• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Company
    • CTO
    • Events
    • Entertainment
    • Government
    • News
    • Tech Advice
    • Tech Careers
    • The Boardroom
    • Training and Education
    • Quotes
  • Tech Guide
    • National Security Technology
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Blockchain and Cryptocurrency
    • Robots
    • Internet of Things
    • Cyber War
  • Contact Us
  • Newsletters
  • Members Only
    • Sign in
  • OODA LLC

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

Home » Cyber War » Cyber Security » Rise of the Narcohackers

Rise of the Narcohackers

AdamElkus December 22, 2011

Share this:

  • LinkedIn
  • Facebook
  • Twitter
  • Reddit
  • Email

Here at CTOVision, we often write quite a bit about the problems of the insider threat, social engineering, and other threats to the enterprise. Amidst the seemingly endless array of security problems a given CTO faces (from overly generous Nigerians to Visitors from the Land of the Panda cough cough APTs), it’s easy to forget that the bad guys have security issues too.

Control of information is a key element in the Mexican cartel war. Slip up, and you might end up on YouTube sans head. Additionally cartels, like any other organization, seek to aggressively shape the narrative of the environment they operate in. So they’ve killed and kidnapped journalists, pushing the news conversation out to blogs and social networks. Some of the rawest information on the drug war comes from sites like Blog Del Narco.

To make matters worse for the cartels, outsider groups such as Anonymous have entered into the drug war, threatening to use their hacking skills to expose cartel members, corrupt Mexican politicians, and bandits. Now you might not exactly picture a Zeta commando to be the most adept with computers, but cartels have been using social networks for a while, as Robert Bunker relates:

[Cartels] utilize new forms of media and merge them with ghastly images of ‘on camera’ torture and killing. YouTube and other social media platforms were then utilized from about 2005-2006 on as a conduit for the transmission of this information. The disruptive effects on Mexican society are readily apparent and have resulted in an assault on the bonds and relationships that hold that nation together—the relations between the people, the government, and law enforcement/the military are becoming increasingly frayed.

Cartels have responded to the social network threat by using their own form of social engineering. While they have mainly employed traditional information-gathering skills, STRATFOR reports that the cartels may be hiring information security professionals of their own to find and kill the bloggers and cyber-activists arrayed against them. Given the resources available to cartels and their already impressive ability to co-opt elite talent (the Zetas themselves are former Mexican commandos)  it would not be particularly surprising if they have an organic cyber counterintelligence capability or are in the process of acquiring one. As one panelist mentioned during the FedCyber Government-Industry Cybersecurity conference, the rise of the mercenary and professional hacker classes is one of the characteristics of the new cyber threat environment.

Cartels are already tracking down and killing Mexican bloggers–or anyone who posts about them on social networks. In turn, however, cartels and the politicians they back are also vulnerable to leaks and social engineering–especially when carried out by those too far away for them to physically harm. It’s all about the OPSEC!

  • About
  • Latest Posts

AdamElkus

Analyst at OODA
Adam Elkus is a PhD student in Computational Social Science at George Mason University. He writes on national security, technology, and strategy at oodaloop.com for OODA, War on the Rocks, and his own blog Rethinking Security. His work has been published in The Atlantic, Journal of Military Operations Foreign Policy, West Point Counterterrorism Center Sentinel, and other publications.

Latest posts by AdamElkus

  • MYCIN, Watson, and AI History - August 28, 2014
  • Computers and History: Beyond Science Fiction - August 26, 2014
  • Encyclopedia Dramatica And The Case Of The Satoshi Paradox - March 17, 2014

Related

Filed Under: Cyber Security Tagged With: National Security

About AdamElkus

Adam Elkus is a PhD student in Computational Social Science at George Mason University. He writes on national security, technology, and strategy at oodaloop.com for OODA, War on the Rocks, and his own blog Rethinking Security. His work has been published in The Atlantic, Journal of Military Operations Foreign Policy, West Point Counterterrorism Center Sentinel, and other publications.

Primary Sidebar

Your account

Sign in

Future Proof

OODA

Disruptive IT finder

CTOevents

Featured Content

Latest CTOvision Assessments on Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things and Cybersecurity

Learn things your competitors wish you did not know

CTO Guide To The Business of Cloud Computing

CTO Guide To The Business of Cybersecurity

CTO Guide to the Business of Artificial Intelligence

CTO Guide To The Business of the Internet of Things

CTO Guide To The Business of Robotics

CTO Guide To The Business of Bigdata

CTO Guide To The Business of Mobility

Footer

Free Newsletters and Tech Reports
CTOVision Pro: Exclusive Content
Crucial Point LLC

CTOs on Facebook
CTOs on LinkedIn
OODA LLC Technology Due Diligence

CTO Events
CTOvision Mobile App
OODAloop.com

Copyright © 2019 CTOvision.com·

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.