Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links
People, Groups of people (social networks)
Companies, Organizations
Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents, and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.
A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com
With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.
For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).
Acquiring electronic footprints, to enable analysis and tagging of targets for remote controlled and high tech weapons, has become a main stream intelligence requirement.
Read more
The USA will relapse into the usual political dilly-dally and "seem" unwilling to support aggressive steps - Never hear of Abu Bakr al-Baghdadi the Caliph of the Islamic State again - ISIS will come to you - Terror threat scenario, gun, large and a small knife - Israeli defence readiness is strategically limited - ISIS established presence and fear - Loss of purpose - ISIS attacks Israel - Droning them softly - ISIS next big purpose - Channeling hatred directly to your doorstep via Hamas and the Fatah movement.
Read more
NEW DELHI: Indians were defrauded of $870 million last year by e-mail scams, or so-called Nigerian “419 scams,” says a global report on the financial crime. Such fraud is also a source of revenue for terror groups. The Nigerian Al-Qaeda affiliate, Boko Haram, is known to have tapped the 419 system for funds. “We stumbled upon information concerning money-laundering links with extremists in Kashmir and Bangladesh,”
Read more
A new report shows that Nigerian money scams are more profitable than ever. Why are people still falling for those emails telling them they won a lottery they never entered?
Read more
Some people believe that wherever they are and whatever they do, they are being watched by their enemies. They believe everyone is plotting against them and that nowhere is safe. They trust no-one. These are symptoms of a serious mental illness known as Paranoia.
Unless, of course, it is True
Read more
Nigeria Says It Wants To Clean Up Its Bad Image - It is obvious that many of the 170 million Nigerians are not aware that some of their fellow countrymen have earned them the dubious honour of becoming the worlds number one globalizer for Fraud.
Read more
Case study to train intel and financial analysts of what to look for in order to provide early warning for "spectacular terror attacks". What do terrorist attacks at the Taj Mahal hotel Mumbai, the UN building in Abuja, the US embassy in Benghazi and the Westgate mall in Nairobi have in common - A Narrative of a genuine 3 months counter-terrorism operation
Read more
Although not often recognized, Africa is a key continent for The Al Qaida terror network. In the past we have observed several terror attacks in African countries as well as religion related and inspired conflicts.
Read more
Liam Clarke - The Sunday Times - The internet is full of scams designed to fool the gullible and the greedy. Liam Clarke finds out just how much you can actually lose if you fall for one
Read more
Research - Education of advance fee scammers. - Here is how one of our volunteers who infiltrated into a Nigerian 419 scamring got his first lesson and was initiated by a successful scamring boss to become a "Guy" (Guy is how 419-scammers call each other) We do not want you to become a criminal, do not try this at home, it is only an example of how it is done. If you do try this you will end up in jail!
Read more
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.