Pedro Luis Martín Olivares
Колишній керівник відділу фінансової розвідки нині неіснуючого Управління розвідки та служб запобігання (DISIP), тепер Боліваріанської розвідувальної служби (SEBIN). Має офіційні звинувачення у суді Флориди з 2015 року за численні епізоди наркотрафіку. Звинувачується Сполученими Штатами у використанні своєї посади в уряді Венесуели для сприяння наркотрафіку через повітряний простір Венесуели.
| Ім'я | Pedro Luis Martín Olivares |
| Народився | 18 квітня 1967 |
| Місце народження | Каракас, Венесуела |
| Опис (DEA) | 1,65 м, ~113 кг, каштанове волосся, зелені очі |
| Винагорода | $10,000,000 (DEA) |
| Status | Red Alert — Interpol |
| Alias | Ramón José Garrido Sánchez (False identity) |
Передісторія
Martín Olivares, 51, has been facing formal charges in a Florida court since 2015 for several counts of drug trafficking. In addition, the United States accuses him of using his “position” in the Venezuelan government to facilitate drug trafficking through Venezuelan airspace.
The U.S. Treasury Department added a former senior official of the Bolivarian Intelligence Service (SEBIN) and two of his alleged associates to its “blacklist” of drug traffickers, along with 20 “front” companies that were used to launder illicit money.
DEA wanted listing and U.S. Treasury Department designation
On September 29, 2020, the State Department officially announced the $10 million reward through the Narcotics Rewards Program (NRP). Martín Olivares is listed alongside other senior officials of the Venezuelan regime.
State Department Narcotics Rewards Program — $10 million reward announcement
Subject profile and identification details
Виявлення цифрового сліду
On his LinkedIn profile, he shows how he manages his own website.
Instagram page linked to the subject
Аналіз інфраструктури веб-сайту
The site is a CMS WordPress installation. The control panel was found with basic enumeration.
WordPress CMS identified on the subject's personal website
Found the cPanel with ease — basic enumeration
Розвідка піддоменів та DNS
Subdomains found, DNS and registrar information
Відкриті порти
A significant number of open ports discovered on the server
Електронні адреси
Emails associated with the domain
Виявлення акаунтів
Accounts associated with the subject's username were identified across multiple platforms.
Виявлені вразливості
Numerous CVEs and service exposures were discovered during the infrastructure analysis:
| Severity | CVE / ID | Service | Description |
|---|---|---|---|
| INFO | mysql-info | web | [mysql-info] [javascript] [info] |
| INFO | snmpv3-detect | web | [snmpv3-detect] [javascript] [info] |
| INFO | imap-detect | web | [imap-detect] [tcp] [info] |
| INFO | mysql-detect | web | [mysql-detect] [tcp] [info] |
| INFO | pop3-detect | web | [pop3-detect] [tcp] [info] |
| INFO | mysql-native-password | web | [mysql-native-password] [tcp] [info] |
| INFO | tls-version | web | [tls-version] [ssl] [info] |
| INFO | tls-version | web | [tls-version] [ssl] [info] |
| INFO | spf-record-detect | web | [spf-record-detect] [dns] [info] |
| INFO | txt-fingerprint | web | [txt-fingerprint] [dns] [info] |
| INFO | caa-fingerprint | web | [caa-fingerprint] [dns] [info] |
| INFO | nameserver-fingerprint | web | [nameserver-fingerprint] [dns] [info] |
| INFO | mx-fingerprint | web | [mx-fingerprint] [dns] [info] |
| INFO | ssl-issuer | web | [ssl-issuer] [ssl] [info] |
| INFO | ssl-dns-names | web | [ssl-dns-names] [ssl] [info] |
| INFO | wildcard-tls | web | [wildcard-tls] [ssl] [info] |
Спроба доступу до бази даних
When trying to log in to the MySQL database of the server, the connection was banned by the host's intrusion prevention system.
Connection banned by server IPS when attempting MySQL database access
У виробництві
This investigation is ongoing. Additional findings, deeper infrastructure analysis, and corroborating intelligence will be published as the investigation progresses.
Примітка слідчого
This report is based entirely on open-source intelligence (OSINT). No classified information was accessed. No confidential sources were used. Everything documented here is publicly available — if you know where to look.