Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

High Tech warfare requires an electronic footprint

Acquiring electronic footprints, to enable analysis and tagging of targets for remote controlled and high tech weapons, has become a main stream intelligence requirement.

Its obvious that in recent years the leadership of most terror groups have become aware or were killed because they had an electronic footprint and could be tagged as target. More and more these groups implement Missile Warning Systems and professional advanced countermeasures to prevent or disrupt the possibility of electronic footprints.

OSINT

OSINT capabilities to gather electronic footprints seem strong. At least the thousands intelligence amateurs confirm that by trawling social media and filtering networks for valued information, meanwhile creating a self-sustaining 'business'.

Creating a chaotic mix of information that:

  1. is already available because 'remember' that's why its called OSINT
  2. is created, induced or leaked by 'professionals' to manipulate actors and reporters to confirm 'facts'
  3. is alleged, reported, interpreted, analyzed by media, witnesses, spokespersons, officials and experts

Cloudular Network Tasks

Military Intelligence professionals that 'task network', have occasionally determined (and eliminated) 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Counter ISIS Cloudular Network Tasks:

- determine ISIS logistics chains and supporters in order to identify nodes and support cells.

- ID the security practices and people that ISIS applies to visitors to the caliphate such as journalists, businessmen and recruits

- Determine ISIS travel profiles, travel operations and patterns of travel to the US, Europe, North Africa, Asia and the Middle East

- Provide electronic footprint on any and all aspects of the ISIS caliphate in Syria, Iraq, Libya and elsewhere as available

- Develop additional assets to meet requirements as tasked


No Electronic Footprint Connects to al-Baghdadi

It appears that Baghdadi enforced 100% countermeasures to prevent all forms of identification through electronic footprints. Which until recent made it impossible to tag him for a precision strike. Developing HUMINT Inside his personal eco-system remained the only viable option to eventually tag him.

Turkey and the Kurds have a fast amount of HUMINT on, and assets in, ISIS. An ongoing AML Investigation into a financial nexus Terrorism - TOC (Transnational Organised Crime) revealed the connection of a human trafficker and a smuggler of  armored cars the logistics chains of ISIS and its leadership