Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is the outcome will be information containing or connected to

With a combination of entities, for example,, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

Al Qaeda moves towards Rwanda

In recent weeks, more than 1500 fighters joined the affiliates that target Rwanda, bringing the total to an estimated 2500 soldiers for Phase I of the GSI doctrine; establishing fear and presence by random killings

Read more



Each wave of both pandemics, as well as a financial crisis, is more destructive. Social distancing and lockdown measures effectively halted production and services; counter pandemic measures merge with the results of the financial crash. The financial impact is life-changing, economically devastation, and creating mass dependency on the state.
Extremist organizations expect government continuity to crumble and stage coup D'états when government services in economically weak areas cease to exist.

Read more

Al Qaeda Bought and Tested American Jet Airplanes - 2018 - Update December 20 2019

In March 2018 financiers of arms for Al Qaeda affiliates, acquired an American made jet airplane. To enable this transaction they used an american company owned by an unsuspected (unwary?) person with dual citizenship. UPDATE on May 19, the aircraft leaves American airspace and entered European airspace UPDATE on May 20, the aircraft leaves European airspace and entered African airspace - UPDATE on December 19, 2019 the aircraft left African airspace and entered European airspace Landing in France and The Netherlands on December 20

Read more

External financing of terrorism, available intelligence and investigations of the remittance sector, a charity organization and a salafist mosque - Case study

I.        External Financing of Harakaat al-Shabaab al-Mujaahidiin - AL-SHABAAB - Charity organization and a Salafist mosque

A.       AL-FOURQAAN mosque and foundation in The Netherlands.

II.       External Financing of Harakaat al-Shabaab al-Mujaahidiin AL-SHABAAB - Money Transfer Business

B.       RAYAN CARGO BV, TAAJ in The Netherlands and the United Kingdom.

Read more

Alert! - Al Qaeda is widening its existing scope of attacks into the tropics

Recently intercepted communications indicate that Al Qaeda (affiliates and offshoots) is widening its existing (long term) scope of attacks into the tropics

Read more

Iran Sanctions Boost Fraud & Scams Hide Violation of Sanctions

Business scan survey's uncovered state sponsored Iranian business networks where fraud shifted from a criminal inspired activity into an ideology driven (terror) funding mechanism, benefiting the the Iranian Revolutionary Guard Corps. Iranian sales companies turned out to be specialized in Advance Fee Fraud “non-delivery scams” and the trading/holding companies in Dubai were nothing less than investment fraud benefiting the IRGC.

Read more

African Banks On Al Qaeda Radar

Investigations uncovered that for at least two years, passwords, logins to remote control and personal accounts of high ranking bank staff are being exploited, seeking patiently for confidential banking communications and access, in order to destroy the capabilities and credibility of the institutions with the public as well as shareholders.

Read more

al Qaeda fighters from Iran, in the West

Monitoring the communications and travel patterns revealed the existence of small groups of Iranian fighters in the West, possible an imminent threat.

Read more

2017 Global Islamic Terrorism Surge

The radical change of U.S. foreign policy, to ‘eradicate’ ‘radical Islamic terrorism’ ‘from the face of the Earth’ by aggressively moving on the global jihadi conspiracy, persuades extremists to attack and widen their scope.

Read more

Microwaves From The Sky​ - #Iran #IranRegimeChange #missiles

No allies left - Squeezed by sanctions - Wait for uprisings to devour and divide Iran - Terrorism proxies - Decades of diplomacy that left ample time for Iran to prepare for an attack with "Microwaves From The Sky" at "The West" - No choice left ... attack - Iran Threat Scenarios

Read more