evidence ...
    Nov 22, 2022 · In 2021, the Court of Appeal ruled that messages and photographs acquired through EncroChat were admissible as evidence as they were accessed ...Missing: Netherlands | Show results with:Netherlands
  63. [63]
    Dutch Supreme Court approves use of EncroChat evidence
    Feb 14, 2024 · The Dutch Supreme Court has upheld the use of intercepted messages from an encrypted phone network, EncroChat, in a criminal conviction.Missing: company | Show results with:company
  64. [64]
    German court finds hacked EncroChat phone evidence inadmissible
    Jan 8, 2025 · French and Dutch police harvested messages from 4,600 EncroChat phone users in Germany and tens of thousands of phone users in other countries ...
  65. [65]
    EncroChat cocaine dealers from Essex jailed for £48m plot - BBC
    Sep 17, 2025 · Members of an organised crime group are jailed after an international drug plot is uncovered.
  66. [66]
    Operation Venetic: Notorious gangland armourer 'Aceprospect ...
    ... EncroChat has been sentenced to 26 years and eight months in prison, following a National Crime Agency investigation. Philip Waugh, 40, supplied terrifying ...
  67. [67]
    Major North East Organised Crime Group Jailed for Multi-Million ...
    Oct 17, 2025 · Major North East Organised Crime Group Jailed for Multi-Million Pound Drug Operation · Shaun Monaghan was sentenced to 27 years in jail · Bryn ...
  68. [68]
    Dutch court jails drugs gang who built torture room and cells in ...
    May 11, 2022 · A Dutch court has sentenced 11 men to between one and nine years for maintaining an “underworld prison” with a torture chamber, hidden in shipping containers.Missing: major | Show results with:major
  69. [69]
    Infamous Dutch cocaine trafficker begins 15-year jail sentence
    Apr 12, 2022 · Alongside Costa, who was convicted of importing cocaine, money laundering, and participation in a criminal organisation, six others were ...
  70. [70]
    Multi-million pound drug and gun gang jailed for almost 207 years ...
    Aug 14, 2025 · Jamie Rothwell, 38, of Grindon Avenue, Salford, was sentenced at Manchester Crown Court, along with nine associates, who were jailed for a ...Missing: major | Show results with:major
  71. [71]
    Op Venetic: Drug supply ringleaders sentenced after EncroChat ...
    Sep 6, 2023 · Today [6 September] at Leeds Crown Court O'Flaherty was sentenced to 17 years and 10 months imprisonment Shepherd to nine years and six months ...Missing: major | Show results with:major<|separator|>
  72. [72]
    Dean George KC in Encrochat acquittal - 2BR - Barristers Chambers
    May 16, 2024 · A substantial challenge was made based on the unreliability and inaccuracy of Encrochat material, the way it is formulated, used and sorted, and ...Missing: defense | Show results with:defense
  73. [73]
    Jonathan Green's client found Not Guilty in Encrochat cocaine trial
    May 28, 2024 · After less than one hour of deliberation, the jury unanimously acquitted the defendant at Maidstone Crown Court on all charges.
  74. [74]
    EncroChat Evidence Upheld (For Now): R v Murray & Others
    The Court of Appeal rejected challenges to EncroChat evidence, upholding convictions in a drug conspiracy case, and will continue to consider it admissible.Missing: defense | Show results with:defense<|separator|>
  75. [75]
    Case-law - CURIA - Documents - European Union
    Oct 26, 2023 · Challenges against criminal convictions resulting from the intercepted EncroChat data are making waves across the highest courts in Europe, (4) ...
  76. [76]
    Constitutional complaint challenging conviction based on EncroChat ...
    Dec 3, 2024 · The complainant in the case challenged the use of evidence obtained by French authorities from the so-called EncroChat platform, which was provided to German ...Missing: methods | Show results with:methods
  77. [77]
    The CJEU Ruled that the EncroChat Data can be Admissible ...
    Sep 1, 2025 · According to AG, France was required under Article 31 to alert German authorities, after identifying a high number of EncroChat users in Germany ...
  78. [78]
    AG: EncroChat Data Can, in Principle, Be Used in Criminal ... - eucrim
    Feb 8, 2024 · He argued that German law enforcement authorities unlawfully received the evidence from France and the evidence cannot be used in the criminal ...
  79. [79]
  80. [80]
    62022CJ0670 - EN - EUR-Lex - European Union
    Judgment of the Court (Grand Chamber) of 30 April 2024. Criminal proceedings against MN. Request for a preliminary ruling from the Landgericht Berlin.
  81. [81]
    Court of Justice clarifies cross-border evidence transmission in ...
    Internal Market - Justice & Litigation. April 30, 2024. Court of Justice clarifies cross-border evidence transmission in EncroChat case.
