Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceIdentity ManagementPhysical SecurityCybersecurity NewsEnterprise Services

To keep pace with digital devices used in the course of crimes, Argentina’s border guard force uses a combination of technology and teamwork

Case study

By Heather Mahalik
GNA

Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA

Image courtesy of Cellebrite

GNA
GNA
GNA
GNA
October 14, 2020

Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. The GNA, as well as their border force colleagues in neighboring countries, must also grapple with cross-border crime that take advantage of the close ties among the region’s economies. According to Interpol, illicit markets in these border regions may be worth tens of billions of dollars.

“As criminals exploit the interconnected economies of Argentina, Brazil, and Paraguay, only greater coordination between the three countries’ police forces will bring about a step change in the region’s fight against organized crime,” said José de Gracia, Assistant Director of INTERPOL’s Criminal Networks Unit, in December 2019.

To effectively manage border security, the GNA has to solve cases faster, and also do their detective work across an immense geographical area. Today, nearly all of these cases involve digital devices, including mobile phones and computers. To process the steady stream of digital devices and glean evidence from them, the GNA put together a unique combination of technology and teams – centered on Cellebrite’s Digital Intelligence solutions and a network of digital forensics labs around the country. Digital Intelligence (DI) is the data that is extracted from ever-expanding digital sources and data types —smartphones, computers, and the Cloud— and the process by which agencies access, manage, and leverage data to more efficiently run their operations.

 

Reducing time and travel for digital investigations

“It’s a big country, and it's hard to cover with one lab,” says Antonio Maza, “Experto” (expert) for the GNA’s Departamento Análisis Forense Digital. “The number of devices is always increasing because of digital adoption, and we can't keep up with the demand.” The process of delivering devices to the GNA’s national forensics laboratory in Buenos Aires for data extraction and analysis was slow, since the force’s five regional headquarters were scattered around Argentina, and often thousands of miles away from the capital city.

A new network of forensics labs, all equipped with Cellebrite solutions, is intended to reduce the Digital Intelligence burden on the national lab in Buenos Aires. The regional labs, of which five may be opened by the end of 2020, are sorely needed to keep pace with the mushrooming number of digital devices connected to border crime cases.

“In 2019, we analyzed about 2,000 devices over all Argentina,” Maza says. “It’s not just mobile phones – it’s also computers, DVRs, and more. A few years ago, we had to analyze 1,000 devices – now it’s 2,000, and next year, it will be much more. It’s a problem to solve for the future.”

It’s not just about the proliferation of devices – it’s about the time it takes to ship devices to Buenos Aires across a very large country. That distance slows down encryption and analysis of data that could be crucial to border security cases.

“We don’t have days and days to finish investigations,” Maza says. “And we don’t want evidence to be lost.” By placing labs closer to where investigators are working on cases, the devices and data can be analyzed more rapidly, closing cases quickly and bringing suspects to justice.

 

Technology that cracks cases

The regional forensics labs will be equipped with the same Cellebrite technology used by officers use at the GNA’s national lab. When investigators in the field first obtain digital devices at crimes scenes or in the course of their investigations, they use UFED, Cellebrite’s mobile forensic solution, to extract data from the devices.

But increasingly, investigators don’t just need data from the physical devices connected to crimes; they need data from messaging apps and cloud computing tools that suspects are likely to use to communicate with each other, and to share evidence like photos and videos. What’s more, there’s data hidden in web browsing history, mapping applications, online search history, and WiFi connections. This, too, is evidence that can place suspects at crime scenes or indicate who suspects are interacting with.

For this reason, GNA investigators also use tools such as Cellebrite UFED Cloud to find, analyze, and preserve information in the cloud, such as chats from messaging services like WhatsApp and Telegram, online calendars, location data, and user profile information.

In addition to using solutions that help locate and analyze data, investigators at the new regional labs will also tap into Cellebrite solutions that help them work together effectively. For example, they use Cellebrite Pathfinder to create a unified forensics environment across the lab network. As investigators extract evidence from devices, forensics experts apply a layer of digital analytics, allowing them to identify relevant evidence from a large volume of data.

That evidence is then forwarded to investigators and prosecutors through Cellebrite Physical Analyzer. The combined Cellebrite tools will help investigators access, analyze, and manage data so they’re prepared for the onslaught of digital data in their cases.

 

A rapid result for a student’s threat of violence

Collecting and analyzing the mix of data from devices as well as the cloud is now crucial to keeping Argentinean citizens safe. In March 2019, a 17-year-old college student in northeast Argentina posted a Facebook message saying he would kill fellow students and would broadcast the “massacre” live; the social media post included a photo of firearms.

GNA investigators raided the student’s home and seized his mobile phones and computer. With Cellebrite solutions, investigators found more firearms photos the student had downloaded from the Internet, as well as social media messages alerting friends to the proposed attack.

“In just two hours, we solved the case,” Maza says. “We knew that this was the person, and we found credit card numbers belonging to him as well as other people connected to the proposed attack.” The Digital Intelligence also allowed Maza and his colleagues to build a timeline of the suspect’s movements as he made plans for the attack. The teenager was charged with making anonymous threats involving weapons.

 

Staying on top of digital advancements

For every successful case where digital forensics investigators are able quickly access and analyze Digital Intelligence, there are more cases where technology advances can threaten to confound investigators.  

“Our greatest challenge is the vertiginous technological advances, as is the case with mobile devices,” Maza says. “On top of that you have security measures to protect data privacy that have hardened over time, putting up barriers to obtaining evidence that could be of vital importance in investigations.”

Now, with the combination of advanced technology, well-trained investigators, and the new network of forensics labs, GNA investigators are better equipped to keep pace with digital trends. “Tech’s impact on society is continuously reflected in our GNA activities,” he says. “As experts in forensic analysis, we have to dive into these mountains of evidence. One thing I can say for certain today is that there are no simple cases, thanks to a complex ecosystem that makes up digital evidence.”

KEYWORDS: border security crimes device management digital forensics law enforcement

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Heather mahalik

Heather Mahalik, Senior Director of Digital Intelligence at Cellebrite, has more than 18 years’ experience in digital forensics and has been an expert of choice for law enforcement and intelligence agencies. She has worked high profile cases from child exploitation to Osama Bin Laden’s digital media. Heather likes wine, bourbon, reading, researching, and traveling.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More
  • college-student-studying-together.jpg

    Protecting school devices in the age of digital learning

    See More
  • financial security freepik

    The force of biometrics in post-pandemic financial services security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing