Articles Tagués ‘FBI’

OBJECTIF: détruire le cartel de Sinaloa

Importante opération pour les agents de la DEA qui ont saisi 6 millions de dollars, des centaines de livres de stupéfiants et délivré 75 accusations à travers toute l’Amérique pour «blanchiment de l’argent pour le compte du gang d’El Chapo»

Les autorités ont accusé 40 personnes à San Diego de conspirer pour blanchir des dizaines de millions de dollars en argent de la drogue dans des villes des États-Unis et des cartels au Mexique

-Saisie de plus de 6 millions de dollars en espèces
-209 livres de méthamphétamine, 138 livres d’héroïne, 22 livres de fentanyl, 202 livres de cocaïne et 554 livres de marijuana ont également été saisis
-20 armes à feu, y compris des fusils semi-automatiques et des armes de poing ont également été saisies
-35 autres personnes ont été inculpées dans d’autres parties du pays

Le FBI a déployé des agents infiltrés et des agents des forces spéciales de diverses forces de l’ordre pour infiltrer

Lire la suite, photos et video:


fbiMASSILLON, Ohio – FBI agents and several other law enforcement agencies executed eight arrest warrants and seven search warrants in Massillon and throughout the Akron and Canton area in connection with a major drug take down operation.


Posté avec WordPress pour Android


District of Puerto Rico announce the results of the DEA lead arrest operation during a news conference at the U.S. Attorney’s Office. Picture are (L-R) ATF RAC Felix Rios, DEA ASAC James Doby and U.S. Attorney Rosa Emilia Rodriguez
District of Puerto Rico announce the results of the DEA lead arrest operation during a news conference at the U.S. Attorney’s Office. Picture are (L-R) ATF RAC Felix Rios, DEA ASAC James Doby and U.S. Attorney Rosa Emilia Rodriguez

OCT 07 (SAN JUAN, Puerto Rico) –This morning, the Organized Crime Drug Enforcement Task Force (OCEDTF) dismantled a drug trafficking organization responsible for the transportation of multi-kilogram quantities of cocaine and drug money between Puerto Rico and the Continental United States, announced United States Attorney Rosa Emilia Rodríguez-Vélez. The Drug Enforcement Administration (DEA) is in charge of the investigation with the collaboration of  Immigration and Customs Enforcement, Homeland Security Investigations (ICE-HIS), and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF).

On September 30, 2015, a federal grand jury returned a three-count indictment charging 37 individuals with participating in a conspiracy to possess with intent to distribute cocaine, and conspiracy to tamper with a witness. The defendants are: Luis Rivera-Ramos, aka “Luigi;” Rubén Barceló-Severino, aka “Chucky;” Jesús M. Vázquez-Rivera; Glarivy Rivera-Huertas; Luis Pintor; Antonio Llano-Mulley, aka “Pupolo;” Valeria Ramos-Ruiz; Ashley Flores-Carter; Kenneth Rivera-Ramos, aka “Gazu;” Kelvin Collazo-Rodríguez, aka “Pirulo;” Eddie Fernández-Ruiz; Carmen Yaritza Povez-James; Xavier Camacho-Valdés; Carmen Odalis Flores-Dávila; Valeria Mojica-De Jesús; José Burgos-Estrada; Joselyn Alicea-Villegas; David Reyes-Santiago; Deyaneira Reyes-Santiago; Kevin Reyes-Santiago; Jonathan Reyes-Santiago; Pedro Ramos-Ruiz; Lynn Ramos; Alba Torres-Suárez; Aníbal Torres-Pérez; Ayleen Santana-Gómez; Blanca Calo-Vázquez; Dariana Santiago-Falcón; Esteban A. Rivera-Guzmán; Gilberto Villegas; Joson F. Abreu; Jessica Martínez-Alfaro; Juan Figueroa-Cabrera; Kacsy Maldonado-Giegel; Liliana Geigel-Rivera; Llinozca Delgado-Ríos; and Nayad Pujols-Noboa.

