
0414 | Threads
True Crime Bullsh**: The Israel Keyes Investigation
00:00
Using a Data Breach Search Engine to Find a User Name
We start with known keys data, emal addresses, user names, phone numbers, addresses, passwords, ip addresses. Then we run that against over 11 billion breech records. The results can be quite varied, and often go as far back as the 19 nineties. We then mind those profiles. We never try to log in or hack the accounts. We just see what we can find superficially. Sometimes it's an email address or an ip address or an associate account. Then we take that information and start the first phase known data all over again. And we look for both patterns and new user data. But here's a single, very boiled down example of how this has
Play episode from 04:36
Transcript


