Reply to post:

A curious tale of the priest, the broker, the hacked newswires, and $100m of insider trades

Waseem Alkurdi
IT Angle

The conspirators demonstrated pretty good operational security – compartmentalizing their hardware and wireless hotspots solely for their illegal trading and destroying some equipment to cover their tracks.

Theoretically and technically speaking, isn't that enough to prevent them from being caught?

If you use (totally, completely) separate devices and Wi-Fi hotspots, aren't you a separate person to the Internet? (Assume that no mistakes are made - no "clean" identity is leaked through "dirty" devices, for example)

(of course keeping your personal equipment out of range of the "dirty" ones so techniques like cell triangulation and identification of the private phone and "dirty" phone are out of question?)

However, SEC investigators spotted the similarities in multiple trades, and started asking questions.

What trades and what similarities? If they've known there was trade about this in particular, couldn't they just interrogate the other party, like they do with drug dealers for example, where they arrest the "customer" to get to the dealer?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon