top of page
  • Writer's pictureThe DigitalBank Vault

#Encrochat New Reports : Operation Emma 95

This investigation launched in 2017 was spearheaded by French police, known as the Gendarmerie. The operation was codenamed “Emma 95” in France, according to the French press kit.

Technical research conducted on EncroChat phones seized by French police revealed that the “encrypted communication solution, not declared in France,” actually hosted some of its “offshore” servers there, according to the French press release.

The servers’ location thus gave French authorities legal jurisdiction to collar the investigation. Partnering first with Dutch authorities, and then EUROPOL, French cyber cops infiltrated the clandestine telecomm network via an ambiguous ‘technical device,’ according to the French press release.

An EncroChat associate described this so-called device to Vice, as a “mass hacking operation.”

Key to the development of the technical device that enabled the hack was research conducted by the Institute for Criminal Research of the National Gendarmerie (IRCGN), according to the French press release.

The IRCGN is the French coordinating entity of an organization known as the CERBERUS project, which is a partnership between the Forensic Laboratory of the Gendarmerie, the Netherlands Forensic Institute, and University College of Dublin to combat child abuse by beating encryption to “unprotect systems.”

This institution was a catalyst for the development of the technical device and “accelerated the the research by the IRCGN concerning these phones,” according to the French press release.

But it took nearly a year to operationalize the exploit, as the press kit says the CERBERUS project’s involvement in the project started in early 2019. The Joint Investigative Team formed by France and the Netherlands, which presumably gave law enforcement officials bilateral legal authorization to comb through unencrypted messages and unmask users, was not formally signed until April 10 of this year.

“Indeed, the CERBERUS project has contributed to the EncroChat hack,” said Gerdarmerie Major Lionel Prat, a CERBERUS project manager. “The research carried out within this framework provided a big boost to certain components of the EMMA 95 operation,” he added.

Despite billing itself as a research organization focused on breaking or cracking passwords, the CERBERUS project “is a very vast project,” notes Major Prat.

“We are looking for all the ways to access the data in clear-text, not necessarily by breaking the encryption or looking for the key/password,” said Pratt. “It is about the search for vulnerabilities, we are no longer in the theme of breaking but the search for ways to ‘bypass’ the encryption.” 

Citing French “national defense secrecy” laws that repress disclosure of elements relating to the technical device, Major Prat declined to comment further.

But an unnamed EncroChat associate told Vicethat the team discovered malware on the cryptophones. This malware was “specifically created for the X2 model,” according to Vice.

Ultimately, French, Dutch, and other European law enforcement agencies were able to surveil communications from “more than a hundred million encrypted messages” exchanged between Encrochat subscribers in real-time. This has led to over a thousand arrests across the UK, Norway, Sweden, France, and the Netherlands this year, according to Europol.

In the aftermath of the sweep, Dutch police said the “advanced and internationally coordinated operation has the same effect as a serious earthquake for organised crime.”

The EncroChat breach has given law enforcement “insight in an unprecedented large number of serious crimes, including large, international drug shipments and drug labs, murders, thrashing robberies, extortions, robberies, grave assaults and hostage takings. International drug – and money laundering corridors have become crystal clear,” said the Dutch press release.

Data Cyber Defense Technologies

Desktop and Mobile

Encryption Machines

Anti Interception

Anti Espionage

Anti Hacking

Anti Spyware

Anti Location Tracking

Anti Forensic Data Extraction

Anti Tapping

Anti Remote Digital Surveillance

In Cooperation with

Samsung Military Division
Encrypted Cipher Phones € 990 Euro

One Lifetime Payment

No Subscription Fees

Unlimited Calls & Messaging

Worldwide Delivery

We are here to help you achieve absolute secrecy!

and understand your privacy needs !

“ Air Gapped” iPhones.

Mobile Encryption Machines :

The Highest Level of Cyber Defense for Secret Critical Data.

Mathematically Unbreakable Quantum Safe Encryption



Ultra Encrypted Communications

We are here to help you achieve absolute secrecy!

and understand your privacy needs !



Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales

No Subscription Fees

Unlimited Calls and Messaging

Worldwide Shipments Payment by Paypal

Full Refund Guarantee



+372 5734 7873

If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Phone .

The ENCRYGMA.COM Mobile Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.

The Above Video has been posted by hackers that tried to extract information from our iPhones, in a "physical" way, by taking apart the device and trying to retrieve the data , directly from the chip that integrates the DBV Hardware Encryption Engine.

Consult with our

Cyber Defense Experts at :

Visit us today at :


Offline “ Air Gapped” Super Encryption Mobile Machines.


Offline “ Air Gapped” Super Encryption Mobile Machines.

How it works ? Watch the video below 👇

Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: .

“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 

Penetration testings:

“Untraceable, Near to UnHackable, ‘Perfect Secrecy’ Communications, more secure than a face to face meeting “ : Modus Operandi of Top secret ultra encrypted data transfer between two remote Offline Cipher Machines.

Imagine this “covert communications” scenario : Bob wants to send Alice an extremely confidential text message.

He is encrypting the message on his Air Gapped ( Offline) Mobile Encryption Machine . The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .

This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Instagram account that is then visited by Alice, who owns the same Offline Cipher Machine .

Alice then scan the QR code from the Instagram post and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.

What just happened here is called “ Perfect Secrecy “.

✅ An OTP Ciphered information ( mathematically uncrackable encryption)  has been delivered to a remote receiver without  ever sending the receiver , directly, anything.

✅ Leaving no direct digital trace online of any type of communications between the two parties .

✅ All the encryption and decryption process happens on disconnected devices , therefore any online cyber attacks are near to impossible.

✅ Encryption Keys 🔐 used, are freshly created for each individual communication session , generated by the user, never stored on the device or ever exchanged with the receiving party.

✅ All data is permanently erased from the offline cipher machines.

Cyber Defense Advisors ✅

WhatsApp/Telegram/Signal/Viber +372 5734 7873

More details about our Military Encrypted iPhones , please visit :

Cyber War Ultra Encrypted Communications.

More details? Consult with our cyber defense advisors


or visit

Visit us today at :

81 views0 comments


bottom of page