top of page
  • Writer's pictureThe DigitalBank Vault

Operation Venetic: Self-proclaimed ‘Chadwell Cartel’ #Encrochat drug dealers jailed



A pair of Essex drug dealers who used encrypted messaging platform EncroChat to run their criminal enterprise have been jailed for more than 25 years.


Officers from the Organised Crime Partnership – a joint National Crime Agency and Metropolitan Police Service unit – identified supplies of around 80 kilos of cocaine as part of their investigation into Robert Smith, 37, and Ismet Salih, 33, both from Grays in Essex. The men were also linked to the seizures of a further 123 kilos of cocaine, and had laundered profits of more than £1.25 million in cash.


Smith headed an organised crime group which supplied cocaine and cannabis to the Chadwell St Mary and Grays areas, and used Salih and Lee Twigg as his trusted seconds in command.


Smith and Salih referred to themselves as the ‘Chadwell Cartel’ in EncroChat exchanges, and messages exchanged revealed their aspirations of becoming gangsters like Ronnie and Reggie Kray.


Smith used the handle ‘demonfern’ to source the cocaine from a Dubai-based seller, who went by ‘blacknarco’ and ‘darkestnarco’.

Salih and associate Lee Twigg collected the cocaine from Smiths’s suppliers in the UK and then stored and distributed the drugs for him. They also ensured cash from the sale of the drugs made it back to the suppliers.


Smith and Salih exchanged more than 6,000 messages, predominantly about the sale of cocaine. Some of these contained ledgers relating to the profits made from customers, and money paid to their supplier for future stock.

The pair were arrested in September 2021, with investigators finding three kilos of cannabis with a wholesale value of up to £15,760 in Salih’s garden shed and evidence of a previous cannabis grow in his loft.

Smith had £7,635 in cash in a plastic bag within his shorts at the time of his arrest.


Smith and Salih were subsequently charged with drugs and money laundering offences, and admitted these at Basildon Crown Court. They were jailed for 16-and-a-half years and nine years respectively at the same court today (8 March).

Investigators established that Essex men Andrew Fraser and Christopher Low, Jamie Sheaves, from Kent, and Adil Bakali, from Wiltshire, were runners for Smith’s supplier. They have previously been jailed for a total of 39 years.

In October 2020 Fraser was stopped driving a van on the M25 Dartford Crossing in Kent. Two bags containing 20 kilos of cocaine with a street value of £1.6 million were found in the back, which he would have given to Salih had he not been arrested.


The following month, OCP officers saw Twigg put a black holdall into Bakali’s car, which was later stopped by police at the M1 Northampton Services. More than 21 kilos of cocaine with a street value of  almost £1.7 million were found in bags in the back of the car.


Twigg was arrested for this offence, and for the seizure of a further 3.5 kilos of cocaine which were found in his garage and an underground hide in his garden shed. A cannabis farm was also found in his loft.


The cocaine seized at Twigg’s home had been supplied by Sheaves, who also provided drugs to Salih. Sheaves was also in contact with the same person in Dubai. 


Low was jailed after 40 kilos of cocaine with a street value of £3.2 million was found in the boot of a black Jaguar XF in Brentford, west London. He was also found to have supplied another man, Kevin Malthouse, with five kilos of cocaine.


The Organised Crime Partnership’s investigation formed part of  Operation Venetic, the UK law enforcement response to the July 2020 takedown of the EncroChatencrypted communication service.

Andrew Tickner, from the Organised Crime Partnership, said: “Robert Smith and Ismet Salih were behind a criminal network which saw vast amounts of cocaine sold in Essex and beyond.


“Their dream of becoming gangsters like the Kray twins was swiftly shattered by our investigation. Instead, their reality is lengthy prison sentences.

“Using the strong partnership between the NCA and Met Police, we will continue to pursue organised criminals fuelling the class A drug trade.”


ENCRYGMA.COM CIPHER MACHINES



Ultra Encrypted IPhone XS Max at € 4000 Euros.  One time payment, no subscription fees.


WhatsApp/Telegram/Signal/Viber

+372 5734 7873


ℹ️ Info@DigitalBank.Capital







ENCRYGMA.COM Offline “ Air Gapped” Super Encryption Mobile Machines & SuperEncrypted Cellular Phoness.


