Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links
People, Groups of people (social networks)
Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents, and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.
A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is firstname.lastname@example.org the outcome will be information containing or connected to email@example.com
With a combination of entities, for example, firstname.lastname@example.org, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.
For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).
The allies of the Islamic Republic of Iran, the Assad government in Syria, Hezbollah in Lebanon and Hamas in Gaza are under pressure as result of the war in the area and their value is rapidly declining as vital part of Iran's strategy to face any possible attack by the USA due to Iran's nuclear program.
Iran is aware that, not if but when the regional support of their allies falls away, its options are limited to;
Iran was always open to "flexibility" when it came to diplomacy and that got Iran to where its today ...... some chess-players might think "so far, so good".
Because of the gradual increasing squeeze by sanctions, the axis of financial ties between the Islamic Republic of Iran, Syria, Hezbollah and Hamas had to rely more on underground (illegal) financial streams. Those financial streams are also instrumental for Iran to fund several anti US and anti Europe terror organizations operating in Europe, the Middle East and Africa.
Iran has significant potential to be divided by its internal and cross border religious and ethnic groups that seem to be adamant to reclaim their ancient rights. (What Kurds think about Rouhani’s visit and promises in Kurdistan) Kurds, Taliban but also the Khorasan Province branch, which is active across the whole of Afghanistan plus the adjacent parts, including Iran.
Iran could try to delay that process of uprisings, also across its borders. Enabling a "Gorbachev scenario", with "Dear Mr. Rouhani tear down this wall!"
Direct action is useless if it doesn't increase the chances for Iran to be a respected regional power and fulfill its destiny in the Islamic world. To attain that, Iran has to successfully attack at least one of the large (economic) stakeholders, "The West".
Europe being tactical and strategic the weakest, the United States off guard by its own (global) strategies and the decades of diplomacy that left ample time for Iran to prepare for an attack with "Microwaves From The Sky" (EMP)
First published by Ultrascan AGI in July 2007
CNN Oct 12, 2015 - The Emad (Pillar) surface-to-surface missile, designed and built by Iranian experts, is the country's first long-range missile that can be precision-guided until it reaches its target, said Brig. Gen. Hossein Dehqan, Iran's defense minister
IHS Janes Oct 13, 2015 - The Iranian coverage also showed what was presumably the re-entry vehicle hitting the ground and the resulting crater from what appeared to be a live rather than inert warhead.
CSIS Oct. 07, 2014 - a missile known as the Emad-1 MRBM, with 1700km range, 500m accuracy, and 750kg payload. It is a variation of the Shahab-3 MRBM. It is Iran’s first maneuvering reentry vehicle equipped system (to improve accuracy), liquid propelled, equipped with SATNAV, and reported to be slated for deployment sometime after 2016. To date, there are no indications testing has occurred. Note: The CEP is a dramatic increase over the Shahab- 3’s CEP of approx. 2,000m
The deputy head of Iran’s Revolutionary Guards warned Europe that if it threatens Tehran, the Guards will increase the range of missiles to more than 2,000 kilometres
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.