A pair of Essex drug dealers who used encrypted messaging platform EncroChat to run their criminal enterprise have been jailed for more than 25 years.
Officers from the Organised Crime Partnership – a joint National Crime Agency and Metropolitan Police Service unit – identified supplies of around 80 kilos of cocaine as part of their investigation into Robert Smith, 37, and Ismet Salih, 33, both from Grays in Essex. The men were also linked to the seizures of a further 123 kilos of cocaine, and had laundered profits of more than £1.25 million in cash.
Smith headed an organised crime group which supplied cocaine and cannabis to the Chadwell St Mary and Grays areas, and used Salih and Lee Twigg as his trusted seconds in command.
Smith and Salih referred to themselves as the ‘Chadwell Cartel’ in EncroChat exchanges, and messages exchanged revealed their aspirations of becoming gangsters like Ronnie and Reggie Kray.
Smith used the handle ‘demonfern’ to source the cocaine from a Dubai-based seller, who went by ‘blacknarco’ and ‘darkestnarco’.
Salih and associate Lee Twigg collected the cocaine from Smiths’s suppliers in the UK and then stored and distributed the drugs for him. They also ensured cash from the sale of the drugs made it back to the suppliers.
Smith and Salih exchanged more than 6,000 messages, predominantly about the sale of cocaine. Some of these contained ledgers relating to the profits made from customers, and money paid to their supplier for future stock.
The pair were arrested in September 2021, with investigators finding three kilos of cannabis with a wholesale value of up to £15,760 in Salih’s garden shed and evidence of a previous cannabis grow in his loft.
Smith had £7,635 in cash in a plastic bag within his shorts at the time of his arrest.
Smith and Salih were subsequently charged with drugs and money laundering offences, and admitted these at Basildon Crown Court. They were jailed for 16-and-a-half years and nine years respectively at the same court today (8 March).
Investigators established that Essex men Andrew Fraser and Christopher Low, Jamie Sheaves, from Kent, and Adil Bakali, from Wiltshire, were runners for Smith’s supplier. They have previously been jailed for a total of 39 years.
In October 2020 Fraser was stopped driving a van on the M25 Dartford Crossing in Kent. Two bags containing 20 kilos of cocaine with a street value of £1.6 million were found in the back, which he would have given to Salih had he not been arrested.
The following month, OCP officers saw Twigg put a black holdall into Bakali’s car, which was later stopped by police at the M1 Northampton Services. More than 21 kilos of cocaine with a street value of almost £1.7 million were found in bags in the back of the car.
Twigg was arrested for this offence, and for the seizure of a further 3.5 kilos of cocaine which were found in his garage and an underground hide in his garden shed. A cannabis farm was also found in his loft.
The cocaine seized at Twigg’s home had been supplied by Sheaves, who also provided drugs to Salih. Sheaves was also in contact with the same person in Dubai.
Low was jailed after 40 kilos of cocaine with a street value of £3.2 million was found in the boot of a black Jaguar XF in Brentford, west London. He was also found to have supplied another man, Kevin Malthouse, with five kilos of cocaine.
The Organised Crime Partnership’s investigation formed part of Operation Venetic, the UK law enforcement response to the July 2020 takedown of the EncroChatencrypted communication service.
Andrew Tickner, from the Organised Crime Partnership, said: “Robert Smith and Ismet Salih were behind a criminal network which saw vast amounts of cocaine sold in Essex and beyond.
“Their dream of becoming gangsters like the Kray twins was swiftly shattered by our investigation. Instead, their reality is lengthy prison sentences.
“Using the strong partnership between the NCA and Met Police, we will continue to pursue organised criminals fuelling the class A drug trade.”
ENCRYGMA.COM CIPHER MACHINES
Ultra Encrypted IPhone XS Max at € 4000 Euros. One time payment, no subscription fees.
WhatsApp/Telegram/Signal/Viber
+372 5734 7873
ENCRYGMA.COM Offline “ Air Gapped” Super Encryption Mobile Machines & SuperEncrypted Cellular Phoness.
SuperEncrypted Communications: Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers. More Secure than a Face To Face Meeting.
How to communicate in absolute secrecy by using offline encryption devices used by the leading intelligence agencies? Watch below ⬇️ Retrieving an ultra encrypted text message from a Facebook post with the ENCRYGMA.COM Machine
Imagine this ⬆️ totally offline , ultra encrypted , indecipherable, top secret communications , without even sending a direct message to the receiver ! It’s pure science fiction!
How ⬆️ Offline Encryption Works? Click here for full details: https://www.digitalbank.capital/post/how-to-communicate-in-absolute-secrecy-by-using-offline-encryption-devices-of-encrygma-com
Cyber Defense Advisors ✅ WhatsApp/Telegram/Signal/Viber +372 5734 7873
info@DigitalBankVault.com or visit ENCRYGMA.com.
ENCRYGMA.COM Encryption Machines : The Highest Level of Cyber Defense for Secret Critical Data.
