Ultrascan Humint

Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example johnsmith@hotmail.com, XYZ company, London, Cairo,  Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.

For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).

Level three, four and five include Humint and are focussed on the desired results

The Airport Nexus Crime Terrorism

Airport Insider Security Threat

There are many more or less obvious threat scenario's; this* is only what was derived from the Intelligence, HUMINT and Anti-Money-laundering (AML) operations  focused on the nexus terrorism and organised crime

The goal of aviation security is to prevent harm to aircraft, passengers, and crew, as well as support national security and counter-terrorism policy.


'Crush the enemy's economy'

Al Qaeda repeatedly designated high-profile airlines as targets in a bid to 'crush the enemy's economy'. A long term prime target in the sense of patiently creating access to the aviation industry, airport organisations and eco-systems. While building its global organisation, 'patience' has proven to be one characteristic of the Al Qa'ida leadership.

Security priorities

The priorities are passenger and baggage screening; airport security, including access control and perimeter surveillance; aircraft protection; security personnel training; implementation of security clearances of airport personnel; air cargo screening; and armed security, including deploying air marshals.

In the past decades the aviation industry became leading in developing Hi-Tech counter measures against threats.


Wake-up call

Initially the state-of-the-art detection systems in place at modern airports make it difficult for terrorists to sneak bombs onto planes.

After the threat by AQAP-Khorasan with "Ingenious explosives" and "tactics not detected by security measures" the efforts of the security industry were immediately dedicated to detect  "Ingenious explosives"

Meanwhile the vision of Al Qaeda always was building presence inside their targets to change them 'like a cancer' from within and enable their mission   "Tactics".

* Terrorist groups found loopholes and developed new ways to get bombs onto passenger jets, by recruiting insiders and inserting own people on key positions within the eco systems of their enemies.

Busy airports are big cities

It takes a vast array of workers to make Big Airports run smoothly. Customers rely on pilots, mechanics, ticket agents, security personnel and vendors to create a smooth transportation hub. Most of the jobs are with private employers such as airlines, hotels, cleaners and food service companies, while other airport jobs are directly with the facility.

There are 76,000 employees in the London Heathrow airport area

Access to aircraft

When properly secured, access to aircraft is limited to owners, pilots, service personnel and other authorized persons.

* Organised crime has access to the eco systems of all those categories. This threat always existed but changed dramatically when shifting from criminally into ideologically motivated.

The airport, where crime meets ideology

The workforce and visitors on an airport mirror society including crime. It is at that first line of defense, that tackling crime at the back leads to treating symptoms and needs to be addressed at the front, before incidents happen.

* International transport hubs provide a perfect matrix to synchronize and fuse criminal inspired activity with ideology driven terror mechanisms.

Crime persists despite heightened security

Since losses are covered by insurance, why worry about security? Frequently stolen items are laptops and iPads. Travelers and security are obviously alert for thefts from baggage carousels, swiped property left unattended, and thefts by baggage handlers.

* Under that layer of insured petty crimes hides trafficking by serious organised crime.

Presence of insider threats

Even though the list of serous crimes recorded inside airport areas seems sheer endless, what we know is a tip of the iceberg.

* Criminal and anti money laundering investigations revealed the presence of the 'nexus organised crime terrorism' on airports in Europe and the MENA.

Investigations came for example across;  Hezbollah with smuggling and sale of counterfeit drugs, members of the Muslim Brotherhood who worked at the airlines (pilots) and as staff in the baggage department facilitating card fraud and theft, the Taliban that controlled their traffickers of white heroin, al Shabaab operating telecom shops facilitating credit card airline ticket fraud, Boko Haram perpetrating ID theft, operating fake bank branches and change offices....... and all major crime groups that worked on the airports knew beforehand which of the flights (the passengers) would NOT be checked.

Terrorist and sympathizers work at airports

Few airports require employee screening before work, a shared responsibility often starts with the private employers and ends with a limited crosscheck for criminal records before security badges are issued.

* In European airports we found minions everywhere from airplane cleaners, maintenance, pilots, shuttle service and baggage handlers to operators of screening machines that waved their friends through checkpoints. Also security staff that knowingly 'operated' a scanning machine with crucial malfunctions were not exceptional in the MENA.

Suspect behavior by staff is often categorized and prioritized under the usual crimes, which intentionally veils possible terror (support) acts.

Profiling for terror threats, needs to be adapted and extended to the obvious criminal eco systems on airports.

First published by Ultrascan Humint (in 2007) Februari 2014 - 2016

Also read:

The Evolution of Airline Security Since 9/11
Ingenious Explosives, Tactic Not Detected By Current Security Measures
Echoes of early design to use chemicals to blow up airliners - Asia - Pacific - International Herald Tribune
Terrorist work airport - Google search

Imminent Terror Attack ! ....... How Do We Know ?

Synergy between Crime and Ideology in the Diaspora