In the months preceding October 2023, Italian police tried to find and arrest Stecco, who was on the run.[1] Stecco was accused of helping another person on the run in 2017 and 2018 and of creating fake documents,[2] and also had a cumulative prison sentence of 3 years and 6 months to serve in relation to other cases.[3]
To find and arrest Stecco, investigators placed a large number of people under surveillance whom they believed could lead them to him.
In October 2023, Stecco was arrested after nearly two years on the run.
Techniques used
Name | Description | |
---|---|---|
Covert surveillance devices | ||
Audio | Microphones were installed in two homes, one collective space, and several cars.[3] | |
Location | GPS trackers were installed on 12 cars.[3] A tracking device was installed on a bike that was suspected of being used by Stecco. | |
Video | Cameras were installed:[3]
| |
Mass surveillance | ||
Civilian snitches | After arresting Stecco, investigators showed his picture and asked questions to many people living around the arrest site, which allowed them to find the house where Stecco allegedly lived.[3] | |
Video surveillance | Investigators analyzed CCTV footage from street cameras, train stations, highway toll booths, buses, and businesses to determine the movements of people under surveillance.[3] | |
Physical surveillance | ||
Covert | Investigators learned through a hidden microphone installed in a home that someone under surveillance would be traveling by train the next day.[3] The next day, this person and another indeed traveled by train and a large number of surveillance operators were deployed to follow them. There were four operators on the train (two at each end) and two operators waiting at each intermediate station. | |
Service provider collaboration | ||
Mobile network operators | Investigators used the collaboration of mobile network operators to:[3]
| |
Other | Investigators used the collaboration of several companies:[3]
| |
Targeted digital surveillance | ||
Authentication bypass | Investigators found the PIN code of the smartphone of someone under surveillance when a camera hidden in a car captured the person entering the code.[3] Investigators attempted to find the password of a Tails system through brute force using a software called “bruteforce-luks.” | |
Malware | Investigators attempted to install malware on the smartphone of someone under surveillance.[3] They sent the person an SMS with a link. If the person had clicked on the link, the malware would have been installed, allowing investigators to listen to conversations through the smartphone's microphone. But the person did not click on the link, so the malware was not installed. |