Mathematically Unbreakable Quantum Safe Encryption. Anti Interception. Anti Espionage. Anti Hacking. Anti Spyware . Anti Digital Forensic Data Extraction. Immune to Online Attacks.
PRIVACY IS LUXURY
SECRECY IS PRICELESS
Ultra Encrypted Communications
🇬🇧 CIPHER SYSTEMS & MOBILE ENCRYPTION MACHINES
Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales
If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Machine.
The ENCRYGMA.COM Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines & Ultra Encrypted Phones
Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.
Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.
More Secure than a Face To Face Meeting.
More details?
Consult with our
Cyber Defense Experts at : Info@DigitalBankVault.com
Visit us today at : https://www.digitalbank.capital
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
SECRECY IS PRICELESS
Offline “ Air Gapped” Super Encryption Mobile Machines.
How it works ? Watch the video below 👇
Full technical details:
Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: ENCRYGMA.com .
“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System”
Penetration testings:
“Untraceable, Near to UnHackable, ‘Perfect Secrecy’ Communications, more secure than a face to face meeting “ : Modus Operandi of Top secret ultra encrypted data transfer between two remote Offline Cipher Machines.
Imagine this “covert communications” scenario : Bob wants to send Alice an extremely confidential text message.
He is encrypting the message on his Air Gapped ( Offline) Mobile Encryption Machine . The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .
This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Instagram account that is then visited by Alice, who owns the same Offline Cipher Machine .
Alice then scan the QR code from the Instagram post and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.
What just happened here is called “ Perfect Secrecy “.
✅ An OTP Ciphered information ( mathematically uncrackable encryption) has been delivered to a remote receiver without ever sending the receiver , directly, anything.
✅ Leaving no direct digital trace online of any type of communications between the two parties .
✅ All the encryption and decryption process happens on disconnected devices , therefore any online cyber attacks are near to impossible.
✅ Encryption Keys 🔐 used, are freshly created for each individual communication session , generated by the user, never stored on the device or ever exchanged with the receiving party.
✅ All data is permanently erased from the offline cipher machines.
ENCRYGMA.COM Cyber Defense Advisors ✅WhatsApp/Telegram/Signal/Viber +372 5734 7873
More details about our Military Encrypted iPhones , please visit : https://www.digitalbank.capital/encrygma
Cyber War Ultra Encrypted Communications.
More details? Consult with our cyber defense advisors at info@DigitalBankVault.com or visit ENCRYGMA.com
Visit us today at : https://www.digitalbank.capital/
TAGS:
Blackberry,Phantom Secure,Encrochat, Sky ECC, An0M, Blackphone Privy, Kaymera, Silent Circle,Katim, Intactphone,KryptAll,Cipher Phone, Omerta Digital,Diamond Secure,Ano Phone,K-iPhone,Purism Librem 5, Solarin From Sirin Labs, Sirin Labs Finney U1,Bittium Tough Mobile 2C, Silent Circle Blackphone 2, Encrygma SuperEncrypted Phone, Encrygma.com, most secure encrypted phone, Encrygma, Encrypted Phones for Sale
3. 3. #SecurePhone
5. 5. #PrivacyPhone
7. 7. #SafePhone
9. 9. #ProtectedPhone
10. #HiddenPhone
11. #LockedPhone
13. 13. #EncryptedSmartphone
15. 15. #PrivateCommunication
17. 17. #SecureCommunication
19. 19. #SafeData
21. 21. #ProtectedData
22. #HiddenData
23. #LockedData
25. 25. #EncryptedData
27. 27. #NoSurveillance
29. 29. #NoTracking
31. 31. #NoSpying
33. 33. #NoEavesdropping
35. 35. #NoInterception
37. 37. #SafeCall
39. 39. #ProtectedCall
40. #HiddenCall
41. #LockedCall
43. 43. #EncryptedCall
45. 45. #SecureTexting
47. 47. #SafeTexting
49. 49. #ProtectedTexting
50. #HiddenTexting
51. #LockedTexting
53. 53. #EncryptedTexting
55. 55. #SecureEmail
57. 57. #SafeEmail
59. 59. #ProtectedEmail
60. #HiddenEmail
61. #LockedEmail
63. 63. #EncryptedEmail
65. 65. #NoEmailTracking
67. 67. #NoEmailSpying
10. #NoWebSpying
14. #SecureMessaging
15. #SafeMessaging
17. #HiddenMessaging
18. #LockedMessaging
21. #SafeFileSharing
1.
