Ultrascan Humint

Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example johnsmith@hotmail.com, XYZ company, London, Cairo,  Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.

For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).

Level three, four and five include Humint and are focussed on the desired results

Spying is Lying and for the Wrong Reasons Dying - The NGO Kill List - Case: terror reaches Côte d’Ivoire - Grand Bassam

Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat - hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"

Read more

Bank to Bank Treasury ID Theft

Impersonating authorized bank officers of treasury departments, to send payment orders to (National Reserve) correspondent banks, is a specialist wire fraud problem

Read more

CEO scam email phishing fraud cost businesses billions - ID Theft

A niche market for organised crime, the sending of correspondent payment instructions to Treasury departments of Federal Reserve and Central Banks, evolved into a slick corporate business ID theft.

Read more

Al Qaeda Sets Sail

Intercepted communications revealed that another particular terror threat was nurtured to maturity by al Qaeda operatives and monitored travel patterns indicate that threat became topical.

Read more

South Africa - Things Go Sideways Fast

South Africa that gradually moved towards a major crisis arrived at the brink of civil war. As current clear and present danger signals show that a resurgence of violence will pop up over night.

Read more

Economy and Terrorism - Presence, Fear, Division

Intelligence and Security Challenges | Global economic collapse | Al Qaeda Prime Targets, ISIS Comes to You | Muslim vs. non-Muslim | Presence and Fear the New Normal | Active spy networks the prelude to (civil) war | Iran, results of diplomacy offset against lower oil prices | Electronic footprints from niche to core business |

Read more

How Terrorist Converge with Refugees Crisis

We are aware of terrorist (and criminals) among the refugee streams and of hundreds we do know in which groups they hide, their ID and intentions. But as planned and expected there are just too many unidentified, posing as refugees and current identification efforts are effectively frustrated by defensive group behavior.

Read more

ISIS Sets Off Cold War - Terrorist aim to strike at the heart of Egypt

Ongoing Intelligence, HUMINT and Anti-Money-laundering (AML) operations within the core of Al Qaeda network have revealed a group of mainly Egyptian nationals that aims to strike at the heart of Egypt and the Russian Egyptian alliance.

Read more

High Tech warfare requires an electronic footprint

Acquiring electronic footprints, to enable analysis and tagging of targets for remote controlled and high tech weapons, has become a main stream intelligence requirement.

Read more

ISIS - Comes To You

The USA will relapse into the usual political dilly-dally and "seem" unwilling to support aggressive steps - Never hear of Abu Bakr al-Baghdadi the Caliph of the Islamic State again - ISIS will come to you - Terror threat scenario, gun, large and a small knife - Israeli defence readiness is strategically limited - ISIS established presence and fear - Loss of purpose - ISIS attacks Israel - Droning them softly - ISIS next big purpose - Channeling hatred directly to your doorstep via Hamas and the Fatah movement.

Read more