Destruction of Evidence and Perversion of the Course of Justice

By | KEY ARTICLES
destruction-of-evidence-and-perversion-of-the-course-of-justice-joseph-de-saram-rhodium-linkedin

Destruction of Evidence and Perversion of the Course of Justice (±x)

Published on 30th September 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
971

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

20171006 UPDATE – FORENSIC EVIDENCE CONFIRMING THIRD PARTIES

Notwithstanding the FACT that parties had OBVIOUSLY entered my house, and had stolen evidentiary materials, defences and counterclaims, one-time pads and extremely valuable patents, I was labelled as having hallucinations

Auditory and Visual Hallucinations

* * OBVIOUSLY IT IS NOT A HALLUCINATION IF THERE IS VOLUMINOUS FORENSIC EVIDENCE RELATING TO THE 12/17 FRAUD, WHICH CAN BE ANALYSED 650 DAYS...

by Edward de Saram (“EDS”) the Psychiatrist Fraudster.

Always on His Mind - Fraud By Omission

Background As part of the 12/17 Fraud Edward de Saram ("EDS") went around making disparaging remarks to all and sundry in order to fabricate a...

Forensic Evidence of Deliberate Compromise of Physical Security

I recorded this video on 17 December 2015, around the time of the visit of EDS. The video confirms irrefutably that the security poise of the house had already been seriously compromised, ahead of any further thefts and Crime Scene Construction and/or Fake Probable Cause.

20151220 201040

Despite my unlawful incarceration in a psychiatric facility, I was already reviewing statutes and procedures. This is a recording of the call between Aravinda Rajapakse and I – Aravinda actually saved my life, because I has been scheduled for torture via Electroconvulsive Therapy by EDS:-

Electroconvulsive Therapy and Psychiatric Fraud

[An interesting article for those involved with Derbyshire Healthcare NHS Foundation Trust, Derbyshire Community Health Services NHS Trust, Rotherham...

However there are two parts of the call that I want to refer to:-

(a) If a telecoms device can operate without a SIM card being present, then the presence of an IMSI-catcher is confirmed (which further proves my point about cellular interception yet again)

(b) Aravinda has seen a ‘big-made guy with a red colour shirt on’ in my house at the time that Praxy de Saram (“PDS”) is swearing blind that she was the only one there. This further confirms that unauthorised parties were in my house, and it confirms Criminal Breach of Trust by EDS and PDS !!

The video at the start of this article was recorded on 29 December 2015 and confirms the physical existence of someone else’s clothes in my property. This further confirms that parties have accessed my property and would explain the theft and/or planting of items and corroborates Aravinda’s calls as well.

It is clear that the clothes are associated with someone involved with NIBM, the National Institute of Business Management:-

NIBM

The National Institute of Business Management with its legacy of more than four decades in the business of training and development and its vision of becoming the best management education institute in Sri Lanka offers you unmatched opportunities in business, computer, languages and design. The stability of being a government institute...

It is clear that a student of NIBM would have the prerequisite ability to go through accounting and legal paperwork with a view to removing it, and denying me the use of y own items.

EDS’s Fraud conveniently facilitated the planting of evidence, which can be planted, photographed and then removed and I would be none the wiser!!

20171005 INITIAL

“Perverting the course of justice is an offence committed when a person prevents justice from being served on him/herself or on another party. In England and Wales it is a common law offence, carrying a maximum sentence of life imprisonment. Statutory versions of the offence exist in AustraliaCanadaHong KongIreland and New Zealand.”

England and Wales

Doing an act tending and intending to pervert the course of public justice[1] is an offence under the common law of England and Wales.

Perverting the course of justice can be any of three acts:

Also criminal are:

  1. conspiring with another to pervert the course of justice, and
  2. intending to pervert the course of justice

This offence, and the subject matter of the related forms of criminal conspiracy, have been referred to as:

  • Perverting the course of justice
  • Interfering with the administration of justice
  • Obstructing the administration of justice
  • Obstructing the course of justice
  • Defeating the due course of justice
  • Defeating the ends of justice
  • Effecting a public mischief[2]

This proliferation of alternative names is “somewhat confusing”.[3]

This offence is also sometimes referred to as “attempting to pervert the course of justice”. This is potentially misleading. An attempt to pervert the course of justice is a substantive common law offence and not an inchoate offence. It is not a form of the offence of attempt, and it would be erroneous to charge it as being contrary to section 1(1) of the Criminal Attempts Act 1981.[4]

This offence is triable only on indictment.[5]

Spoliation of Evidence

Quite a few of my articles have discussed the Spoliation of Evidence, and this has been a signature feature of all matters involving the Melbourne Fraudsters,

WLG and Melbourne Fraudsters Linked to Destruction of Evidence

20170611 EVIDENCE INSERTED In December 2014 I was the victim of a theft of data and destruction of evidentiary materials from my apartment, by a Sri ...

with even Eversheds Sutherland foolishly involving themselves:-

Eversheds Exposed in 'Destruction of Rhodium Evidence' Case

20170613 updates in progress - watch the above video in HD... In really simple terms, a SPECIFIC IP address 193.129.103.99 is associated with...

