All Episodes
March 14, 2022 - Jim Fetzer
51:31
Using the Internet as an Investigative Tool (13 March 2022) with Brian Davidson
| Copy link to current segment

Time Text
This is Jim Fetzer, your host on a Real Deal special report with Brian Davidson, who's a private investigator who's figured out ways of doing research on the internet.
He wants to give us a tutorial on the tools he's devised, which seems to me to be a super idea.
Because from everything he's been telling me, these are ways of really finding your way around the web and sorting out information that might otherwise be difficult to track down.
Brian, I'm just delighted.
Thanks, Jim.
I appreciate you having me.
Just to give a little background, we're going to try to keep this In control today and so we're going to move rather quickly through a number of tools, but I just wanted to give you a little background about me.
I'm a private investigator out of Houston.
I'm a generalist.
I own a company named Panoramic Investigations and I've owned it for about 10 years.
I was when I first started out in this business and other businesses, you know, I was listening to the news thinking that I was well informed.
Um, what I realized today is that I was being misinformed by the information that was on the news.
And so a large part of my story was that, you know, back in about April of 2016, my sister said, hey, why don't you take a look at this Sandy Hook thing?
And I.
I had heard the idea of false flags.
I had watched a couple of videos on 9-11.
Loose change was one of them.
But I never really let the consequences of what a false flag was set in for me.
And so when my sister challenged me to use my private investigation skills to start looking into these things, I started out and I ran across you and Wolfgang.
And then in June that year, the Pulse nightclub shooting hit.
And I remember being at home, I think it was on a Saturday morning, and I saw this guy go on the television named Norman Casiano, and he had made a claim on Fox News, I believe it was, that he had been shot six times in the abdomen, but he was performing the, uh, performing the interview from the passenger seat of a Honda Civic,
This is less than 24 hours later after the Pulse Nightclub shooting.
And I'm a hunter.
I've used some large caliber and high velocity weapons, and I knew that that was absolutely impossible.
And the image that came into my mind was that of a bullet passing through ballistic gelatin.
And I had shot plenty of hogs.
And I said, that's that's insane.
That's impossible.
I don't believe it.
And I'm going to get to the bottom of this thing.
And what that did was it It put me through a process called cognitive dissonance, where I studied the event and I just couldn't believe what I was seeing that they would try to pull something off this robust for the American people.
And I went back to my office.
And I started downloading.
I started using my open source intelligence skills, which is basically just advanced Internet searching.
And I started downloading all the earliest and most reliable evidence I could find related to the shooting into a folder.
And of course, what I discovered was very difficult.
It was the red pill.
It was very difficult for me to understand how it could have taken place and how I could have been a victim of such deceit.
Of course, shortly after I made it took me a couple almost a couple of weeks to let it really set in.
But shortly after that, I said, hey, what else are they lying to me about?
And I'm going to get to the bottom of this and that turned me into a conspiracy theorist, which I'm proud to say today.
I'm a conspiracy researcher just like you and.
So that's that's a bit of my story.
I mean, I'm a normal guy.
I'm a generalist.
I don't you know, I don't consider myself to be extremely good at anything, but I'm I'm generally better than the next guy when it comes to skills and tool sets.
So I'm going to kind of go over some things about Bear in mind, Brian, conspiracy theorists are investigating crimes, which more often than not lead back to the government, which is why they want to silence us.
I mean, it's just a way of defeating those who would actually expose corruption in the government by demonizing them, using a catch-all phrase, regardless of the evidence, because You know, everyone I know in the research community is more diligent and knowledgeable about the events the government is seeking to cover up than the reporters who are endlessly echoing their condemnation of those of us who are investigating crimes.
Well, and you're absolutely right, and I've heard it said that conspiracy is the top prosecuted crime in America.
It is.
Conspiracy of one type or another.
Yeah, they're real.
Yeah, they're real.
So that said, I'm going to go ahead and take over the screen and I'm going to show you guys a tool that I use on my computer.
There might be a possibility that someday I can duplicate this tool and maybe release it to the public.
Jim and I are still talking about that possibility if it's out there, but I'm just going to go ahead and take over the screen here.
And let's see, let's share screen.
Share that screen.
Okay.
Everything looks like it's working properly now, Jim.
It does.
Okay, so what you're looking at here is how I start my day every day.
I come into the office.
I fire up the computer.
Maybe I'll review a few news stories and find out what's going on, but I'll Get into this program which I've built and it's it's a platform called start.me and all it is is a better way to index your bookmarks for where you do research.
And I'm going to go over the tab on this screen called open source intelligence and what you're seeing are just simply bookmarks that are indexed and are part of what I use to figure out where and how events happened and who was involved.
So I'll just start out at the upper left.
And these are this one's labeled video tools.
And so I'm going to go find the original content the best I can.
And I'll try to find the highest resolution image, the earliest, most reliable footage.
And sometimes when I search the footage, I find that it originated Prior to the event.
Very nice.
Very nice.
Yeah, you know that that's obviously a big red flag when the media pushes out footage that was filmed years before sometimes an actual event took place and then you do a reverse video search only to find that the video has nothing to do with the event they're talking about in that news program.
So these are just the video tools that I would use for anything I see that feels off.
Just like I said, I saw that Norman Casiano video.
It felt off to me.
And so I went and captured as much as I could and reversed it and figured out where they were standing exactly on the map and figured out where this event took place in the timeline of the events that were out there.
So video tools are a big one.
Another technique that we'll use is something called Advanced search queries, and these are different types of techniques that go beyond your normal Google search engine that most people know how to use.
For instance, if I hit this Google Dorks program, I'll see a whole list of very specialized search terms that can help you refine your search.
Here's one where somebody is looking At a site that belongs to the government within the title index of and an ending.
So any words ending in CSV.
So if you were to run this search, you would get a large list of content that Uh, as you can see here, well, I just ran the search and it's giving us map content and CSV files, but just raw data.
And so a lot of people don't realize that the search engine is much, much more powerful than just your typical quotes.
You can look in site in URL there's all sorts of operators use this word but don't use this word find results only within this time period.
So those are some of the things that we can do with advanced search engines and we might also sometimes want to go and find out.
What is being said in another country?
So, with some of these, I can literally project my computer into, say, Japan and find out what the local news sources or the local Google results are inside Japan.
So, right now, with the Russia-Ukraine thing, what are they saying at this particular newspaper, which we know is state-controlled in the Ukraine?
So those are things that we can do with advanced search engines.
Online communities, let's say I'm looking into some person and they are perhaps an Asian person that has a lot of social profiles.
I might want to go search them inside Asian communities or other types of specialized communities that are out there.
So I keep this list.
Um, when it comes to social media, you know, I want to know who these people really are.
And so I'm going to try to research and get inside their social media accounts, assuming that they're not marked a private and go through and find out, well, what did this person say before?
You know, what did the Hillary Clinton?
Twitter feeds say on June of 2016 when the Orlando Pulse nightclub shooting happened or how did Obama address it what was in his so there's lots that can be done with especially like with old Twitter stuff.
To find out when it was posted, where it was posted.
There's old videos that are in there.
Somebody used to say this.
Now they say this.
What has caused them to change their mind?
There's just a tremendous amount of research that can still be done that isn't your typical Google search that allows you to find out, first of all, where do people have social media?
And what is it that they're saying on these social media sites?
So The next is a username breaker.
OK, so let's say I see a comment in a YouTube section and it is loaded with gold nuggets.
Well, I might want to figure out that username and try to identify who is this person so I can get in touch with them because they might not see that I left a comment on their YouTube video.
So I might go figure out what their username is, maybe what their other usernames are.
And then try to figure out where they've left other comments and what they've said so that I can figure out who this person is.
Next would be a resume finder and all this is is just very simply My tool for finding somebody's resume to find out who they worked for and what they did.
So if all of a sudden you see some rogue person being appointed to this government agency, you know, you might want to go hit their resume and find out, like Zelensky, that he was an actor.
You know, he was an actor in a show that where he delivered some lines and then, you know, you might see that on his resume.
And again, some of the crisis, of course, about the president of Ukraine.
Yes.
Yeah.
Yeah.
