High Tech Warfare Requires Electronic Footprints

The Hunt for ISIS Electronic Footprints in The Cloud

Acquiring electronic footprints, to enable the analysis and tagging of targets for remote-controlled and high-tech weapons has become a mainstream intelligence requirement.

electronic footprint

High Tech Warfare Requires Electronic Footprints

It's obvious that in recent years the leadership of most terror groups have become aware or were killed because they had an electronic footprint and could be tagged as targets. More and more these groups implement Missile Warning Systems and professional advanced countermeasures to prevent or disrupt the possibility of electronic footprints.


OSINT capabilities to gather electronic footprints seem strong. At least thousands of intelligence amateurs confirm that trawling social media and filtering networks for valued information creates a self-sustaining 'business'.

Creating a chaotic mix of information that:

- is already available because 'remember' that's why its called OSINT

- is created, induced, or leaked by 'professionals' to manipulate actors and reporters to confirm 'facts'

- is alleged, reported, interpreted, and analyzed by media, witnesses, spokespersons, officials, and experts

international communications in the days leading up to a high profile terror attack

Cloudular Network Tasks

Military and counter-terrorism
SOCOM, Military Intelligence professionals, that 'task network', determine  'valued' targets by integrating OSINT and HACKING with HUMINT and TECHINT into a 'Cloudular Network'. Giving special operation units access to (live) data streams to monitor and eliminate targets in their zone.

Not linear but cloudular
This means one asset will lead to others quickly and efficiently as we pull the various threads of information allowing clients to move in many directions at the same time, apply their AI Artificial Intelligence model, or follow one specific aspect if required.

Anti money laundering
Criminals hide their actions through a series of steps that make it look like money that came from illegal or unethical sources is earned legitimately.
Banks are shifting from rule-based software systems to Artificial Intelligence based systems which are more robust and intelligent to the patterns of (anti-) money laundering. To understand customer behavior Anti-Financial Crime Solutions use unsupervised learning techniques to drive intelligence gathering, investigations, and possible SAR filings.

Financing or funding terrorism groups can be researched by AI-FININT program, namely:
Kidnapping for ransom (cash-based transfers), extortion (cash-based transfers), drug- and human trafficking, and smuggling
- ID theft, credit card fraud, falsifications, trade-based money laundering (e.g. export and or used assets)
- Private donations and fundraising
- Misuse charitable organizations
- State sponsorship

international communications in the days leading up to a high profile terror attack

Counter Terrorism Cloudular Network Tasks:

- determine terrorist groups' logistics chains and supporters to identify nodes and support cells.

- identify the security and financial practices and people that terrorist groups apply to visitors to their battlegrounds such as journalists, businessmen, and recruits

- determine terrorist’s travel profiles, travel operations, and patterns of travel to the US, Europe, North Africa, Asia, and the Middle East

- provide electronic footprint on all aspects of the particular groups/individuals in Syria, Iraq, Iran, Afghanistan, Libya, and elsewhere as available

- develop additional assets to meet requirements as tasked

No Electronic Footprint Connects to al-Baghdadi

It appears that Baghdadi enforced 100% countermeasures to prevent all forms of identification through electronic footprints. Which until recently made it impossible to tag him for a precision strike. Developing HUMINT Inside his eco-system remained the only viable option to eventually tag him.

Turkey and the Kurds have a fast amount of HUMINT on, and assets in, ISIS. An ongoing AML Investigation into a financial nexus Terrorism - TOC (Transnational Organised Crime) revealed the connection of a human trafficker and a smuggler of armored cars in the logistics chains of ISIS and its leadership


Subsidiaries of international research organization with over 3280 experts in 69 countries
"We have the tools and resources. Managed appropriately we effectively monitor with impact assessments in place"


Ultrascan Financial Intelligence Unit A mixture of intelligence gathering, investigations, reputational risk mitigation and Innovative Technology in line of objectives. Focused on external information and stakeholder engagement, to detect exposure to financial crime risk.

Ultrascan Humint

Ultrascan HUMINT have extensive experience with identifying, locating, mapping, monitoring, analysing and predicting perpetrators of money laundering and the planning, funding, communications and support of terrorism.

Ultrascan KPO - Knowledge Process Outsourcing

Ultrascan KPO working with governments on the path of reform, providing support on areas of governance and implementation. We provide geopolitical and strategic advice to multinationals and institutional investors with investment opportunities.

Ultrascan Research BRAINS

Ultrascan Intelligence and Analysis BRAINS. Wander Around in our Detailed Global Interactive Research - Criminal and financial relationships visualized - Non-linear - networks of knowledge like you've never seen before - AML KYC FIU - Innovative Technology

Ultrascan Researsch Services

Amsterdam, Paris, Abuja