SuperEncrypted Communications: Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers. More Secure than a Face To Face Meeting.


How to communicate in absolute secrecy by using offline encryption devices used by the leading intelligence agencies? Watch below ⬇️ Retrieving an ultra encrypted text message from a Facebook post with the ENCRYGMA.COM Machine



Imagine this ⬆️ totally offline , ultra encrypted , indecipherable, top secret communications , without even sending a direct message to the receiver ! It’s pure science fiction!


How ⬆️ Offline Encryption Works? Click here for full details: https://www.digitalbank.capital/post/how-to-communicate-in-absolute-secrecy-by-using-offline-encryption-devices-of-encrygma-com


Cyber Defense Advisors WhatsApp/Telegram/Signal/Viber +372 5734 7873

info@DigitalBankVault.com or visit ENCRYGMA.com.


ENCRYGMA.COM Encryption Machines : The Highest Level of Cyber Defense for Secret Critical Data.

Mathematically Unbreakable Quantum Safe Encryption. Anti Interception. Anti Espionage. Anti Hacking. Anti Spyware . Anti Digital Forensic Data Extraction. Immune to Online Attacks.


PRIVACY IS LUXURY
SECRECY IS PRICELESS
WWW.ENCRYGMA.COM

Ultra Encrypted Communications

🇬🇧 CIPHER SYSTEMS & MOBILE ENCRYPTION MACHINES

Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales



If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Machine.


The ENCRYGMA.COM Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.




SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines & Ultra Encrypted Phones


Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.


Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.


More Secure than a Face To Face Meeting.


More details?


ENCRYGMA.COM


Consult with our

Cyber Defense Experts at : Info@DigitalBankVault.com



Visit us today at : https://www.digitalbank.capital




SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines.





SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines.


How it works ? Watch the video below 👇



Full technical details:


ENCRYGMA Mobile Encryption Machine Specs
.pdf
Download PDF • 1.76MB


Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: ENCRYGMA.com .


“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 


Penetration testings:


https://www.digitalbank.capital/_files/ugd/f12fcd_ee363ec79ad14c399257c94baa4da3d2.pdf


https://www.digitalbank.capital/_files/ugd/f12fcd_4192020d72404718b5664b66f4037646.pdf






“Untraceable, Near to UnHackable, ‘Perfect Secrecy’ Communications, more secure than a face to face meeting “ : Modus Operandi of Top secret ultra encrypted data transfer between two remote Offline Cipher Machines.


Imagine this “covert communications” scenario : Bob wants to send Alice an extremely confidential text message.


He is encrypting the message on his Air Gapped ( Offline) Mobile Encryption Machine . The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .



This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Instagram account that is then visited by Alice, who owns the same Offline Cipher Machine .


Alice then scan the QR code from the Instagram post and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.


What just happened here is called “ Perfect Secrecy “.


An OTP Ciphered information ( mathematically uncrackable encryption)  has been delivered to a remote receiver without  ever sending the receiver , directly, anything.


Leaving no direct digital trace online of any type of communications between the two parties .


All the encryption and decryption process happens on disconnected devices , therefore any online cyber attacks are near to impossible.


Encryption Keys 🔐 used, are freshly created for each individual communication session , generated by the user, never stored on the device or ever exchanged with the receiving party.


All data is permanently erased from the offline cipher machines.



ENCRYGMA.COM Cyber Defense Advisors WhatsApp/Telegram/Signal/Viber +372 5734 7873

Info@DigitaBankVault.com






More details about our Military Encrypted iPhones , please visit : https://www.digitalbank.capital/encrygma


Cyber War Ultra Encrypted Communications.


