Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceIdentity ManagementPhysical SecurityCybersecurity NewsEnterprise Services

To keep pace with digital devices used in the course of crimes, Argentina’s border guard force uses a combination of technology and teamwork

Case study

By Heather Mahalik
GNA

Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA
GNA
GNA
GNA
October 14, 2020

Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. The GNA, as well as their border force colleagues in neighboring countries, must also grapple with cross-border crime that take advantage of the close ties among the region’s economies. According to Interpol, illicit markets in these border regions may be worth tens of billions of dollars.

“As criminals exploit the interconnected economies of Argentina, Brazil, and Paraguay, only greater coordination between the three countries’ police forces will bring about a step change in the region’s fight against organized crime,” said José de Gracia, Assistant Director of INTERPOL’s Criminal Networks Unit, in December 2019.

To effectively manage border security, the GNA has to solve cases faster, and also do their detective work across an immense geographical area. Today, nearly all of these cases involve digital devices, including mobile phones and computers. To process the steady stream of digital devices and glean evidence from them, the GNA put together a unique combination of technology and teams – centered on Cellebrite’s Digital Intelligence solutions and a network of digital forensics labs around the country. Digital Intelligence (DI) is the data that is extracted from ever-expanding digital sources and data types —smartphones, computers, and the Cloud— and the process by which agencies access, manage, and leverage data to more efficiently run their operations.

 

Reducing time and travel for digital investigations

“It’s a big country, and it's hard to cover with one lab,” says Antonio Maza, “Experto” (expert) for the GNA’s Departamento Análisis Forense Digital. “The number of devices is always increasing because of digital adoption, and we can't keep up with the demand.” The process of delivering devices to the GNA’s national forensics laboratory in Buenos Aires for data extraction and analysis was slow, since the force’s five regional headquarters were scattered around Argentina, and often thousands of miles away from the capital city.

A new network of forensics labs, all equipped with Cellebrite solutions, is intended to reduce the Digital Intelligence burden on the national lab in Buenos Aires. The regional labs, of which five may be opened by the end of 2020, are sorely needed to keep pace with the mushrooming number of digital devices connected to border crime cases.

“In 2019, we analyzed about 2,000 devices over all Argentina,” Maza says. “It’s not just mobile phones – it’s also computers, DVRs, and more. A few years ago, we had to analyze 1,000 devices – now it’s 2,000, and next year, it will be much more. It’s a problem to solve for the future.”

It’s not just about the proliferation of devices – it’s about the time it takes to ship devices to Buenos Aires across a very large country. That distance slows down encryption and analysis of data that could be crucial to border security cases.

“We don’t have days and days to finish investigations,” Maza says. “And we don’t want evidence to be lost.” By placing labs closer to where investigators are working on cases, the devices and data can be analyzed more rapidly, closing cases quickly and bringing suspects to justice.

 

Technology that cracks cases

The regional forensics labs will be equipped with the same Cellebrite technology used by officers use at the GNA’s national lab. When investigators in the field first obtain digital devices at crimes scenes or in the course of their investigations, they use UFED, Cellebrite’s mobile forensic solution, to extract data from the devices.

But increasingly, investigators don’t just need data from the physical devices connected to crimes; they need data from messaging apps and cloud computing tools that suspects are likely to use to communicate with each other, and to share evidence like photos and videos. What’s more, there’s data hidden in web browsing history, mapping applications, online search history, and WiFi connections. This, too, is evidence that can place suspects at crime scenes or indicate who suspects are interacting with.

For this reason, GNA investigators also use tools such as Cellebrite UFED Cloud to find, analyze, and preserve information in the cloud, such as chats from messaging services like WhatsApp and Telegram, online calendars, location data, and user profile information.

In addition to using solutions that help locate and analyze data, investigators at the new regional labs will also tap into Cellebrite solutions that help them work together effectively. For example, they use Cellebrite Pathfinder to create a unified forensics environment across the lab network. As investigators extract evidence from devices, forensics experts apply a layer of digital analytics, allowing them to identify relevant evidence from a large volume of data.

That evidence is then forwarded to investigators and prosecutors through Cellebrite Physical Analyzer. The combined Cellebrite tools will help investigators access, analyze, and manage data so they’re prepared for the onslaught of digital data in their cases.

 

A rapid result for a student’s threat of violence

Collecting and analyzing the mix of data from devices as well as the cloud is now crucial to keeping Argentinean citizens safe. In March 2019, a 17-year-old college student in northeast Argentina posted a Facebook message saying he would kill fellow students and would broadcast the “massacre” live; the social media post included a photo of firearms.

GNA investigators raided the student’s home and seized his mobile phones and computer. With Cellebrite solutions, investigators found more firearms photos the student had downloaded from the Internet, as well as social media messages alerting friends to the proposed attack.

“In just two hours, we solved the case,” Maza says. “We knew that this was the person, and we found credit card numbers belonging to him as well as other people connected to the proposed attack.” The Digital Intelligence also allowed Maza and his colleagues to build a timeline of the suspect’s movements as he made plans for the attack. The teenager was charged with making anonymous threats involving weapons.

 

Staying on top of digital advancements

For every successful case where digital forensics investigators are able quickly access and analyze Digital Intelligence, there are more cases where technology advances can threaten to confound investigators.  

“Our greatest challenge is the vertiginous technological advances, as is the case with mobile devices,” Maza says. “On top of that you have security measures to protect data privacy that have hardened over time, putting up barriers to obtaining evidence that could be of vital importance in investigations.”

Now, with the combination of advanced technology, well-trained investigators, and the new network of forensics labs, GNA investigators are better equipped to keep pace with digital trends. “Tech’s impact on society is continuously reflected in our GNA activities,” he says. “As experts in forensic analysis, we have to dive into these mountains of evidence. One thing I can say for certain today is that there are no simple cases, thanks to a complex ecosystem that makes up digital evidence.”

KEYWORDS: border security crimes device management digital forensics law enforcement

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Heather mahalik

Heather Mahalik, Senior Director of Digital Intelligence at Cellebrite, has more than 18 years’ experience in digital forensics and has been an expert of choice for law enforcement and intelligence agencies. She has worked high profile cases from child exploitation to Osama Bin Laden’s digital media. Heather likes wine, bourbon, reading, researching, and traveling.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More
  • college-student-studying-together.jpg

    Protecting school devices in the age of digital learning

    See More
  • financial security freepik

    The force of biometrics in post-pandemic financial services security

    See More
×
Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. Image courtesy of Cellebrite
Image courtesy of Cellebrite
Image courtesy of Cellebrite
Image courtesy of Cellebrite

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!