PLEASE NOTE: This guest has asked to have any instances of his voice or face removed from the Internet. Show notes are here and can stay but for now we have removed the content based on his wishes.  Thank you for understanding.****

Information is the life blood of the social engineer.  Knowing how to obtain, locate, catalog and use all the info and their resources can be a daunting job.  Our guest this month, Michael Bazzell, has made a career out of it. July 14, 2014


Ep. 059 – Legal Stalking and Other Scary Tales from Michael Bazzell July 14, 2014


I promised a link to the REDDIT IAMA we did, here it is.

If you want to see something really unique – check out our buddies at Exploitable Labs


View on iTunes

Get Involved

Got a great idea for an upcoming podcast? Send us a quick message on the contact form!

Enjoy the Outtro Music? Thanks to Clutch for allowing us to use Emily Dickinson as our new SEPodcast Theme Music

And check out a schedule for all our training at Social-Engineer, LLC.

Check out the Innocent Lives Foundation to help unmask online child predators.

Show Notes

Ep. 092

Michael Bazzell has been a full time law enforcement officer for over 15 years. He is currently assigned to the FBI’s Cyber Crimes Task Force where he focuses on open source intelligence (OSINT) collection and analysis. He has trained thousands of individuals employed by state and federal agencies, as well as the private sector, in the use of his investigative techniques. He has also taught several college courses including Ethical Hacking, Computer Forensics, and Computer Crime Investigation. For over a decade, he has been an active member of the elite Technical Operations Group of the Major Case Squad of Greater St. Louis, and served five years as the Director of the Metro-East Regional Computer Crime Enforcement Group. As an active member of these organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions.

  • We discuss his book, Open Source Intelligence Techniques, as well as particular topics involving:
  • Disappearing from the Internet
  • Cool Stories on how he used OSI to get into hotel rooms
  • How did he use OSI to get on this podcast?
  • All this and much more!


Find out more at his website