But other ones are, let's say that I see what I think is a crisis actor associated with something that I think is a false flag.
David Wheeler and Francine Wheeler, for example, at Sandy Hook.
For example.
Yeah.
I might want to go find their old resume, and I might want to post that, and I might want to send that to Jim so he can add it to his book.
So you've got to know how to do these advanced searches to find this information so that we can expose this as a community.
And of course, that's our goal here.
Yearbooks, you know, was this woman, did she used to be a man?
I mean, there's all sorts of things that can be done with old yearbook photos, including Finding out how somebody how old somebody is or who their classmates were.
Did they have a previous relationship from high school?
Is that how they know each other?
Just think intelligence that you can gather.
Dating profiles.
I haven't built this one out as much right now, but you need what's called a sock puppet.
to really research dating profiles and that means that I'm going to project myself onto the internet as somebody I'm not.
So as a private investigator, a woman might hire me to find out if her husband is hanging out on Tinder trying to have an inappropriate relationship.
So I might go and create a dating profile for a 30-year-old waitress Located one mile from his office and project that out there to see if he takes the bait.
And then I can send that intelligence off to the wife so she knows what he's really up to.
Or it could be used in court as a private investigator.
Voter research.
There's a lot of interesting records when you dig into voter research.
Again, it's just something that you can do.
Well, this program here is a very specialized program, not for your typical Windows platform, but it's a it goes into a specialized engine called a Linux type of research environment.
But what it does is it allows me to take a Gmail account and figure out.
What restaurants have they reviewed or what places have they reviewed?
Where have they been?
Who does the account really belong to?
How long has the account been established?
What comments have they made in different forums?
And it helps me create a profile and aggregate on something where I might just be given somebody's Gmail address who was harassing one of my clients.
So there's a tremendous amount of information.
And I should say this, just from an ethical perspective, I have a license.
That means the Texas Department of Public Safety has decided, checked my background and decided that I'm safe, that I'm a good guy.
There's a lot of stuff that happens out there.
For instance, just the other day, I saw that Antifa in Atlanta Went after an organization that they didn't like, and they started publishing on their Twitter feed these people's names and identities.
They basically was a sycam.
You know, sycam.
Here's who they are, here's where they live.
Totally unethical.
Totally unethical.
Even if they're crisis actors, you don't know what's happening inside that person's life that put them in that position.
If it's true that these are crisis actors, which I know it is, the question is, how are they motivated to do it?
Was it simply carrots or was it also sticks?
And, you know, that's why I'm always very careful about the research that I do, that I don't let it get out into the public unless I know what the results are going to be.
Of course, lots of my research ends up in court anyway, so that becomes public.
Reddit is just a community where there's a lot of very specialized intelligence.
So I do a lot of research on that particular community and I might want to know or try to find out who one of these community members are based on some things that they're saying.
So if you see some insider information that doesn't belong, for instance, when Epstein was suicided, There was a post that predated the suicide by about three and a half or four hours, basically saying he was going to be intercepted and extracted by a military unit.
Okay, well, where did that pop up?
Well, it popped up on Reddit.
It predated Epstein's supposed suicide by four hours.
Who did it?
Why did they do it?
How did they know?
Is it credible?
All questions that we'll ask and Jim, let me throw this back your direction.
You know, just because you could find a piece of information.
How do we know that we can trust it?
You know that that's the big qualifier in the game.
Yeah, sure, generally it's going to be how it coheres with everything else we know about the case and whether we have any good reason to question its authenticity.
Right?
Lots of times, I hear things that sound really good.
For instance, just today, I was researching an open source intelligence operation that puts them out there as media fact checkers, and I started taking a look at the contents of their stories, and I said, something isn't quite right.
This feels very one-sided on behalf of Ukraine.
There's disinformation on both sides.
Why aren't you dealing with that disinformation in a more balanced manner from this news source?
And so I went in and looked up and I ended up finding their, well, let's see.
I ended up finding their actual financial statement from 2020.
And there's the balance sheet.
And I realized who was paying the organization, and it was basically privy to a bunch of globalists.
Some very powerful billionaire oligarchs and their shell companies were funding this media research, open source intelligence organization to give it a... What they're trying to do is share what CNN... Respectability and credibility.
