 Hi everyone. Our next talk is Skip Tracing for Fun and Profit by Red Greenhagen. So let's welcome him. So like she said, my name is Red Greenhagen. If you're in the wrong track, you should still stay. If you've never heard a gay autistic dude from Oklahoma crack jokes, I'm pretty fucking funny. You're gonna love it. You're gonna love it. So my talk is Skip Tracing for Fun and Profit. How to hide from the FBI for a recon village. First time I gave this talk, it was at DC 405 in Oklahoma City. It ended with, cause we were given the talk at IHOP, right? And my best friend at the time, let's rewind just for a second. We're given the talk at IHOP and I start and the waitress walks in, she sees how to hide from the FBI at the very front. She starts flipping the shit out. County Sheriff's Oklahoma Highway Patrol, Oklahoma City Police, right? So they'll arrive and we're all getting padded down for weapons because it's Oklahoma we will have to still carry, right? Come to find out, my friend had assault weapons, suppressors, all the kind of illegal shit that you don't want to have in a vehicle when the Sheriff's come, right? So he got labeled as a domestic terrorist, all that good shit. So to bypass that shit, we're gonna do some legal stuff. Let me just read through this shit just for a second. If you have a TSSCI HCS clearance, you're gonna want to be aware that the tools and techniques session has been covered in certain training materials provided in my past companies, with inside the intelligence community, but this has been reworked to be able to be given in a public setting. It can all be recreated using open source information, et cetera, et cetera, et cetera, et cetera, et cetera, et cetera. Working in future recovery for different state, local, and federal agencies, different types of legal application processes such as warrants were arranged to state attorneys and such, or whomever was the governing authority at the time. Just so you know, I have no idea what any of this shit means. The cases covered in the talk were completed before working for my current employer. No state, local, federal, and or international laws were broken at this time. The trace, the trace was being located, investigated all, all of the law chains all the time. Please check with your SSO of FSO for details. Although my current work involves some sorts of social media exploitation, intelligent analysis, counterintelligence, other forms of infiltration, my work at McAfee Advanced Programs Groups, is that of the most ethical, let me call it stairs. If anyone has any legal questions, please contact my attorney, Ryan Gillette, I can give you details. Just kidding, I just made that name out of nowhere. So this is my agenda. No one gives a shit about that. We're just going to bypass that for a second. This is what skip tracing is. Skip tracing is taking all this information and making a huge, huge compilation of data, right? From there, you're going to start to confirm where the whereabouts, the data obfuscation, looking for misinformation and things like that. The end goal from this is taking all that shit on the left and getting real-time location, alright? Easy peasy stuff. So something I'm going to talk about is pivots. Pivoting information, stop laughing, I'm making a point. I'm just fucking with you. Pivoting information for intelligent analysis is taking one piece of unique information and be able to pivot to get another piece of information. Say for example, red-green-hagin, you're going to get bad-ass under there, and then from bad-ass, you're going to be able to find all other kinds of things like guns and, you know what I mean? So for a good example, actually, no shit, I'm sorry, I forgot. What are some good pivots from this? Please. I'm sorry? Picture. Who said picture? Awesome. Does that miss you? Anything else? Woman? What else? Yes. The time frame. Time frame is huge in location. Geopolitical locations are huge in analysis. What else? Alright, we're going to skip through this. So reverse Google search in the avatar, find unique matches. This is one of the ways how stupid fucking idiots get caught. It's hilarious. These anonymous wannabes that don't even know how to install IRC, they have to actually do the IRC web client. It's fucking hilarious. They go and create some random avatar with their initials. It's just fucking tool bags. Unique names are also pivotal in researching. So the thing about Eukaryotic Tishaw is the region, the region of Pakistan it comes from. The KIS tells me that his family or his family members' ancestry comes from either Eastern Europe or some form of Eastern Europe and Middle Eastern descent, right? Also, key phrases and questions can be searched across reference. For example, where's the FBI's, where's the perfect place to hide the nouns he uses, how he's using FBI and all couple letters and slashes as stupid as that sounds, how we put them in order, FBI, CI, NSA. And the way and how he uses pronouns in the sentence. That is an awesome piece of information. Say if I'm using that to do machine learning and IRC channels and other pivotal information, I can gather a shit ton of more data. It might not be accurate, it's more percentage based at that point. And another thing is the, like you said, the Pakistan 10 years ago, why did he say 10 years ago? Why not five years ago? Why not two years ago? Why not my mom's house? Why Pakistan? And again, the one month ago, it means he posted one month ago. Why one month ago and what does he post past tense? So if you're creating a timeline of his post, so say for example, fuck, fuck. How to hide, where would I hide from the FBI if I did this? Oh, and another month later he posts, why would I do this? And et cetera, et cetera. Building a timeline of information like this is amazing. So about me, this is the place where I come from. My first job and a bunch of other random stuff. I currently work from the Catholic Security Advanced Programs Group as a senior threat malware researcher. My entire career has come from the US intelligence community. I've never really had a job in the private sector because I got fired. So this is why, this is why you don't let Marines create your slide deck. I have no idea what some of these things means. You have bigger tits than most women. You did not put that. Humble eats a rocket and I got that one. But this is why you don't let Marines create your slide deck. So talking about myself for a second, I love talking about myself. Just kidding. I was diagnosed with Asperger's at age 11. Didn't really fit into school, didn't really understand things. My mom actually came home with a computer one day and best thing ever happened to me. Taught myself C, taught myself all kinds of things within a certain amount of time frame. Now having Asperger's in a very, very small town, like living on a dirt road and like you're graduating class from high school being like four, you don't really get that much information, right? So if you don't want autism is or Asperger's, I got some examples for you. So this is what my mom thinks are people with Asperger's. This is what I think some of Asperger's is like. And if you're Democrat, this is what you think Asperger's looks like. So my brother is actually the one who got me started in this. I was 14 years old. He was working with US Marshals for Fugitive Recovery. One day he came to me and this is after I got in trouble with law enforcement, he said, help me find this chick. I said, no, it's okay. So he gave me some cash and he wouldn't bought me a video game. I was like, fuck yeah. Took me 30 minutes, right? I thought, there's no way I'm going to find this chick. There's no way. There's absolutely no way. So I started thinking if I was a white piece of trash and only had $400 and I had to go from location A to location B, which was actually pretty far, and get a hotel room, knowing she was trying to get away from the US Marshals in the city, I was thinking, this picture's got to get out of the state, right? So I start calling, so I do a Google map, right? And in the API I start filtering by cheap hotels along the route from location A to location B. I swear to God, my mother's life, the first hotel I called she was there. So I called and they transferred me to the room in the phone ring and they picked up the phone. I fucking hung it up. I had no idea what I was doing. This is, and I called my brother and I said, oh, hey, by the way, she's there. She said, how'd you know? I called her. You did what? So my brother at the time was living a long, long, long ways away, but I was actually living in the city where she was. So we went there and there she is. I couldn't believe it. I was like, lady, you are so fucking stupid. So this is about what I do now. I currently work with three Marines that have black faces. No, I'm kidding. No, my current team was comprised of three Marines myself and Dave Marcus from Cafe Anybody's program groups. The Marines have multiple combat tours. They all came from a background of intelligence, capture, kill missions, special forces. The multiple agencies that we work with all together, like the Joint Intelligence Directive INSCOM, which is Information Security Command First I.O., Special Operations Command, FBI, NSA, DIA. So this is actually where we currently work out. So this is the Special Operations mythology that's currently used. It talks about, like, so if you talk about special operations stuff on the side, things like negotiating settlements, larger and minor military conflicts, right? And the things underneath is like propaganda, subversion. So the things where APG operates at is in the red. Infiltrated in foreign hacking groups based on the malicious code. So we profile foreign computer hackers based on the malicious code. We infiltrate those groups, build psychological profiles, do all kinds of interesting things. So I'm going to try and go through this, tools and techniques part. One of my most popular, my favorite tools is Maltigo. Maltigo allows me with different APIs to import information and share with my team. Case file is actually another tool outside of Maltigo that allows me to work on a nice canvas and be able to share things with other members of my team. And they can see my notes, I can see their notes, right? The cool thing about this is I can input from multiple sources, multiple sources. I think the last time I checked was 128. Under 200, over 100. All right. Another amazing tool is Palantir. Palantir is an amazing tool. I actually use it for counterintelligence investigations for intelligence agencies. I remember one case I was using Palantir. And our end goal was to find the person or persons that was leaking the material from the agency. I requested