Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links
People, Groups of people (social networks)
Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.
A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is firstname.lastname@example.org the outcome will be information containing or connected to email@example.com
With a combination of entities, for example firstname.lastname@example.org, XYZ company, London, Cairo, Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.
For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).
Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat - hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"
Although not often recognized, Africa is a key continent for The Al Qaida terror network. We have observed several terror attacks in African countries as well as religious related and inspired conflicts. Africa is a large center of “recruitment” for the Al Qaida terror network and terror acts toward the west are increasingly planned from Africa. Al Qaeda’s “mission statement”, to establish an Islamic caliphate reaching from Morocco to Afghanistan, crosses a large part of the African continent.
"Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat"
Several African regimes have been chosen as a prime target for the Al Qaida network. Vulnerable countries are: Egypt (Suez channel and tourism), Morocco (due to the current regime), Algeria (foreign investors in gas), Tunis, South Africa and further all western (predominantly USA) embassies, UN aid organizations and NGO’s.
The threat of an attack by multiple gunmen on a location packed with civilians remains the second biggest fears of counter terrorism chiefs. The ambition of violent Islamist's to stage a Mumbai-style atrocity is undiminished.
Increasingly Al Qaida aims its counter intelligence operatives in Africa in subversion of the West. It’s not unusual for Al Qaeda to launch diversions. For specific targets it uses a "multi cells, one target approach" to mislead detection and force opponents to cast a wide net.
After being hit in Mali and Burkina Faso, France (and others before) warned Senegal and Ivory Coast in January 2016 of Terror Attacks, but the Al Qaeda "multi cells, one target" threat proofed too difficult for them.
These specific attacks in Africa, were planned and assigned by the counter-intelligence organisation of (the original) Al Qaida for two reasons, of which one is:
"hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"
Targeted countries were timely alerted based on specific information about cells of fighters on the move. For example - In the past(!!) years special military units in Senegal and Mali have received high value intelligence from inside Al Qaeda that enabled them to disrupt this type of multi cells terror threats.
These are 'fixed targets', derived from lists of covert-operations, agents, "contractors", specific locations of, safe houses, meeting places, ID's and intelligence assets. Lists that were stolen from the Mukhabarat offices during the Arab spring in Cairo. Anyone with a copy knows most of the (future) fixed targets of Al Qaeda.
The lists enable al Qaeda to differentiate targets meticulously precise by intelligence service, for example French, Belgian, German, British or American.
These are not the kill at random 'opportunity targets' to establish presence and fear, but 'specific targets' to scare the living daylights out of a locally active intelligence community and send a chilling lightning bolt directly into the corridors of power and intelligence services INR , CIA , DIA , MI6 , DGSE , MAD , ......
December, 2015 - an Anti Money Laundering and risk assessment operation in the Maghreb, Egypt and other parts of the Middle East. Discovering imminent threats to West Africa as a prime target for the Al Qaeda network, reason for a 30-days Ultrascan Humint terror alert.
"Intercepted encrypted messages between members of the Al Qaida network mentioning the premises of NGO's in West Africa as well as their affiliates and personnel as a possible target"
January, 2016 - Ongoing HUMINT and analysis, regarding the above mentioned terror alert, yielded that the targets are international NGO's and suspicion about possible Mumbai style operations scenario’s in West Africa.
- Ongoing Humint; whispers of terror cells from Al Qaeda launched and on the move in Mauritania, Guinea and Burkina Faso.
- Revealed tradecraft, was sufficient reason to initiate a low level of monitoring, collecting phone numbers, IMEI’s, IMSI’s, locations, time and duration of the calls.
Monitored and plotted communications of three groups show separate patterns in Guinea and Burkina Faso, one group moves towards a border-crossing with Côte d’Ivoire. Reason to launch a tactical team to intercept if/when suspects cross the border, identify and disrupt.
"Intercepted messages between members of the al Qaeda network mentioning elements of the coordination for a high profile terror attacks"
January 17, 2016 - Alert! - Elevated Threat Levels from Al Qaeda affiliates for - Abidjan - Côte d’Ivoire - Ivory Coast and Dakar - Senegal. Reason to extend the terror alert with 60 days ..... France Said to Warn Senegal, Ivory Coast of Terror Attack
January 23, 2016 - The first and only incoming call from a Mauritanian subscriber in Ivory Coast reveals activity in Cote d'Ivoir. This threat by Al Qaeda is alive, with the scope of the organisation, scale, and possible targets identified.
March 13, 2016 - 16 Killed in Terrorist Attack on Resort Hotels in Ivory Coast
February 12, 2015 - Islamic Terror Groups Obtained Vital Information
January 28, 2015 - Nine Killed in Attack on Tripoli Corinthia Hotel in Libya
September 11, 2012 - annex and the American diplomatic compound in Benghazi
November 20, 2016 - Al-Qaeda targets Westerners in Mali hotel assault
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.