Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

al Qaeda fighters from Iran, in the West

Monitoring the communications and travel patterns revealed the existence of small groups of Iranian fighters in the West, possible an imminent threat.

Iran’s relationship with al-Qaeda : It’s complicated

The juxtaposition of al-Qaeda as in theory an arch-foe of the Iranian regime while at the same time having senior members inside Iran, underscores a very complex relationship that Tehran has with the terrorist organization. In its ties with al-Qaeda, Iran seeks to leverage the group, use it as a card in promoting regional interest and utilize it operationally against the West or Israel or Arab neighbors.

----

During an early morning observation in March 2017 we monitored a small group of al Qaeda fighters in the Netherlands, experienced soldiers, not the typical returnees. They crashed a packed student party with the music peaking at 110db and were cracking jokes about "how do you recognize an al Qaeda fighter from Iran? his nose points a little bit to the left". The group was having a blast and cheering: "we are al Qa'ida AND Iranian"

----

Al Qaeda, The Shadow Where Crime Becomes Ideology

Al Qaeda projects itself as an organization fighting for the greater good. In reality it is nothing more than a name that different groups (can) hide behind and attach itself to the Al Qaeda "brand".

It does not take a brilliant mind to think of ways this system can be exploited. Organizations that have enemies and competitors that are extremely determined. If any of those enemies were to attack their competitor they would not have any good way of doing that without outing themselves as the culprit.

This is where Al Qaeda comes in. Thus, diverting blame from themselves and onto, largely, unsuspecting groups of people who flock to the al Qaeda "ideals". Leaving the real perpetrators in the dark behind the Al Qaeda shadow were crime becomes ideology!

More attacks are planned by AQ affiliates (and offshoots) against the US, Israel, Turkey, Saudi Arabia, Australia and in the EU, The Netherlands, Germany, France, Italy, Spain, Austria and the UK. (Threat Map)

Imminent threats and incidents in western Europe will raise national alert levels in the first quarter of 2017.

----

first published by Ultrascan Humint (between 2009 and) March 04, 2017