top of page

EncroChat: Cracked or Plant?

 

In 2020, French authorities successfully infiltrated the EncroChat encrypted phone network, which was widely used by criminal organizations for secure communication.

 

Here's how they did it: EncroChat was one of the largest providers of encrypted communication services, with an estimated 60,000 users across Europe. The service was popular among criminal networks because it offered highly secure messaging, with features like the removal of microphones, cameras, and GPS from devices to prevent tracking and interception.

EncroChat used end-to-end encryption to secure its users' communications. This encryption method ensures that only the communicating users can read the messages, making it extremely difficult for anyone else, including the service provider, to intercept and decipher the content.

Understanding End-to-End Encryption: End-to-end encryption (E2EE) is a method of data transmission that ensures only the communicating users can read the messages. It provides a high level of security by encrypting the data at the sender's device and only decrypting it at the recipient's device.

Here's a deeper look at how it works: When you send a message, your device encrypts it before it leaves your device. This encryption uses a unique key that only the intended recipient has the decryption key for. The encrypted message is transmitted over the internet. While in transit, it remains encrypted and unreadable to anyone who might intercept it, including service providers and potential hackers. When the encrypted message reaches the recipient's device, it is decrypted using the unique key stored on that device. Only the recipient's device can decrypt the message, making the data readable again.

Each user has a pair of cryptographic keys – a public key (known to everyone) and a private key (kept secret). The sender encrypts the message using the recipient's public key, and the recipient decrypts it using their private key.

Even if someone intercepts the message during transmission, they cannot read it without the private key. This ensures the privacy and security of the communication.

End-to-end encryption is widely used in messaging apps (like WhatsApp, Signal), email services, and other secure communication platforms. This openly indicates that the claim these applications are safe and keep your data protected is only true to a degree. IF, EncroChat was hacked by French Authorities then no End-to-End Encryption is safe. We at Underbelly know the level of security E2EE provides and how difficult it is to burgle.

E2EE should ensure that only the intended recipient can read the messages, protecting against eavesdropping and unauthorized access. Protect data integrity during transmission, ensuring it cannot be tampered with or altered by even to top Pen Testers. However, users must securely manage their encryption keys. Losing a private key means losing access to the encrypted data.

E2EE is so complex that simply implementing end-to-end encryption requires robust technical infrastructure and expertise.

End-to-end encryption developers claim it provides a robust method for securing communications, ensuring that data remains private and secure from the moment it leaves the sender's device until it is decrypted by the recipient. While it presents some challenges, its benefits in protecting privacy and data integrity make it a crucial tool in modern digital communications.

End-to-end encryption (E2EE) is designed to be highly secure, making it extremely difficult to hack. Here are some key points to consider - E2EE uses robust encryption algorithms like AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman), which are widely regarded as the most secure and have withstood extensive cryptographic analysis and penetration testing. A communication session uses unique encryption keys, which are only known to the sender and recipient. This means even if one session is compromised, other sessions remain secure. Successfully breaking E2EE encryption without access to the private keys is computationally infeasible with current technology. It would require an enormous amount of time and resources, making it impractical for most attackers.

security of E2EE also depends on the security of the devices at both ends of the communication. If a device is compromised (e.g., through malware), the encryption can be bypassed.

While no system is entirely hack-proof, end-to-end encryption provides a very high level of security, making it one of the best methods available for protecting sensitive communications. However, it's essential to ensure proper implementation and maintain good security practices on the devices involved.

 

The Investigation

The first claim that a device was attached to the EncroChat server allowing Europol and the French authorities access to the server for 10 weeks

The French Gendarmerie began investigating EncroChat in 2017 after discovering that the phones were frequently found in operations against organized crime groups. They suspected that the company was operating from servers in France.

To infiltrate EncroChat, French authorities placed a "technical device" on the servers used by the company. This device allowed them to bypass the encryption and access the messages being sent and received by EncroChat users. Essentially, they were able to read the messages in real-time, gaining valuable insights into the activities of criminal networks.