everything. I requested a DLP logs, I requested batch access logs, I request CAG logs. I swear to God, I swear to God I requested receipts in digital format from the restaurant within the federal agency, right? Every single unique piece of information Palantir adjusted it and created a timeline of when the information could have been accessed, the chances and percentage of the person who could have taken it and spit out one name. Palantir is an amazing, amazing tool if you have money. NetGlob is a very, very, very under looked tool set. Palantir, I'm not Palantir, I'm sorry, NetGlob. NetGlob is one of my favorite tools. Absolutely one of my favorite tools. It's on engine, be able to make modifications, be able to look at other tools. This is my bread and butter. From that we got Python because you have so much information that you need to automate, right? From Python you got the Google Maps API, we'll talk about more later. The social engineer tool kit for mostly exploitation, plenty of websites, sending fake SMS messages, shit like that. Michael Zelley's website is phenomenal, absolutely phenomenal. His tools and techniques on the site, specifically on like the custom tools, they're so amazing, I can't explain words how amazing it is. I think altogether he has about 1,000, 2,000 tools, like if I put an email address in the tool kit and I took the search, he's going to come back with a profile. Phone number does the forget password, comes back with a picture. It's absolutely amazing. I can't say any better things about it. Tools and techniques, the Google Alerts, a lot of APT groups and crime art groups will use Google Alerts for like hashes, hashes, call saying things like real names. A lot of the groups outside of advanced threat actors will have their hashes of their new exploit kits or malware on their Google alert. They want to know if someone is searching for that hash. They want to know if handles, unique API calls, anything, anything. Google Alerts is amazing. And putting Google Alerts to see that the new hashes they're putting up is also a very, very awesome technique. So these are some cases that I liked. I put two on here. So the first one. So this guy. So what I first started with was I had his real name, his criminal history, all the other things that came out of this case. So from the real name, and I believe his phone number, I came along with the jkeeting318alhu.com. From the email address, I put it in the multi-go. I'm sorry, actually not multi-go. I put it in, actually, no, it is multi-go. I apologize. From that, I see his Steam profile, which is an online gaming. From the Steam profile, Steam profile, and the merging of the phone number gives me five contacts that I never knew about. So that has additional five contacts that I can use. Come to find out, he's playing, I take a Steam profile along with the numbers and I see his friends, right? So I use his Steam ID and look at the Steam ID. From the Steam ID, I find out he's playing Guild Wars 2. From Guild Wars 2, I find the server he plays on, along with the people he plays on, and I find the guild he plays with. Come to find out, they're looking for a healer. I don't know what the fuck a healer is. I've never played him over G-Round My Life. Real men play Counter-Strike Source. I don't care what you have to say. So from there, I bought a character that was a healer and went, well, I think I watched like maybe a one or two YouTube videos trying to figure out how to play a healer, and I teleported to him in the same game. So from that, I'm like, yo guys, what's going on? You need a healer? I swear to God, I was the best healer in that game. I swear to God. Guys were like, dude, you've got 112 hours. I was like, I've just bought this fucking account. Are you guys really that fucking stupid? I'm literally right-clicking, one-two. Right-clicking, one-two. Fucking idiots, dude. So the warrant falls under his name, right? He's dumb enough to host a fucking ventrilo server from his own computer. That means I own him. So I couldn't get access multiple times to the ventrilo, so I wrote an exploit to actually denial of service to the ventrilo server, which was a procedural call to the actual web client. So taking that down, and this was actually planned, and you have to keep in mind there's a lot of things I'm taking out of my slides for opposite reasons. But from that, I invited them all to a Steam call, because I knew if I did a Steam call, I can get their IP addresses. So from a Steam call, I used the set plus the Google API to create a phishing link, which I had already planned to get all their IPs of the people and the members in-channel. Right? So from that, I do, I also do a wire shark to be able to capture the IPs when Steam chat. I'm off Steam, so I'm sorry. Steam voice, I apologize. This is back before it was patched. So one IP address was actually in Lawton, Oklahoma. From there, I do a master merge, which is actually, it's a Python script, to merge all the information I currently have, to try and filter through Facebook, cell phone records, things like that, to be able to get this one IP. From there, I find a Facebook friend of his also lives in Lawton, Oklahoma. From there, the guy has a phone number, literally posted on his Facebook profile. So from there, I used set to send him a text message saying, yo, dude, what's cracking? Are we still