Shamsud-Din Jabbar: OSINT Profiling and Uncovering Hidden Threads of the New Orleans Terror Attack

Table of Contents

Introduction

Open-Source Intelligence (OSINT) has revolutionized modern investigations by transforming public data into actionable intelligence. This article delves into how OSINT profiling was used to investigate Shamsud-Din Jabbar, the suspect behind the tragic New Orleans terror attack, and illustrates each step of the process with real-world insights.


Step 1: Establishing the Case Framework

Every successful investigation begins with structure. Investigators initiated their process by creating a centralized case file named “New Orleans” in the IRBIS OSINT profiler. This file served as the foundation for organizing data about Jabbar, potential accomplices, and related activities.

Example:
By centralizing the case information, investigators could easily cross-reference data and maintain a collaborative approach. This framework enabled them to integrate real-time updates as the investigation unfolded.

Key Takeaway: A well-organized framework is crucial for connecting disparate pieces of intelligence.


Step 2: Initial Profile Creation

The next step involved gathering foundational data on Jabbar, including his name, aliases, photos, and background information. This information was retrieved from public databases, social media, and news reports.

Example:

  • Aliases Identified: Shamsud-Din Jabbar, Shamsud Jabbar, Jabbar Shamsuddin.
  • Employment History: IT Team Chief in the U.S. Army Reserve.
  • Education: University of Houston and Georgia State University.

High-quality photos were run through facial recognition software, while public records provided insights into Jabbar’s military and professional background.

Key Takeaway: Even basic details like names and aliases can open doors to a wealth of information.


Step 3: Exploring the Digital Footprint

OSINT tools scanned Jabbar’s online activity, including his social media presence and owned domains. These tools identified patterns in behavior and interests that became vital for understanding his motivations.

Example:

  • Social Media Analysis:
    • Twitter handle: @shamjabbar.
    • Followers: Accounts with a history of sharing extremist content.
  • Domains Registered:
    • hxxp://shamsud-dinjabbar[.]com.
    • hxxp://houstontxpropertymanagement[.]com.

Investigators noted Jabbar’s involvement in cryptocurrency advocacy, particularly promoting Siacoin and DeepOnion.

Key Takeaway: Online footprints often reveal hidden connections and interests.


Step 4: Network and Link Analysis

Using tools like Maltego, investigators mapped out Jabbar’s network, identifying relationships and potential collaborators.

Example:
Link analysis revealed that Jabbar frequently interacted with individuals promoting conspiracy theories and extremist ideologies. These connections became focal points for follow-up investigations.

Key Takeaway: Mapping relationships provides critical insights into the subject’s influence and associations.


Step 5: Behavioral and Psychological Insights

AI-powered tools analyzed Jabbar’s online content to profile his personality, motivations, and potential vulnerabilities.

Example:
Jabbar’s social media posts showed a dual focus on technology and humanitarian activism. His advocacy for prison reform and empathy for the Rohingya refugee crisis indicated a complex, emotionally driven personality.

Key Takeaway: Behavioral analysis can uncover motivations and vulnerabilities that may not be immediately visible.


Step 6: Metadata and Deep Web Analysis

Metadata from Jabbar’s communications and archived web content provided deeper insights into his behavior and movements.

Example:
Investigators discovered metadata indicating frequent visits to forums associated with radical ideologies. His encrypted communication methods suggested a high level of operational security awareness.

Key Takeaway: Metadata can reveal patterns that enhance the understanding of a subject’s activities.


Step 7: Synthesizing Data into Actionable Intelligence

Finally, investigators pieced together the various elements of Jabbar’s profile to form a comprehensive narrative. This holistic view allowed law enforcement to identify accomplices and uncover financial transactions linked to extremist activities.

Example:
Cross-referencing Jabbar’s financial records with his social media activity exposed funding channels potentially used for radical activities.

Key Takeaway: Synthesizing data from multiple sources is essential for uncovering hidden networks and motivations.


Conclusions and Predictions

Conclusions:

  • Shamsud-Din Jabbar was a complex individual with dual interests in technological advancement and societal activism.

  • His engagement with cryptocurrency and extremist networks suggests a potential for using technology for illicit purposes.

  • Behavioral analysis indicates a susceptibility to emotional triggers, possibly exploited for recruitment into radical ideologies.

Predictions:

  1. Emerging Threats: Extremist networks are increasingly using cryptocurrency for funding, requiring enhanced monitoring.

  2. Behavioral Patterns: Advocacy for societal issues may continue to be a recruitment tool for radicalization.

  3. Future Investigations: Accomplices identified through link analysis need closer scrutiny to prevent further incidents.


Structured Report on Data Collected

1. Personal Information:

  • Name: Shamsud-Din Jabbar.

  • Aliases: Shamsud Jabbar, Jabbar Shamsuddin, etc.

  • Emails: [email protected], [email protected].

  • Phone Number: +1 (281) 254-6611.

  • Known Address: 7907 Meandering Oak Ln, Cypress, TX.

2. Digital Footprint:

  • Twitter Profile: @shamjabbar, 12 followers.

  • Owned Domains:

    • hxxp://shamsud-dinjabbar[.]com.

    • hxxp://houstontxpropertymanagement[.]com.

3. Network Analysis:

  • Connections:

    • 5 flagged accounts promoting extremist ideologies.

    • 3 potential accomplices identified.

4. Behavioral Insights:

  • Interests: Cryptocurrency, societal activism.

  • Risks: Emotional vulnerability to charged topics, potential use of persuasive skills for propaganda.

5. Metadata Findings:

  • Travel Patterns: Links to radicalization hotspots.

  • Communication Methods: Encrypted channels detected.

Lessons Learned

The OSINT profiling process offers valuable lessons for investigators:

  1. Start Small: Even basic details, like a phone number or email, can open the door to extensive insights.
  2. Embrace Technology: Tools like IRBIS and Maltego simplify complex analyses and enable visual storytelling.
  3. Think Holistically: Understanding the subject’s motivations and relationships requires integrating data from diverse sources.
  4. Prioritize Ethical Use: OSINT relies on publicly available information, ensuring investigations adhere to legal and ethical standards.

More Articles

Finding the right solution

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Skip to content