Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links
People, Groups of people (social networks)
Companies, Organizations
Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents, and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.
A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com
With a combination of entities, for example, johnsmith@hotmail.com, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.
For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).
Acquiring electronic footprints, to enable analysis and tagging of targets for remote controlled and high tech weapons, has become a main stream intelligence requirement.
Its obvious that in recent years the leadership of most terror groups have become aware or were killed because they had an electronic footprint and could be tagged as target. More and more these groups implement Missile Warning Systems and professional advanced countermeasures to prevent or disrupt the possibility of electronic footprints.
OSINT
OSINT capabilities to gather electronic footprints seem strong. At least the thousands intelligence amateurs confirm that by trawling social media and filtering networks for valued information, meanwhile creating a self-sustaining 'business'.
Creating a chaotic mix of information that:
Cloudular Network Tasks
Military Intelligence professionals that 'task network', have occasionally determined (and eliminated) 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Counter ISIS Cloudular Network Tasks:
- determine ISIS logistics chains and supporters in order to identify nodes and support cells.
- ID the security practices and people that ISIS applies to visitors to the caliphate such as journalists, businessmen and recruits
- Determine ISIS travel profiles, travel operations and patterns of travel to the US, Europe, North Africa, Asia and the Middle East
- Provide electronic footprint on any and all aspects of the ISIS caliphate in Syria, Iraq, Libya and elsewhere as available
- Develop additional assets to meet requirements as tasked
No Electronic Footprint Connects to al-Baghdadi
It appears that Baghdadi enforced 100% countermeasures to prevent all forms of identification through electronic footprints. Which until recent made it impossible to tag him for a precision strike. Developing HUMINT Inside his personal eco-system remained the only viable option to eventually tag him.
Turkey and the Kurds have a fast amount of HUMINT on, and assets in, ISIS. An ongoing AML Investigation into a financial nexus Terrorism - TOC (Transnational Organised Crime) revealed the connection of a human trafficker and a smuggler of armored cars the logistics chains of ISIS and its leadership
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.