Untangling the Razzlekahn Conspiracy: An OSINT Perspective.

Jeffrey Mader
2 min readFeb 25, 2022
www.facebook.com/razzlekhanrap/

Six years ago, 200,000 Bitcoin were stolen from the Bintfinex exchange. the coins remained largely untouched until 2017 when some of the coins started to be transferred.

Fast forward to February 2022, Heather Morgan an Ilya “Dutch” Lichtenstein were arrested for conspiracy to launder the stolen Bitcoin now valued at nearly $4.5 billion. If you’ve followed the case at all you’ve seen the wild antics of Morgan and her alter ego “Razzlekahn”. Razzlekahn is an internet rapper whose music, I hope, is a form of performance art.

But these antics are just the tip of the iceberg. Please join me as I review this case from two distinct angles: First, I’ll use some basic tools, websites, and techniques to explore the bitcoin ledger and follow the transactions that led the Fed’s right to Dutch and Razzle’s New York apartment. As a crypto-noob myself, this will be a laymen investigation and done at a level appropriate for even the most novice of crypto investigators.

Second, I’ll start with the court documents and use standard OSINT techniques to try to connect the couple to Bitfinex theft. This case study will be very cross disciplinary allowing us to see how critical pivoting off of information is. I’ll dig into their prolific social media presence, and look at their friend network. I’ll then pull the threads on email addresses, IP addresses, web addresses and corporate shell companies. I’ll even Identify the Indian company referred to in the Fed’s documents. At each step, I’ll discuss the tools and techniques used and how I’m connecting and verifying the information I’ve identified.

Check out the introduction video below, and the head over to Razzlekahn Part 1: Establishing Some Background.

--

--

Jeffrey Mader

Penrose Institute | Veteran | Entrepreneur | Academic | OSINT & Privacy Professional