Yeah.
So when I, once I figured out where their money was coming from, it was pretty easy to figure out who was pulling the strings.
And I was pretty disappointed because I kind of had some respect for the organization prior to that, just because of the research that they were putting out in the open source realm.
But it turns out that they're basically a CIA front.
I'm not going to say which one it is, but you as a consumer of information out there, I'm just warning you, you need to be careful because you run into an organization and you don't know them.
And this is just like what happened to me with Pulse.
I would run into organizations that I didn't know because it was new research for me.
And I didn't know what I could trust.
So what I was trying to do was allow their groupthink and their media to begin to sort of sway me one way or another.
And it became very Difficult to figure out what was real.
And so at the end of the day, I had no choice but to complete my investigation on the earliest and most reliable evidence related to the event, come to my conclusion to where I was 100% sure I knew what happened at the Pulse nightclub, and then basically take the implications of that wherever it may go.
And that meant that I ended up having to throw Fox News and lots of conservative channels that I had trusted and relied upon.
I mean, these people had been talking in my ear for years.
As a matter of fact, I thought I was intelligent because I was listening to these people.
And it was a lie.
Intelligence would have been applying critical thinking and your own research to figure it out.
I was substituting information intake for critical thought.
Lazy, sloppy, might as well be sitting on the couch eating a bag of potato chips.
I mean it was just weak.
That's how I was.
Now I'm a lot more critical and these tools are the things that allow me to To find my own answers and collaborate and get information out to guys like you.
Some of the other tools, plagiarism checker, online optical character recognition.
For instance, let's say I see a photo.
I don't know where it originates.
I see some foreign writing in the background.
I don't recognize the image.
I might use an image tool To pull the text off that photo, maybe it's a protest in Siberia, and then I can cross-reference that with Google to find out what it says.
And maybe even use that image itself to figure out exactly where and when it was taken.
Brian, do you have the capacity to compare images then and determine whether they're copies or photoshopped?
Oh, absolutely.
Absolutely.
That's why I always take an image and go back.
I love it!
Well, I say absolutely.
But let me point this out.
There is a TikTok channel that specializes in creating deep fakes of Tom Cruise.
You cannot tell that that is not Tom Cruise.
You can inspect that visually all day, every day, and it looks like it's Tom Cruise.
So deep fakes are really going to be a tool of the deep state when, let's say, Putin goes nuclear and releases his archives of dirt on some of these people, and The media obviously will have the job of covering for it, so they're going to call it a deepfake.
Well, that's somebody doing something they shouldn't, and so therefore it's a deepfake.
You just have to be aware that the technology's gotten really good.
But when it comes to images, yes, the first thing I'll look at is hidden data, metadata that's behind the image, information about it.
I was looking at a police report the other day from the Orlando Pulse nightclub shooting, and I wanted to know if this was an original police report.
And so I pulled the metadata off that PDF, and I found that it originated on June 25th, just a few days after, in 2016, from this particular machine, Konica machine, and I tracked that Konica machine right to the police station.
It was real.
It was an authentic document.
Um, images the same way.
Now, if you see an image on social media, that metadata may or may not exist.
But what you should do is do a reverse image search.
Find the earliest and most reliable use of that image.
Download that in its highest resolution possible, and maybe you'll get an original that was posted perhaps to a blog that didn't strip the metadata out.
And that metadata will still exist.
You might be able to identify the actual phone, the actual device that was used to take it and the actual geo coordinates that that device recorded into that image.
So yeah, there and with these tools, it becomes really easy with a little bit of practice.
Now, I say this in general about the tools.
What you're looking at here are just tools.
If you want to be a good mechanic, you need to learn some things, not just have a bunch of tools.
And that's why open source intelligence, as we call it in the field, is more of a passion and an education than it is just a sideline.
We practice our craft so that we can get to the facts and get to the truth.
Otherwise, I wouldn't I wouldn't be very effective in court, would I, Jim?
Um, so some other things that I'm tremendously impressed with everything you're telling me.
This is phenomenal.
Right.
So let me just sort of, uh, these are frameworks that I might go to.