Referring to my article:-

James Bondage - Licensed to Spill

20170810 INITIAL - DRAFT UPLOADS IN PROGRESS As everyone knows I am James Bond however I my moniker is 001 instead of 007 because I never 'come from...

One attorney is Nick Sevdalis and I have hundreds of calls with him spilling the beans and using signature themes which confirms his involvement as an accessory after the fact. His ‘reasonable assessment’ of what is actually going on derives from an associated party (to the fraud) informing him of the information:-

As I stated “Unfortunately my idiot parents have got themselves involved, and there is plenty of evidence demonstrating.. you know they’re saying that no-one else was in the house, and the stuff is missing so, ergo it’s them.”

Sevdalis responds That’s right, I understand that whilst you’re out they have been in there… and documentation or records is missing, which have been taken.”

He pretends he does not know anything [for definite], but confirms his own theory “If your parents came and did that.. organised it and probably really directed it.. they were trying to have you shut away.. and then are they trying to look at.. someone trying to get your records to try and see what’s going on, they’re not sure… they don’t know?

Evidence from 17 December 2015

EDS and PDS ran this fraud, and were Acting in the Capacity of Agents of Law Enforcement and their stunt conveniently gave them Legal Guardianship and by stating that I did not have Mental Capacity, and they could give my ‘consent’ whenever they felt like it.

It was a massive fraud from start to finish and I have to admit that I was getting massively irritated by their antics in the previous days because I could blatantly see that they were up to something. They deliberately provoked me and and then videoed the results to cover their backsides – even this demonstrates criminal intent and desire to evade criminal culpability 🙂

Actually there was no Court Order for Treatment, but this was obvious, because I have known the pair of them for more than 45yrs and they lie all the time in such a dim way.

[insert article]

However this does confirm the real reason for the ridiculous fraud and this entire exercise was about unlawfully obtaining evidence and perverting the course of justice.

Callingham had fraudulently obtained my signature on the HMRC form, which would have given him, and/or a third party full access to my tax information globally. When I got the original form back from him after signing, it caused a problem.

So EDS turned up a few days after Callingham left and started planting things around the house so that they could be used as fake probable cause. When I identified this EDS started abusing me psychologically with his gas-lighting and saying I had a mental problem. Of course I got angry as would most people, when some donkey is irritating and continually lying to their face and trying to poison Shihara the Owl Cat!

DESTROYING MY EVIDENCE AND DEFENCE WAS A BAD MOVE…

HARMING THE OWL CAT WAS A COLOSSAL ERROR OF JUDGMENT!

Every morning when I came downstairs the house looked like a staged crime scene – I have some evidence on LinkedIn already! It was clearly Fake Probable Cause, and some sad attempt at Perverting the Course of Justice – nothing new of course.

Clearly an event had been planned for the following day 18 December 2015 and I could not be in the house on the day of the event. I was prevented from challenging the event, which I would of course done legally via an urgent interlocutory, or at the very least have independent attorneys as well as my own attorneys on-site to observe and record.

Planting of evidence is rife in corrupt countries such as Sri Lanka and countries such as Singapore and Bahamas where Sri Lankans get visas on arrival!

Their Search & Seizure would have been a failure because I am a Forensics Expert and sanitise all locations in any event – so should ‘evidence’ have been found then it would obviously not have been mine.

In this regard I would like my fingerprints and DNA to be demonstrated on such materials, together with a list of all DNA and all fingerprints to be disclosed. This includes packaging materials and boxes. The DNA has to actually come from the fingerprints, not a hair that ‘appears at the scene’ that old chestnut!

The following excerpt was obtained from the Nokia N8 of EDS. It features PDS asking EDS whether she should inform me of a Police Order as the basis I needed to be transferred to the hospital.

THIS MAKES NO SENSE WHATSOEVER IF THERE WERE ACTUALLY A LEGITIMATE HEALTH ISSUE.

PDS is confused about the Police Order of the following day, and the bogus mental health court order (which obviously did not exist) of the present day 17 December 2015.