The hack had a significant impact on organized crime across Europe. In the UK alone, it led to the arrest of approximately 746 suspected high-ranking criminals involved in activities such as murder, gun smuggling, and drug trafficking. Authorities seized large amounts of cash and drugs as a result of the operation.

The successful infiltration of EncroChat by French authorities demonstrated the vulnerabilities even in highly secure communication networks. It also highlighted the importance of international cooperation in tackling organized crime and the effectiveness of advanced technical measures in law enforcement operations.

French authorities had access to EncroChat from April 1, 2020, when they first installed the interception tool, until June 13, 2020, when EncroChat announced it was shutting down due to the police operation. This means they had access for about two and a half months.

French authorities managed to infiltrate EncroChat by installing a technical tool on the company's servers in France. This operation, authorized by a judge in Lille at the end of January 2020, allowed them to gain access to millions of encrypted messages sent by users.

The authorities collaborated with the National Crime Agency (NCA) and Dutch police to leverage intelligence and technical expertise for this infiltration. This enabled them to monitor and investigate over 100 million messages in real-time, leading to numerous arrests and seizures across Europe.

It was a significant and complex operation that showcased the lengths law enforcement agencies will go to in order to combat organized crime.

The device installed by French authorities on EncroChat's servers allowed them to intercept and read messages in real-time without necessarily needing to crack the end-to-end encryption directly. Instead of breaking the encryption, they were able to access the messages before they were encrypted or after they were decrypted on the users' devices. This method enabled them to monitor communications without alerting the users or compromising the encryption keys themselves.

 

The Second explanation the hacking operation conducted by French authorities involved accessing messages on users' devices before they were encrypted or after they were decrypted. They achieved this by deploying malware onto the EncroChat devices themselves. This malware allowed them to capture the plain text of the messages directly from the users' devices.

Here's how they now claimed it worked: Malware Deployment: French authorities managed to install malware on the EncroChat devices remotely. This malware was designed to operate covertly on the users' phones.

The malware intercepted messages at the endpoints—either before they were encrypted for sending or after they were decrypted upon receipt. This way, the authorities could read the messages in plain text without needing to break the encryption.

The hacking operation conducted by French authorities involved deploying malware that targeted EncroChat devices, rather than attacking the servers themselves directly. Here's a breakdown of how it worked: The French authorities developed and deployed malware specifically designed to be installed on EncroChat devices. This malware was covertly installed on the devices of EncroChat users.

Once installed, the malware allowed the authorities to capture plain text messages either before they were encrypted for sending or after they were decrypted upon receipt. This effectively bypassed the end-to-end encryption without needing to break the encryption itself.

The malware was able to infiltrate a large number of devices across the EncroChat network, enabling the authorities to monitor millions of messages in real-time.

While the servers facilitated the deployment of the malware by hosting updates and other services, the primary attack vector was the users' devices. The servers played a supporting role in distributing the malware to the devices.

This strategy allowed law enforcement to gather valuable intelligence and disrupt criminal activities coordinated through the EncroChat network. This method allowed law enforcement to bypass the encryption process entirely and access the communications directly from the users' devices.

Now they claim: The term "device" in this context can be a bit misleading. The French authorities did not necessarily attach a physical piece of hardware to the EncroChat servers. Instead, they deployed a software-based tool or malware onto the servers.

Here's a more precise breakdown: The "device" refers to a software tool or malware that was installed on the EncroChat servers and subsequently distributed to users' devices. This tool allowed authorities to intercept communications by exploiting the servers and the devices connected to them.

This malware was deployed remotely and did not require physical access to the servers. It was designed to operate covertly on the users' phones, allowing authorities to capture messages in plain text before encryption or after decryption.

So, while no physical hardware was attached to the EncroChat servers, the software tool/malware effectively achieved the same goal of intercepting communications.

Why change tech terms. Any IT tech will tell you hardware and software are two different. Hardware is an actual device; software runs the device. Hardware is useless without software, drivers etc. Software is dangerous on its own as it can be installed on hardware after being built or manipulated to serve a purpose. But software is more easily traceable than a “Device” attached and hidden in the server?