These are just public director record directories.
So I can figure out who works, where, who does what, what information's already out there.
If I were to use my image tools box here, you can see that I've got.
Places where I can find images, how to do advanced searches on Twitter or Facebook or Tumblr, how I can go and verify that it's a real image.
I can do some photo forensics on it.
Is it Photoshop or not?
Does something not fit?
Has this image been manipulated?
It's a huge part of false flags.
I saw, I saw all sorts of manipulated images in the media, and it was as easy as putting them into some of these photo forensics.
And these are open source tools.
You don't have to pay for these tools.
You just got to know how to use them.
And I would find, okay, so as a private investigator, I get asked to do romance scams.
Some guy will call me and say, I just lost $30,000 to this woman that I thought was real.
And I thought she was real because she sent me a photo of her passport.
Well, I run an image enhancement on the passport to discover that this part here with this writing has been erased and replaced with a different type of font or something different.
And I'm able to say, hey, this is a fake.
This image has been modified.
You're a victim of a romance scam.
Good luck getting your money back.
So there's photo forensics that can happen, all sorts of things that can happen.
And by the way, If you just rely on the tools, you'll fail.
You have to put critical thought into it.
One of the most... It's sloppy to just run a picture through a tool.
What is impressive to me is where somebody thinks like a detective.
Where was this cameraman standing when he snapped this photo?
What time of day was it?
What did the shadows look like?
What was the weather like?
What is this sign in the background?
Where is this gas station?
There's all sorts of things that can go into doing some image analysis that would help you get to the bottom.
So sex trafficking or Yes, the trafficking case.
So I would get a trafficking case and all we've got is an image to figure out where this little 15 year old girl is at.
She ran away from home.
She went to the bus shelter.
The image comes in to me or one of my teammates, and we've got to try to figure out from the contents of the image.
We've got to think like a detective and figure out exactly where was this photo taken and when.
And there are tools out there that allow me to figure out If there's a shadow, what time of day was it?
Excellent.
There's hosting and sharing tabs, places where you can find images.
Again, the EXIF is the information behind the image.
And just so you know, an image can contain a hidden document inside of it.
You can have a full PDF document or a Word document embedded inside of an image as sort of a way to covertly communicate.
And so you're going to want to take a close look at some of these things Now, facial recognition is the next tab.
And I'm going to tell you something.
This is, to me, one of the most exciting developments in the online investigation game.
And I think it's probably only a matter of time before the powers start getting rid of some of this.
So, I thought this person was a crisis actor.
I ran them through facial recognition, and I figured out that the name that they used on television is not their real name.
And then I cross referenced that.
I cross referenced that image.
With another system that's open source that basically told me how this is a 99% match or this is a 100% match.
This is the same person.
I could upload five images of the same person and it would tell me this is the right one and this is the wrong one.
So if you see somebody that you think is a crisis actor and you really want to know who they really are.
I'm not saying.
Release the information I'm saying you need to know for yourself.
Um, internet archives.
That was something that I had to go to.
Remember, Pulse Nightclub happened and I only got in front of my computer two days later.
So I had to go use old helicopter footage originating that morning from the scene.
And just so you know, on Orlando Pulse Nightclub, one of the things that had me really scratching my head was, why are there drug-sniffing dogs parked outside the hospital emergency room?
And why is the hospital emergency room taped off as part of the crime scene at 2.05 a.m., when Mateen supposedly started shooting around 2.05 a.m.?
How was that reporter on site that early?
How did he have the story so early?
What else came from some of those other sources?
What came from the police?
It was just like the Boston bombing.
They released information that said it was a drill.
You can find the same thing in other false flags.
And I use the internet archives to do that.
One of the things I caught personally using the Internet archives about the Pulse nightclub shooting is I caught the actors getting on the bus to leave after the shift was over.
From helicopter footage.
It's very nice.
Very nice.
These were allegedly these were victims of the bombing who are loading on a plane and doing it pretty well.
They're pretty good.
Who took their statements?
You know, come on.
These people supposedly survived a shooting of that magnitude.
And they're getting on the bus at nine in the morning like they're ending their shift.
I mean, it was.
