Austin Bomber’s Deleted Reddit Posts

Posted on March 21st, 2018

Today, I was bombarded by emails from the media asking for help in identifying any deleted posts from the Austin bombing suspect Mark Anthony Conditt. I do not respond to these requests, but thought this could be a good learning opportunity for all investigators. Some media reports that the Reddit username of “austinbomber” has been confirmed by unnamed sources as the suspect in this incident. A quick look at reveals the account has been suspended:

This could be anyone, and I have no evidence this is the account of Mark Anthony Conditt. Regardless, let’s evaluate the data. Navigating to my IntelTechniques Communities Search Tool ( presents options for username look-ups. The Archive I search confirms that The Wayback Machine acquired the profile page on March 21, but after it had been suspended. The Archive II search uses and identifies previous posts, such as the following:

The User Analytics option reveals some details that were removed by Reddit, such as:

redditor since: 3/20/2018
redditor for 29 hours
longest period between two consecutive posts: 9 minutes
best comment: I don’t have any terminal illness or anything like that. Now mental illness, who knows.
worst comment: Yes, and I’ll happily do it some more. c:
best submission: I am the “AUSTIN BOMBER”. AMA.

HOWEVER, the most powerful search is always going to be the PushShift Cache, which reveals 40 deleted posts from this user on Reddit. The entire URL is at Some examples:

author “austinbomber”
body “I’m not chacing anything by posting on Reddit. If the police really wanted to they could find me; but I’m also too smart to not let it go too far. Killing people is something I have thought about and gone into a long self-dialogue with myself about – in this instance I would really rather watch the destruction of something blowing up than killing people. If I wanted to simply kill people I’d just beome a serial killer. As for bigger avenues for destruction and injury, I don’t think there really are any unless I wanted to shoot up a school or a shopping mall (which I don’t). I honestly just want to see the world burn.”
created_utc 1521560169
permalink “/r/AMA/comments/85tjmo/i_am_the_austin_bomber_ama/dvzxsxj/”
retrieved_on 1521560175

author “austinbomber”
body “The package was being shipped closely to the other bombings – and may have been on its way to a very prolific radio talk show host who happens to live in Austin, albeit close to the other bombings.\n\nI did not intended for the package to detonate at the FedEx facility. It must have been tripped by being thrown on a truck haphazardly or boucing on a conveyor belt.\n\nThe tripwire was basic fishing line and was anchored with a simple wooden dowel approximately two or three inches off of the ground – something I could easily and quickly set up and escape from without killing myself. I’m surprised the police aren’t walking to streets spraying silly string everywhere looking for more tripwires. ”
created_utc 1521561432
permalink “/r/AMA/comments/85tjmo/i_am_the_austin_bomber_ama/dvzz798/”
retrieved_on 1521561434

Although removed by Reddit, caches of data are considered public content. This technique applies to most social network posts.

Filed under Law Enforcement, OSINT, Search | Comments Off on Austin Bomber’s Deleted Reddit Posts

Hiding from the Internet – 4th Edition

Posted on March 20th, 2018

The latest edition of Hiding from the Internet was released today. Here are the details, and orders can be placed at Thanks for all of the support.

Rewritten Fourth Edition helps you take control of your privacy by removing your personal information from the internet

In this new edition, I share my methods for removing your personal information from the internet. I expose the resources that broadcast your personal details to public view. I have researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. I provide personal experiences from my journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, I identify new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to:

Remove your personal information from public databases and people search websites
Create free anonymous mail addresses, email addresses, and telephone numbers
Control your privacy settings on social networks and remove sensitive data
Provide disinformation to conceal true private details
Apply proper security to your computers using free resources
Force data brokers to stop sharing your information with private and public organizations
Prevent marketing companies from monitoring your browsing and shopping habits
Remove your landline and cellular telephone numbers from online websites
Use a credit freeze to eliminate the worry of financial identity theft and fraud
Change your future habits to promote complete privacy and anonymity
Conduct a complete background check to verify proper information removal
Purchase a home or vehicle anonymously
Install a proper home firewall with absolute VPN kill-switch

If you have the 3rd edition of this book, you may want to know what has changed in this 4th edition. Overall, 1/4 of the book is brand new content, 1/4 is updated material, and 1/2 is recycled relevant instruction. The 4th edition is 370 pages (3rd edition was 300), but the retail price of the book remained unchanged. All expired and outdated resources were replaced with new methods throughout every chapter. Overall, much new information has been added to discuss completely anonymous home purchases, new aliases, home firewalls, and various ways to keep up with the changes that will take place after this book is printed. The first two chapters are practically untouched while an entire new chapter was added toward the end. The Preparation, Personal Data Removal, Anonymous Purchases, and Major Life Event chapters have substantial updates.