  82. [82]
  83. [83]
    Criminal cases with evidence from EncroChat and ANOM
    Jul 5, 2021 · The Court of Appeal decided that the EncroChat messages were intercepted when being stored, and that they are admissible in criminal proceedings as a result.
  84. [84]
    Interceptions, Encrochat and Foreign Jurisdictions
    Jul 10, 2020 · With the detonation of recent press coverage on Encrochat, this article will discuss some of the issues raised in early press releases.
  85. [85]
    Data-Driven Investigations in a Cross-Border Setting - eucrim
    Jan 21, 2025 · In this article, the authors analyse some of the challenges and achievements they see in cross-border data-driven investigations.
  86. [86]
    Phantom Secure Takedown - FBI
    Mar 16, 2018 · Phantom Secure was a criminal enterprise that provided secure communications to high-level drug traffickers and other criminal organization leaders.
  87. [87]
    Millions in Assets of Encrypted Telecommunications Criminal ...
    Dec 14, 2020 · “The FBI's unrelenting work to take down transnational criminal organizations like Phantom Secure and recoup their illegal financial gains ...
  88. [88]
    New major interventions to block encrypted communications of ...
    Mar 10, 2021 · By successfully unlocking the encryption of Sky ECC, the information acquired will provide insights into criminal activities in various EU ...<|separator|>
  89. [89]
    Operation SKY ECC - Europol
    Although Sky ECC was officially shut down in March 2021, hundreds of millions of encrypted messages remain available. These contain valuable insights into ...
  90. [90]
    Encrypted Phone Firm 'Sky' Shuts Down - VICE
    Mar 17, 2021 · Encrypted phone company Sky has shut its communications platform down after BlackBerry, which provided services to the firm, cut them off.
  91. [91]
    Encrypted Messaging App Exclu Used by Criminal Groups Cracked ...
    Feb 7, 2023 · Joint law enforcement operation cracks #Exclu, an encrypted messaging app used by organized crime groups, resulting in 45 arrests.
  92. [92]
    International operation takes down another encrypted messaging ...
    Dec 3, 2024 · A joint investigation team (JIT) involving French and Dutch authorities has taken down another sophisticated encrypted messaging service, MATRIX.Missing: initial | Show results with:initial
  93. [93]
    FBI's Encrypted Phone Platform Infiltrated Hundreds of Criminal ...
    Jun 8, 2021 · The ANOM platform - unlike Phantom Secure, EncroChat, and Sky Global - was exploited by the FBI from the very beginning of ANOM's existence and ...
  94. [94]
    The EncroChat police hacking sets a dangerous precedent | Privacy
    Jul 25, 2020 · Some 800 people were arrested during a cross-nation police operation in Europe after the encrypted chat app EncroChat was hacked in early July 2020.
  95. [95]
    Police seize Matrix encrypted chat service after spying on criminals
    Dec 3, 2024 · An international law enforcement operation codenamed 'Operation Passionflower' has shut down MATRIX, an encrypted messaging platform used by cybercriminals.
  96. [96]
    Police announce takedown and arrest mastermind behind criminal ...
    Sep 18, 2024 · Ghost, an encrypted communications platform used by organized crime groups, has been dismantled by a global law enforcement operation.<|separator|>
  97. [97]
    Encrypted Communication Apps: From Telegram to EncroChat
    Nov 28, 2024 · This episode of The Dark Dive focuses on encrypted communication apps, including Telegram, Tox, Signal, Session, and Jabber.
  98. [98]
    Police Hack Into 'Ghost', An Encrypted Platform for Criminals
    Sep 18, 2024 · Criminals are moving away from massive brand names like Sky or Encrochat which had tens of thousands of users, to a decentralized collection of ...
  99. [99]
    THE USE OF ENCRYPTED COMMUNICATIONS BY CRIMINALS
    Dec 12, 2021 · Criminals have increasingly used encrypted channels, like Telegram and Signal, as a method of communication in order to avoid law enforcement ...
  100. [100]
    Will EncroChat case put encrypted messages at surveillance risk?
    Jul 24, 2024 · The EncroChat case has revealed a disturbing potential privacy crisis as police could use bulk surveillance techniques on encrypted ...<|control11|><|separator|>
  101. [101]
  102. [102]
    EncroChat's path to Europe's highest courts | Think Tank
    Dec 16, 2022 · This paper provides background on the EncroChat operations and an overview of the trends in French, German and UK jurisprudence.
  103. [103]
    Cross-border evidence sharing OK in 'WhatsApp for criminals' case ...
    Oct 26, 2023 · Defense lawyers are challenging the methods and court orders used to hack EncroChat; accusing authorities of breaking cross-border evidence- ...