Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

Spying is Lying and for the Wrong Reasons Dying - The NGO Kill List - Case: terror reaches Côte d’Ivoire - Grand Bassam

Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat - hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"

Although not often recognized, Africa is a key continent for The Al Qaida terror network . We have observed several terror attacks in African countries as well as religious related and inspired conflicts. Africa is a large center of “recruitment” for the Al Qaida terror network and terror acts toward the west are increasingly planned from Africa. Al Qaeda’s “mission statement”, to establish an Islamic caliphate reaching from Morocco to Afghanistan, crosses a large part of the African continent.

"Any obstacle that the Al Qaida network faces in its effort to achieve its mission statement, the Al Qaida terror network identifies as a threat"

Several African regimes have been chosen as a prime target for the Al Qaida network. Vulnerable countries are: Egypt (Suez channel and tourism), Morocco (due to the current regime), Algeria (foreign investors in gas), Tunis, South Africa and further all western (predominantly USA) embassies, UN aid organizations and NGO’s.


Al Qaeda High Profile Attacks

The threat of an attack by multiple gunmen on a location packed with civilians remains the second biggest fears of counter terrorism chiefs. The ambition of violent Islamist's to stage a Mumbai-style atrocity is undiminished.

----

Multi cells, for specific targets in Africa

Increasingly Al Qaida aims its counter intelligence operatives in Africa in subversion of the West. It’s not unusual for Al Qaeda to launch diversions. For specific targets it uses a "multi cells, one target approach" to mislead detection and force opponents to cast a wide net.

After being hit in Mali and Burkina Faso, France (and others before) warned Senegal and Ivory Coast in January 2016 of Terror Attacks, but the Al Qaeda "multi cells, one target" threat proofed too difficult for them.

After being hit in Mali and Burkina Faso, France (and others before) warned Senegal and Ivory Coast in January 2016 of Terror Attacks, but the Al Qaeda

These specific attacks in Africa, were planned and assigned by the counter-intelligence organisation of (the original) Al Qaida for two reasons, of which one is:


"hurt the western financial and espionage position in Africa through the killing of spies, hidden in NGO's, businesses and the corps diplomatique"


Timely warnings

Targeted countries were timely alerted based on specific information about cells of fighters on the move. For example - In the past(!!) years special military units in Senegal and Mali have  received high value intelligence from inside Al Qaeda that enabled them to disrupt this type of multi cells terror threats.


Listed Targets

These are 'fixed targets', derived from lists of covert-operations, agents, "contractors", specific locations of, safe houses, meeting places, ID's and intelligence assets. Lists that were stolen from the Mukhabarat offices during the Arab spring in Cairo . Anyone with a copy knows most of the (future) fixed targets of Al Qaeda.

Lists that were stolen from the Mukhabarat offices during the Arab spring in Cairo


The first blow is half the battle

The lists enable al Qaeda to differentiate targets meticulously precise by intelligence service, for example French, Belgian, German, British or American.


  • - U.S. consulate in Benghazi
  • - Corinthia Hotel in Tripoli
  • - Safe house in Bamako
  • - Radisson Blu hotel in Bamako
  • - Splendid Hotel in Ouagadougou
  • - Etoile du Sud hotel, Coral Beach in Ivory Coast
  • .....
  • 287 primary targets are on the Africa lists


The living daylights

These are not the kill at random 'opportunity targets' to establish presence and fear , but 'specific targets' to scare the living daylights out of a locally active intelligence community and send a chilling lightning bolt directly into the corridors of power and intelligence services INR , CIA , DIA , MI6 , DGSE , MAD , ......


Case: terror reaches Côte d’Ivoire - Grand Bassam

December, 2015 - an Anti Money Laundering and risk assessment operation in the Maghreb, Egypt and other parts of the Middle East. Discovering imminent threats to West Africa as a prime target for the Al Qaeda network, reason for a 30-days Ultrascan Humint terror alert .


"Intercepted encrypted messages between members of the Al Qaida network mentioning the premises of NGO's in West Africa as well as their affiliates and personnel as a possible target"


January, 2016 - Ongoing HUMINT and analysis, regarding the above mentioned terror alert, yielded that the targets are international NGO's and suspicion about possible Mumbai style operations scenario’s in West Africa.


- Ongoing Humint; whispers of terror cells from Al Qaeda launched and on the move in Mauritania, Guinea and Burkina Faso.

- Revealed tradecraft, was sufficient reason to initiate a low level of monitoring , collecting phone numbers, IMEI’s, IMSI’s, locations, time and duration of the calls.


Monitored and plotted communications of three groups show separate patterns in Guinea and Burkina Faso, one group moves towards a border-crossing with Côte d’Ivoire.  Reason to launch a tactical team to intercept if/when suspects cross the border, identify and disrupt.


"Intercepted messages between members of the al Qaeda network mentioning elements of the coordination for a high profile terror attacks"


January 16 - Burkina Faso hotel attack: At least 20 reported dead, 63 hostages released


January 17, 2016 - Alert! - Elevated Threat Levels from Al Qaeda affiliates for - Abidjan - Côte d’Ivoire - Ivory Coast and  Dakar - Senegal. Reason to extend the terror alert with 60 days ..... France Said to Warn Senegal, Ivory Coast of Terror Attack

Burkina Faso hotel attack: At least 20 reported dead, 63 hostages released


January 23, 2016 - The first and only incoming call from a Mauritanian subscriber in Ivory Coast reveals activity in Cote d'Ivoir. This threat by Al Qaeda is alive, with the scope of the organisation, scale, and possible targets identified.

.......


March 13, 2016 - 16 Killed in Terrorist Attack on Resort Hotels in Ivory Coast


Al Qaeda claims responsibility for Ivory Coast hotel shooting in which 16 'including four Europeans' killed at resort


March 14, 2016 - Al Qaeda claims responsibility for Ivory Coast hotel shooting in which 16 'including four Europeans' killed at resort


March 18, 2016 - Ivory Coast: Americans targeted in the attack at musée des costumes de Grand-Bassam on March 13

Ivory Coast: Americans targeted in the attack at musĂŠe des costumes de Grand-Bassam on March 13

-----

February 12, 2015 - Islamic Terror Groups Obtained Vital Information
January 28, 2015 - Nine Killed in Attack on Tripoli Corinthia Hotel in Libya
September 11, 2012 - annex and the American diplomatic compound in Benghazi
November 20, 2016 - Al-Qaeda targets Westerners in Mali hotel assault


Read more:
- Google search: Al Qaeda "The Base", detected but never eradicated
- Africa is a key continent for The Al Qaida terror network
- Narrative of a genuine 3 months counter-terror operation