George ‘The Penguin’ Mitchell has been formally designated as a suspect by German police investigating an encrypted phone network busted this week.
Mitchell, who goes by the name ‘Mr Green’, is understood to be the 71-year-old Irishman listed as part of five major suspects behind the Exclu network, which was taken down by police months after it was secretly hacked by Dutch police.
It was developed over several years in an underground bunker in Germany’s Mosel Valley and Mitchell is suspected of being one of the owners of the system as well as the senior sales executive whose reputation sold the promise of privacy to 3,000 users.Police believe the system was being used by gangs involved in top-level organised crime, mainly based in the Netherlands but also in Sweden, France, Germany and Italy. It was compromised by the police hack over a period of five months when intelligence on the criminal groups and their activities was gathered.
Officers from the Dutch National High Tech Crime Unit began working with their German counterparts last April 2022 and cracked the codes sometime around the following September.
Unknown to the users, police then began to listen live as drug, cash and firearms were bought and sold and serious organised crime was planned.
Twelve hundred officers from the co-operating countries were involved in raids on 79 premises and the discovery of two drug laboratories and cocaine storage facility. Drugs, guns, weapons, luxury goods and cash was also seized as 45 people were arrested.
German police are investigating the set up of Exclu and those behind it’s development on the basis that they are suspected of facilitating organised crime by providing the ‘hack resistant’ phone system.
Mitchell’s long-term friend and business partner Hermann Johann Xennt, from the Netherlands, a Polish software developer, a Spanish tech expert and another unidentified individual are under investigation for their roles in Exclu.
Xennt is currently serving a sentence for his role in the German bunker, which was raided in 2019 by 650 police. There they discovered numerous computer servers and found that it was a secret hub of dark net activities, including drug dealing, pornography and weapons.
Customers to Exclu were sold a specially developed phone and a licence to use the app service for €500 for three months.
German police have already named George ‘The Penguin’ Mitchell as their number one target in their previous investigation into the cyber bunker, and wire-tapped 16 of his phones as they gathered evidence on the dark net bunker. However, they did not charge him during a massive trial in Trier which came to it’s end last year.
Over the course of the trial, it emerged he was under surveillance for years as he visited the bunker and met withXennt, the self-professed Lord of the Darknet.
Secret files obtained by the Sunday World show how officers believed he was the boss of a cyber gang working out of it.
The explosive files reveal how officers in Europe believe Mitchell deals directly with Colombian cartels; supplies drugs and weapons to Northern Ireland; imports tonnes of cocaine into Europe, floods Holland with heroin, and is under investigation for money laundering in Spain.
They also claim he may have been involved in a Kinahan Cartel murder in 2014 and had a role in the feud between the mob and the Hutch gang, although Irish police sources claim he has stayed firmly neutral.
The wire taps and covert surveillance on Mitchell from a period from 2015 detail how he met with the head of the Bandidos biker gang and a leading figure in the Hell’s Angels in Germany to flog them encrypted phones with an app that would keep their activities under the radar.
At the time, the files reveal he planned to sell expensive €1,200-a-unit Blackberry phones coupled with a €3,000 secure app for communications with an annual service fee of up to €50k, which guaranteed customers they would not be bothered by the authorities. The system developed in Warsaw in Poland came with a ‘panic button’ so customers could delete all data in an ‘emergency.’
The files show that phones were shipped to customers in Bogota and Medellin, home of the notorious Columbian drug cartel once headed by Pablo Escobar. Business from the bunker was also provided for criminal gangs in the Philippines, North Africa, Dubai, Canada, Belgium, the Netherlands, Poland and Scandanavia.
The lengthy investigation by Rhineland police culminated in a raid in September 2019 which saw police surround the bunker and seize control of it.
The Penguin’s business partner Herman Xennt was amongst more than 10 people arrested, but Mitchell was long gone.
The top target of the pricey probe was not amongst those later prosecuted in a year-long trial.
The Sunday World first tracked down Mitchell to Traben Trarbach, where we snapped him with Xennt. He had bought the former Cold War bunker in 2014 and registered it as a ‘data centre’.
At one point during the probe prosecutors applied to have 16 of Mitchell’s phones tapped but despite the huge volume of time and resources put into the operation, police were hampered by the secret language and codewords used by The Penguin and developed over years at the highest echelons of organised crime.
In applications to the courts for surveillance, details of Mitchell’s criminal empire were laid out. In 2014, he was suspected of smuggling 10kg of cocaine andguns from Holland to Northern Ireland.