More details? Consult with our cyber defense advisors at info@DigitalBankVault.com or visit ENCRYGMA.com



Visit us today at : https://www.digitalbank.capital/








TAGS:



Blackberry,Phantom Secure,Encrochat, Sky ECC, An0M, Blackphone Privy, Kaymera, Silent Circle,Katim, Intactphone,KryptAll,Cipher Phone, Omerta Digital,Diamond Secure,Ano Phone,K-iPhone,Purism Librem 5, Solarin From Sirin Labs, Sirin Labs Finney U1,Bittium Tough Mobile 2C, Silent Circle Blackphone 2, Encrygma SuperEncrypted Phone, Encrygma.com, most secure encrypted phone, Encrygma, Encrypted Phones for Sale



1. #EncryptedPhone

3. 3. #SecurePhone

5. 5. #PrivacyPhone

7. 7. #SafePhone

9. 9. #ProtectedPhone

10. #HiddenPhone

11. #LockedPhone

13. 13. #EncryptedSmartphone

15. 15. #PrivateCommunication

17. 17. #SecureCommunication

19. 19. #SafeData

21. 21. #ProtectedData

22. #HiddenData

23. #LockedData

25. 25. #EncryptedData

27. 27. #NoSurveillance

29. 29. #NoTracking

31. 31. #NoSpying

33. 33. #NoEavesdropping

35. 35. #NoInterception

37. 37. #SafeCall

39. 39. #ProtectedCall

40. #HiddenCall

41. #LockedCall

43. 43. #EncryptedCall

45. 45. #SecureTexting

47. 47. #SafeTexting

49. 49. #ProtectedTexting

50. #HiddenTexting

51. #LockedTexting

53. 53. #EncryptedTexting

55. 55. #SecureEmail

57. 57. #SafeEmail

59. 59. #ProtectedEmail

60. #HiddenEmail

61. #LockedEmail

63. 63. #EncryptedEmail

65. 65. #NoEmailTracking

67. 67. #NoEmailSpying

68. #NoEmailEavesdropping

1. #NoEmailEavesdropping

2. #NoEmailInterception

3. #SecureInternet

4. #SafeInternet

5. #ProtectedInternet

6. #HiddenInternet

7. #LockedInternet

8. #EncryptedInternet

9. #NoWebTracking

10. #NoWebSpying

11. #NoWebEavesdropping

12. #NoWebInterception

13. #EncryptedMessaging

14. #SecureMessaging

15. #SafeMessaging

16. #ProtectedMessaging

17. #HiddenMessaging

18. #LockedMessaging

19. #EncryptedFileSharing

20. #SecureFileSharing

21. #SafeFileSharing

22. #ProtectedFileSharing

23. #HiddenFileSharing

24. #LockedFileSharing

25. #EncryptedFileTransfer

26. #SecureFileTransfer

27. #SafeFileTransfer

28. #ProtectedFileTransfer

29. #HiddenFileTransfer

* #EncryptedPhone

* #SecureSmartphone

* #PrivacyProtected

* #CyberSecurity

* #DataEncryption

* #SafePhone

* #PrivateCommunication

* #EncryptionMatters

* #SecureMobile

* #ProtectYourData

* #SafeAndSecure

1.

3. 3. #EncryptedPhone

4. #PrivacyMatters

5. #SecureYourPhone

6. #CyberSecurity

8. 8. #SafeAndSecure

9. #EncryptionExperts

10. #TechSavvy

11. #ProtectYourData

12. #OnlineSafety

13. #SecureCommunication



#PegasusSpyware #Encrochat #CyberProtection #cipherphone #SKYECC #encryptedphone #encryption #Encrypt #hacking #interception #ESPIONAGE #securecommunication #spyware


