A British drug lord known as The Voice is the suspected mastermind behind a secret phone network used to flood Britain with cocaine.
Robert Dawes, 48, is suspected of being the boss of the impenetrable global communication system, according to a report by the National Crime Agency.
Thought to be worth 50million or more, Dawes is said to run the network despite languishing behind bars in France for a huge trafficking operation.
The handsets are also used by the Mafia and cartels made infamous by caged Mexican crime boss Joaquin Guzman, nicknamed El Chapo.
All users have an encrypted SIM card in an adapted Blackberry handset.
If one should fall into the hands of police, the gang can simply send a kill code text which destroys anything stored on the device.
The technology believed by the NCA to have been written by a Ukrainian technology genius is seen as a 21st century update on Burn After Reading letters used in international espionage.
Encrypted handsets were supplied by a now-dissolved UK-registered company No1 Business Communication (No1BC).
Usually, organised criminals download encrypted phone apps or buy burner phones, which are changed regularly.
But this is the first detailed case of a UK crime group controlling an entire encrypted network. And, the NCA evidence suggests, Dawes was the first sponsor or user of the system.
An NCA officer said: These were major players in control of a phone network which could not be penetrated.
"Dawes has always been very switched on with his comms. But once he had control of this secret end-to-end encryption it became more difficult.
Nottingham-born Dawes made it clear his name should not be mentioned in phone calls, so associates referred to him as The Voice. Many in the drug supply chain never knew his real identity.
The NCA officer added: He would not deal with anyone on anything sensitive unless they were on this network.
It was also the first time we had seen a whole organised crime group operating in a number of countries including the UK using the same network like this.
We were shooting blind because we werent picking up on these comms once the No1BC system was being used.
No1BC was registered in the UK in 2011 by Roy Livings, an associate of Dawes later jailed for importing 167 kilos of cocaine into Portugal.
Israeli Eli-Meir Gampel, another founding director and based in Germany, was jailed for laundering 30million of Colombian drug cartel money through a UK firm.
The Ukrainian tech wizard is said to have worked through Livings and Gampel.
Dawes worked closely with a Dutch crime group led by Gwenette Martha, whose right-hand man Najeb Bouhbouh was a director of No1BC Belgium Ltd.
However, Bouhbouh and Martha were gunned down in 2012 and 2104 respectively. The gangland slayings sparked more than 20 tit-for-tat assassinations across Europe, including cases of mistaken identity.
To get around Dawes impenetrable phone system, investigators resorted to old-fashioned surveillance and, after a tip-off, bugged a hotel in Madrid, where he met Colombian cartel representatives. Dawes was later arrested at his villa on the Costa del Sol in late 2015.
Investigators seized No1BC encrypted phones, but by the time they examined the devices the incriminating data had been erased.
Nevertheless, the British kingpin was extradited to France and jailed for 22 years after cocaine worth 217million was found in suitcases at Charles de Gaulle airport.
The NCA suspects Dawes is still giving orders from his Paris prison cell after learning details of calls made on illicit mobile phones.
He is appealing his conviction. But police in the Netherlands also want to speak to Dawes in connection with the murder of Gerard Meesters an innocent schoolteacher shot in 2002 for refusing to reveal the whereabouts of his sister.
She disappeared after a shipment of cannabis went missing.
We can reveal the NCA raised concerns on encrypted networks in a 2020 threat assessment for Downing Street.
It is understood the network can operate as it is not easy to prove it is used only by criminals. Sources say to take down the network authorities must find the servers difficult as they are based in a number of countries but rarely in the same jurisdiction as the company operating them.
No1BC has been dissolved in the UK, according to Companies House. But it still has sales outlets in 24 countries.
A shop in Manchester was the only place in the UK selling the encrypted phone and SIM package, costing 1,300 for a six-month contract, according to the No1BC website.
Shortly after the Mirrors enquiries, the Manchester details were removed.Insiders say the NCA is working with European partners to find ways of taking down a number of networks including No1BC.
The NCA officer added: Conversations are taking place at the highest levels and are happening globally.
There are people who argue its their right to have encryption. But at this level, we rarely find these kinds of comms are used for legitimate business reasons.
Phone mastermind Robert Dawes is a dad of three whose crime-stained tentacles spread across Europe and as far as Dubai.
From his days as a young criminal on a Nottingham council estate he became one of Europes Top 10 most wanted gangsters.
He got his first conviction at 11, was jailed aged 20 and again at 22 for robbery.
Inside, Dawes corrupted officers into a drug smuggling ring that netted 500,000.
On his release in 1997, Dawes teamed up with pals who controlled Nottinghams notorious Bestwood Estate. He linked up with gangs across the UK and then major league drug mobs in Holland and Spain.
By 2001 Dawes was despatching 50 to 100 kilos of drugs every week. Some 30-40 firearms were also hidden in consignments.
As well as arming the Bestwood cartel causing a huge spike in Nottinghams gun crime in 2002 weapons went to gangs in Manchester, Liverpool and London.
Dawes relocated to the Costa del Sol in 2001 to escape Nottinghamshire Police. He bought a 1million villa in Benalmadena but still dressed in tracksuit and trainers.
His aliases ranged from Trackie, Franky, The Derbyman, The One and The Voice.
In 2005, Dawes brother John was jailed for 24 years. Ledgers revealed at least 8.5million was sent to Franky in Spain.
By 2007 Dawes was flitting between Spain and Dubai, where he laundered cash, built a 10million property portfolio and spent time with a Chinese mistress.
Spanish police eventually charged him but the case collapsed in 2012. Dawes began organising yet larger shipments of cocaine and heroin working in thousands of kilos rather than hundreds.
In 2013 French authorities seized a record 1.3 tons of cocaine in suitcases of 31 ghost passengers. Those arrested all had Dawes trademark encrypted phones.
He was nicked later after being taped boasting: You know the big one in Paris in all the luggage... that was mine.
Dawes was jailed for 22 years in 2018 and investigators are trawling his money trail which may span 60 countries.
View original post here:
Drug lord 'The Voice' is 50m mastermind behind phone scam flooding UK with cocaine - Mirror.co.uk
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]