* * THE TIME FOR FORENSICS * *

There are various features of the Overall Perversion of the Course of Justice. The Psychiatric Fraud facilitated five concepts:-

(a) A [fraudulent] basis to break down the front door of my house and compromise both physical and logical security completely;

(b) Allow the theft of evidentiary materials, defences, counterclaims and intellectual property, by various parties who could do as they pleased unchallenged and without any type of judicial oversight whatsoever;

(c) Unlawfully remove me from my property, amid a flurry of serious, life-threatening injuries;

(d) Prevent me from challenging any pseudo-legitimate judicial processes because I was physically not present to do so and also unaware;

(e) EDS fraudulently obtained my Legal Guardianship;

The foregoing is OBVIOUS from simply reviewing the series of events, and the fabricated position in relation to my mental health.

However I have successfully extracted the following recordings from the Nokia N8 of EDS.

The recordings confirm the CRIMINAL INTENT of fraudulently obtaining

(e) Legal Guardianship

20151212 234006 Excerpt 27

Here is one example, and I am uploading others:-

NXR – “[Ungoda Doctor] will tell you exactly, he will write it down and tell you… he will say if you are not there, who will be able to give that support regarding [guardianship]… you will need to sign something and give him.

* * IF EDS IS ABLE TO GIVE INSTRUCTIONS INSTEAD OF ME, THEN HE HAS OBVIOUSLY [FRAUDULENTLY] OBTAINED MY LEGAL GUARDIANSHIP. THE ENTIRE FRAUD WAS TO SAY THAT I EITHER HAD NO INSIGHT AND NO MENTAL CAPACITY TO MAKE MY OWN DECISIONS.

THAT IS ANOTHER FRAUD IN ITSELF, IN RELATION TO:-

(A) THE FABRICATION OF THAT POSITION OF MY STATE OF MIND;

(B) PREVENTING ME PROVIDING INFORMED CONSENT WHEN I WAS CLEARLY ABLE TO, AND WOULD HAVE DECLINED ELECTROCONVULSIVE THERAPY AND ANTIPSYCHOTICS ON THE BASIS OF CONTRAINDICATIONS AND ADVERSE REACTIONS (IMMEDIATELY FORSEEABLE DEATH) IF NOTHING ELSE

(C) FRAUDULENTLY OBTAINING MY LEGAL GUARDIANSHIP SO THAT MY ASSETS WOULD BE UNDER EDS’ CONTROL.

THIS ACTUALLY TIES IN WITH RAY CALLINGHAM AND HIS FRAUDULENT HMRC FORM WHICH WOULD HAVE OPENED SOME ASSET STRUCTURES. * *

(b) Evidentiary Materials, Defences and Counterclaims, and Intellectual Property

20151219 171114 Excerpt 05

EDS – “Getting people to be with us is not the problem, Praxy is here, and Diresh [Peiris]’s people [unclear], Gaya Pathikirikorale will send his driver…

NXR – “Right.

EDS – “So the problem is solved.

NXR – “Right.

EDS – “We know that your people are there in reserve…

* * THE CONSPIRATORIAL NATURE OF THE FRAUD AND ATTEMPTED MURDER IS EVIDENT, WITH ADDITIONAL ACCOMPLICES NAMED. WHY ARE PEOPLE ‘REQUIRED IN RESERVE’?

NXR – “Yeah.

EDS – “But the thing is, if you have a close group of people, otherwise there will be a lot of people coming and going, and it will become a bit difficult isn’t it?

* * WHY ARE A ‘CLOSE GROUP OF PEOPLE’ REQUIRED?

WHY WOULD THERE BE ‘A LOT OF PEOPLE COMING AND GOING’ WHICH MAKES THINGS DIFFICULT?

OBVIOUSLY THE LOT OF PEOPLE ARE THE ONES WHO HAVE STOLEN PAPERWORK AND STOLEN/WIPED 10TERABYTES OF FORENSIC EVIDENCE, MY DEFENCES AND COUNTERCLAIMS. * *

NXR – “Yeah.

EDS – “To keep tags on people.

* * WHY ARE TAGS REQUIRED TO BE KEPT ON PEOPLE VISITING MY HOME WHEN I AM NOT THERE? * *

NXR – “Yeah.

EDS – “So that is the situation, [Joe] doesn’t think that there is a problem.

* * REPEATING THE LIES THAT ‘JOE HAS NO INSIGHT’ FOOLS NO-ONE BUT THE PERPETRATORS !!

AS SUCH I WAS COMPLETELY CORRECT IN THE FACT THAT AN UNLAWFUL SEARCH & SEIZURE WAS ON THE CARDS!! THAT IN ITSELF DEMONSTRATES ‘JOE HAS INSIGHT’ * *

20151212 234006 Excerpt 39

An earlier recording between EDS and NXR confirms the ‘type of data’ that was stolen. EDS

It is rather bizarre that during a conversation about antipscyhotics and electroconvulsive therapy, that there is a clear expression of dissatisfaction with my legal matters.