It's pretty disturbing when I used the Internet time travel machine to go back and find that video footage from.
From from CNN, believe it or not, KG.
Geolocation research, that's one of the things that we have to do as private investigators, and that's basically figuring out the exact coordinates based on the content of an image.
This person was standing on the 42nd floor of this building in this city looking northeast when they snapped this photo.
And it was exactly this day because this building's construction advanced beyond that the next day.
So there's lots that can be done with geolocation research and I'll tell you what really cracked the pulse for me Was finding the staging area where all the actors and the police staged the event.
And in Las Vegas, one of the things that really cracked it for me was finding the Tommy mannequin doll in a wheelbarrow.
at a gas station, getting CPR without legs.
It was one of those mannequins, literally in a wheelbarrow, far away from the Las Vegas scene on video, getting CPR.
And it was, you know, one of those mannequin things.
It was terrible.
You can find these flaws.
Obviously, the media just wants to use the groupthink and the psychology to overrule your ability to think and get you to fall back into line.
But You have to do your own research if you want to be convinced.
Document searches or finding advanced documents.
For instance, I found this non-profit's financial report to figure out who was paying them.
That was part of some of those tools.
Scholarly article research.
What paper did Jim really write and did he plagiarize that article?
Because I can take the information in it and cross-reference it with plagiarism engines and try to determine If you plagiarized your stuff, so be careful!
Because us internet researchers can be pretty good at what we do.
And one of the most embarrassing things that can happen to a person in this world is getting caught in a blatant, ugly lie.
Online marketplaces.
One time I had a case where a woman was claimed to be raped by a baseball star, a Major League Baseball star.
It was she didn't report the rape until much, much later, and so there was a lot of question as to whether or not it even happened, or it was consensual.
I was able to find her Amazon purchases under her username, and I was able to find that she had bought a surviving rape book five days after the supposed rape took place, and that Was helpful for the lawyers to validate that something like that actually happened.
Meaning she was trying to figure out how to present herself as though she had survived a rape when she, in fact, had not been raped.
No, no, I believe she had actually been raped and it was just a question of.
What I think that she had actually been raped and she bought the book.
Because she was literally dealing with the guilt and Concern about what had happened to her and she didn't know how to keep on living and moving forward.
I get it.
Opposing counsel could cross examine and bring this up to the jury.
I've got no problem with that.
My job is to put my findings out there.
Genealogy research obviously can be very, very important in this field, figuring out what family somebody comes from.
You know, are they a part of some cabal?
Or some family, maybe the Rothschilds or somebody else who is Justin Trudeau, who's his father, things like that.
Internet researchers can do.
We can look into old Google groups.
One time I was researching a guy for a client and she wanted to know if he was going to be a good guy or not.
And I found some old posts that he had made in old fraternity brother forums about his fantasies related to some very unsavory sexual practices, we'll say.
And I was able to show them to her and I said, well, you know, if he's changed, he's changed.
But this is what he used to be.
Identifying bots.
OK, so let's say you're looking at a Facebook post and You see a bunch of comments that are going against something you believe and you're like, hey, wait a second.
Who are all these people that are thinking differently than me?
Well, you might want to cross-reference some of those accounts to find out if they're indeed computers that are pushing propaganda and getting you to see The group think and accept the media.
So that's what this is for.
Nonprofit research.
Yeah, I want to know who funds this nonprofit because I'm seeing some things that are coming out of it that doesn't make sense.
Corporate research, obviously, is something to figure out.
Follow the money is a huge part of corporate research.
It looks like this one here needs to be Crawford.
This is facial recognition again.
But here's a here's a face comparison tool.
And yes, I'm a member, so I can't upload them.
Rental vehicle records, you know, did this person land in this city at this time?
Maybe I can call them up and get a copy of the receipt for tax purposes.
Now I know that you rented a Hertz car this particular day at this particular time.
Metadata aggregators are not very useful.
Bank account location, so if I received a check, Where is that bank actually at?
If my client was a victim of a romance scam and the check was cashed, where's the routing number for where the money went?
Insurance policy locators.
Jane is dead.
We don't know if she had insurance.
Let's see if we can find it.