up for night? So you got to think about it like this. If they're living together, and he gets a weird text message from the guy's phone number that doesn't really match up, you know what I mean? He's going to think, that doesn't, that doesn't, that doesn't add up. So whenever you're doing something like this, and I'm on a legal authority, please keep in mind, it needs to, it needs to match as possible to the type of conversation that Louis would have. Whenever you don't have things like, so there's some things I didn't have like, I didn't have access to the email yet, I didn't have access to his Facebook private messages yet. So you've got to make it as bland as possible. So I think I said like, are we still on them? No, I said something like, hey, what's up? And responded. And I think the conversation went like something like, yeah, yeah, I'm still home, are you coming home tonight? Something like that. So I knew they were living together. So from that, there's the message I sent, and I got the physical address, and there's the news article of them being arrested. The, the tactical team requires, specifically a state, federal state, agencies require two unique pieces of information to be able to verify the location of the target. So if you just say, oh, hey, I got this dude's IP address from, from Wireshark, they're going to be like, okay, we need another piece. Does it make sense? So at least two. So these are the possible counters he could have done, other than being completely stupid. I swear to God, Inventrilo, he was talking to people about how he was on the run. I swear to God. He was like, yo, dude, yo, dude, I'm on the run. I'm, I'm, I'm the felon. I'm, I'm on the run. I'm so smart. And the thing is, whenever you're doing stuff like this, you've got to record everything. You have to record everything. Everything you do is recorded. And I'm talking about on my end, whenever you're doing a skip page, right? And some of the conversations, dude, I swear to God, he was a walking meme. One of the biggest things on here is, where's that? Completely removed all social media accounts. He had multiple social media accounts. That's why it made it so easy putting a lot of stuff to balance here and spitting out names and phone numbers. So another case. You might not agree with what I do for work. You might not agree with the tools and techniques that I use. But let's, let's, let's use an analogy. I respect Chinese actors. I respect, I respect, I respect hackers. All right? I respect the guys that I go after. Right? I think it was Abraham Lincoln. I might be wrong and please God forgive me if I'm wrong. The, the person who said one man's freedom fire is another person's terrorist. Right? There's always, there's always good and evil on both sides. But if you can't agree with me that there is absolute evil in this world, you are fucking ignorant. There is absolute evil in this world. This guy, this piece of shit. Oh no, no, wait for me to start laughing. He is, he, he is a home. He meets this chick on a, on a dating app, right? She is a kid. They moving together along with the kid. They were, they were, they were living in the house for about a nine month time period. He was molesting her child for four months. And by, by molest, I mean the absolute most horrific things you could possibly imagine. Whenever, whenever the boy went and told his mom, he killed him. In the most inhumane way you could possibly imagine. There is absolute evil in this world. So I started with this on full information, social address, phone number, plus some pretexting, because the investigators that already did the work gave me, gave our team the case files of the people who they, who was interviewed, people known, known LSS, things like that, right? So taking that, this was the first, this was the first graph with Google accounts, form accounts, and a bunch of disinformation. From that, I go into Palantir, and I see his burners that are still associated with his account right here, right? And then the two computers, which actually this is inaccurate, because the two computers were actually one, he was just trying to change his MAC address, so that, a little bit of that's inaccurate. So I used master merge with all, with all the information that I had to try to combine into one and narrow it down. He had a ridiculous amount of misinformation, ridiculous. He was telling people, actually it's on my next fucking slide, he was telling coworkers the, the chick he was banging, he was talking to random people, neighbors, pass and pull, he was telling everyone something different. I mean one, one was talking about how he went to Missouri. He actually went to Missouri, took pictures, and that's, that's a, that was like, that's a six, seven hour drive, just to do misinformation. He registered fake and no one cares about that. The Ontario stuff, he was setting up VPNs on Gmail addresses every time making sure it came from Ontario. Using a VPN service that didn't actually look like it was VPN, so whenever I DRC it, or NS, it would look like it was a legitimate computer. He was paying people in Kansas money to lie, right? So actually I learned a lot about, I actually learned a lot about myself in this case. It's not, I'm not an egotistical person, but it, you start to think, you start to think people don't know there's people like me doing these type of