EDS – “[Joe] has court cases, deadlines, have to pay lawyers…”

NXR – “Hmm.”

EDS – “That is the problem.”

* * THE DETERMINATION OF MY LEGAL CASES (WHICH WERE PROGRESSING, AND WOULD HAVE ULTIMATELY BEEN DECIDED IN MY FAVOUR) ARE NOT EDS’ CONCERN.

IF EDS DID NOT WANT TO PAY THE BILLS, THEN ALL HE HAD TO DO WAS NOT PAY THE BILLS. IT IS NOT UP TO HIM TO USE HIS DICHOTOMOUS THINKING TO DECIDE THAT IF HE DOES NOT WANT TO PAY THE FEES THE CASES MUST BE SABOTAGED.

BY WAY OF INFORMATION AFTER EDS CAUSED MY HEART ATTACK ON 18 MAY 2013 VIA HIS INTENTIONALLY-INFLICTED EMOTIONAL DISTRESS (“IIED”) HE SAID HE AGREED TO SUPPORT ME SO THAT I WOULD NOT SUE HIM. HE HAD ANOTHER INVESTIGATION FOR MALPRACTICE AT THAT TIME TOO. * *

The Bottom Line

This is the basis of my article about Parallel Construction:-

Evidence of Parallel Construction

20170324 INITIAL William Binney, an ex-NSA employee introduces the concept of Parallel Construction, in which information obtained unlawfully is...

Given the fact that these fraudsters have perverted the course of justice by facilitating the theft of my materials and/or their destruction by third parties by unlawful access and with no judicial oversight,

IF ANYONE WANTS TO SUE ME THEN FEEL FREE BUT ADD THESE JOKERS TO THE CLAIM AND GET THEM TO PAY UP. I AM ALREADY PREPARING APPLICATIONS FOR INTERLOCUTORIES TO THE EFFECT THAT THE WHOLE EDS/NXR/PDS FRAUD AND THE RELATED ONES AGAINST ME, ARE DETERMINED FIRST.

My parents have serious psychological deficiencies and absolutely no concept of boundaries, but I had no idea that they would attempt to murder me so that third parties could mess up my legal cases!!

THE IRONY IS THAT EDS’ PERVERSION OF THE COURSE OF JUSTICE AND FACILITATION OF DESTRUCTION OF LEGAL AND ACCOUNTING MATERIALS IS A LEGITIMATE DEFENCE FOR ME BEING UNABLE TO PROVIDE HISTORIC FINANCIAL INFORMATION SHOULD THERE BE AN APPLICATION MADE UNDER POCA 2002 ETC – WHAT DONKEYS!!

The case continues…

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

HackedIn

By | DATA EXFILTRATION
hackedin-joseph-de-saram-rhodium-linkedin

HackedIn (±x)

Published on 3rd September 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
797

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

Almost a year ago, I wrote the following article:-

Grand Theft Data v5

20161122 LATEST SERVER HACK FROM LITTLE BRITAIN Tania has been reporting a number of unauthorised accesses of her home computer (in Rotherham) over the past few weeks, and I review server logs from time to time in addition...

and having just re-read it I see that various audio recordings have been removed. Notwithstanding that, one of the issues relates to the hacking of my social media accounts.

Incoming Social Media Messages

As I have mentioned frequently, I do not read incoming messages on social media – there is no readily available audit trail in relation to the source of the messages, and of course those messages can be easily modified or deleted.

Additionally LinkedIn takes no steps to verify the profiles of its members either in terms of standard ID or verification of credentials.

Last Week

These screenshots are from 24 August 2017:-

and

showing over a hundred unread messages. The figure in the subsequent days was much higher due to ‘endorsing weekend’.

By way of information, ‘Linked Helper’ is a browser plugin which I have installed but not used.

Additional Sessions

On 28 August 2017 I was using LinkedIn via my Android Tablet and noticed an additional session which suddenly appeared, 9mins before 20:43 time:-

Close up:-

Blank Image

Evidence of Message Interception and/or Modification

The following screenshots from the following morning 29 August 2017 confirm that the number of unread messages have decreased:-

and

This is clearly the work of parties who have access to the internal interface of LinkedIn and/or able to use a specific IP address which the LinkedIn app can ignore, which results in no footprint – I reckon Law Enforcement or an Intelligence agency.

HOWEVER THIS CONFIRMS THE INHERENT UNRELIABILITY OF SOCIAL MEDIA AS AN INWARD COMMUNICATIONS MEDIUM

Restating of Contact Methods

On the front page of my LinkedIn profile

https://www.linkedin.com/in/jsrds/

the reliable methods for communicating with me are listed, and an excerpt of the text is:-

“Having enhanced our e-mail systems, general business-related contact can be made via [email protected] and friends can use [email protected] . You may use [email protected] for matters of a financial nature and [email protected] for legal issues. Contractors are responsible for handling e-mail and there are specific terms that need to be accepted first otherwise your e-mails will be rejected automatically at server level.”