 

Operation Venetic was a major international law enforcement operation targeting the encrypted communication platform EncroChat, which was widely used by organized crime groups. Here's a detailed overview:

EncroChat was a Europe-based company that provided modified smartphones with encrypted messaging services. It became popular among criminal organizations for coordinating illegal activities.

 

In early 2020, French and Dutch authorities, with support from Europol and Eurojust, launched Operation Venetic to infiltrate EncroChat. They installed a technical tool on EncroChat's servers, allowing them to intercept and monitor communications in real-time.

Authorities collected vast amounts of data, including millions of messages and hundreds of thousands of images. This data was analysed to identify and locate offenders.

The operation led to over 6,500 arrests and the seizure of nearly €900 million in cash, along with significant quantities of drugs, firearms, and other illegal items. It also prevented numerous threats to life by mitigating over 200 planned kidnappings and executions.

On June 13, 2020, EncroChat realized their platform had been compromised and urged users to discard their devices. The company announced it would cease operations due to the police operation.

Operation Venetic is considered one of the largest and most significant law enforcement operations against organized crime in Europe. It demonstrated the effectiveness of international cooperation in tackling encrypted criminal communication networks.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The Security Risks of Mobile Phones

Mobile phones are an essential part of our everyday lives. They are not just for making phone calls anymore. We use them to access the internet, send text messages, take pictures and videos, and manage many aspects of our lives. However, this convenience comes with significant security risks that you should be aware of.

Privacy and Security Weaknesses

Mobile phones were not designed with strong privacy and security in mind. This means they do not do a good job of protecting your communications. Hackers can intercept your calls, texts, and online activities because many apps do not use strong enough encryption. Even apps that seem secure can have weaknesses that hackers can exploit.

Location Tracking and Surveillance

Another big risk with mobile phones is location tracking. Every smartphone has GPS capabilities that can track your movements in real-time. While this is useful for navigation and certain apps, it also means that unauthorized parties can access your location data, which can be a serious privacy threat.

One of the most significant privacy threats from mobile phones is the way they constantly broadcast your location. This can happen in several ways, but here are some of the primary methods

2. Mobile Signal Tracking 

 

Cell Site Simulator  A government or another technically sophisticated organization can  also collect location data directly, such as with a cell site simulator  (a portable fake cell phone tower that pretends to be a real one, in  order to “catch” particular users' mobile phones and detect their  physical presence and/or spy on their communications, also sometimes  called an IMSI Catcher or Stingray). IMSI refers to the International  Mobile Subscriber Identity number that identifies a particular  subscriber's SIM card, though an IMSI catcher may target a device using other properties of the device as well. The IMSI catcher needs to be taken to a particular location in order  to find or monitor devices at that location. Currently there is no  reliable defense against all IMSI catchers. (Some apps claim to detect  their presence, but this detection is imperfect.) On devices that permit  it, it could be helpful to disable 2G support (so that the device can  connect only to 3G and 4G networks) and to disable roaming if you don't  expect to be traveling outside of your home carrier's service area.  These measures can protect against certain kinds of IMSI catchers.  

 

Wi-Fi and Bluetooth Tracking

 

