OSINT in Action: The Case of Abdelnour Djabri and a Global Manhunt

Table of Contents

Abstract

The ability to track and profile international fugitives has become more efficient and precise with the use of Open-Source Intelligence (OSINT). This blog post explores the case of Abdelnour Djabri, a fugitive wanted by both the Polish police and Interpol for the murder of an older woman in Starogard Gdański, Poland. Utilizing the advanced capabilities of the IRBIS OSINT Center, investigators constructed a comprehensive profile in under 40 minutes. This process highlights how cutting-edge OSINT tools streamline suspect identification, uncover digital footprints, and provide actionable insights for law enforcement.


Introduction

When news broke about the gruesome murder of an older woman in Starogard Gdański, Poland, authorities acted quickly to identify the prime suspect: Abdelnour Djabri. As he fled the country, unconfirmed reports suggested he might have returned to Algeria, his home country, further complicating the case. To apprehend him, both the Polish police and Interpol issued a red notice, marking Djabri as a high-priority international fugitive.

But how do you locate someone who might have already crossed borders and erased their tracks? The answer lies in OSINT. By employing the IRBIS OSINT Center, investigators pieced together Djabri’s digital footprint, identified key connections, and created a detailed suspect profile within minutes. This blog delves into the profiling process, shedding light on how modern tools help law enforcement tackle complex cases.


The OSINT Profiling Process

Step 1: Starting with the Basics – Name and Photo Upload

The journey began with Djabri’s name and photo uploaded into the IRBIS OSINT Center, a state-of-the-art platform for data analysis and intelligence gathering.

  • Key Findings:
    • The system identified 19 potential profiles across Facebook, Instagram, and X (formerly Twitter).
    • Using facial recognition technology, 24 exact matches were retrieved from online sources.

At this stage, the OSINT tool filtered through massive amounts of data to zero in on profiles most likely connected to Djabri.


Step 2: Validating Social Media Profiles

With the initial matches identified, the system’s facial recognition module narrowed down the list to verified profiles.

  • Key Findings:
    • Two Facebook accounts were confirmed as belonging to Djabri:
      • Abdelnour Djabri (Facebook ID: 100024261639010)
      • Abdanour Djabri

These profiles were added to the suspect’s digital file for further analysis.


Step 3: Deep Web Searches Uncover Metadata

The confirmed social media accounts were analyzed further using the Deep Web Search module to uncover hidden data.

  • Key Findings:
    • A Qatar-based phone number (+97430809367) was linked to one of the Facebook profiles.
    • Metadata revealed the following details:
      • Name: Abdelnour Djabri
      • Gender: Male
      • Location: Qatar

This discovery expanded the investigation beyond social media, connecting Djabri to another location of interest.


Step 4: Real-Time Lookup and Alias Discovery

The phone number was a goldmine for additional clues. By performing a real-time lookup, investigators uncovered more about Djabri’s network.

  • Key Findings:
    • Names and aliases tied to the phone number included:
      • Ahmed Maher (CallApp)
      • Abdelnour Sabagh (Pipl Possible)
      • Ahmed Epoxy (GetContact)

These aliases opened new pathways for further searches and enhanced the suspect profile.


Step 5: Mapping Connections with Link Analysis

The IRBIS OSINT Center then created a link analysis map to visualize Djabri’s network and connections.

  • Key Findings:
    • A network of family members, associates, and travel companions emerged.
    • Key locations tied to his movements included Algeria, Libya, and Germany.

Step 6: AI-Driven Behavioral Profiling

Finally, the collected data was analyzed through an AI-powered module to understand Djabri’s behavioral patterns.

  • Key Findings:
    • Interests and professional ties to the construction and epoxy industries.
    • Patterns suggesting a tendency to evade authorities and maintain anonymity.
    • Connections in:
      • Oran, Algeria
      • Misurata, Libya
      • Hamburg, Germany

Findings at a Glance

The OSINT investigation provided these key insights:

  1. Verified Social Media Profiles: Six accounts were identified, with two confirmed as Djabri’s.
  2. Phone Metadata: A Qatar-based phone number linked to multiple aliases.
  3. Travel History: Locations tied to Algeria, Libya, France, and Germany.
  4. Behavioral Insights: Tendencies to evade authorities and hide in professional networks.
  5. Connections: Family members and associates mapped in a link analysis.

Total Time: The complete process, from initial input to the final report, took just 40 minutes.


Why OSINT Tools Are Game-Changing in Law Enforcement

This case illustrates the immense value of OSINT platforms like the IRBIS OSINT Center:

  • Speed and Precision: What would traditionally take weeks was completed in less than an hour.
  • Global Reach: Essential for cross-border crime investigations.
  • Comprehensive Analysis: Merges public records, social media data, and metadata for a 360-degree profile.
  • Ethical Compliance: Operates within the boundaries of privacy laws and legal systems.
  • Public Safety Impact: Helps law enforcement act swiftly to protect communities.

Conclusion

The profiling of Abdelnour Djabri using OSINT demonstrates the power of modern technology in criminal investigations. From uncovering aliases and travel patterns to visualizing social connections, OSINT tools have redefined the speed and scope of law enforcement efforts.

In an age where criminals operate across borders, tools like the IRBIS OSINT Center are critical for staying one step ahead. For investigators, it’s not just about catching a fugitive—it’s about ensuring justice and preserving public trust in the justice system.

More Articles

Finding the right solution

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Skip to content