Hacker News new | past | comments | ask | show | jobs | submit login
Non-conventional hackers in the Mexican Drug War
7 points by andujo on Aug 12, 2010 | hide | past | favorite
Mexican drug cartels are in war and they need urgently more money to survive. One way to get this extra money is hacking (non-computer) established processes or systems. Here are just three examples and some preventive recommendations.

Gathering confidential information from banks:

They express kidnap bank executives. They request the complete information from customers for next day or they will kill or kidnap his family. Once the information is delivered, affected people start receiving calls telling you (for free) how much money is in your bank account, your address and where and how they want the money.

One way to avoid this hack is to open a bank account in U.S. and/or distribute your savings in two or three Mexican banks in order to maintain a low profile.

Undercover delinquents:

Delinquents are calling to business owners in order to schedule meetings telling they are executives from well known companies. When they meet (they look like executives), the person is kidnapped or extorted. The same is happening with people selling their homes by themselves.

Calling to the company where the supposed executive works in order to confirm his relationship and hiring a real estate agency are the recommended actions to skip the hack.

Home-jacking:

Young people going to dance clubs and bars are being kidnapped for information. They request to the victim to mention who in the bar or dance club is the one with wealthy fathers. Delinquents follow the target to his home and just when the door is open they proceed to kidnap the family until they get the money and other precious items, including the cars.

Checking if suspicious cars are following you or are parking near your home will save you from this bad experience.

People from Northern Mexico are suffering a drastic change in the way they live and relate each other. Currently every call and every unknown person is a possible threat.

All cases were provided by friends or neighbors, directly affected by this type of hacking procedures.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: