top of page
  • The DigitalBank Vault

The Next Legal Steps of #Encrochat: Efforts will be made to take this case to the Supreme Court



Efforts will be made to take this case to the Supreme Court. It is unclear that a question will be certified. Given the trenchant way this judgment is expressed, certification may be considered unlikely. Even if successful in getting the case before the Supreme Court, it may regard the Court of Appeal’s previous decisions on the issue of whether data is live or stored as being as insignificant as the Court of Appeal has found them to be. There are arguments to be made, but there is no guarantee that they will even be heard, let alone prove persuasive.


As the judgment alludes to, the preponderance of the expert evidence was firmly in favour of the defence.  Experts can continue to look at the issue of where this material was taken from, but they are up against paragraph 68 of the judgment:


“We have not found it necessary to set out in this judgment the expert evidence with which this conclusion is said to be inconsistent.  The 2016 Act does not use technical terms in this area.  The experts have an important role in explaining how a system works, but no role whatever in construing an Act of Parliament.  


They appear to have assumed that because a communication appears in the RAM as an essential part of the process which results in the transmission it did so while “being transmitted”.  That is an obvious error of language and analysis.”


As noted, there was unanimity amongst the experts who were asked to comment. The Court appears to accept their evidence is accurate, but then dismisses the consequences. If that is right, does further expert evidence have any prospect of changing the status quo?


There are other evidential weaknesses in prosecution EncroChat evidence. Points can be taken on continuity and attribution. Can the Prosecution properly attribute the device and/or nickname to the defendant? Is the nickname properly linked to an IMEI/ IMSI /number? Can the prosecution reliably prove it to be so?


Can the Crown address continuity when all they have been given is a list of names and messages?


The question of conduct was not addressed in the judgment. It was argued on behalf of the defendants and there are points to be made – but the Court considered it unnecessary to engage with the argument. Clearing the hurdle that the question is necessary seems an unlikely route for defence success.


There remain abuse arguments to be taken, and other arguments under section 78 of the Police and Criminal Evidence Act 1984 to be advanced. It is of course unwise to comment on any individual argument but if the Court has rejected this challenge on admissibility then it is hard to see how one or other form of unfairness in the process is going to prove persuasive.


There may also be points of relevance that do not have global application. In a number of cases, it is apparent that the conversations are “woven” i.e. they rely on material that may be found on only one of the devices said to be a party to the conversation.


There is no explanation as to why. In the light of the above ruling is it safe to say the information has never been stored on your client’s device if the conversation cannot be found there? In those circumstances is it right to rely on those conversations? The .csv files will be needed from the Crown for each device in order to properly answer these questions.


The only safe conclusion is that this is a ruling expressing robust support for the approach of the NCA and the Crown.


The question is whether the reasoning is as comprehensive as the Court has undoubtedly intended it to be. There are defendants out there who intend to test that.


Each defendant must now make his own decision as to whether the consequences of failing to succeed in an exclusionary argument or abuse submission justify the risk being taken in attempting to demonstrate that this evidence should not be allowed to go before a jury.

 

SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines.


Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.


Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.


More Secure than a Face To Face Meeting.


More details?


Consult with our

Cyber Defense Experts at : Info@DigitalBankVault.com







SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines.





SECRECY IS PRICELESS

WWW.ENCRYGMA.COM


Offline “ Air Gapped” Super Encryption Mobile Machines.



Full technical details:


ENCRYGMA Mobile Encryption Machine Specs
.pdf
Download PDF • 1.76MB


Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: ENCRYGMA.com .


“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 






HOW TO PREVENT THE NEXT ENCROCHAT & SKY ECC HACKING ?


Rule number 1 ☝🏼:


EncroChat evidences has been collected from the storage on the devices seized . A real military grade encryption device can’t be ever accessed by any digital forensic tools such as Cellebrite.


Rule number 2 :


Never 👎 use encryption services that are server based . Servers can be hacked easily and all data passing through them can be intercept. Servers also store the messages so that also this cloud based storage can be accessed and used as evidence.


Rule number 3:


Never , ️ ever trust their party encryption services. The moment you trust a third party for generating your encryption keys, manage and store them for you , it’s game over . It’s like giving the keys of your bank vault to a total stranger .


Rule number 4 :


Stop 🛑 trusting cheap online encrypted phone suppliers! ⚠The garbage online are fake encrypted phones based on a $ 50 USD cheap Android cellphone bought in China and installed with a very low level security end to end encrypted messaging app.


Work like a pro, like intelligence agencies do ! Stop being scammed by online marketers selling you security illusions .


Need absolute privacy? Consult with our cyber defense advisors at info@DigitalBank.Capital or visit https://www.digitalbank.capital/knox-encrypted-smartphone







Cyber War Ultra Encrypted Communications.


This is an encrypted text message, that has been encrypted with an OTP cipher (quantum safe encryption- mathematically unbreakable) , on a DBV “ Air Gapped “ Offline SuperEncryption Machine. The Encrypted message is then exported from the offline device by visual means( no connections , not even physical) by scanning the QR code with an online device for then sending it safely online.


The QR code at is arrival, is scanned by the second DBV offline encryption machine , directly from the receiving online device. Afterwards , it’s deciphered safely offline. This form of super encrypted offline communications is safer than a face to face meeting .


More details? Consult with our cyber defense advisors at info@DigitalBankVault.com or visit ENCRYGMA.com.






More details on this PDF : https://www.digitalbank.capital/_files/ugd/f12fcd_3c29cd00f3b34a44af4da777920be2f3.pdf




Visit us today at : https://www.digitalbank.capital/knox-encrypted-smartphone







70 views0 comments
bottom of page