Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example johnsmith@hotmail.com, XYZ company, London, Cairo,  Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.

For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).

Level three, four and five include Humint and are focussed on the desired results

Kolkata favourite hunting ground for Nigerian scamsters

NEW DELHI: Indians were defrauded of $870 million last year by e-mail scams, or so-called Nigerian “419 scams,” says a global report on the financial crime.

Read more

Millions of victims lost $12.7B falling for Nigerian scams

A new report shows that Nigerian money scams are more profitable than ever. Why are people still falling for those emails telling them they won a lottery they never entered?

Read more

Transnational Nature of Nigerian 419 Advance Fee Fraud

Some people believe that wherever they are and whatever they do, they are being watched by their enemies. They believe everyone is plotting against them and that nowhere is safe. They trust no-one. These are symptoms of a serious mental illness known as Paranoia. 

Unless, of course, it is True

Read more

Fraud Determines Nigeria's International Image?

Nigeria Says It Wants To Clean Up Its Bad Image - It is obvious that many of the 170 million Nigerians are not aware that some of their fellow countrymen have earned them the dubious honour of becoming the worlds number one globalizer for Fraud.

Read more

Imminent High Profile Terror Attack ! ...... How Do We Know ?

Case study to train intel and financial analysts of what to look for in order to provide early warning for "spectacular terror attacks". What do terrorist attacks at the Taj Mahal hotel Mumbai, the UN building in Abuja, the US embassy in Benghazi and the Westgate mall in Nairobi have in common - A Narrative of a genuine 3 months counter-terrorism operation

Read more

Africa is a key continent for terror networks

Although not often recognized, Africa is a key continent for The Al Qaida terror network. In the past we have observed several terror attacks in African countries as well as religion related and inspired conflicts.

Read more

What happens if you claim your prize?

Liam Clarke - The Sunday Times - The internet is full of scams designed to fool the gullible and the greedy. Liam Clarke finds out just how much you can actually lose if you fall for one 

Read more

How to become an advance fee scammer

Research - Education of advance fee scammers. - Here is how one of our volunteers who infiltrated into a Nigerian 419 scamring got his first lesson and was initiated by a successful scamring boss to become a "Guy" (Guy is how 419-scammers call each other) We do not want you to become a criminal, do not try this at home, it is only an example of how it is done.  If you do try this you will end up in jail!

Read more