Reality is the working paradox that defies control

Cloudular Network Tasks - Identify, Map & Monitor

Ultrascan has extensive experience with identifying, locating, mapping, monitoring, analyzing, and predicting perpetrators of cross-border fraud, money laundering, and the planning, funding, communications, and support of terrorism for local or international religious extremists as a fast-growing component of ideological struggle, as well as geopolitical.

Intelligence professionals that 'task network', determine and eliminate 'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'.

Not linear but cloudular, which means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time or follow one specific aspect if required.

Five Level Ultrascan

Five level ultrascans are used for the intelligence-gathering phase of all security-related work and to determine the relationships and real-world links

People, Groups of people (social networks)

Companies, Organizations

Web sites, Internet infrastructure such as Domains, DNS names, Netblocks, IP addresses, Email

Phone, Phrases, Affiliations, Documents, and files

But also hidden or confidential information can be revealed;

Family ties, Health status;

Financial networks, Foreign sales, Financial resources;

Media sources, Disgruntled employees, Imminent threats, Homeland plots, Tradecraft, Recruiting tactics.

Level one ultrascan

A general first wide search for the entities as given by the client, the outcome differs a lot depending on how common the names of entities are.

If the entity is named "john smith" the outcome will be a lot of information containing "john smith" - "john" and "smith"

When the entity is the outcome will be information containing or connected to

With a combination of entities, for example,, XYZ company, London, Cairo, Washington, phone, and green energy, the outcome will be information containing or connected to all entities and links between the entities.

Level two ultrascan

The outcome of the first level scan will value the newly found entities in relation to the given one, depending on the value new entities can be scanned for deeper connections to determine relationships with the originally given entity.

For example, documents with co-signatures, university records, photographs with location and time stamps, logins and passwords of (email) accounts, additional (email) addresses, company websites, Twitter accounts, can link to new entities that have connections with the given entities. Even though some entities are removed from the internet or data set, traces can still lead to new entities (evidence).

Level Three, four, and five include Humint and are focused on the desired results

Al Qaeda moves towards Rwanda

Al Qaeda Rwanda

Since 2011 Al Qaida has patiently increased its presence in Rwanda due to its vision and mission to economically destabilize the Magnificent 5 countries (five) in East Africa. - Alert! - Increased activity by Al Qaida directed at Rwanda, Puts a Bulls-Eye on South Korean Techies in Africa.

'it's the economy stupid!'

Al Qaeda has patiently increased its presence in Rwanda since March and October 2011 when an Al Qaida traveler visited Nairobi and Kigali as part of their vision and mission to destabilize the Magnificent 5 countries in East Africa

Al Qaeda moves towards Rwanda

Alert! - October 21, 2020 - see map

During 2018 and the first weeks of 2019 Surveillance, Counter Surveillance revealed Travel Patterns, Criminal Funding, Facilitators, Support, Recruitment, and Threat Levels for the Al Qaeda - ISIS Affiliates in Africa - Alert! Increased activity by Al Qaida targeting Rwanda. Puts a Bulls-Eye on (South Korean) Techies in Africa.

Many trained fighters joined the al Qaeda affiliates dedicated to the East African Magnificent 5 countries.

In recent weeks, more than 1500 fighters joined the affiliates that target Rwanda, bringing the total to an estimated 2500 soldiers for Phase I of the GSI doctrine; establishing fear and presence by random killings

Nexus Terrorism Organised Crime

Cross border organized crime in the magnificent 5 countries (Uganda, Kenya, Tanzania. Rwanda and Burundi) have chosen Madagascar as a new base for their financial cooperation. Their first local spear-points during 2010 and 2011 were corruption and defrauding international NGOs in Madagascar, eventually sourcing a Nexus Terrorism Organised Crime.

Kigali closing Churches and Mosques

In 2018 the Rwandan government closed a couple of mosques and many small churches that had failed to comply with building safety standards or were especially started to defraud their followers! An initially small number of Christians convert to Islam. The government also aggravated the Muslim communities by forbidding loudspeakers during the call to prayer in Kigali.

Rwanda and Nigeria

In November 2018, it was reported that the Republic of Rwanda is to partner with Nigeria on ways to revive the public service in Nigeria, especially the North-East region. Rwanda is a large Troop and Police Contributing Country to missions in Africa. Both positions the Rwandan government as an enemy of (AQ/ISIS affiliates) Boko Haram.

South Korean Tech Tagged with Terrorism Bulls-Eye in Africa

Rwanda has become a hub for expanding tech companies. The 2020 economic focus of Rwanda is the ICT (IT) industry. However, that industry is/was depending on the aggressive investments and workers from South Korea. Foreigners, NGO's, and foreign investments are a usual target. Still, in Kigali, the terrorism bulls-eye is placed on South Koreans as a preferred economic target that's expected to destabilize the East African region, part of al Qaida's vision and mission.