Ultrascan have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of cross border fraud, money laundering and the planning, funding, communications and support of terrorism for local or international religious extremists as fast growing component of ideological struggle, as well as geopolitical.
Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.
Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.
Five level ultrascans are used for the intelligence gathering phase of all security related work and to determine the relationships and real world links
People, Groups of people (social networks)
Web sites, Internet infrastructure such as: Domains, DNS names, Netblocks, IP addresses, Email
Phone, Phrases, Affiliations, Documents and files
But also hidden or confidential information can be revealed;
Family ties, Health status;
Financial networks, Foreign sales, Financial resources;
Media sources, Disgruntled employees, Imminent threats, Homeland plots, Trade craft, Recruiting tactics.
A general first wide search for the entities as given by client, the outcome differs a lot depending on how common the names of entities are.
If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"
When the entity is firstname.lastname@example.org the outcome will be information containing or connected to email@example.com
With a combination of entities, for example firstname.lastname@example.org, XYZ company, London, Cairo, Washington, phone and green energy, the outcome will be information containing or connected to all entities and links between the entities.
The outcome of the first level scan will value the new found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the original given entity.
For example, documents with co-signatures, university records, photographs with location and time stamp, logins and passwords of (email) accounts, additional (email) addresses, company websites, twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed of the internet or data set, traces can still lead to new entities (evidence).
We are aware of terrorist (and criminals) among the refugee streams and of hundreds we do know in which groups they hide, their ID and intentions. But as planned and expected there are just too many unidentified, posing as refugees and current identification efforts are effectively frustrated by defensive group behavior.
Refugees and immigrants are NOT a threat to national security but rather a long term natural, economic, social and humanitarian necessity. Today about 80% of global migrants end up in the developing world.
However, refugee streams ARE strategic instruments of war and a real current effective threat and target. A global threat with current pain-points in Asia, Africa and Europe.
In recent hours, days and weeks we could easily identify one 'proven terrorist' and one 'extremist with intention' in every 600 refugees that arrived in the EU. A tip of the iceberg.
To adjust current security policy, we can't compare the current security revolution to evolution of terrorism in the past century with only two convicted terrorist on every 600.000 immigrants.
Every problem can be calculated in to useless oblivion by wrong input and selective comparisons, sadly enough we've become accustomed to do this on issues of safety and security every day.
Statistics on a number of terrorist as part of (current or recent) immigrant and refugee streams are irrelevant to future victims of the 'Shock and Awe' tactics.
The current refugee streams to Europe are no surprise, as this is all according scenario's and expectations published by both extremist, ISIS and Al Qaeda as well as most governments and military strategists. The current need for a focus on imminent threats is coming from the sheer size of the refugee streams within a short time-line.
Refugee crisis as strategic political and military weapon, exhaust the resources ofCounter Terrorism Units and Intelligence Services !
'Motivation by events' is a powerful instrument by which also ISIS bridges continents and inspires masses through social media. During an AML investigation in 2009 we discovered that a 'movement' was developed in cooperation with Al Qaeda controlled ex-pats in Europe and in 2013 we learned that movement was to be reinforced by veterans of the Jihad that were or still are fighting in the Middle East.
For sometime now, experts and politicians often say that the millions of displaced and refugees should be helped in their region, but these are the same politicians responsible for destabilizing regional humanitarian efforts by ensuring that only about 30% of the required and promised funding reaches those humanitarian efforts in MENA. Allowing for key services and influence in refugee camps to be delivered by Transnational Organized Crime!
In November 2014 an Anti Money Laundering and HUMINT Risk Assessment operation in the Maghreb, Egypt and other parts of the Middle East. Discovering an imminent threat to Western Europe, as a prime target for the terror networks.
By flooding the target countries with hundreds of Jihadist simultaneously, the Islamic State seeks to guarantee success of high Profile Terror Attacks in Europe, Australia, Canada and even the US.
Terror movements of Al Qaeda and ISIS celebrate the European security breach that they patiently planned for.
In the years after 2003 everyone that ever visited a possible suspect meeting or mosque in western Europe (eventually all of the EU) was identified and profiled for extremism, possible radicalization or connection to terror or transnational crime.
Monitoring by the national CT units, the NSA and Echelon made it near impossible for those identified to be actively involved with terrorism or support of it (anywhere in the world), without the intelligence services knowing about it!
Most of the recent new arrivals from Afghanistan, the Middle East (Syria, Iraq, Palestinian refugee camps, Iran) and Africa are NOT identified or profiled. A clear and present danger.
Recent refugee streams went in to the hart of Europe before being registered and 'identified' and some unidentified travelers never reach(ed) a modern station or a refugee care center with a proper set of security resources.
Those stay of the grid. Some have bailed from transport when trains were stopped in the middle of nowhere for 'security' reasons, some never entered any bus, train or registered at an official welcoming facility. Some accepted a ride from one of the thousands of 'good will' (?) citizens who went to welcome and pick up refugees with their own cars.
First published September 10, 2015 by Ultrascan Humint
- Deutsche Polizei - "Haben nur zehn Prozent der Flüchtlinge kontrolliert"
- UNHCR (MENA)
- Imminent High Profile Terror Attack ! ...... How Do We Know ?
- ISIS leader The Butcher al-Baghdadi killed in strike by Turkey
- Imminent Terror Alert - Update
- ISIS plans massive attack on Israel
- Al Qaeda’s global strategy bridges continents with ‘Motivation by Events’
- Synergy between Crime and Ideology in the Diaspora
Anti Money Laundering - Follow the Money - Transnational Organized Crime Nexus Terrorism - HUMINT access to primary sources in and outside every chain of command.