things. Does that, does that make sense? And the amount of information, it was, it was unreal. It was unreal. I've never, I, so I think I've done maybe, maybe around 200 cases altogether of things like this. I've never seen the amount of, I mean, I guarantee you 200, 250 fake social media accounts like actually legitimate set up phone numbers everything. So I found his, I found his Gmail address, again, game controller's Gmail address, and one of the things he was checking was actually looking at the last known IP address, so I actually had to match it, right? So from there I go to, takeouttogoogle.com and download all the stuff. From there, so if you're not familiar with Google, takeoutto.com, you can actually download all your information. The things I'm looking at is location history, his Google searches, and his Google voice, right? Location history, if you got your phone in your pocket, it's, it's, it's recording your walking, it's recording your, your driving, it's recording your bus, you know what I mean? His Google searches, every Google search history that, well, I'm sorry, not every search Google search, I apologize, but his Google search history as the time, right? From there, I narrowed down to eight contacts, a location history which he has saved on his phone, and his Google searches. From this, it was very apparent that he was needing money bad, and I mean a lot of money. So the address, come to find out, this is where he was living, in the contact phone numbers in the Albany, New York recruiters, random associations, he's trying to find a job trying to, trying to speak to recruiters. He did a lot of Google searches, like on monster chemical engineering, monster job, he's looking for money bad, like he's spending his entire day not just looking for work, right? So from there, I do a master merge, and then I find his resume that he's using on Monster.com. From his resume, I find out what kind of job he's looking for, so I use set to clone a website that was, it's popular, I think it was in like Europe or something like that, but I changed some of the phone numbers, I changed some of the things on the website. So from there, I went and created a monster profile, actually I didn't change that site, I apologize. Some of the things on that slide talks about the, I forgot to edit it, I apologize. Some of the things on the slide talks about how you want the information to match the resume as closely as much as possible, not be like, oh this is too good to be true. A lot of things talking about working in a small team environment, people that are on the run do not want to work on a large team. The more people you talk to, the more chance you have to get caught, right? So from there, I post, I post the, post the monster article, within a certain amount of hours, I think it was six, five or six hours, get a response back. So get a response back, I sent him a response back with a malicious PDF, it was talking about things like what the job posting is like, things, things that we were looking for, right? From that, I just verified his IP address, and we actually had to hire a voice actor in the Barman corner. A voice actor acts as a go-between to where if they start calling, if he starts calling the number to act like, hey, I want this job anymore for information, they have a script, they follow to try and set it up, because voice actors, I mean, I'm not a voice actor. I mean, I might have a sexy voice, but that's as close as I'm going to get. So the thing, so what I won't discuss is why the, why the apprehension team would not go to the house. I can't discuss it, I apologize. But they wanted to set it up to where he would go to this location, right? So we have the voice actor tell him to go to me to this location this time and to where nice clothes, like a legitimate interview. And that's where NYPD and the other state law enforcement and future recovery team is actually waiting. So this is the actual, this is actual the time altogether. From the very first to the very end, this shows all the misinformation, the things that misled, right? It took a lot of time. One of the biggest things that happens whenever you're doing skip tracing as a target is whenever you're working with specifically like local law enforcement or state law enforcement, they'll want you to turn it into crime stoppers. And then from crime stoppers, they'll get the trip and then work together. That keeps it, that keeps the legal processing stuff just, it's more helpful to the tracer, right? Specifically the tracer on the team. These are the possible counters. I mean, these are pretty self-explanatory. Yeah, I mean, another good thing is whenever you actually see law enforcement is not to assault them and do stupid crap, right? Also one of the biggest things whenever he was trying to apply for visas in other countries was he was actually using his real name. Whenever you have access specifically to like Lexus nexus and other things like those type of databases, you can see the failed attempts, right? So that's another huge thing trying to find, trying to find someone. So this is actually my outro. Some things I would explain to you if you're planning on going on the run is to read A Hundred Ways of Disparantly Free. It's a really, really great book. How to steal a job. Talks about how to act within an environment where you're on the run. And