“You may apply for access to the general e-mail system using https://secureform.luxsci.com/forms/17179/8622/lFz0/form.html . Legal issues can be resolved using https://secureform.luxsci.com/forms/17179/8624/W1zQ/form.html .”

“Incoming messages to social media accounts such as LinkedIn, Facebook and Twitter are not monitored for similar reasons because human resources are already stretched. Autoresponders have been removed to minimise backscatter bounce.”

“You may also use voice communications to speak to me directly due to the various hacking issues, caused by tortious interference and injurious falsehoods by fraudulent parties in Australia, Singapore, Sri Lanka and elsewhere.”

The Bottom Line

Frankly I am past caring about how the security services have become so politicized. But me being labelled as having Paranoid Schizophrenia and having my fundamental human rights withdrawn despite forensic evidence, is the utterly disgraceful part…

The case continues…

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

US Marines Also Suffered Data Rape

By | DATA EXFILTRATION
US Marines Also Suffered Data Rape

US Marines Also Suffered Data Rape (±x)

Published on 30th June 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
689

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

On 20 June 2017 I wrote the following article about a technique that I had coined ‘Data Rape’:-

The main thrust of the article was to demonstrate that I had been incapacitated on 22 October 2015 for the specific purpose of gaining access to Rhodium systems and to set up my home for electronic surveillance.

One of other references was another article that I had written involving the CIA.

Theft of Military Intelligence and Data

As it happens, this Data Rape method is a textbook technique which the CIA, various military agencies and even terrorists use as well. I have been looking for an article which confirms this technique being used by or against military personnel and I have located the following from the Miami Herald:-

The key paragraphs of this article are:-

“The report recommended that Marine Col. Roger T. McDuffie, a Harrier pilot who serves as the chief of operations at the unit known as MARFORSOUTH; Maj. Andrew L. Mueller, described as a theater security cooperation planner; and Maj. Mauricio Saenz, exercise planner, face “appropriate administrative or judicial proceedings.”

All three officers were involved in operational strategies.

“The investigation noted that at the start of their trip the Marines were briefed on “the specific hazard associated with local nationals utilizing the drug scopolamine to incapacitate and rob their victims.” It also found that, while all members of the delegation had taken Survival, Evasion, Resistance and Escape or SERE training, Mueller had not taken Anti-Terrorism Level 1 training, a prerequisite for travel to Colombia.”

and

“Somewhere along the way, according to the report, two of the men were slipped benzodiazepines, probably in their drinks. And all three drank aguardiente, a highly intoxicating Colombian liquor, before returning to their hotel with the four women. Subsequently, someone stole Mueller’s work laptop and iPhone 6 as well as McDuffie’s iPhone 6, all government-issued equipment. Mueller’s personal iPad and iPhone were also stolen, the report said, as were McDuffie’s personal iPhone and iPod and cash.

“It is impossible to know at what point Col. McDuffie and Maj. Mueller were poisoned by their companions or when the drugs took effect,” Farrell wrote in the report. “It is indisputable however that Col. McDuffie and Maj. Mueller placed themselves in a situation that directly resulted in being drugged, robbed, hospitalized and the loss of U.S. government property.”

and finally

Saenz apparently never blacked out and wasn’t drugged, according to the report. But he joined the other two as they “associated with women other than their spouses throughout the night, to include imbibing for a prolonged period of time, dancing with the women in public and being with them privately in their hotel rooms,” the investigation found. “This conduct is prejudicial to good order and discipline and constitutes conduct unbecoming an officer.”

Interpretation

Whilst it is poignant that government-issued equipment and military intelligence was stolen, using the similar method that was used on me on 22 October 2015, that is not the really interesting part of the account…

From the above and in particular the report of Marine Colonel Michael Farrell the theft of ‘Mueller’s laptop’ and the fact that Mueller had not undertaken ‘Anti-Terrorism Level 1 Training’ is something of deep concern to Farrell.

Mueller’s role was ‘theater security co-operation planner’. Theatre Security Co-operation Strategy (“TSCS”) means the documentation of a geographic combatant commander which plans, prioritise, and propose allocation of DoD resources across the full spectrum of military engagement within an area of operations.

Normally, the TSCS is augmented by individual plans for each country, routinely termed country campaign plans. The TSCS responds to the Office of the Secretary of Defence-level Security Cooperation Guidance and, when approved, serves as the roadmap for the execution of security co-operation activities by the combatant command staff, the component commands, and the assigned Security Co-operation Organisations (“SCOs”).

