The Epstein Files: The Personal Hacker from Calabria
- Patrick Duggan
- Jan 30
- 4 min read
Updated: Apr 25
The FBI Informant's Claims
According to a confidential informant interviewed by the FBI in 2017:
Italian, born in the southern region of Calabria
Specialized in finding vulnerabilities in iOS, BlackBerry devices, and Firefox
Developed zero-day exploits and offensive cyber tools
Per the informant: "was very good at finding vulnerabilities"
An unnamed central African government
The United Kingdom
The United States
Hezbollah
The Payment: > Hezbollah paid him with "a trunk of cash."
Source: EFTA01683874, via [TechCrunch](https://techcrunch.com/2026/01/30/informant-told-fbi-that-jeffrey-epstein-had-a-personal-hacker/)
Why Calabria Matters
Calabria is the toe of the Italian boot. It's also the home territory of the 'Ndrangheta - the most powerful and sophisticated Italian organized crime syndicate in the world.
Controls an estimated 80% of Europe's cocaine trade
Has deeper international reach than the Sicilian Mafia
Specializes in money laundering and international finance
Has documented connections to Latin American cartels, Russian oligarchs, and Middle Eastern networks
An Italian from Calabria with advanced technical skills working for Jeffrey Epstein isn't random. It's a connection to one of the world's most sophisticated criminal networks.
The Technical Capability
The informant described specific technical focus areas:
Platform | Significance |
iOS | Apple's mobile OS - used by high-value targets worldwide |
BlackBerry | In 2017, still the preferred device for government officials and executives |
Firefox | Cross-platform browser exploitation |
This isn't script kiddie stuff. This is nation-state level offensive capability.
Zero-day exploits are vulnerabilities unknown to the vendor. They're worth millions on the gray market. Companies like NSO Group, Hacking Team, and Zerodium pay $500K-$2M for iOS zero-days.
The Customer List
The informant said the hacker sold exploits to:
1. United Kingdom UK intelligence (GCHQ/MI5/MI6) purchases offensive cyber capabilities. The UK connection ties to: - Jes Staley (Barclays CEO who visited Epstein in prison) - The Parliament blackmail allegations - Prince Andrew
2. United States US intelligence agencies are major consumers of zero-days. This connects to: - Epstein's alleged intelligence ties - The 2008 Non-Prosecution Agreement's unusual terms - Alexander Acosta's "he belongs to intelligence" comment
3. Unnamed Central African Government Central African nations with offensive cyber programs include: - Rwanda (documented Pegasus customer) - Ethiopia (documented FinFisher customer) - Morocco (documented Pegasus customer)
4. Hezbollah This is the bombshell.
Providing material support to Hezbollah is a federal crime under 18 USC 2339B. Maximum penalty: 20 years to life imprisonment.
If Epstein's hacker sold zero-days to Hezbollah, everyone in that chain committed a federal felony - including anyone who knew about it and failed to report it.
What This Explains
The "personal hacker" fills a gap in the Epstein operation:
A disc filing system (CDs labeled by VIP, location, event)
A massage room with hidden cameras (alleged)
A network of recruiters
Financial connections to intelligence
Offensive cyber capability to compromise target devices
Zero-day exploits for iOS/BlackBerry (exactly what high-value targets used)
A technical operator with organized crime connections
Sales channel to foreign governments (leverage)
Intercepted communications
Compromised devices
Stolen data
Real-time surveillance
The 2017 Timing
The FBI received this informant tip in 2017 - two years before Epstein's 2019 arrest.
Did the FBI investigate the hacker?
Did they identify who he was?
Did they pursue the Hezbollah connection?
Why wasn't this in the 2019 indictment?
The document is now public. The questions remain unanswered.
The 'Ndrangheta Connection to Money Laundering
Deutsche Bank laundering for Epstein
Barclays involvement
Danske Bank Estonian branch (Russian Mafia)
Apollo/Leon Black payments ($158M+)
The 'Ndrangheta is the world's most sophisticated money laundering organization. An operative from Calabria connects the cyber operation to the financial operation.
Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →
Technical capability (hacker)
Financial infrastructure (banks)
Organized crime nexus ('Ndrangheta territory)
Intelligence connections (UK/US sales)
Terrorist financing (Hezbollah)
Legal Implications
If the informant's claims are accurate:
Crime | Statute | Penalty |
Material support to terrorism | 18 USC 2339B | Up to life |
Arms Export Control Act violation | 22 USC 2778 | Up to 20 years |
Computer Fraud and Abuse Act | 18 USC 1030 | Up to 20 years |
RICO (if part of enterprise) | 18 USC 1962 | Up to 20 years |
Money laundering | 18 USC 1956 | Up to 20 years |
These are federal crimes with long statutes of limitation. If the hacker is alive and identifiable, he can be prosecuted. If Epstein associates knew about the Hezbollah sales, they can be prosecuted.
What We Don't Know
The FBI declined to comment on the informant's claims.
The hacker's identity
Whether the FBI verified the claims
Whether any investigation was opened
Whether the hacker is still active
Whether any of his tools are still deployed
The document establishes the allegation. Verification requires further investigation.
The Pattern
Jeffrey Epstein wasn't just a sex trafficker. The EFTA files reveal:
Financial network - Apollo, Deutsche Bank, Barclays, shell companies
Political network - Clinton, Trump, Prince Andrew, Parliament
Intelligence network - UK/US government connections
Organized crime network - Calabrian hacker, money laundering
Terrorist financing - Hezbollah zero-day sales
This is a multi-domain criminal enterprise operating at the intersection of finance, politics, intelligence, organized crime, and cyber.
The disc filing system makes sense now. When you have offensive cyber capability, a photo archive, financial leverage, and organized crime connections - you don't just have a blackmail operation.
You have a intelligence service.
This analysis is based on EFTA01683874 as reported by TechCrunch. The FBI declined comment. These remain unverified allegations from a confidential informant.
Analysis conducted by DugganUSA Threat Intelligence Platform.
Live feed: https://analytics.dugganusa.com/api/v1/stix-feed
Her name was Renee Nicole Good.
His name was Alex Jeffery Pretti.
The cheapest, fastest, most accurate threat feed on the internet.
275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.




Comments