Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is johnsmith@hotmail.com the outcome will be information containing or connected to johnsmith@hotmail.com

With a combination of entities, for example johnsmith@hotmail.com, XYZ company, London, Cairo,  Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.

For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).

Level three, four and five include Humint and are focussed on the desired results

ISIS Sets Off Cold War - Terrorist aim to strike at the heart of Egypt

Terrorist aim to strike at the heart of Egypt

- Ongoing Intelligence, HUMINT and Anti-Money-laundering (AML) operations within the core of Al Qaeda network have revealed a group of mainly Egyptian nationals that aims to strike at the heart of Egypt and the Russian Egyptian alliance.

Putin and Sisi pledge to boost Russia-Egypt ties

Egypt says that Russia's intervention in Syria will curtail the spread of terrorism help deal a fatal blow to Islamic State in the war-torn country.

We believe Russia's intervention, given its capabilities, will serve to limit terrorism in Syria and eventually eradicate it


ISIS aims to strike at the heart of Russian Egyptian relations

AML investigations identified links to the decade(s) old support base with members of The Egyptian Muslim Brotherhood and never eradicated support base of Al Qaeda. Both organisations enabled theworst terror attacks in recent history.

Cooperation with terror cells in MENA and specifically Egypt enable execution of  attacks within weeks.

The Targets

The quality of rarely used resources, such as large anonymized money transfers, special weapon supplies and transport, indicate that the conspirators  seek to strike a high value target with Geo-strategic and/or international significance.

In Egypt the usual civilian soft targets with international significance are foreigners, tourist.

The hard targets vary from government structures and embassies to, on the high end, the Suez Canal and the Aswan Dam. Both 'water' projects are vital to  Egypt's economy and at the same time symbolize the heart of Russian Egyptian relations.


The Cold War Revisited

Russian Egyptian relations are firmly embedded in Egypt's recent history and at the start of the cold war when the Soviets rushed to Egypt’s aid to build the Aswan Dam after the United States withdrew its offer of financial aid to Egypt to help with the construction.

Egypt and Russia Back to the Future 

Supported by Soviet arms and money, and angry with the United States for withdrawing its promise to provide funds for construction of the Aswan Dam, Egypt seized and nationalized the Suez Canal leading to the Suez crisis.

Today the U.S. suspension of military aid to Egypt has created an opportunity for Russia to exert influence in the Middle East. Russia is to establish an industrial zone for Suez Canal in Egypt and help build a nuclear power plant in Egypt 

-----

First published by Ultrascan Humint