Makes sense; there’s room inside a squid’s body cavity:
Latin American drug lords have sent bumper shipments of cocaine to Europe in recent weeks, including one in a cargo of squid, even though the coronavirus epidemic has stifled legitimate transatlantic trade, senior anti-narcotics officials say.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
Posted on May 1, 2020 at 4:06 PM •
New research: “Leaving on a jet plane: the trade in fraudulently obtained airline tickets:”
Abstract: Every day, hundreds of people fly on airline tickets that have been obtained fraudulently. This crime script analysis provides an overview of the trade in these tickets, drawing on interviews with industry and law enforcement, and an analysis of an online blackmarket. Tickets are purchased by complicit travellers or resellers from the online blackmarket. Victim travellers obtain tickets from fake travel agencies or malicious insiders. Compromised credit cards used to be the main method to purchase tickets illegitimately. However, as fraud detection systems improved, offenders displaced to other methods, including compromised loyalty point accounts, phishing, and compromised business accounts. In addition to complicit and victim travellers, fraudulently obtained tickets are used for transporting mules, and for trafficking and smuggling. This research details current prevention approaches, and identifies additional interventions, aimed at the act, the actor, and the marketplace.
Posted on May 11, 2018 at 6:24 AM •
This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of this blog will see it coming, of course, but it’s a still a good read.
I don’t know whether the professor knew what he was doing—it’s pretty clear that the reporter believes he’s guilty. What’s more interesting to me is that there is a drug smuggling industry that relies on recruiting mules off the Internet by pretending to be romantically inclined pretty women. Could that possibly be a useful enough recruiting strategy?
EDITED TO ADD (4/12): Here’s a similar story from New Zealand, with the sexes swapped.
Posted on March 28, 2013 at 8:36 AM •
Not a cat burglar, a cat smuggler.
Guards thought there was something suspicious about a little white cat slipping through a prison gate in northeastern Brazil. A prison official says that when they caught the animal, they found a cellphone, drills, small saws and other contraband taped to its body.
Another article, with video.
A prison spokesperson was quoted by local paper Estado de S. Paulo as saying: “It’s tough to find out who’s responsible for the action as the cat doesn’t speak.”
Posted on January 8, 2013 at 1:36 PM •
This is clever:
A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the border. The lookouts identified “targets”—people with regular commutes who primarily drove Ford vehicles. According to the FBI affidavit, the smugglers would follow their targets and get the vehicle identification number off the car’s dashboard. Then a corrupt locksmith with access to Ford’s vehicle database would make a duplicate key.
Keys in hand, the gang would put drugs in a car at night in Mexico and then pick up their shipment from the parked vehicle the next morning in Texas, authorities say.
This attack works because 1) there’s a database of keys available to lots of people, and 2) both the SENTRI system and the victims are predictable.
Posted on July 25, 2011 at 5:59 AM •
Chilling story of a death-row inmate with a contraband cell phone.
If we can’t keep contraband out of prisons, how can we possibly hope to keep it out of airports?
Posted on October 28, 2008 at 7:09 AM •
I think this is the first security vulnerability found in RFC 1149: “Standard for the transmission of IP datagrams on avian carriers.” Deep packet inspection seems to be the only way to prevent this attack, although adequate fencing will prevent the protocol from running in the first place.
Posted on June 27, 2008 at 6:32 AM •
Good article on the difficulty of keeping drugs out of prisons. Lots of ways to evade security, including making use of corrupt guards.
Posted on April 15, 2008 at 6:56 AM •
Sidebar photo of Bruce Schneier by Joe MacInnis.