Stories
Slash Boxes
Comments

SoylentNews is people

posted by Snow on Wednesday January 09 2019, @10:58PM   Printer-friendly
from the i-woudn't-want-to-the-that-it-guy dept.

El Chapo Trial: How a Colombian I.T. Guy Helped U.S. Authorities Take Down the Kingpin

In February 2010, an undercover F.B.I. agent met in a Manhattan hotel with a Colombian info-tech expert who had been the target of a sensitive investigation. The I.T. specialist, Cristian Rodriguez, had recently developed an extraordinary product: an encrypted communications system for Joaquín Guzmán Loera, the Mexican drug lord known as El Chapo.

Posing as a Russian mobster, the undercover agent told Mr. Rodriguez he was interested in acquiring a similar system. He wanted a way — or so he said — to talk with his associates without law enforcement listening in.

So began a remarkable clandestine operation that in a little more than a year allowed the F.B.I. to crack Mr. Guzmán's covert network and ultimately capture as many as 200 digital phone calls of him chatting with his underlings, planning ton-sized drug deals and even discussing illicit payoffs to Mexican officials. The hours of Mr. Guzmán speaking openly about the innermost details of his empire not only represented the most damaging evidence introduced so far at his drug trial in New York, but were also one of the most extensive wiretaps of a criminal defendant since the Mafia boss John Gotti was secretly recorded in the Ravenite Social Club.

[...] In a daring move that placed his life in danger, the I.T. consultant eventually gave the F.B.I. his system's secret encryption keys in 2011 after he had moved the network's servers from Canada to the Netherlands during what he told the cartel's leaders was a routine upgrade.

Previously: Sean Penn Interview Reportedly Led to Capture of Mexican Drug Lord


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday January 10 2019, @02:27AM (1 child)

    by Anonymous Coward on Thursday January 10 2019, @02:27AM (#784423)

    Posing as a Russian mobster, the undercover agent told Mr. Rodriguez he was interested in acquiring a similar system. He wanted a way — or so he said — to talk with his associates without law enforcement listening in.

    What, there's professional meetups and conventions for organized crime sysadmins? I would have thought someone approaching you out of the blue with pointed questions is an obvious red flag that you have been found out.

  • (Score: 4, Insightful) by All Your Lawn Are Belong To Us on Thursday January 10 2019, @05:03PM

    by All Your Lawn Are Belong To Us (6553) on Thursday January 10 2019, @05:03PM (#784549) Journal

    Darknet aside (which the average mobster, whatever, might not know about how to use and therefore is irrelevant), the need of others and communication with them is generally the weakness of almost all criminal enterprise. Going to provide secure services which you know will be used for unlawful activity (itself a crime), you have to have customers who know how to find you. Going to do drug deals in the surveillance state? You need to hire technical support to help evade it. (If not tech support, you need security advice...) *Going to steal shit? You need a fence. Going to deal drugs? You need customers, suppliers, and dealers. Name the crime and you likely need to be communicating with someone about it.

    --
    This sig for rent.