The investigation leading to today’s arrests uncovered that members of this organization utilized drug mules to smuggle kilograms of cocaine hidden in suitcases on airplanes flying out of the Luis Muñoz Marín International Airport (LMMIA). The kilograms of cocaine were vacuum sealed and pressed into the approximate width of a magazine, and were then wrapped in carbon paper. The suitcases were altered to contain a hidden compartment in the bottom, where the kilograms of cocaine were concealed. The suitcases typically contained two kilograms each, and the mules would travel with one or two suitcases at a time.
The organization instructed the mules on how to handle law enforcement in the event that they were arrested for smuggling. The organization’s leadership would provide the mules with a story to tell law enforcement to lead them in the wrong direction and away from the organization. The organization also utilized intimidation and threats of violence to prevent the mules from cooperating with law enforcement.

“These arrests are a clear indication of the success of the OCEDTF in the fight against drug trafficking. Today’s arrests dismantle an organization that coordinated not only the traffic of cocaine between Puerto Rico and the Continental United States, but also the movement of drug money, essential to the success of these illegal activities,” said Rosa Emilia Rodríguez-Vélez, U.S. Attorney for the District of Puerto Rico. “We will continue maximizing all of our combined resources to investigate and prosecute those who disregard our laws and try to smuggle illegal contraband into our jurisdiction.”

The case is being prosecuted by Assistant United States Attorney Aaron Howell.

If found guilty, the defendants face terms of imprisonment from 10 years to life. Criminal indictments are only charges and not evidence of guilt. A defendant is presumed to be innocent until and unless proven guilty.

The case was investigated by agents from the Organized Crime Drug Enforcement Task Force (OCDETF) that investigates South American-based drug trafficking organizations responsible for the movement of multi-kilogram quantities of narcotics using the Caribbean as a transshipment point for further distribution to the United States. The initiative is composed of DEA, HSI, FBI, US Coast Guard, US Attorney’s Office for the District of Puerto Rico, and PRPD’s Joint Forces for Rapid Action.

The Airport Investigations and Tactical Team (AirTAT) operates in the District of Puerto Rico as an OCDEFT strategic initiative that is part of the National Airport Initiative. It is a multi-agency, co-located task force that includes DEA, HSI, FBI, USPIS, CBP – Office of Field Operations, and ATF. AirTAT also works closely with the Police of Puerto Rico. AirTAT’s mission is to identify, locate, disrupt, dismantle, and prosecute TCOs and their operatives using the Luis Muñoz Marín International Airport (LMMIA), the Fernando Luis Rivas Dominicci Airport (FLRDA), and airport peripherals as platforms to smuggle narcotics, weapons, human cargo, counterfeit documents, illicit proceeds, and other contraband through these critical airport infrastructures.


Written by Lorenzo Franceschi-Bicchierai April 15, 2015 // 02:00 PM EST

The software, known as Remote Control System or “RCS,” is capable of intercepting phone calls, texts, and social media messages, and can surreptitiously turn on a user’s webcam and microphone as well as collect passwords.

The DEA originally placed an order for the software in August of 2012, according to both public records and sources with knowledge of the deal.

The contract, which has not been previously revealed, shows that the FBI is not the only US government agency engaged in hacking tactics, but that the DEA has also been purchasing off-the-shelf malware that could be used to spy on suspected criminals.

This revelation comes just a week after USA Today uncovered a secret program with which the DEA collected the phone records of millions of Americans for more than 20 years, a program that pre-dated and inspired the NSA’s own bulk telephone collection program, suggesting that the drug agency is sort of a pioneer in the use of surveillance.

Surveillance tech experts say the DEA’s relation with Hacking Team is further proof that methods and tools once only reserved for the military, intelligence agencies and even cybercriminals—such as drones and StingRays—are becoming commonplace in law enforcement as well.

“Hacking software is yet another example of a technology created for the intelligence community that has secretly trickled down to law enforcement.”

“Hacking software is yet another example of a technology created for the intelligence community that has secretly trickled down to law enforcement,” Christopher Soghoian, the principal technologist at the American Civil Liberties Union and an expert of surveillance technology, told Motherboard.

And given the how powerful this spyware can be, Soghoian added, “we need a public debate over this invasive surveillance technology.”​


The contract, according to public records, was signed on August 20, 2012 for a total value of $2.4 million between the DEA’s Office of Investigative Technology and a government contractor named Cicom USA.

The records were uncovered by Motherboard and Pri​vacy International, a London-based digital rights group, in independent investigations.

The contract, which records show is slated to be completed in August of 2015, is identified only as “Remote Controlled Host Based Interception System.”

That system, according to sources, is none other than Hacking Team’s Remote Control System, also known as Galileo, which the company markets as “the hacking suite for governmental interception.”

“You cannot stop your targets from moving. How can you keep chasing them? What you need is a way to bypass encryption, collect relevant data out of any device, and keep monitoring your targets wherever they are, even outside your monitoring domain. Remote Control System does exactly that,” a company brochure boasts.

Cicom USA, Motherboard has learned, was simply a reseller for Hacking Team, a spyware-maker that’s been accused of selling its products to some governments with questionable human rights records. Some of those governments, such as Ethiopia, the United Arab Emirates, or Morocco, used Hacking Team’s software to target dissidents and journalists.

In light of those incidents, which were uncovered by researchers at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, the company was included in a blacklist of corporate “Enemies of the Internet” by Reporters Without Borders.

Despite speculation based on the fact that Hacking Team has an office in the US, there’s never been any evidence that the company had sold its products on American soil, even though CEO David Vincenzetti boasted of having clients in more than 40 countries, including the US, in a 2011 interview with Italian newsmagazine L’Espresso.

The connection between Cicom USA and Hacking Team was confirmed to Motherboard by multiple sources with knowledge of the deal, who spoke on condition of anonymity because they were not authorized to discuss the content of the contract.

Eric Rabe, a spokesperson for Hacking Team, did not confirm nor deny the existence of the contract with the DEA.

“We don’t identify our clients. I’m certainly not going to comment whether the DEA or anyone else has purchased Hacking Team software.”

“We don’t identify our clients. I’m certainly not going to comment whether the DEA or anyone else has purchased Hacking Team software,” he told Motherboard in a phone interview. And for the same reason, he added, he declined to clarify what was the relationship between Hacking Team and Cicom USA.

Alex Velasco, Cicom USA’s general manager, did not answer Motherboard’s request for comment.

But the connection between the two companies is clear. Cicom USA is based in Annapolis, MD, at the same exact address where Hacking Team’s US office is located, according to the company’s website. The phone number for Cicom USA listed in the contract with the DEA, moreover, is exactly the same one that was displayed on Hacking Team’s website until February of this year.

When asked whether this was just a coincidence, Rabe laughed.

“I don’t know about why that would be a coincidence,” he said, but declined to elaborate.

It’s unclear what the DEA has been doing with Hacking Team’s malware. But the relationship between the agency and Cicom USA—and thus, Hacking Team—appears to be ongoing. The most recent public record shows a payment from the DEA to Cicom USA made in September of 2014.

A spokesperson for the DEA did not respond to a series of specific questions on the contract and how the DEA is using this technology. Thomas L. Walden, the section chief of the DEA Office of Investigative Technology, also did not respond to a message requesting comment.

Hacking Team’s RCS software can be surreptitiously installed on a target’s computer or cellphone and monitor all activity, allowing police officers to spy on data that might otherwise be encrypted and out of their reach.

Software like this isn’t sold only by Hacking Team. The Italian company is just one of an ever-growing group of surveillance tech companies that market their products exclusively to governments, police departments, and spy agencies, such as the French VUPEN, or the German FinFisher and its parent company Gamma International.

This is exactly the kind of software that the DEA was looking for, according to an official call for tender or “request for Information” published by the agency in March, 2012.

“The DEA is seeking information from potential sources with a fully functional and operational product proven to be capable of providing a Remote Control Host Based Interception System for device or target specific collection pursuant to authorized law enforcement use,” the document reads.

Roughly a month later, on May 4, 2012. The DEA had what it was looking for. In another document, the agency announced that it was going to “solicit and negotiate” a contract with Cicom USA for the duration of at least four years.

Cicom USA, according to the DEA, emerged as the only company capable of providing the service required, based on market research conducted internally by the agency. The DEA did not respond to questions regarding this research.

It’s possible the DEA picked Cicom USA because the US Army had done the same a year prior. According to public records, the Army made a purchase order for a Remote Control System on March 2011. The order shows that the Army was supposed to pay $350,000 for the software, and further confirms Cicom USA’s connection with Hacking Team, given that Italy is listed as the country of origin of the product. (The Army did not respond to Motherboard’s questions regarding the contract.)


For surveillance experts, the big question is whether the DEA actually has legal authority to use spyware such as Hacking Team’s—and how, exactly, it is used. A DEA spokesperson said that the agency “always abides by the laws of the jurisdictions within which it operates.”

And added that “however, in this case, this is off-the-shelf technology, legally available for purchase by all and used throughout the world by many organizations.”