then special links to my parents. My parents actually helped me, helped me actually be able to, what's the word, what's the word, operate within an environment, right? Dave Marcus Natalio, Matt Sean, Ann Wally, Black Daze, Irwin, Erch, members of Anallocated Spaces which allowed me to work this talk out with them. Dan Borges and all, shut up. And all the shit talkers who said it wasn't working. Any questions? Do you guys see what I'm saying? It's like for like new exploits, new malware samples, things like that. So where it's, see if they come up with new intel reports or say, or like virus toll comes up and says oh hey there's this. Things like that. So for you, for like a private citizen you want to do something like your social security number, your phone number, your real name, right? Unique piece of information like that. And you also you want to tie it to more than just once. So say for example if you do like your social and your name, you're gonna get a better percentage hit if you're just doing the social, right? Oh dude, you're good. See, yeah, I'm not gonna talk on that subject because that's a TTP but that's a very very good line of thinking. Questions? I love questions. Come on. You can ask me where I got this shirt. Sir? So all that stuff was covered in the, in the very first slide. You have to understand, from the outward this. It takes, whenever we do things through legal channels, it takes a great amount of time so I'm still planning on what to do once the information comes back. So like now, doing the warrant for information goes through Google and they'll send us whatever things we need. So it makes sense. But these cases, these cases happened several years ago. Sir? I'm sorry? Questions? Sir? Oh, thanks sir. You're not about looking yourself. Shut up, I was cracking the joke. So I hate to be disrespectful. I mean, I love giving talks, right? There are some things I can't say but can you re-ask the question in a way if you were on a team how to manage legends? I don't drink alcohol. But if you re-ask the question, I'm being serious. If you re-ask the question how to manage legends within an environment, I'll be more than happy to answer the question. I'll ask the question for you. If you had multiple legends and you were working in a team environment, how would you do it? Dude, no fucking problem. I have no problem answering that question. So one of the biggest things specifically in like the CTA-5 from DI mythology is you have, say if I die, someone needs to be able to pick up that work and carry on. So our legend will compromise of the type of pronouns we work with like full chat logs to see how I talk, like the type of words I use, like the type of lies that I say, the VPN address that I use, right? And so where that legend can go from person A to person B and continue the mission. Does that make sense? Awesome. Good fucking job, dude. Question, sir. So I have coworkers in the room so I can't lie, but I have a shit time. It's embarrassing. No, like I had the Dale four-split right on both sides because I do a lot of Linux work. And then I've got a shit time of monetization. It's fucking embarrassing. Sir, do I have time still? When I was younger, I didn't know what skip tracing was. I had no fucking clue what skip tracing was. I read an article on Wired magazine by Michelle Gomez, OG gangsta, like old school hacker type, but she didn't know she was a hacker. I hate to say this and oh my god, I can't believe I'm saying this, but I heard a quote a long time ago from Jason Street. He said, some of the best hackers in the world don't own computers. I thought I was just full of shit. I never really cared. I was like, it's Jason. I'm just kidding. And I was thinking, holy shit, he's right. Some of the best hackers in the world are not technical. Don't own computers. They do machine sculpting. They do, fuck, I don't know. I'm gonna bullshit something. I don't fucking know. But I see how she worked and I see how she was supposed to be my guest. She actually wasn't able to make it. I see how she worked and I see how I work and I see how I come from a hacker background. And I want to do something good for my country. You know what I mean? I want to do something good for, I want to serve my country. I see how she did it. And she's the exact same way she went, she just had different routes. Like she knows how to find boats. She knows how to do like huge tankers that are being stolen, right? It's a very niche thing, but this work helps me do more intelligent analysis to track others. It's pretty much the same thing. Did I answer your question? I kind of rambled. Through all the work from law enforcement that I worked with, I think I met two or three actual hackers. A lot of them are like former military that know how to use database searches and they have the analytical thinking. But they don't know how to do things like getting an Xbox Live IP address, getting things like the technical side of it. Does that make sense? Did I actually answer that time? Dude, I apologize. My mind's racing. Sir, if you'll give me your phone number. Yes, yes. Three cases altogether. Two of them killed themselves. And one, it wasn't that... I'm trying to say legal. I sincerely apologize. There's a list of things I can and cannot say and there's like only four things I'm supposed to be saying. It wasn't, it wasn't the