"Deputies searched the box trucks and discovered a large amount of Lego products. A thorough investigation revealed the trailers were stolen while in transit from Fort Worth, Texas, to Moreno Valley, California."
This was a fantastic seizure by our colleagues at Border Force, and taking this amount of cocaine out of circulation will have deprived the organised criminals involved of millions in profits.
A man broke into the victim's home and stole more than $600,000 worth of property, including designer handbags and jewelry. After weeks of investigating, including working with San Diego and Glendale police, authorities executed a search warrant on the suspect's home in Temecula on Feb. 25 and found the victim's property and a whole lot more.
Historically, enforcement has been largely reactive. There is so much global trade that fewer than 1 in 10 international cargo shipments of any kind are physically inspected. Traffickers also avoid detection by using false or generic names instead of proper species identification, employing coded language in online listings, rerouting shipments and shifting to different messaging platforms when enforcement pressure increases. Emerging digital tools are helping authorities link online monitoring, legal reference tools and on-the-ground investigations.
The jackpotting attacks involve the use of specialized malware, such as Ploutus, to infect ATMs and force them to dispense cash. In most cases, cybercriminals have been observed gaining unauthorized access to the machines by opening an ATM face with widely available generic keys. There are at least two different ways by which the malware is deployed: Removing the ATM's hard drive, followed by either connecting it to their computer, copying it to the hard drive, attaching it back to the ATM, and rebooting the ATM,