Or there's been an auto accident and the person left the scene.
Let me go check Other insurance places that where they might have used their insurance.
Let me see if I can find that they actually had research insurance.
I mentioned the deep fakes earlier.
Let me just show you this real fast, because I think it'll blow your clients or our communities mind.
These are deep fakes.
I'd say that, yeah, I'd say that one is not Tom Cruise.
But the next one looked like it was Tom Cruise.
It's deep.
Yeah.
I mean, the technology is amazing.
That looks a lot more like him right there.
But is it the same one?
Well, no, it's the same channel on TikTok.
I was just showing you what a deepfake looks like.
It's so hard.
It's so hard, and don't put it beyond these people in the government to do it.
Of course.
Let's see, unclaimed property, that's a different area.
Newspaper research, that's important.
Scam research, yeah, we do that.
There are communities that post that so-and-so is a police informant to sort of shield the bad guys.
Um, sometimes I get a photo from a surveillance video and it might have a tattoo that I could recognize.
So I might do some gang research to figure out what tattoo that belongs to.
Um, real forensics, something I usually outsource because I'm just don't have the physical anthropology background to be able to really understand that.
So I look for the labs, where are the directors?
Where are the professionals?
How do they know the way around?
Campaign contributions.
Yeah, I research that all the time.
If I see an ad on Facebook, I might want to know who took out that ad, where the money came from.
Political advertising.
I mean, there's a lot of research that can be done in that area.
And let's see, let me move this over here a little bit.
Phone number research.
There's a lot more you can do to break out a phone number than just Google it.
I mean, As you can see, there's all sorts of ways to figure out who's had what to say about what phone number.
Email tools.
There's a lot that can be done with email and emails include sensitive information in what's called a header, which might include your geographic location when you sent the email.
Or let's say I'm trying to trap a bad guy who's running from the police or running from his bail bond agent.
I might send him an email that has a tracker in it.
So that I can figure out exactly where he's at.
And if he opens that email, it's going to immediately notify me that of his location, especially if he clicks on it with a phone where the geolocation is authorized.
A lot that can be done with IP addresses.
This is usually more of your, uh, more of your, uh, computer crime, but there's a lot that can be done to find out what network Some message might have originated from.
Obviously there's website research and the dark web is not something we're going to get into today, but I can tell you that Google is to me like Lake Michigan.
And the dark deep dark web is more like the ocean.
I mean, that's how big it is and.
There are things if you choose to go down that pathway, you're going to need to be prepared for.
Because I did some research related to Pizzagate on the deep dark web when I first came across the conspiracy theory, and I wish I'd have just gone to bed.
Some of the things you see are... You'll never be able to remove the images from your mind.
They're so horrific.
So horrific.
Right, yeah.
We used to have a website called LiveLeak, and they supposedly posted all sorts of too graphic for Google.
This is much, much worse.
Cryptocurrency research, I don't do a lot of that.
Breach info, yeah.
Let's say I want to find out And this would be an unethical thing, obviously, but I might cross-reference an email address with a breach directory to find out that indeed they were part of the Sony hack and their password has been compromised.
And, you know, maybe I want to go to the dark web and spend one thirty thousandth of a Bitcoin to buy that database.
And maybe that database includes your current password.
It's out there.
The reason that I research escorts and prostitution as part of it is just because of the human trafficking and the phone numbers.
I get lots of women clients who are concerned that their husband is doing something he shouldn't.
So I'll often research the phone numbers across these different sites and find out.
What's there?
Wedding registry and stolen goods.
That's a whole different ball of wax.
And so, from an open source intelligence perspective, that's sort of the big picture as to what we can accomplish.
Now, another day, another time, we could talk about how to get information from government agencies.
Death records, military verifications.
We can find out information about a particular cop or what happened in this particular filing.
Or maybe I need to find an inmate or look up somebody's license to find out if they are exactly who they say they are.
Say, for instance, I was at Sandy Hook and I listened to that medical examiner.
Yeah, I might want to cross reference to find out if he's licensed because that was the dumbest Scenario I'd ever seen.
Wayne, Wayne Carver, M.D.
Right.
Right.
I mean, they were shot with a bullet.
