ODINT Venezuela - Protecting Your Rights with Integrity

איתור מבוקש ביותר של DEA

Tracing a fugitive former Venezuelan intelligence official through open-source infrastructure

DEA Most Wanted $10M Reward Interpol Red Notice OSINT Investigation
פרופיל הנחקר — DEA Narcotics Rewards Program

Pedro Luis Martín Olivares

Former head of the financial intelligence section of the now defunct Directorate of Intelligence and Prevention Services (DISIP), now the Bolivarian Intelligence Service (SEBIN). Facing formal charges in a Florida court since 2015 for multiple counts of drug trafficking. Accused by the United States of using his position in the Venezuelan government to facilitate drug trafficking through Venezuelan airspace.

Name Pedro Luis Martín Olivares
Born April 18, 1967
Place of Birth Caracas, Venezuela
Description (DEA) 1.65 m, ~113 kg, Brown Hair, Green Eyes
Reward $10,000,000 (DEA)
Status Red Alert — Interpol
Alias Ramón José Garrido Sánchez (False identity)

Background

Martín Olivares, 51, has been facing formal charges in a Florida court since 2015 for several counts of drug trafficking. In addition, the United States accuses him of using his “position” in the Venezuelan government to facilitate drug trafficking through Venezuelan airspace.

The U.S. Treasury Department added a former senior official of the Bolivarian Intelligence Service (SEBIN) and two of his alleged associates to its “blacklist” of drug traffickers, along with 20 “front” companies that were used to launder illicit money.

DEA wanted listing for Pedro Luis Martin Olivares

DEA wanted listing and U.S. Treasury Department designation

On September 29, 2020, the State Department officially announced the $10 million reward through the Narcotics Rewards Program (NRP). Martín Olivares is listed alongside other senior officials of the Venezuelan regime.

State Department Narcotics Rewards Program announcement

State Department Narcotics Rewards Program — $10 million reward announcement

Subject profile details

Subject profile and identification details

טביעת רגל דיגיטלית Discovery

On his LinkedIn profile, he shows how he manages his own website.

LinkedIn profile showing personal website

Instagram page linked to the subject

Website Infrastructure Analysis

The site is a CMS WordPress installation. The control panel was found with basic enumeration.

WordPress CMS identification

WordPress CMS identified on the subject's personal website

cPanel discovery through enumeration

Found the cPanel with ease — basic enumeration

Subdomain and DNS Reconnaissance

Subdomains, DNS records and registrar information

Subdomains found, DNS and registrar information

Open Ports

Port scan results showing numerous open ports

A significant number of open ports discovered on the server

Email Addresses

Email addresses associated with the domain

Emails associated with the domain

Account Discovery

Accounts associated with the subject's username were identified across multiple platforms.

Vulnerability Findings

Numerous CVEs and service exposures were discovered during the infrastructure analysis:

Severity CVE / ID Service Description
INFO mysql-info web [mysql-info] [javascript] [info]
INFO snmpv3-detect web [snmpv3-detect] [javascript] [info]
INFO imap-detect web [imap-detect] [tcp] [info]
INFO mysql-detect web [mysql-detect] [tcp] [info]
INFO pop3-detect web [pop3-detect] [tcp] [info]
INFO mysql-native-password web [mysql-native-password] [tcp] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO spf-record-detect web [spf-record-detect] [dns] [info]
INFO txt-fingerprint web [txt-fingerprint] [dns] [info]
INFO caa-fingerprint web [caa-fingerprint] [dns] [info]
INFO nameserver-fingerprint web [nameserver-fingerprint] [dns] [info]
INFO mx-fingerprint web [mx-fingerprint] [dns] [info]
INFO ssl-issuer web [ssl-issuer] [ssl] [info]
INFO ssl-dns-names web [ssl-dns-names] [ssl] [info]
INFO wildcard-tls web [wildcard-tls] [ssl] [info]

Database Access Attempt

When trying to log in to the MySQL database of the server, the connection was banned by the host's intrusion prevention system.

MySQL login attempt resulting in ban

Connection banned by server IPS when attempting MySQL database access

In Production

This investigation is ongoing. Additional findings, deeper infrastructure analysis, and corroborating intelligence will be published as the investigation progresses.

Investigator's Note

This report is based entirely on open-source intelligence (OSINT). No classified information was accessed. No confidential sources were used. Everything documented here is publicly available — if you know where to look.

Compiled: February, 2026

Classification: OSINT — Open Source

ODINT Latin America

Donate