Three officers had gone out drinking yet only two of them were incapacitated. The third one Major Maurico Saenz was unaffected. I find this very odd, and it either suggests that he had foreknowledge of third parties wishing to incapacitate his colleagues, or it was he who incapacitated his colleagues.

Of course perhaps he simply did not drink the specific drinks containing the benzodiazepines but my experience of these types of operations would suggest otherwise.

But in any event if Saenz was with the other officers and “Saenz apparently never blacked out and wasn’t drugged, according to the report. But he joined the other two”, well duh – ask him exactly what happened, and who took the military hardware!! Or perhaps they do not want to know!

Drugs and Terrorism

Given the location of Bogota, Colombia, it would not surprise me about the terrorism aspect and the flow of money.

But in this particular incident which occurred on 03-04 February 2017, my theory is that there may be an ISIS connection and I am wondering if Saenz was a Filipino with Philippine connections?

What’s Long, Hard, and Full of Seamen ?

Obviously the US Marine Corp is a component of the US Department of the Navy, and recently the USS Fitzgerald (DDG 62) was involved in a ‘mysterious’ collision with a Philippine-flagged merchant vessel

Additionally the incident appears to have occurred at 01:30 whereas the notification by the crew of ACX Crystal to the Japanese Coastguard around an hour later at 02:20 was the first. The USS Fitzgerald did not communicate the collision for some reason…

The location of the collision appears to be a bit of a mystery but what is absolutely clear is that the US Navy is lying about a few things in relation to it. However from the above chart of the ACX Crystal the sharp right hand turn appears to be it!

What is also absolutely clear is that the Fitzgerald had no transponder track, as well as accounts of sailors who were having difficulty navigating in the area.

GPS Jamming?

Airborne Jamming?

US military tests massive GPS jamming weapon over California

Joe Jamming?

I am sure my peers in the AU Australian Signals Directorate ("ASD"), UK Government Communications Headquarters ("GCHQ") and US Central Intelligence...

Additionally the Fitzgerald should have given the right of way to the ACX Crystal which it did not do either – perhaps it was unable to do so?

Firstly the transponder being off for a military vessel is not significant. However the apparent lack of navigation and/or communications is an extremely interesting issue. Secondly it could have been dead in the water when ACX Crystal hit it.

A Communications Disruption Could Mean Only One Thing – INVASION

“The Arleigh Burke-class guided-missile destroyer USS Fitzgerald (DDG 62) arrived in Subic Bay for a brief port call that highlights the strong community and military connections between the Philippines and the United States, April 1.”

USS Fitzgerald arrives in Subic Bay for port visit

SUBIC BAY, Philippines - The Arleigh Burke-class guided-missile destroyer USS Fitzgerald (DDG 62) arrived in Subic Bay for a brief port call....

So for two days there were maintenance crew onboard and perhaps some stowaways as well? It would not be difficult to sabotage the gas turbines!

Arleigh Burke-class Guided Missile Destroyer

The Fitzgerald was fitted with the AEGIS Combat System, designed by Lockheed Martin:-

AEGIS

I of course have had dealings with guys from Martin Marietta in the early 1990s, the previous name of Lockheed Martin:-

AEGIS v KHIBINY

I will be able to validate the following when I am next in Hong Kong SAR 🙂 , but for the moment the USS Donald Cook (DDG 75) which is also an Arleigh Burke-class destroyer appears to have been incapacitated by a Russian directed energy weapon known as Khibiny:-

Veterans Today article

http://www.veteranstoday.com/2014/11/13/aegis-fail-in-black-sea-ruskies-burn-down-uss-donald-duck/

So if AEGIS has been rolled out among NATO allies, and the system can be compromised, then this is an extremely serious problem! This would be an excellent reason for the Navy to lie and act all dense!

Back to the Collision of the USS Fitzgerald

It would seem that communications were disabled or jammed, and my theory is that the Fitzgerald was either running slowly or dead in the water, and the ACX Crystal was informed where the Fitzgerald would be.

Given the theft of military intelligence in February 2017 as referred to above, collateralisation of the data would facilitate financing for this type of terrorist attack. As referenced ISIS have infiltrated the Philippines and the Fitzgerald itself stopped in Subic, Philippines which is public knowledge.