3. 3. #EncryptedPhone
8. 8. #SafeAndSecure
10. #TechSavvy
11. #ProtectYourData
12. #OnlineSafety
#PegasusSpyware #Encrochat #CyberProtection #cipherphone #SKYECC #encryptedphone #encryption #Encrypt #hacking #interception #ESPIONAGE #securecommunication #spyware
are cell phones encrypted
encrypted cell phone
encrypted smartphone
secure encrypted phone
encrypted mobile phone
encrypted phone for sale
encrypted phone service
fully encrypted phone
crypt phone
crypto phones for sale
fully encrypted cell phone
how to get an encrypted phone
mobile phone encryption device
phone encrypted for security
phone is encrypted for security
mobile phone encryption security
what does android encryption do
what does it mean if your phone is encrypted
what is encrypt phone
what is encrypting your phone
your phone is encrypted for security
best encrypted mobile phone
best encrypted phone
encrypted android os
encrypted cell phone communication
encrypted mobile phone suppliers
how to encrypt android phone calls
secure cell phone service
secure phone system
what does encrypt device mean
what does encrypt phone mean
what does encrypting my phone do
what does encrypting my phone mean
what does it mean encrypted phone
what does it mean your phone is encrypted for security
what happens when you encrypt your android phone
what is the meaning of encryption in mobile phone
whats an encrypted phone
best encrypted cell phone
cell crypt app
cell phone secure line
cell phone security in cryptography
cellular voice encryption
encrypt your phone android
encrypted phone os
encrypted phone uk
encrypted smartphone 2023
how encrypt phone
how to encrypt cell phone calls
how to encrypt cell phone communications
how to encrypt mobile devices
how to encrypt phone
how to know if my phone is encrypted
is my device encrypted
mobile encryption meaning
mobile phone call encryption
what happens if i encrypt my android phone
your phone is encrypted for security samsung
android decrypt data
android encryption
android encryption policy
android hardware encryption
android turn off encryption
app to encrypt android phone
aquarius encrypted mobile phone
are samsung phones encrypted
best cell phone for privacy
can i encrypt my android phone
cipher phone australia
cipher phone review
cipher phone specs
data encryption for android
does android encrypt data
encro phone for sale
how to encrypt apps on android
how to encrypt my android phone
how to encrypt my phone
how to encrypt phone calls iphone
how to encrypt your android phone
how to make a secure cell phone call
how to unlock an encrypted phone
iphone voice encryption
kryptall iphone for sale
kryptall phone cost
kryptall phone for sale
mobile device data encryption
mobile encryption app
mobile phone encryption software
most encrypted cell phone
most encrypted phone
ecure encrypted voip
secure voip iphone
securephone
should i encrypt my android tablet
should i encrypt phone
update encrypted android
what does encrypt by default mean
what is hardware encryption in android
your device is encrypted for security
best phone encryption software
best secure mobile phone in the world
black phone private os
buy encrochat phone
can an encrypted phone be tracked
can encrypted phone be hacked
cellcrypt download
cellcrypt inc
cellcrypt ltd
crypt app
crypt com
cypher phone australia
decrypt device android
decrypt my phone
device encryption
does encrypting phone slow it down
encrochat phone price
encrypt a file android
encrypt android tablet
encrypted file system android
encrypted group calls
encrypted mobile phone manufacturers
encrypted nokia phones
encrypted phone call app
encrypted phone number app
encrypted voice call app
encryption manager android
encryption of data storage on device
encryption settings
end to end encryption phone call
how to encrypt android tablet
how to encrypt files on android phone
how to encrypt iphone calls
how to encrypt note 2
how to encrypt note 5
how to encrypt phone calls on iphone
how to encrypt samsung phone
how to encrypt your android phone or tablet
how to encrypt your phone
how to make encrypted calls
how to secure a cell phone line
how to secure a phone line
how to secure phone calls
k iphone price
kryptall phone price
military encryption software for mobile phones
mobile encryption and decryption
mobile phone cipher
most private cell phone
most safest mobile phones
most secure cell phone carrier
most secure cell phone in the world
most secure phone
most secure phone on the market
most secure smart phones
most secure smartphone
most unhackable phone
secure id phone calls
secure mobile phones in india
secure phone calls iphone
secure phone line
secure smart phones
secure smartphone os
secure telephone
secure telephone service
secure voice
secure voice communication
secure voice conferencing
secure voip app iphone
should i encrypt my tablet
should you encrypt your smartphone
smartphone security hardware
super secure phone
the most secure smartphone
turn on encryption android
voice encryption
voip encryption software
what is encrypt device in samsung
what is the most secure mobile phone platform
best cell phone for law enforcement
best cell phone security
best phone for hacking
bureau of investigation
call scrambler app
calling cipher
can a flip phone be hacked
can a non smartphone be hacked
can cops hack your iphone
can cops hack your phone
can flip phones be tapped
can my blackberry be hacked
can police get into an iphone
can the government hack your phone
can the police hack your phone
cell phone data security
cell phone signal encryption
cell secure contact details
cellcrypt
chiffrement android
chiffrer android
cipher chat no internet connection
cipher ios
ciphr phone samsung
com lge sdencryption
communication security group
convert to file encryption android n
cryptic phone
crypto phones prices
cryptophone app
cryptophone australia
cryptophone ebay
military grade encryption phone
military secure phone
mobile cryptography
mobile data encryption techniques
mobile encryption techniques
mobile phone privacy laws
mobilecrypt
most private mobile phone
most safe android phone
most secure android os
most secure android phone
Comments