Reality is the working paradox that defies control
Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links
People, Groups of people (social networks)
Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.
A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is firstname.lastname@example.org the outcome will be information containing or connected to email@example.com
With a combination of entities, for example firstname.lastname@example.org, XYZ company, London, Cairo, Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.
For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).
Recently intercepted communications indicate that Al Qaeda (affiliates and offshoots) is widening its existing (long term) scope of attacks into the tropicsRead more
Business scan survey's uncovered state sponsored Iranian business networks where fraud shifted from a criminal inspired activity into an ideology driven (terror) funding mechanism, benefiting the the Iranian Revolutionary Guard Corps. Iranian sales companies turned out to be specialized in Advance Fee Fraud “non-delivery scams” and the trading/holding companies in Dubai were nothing less than investment fraud benefiting the IRGC.Read more
Investigations uncovered that for at least two years, passwords, logins to remote control and personal accounts of high ranking bank staff are being exploited, seeking patiently for confidential banking communications and access, in order to destroy the capabilities and credibility of the institutions with the public as well as shareholders.Read more
Monitoring the communications and travel patterns revealed the existence of small groups of Iranian fighters in the West, possible an imminent threat.Read more
The radical change of U.S. foreign policy, to ‘eradicate’ ‘radical Islamic terrorism’ ‘from the face of the Earth’ by aggressively moving on the global jihadi conspiracy, persuades extremists to attack and widen their scope.Read more
No allies left - Squeezed by sanctions - Wait for uprisings to devour and divide Iran - Terrorism proxies - Decades of diplomacy that left ample time for Iran to prepare for an attack with "Microwaves From The Sky" at "The West" - No choice left ... attack - Iran Threat ScenariosRead more
International transport hubs provide a perfect matrix to synchronize and fuse criminal inspired activity with ideology driven terror mechanisms.Read more
A growing number of individuals brought to our attention that they do not own companies, while documents obtained from the massive data leak from Panamanian law firm, Mossack Fonseca, allegedly show, they incorporated a company in known tax-havens e.g. the British Virgin Islands, Seychelles etc.. Even though they never visited any of the (representative) offices of Mossack Fonseca, nor did they authorize third parties to represent them.Read more
Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat - hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"Read more
Impersonating authorized bank officers of treasury departments, to send payment orders to (National Reserve) correspondent banks, is a specialist wire fraud problemRead more
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.