But experts are not convinced.

“The legal framework governing the use of such tools in the US is extremely unclear, meaning that the use of Hacking Team’s spyware is potentially unlawful,” Edin Omanovic, a researcher at Privacy International, told Motherboard.

“The use of Hacking Team’s spyware is potentially unlawful.”

The FBI is the only other US law enforcement agency that has been reported to use malware. The bureau has been using it since at least 2001 when FBI’s spyware Magic Lantern was revealed. But the precise legal authority, as well as the process that FBI agents use to get authorization, is still unclear, and very few cases where the bureau used malware have actually come to light.

In 2011, internal emails obtained by the Electronic Frontier Foundation revealed that in some past instances, FBI agents considered using malware known as « Computer and Internet Protocol Address Verifier » (CIPAV) without getting a warrant, or in other cases, hid key details on what the technology actually entailed in order to increase the chances the judge would approve it.

In any case, the bureau, after consulting with the Office of General Counsel and the National Security Law Branch finally appeared to settle on a “two-step request” legal process: get a search warrant to authorize the deployment of the software on a target’s computer, and then a subsequent order (known as pen register or trap and trace) to authorize the actual surveillance.

In 2013, a Texas judge stopped the FBI from using malware, rejecting the bureau’s warrant application because it was too vague and didn’t specify how the agents would actually install the software.

Soghoian, the ACLU surveillance tech expert, said that given the nature of this technology, and the fact that “Congress and the courts have been kept in the dark” about it, Americans should have more information on when and how the feds are using spyware.

“If law enforcement agencies can hack into your computer, turn on your webcam, turn on your microphone and steal documents from your computer, that’s the kind of thing that should get the attention of Congress. »

“Courts are not being told how agencies will get malware onto the computers of targets,” Soghoian said. “Similarly, law enforcement agencies have not discussed the use of this technique in any public Congressional hearings.”

“The American people deserve some answers and I think Congress needs to investigate this,” Soghoian told Motherboard.

Omanovic, from Privacy International, added that the US needs update the legal framework regarding hacking and the use of spyware by law enforcement agencies and establish “effective oversight mechanisms.”

Privacy International also released a ​dos​sier on Hacking Team on Wednesday, asking Italian authorities to look into the company and its practices in light of European export controls of surveillance technology. (Rabe said that the company « is in compliance with all export laws. »)

Some legal experts, however, argue that there’s nothing illegal about the use of spyware. Although there is no specific law that specifically covers hacking, Jonathan Mayer, a computer scientist and lawyer at Stanford University, said that law enforcement agencies are “broadly authorized” to conduct searches in the US, including using hacking techniques.

“They don’t need some special legislative grant of extra authority before they can hack,” Mayer told Motherboard, adding that a search warrant supported by probable cause and particularly describing what the agents seek is all they need.

But for critics, such as Soghoian or Privacy International, there still should be more transparency and a public debate.

“If law enforcement agencies can hack into your computer, turn on your webcam, turn on your microphone and steal documents from your computer,” Soghoian said, “that’s the kind of thing that should get the attention of Congress, particularly before this trickles down to local law enforcement agencies.”

This story has been updated to include a comment from Hacking Team’s Eric Rabe on his company’s compliance with export controls. And to clarify that FBI agents considered using malware without a warrant, according to documents obtained by the EFF. 


The international informant

Le avec AFP | 26.03.2015 à 20h58

Des policiers américains de l’Agence fédérale de contrôle des stupéfiants (Drug Enforcement Administration, DEA) recevaient des prostituées, de l’argent, des armes et d’onéreux cadeaux des cartels de la drogue lorsqu’ils étaient en enquête à l’étranger, révèle un rapport publié jeudi 26 mars.

Ce rapport de l’inspecteur général du ministère de la justice a été réalisé après la révélation que des agents du gouvernement avaient passé des soirées avec des prostituées lors d’un voyage présidentiel en Colombie, en 2012. L’enquête a porté sur les agissements entre 2009 et 2012 des policiers de quatre agences fédérales, celle contrôlant les stupéfiants (DEA), celle contrôlant l’alcool et les armes (ATF), le FBI et les US Marshals chargés de la sécurité en vol, précise un communiqué accompagnant le rapport.Un policiers américain de l'Agence fédérale de contrôle des stupéfiants (Drug Enforcement Administration, DEA).

En savoir plus sur


Voir l’article original