 Modern smartphones have other radio transmitters in addition to the  mobile network interface. They usually also have Wi-Fi and Bluetooth  support. These signals are transmitted with less power than a mobile  signal and can normally be received only within a short range (such as  within the same room or the same building), although sometimes using a  sophisticated antenna allows these signals to be detected from  unexpectedly long distances; in a 2007 demonstration, an expert in  Venezuela received a Wi-Fi signal at a distance of 382 km or 237 mi,  under rural conditions with little radio interference. Both of these  kinds of wireless signals include a unique serial number for the device,  called a MAC address, which can be seen by anybody who can receive the  signal. The device manufacturer chooses this address at the time the  device is created and it cannot be changed using the software that comes  with current smartphones. Unfortunately, the MAC address can be observed in wireless signals  even if a device is not actively connected to a particular wireless  network, or even if it is not actively transmitting data. Whenever Wi-Fi  is turned on on a typical smartphone, the smartphone will transmit  occasional signals that include the MAC address and thus let others  nearby recognize that that particular device is present. This has been  used for commercial tracking applications, for example to let  shopkeepers determine statistics about how often particular customers  visit and how long they spend in the shop. As of 2014, smartphone  manufacturers have started to recognize that this kind of tracking is  problematic, but it may not be fixed in every device for years—if ever. In comparison to GSM monitoring, these forms of tracking are not  necessarily as useful for government surveillance. This is because they  work best at short distances and require prior knowledge or observation  to determine what MAC address is built into a particular person's  device. However, these forms of tracking can be a highly accurate way to  tell when a person enters and leaves a building. Turning off Wi-Fi and  Bluetooth on a smartphone can prevent this type of tracking, although  this can be inconvenient for users who want to use these technologies  frequently. Wi-Fi network operators can also see the MAC address of every device  that joins their network, which means that they can recognize particular  devices over time, and tell whether you are the same person who joined  the network in the past (even if you don't type your name or e-mail  address anywhere or sign in to any services). On a few devices, it is physically possible to change the MAC address  so that other people can't recognize your Wi-Fi device as easily over  time; on these devices, with the right software and configuration, it  would be possible to choose a new and different MAC address every day,  for example. On smartphones, this commonly requires special software  such as a MAC address-changing app. Currently, this option is not  available for the majority of smartphone models.  

 

Location

 

Information Leaks From Apps and Web Browsing  Modern smartphones provide ways for the phone to determine its own  location, often using GPS and sometimes using other services provided by  location companies (which usually ask the company to guess the phone's  location based on a list of cell phone towers and/or Wi-Fi networks that  the phone can see from where it is). Apps can ask the phone for this  location information and use it to provide services that are based on  location, such as maps that show you your position on the map.

 

Some of these apps will then transmit your location over the network  to a service provider, which, in turn, provides a way for other people  to track you. (The app developers might not have been motivated by the  desire to track users, but they might still end up with the ability to  do that, and they might end up revealing location information about  their users to governments or hackers.) Some smartphones will give you  some kind of control over whether apps can find out your physical  location; a good privacy practice is to try to restrict which apps can  see this information, and at a minimum to make sure that your location  is only shared with apps that you trust and that have a good reason to  know where you are. In each case, location tracking is not only about finding where  someone is right now, like in an exciting movie chase scene where agents  are pursuing someone through the streets. It can also be about  answering questions about people's historical activities and also about  their beliefs, participation in events, and personal relationships. For  example, location tracking could be used to try to find out whether  certain people are in a romantic relationship, to find out who attended a  particular meeting or who was at a particular protest, or to try and  identify a journalist's confidential source. The Washington Post reported in December 2013 on NSA  location-tracking tools that collect massive amounts of information “on  the whereabouts of cellphones around the world,” mainly by tapping phone  companies' infrastructure to observe which towers particular phones  connect to when.

 

A tool called CO-TRAVELER uses this data to find  relationships between different people's movements (to figure out which  people's devices seem to be traveling together, as well as whether one  person appears to be following another).  Turning Phones off   There's a widespread concern that phones can be used to monitor  people even when not actively being used to make a call. As a result,  people having a sensitive conversation are sometimes told to turn their  phones off entirely, or even to remove the batteries from their phones. The recommendation to remove the battery seems to be focused mainly on the existence of malware  that makes the phone appear to turn off upon request (finally showing  only a blank screen), while really remaining powered on and able to  monitor conversations or invisibly place or receive a call. Thus, users  could be tricked into thinking they had successfully turned off their  phones when they actually hadn't. Such malware does exist, at least for  some devices, though we have little information about how well it works  or how widely it has been used. Turning phones off has its own potential disadvantage: if many people  at one location all do it at the same time, it's a sign to the mobile  carriers that they all thought something merited turning their phones  off. (That “something” might be the start of a film in a movie theater,  or the departure of a plane at an airport, but it might also be a  sensitive meeting or conversation.) An alternative that might give less  information away is to leave everybody's phone in another room where the  phones' microphones wouldn't be able to overhear the conversations.  