The Plot Thickens

A sailor onboard the USS Shiloh (CG 67), which incredibly was also operating in the Philippine Sea at the same time as the Fitzgerald, had gone missing on 08 June 2017. He was presumed to have fallen overboard, only to be found to be hiding in the engine room:-

https://news.usni.org/2017/06/15/uss-shiloh-sailor-found-alive-onboard-cruiser-week-went-missing

It is interesting that Peter Mims was a Gas Turbine Systems Technician (Mechanical) 3rd Class and he was the second sailor to have ‘fallen overboard’ in recent months.

https://news.usni.org/2017/06/09/sailor-missing-from-cruiser-uss-shiloh-in-philippine-sea-second-man-overboard-incident-this-week

So who was providing this technician with food and water whilst he was hiding? Were there others like him on other ships? Was there a saboteur onboard the Fitzgerald itself? I think yes!

Terrorism at Sea

I just find all these events which conveniently assist each other as if there were a predetermined goal, too coincidental, and in fact their combination is statistically improbable.

As such my theory based solely on the accounts of third parties (as opposed to my own evidence) would suggest that this was an act of terrorism, firstly to incapacitate the Fitzgerald and then secondly to have it rammed by a containership 4 times its size.

And how did they know about the Fitzgerald’s movements ahead of ramming? Well the exfiltration of data from Mueller (as referenced at the start of my article) who was the ‘theatre security co-operation planner’ suggests that Terrorists probably have the Theatre Security Co-operation Strategy in their back pockets!

Driving a containership into a destroyer is an interesting extension of driving a vehicle into pedestrians as we have seen recently in various European countries.

In one sense it is nice to see Filipinos take up careers outside the call center… But extrapolate the exfiltration of data and ISIS in the region and this situation extremely dangerous…

REMEMBER YOU SAW THIS FIRST ON JOE’S LINKEDIN !

The case continues…

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

Articles in this series:-

Just Because You're Paranoid

Summary This article is about blatant Fundamental Human Rights violations. It centres around my absolutely correct identification of MI5 overseeing the unlawful interception and storage of my data communications by NCIS in 1999/2000....

Listening In

I watched an interesting video of Tucker Carlson, in which he had Senator Jim Himes on his show. Senator Himes is a member of the Permanent Select...

Eversheds Exposed in ‘Destruction of Rhodium Evidence’ Case

By | DATA EXFILTRATION
eversheds-exposed-in-destruction-of-rhodium-evidence-case-joseph-de-saram-rhodium-linkedin

Eversheds Exposed in 'Destruction of Rhodium Evidence' Case (±x)

Published on 11th June 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
932

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

20170613 updates in progress – watch the above video in HD…

In really simple terms, a SPECIFIC IP address

193.129.103.99

is associated with multi-million dollar frauds perpetrated against Rhodium and I from at least 2014 onwards.

On 04 April 2017 Eversheds Sutherland purported to complete the e-mail access authorisation form

using the same 193.129.103.99 – this ip address is not on Eversheds’ assigned IP block obviously.

On 10 April 2017, Eversheds requested access again from 212.62.8.21 which is in their assigned block.

Norwich Pharmacal Order

Eversheds is necessarily WELL AWARE of the identity of the user of 193.129.103.99 as they permitted that party to fraudulently obtain access to Rhodium Systems under the guise of Eversheds. That party could have easily made a request itself but Eversheds chose to assist them obfuscate their identity instead.

I have pursued every other avenue for 2.5 years but I do not have full identities of the perpetrators for their crimes against me. Accordingly Eversheds is in the position that they can provide the information and it is required in the interests of justice, both to sue the correct perpetrators of the original frauds against me as well as injunct parties who are furthering the fraud and causing me losses in the present.

Clearly it is the intention of the other party to be able to e-mail me/us but not reveal its identity. This basis is extremely foolish, simply because I have already established the various parties and if I saw the e-mail then I would know anyway 🙂

Or perhaps they think it is somehow ‘magical’ to serve me via my lawyer? Another ridiculous basis as I love litigation and will deal with any case that is provided to me. The party concerned has deliberately sabotaged my other legal cases by tortiously interfering with my existing peeps under the pretext of ‘justice’ and/or deceiving them about me. These interference have obviously caused me even further significant losses and it is a type of self-victimisation on their part.

One of the parties appears to be Gowling WLG in any event, but I would like it confirmed by Eversheds as there are a whole host of conspirators involved in this multi-jurisdictional fraud and the leads vary at different times.

In any event Eversheds is the FACILITATOR which confirms that it is not merely a witness – or is ACCESSORY AFTER THE FACT the better term 🙂

Criminal Intent

Eversheds’ criminal intent has been to obfuscate the party concerned despite I advising Eversheds from January 2015 as to the fraud being perpetrated using that IP address. I now understand why the relationship changed in January 2015 when I instructed them to handle this matter.

The audio recordings alone from that time confirm a sudden and complete lack of interest to actually perform any useful work, though they were happy to charge for work that they simply had not performed.

