Tracking/Exposing America’s Most Wanted Using OSINT (Part 1)

Disclaimer: A warning before all the ultra-expert, python-script running keyboard OSINT commandos bomb me with hate messages that this is basic plug-n-play investigation work. What this is supposed to be, is an example of a surprisingly super basic investigation utilizing OSINT, with my goal being to lightly scratch the surface of what is possible for ANYONE to do with only a phone/computer and internet connection.

INTRODUCTION/BACKGROUND

Hiding in plain sight. This is a phrase I’ve read and heard about since my days as a young investigator. I practiced it while doing the grunt work of surveillance cases that would often move from vehicle to foot work in large cities like San Francisco and Los Angeles. …


Image for post
Image for post

Tracking/Exposing America’s Most Wanted Using OSINT (Part 2)

Well here we are, together again. Unless you are totally new and came here without reading of this 3 part series, I highly recommend spending a few minutes and checking it out before moving on to our investigation into the It will help explain the direction we are going with our investigation.

STARTING WHERE WE LEFT OFF

Our first step is to run all the images from the most wanted Cyber page of Federal Bureau of Investigation (FBI) website into our Russian Facial Recognition website, FindClone. I want to emphasize that this is the easy part. If you are experimenting for yourself and trying out the search with a photograph or two, the actual uploading of the images to search is fairly fast, and the results come quickly. …

About

Sancho Villa

Investigator squeezing in a dose of #PublicDefender Shenanigans and finding/sharing #OSINT sources. Views are definitely my own, not my employer🕵🏾

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store