Exposing a Currently Active Email Address Portfolio of Web Site Defacement Groups or Lone Web Site Defacement Groups – An OSINT Analysis

Dear blog readers,This is Dancho and I’ve decided to share what appears to be one of the most comprehensive and up-to-date and relevant email address portfolio of personal email addresses belonging to high-profile Web site defacement groups including l… Continue reading Exposing a Currently Active Email Address Portfolio of Web Site Defacement Groups or Lone Web Site Defacement Groups – An OSINT Analysis

Dancho Danchev’s Law Enforcement and OSINT Operation “Uncle George” – Sample Graphics

Dear blog readers,This is Dancho and I’ve decided some of the graphs which I produced part of my currently ongoing Law Enforcement and OSINT Operation called “Uncle George” where the ultimate goal would be to assist fellow researchers vendors and organ… Continue reading Dancho Danchev’s Law Enforcement and OSINT Operation “Uncle George” – Sample Graphics

Exposing a Currently Active Portfolio of Cyber Jihad Related Email Addresses – An OSINT Analysis

Dear blog readers,This is Dancho and I’ve decided to share with everyone a currently active list of high-profile cyber jihad domain and campaign registration email addresses which I obtained using a variety of means where the ultimate goal would be to … Continue reading Exposing a Currently Active Portfolio of Cyber Jihad Related Email Addresses – An OSINT Analysis

Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Five

Dear blog readers,This is Dancho and I’ve decided to share yet another currently active portfolio of high-profile cybercriminal email addresses part of the “Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts I… Continue reading Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Five

Exposing a Currently Active Portfolio of GIMF Cyber Jihad Related Email Addresses – An OSINT Analysis

Dear blog readers,I’ve decided to share a recently obtained using Technical Collection portfolio of email addresses known to have been involved in various cyber jihad campaigns online including to possess a direct involvement with the GIMF (Global Isla… Continue reading Exposing a Currently Active Portfolio of GIMF Cyber Jihad Related Email Addresses – An OSINT Analysis

FBI/AFP-Run Encrypted Phone

For three years, the Federal Bureau of Investigation and the Australian Federal Police owned and operated a commercial encrypted phone app, called AN0M, that was used by organized crime around the world. Of course, the police were able to read everything — I don’t even know if this qualifies as a backdoor. This week, the world’s police organizations announced 800 arrests based on text messages sent over the app. We’ve seen law enforcement take over encrypted apps before: for example, EncroChat. This operation, code-named Trojan Shield, is the first time law enforcement managed an app from the beginning…

Continue reading FBI/AFP-Run Encrypted Phone

Dancho Danchev’s Disappearance – 2010 – Official Complaint Against Republic of Bulgaria – Part Four

Dear friends. I never really had the chance to elaborate or actually explain what really took place with me in 2010 when I was what appears to be illegally arrested using a stolen ID and a molestion and home robbery attempt courtesy of local polic… Continue reading Dancho Danchev’s Disappearance – 2010 – Official Complaint Against Republic of Bulgaria – Part Four

Dancho Danchev’s Disappearance – 2010 – Official Complaint Against Republic of Bulgaria – Part Four

Dear friends. 

I never really had the chance to elaborate or actually explain what really took place with me in 2010 when I was what appears to be illegally arrested using a stolen ID and a molestion and home robbery attempt courtesy of local polic… Continue reading Dancho Danchev’s Disappearance – 2010 – Official Complaint Against Republic of Bulgaria – Part Four

Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Five

Dear blog readers,I’ve decided to continue my “Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Four” blog post series and I’ve recently decided to issue yet another u… Continue reading Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Five