Wanted List Screening: FBI, Interpol & Europol avatar

Wanted List Screening: FBI, Interpol & Europol

Pricing

Pay per event

Go to Apify Store
Wanted List Screening: FBI, Interpol & Europol

Wanted List Screening: FBI, Interpol & Europol

Criminal wanted-list screening: FBI (all categories), Interpol Red Notices, Europol. Bulk ingest, fuzzy name-match with score, or new-listings diff. Active/captured status, reward amounts, charges, physical descriptions, photo URLs. For KYC, investigations, OSINT, journalism, bounty hunting.

Pricing

Pay per event

Rating

0.0

(0)

Developer

BowTiedRaccoon

BowTiedRaccoon

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

2 days ago

Last modified

Categories

Share

Screen individuals against public criminal wanted lists from three major law-enforcement agencies — FBI, Interpol, and Europol — in a single run. Designed for KYC workflows, compliance screening, OSINT investigations, and journalism.

What it does

The actor pulls public wanted-notice data from:

  • Interpol — Red Notices via the public REST API (ws-public.interpol.int)
  • Europol — EU Most Wanted listings via eumostwanted.eu
  • FBI — Most Wanted, Cyber, Counterterrorism, and other categories via fbi.gov/wanted/api/

It operates in three modes:

ModeDescription
ingest_listsBulk-load all active notices from the selected agencies into the dataset
screen_queriesFuzzy name-match a list of names against all notices; returns hits with match scores
new_listings_diffCompare the current notice set against the previous run's snapshot; output only newly published entries

Output fields

Each record includes:

FieldDescription
notice_idCanonical cross-agency ID (agency:source_id)
source_agencyfbi, interpol, or europol
source_notice_idAgency-native notice ID
source_urlDirect URL to the notice on the source site
notice_typeNotice type: most_wanted, red, cyber, counterterrorism, etc.
primary_nameFull name of the wanted individual
alias_namesKnown aliases (pipe-separated)
date_of_birthDate of birth (YYYY-MM-DD where available)
nationalitiesNationalities (pipe-separated ISO codes or country names)
photographsPhoto URLs (pipe-separated)
chargesCriminal charges (pipe-separated)
case_summaryBrief description of the case
reward_amount_usdReward offered in USD (numeric)
last_known_locationLast known location or jurisdiction
statusactive, captured, deceased, located, or removed
publication_dateDate the notice was first published
query_termQuery used (screen_queries mode only)
match_scoreFuzzy match score 0-100 (screen_queries mode only)
match_reasonHuman-readable match explanation (screen_queries mode only)

See the full dataset schema for all 35 fields.

Input

{
"mode": "ingest_lists",
"agencies": ["interpol", "europol", "fbi"],
"noticeTypes": ["red", "most_wanted"],
"maxItems": 100,
"includeRemoved": false,
"sp_intended_usage": "KYC compliance screening",
"sp_improvement_suggestions": "none"
}

Key parameters

ParameterTypeDefaultDescription
modestringingest_listsOperating mode (see table above)
agenciesarrayallAgencies to include: fbi, interpol, europol
noticeTypesarrayallNotice types to filter (e.g. red, most_wanted, cyber)
maxItemsinteger10Maximum records to return. 0 = no limit
includeRemovedbooleanfalseInclude captured or removed entries
minRewardUsdinteger0Filter to listings with reward >= this amount
queriesarrayNames to fuzzy-match (screen_queries mode only)
minMatchScoreinteger75Minimum fuzzy match score 0-100 (screen_queries mode only)

Use cases

  • KYC / AML screening — check customer names against international wanted lists before onboarding
  • Compliance monitoring — run new_listings_diff on a schedule to detect newly posted notices
  • OSINT investigations — bulk-load public wanted data for research, linking, and analysis
  • Journalism — pull structured data for story research without manual browsing
  • Bounty tracking — filter by minRewardUsd to surface high-value notices

Notes

  • FBI data is fetched via Playwright with residential proxy to bypass Cloudflare protection on fbi.gov.
  • Interpol uses the public REST API with browser-like headers; residential proxy is used in cloud runs.
  • Europol scrapes structured HTML from the EU Most Wanted site.
  • All three sources serve publicly available, government-published data. No authentication or API key is required.
  • Array values (aliases, nationalities, photographs, charges) are stored as pipe-separated strings.