fact that I couldn't find him. It was the fact that we couldn't legally apprehend him. Does that make sense? Like everything I do is on a team environment. I swear to God for every hacker on our team there's four fucking attorneys. You know what I mean? And sometimes it comes to an art of the attorneys are saying no it's going to break international law. Even if they send me to like Galapagos Islands to where I can do most of my work to be able to be able to stay legal. Sometimes, like most international law is not written. Right? It's always been, dude I'm sorry, one of the biggest things in intelligence is doing your steps. What you did to start with and where you went and whatever. As long as, even if I don't find them and I can get on to someone else, they can match it and carry on the mission. But sometimes you just can't break the law. And the law is so particular about one certain area, specifically like on passports and from foreign countries that sometimes you just say this is where, I know this is where his last location was and there's nothing else I can do. And it sucks. It sucks. Thank you, sir. Any other questions? Sir. Yes, yes. Oh, I'm sorry, I might talk, actually I was told I was given 30 minutes from 45 minutes. There is a, I talk kind of fast. So gather through mostly closed-source sources, a lot of OSINT, a lot of other things, but what the master merge does for me is say, oh the creation date of this Twitter account doesn't match the time of this Gmail. Or this dshbag was here but not here at this location or his passport entered this country at this time but didn't, so it's really good for finding misinformation. Yeah, questions? Ma'am. One question. I'm just fucking with you. As silly as it sounds, and I hate to play the autism card, but I'm very bad at putting things down. I am very, very, very bad at putting things down. Like the Hoover, the second case. Oh, I wanted to fucking destroy his life. That was actually the last case where the agency would tell me the story, because we learned our lesson because Rhett is emotionally retarded. Alright. It's very hard for me to put things down. And I will, that's one of the reasons why I spent 510 hours on that one case. Right? It's, one of the rules that I'm trying to follow now is if I find three unique pieces of information that don't tie together to two information I've confirmed, I say, okay, done. I record it, I say, here it is Marines, and you know what I mean? What was your second question? I sincerely apologize if I want to answer that question. I apologize. Questions? Sir. To be absolutely honest, I'm not going to answer that question. My best friend actually has an OSCP and OSCE. Extremely intelligent. Extremely intelligent. Love the guy to death. But he's, I see how he can take a Pintess mindset and be able to go into an intelligence life, intelligence field. Right? If you have the hacker mindset, you've got the fucking hacker mindset. You know what I mean? It's, it's an experience thing that comes with time. You know what I mean? It's not about, it's like, it's like trying to study for the OSCE. You can't study for the OSCE. It's an, it's an experience thing. You know what I mean? I'm, I'm, like, like I said, I'd go docks, dudes and anonymous. I think they're hot shit. No, I'm being serious. That's actually one of the first things I started doing. I can't stand people who go after private citizens. I can't fucking stand them. You don't call yourself a hacker and go after people who can't defend themselves. Like older couples, there was a, there was a dude that was living with his, with his parents that his, because his credit was shot, because he went to, in my own personal opinion, not speaking for my employer. Hackers, who call themselves hackers and target personal lives to ruin them just for money, you can get the fuck out of here. That's my own personal opinion. To me, that's not a hacker. A hacker is someone who strives for knowledge, tries to do it on randomly, and I apologize. But, you know, seriously, some, some, there's, there's people out there, there's groups out there, and I'd start just going through, I'd learn what doxing's all about. The difference between illegal doxing and illegal doxing, you know what I mean? And keep it to yourself and just practice. That's actually one of the, my niece, actually, and I'm actually not rambling, I'm actually on, on topic now. My niece had some things happen. I love my niece to death, absolutely love her to death. She's a pain in my ass, but I fucking love her. She had, she had some bad things happen, and this guy, actually from, from, from Tulsa, Oklahoma, a hacker, which didn't even know what, didn't even know how to spell Python, was just fucking with her. I couldn't believe it. Like, I go read this guy's Twitter and his Facebook, he's talking about how he's dropping Oday and golly CBEs. I'm like, dude, you're a fucking toolbag. You're a fucking toolbag. You're using, you're using whitepeople.com, not whitepeople.com, the, the, the, the fucking, the white, the whitepages.com, right? And I'm thinking, I'm done, I'm fucking done. I need a Xanax. Just give me a second. Go say Monsieur. Absolutely. Absolutely. I sincerely apologize, but I can't answer that question. I sincerely apologize. I would love to, I would absolutely love to, but I apologize. I'm sorry. All right, thanks sir.