1 Self Pre-Assessment
2 Self Background Check
3 Preparation
4 Online Protection
5 Credit Companies
6 Anonymous Purchases
7 Anonymous Telephones
8 Personal Data Removal
9 Social Networks
10 Web Publishing
11 Government Records
12 Disinformation
13 Aliases
14 Future Habits
15 Major Life Changes
16 The Home Firewall
17 Data Leakage Response

Filed under Privacy, Security | Comments Off on Hiding from the Internet – 4th Edition

The Complete Privacy & Security Podcast – Episode 071

Posted on March 16th, 2018

EPISODE 071: An Inside Look at People Search Sites

This week we get an inside peek of the people search website industry, and learn some surprising details.

Listen to all episodes at

or Subscribe at:

RSS / iTunes / Google / Stitcher



Net Neutrality Developments
– Rhode Island
– Washington
Mobile Device News
– Android P
– GrayShift, et al


Johan Fourie from, et. al.


Offense: &


Are there any email providers that encrypt the to, from, and subject lines?

Disney properties are now forcing fingerprint scans on entry. Do they actually store an image that can be reproduced? How can we avoid?

The Complete Privacy and Security Desk Reference

Michael’s Website

Justin’s Website

Please submit your listener questions to us at

Filed under Podcast, Privacy, Security | Comments Off on The Complete Privacy & Security Podcast – Episode 071

Updated User Name Search Tools

Posted on March 15th, 2018

I recently added SearchHereNow, SpeedyHunt, and Gravatar to the User Name Search Tool. You can also test assumed email addresses based on a user name within the data breach APIs.

Filed under OSINT, Search | Comments Off on Updated User Name Search Tools

Updated Person Search Tools

Posted on March 14th, 2018

I recently updated the Person Search Tools within the IntelTechniques Tools page. Overall, I added eight new search options, two of which publicly bypass the payment requirements for those services.

Filed under OSINT, Search | Comments Off on Updated Person Search Tools

The Complete Privacy & Security Podcast – Episode 070

Posted on March 9th, 2018

EPISODE 070: Switching to Linux-Part 3: Applications

This week we continue our conversation about switching to Linux, sponsored by

Listen to all episodes at

or Subscribe at:

RSS / iTunes / Google / Stitcher



Linux Flavors
Google Account Access
BleachBit 2.0

MB’s Laptop:
JC’s Laptop:

Gui vs Terminal

Quick Terminal Tutorial:
sudo apt-get update: packages list
sudo apt-get upgrade installs newer versions
sudo apt-get install
sudo apt-get remove
sudo apt-get purge
sudo apt-get clean
sudo apt-get autoclean
sudo apt-get autoremove



Office: Libre
Notes: Standard Notes
Player: VLC
Ebook: Calibre
FTP: FileZilla


sudo apt-get install openvpn
cd /etc/openvpn
sudo wget
sudo unzip
ls -l
sudo openvpn ‘config-filename-goes-here.ovpn’

Photoshop: GIMP
Audio Editing: Audacity

Signal Desktop

Container Encryption: Veracrypt
CCleaner: Bleachbit
Eraser: Nautilus
PW Manager: KeePassXC
Metadata Anonymization Toolkit
Virtual Box


Offense:, et al


What do you guys think about Mullvad?

I use a VPN constantly and connect to various countries at different times. I have absolutely no photos, no personal information (like city, real name, DOB interests), and my privacy settings are “maximized.” Yet time and time again Facebook is showing me ads in the sidebar that are geographically close to me. Why?

The Complete Privacy and Security Desk Reference

Michael’s Website

Justin’s Website

Please submit your listener questions to us at

Filed under Podcast, Privacy, Security | Comments Off on The Complete Privacy & Security Podcast – Episode 070

Internet Search (OSINT) Resource: PeopleByName

Posted on March 7th, 2018

People search websites are abundant lately. There are dozens of new options that appear every year. Recently, I was notified about People by Name ( Contrary to the name of the site, you can only enter a telephone number. You will eventually be notified that a record exists, and then given the option to pay for the results. I never recommend this, as you will likely be disappointed in what you receive. I started digging through the site and found a way to see these results for free, and search by name. Consider the following real example. I entered various URL patterns and finally received a response with the following:

This represents the area code and first three digits of a number. The results included entries as seen below:

The names are redacted by the service, but the full home addresses are visible. We now have a way to search a phone number and get the address, which is a good start. These details could be carried over to other search sites to get the name. I then wanted to find a way to search by name throughout the site. I found the following URL format to work:

If you know the city and state of your target, you can also specify this in the URL as follows:

The results display the full entry for that subject, often including full address, telephone number, and date of birth, as seen below:

In general, most people search sites have an ability to query data by direct URL submission. What else can YOU find?

Filed under OSINT, Search | Comments Off on Internet Search (OSINT) Resource: PeopleByName

Internet Search (OSINT) Resource: Snap Map

Posted on March 7th, 2018

During my training, I am often asked about the ability to search Snapchat. The initial answer is “No, you can’t search people’s Snapchat posts”, but there are some options. If your target is sharing “Stories” from their account, these are likely public and searchable. In years past, this required the use of their mobile app and a dedicated Android investigation device. Today, we can use the web. Navigate to the following address:

You are given an option to explore the map and find random people over-sharing their lives. However, we want more precise information. If you know the GPS coordinates of your target’s home, employer, or school, we can enter those directly into the URL as follows:,-118.403175

Unfortunately, that only centers that location on a world map view. Instead, add a zoom level of 18, as follows:,-118.403175,18.00z

You can now see a satellite view instead of a map view, and you will have a zoom level appropriate for a specific address. Click around and allow the map to load any public videos. You should see a heat map style of interface identifying areas with active users. Below is an example of a result.

There is also a search field in the upper left that allows for location entry, such as a business name. This will also pick up event names such as Teacher’s Strike or Monsanto Protest. I encourage constant experimentation with the search and URL options, as these tend to change quickly. I also added this feature to my Custom Mapping Tools in order to simplify the process at

Filed under OSINT, Search | Comments Off on Internet Search (OSINT) Resource: Snap Map

Updated OSINT Flowcharts

Posted on March 6th, 2018

During the writing of the 6th Edition of Open Source Intelligence Techniques, I updated the various OSINT Flowcharts that I placed near the end of the book. Here are the most recent versions:

Real Name:

Filed under OSINT | Comments Off on Updated OSINT Flowcharts

The Complete Privacy & Security Podcast – Episode 069

Posted on March 2nd, 2018

EPISODE 069: Nextcloud

This week we talk with Nextcloud about secure storage, calendars, notes, and more.

Listen to all episodes at

or Subscribe at:

RSS / iTunes / Google / Stitcher



Reply All 116:
Faraday Hacking:






I plan to buy a new iPhone with cash while I wait for the Librem 5 telephone to be delivered next year. I want to go to a box store and buy a SIM card and prepaid plan with cash. I travel a lot. What is the best prepaid plan for those that travel? Currently, I have Verizon which is paid for on a corporate credit card and I like Verizon overall. Cost is not an issue.

I have a question regarding transferring a Sudo account from an Apple iPhone to an iPod. I don’t want to use my iPhone in my home because even in Airplane mode, the base band calls home, so to speak. I ordered a Librem 5 telephone, but it won’t be available until 2019. Meanwhile, I am considering paying cash for a new iPod touch to use at home for telephone calls. My iPhone will be kept in my car in a Silent Pocket faraday cage so it’s off line. I have the Sudo app on my iPhone. If I transfer my Sudo account to the iPod, will there be linkage between my iPhone and the new iPod? Will I be better off downloading the Sudo app on my iPhone and establishing 9 new telephone numbers?

The Complete Privacy and Security Desk Reference

Michael’s Website

Justin’s Website

Please submit your listener questions to us at

Filed under Podcast, Privacy, Security | Comments Off on The Complete Privacy & Security Podcast – Episode 069


Recent Posts