ODINT Venezuela - Protecting Your Rights with Integrity

Пошук розшукуваного DEA

Відстеження колишнього венесуельського розвідника-втікача через інфраструктуру відкритих джерел

Розшукуваний DEA Винагорода $10 млн Червоне повідомлення Інтерполу OSINT-розслідування
Профіль об'єкта — Програма нагород DEA за наркотики

Pedro Luis Martín Olivares

Колишній керівник відділу фінансової розвідки нині неіснуючого Управління розвідки та служб запобігання (DISIP), тепер Боліваріанської розвідувальної служби (SEBIN). Має офіційні звинувачення у суді Флориди з 2015 року за численні епізоди наркотрафіку. Звинувачується Сполученими Штатами у використанні своєї посади в уряді Венесуели для сприяння наркотрафіку через повітряний простір Венесуели.

Ім'я Pedro Luis Martín Olivares
Народився 18 квітня 1967
Місце народження Каракас, Венесуела
Опис (DEA) 1,65 м, ~113 кг, каштанове волосся, зелені очі
Винагорода $10,000,000 (DEA)
Status Red Alert — Interpol
Alias Ramón José Garrido Sánchez (False identity)

Передісторія

Martín Olivares, 51, has been facing formal charges in a Florida court since 2015 for several counts of drug trafficking. In addition, the United States accuses him of using his “position” in the Venezuelan government to facilitate drug trafficking through Venezuelan airspace.

The U.S. Treasury Department added a former senior official of the Bolivarian Intelligence Service (SEBIN) and two of his alleged associates to its “blacklist” of drug traffickers, along with 20 “front” companies that were used to launder illicit money.

DEA wanted listing for Pedro Luis Martin Olivares

DEA wanted listing and U.S. Treasury Department designation

On September 29, 2020, the State Department officially announced the $10 million reward through the Narcotics Rewards Program (NRP). Martín Olivares is listed alongside other senior officials of the Venezuelan regime.

State Department Narcotics Rewards Program announcement

State Department Narcotics Rewards Program — $10 million reward announcement

Subject profile details

Subject profile and identification details

Виявлення цифрового сліду

On his LinkedIn profile, he shows how he manages his own website.

LinkedIn profile showing personal website

Instagram page linked to the subject

Аналіз інфраструктури веб-сайту

The site is a CMS WordPress installation. The control panel was found with basic enumeration.

WordPress CMS identification

WordPress CMS identified on the subject's personal website

cPanel discovery through enumeration

Found the cPanel with ease — basic enumeration

Розвідка піддоменів та DNS

Subdomains, DNS records and registrar information

Subdomains found, DNS and registrar information

Відкриті порти

Port scan results showing numerous open ports

A significant number of open ports discovered on the server

Електронні адреси

Email addresses associated with the domain

Emails associated with the domain

Виявлення акаунтів

Accounts associated with the subject's username were identified across multiple platforms.

Виявлені вразливості

Numerous CVEs and service exposures were discovered during the infrastructure analysis:

Severity CVE / ID Service Description
INFO mysql-info web [mysql-info] [javascript] [info]
INFO snmpv3-detect web [snmpv3-detect] [javascript] [info]
INFO imap-detect web [imap-detect] [tcp] [info]
INFO mysql-detect web [mysql-detect] [tcp] [info]
INFO pop3-detect web [pop3-detect] [tcp] [info]
INFO mysql-native-password web [mysql-native-password] [tcp] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO spf-record-detect web [spf-record-detect] [dns] [info]
INFO txt-fingerprint web [txt-fingerprint] [dns] [info]
INFO caa-fingerprint web [caa-fingerprint] [dns] [info]
INFO nameserver-fingerprint web [nameserver-fingerprint] [dns] [info]
INFO mx-fingerprint web [mx-fingerprint] [dns] [info]
INFO ssl-issuer web [ssl-issuer] [ssl] [info]
INFO ssl-dns-names web [ssl-dns-names] [ssl] [info]
INFO wildcard-tls web [wildcard-tls] [ssl] [info]

Спроба доступу до бази даних

When trying to log in to the MySQL database of the server, the connection was banned by the host's intrusion prevention system.

MySQL login attempt resulting in ban

Connection banned by server IPS when attempting MySQL database access

У виробництві

This investigation is ongoing. Additional findings, deeper infrastructure analysis, and corroborating intelligence will be published as the investigation progresses.

Примітка слідчого

This report is based entirely on open-source intelligence (OSINT). No classified information was accessed. No confidential sources were used. Everything documented here is publicly available — if you know where to look.

Compiled: February, 2026

Classification: OSINT — Open Source

ODINT Latin America

Пожертвувати