I mean, come on.
Ridiculous.
So that's government.
There's obviously a bunch of stuff that's sort of specific to private investigators.
And I'm not going to go into that here today.
And then there's a bunch of tools like I might not want somebody breaking into my computer.
So I might want to know how these tools work.
And then what I'm trying to do here is just create a new platform.
And I just started working on this like literally today.
And as you can see, I have your four part series, which I have listened to all four parts.
You mean with Catherine Horton?
Yeah, yeah, I was very impressed.
I mean, I'm very impressed.
I wish I could get more series from you on critical thought.
I'd like to see some of your old actual course content.
Logic's a red herring.
Brian, I'm planning to create a new online course on critical thinking and conspiracy theories that'll run 15 weeks, so I'm into that.
Yeah, Catherine's wonderful.
I thought she added so much.
So there, yeah, that's a four part series.
I've got another earlier version of just two parts, but I don't have the benefit of Catherine being there with me.
So I thought she had it a lot.
Yeah, no, she was, she was very, very impressive.
I really liked it.
Um, had a hard time with the IM plants.
How did they get there?
But you know, that's tough for a different day, but listen, all I'm here to do today is introduce myself to the audience and Jim's audience.
Kind of show you the big picture of what open source intelligence is and the types of things that you can do if you've got access to the tools and a modicum of information and knowledge, and try to be a home detective.
Right.
It must have taken quite a while to put together all these different programs.
I mean, each one of these categories represents a software program, and you've got a whole host of them.
A couple hundred, I would estimate.
Yeah, this is just the stuff that I've stripped out.
But again, all this program is that you're seeing are bookmarks.
So in the 10 years I've been a private investigator sitting in front of my computer, I have learned tips and tricks, and I've listened to this, and I've seen that, and I bookmarked this stuff.
And so all I did was organize my bookmarks in these little boxes, and We may have figured out a way to take this sort of public and let your listeners have a piece of my bookmark list.
Brian, I think this is just sensational.
I'm in awe.
I want to learn so much more, but I'm just thrilled, ecstatic really, to have this introduction and overview.
It's sensational, really wonderful development of how to use the internet for research purposes, digging beneath the surface to find out what really happened.
I love it.
Well, once you get a few tutorials under your belt and run some actual tests, you know, let me assign you a photo and I want you to come back in 10 minutes and tell me where the photo was at.
Once you start to do that stuff, you get a real good feel for it.
But in the meantime, an ordinary person sitting in front of their computer reading an article who maybe was just introduced to the idea that a false flag even exists.
And they think of themselves maybe as a good researcher.
You know, you could use a tool set like this to figure out for yourself.
Again, I wouldn't have completed the cognitive dissonance loop had I not researched it myself.
It's too easy to plug in somebody else's opinion and replace your own with somebody else's with the media the way it is.
All the social media and all the blogs and all the tools.
But if you really want to break through Mentally, the years of programming, you have to know for yourself exactly what happened.
And there's no substitute for doing your own research.
Because you don't know who to trust.
Who sold out?
And who sold out yesterday?
And who sold out a month ago?
And that's the problem with conspiracies.
The next thing you know, you look like Charlie from It's Always Sunny in Philadelphia.
Putting pins on the wall and articles all over the place and talking about the CIA and ghosts, you know, it's it's it can get it can get pretty mesmerizing.
But once you have a feel for how to do your own research, you can you can sort of get through it and have a reasonable cognitive solution in your own mind.
And once you know, then it's just a matter of how far will you go to help with the truth or community to expose it?
Well, I think this is all sensational.
Brian, I can't thank you enough for this introduction and overview.
How would one gain access to these tools now?
I mean, this is something not at the tip of one's computer keys, or not?
Tune in next week to find out.
Okay.
Just put it like that.
I'm looking forward to it.
Brian is absolutely sensational.
This is Jim Fetzer, your host on The Real Deal with a special report and interview with Brian Davidson, a PI located in Texas, as I understand it, who's doing brilliant work and using the internet as a research tool.
We're going to have a whole series of interviews with Brian.
This is the very first.
I can't thank him enough, and you, for joining us today.
Thanks.
Export Selection