Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links
People, Groups of people (social networks)
Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.
A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is firstname.lastname@example.org the outcome will be information containing or connected to email@example.com
With a combination of entities, for example firstname.lastname@example.org, XYZ company, London, Cairo, Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.
For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).
NEW DELHI: Indians were defrauded of $870 million last year by e-mail scams, or so-called Nigerian “419 scams,” says a global report on the financial crime. Such fraud is also a source of revenue for terror groups. The Nigerian Al-Qaeda affiliate, Boko Haram, is known to have tapped the 419 system for funds. “We stumbled upon information concerning money-laundering links with extremists in Kashmir and Bangladesh,”Read more
A new report shows that Nigerian money scams are more profitable than ever. Why are people still falling for those emails telling them they won a lottery they never entered?Read more
Some people believe that wherever they are and whatever they do, they are being watched by their enemies. They believe everyone is plotting against them and that nowhere is safe. They trust no-one. These are symptoms of a serious mental illness known as Paranoia.
Unless, of course, it is TrueRead more
Nigeria Says It Wants To Clean Up Its Bad Image - It is obvious that many of the 170 million Nigerians are not aware that some of their fellow countrymen have earned them the dubious honour of becoming the worlds number one globalizer for Fraud.Read more
Case study to train intel and financial analysts of what to look for in order to provide early warning for "spectacular terror attacks". What do terrorist attacks at the Taj Mahal hotel Mumbai, the UN building in Abuja, the US embassy in Benghazi and the Westgate mall in Nairobi have in common - A Narrative of a genuine 3 months counter-terrorism operationRead more
Although not often recognized, Africa is a key continent for The Al Qaida terror network. In the past we have observed several terror attacks in African countries as well as religion related and inspired conflicts.Read more
Liam Clarke - The Sunday Times - The internet is full of scams designed to fool the gullible and the greedy. Liam Clarke finds out just how much you can actually lose if you fall for oneRead more
Research - Education of advance fee scammers. - Here is how one of our volunteers who infiltrated into a Nigerian 419 scamring got his first lesson and was initiated by a successful scamring boss to become a "Guy" (Guy is how 419-scammers call each other) We do not want you to become a criminal, do not try this at home, it is only an example of how it is done. If you do try this you will end up in jail!Read more
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.