are cell phones encrypted

encrypted cell phone

encrypted smartphone

secure encrypted phone

encrypted mobile phone

encrypted phone for sale

encrypted phone service

fully encrypted phone

crypt phone

crypto phones for sale

fully encrypted cell phone

how to get an encrypted phone

mobile phone encryption device

phone encrypted for security

phone is encrypted for security

mobile phone encryption security

what does android encryption do

what does it mean if your phone is encrypted

what is encrypt phone

what is encrypting your phone

your phone is encrypted for security

best encrypted mobile phone

best encrypted phone

encrypted android os

encrypted cell phone communication

encrypted mobile phone suppliers

how to encrypt android phone calls

secure cell phone service

secure phone system

what does encrypt device mean

what does encrypt phone mean

what does encrypting my phone do

what does encrypting my phone mean

what does it mean encrypted phone

what does it mean your phone is encrypted for security

what happens when you encrypt your android phone

what is the meaning of encryption in mobile phone

whats an encrypted phone

best encrypted cell phone

cell crypt app

cell phone secure line

cell phone security in cryptography

cellular voice encryption

encrypt your phone android

encrypted phone os

encrypted phone uk

encrypted smartphone 2023

how encrypt phone

how to encrypt cell phone calls

how to encrypt cell phone communications

how to encrypt mobile devices

how to encrypt phone

how to know if my phone is encrypted

is my device encrypted

mobile encryption meaning

mobile phone call encryption

what happens if i encrypt my android phone

your phone is encrypted for security samsung

android decrypt data

android encryption

android encryption policy

android hardware encryption

android turn off encryption

app to encrypt android phone

aquarius encrypted mobile phone

are samsung phones encrypted

best cell phone for privacy

can i encrypt my android phone

cipher phone australia

cipher phone review

cipher phone specs

data encryption for android

does android encrypt data

encro phone for sale

how to encrypt apps on android

how to encrypt my android phone

how to encrypt my phone

how to encrypt phone calls iphone

how to encrypt your android phone

how to make a secure cell phone call

how to unlock an encrypted phone

iphone voice encryption

kryptall iphone for sale

kryptall phone cost

kryptall phone for sale

mobile device data encryption

mobile encryption app

mobile phone encryption software

most encrypted cell phone

most encrypted phone

ecure encrypted voip

secure voip iphone

securephone

should i encrypt my android tablet

should i encrypt phone

update encrypted android

what does encrypt by default mean

what is hardware encryption in android

your device is encrypted for security

best phone encryption software

best secure mobile phone in the world

black phone private os

buy encrochat phone

can an encrypted phone be tracked

can encrypted phone be hacked

cellcrypt download

cellcrypt inc

cellcrypt ltd

crypt app

crypt com

cypher phone australia

decrypt device android

decrypt my phone

device encryption

does encrypting phone slow it down

encrochat phone price

encrypt a file android

encrypt android tablet

encrypted file system android

encrypted group calls

encrypted mobile phone manufacturers

encrypted nokia phones

encrypted phone call app

encrypted phone number app

encrypted voice call app

encryption manager android

encryption of data storage on device

encryption settings

end to end encryption phone call

how to encrypt android tablet

how to encrypt files on android phone

how to encrypt iphone calls

how to encrypt note 2

how to encrypt note 5

how to encrypt phone calls on iphone

how to encrypt samsung phone

how to encrypt your android phone or tablet

how to encrypt your phone

how to make encrypted calls

how to secure a cell phone line

how to secure a phone line

how to secure phone calls

k iphone price

kryptall phone price

military encryption software for mobile phones

mobile encryption and decryption

mobile phone cipher

most private cell phone

most safest mobile phones

most secure cell phone carrier

most secure cell phone in the world

most secure phone

most secure phone on the market

most secure smart phones

most secure smartphone

most unhackable phone

secure id phone calls

secure mobile phones in india

secure phone calls iphone

secure phone line

secure smart phones

secure smartphone os

secure telephone

secure telephone service

secure voice

secure voice communication

secure voice conferencing

secure voip app iphone

should i encrypt my tablet

should you encrypt your smartphone

smartphone security hardware

super secure phone

the most secure smartphone

turn on encryption android

voice encryption

voip encryption software

what is encrypt device in samsung

what is the most secure mobile phone platform

best cell phone for law enforcement

best cell phone security

best phone for hacking

bureau of investigation

call scrambler app

calling cipher

can a flip phone be hacked

can a non smartphone be hacked

can cops hack your iphone

can cops hack your phone

can flip phones be tapped

can my blackberry be hacked

can police get into an iphone

can the government hack your phone

can the police hack your phone

cell phone data security

cell phone signal encryption

cell secure contact details

cellcrypt

chiffrement android

chiffrer android

cipher chat no internet connection

cipher ios

ciphr phone samsung

com lge sdencryption

communication security group

convert to file encryption android n

cryptic phone

crypto phones prices

cryptophone app

cryptophone australia

cryptophone ebay

military grade encryption phone

military secure phone

mobile cryptography

mobile data encryption techniques

mobile encryption techniques

mobile phone privacy laws

mobilecrypt

most private mobile phone

most safe android phone

most secure android os

most secure android phone






59 views0 comments
bottom of page