Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

CEO scam email phishing fraud cost businesses billions - ID Theft

A niche market for organised crime, the sending of correspondent payment instructions to Treasury departments of Federal Reserve and Central Banks, evolved into a slick corporate business ID theft.

A scam in which criminals impersonate chief executives, by spoofing their email addresses, has cost businesses around the world billions.

Corporate ID fraud

There is a sharp increase in “business email scams” a simple scam that is also known as “CEO fraud”, with thousands of victims affected globally.

In the scam, a criminal impersonates a chief executive’s email account and directs an employee to wire money to an overseas bank account. By the time one realises it is a fraud, the money is gone.

For this type of business frauds the fraudsters require a professional criss-cross  money laundering set-up to transfer large amounts over many bank accounts in many different international jurisdictions.

It concerns transnational organized crime and is a global problem.

To tackle these incidents, we’re working with criminal investigation and cyber crime experts in the Ultrascan research network.

The reported frauds can be partly attributed to companies detecting the crime, but it also reflects the simple nature of the scheme that can be run from anywhere around the globe. All you need is a computer.


Most of the bank accounts in which the money ends up are operated by a global criminal network of (419) Advance Fee Fraud scammers and located in Asia and Africa, where we coordinate counter initiatives.

----

First published by Ultrascan-KPO