top of page

The Epstein Files: The Personal Hacker from Calabria

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 30
  • 4 min read

Updated: Apr 25


The FBI Informant's Claims


According to a confidential informant interviewed by the FBI in 2017:


  • Italian, born in the southern region of Calabria

  • Specialized in finding vulnerabilities in iOS, BlackBerry devices, and Firefox

  • Developed zero-day exploits and offensive cyber tools

  • Per the informant: "was very good at finding vulnerabilities"

  • An unnamed central African government

  • The United Kingdom

  • The United States

  • Hezbollah

The Payment: > Hezbollah paid him with "a trunk of cash."


Source: EFTA01683874, via [TechCrunch](https://techcrunch.com/2026/01/30/informant-told-fbi-that-jeffrey-epstein-had-a-personal-hacker/)





Why Calabria Matters


Calabria is the toe of the Italian boot. It's also the home territory of the 'Ndrangheta - the most powerful and sophisticated Italian organized crime syndicate in the world.


  • Controls an estimated 80% of Europe's cocaine trade

  • Has deeper international reach than the Sicilian Mafia

  • Specializes in money laundering and international finance

  • Has documented connections to Latin American cartels, Russian oligarchs, and Middle Eastern networks

An Italian from Calabria with advanced technical skills working for Jeffrey Epstein isn't random. It's a connection to one of the world's most sophisticated criminal networks.





The Technical Capability


The informant described specific technical focus areas:



Platform

Significance

iOS

Apple's mobile OS - used by high-value targets worldwide

BlackBerry

In 2017, still the preferred device for government officials and executives

Firefox

Cross-platform browser exploitation


This isn't script kiddie stuff. This is nation-state level offensive capability.


Zero-day exploits are vulnerabilities unknown to the vendor. They're worth millions on the gray market. Companies like NSO Group, Hacking Team, and Zerodium pay $500K-$2M for iOS zero-days.





The Customer List


The informant said the hacker sold exploits to:



1. United Kingdom UK intelligence (GCHQ/MI5/MI6) purchases offensive cyber capabilities. The UK connection ties to: - Jes Staley (Barclays CEO who visited Epstein in prison) - The Parliament blackmail allegations - Prince Andrew



2. United States US intelligence agencies are major consumers of zero-days. This connects to: - Epstein's alleged intelligence ties - The 2008 Non-Prosecution Agreement's unusual terms - Alexander Acosta's "he belongs to intelligence" comment



3. Unnamed Central African Government Central African nations with offensive cyber programs include: - Rwanda (documented Pegasus customer) - Ethiopia (documented FinFisher customer) - Morocco (documented Pegasus customer)



4. Hezbollah This is the bombshell.


Providing material support to Hezbollah is a federal crime under 18 USC 2339B. Maximum penalty: 20 years to life imprisonment.


If Epstein's hacker sold zero-days to Hezbollah, everyone in that chain committed a federal felony - including anyone who knew about it and failed to report it.





What This Explains


The "personal hacker" fills a gap in the Epstein operation:


  • A disc filing system (CDs labeled by VIP, location, event)

  • A massage room with hidden cameras (alleged)

  • A network of recruiters

  • Financial connections to intelligence

  • Offensive cyber capability to compromise target devices

  • Zero-day exploits for iOS/BlackBerry (exactly what high-value targets used)

  • A technical operator with organized crime connections

  • Sales channel to foreign governments (leverage)

  • Intercepted communications

  • Compromised devices

  • Stolen data

  • Real-time surveillance




The 2017 Timing


The FBI received this informant tip in 2017 - two years before Epstein's 2019 arrest.


  1. Did the FBI investigate the hacker?

  2. Did they identify who he was?

  3. Did they pursue the Hezbollah connection?

  4. Why wasn't this in the 2019 indictment?

The document is now public. The questions remain unanswered.





The 'Ndrangheta Connection to Money Laundering


  • Deutsche Bank laundering for Epstein

  • Barclays involvement

  • Danske Bank Estonian branch (Russian Mafia)

  • Apollo/Leon Black payments ($158M+)

The 'Ndrangheta is the world's most sophisticated money laundering organization. An operative from Calabria connects the cyber operation to the financial operation.


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →


  • Technical capability (hacker)

  • Financial infrastructure (banks)

  • Organized crime nexus ('Ndrangheta territory)

  • Intelligence connections (UK/US sales)

  • Terrorist financing (Hezbollah)




Legal Implications


If the informant's claims are accurate:



Crime

Statute

Penalty

Material support to terrorism

18 USC 2339B

Up to life

Arms Export Control Act violation

22 USC 2778

Up to 20 years

Computer Fraud and Abuse Act

18 USC 1030

Up to 20 years

RICO (if part of enterprise)

18 USC 1962

Up to 20 years

Money laundering

18 USC 1956

Up to 20 years


These are federal crimes with long statutes of limitation. If the hacker is alive and identifiable, he can be prosecuted. If Epstein associates knew about the Hezbollah sales, they can be prosecuted.





What We Don't Know


The FBI declined to comment on the informant's claims.


  • The hacker's identity

  • Whether the FBI verified the claims

  • Whether any investigation was opened

  • Whether the hacker is still active

  • Whether any of his tools are still deployed

The document establishes the allegation. Verification requires further investigation.





The Pattern


Jeffrey Epstein wasn't just a sex trafficker. The EFTA files reveal:


  1. Financial network - Apollo, Deutsche Bank, Barclays, shell companies

  2. Political network - Clinton, Trump, Prince Andrew, Parliament

  3. Intelligence network - UK/US government connections

  4. Organized crime network - Calabrian hacker, money laundering

  5. Terrorist financing - Hezbollah zero-day sales

This is a multi-domain criminal enterprise operating at the intersection of finance, politics, intelligence, organized crime, and cyber.


The disc filing system makes sense now. When you have offensive cyber capability, a photo archive, financial leverage, and organized crime connections - you don't just have a blackmail operation.


You have a intelligence service.




This analysis is based on EFTA01683874 as reported by TechCrunch. The FBI declined comment. These remain unverified allegations from a confidential informant.


Analysis conducted by DugganUSA Threat Intelligence Platform.


Live feed: https://analytics.dugganusa.com/api/v1/stix-feed







Her name was Renee Nicole Good.


His name was Alex Jeffery Pretti.



The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page