Today, the @FBI announced today the arrest of RUI-SIANG LIN, a/k/a “Ruisiang Lin,” a/k/a “林睿庠,” a/k/a “Pharoah,” a/k/a “faro,” in connection with his operation and ownership of “Incognito Market,” an online dark web narcotics marketplace
@FBI Of course, they are doing #OSINT at the FBI. In the indictment, they mentioned the "publicly available information" about Rui-Siang Lin
@FBI I started by a simple Google search and found this email address ruisiang2000@gmail.com mentioned in this Gitlab profile gitlab.com/ruisiang
@FBI Thanks to , we can find multiple accounts including his Github account predictasearch.com
@FBI Side note: A Garmin account is linked to this email address but it's not mentioned in the indictement. 2 possibilities: they didn't find it (unlikely), Garmin is not answering to legal requests
@FBI Ruisan has a pretty active digital life. All his social accounts are available here:
He also uses the same username everywhere: RuiSiang rs.me
@FBI As mentioned in the indictment he was working for the Taiwanese Ministry of Foreign Affairs
@FBI This guy is pretty young, he was a student researcher and intern before
@FBI Also, he is on Twitter under the pseudonym @ruisiang_tw. You want something funny ? He did a thread about the arrest of the owner of SilkRoad. Is it what we called irony?
I will stop this quick #OSINT check here but what we can say is:
- This guy seems to be skilled and passionated about cryptocurrencies
- His public digital footprint doesn't smell the drug lord he is as mentioned in the indictment
- We should probably start to investigate from his usernames
• • •
Missing some Tweet in this thread? You can try to
force a refresh
- Yes, we have identified the correct individual, and he is aware of it. He has attempted to delete evidence since the publication of the tweet.
- Again, it’s not a one-man job. We have also identified the other members of the team.
- They are aware of it. They sent 500 million requests to predictasearch.com over the last three days.
- Trust the process. A report has been sent to the concerned authorities, and they will do their excellent work as usual.
They created a new Telegram channel. The last post they forwarded is from a channel called "Russian Partisan." This is not surprising according to our initial findings.
I've identified the people responsible for the DDoS attack on X yesterday. I'm currently in Washington and will be at the Eisenhower Building tomorrow (for another matter). Would you be interested in meeting?
In the meantime, let me explain
It's OSINT time!
@elonmusk Yesterday, a group called "Dark Storm Team" claimed responsibility for a DDoS attack on Twitter.
Their leader, MRHELL112 on Telegram, has previously used usernames like Darkcrr, GLITCHAT1, and GLITCHcracker.
@elonmusk In a Telegram channel about "DDoS Attack Services," DrSinaway is mentioned alongside Darkcrr.
DrSinaway’s TG bio also references a group called CyberSorcerers.
Après avoir dit que le texte est trop large un tweet plus haut on parle “des services” ? Il n’y avait pas un mot plus large dans le dictionnaire de la French Tech ?
Non il n’y a pas de backdoor qui respecte les libertés et la vie privée. C’est un MENSONGE.