 

Burner Phones

 

  Phones that are used temporarily and then discarded are often  referred to as burner phones or burners. People who are trying to avoid  government surveillance sometimes try to change phones (and phone  numbers) frequently to make it more difficult to recognize their  communications. They will need to use prepaid phones (not associated  with a personal credit card or bank account) and ensure that the phones  and SIM cards were not registered with their identity; in some countries  these steps are straightforward, while in others there may be legal or  practical obstacles to obtaining anonymous mobile phone service. There are a number of limitations to this technique. First, merely swapping SIM cards or moving a SIM card  from one device to another offers minimal protection, because the  mobile network observes both the SIM card and device together. In other  words, the network operator knows the history of which SIM cards have  been used in which devices, and can track either individually or both  together. Second, governments have been developing mobile location  analysis techniques where location tracking can be used to generate  leads or hypotheses about whether multiple devices actually belong to  the same person. There are many ways this can be done. For example, an  analyst could check whether two devices tended to move together, or  whether, even if they were in use at different times, they tended to be  carried in the same physical locations.

A further problem for the successful anonymous use of telephone  services is that people's calling patterns tend to be extremely  distinctive. For example, you might habitually call your family members  and your work colleagues. Even though each of these people receive calls  from a wide range of people, you're likely the only person in the world  who commonly calls both of them from the same number. So even if you  suddenly changed your number, if you then resumed the same patterns in  the calls you made or received, it would be straightforward to determine  which new number was yours. Remember that this inference isn't made  based only on the fact that you called one particular number, but rather  on the uniqueness of the combination of all the numbers that you  called. (Indeed, The Intercept reported  that a secret U.S. government system called PROTON does exactly this,  using phone records to recognize people who placed phone calls in a  “similar manner to a specific target” from new phone numbers.) An  additional example can be found in the Hemisphere FOIA document.  

The document describes the Hemisphere database (a massive database of  historical call records) and how the people who run it have a feature  that can link burner phones by following the similarity of their call  patterns. The document refers to burner phones as "dropped phones"  because their user will "drop" one and start using another one—but the  database analytics algorithms can draw the connection between one phone  and another when this happens, so long as both were used to make or  receive calls to similar sets of phone numbers. Together, these facts mean that effective use of burner phones to  hide from government surveillance requires, at a minimum: not reusing  either SIM cards or devices; not carrying different devices together;  not creating a physical association between the places where different  devices are used; and not calling or being called by the same people  when using different devices. (This isn't necessarily a complete list;  for example, we haven't considered the risk  of physical surveillance of the place where the phone was sold, or the  places where it's used, or the possibility of software to recognize a  particular person's voice as an automated method for determining who is  speaking through a particular phone.)  

 

 

 

 

 

 

 

 

 

 

The Scottish Child Abuse Inquiry shortcomings are a danger to survivors

​​

Title: Unveiling the Scottish Child Abuse Inquiry: A Barbaric Treatment of Victims.

Underbelly True Crime

 

The Scottish Child Abuse Inquiry, established in 2015, was intended to provide justice to survivors of historical abuse in various Scottish institutions. However, its treatment of victims throughout the process has been nothing short of shocking, endangering the pursuit of truth and justice. This scathing assessment aims to expose the failures and shortcomings of the inquiry, highlighting the continued mistreatment of survivors and the unjust practices that have marred its reputation.

 

1. Insufficient Support for Victims:

The Scottish Child Abuse Inquiry has demonstrated a severe lack of empathy and consideration for the well being of survivors. Numerous victims have spoken out about the insufficient support provided, forcing them to relive their traumatic experiences without adequate emotional assistance or counseling. This neglect not only disregards their mental health but also undermines their ability to effectively present their experiences, damaging the prospects of a fair investigation.

 

2. Delayed Justice and Evasive

Tactics:

 

The inquiry's proceedings have been plagued by excessive delays, bureaucratic red tape, and evasive tactics, showcasing a disregard for survivors seeking justice. Time and time again, victims have been left waiting for their voice to be heard, only to be met with avoidable obstacles that hinder the progress of the inquiry. Such delays not only prolong the suffering of survivors but also allow perpetrators to escape accountability.

 

3. Limited Scope and Incomplete Investigation:

 

The Scottish Child Abuse Inquiry has faced criticism for its narrow focus, limiting the investigation to specific institutions and excluding others. By failing to broaden its scope and include all relevant organizations, the inquiry inadvertently perpetuates an incomplete understanding of the systemic failings that enabled child abuse to occur. This selective methodology risks shielding certain perpetrators, preventing a comprehensive and impartial examination of the issue.

 

4. Lack of Transparency and Public Confidence:

 

Transparency is crucial for an inquiry of this magnitude; sadly, the Scottish Child Abuse Inquiry has fallen short in this regard. The lack of openness and clear communication has eroded public confidence in the inquiry's ability to fulfill its objectives and deliver justice. The limited accessibility of information, repeated clashes with stakeholders, and inadequate explanation of decisions have all contributed to a profound sense of distrust among survivors and the wider public.

 

5. Damaged Reputations and Lost Opportunities:

 

The Scottish Child Abuse Inquiry's mishandling of victims' testimonies and its overall treatment of survivors have damaged its own reputation and created an environment of mistrust. Many victims have withdrawn from the inquiry due to the distress and re-traumatisation they experienced during proceedings, which can only be seen as a failure on the part of those responsible for ensuring a safe and supportive environment for survivors. The lost opportunities for genuine healing and justice for victims are inexcusable and further reflect the inquiry's ineptitude.

 

Conclusion:

 

In its handling of victims and survivors, the Scottish Child Abuse Inquiry has demonstrated a shocking disregard for their welfare and pursuit of justice. The lack of appropriate support, delayed justice, limited scope, and evasive tactics all contribute to a deeply flawed process. It is imperative that swift action is taken to rectify these shortcomings, providing survivors with the respect, dignity, and support they deserve in their quest for justice and healing. Only then can the inquiry truly serve its purpose and deliver on its promises .

We also discovered that during the Scottish Child Abuse Inquiry, Glasgow Social Work Department severely let down the survivors of historic abuse while they were in the care of the Scottish Government

Their record keeping and the deletion of records that proved the abuse, were  either deleted or destroyed. Same with their care home records. The staff at Larch-grove remand home names have been deleted. However ,if it wasn't for other survivors remembering the same names of staff then there would be no case to answer. This alone prevented myself from going civil with my case and the redress scheme is not fit  for purpose. In my opinion. been nothing less than disgusting.

 

This Inquiry has brought to light a dark chapter in Scotland's history, exposing the systematic abuse suffered by vulnerable children in various care institutions in Scotland

While children that were abused were reporting this abuse to their Social Worker. No investigation or protection was offered to the children. Instead, the reports were destroyed, deleted or hidden.

Underbelly True Crime discovered this was to protect the abusers and said institutions from prosecution and to cut the workload in the Social Work Department - states one ex Glasgow Social Worker:

 

The first major failing of the Glasgow Social Work department revealed during the Scottish Child Abuse Inquiry was its inadequate investigation into allegations of abuse. Overwhelming evidence has shown that numerous instances of abuse were reported to social workers by children, but action was either delayed or failed to materialize entirely. The department's inability to respond promptly and effectively exacerbated the suffering of vulnerable children, allowing abusers to continue their heinous actions with impunity.

Further exacerbating the problem, even when social workers acknowledged the abuse, the Glasgow Social Work department often prioritized preserving the reputation of the perpetrators or institutions over the safety and well being of the children. This systemic failure demonstrates a flawed approach that favored protecting abusers and their organizations rather than ensuring justice and safeguarding the victims.

