Feeds

Mexico shuts down drug gang's antennas, radios

Army says deadly Las Zetas used some of the kit to track the military

Choosing a cloud hosting partner with confidence

The Mexican government has shut down a secret mobile network reckoned to be run by one of the country's drug cartels, possibly the ruthless Zetas.

Military army troops confiscated 1,400 radios, 2,600 mobile phones, computer equipment, 167 antennas and 166 power supplies including solar panels as part of the operation. The kit is thought to have powered an encrypted mobile phone network that spanned four border states in northern Mexico.

The Mexican Defence department said that the network had been used by drug runners to communicate among themselves and to track military movements. The Zetas, who are fighting a ruthless turf war against their former bosses in the Gulf Cartel, are big players in all four states covered by the covert network (Tamaulipas, Nuevo Leon, Coahuila and San Luis Potosi).

Last summer the Mexican navy dismantled a communications network linked to the Zetas in the Gulf state of Veracruz, AP reports. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.