He is said to have been involved in heroin trading in Holland and details of his son, Derek ‘Maradonna’ Dunne’s murder in Amsterdam in 2000 are given.
Files allege that he shipped cocaine from North Africa via Spain or Portugal to Holland in containers of oranges. The quantities are detailed as up to three tonnes a time.
In November 2016, he is cited as being behind a 283kg cocaine seizure in Brazil headed for Europe. Spanish police in Marbella are investigating him for money laundering, it is alleged.
Throughout the investigation into activities in the bunker, files detailed that Mitchell is ‘hierarchically’ above others.
In 2017, German investigators admitted they lost sight of him and the chief public prosecutor later said there was ‘no probably cause’ to prove he headed it up.
Now it seems Mitchell may not have escaped the law after all as he faces possible charges of helping mobs to commit their crimes.
ENCRYGMA.COM Offline “ Air Gapped” Super Encryption Mobile Machines & SuperEncrypted Cellular Phoness.
SuperEncrypted Communications: Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers. More Secure than a Face To Face Meeting.
WATCH THE VIDEO BELOW ⬇️
Cyber Defense Advisors ✅ WhatsApp/Telegram/Signal/Viber +372 5734 7873
info@DigitalBankVault.com or visit ENCRYGMA.com.
ENCRYGMA.COM Encryption Machines : The Highest Level of Cyber Defense for Secret Critical Data.
Mathematically Unbreakable Quantum Safe Encryption. Anti Interception. Anti Espionage. Anti Hacking. Anti Spyware . Anti Digital Forensic Data Extraction. Immune to Online Attacks.
PRIVACY IS LUXURY
SECRECY IS PRICELESS
Ultra Encrypted Communications
🇬🇧 CIPHER SYSTEMS & MOBILE ENCRYPTION MACHINES
Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales
If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Machine.
The ENCRYGMA.COM Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines & Ultra Encrypted Phones
Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.
Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.
More Secure than a Face To Face Meeting.
More details?
Consult with our
Cyber Defense Experts at : Info@DigitalBankVault.com
Visit us today at : https://www.digitalbank.capital
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
How it works ? Watch the video below 👇
Full technical details:
Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: ENCRYGMA.com .
“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System”
Penetration testings:
Visit us today at : https://www.digitalbank.capital/knox-encrypted-smartphone
ENCRYGMA.COM Cyber Defense Advisors ✅WhatsApp/Telegram/Signal/Viber +372 5734 7873
More details about our Military Encrypted iPhones , please visit : https://www.digitalbank.capital/encrygma
Cyber War Ultra Encrypted Communications.
More details? Consult with our cyber defense advisors at info@DigitalBankVault.com or visit ENCRYGMA.com
Visit us today at : https://www.digitalbank.capital/
TAGS:
Blackberry,Phantom Secure,Encrochat, Sky ECC, An0M, Blackphone Privy, Kaymera, Silent Circle,Katim, Intactphone,KryptAll,Cipher Phone, Omerta Digital,Diamond Secure,Ano Phone,K-iPhone,Purism Librem 5, Solarin From Sirin Labs, Sirin Labs Finney U1,Bittium Tough Mobile 2C, Silent Circle Blackphone 2, Encrygma SuperEncrypted Phone, Encrygma.com, most secure encrypted phone, Encrygma, Encrypted Phones for Sale
#PegasusSpyware #Encrochat #CyberProtection #cipherphone #SKYECC #encryptedphone #encryption #Encrypt #hacking #interception #ESPIONAGE #securecommunication #spyware
are cell phones encrypted
encrypted cell phone
encrypted smartphone
secure encrypted phone
encrypted mobile phone
encrypted phone for sale
encrypted phone service
fully encrypted phone
crypt phone
crypto phones for sale
fully encrypted cell phone
how to get an encrypted phone
mobile phone encryption device
phone encrypted for security
phone is encrypted for security
mobile phone encryption security
what does android encryption do
what does it mean if your phone is encrypted
what is encrypt phone
what is encrypting your phone
your phone is encrypted for security
best encrypted mobile phone
best encrypted phone
encrypted android os
encrypted cell phone communication
encrypted mobile phone suppliers
how to encrypt android phone calls
secure cell phone service
secure phone system
what does encrypt device mean
what does encrypt phone mean
what does encrypting my phone do
what does encrypting my phone mean
what does it mean encrypted phone
what does it mean your phone is encrypted for security
what happens when you encrypt your android phone
what is the meaning of encryption in mobile phone
whats an encrypted phone
best encrypted cell phone
cell crypt app
cell phone secure line
cell phone security in cryptography
cellular voice encryption
encrypt your phone android
encrypted phone os
encrypted phone uk
encrypted smartphone 2023
how encrypt phone
how to encrypt cell phone calls
how to encrypt cell phone communications
how to encrypt mobile devices
how to encrypt phone
how to know if my phone is encrypted
is my device encrypted
mobile encryption meaning
mobile phone call encryption
what happens if i encrypt my android phone
your phone is encrypted for security samsung
android decrypt data
android encryption
android encryption policy
android hardware encryption
android turn off encryption
app to encrypt android phone
aquarius encrypted mobile phone
are samsung phones encrypted
best cell phone for privacy
can i encrypt my android phone
cipher phone australia
cipher phone review
cipher phone specs
data encryption for android
does android encrypt data
encro phone for sale
how to encrypt apps on android
how to encrypt my android phone
how to encrypt my phone
how to encrypt phone calls iphone
how to encrypt your android phone
how to make a secure cell phone call
how to unlock an encrypted phone
iphone voice encryption
kryptall iphone for sale
kryptall phone cost
kryptall phone for sale
mobile device data encryption
mobile encryption app
mobile phone encryption software
most encrypted cell phone
most encrypted phone
ecure encrypted voip
secure voip iphone
securephone
should i encrypt my android tablet
should i encrypt phone
update encrypted android
what does encrypt by default mean
what is hardware encryption in android
your device is encrypted for security
best phone encryption software
best secure mobile phone in the world
black phone private os
buy encrochat phone
can an encrypted phone be tracked
can encrypted phone be hacked
cellcrypt download
cellcrypt inc
cellcrypt ltd
crypt app
crypt com
cypher phone australia
decrypt device android
decrypt my phone
device encryption
does encrypting phone slow it down
encrochat phone price
encrypt a file android
encrypt android tablet
encrypted file system android
encrypted group calls
encrypted mobile phone manufacturers
encrypted nokia phones
encrypted phone call app
encrypted phone number app
encrypted voice call app
encryption manager android
encryption of data storage on device
encryption settings
end to end encryption phone call
how to encrypt android tablet
how to encrypt files on android phone
how to encrypt iphone calls
how to encrypt note 2
how to encrypt note 5
how to encrypt phone calls on iphone
how to encrypt samsung phone
how to encrypt your android phone or tablet
how to encrypt your phone
how to make encrypted calls
how to secure a cell phone line
how to secure a phone line
how to secure phone calls
k iphone price
kryptall phone price
military encryption software for mobile phones
mobile encryption and decryption
mobile phone cipher
most private cell phone
most safest mobile phones
most secure cell phone carrier
most secure cell phone in the world
most secure phone
most secure phone on the market
most secure smart phones
most secure smartphone
most unhackable phone
secure id phone calls
secure mobile phones in india
secure phone calls iphone
secure phone line
secure smart phones
secure smartphone os
secure telephone
secure telephone service
secure voice
secure voice communication
secure voice conferencing
secure voip app iphone
should i encrypt my tablet
should you encrypt your smartphone
smartphone security hardware
super secure phone
the most secure smartphone
turn on encryption android
voice encryption
voip encryption software
what is encrypt device in samsung
what is the most secure mobile phone platform
best cell phone for law enforcement
best cell phone security
best phone for hacking
bureau of investigation
call scrambler app
calling cipher
can a flip phone be hacked
can a non smartphone be hacked
can cops hack your iphone
can cops hack your phone
can flip phones be tapped
can my blackberry be hacked
can police get into an iphone
can the government hack your phone
can the police hack your phone
cell phone data security
cell phone signal encryption
cell secure contact details
cellcrypt
chiffrement android
chiffrer android
cipher chat no internet connection
cipher ios
ciphr phone samsung
com lge sdencryption
communication security group
convert to file encryption android n
cryptic phone
crypto phones prices
cryptophone app
cryptophone australia
cryptophone ebay
military grade encryption phone
military secure phone
mobile cryptography
mobile data encryption techniques
mobile encryption techniques
mobile phone privacy laws
mobilecrypt
most private mobile phone
most safe android phone
most secure android os
most secure android phone
Comments