Another concerning aspect of Glasgow Social Work department's response to the inquiry has been its failure to adequately support survivors of abuse.

The testimonies provided by survivors during the inquiry have shed light on the lack of appropriate support and care they received following their traumatic experiences.

Survivors have highlighted the insensitivity and lack of empathy displayed by social workers. Many reported feeling dismissed, ignored, or re traumatized by the department's handling of their cases. This failure to provide necessary support to survivors, particularly when they were at their most vulnerable, not only perpetuated their pain and suffering but also undermined their trust in the system designed to protect them.

The lack of accountability and transparency within the Glasgow Social Work Department (Pollok) is yet another area where significant failings have been uncovered. The inquiry has revealed alarming instances where crucial evidence was withheld or destroyed, hindering the pursuit of justice for survivors and the identification of those responsible for the abuse.

Additionally, the department's resistance to external scrutiny and a culture of secrecy has eroded public trust and confidence in its ability to tackle child abuse cases effectively. Without meaningful accountability and transparency, it becomes difficult to identify the root causes of the department's shortcomings and implement the necessary reforms to prevent such failures from reoccurring.

Addressing the failings of the Glasgow Social Work department and ensuring justice for survivors is the only way forward and it requires comprehensive reform from Glasgow Social Work Department to safeguard vulnerable children effectively. It is crucial to establish robust processes for the investigation and protection of children, ensuring social workers are equipped with the necessary resources and training to respond promptly and effectively to abuse allegations.

Moreover, survivors deserve a compassionate and supportive response from social workers, with trauma-informed practices at the forefront. Adequate funding and resources must be allocated to provide ongoing support services for survivors, fostering healing and recovery.

Furthermore, establishing clear lines of accountability and promoting transparency within the department will help restore public trust in its ability to protect children from abuse. This necessitates independent oversight of inquiries and investigations, ensuring all actions taken are impartial and aim to deliver justice.

The failings of the Glasgow Social Work Department during the Scottish Child Abuse Inquiry are deeply troubling and indicative of a significant disservice to vulnerable children and survivors of abuse. A new department with robust reforms, greater accountability, transparency, and improved support services for survivors is urgently needed to rectify this department's repeated failings and prevent such atrocities from occurring in the future. Only through these measures can we hope to provide justice and healing for survivors and eradicate the systemic failures that allowed the re-abusing of the abused to persist for far too long, with some survives suffering from re-abuse longer than the original abuse they received while in the care of the Scottish Government.

How can this be right?

Then we have our current SNP government. Who may I say, "screamed" for this Inquiry to take place. They buy Motor homes, Christmas gifts, shop Amazon, just spend our countries money on what they want. While us survivors sit back and watch them enjoy themselves as much as the care home staff who carried out the abuse had done so many years ago.

A free for all, back then on children, modern day on other people's money.

That's our Government for you.

What about the survivors?

The PR spin has now gone. Now it's a hindrance to them, well us survivors are a hindrance to them. A piece of shit on their shoes, as we have always been. Sad, but true.

Underbelly TV

Underbelly TV

Underbelly TV
Search video...
£3 Million Coke Gang’s Military Boss: Rich Jones | True Crime Podcast 170
02:53:50
Play Video

£3 Million Coke Gang’s Military Boss: Rich Jones | True Crime Podcast 170

20 Years In Scotland's Harshest Prisons & Escapes: Johnny Boy Steele | True Crime Podcast 12
03:23:02
Play Video

20 Years In Scotland's Harshest Prisons & Escapes: Johnny Boy Steele | True Crime Podcast 12

Glasgow Gangster In Max Security Prison: Kevin Dooley | True Crime Podcast 42
01:57:52
Play Video

Glasgow Gangster In Max Security Prison: Kevin Dooley | True Crime Podcast 42

Ross Kemp Extreme World - Glasgow CAUSES OF CRIME
41:06
Play Video

Ross Kemp Extreme World - Glasgow CAUSES OF CRIME

25137185.jpg_edited.jpg
bottom of page