top of page
  • Writer's pictureThe DigitalBank Vault

Dutch lawyers raise human rights concerns over #Encrochat & #SkyECC hacked cryptophone data


Dutch lawyers have written an open letter claiming that defendants charged on the grounds of evidence from police cryptophone hacking investigations face unfair trials because prosecutors have refused to disclose information about the hacking operations in court.

More than 100 Dutch defence lawyers have signed the letter calling for the Netherlands Ministry of Justice and the public prosecution service to be transparent over the involvement of Dutch cyber specialists in international operations to hack encrypted phone networks, such as EncroChat and Sky ECC, used by criminal gangs.

They say prosecutors’ unwillingness to disclose information about how police obtained data from the hacked encrypted phone networks has made it impossible for defence lawyers to test the legitimacy and reliability of hacked text messages presented as evidence in multiple criminal trials.

Justus Reisinger, the author of the letter, said lawyers in the Netherlands felt the need to unite because the issues at stake went beyond individual legal cases.

“The request is very simple – being able to test the legitimacy and reliability of the evidence put forward by the prosecutors,” he told Computer Weekly. “The prosecutors and judges simply rely on the evidence and don’t allow us to test it. The limit has been reached, which is why we are writing this letter to ask for attention to the problem to be given outside the courtroom.”

The Dutch High Tech Crime Unit has pioneered telephone and hacking techniques that have been used in cross-border investigations into encrypted phone services. They include Emmetcom, a Netherlands-based cryptophone service shut down in 2015, PGP Safe, and EncroChat and Sky ECC in 2020.

“This form of investigation is innovative and cross-border,” said the letter. “There is nothing wrong with that in itself and we endorse the social benefit of new, advanced investigative methods in the fight against crime. However, the use of such new investigative methods does require transparency.”

The lawyers argued that it is not possible for them to test the legality and reliability of text messages obtained from hacked telephone networks such as EncroChat.

They said prosecutors and judges in the Netherlands have a fixed idea that the evidence obtained from hacking operations in third countries is automatically admissible in the Netherlands because of the principle of trust between EU member states.

“International cooperation seems to be used not only to fight crime, but at the same time to deliberately limit the possibilities of conducting an effective defence,” said the letter.

Dutch courts have taken the view that phone messages that have been intercepted or hacked from phones in the Netherlands by other European countries can be assumed to have been obtained lawfully, but the lawyers argue there are reasons to question this assumption.

“The Netherlands, as a sovereign country, is obliged to conduct its own assessment against the laws and regulations that apply in the Netherlands, and for that matter, in the rest of Europe, in order to provide legal protection for the citizen,” said the letter.

“The same applies to reliability. It is assumed that there is reliable evidence, while on many occasions it has become apparent that there are defects in the digital technology used.”

Defence lawyers have not been allowed to test the reliability of evidence obtained through phone hacking and this increased the “unacceptable risk of an unjust conviction”, the lawyers said.

The lawyers also argued that the scale of interception operations against EncroChat and other encrypted phone systems amounted to bulk interception involving hundreds of thousands of people.

Prosecutors argue that the interception is targeted against citizens whose identity is unknown, but the lawyers said this approach breaches the European Convention on Human Rights and the EU Charter on Fundamental Rights.

“Just because encrypted communication is suitable for use by criminals does not mean that encrypted communication is exclusively intended for, let alone, used by criminals,” said the letter.

The evidence from encrypted communications is not being thoroughly tested in the Netherlands, the letter added.

The lawyers called for the Dutch parliament to ask questions about the role of the Dutch authorities in international investigations into encrypted phone networks, and for judges to critically investigate the evidence provided.


Offline “ Air Gapped” Super Encryption Mobile Machines.

Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.

Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.

More Secure than a Face To Face Meeting.

More details?

Consult with our

Cyber Defense Experts at :


Offline “ Air Gapped” Super Encryption Mobile Machines.


Offline “ Air Gapped” Super Encryption Mobile Machines.

Full technical details:

ENCRYGMA Mobile Encryption Machine Specs
Download PDF • 1.76MB

Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: .

“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 


Rule number 1 ☝🏼:

EncroChat evidences has been collected from the storage on the devices seized . A real military grade encryption device can’t be ever accessed by any digital forensic tools such as Cellebrite.

Rule number 2 :

Never 👎 use encryption services that are server based . Servers can be hacked easily and all data passing through them can be intercept. Servers also store the messages so that also this cloud based storage can be accessed and used as evidence.

Rule number 3:

Never , ⛔️ ever trust their party encryption services. The moment you trust a third party for generating your encryption keys, manage and store them for you , it’s game over . It’s like giving the keys of your bank vault to a total stranger .

Rule number 4 :

Stop 🛑 trusting cheap online encrypted phone suppliers! ⚠️ The garbage online are fake encrypted phones based on a $ 50 USD cheap Android cellphone bought in China and installed with a very low level security end to end encrypted messaging app.

Work like a pro, like intelligence agencies do ! Stop being scammed by online marketers selling you security illusions .

Need absolute privacy? Consult with our cyber defense advisors at info@DigitalBank.Capital or visit

Cyber War Ultra Encrypted Communications.

This is an encrypted text message, that has been encrypted with an OTP cipher (quantum safe encryption- mathematically unbreakable) , on a DBV “ Air Gapped “ Offline SuperEncryption Machine. The Encrypted message is then exported from the offline device by visual means( no connections , not even physical) by scanning the QR code with an online device for then sending it safely online.

The QR code at is arrival, is scanned by the second DBV offline encryption machine , directly from the receiving online device. Afterwards , it’s deciphered safely offline. This form of super encrypted offline communications is safer than a face to face meeting .

More details? Consult with our cyber defense advisors at or visit

110 views0 comments


bottom of page