ODINT Venezuela

Encontrando um Procurado pela DEA

Rastreando a un exfuncionario de inteligencia venezolano fugitivo a través de infraestrutura de fuentes abiertas

Procurado pela DEA Recompensa $10M Alerta Vermelho Interpol Investigacao OSINT
Subject Profile — DEA Narcotics Rewards Program

Pedro Luis Martín Olivares

Exjefe de la sección de inteligencia financiera de la extinta Dirección de Inteligencia y Servicios de Prevención (DISIP), ahora Servicio Bolivariano de Inteligencia (SEBIN). Enfrenta cargos formales en un tribunal de Florida desde 2015 por múltiples cargos de narcotráfico. Acusado por Estados Unidos de usar su posición en el governo venezuelano para facilitar el narcotráfico a través del espacio aéreo venezolano.

Nombre Pedro Luis Martín Olivares
Nacimiento April 18, 1967
Lugar de nacimiento Caracas, Venezuela
Descripción (DEA) 1.65 m, ~113 kg, Cabello castaño, ojos verdes
Recompensa $10,000,000 (DEA)
Estado Alerta Vermelho — Interpol
Álias Ramón José Garrido Sánchez (Identidad falsa)

Contexto

Martín Olivares, 51, has been facing formal charges in a Florida court since 2015 for several counts of drug trafficking. In addition, the United States accuses him of using his “position” in the Venezuelan government to facilitate drug trafficking through Venezuelan airspace.

The U.S. Treasury Department added a former senior official of the Bolivarian Intelligence Service (SEBIN) and two of his alleged associates to its “blacklist” of drug traffickers, along with 20 “front” companies that were used to launder illicit money.

DEA wanted listing for Pedro Luis Martin Olivares

DEA wanted listing and U.S. Treasury Department designation

On September 29, 2020, the State Department officially announced the $10 million reward through the Narcotics Rewards Program (NRP). Martín Olivares is listed alongside other senior officials of the Venezuelan regime.

State Department Narcotics Rewards Program announcement

State Department Narcotics Rewards Program — $10 million reward announcement

Subject profile details

Subject profile and identification details

Descubrimiento de huella digital

En su perfil de LinkedIn, muestra cómo gestiona su propio sitio web.

LinkedIn profile showing personal website

Instagram page linked to the subject

Analise de infraestrutura do site

O site e uma instalacao de CMS WordPress. O painel de controle foi encontrado com enumeracao basica.

WordPress CMS identification

WordPress CMS identified on the subject's personal website

cPanel discovery through enumeration

Found the cPanel with ease — basic enumeration

Reconocimiento de subdominios y DNS

Subdomains, DNS records and registrar information

Subdomains found, DNS and registrar information

Puertos abiertos

Port scan results showing numerous open ports

A significant number of open ports discovered on the server

Direcciones de correo electrónico

Email addresses associated with the domain

Emails associated with the domain

Descubrimiento de cuentas

Foram identificadas contas associadas ao nome de usuario do sujeito em multiplas plataformas.

Hallazgos de vulnerabilidades

Se descubrieron numerosos CVEs y exposiciones de servicios durante el análisis de infraestrutura:

Severidad CVE / ID Servicio Descripción
INFO mysql-info web [mysql-info] [javascript] [info]
INFO snmpv3-detect web [snmpv3-detect] [javascript] [info]
INFO imap-detect web [imap-detect] [tcp] [info]
INFO mysql-detect web [mysql-detect] [tcp] [info]
INFO pop3-detect web [pop3-detect] [tcp] [info]
INFO mysql-native-password web [mysql-native-password] [tcp] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO tls-version web [tls-version] [ssl] [info]
INFO spf-record-detect web [spf-record-detect] [dns] [info]
INFO txt-fingerprint web [txt-fingerprint] [dns] [info]
INFO caa-fingerprint web [caa-fingerprint] [dns] [info]
INFO nameserver-fingerprint web [nameserver-fingerprint] [dns] [info]
INFO mx-fingerprint web [mx-fingerprint] [dns] [info]
INFO ssl-issuer web [ssl-issuer] [ssl] [info]
INFO ssl-dns-names web [ssl-dns-names] [ssl] [info]
INFO wildcard-tls web [wildcard-tls] [ssl] [info]

Intento de acceso a base de datos

Ao tentar iniciar sessao no banco de dados MySQL do servidor, a conexao foi bloqueada pelo sistema de prevencao de intrusoes do host.

MySQL login attempt resulting in ban

Connection banned by server IPS when attempting MySQL database access

En producción

Esta investigacao esta em andamento. Descobertas adicionais, analise de infraestrutura mais profunda e inteligencia corroborativa serao publicadas a medida que a investigacao avancar.

Nota do pesquisador

Este relatorio baseia-se inteiramente em inteligencia de fontes abertas (OSINT). Nenhuma informacao classificada foi acessada. Nenhuma fonte confidencial foi utilizada. Tudo documentado aqui esta disponivel publicamente — se voce sabe onde procurar.

Compilado: Fevereiro, 2026

Classificacao: OSINT — Fontes Abertas

ODINT Latin America

Donate Deutsch Português