In 2015 I thought Eversheds was merely negligent, but revisiting the facts in the light of new evidence demonstrates fraud. Even at that point they were continually defending the Melbourne Fraudsters and I found their behaviour ‘nauseating‘.

Signature Theme

This feature of ‘lawyers lying to me‘ was something I noticed from mid to late 2015 but actually Eversheds was demonstrating this signature theme from early 2015 and were the first.

I am uploading evidence presently which demonstrates that Eversheds, then and now, chose to assist parties evade criminal culpability and various other deceptions which are evident from voice recordings.

In fact the data theft of 2014 laundered into the current case is known as Parallel Construction. Its purpose it to obfuscate the true methods by which materials were [unlawfully] obtained. As such the various ex-parte applications for search and seizure were deficient. And coming after the original theft in 2014, they were Lawyers’ Constructs – as I have been saying continually 🙂

Solicitors Regulation Authority

It is always disappointing when a UK Firm acts in this manner…

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

PS This must be a significant post – my LinkedIn account was suspended on Monday and then my YouTube account was suspended yesterday 🙂

Further reading

From Kilobytes to Exabytes

By | COUNTER-TERRORISM
from-kilobytes-to-exabytes-joseph-de-saram-rhodium-linkedin

From Kilobytes to Exabytes (±x)

Published on 7th June 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
1018

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

This is a short article about the evolution of computing over 35yrs or so, as well as the latest forensic evidence confirming that the Psychiatric Facility Fraud was merely a cover for government-related destruction of evidence…

BBC Model B

In February 1983, a few days before my 11th birthday I received a birthday present of a BBC Model ‘B’ computer, with cool ‘red function keys’.

Costing GBP 415.00 it was purchased from Datron Micro in Sheffield – a lot of money in those days, and ironically the same week that I became a man thanks to a precocious girl in Elements ‘A’ 🙂

With my computer only having 32kb RAM Gregory Fell’s Commodore 64 seemed a lot better:-

and Robert Allsop’s 48kb Sinclair ZX Spectrum (complete with rubber keyboard) was better value for money.

However having only 32kb (usable RAM was even less at around 26kb) taught me to be extremely efficient. I typed every single program in the 400 page spiral-bound BASIC manual and by the age of 11 I knew the following languages:-

However having only 32kb (usable RAM was even less at around 26kb) taught me to be extremely efficient. I typed every single program in the 400 page spiral-bound BASIC manual and by the age of 11 I knew the following languages:-

BASIC [Beginner’s All-purpose Symbolic Instruction Code] (1982-2005)

PASCAL [a high level programming language] (1982-1990)

FORTRAN 77-90 [Formula Translating System] (1982-1990)

COBOL [Common Business-Oriented language] (1982-1990)

ADA [used by United States Department of Defense] (1982-1985)

ALGOL 68 [Algorithmic Language 1968] (1982-1985)

More info on http://www.jsrds.com/

A classmate Oliver Markie was a ridiculously impressive programmer, and he was better than me on the B B Cool as we called it, when he started at Barlborough Hall School a year later. But I am sure he remembers who was the better player at Sabre Wulf 🙂

BBC Master 128kb

By 1985 when we started at Mount St Mary’s College the memory size was now 128kb RAM – but quality of the programs was not 400% of the Model B.

Anthony Friery was the absolute expert on this machine and it was the one in the TV Studio that we used every day when Rev J F Grummit SJ was not around 🙂

Acorn Archimedes A410

By 1989 I had an A410 with 4Mb RAM – at Eckington School there were A3000 and Mr Tony Wareham’s classes were pretty enjoyable for Daniel Penny, Andy Davies, Mark Webber and I.

I will never forget the fact that Daniel always had pretty girls around him and Mark’s handbrake turns in his sky blue Hyundai Pony made the teachers mad 🙂

Gateway 2000 P5-166

Around 1992 I bought my first PC – it had 32Mb RAM

and the operating system was Windows for Workgroups 3.11:-

Around that time I was also using Unix System V Release 4 and my company Integrated Systems Research Ltd (“ISR”) had a contract with Vodafone in Newbury for Oracle RDBMS, through Comtex.

Sony Vaios, Toshiba Tecras and PCs

Nothing exciting about these but the Tecras were powerful and the Sonys were neoteric – 32Mb RAM

Department of Defense IBM T43

Around 2006 is when I was provided with my United States Department of Defense (“DoD”), actually it came via my handlers associated to the Defense Information Systems Agency (“DISA”). 2Gb RAM and Microsoft Windows XP

Cray XC30 Supercomputer

By 2013 my team’s cryptographic software was being tested on Cray XC30s – 128Tb RAM from memory (get it!)

Sadly I never got to see the system and time on it was very expensive, but I did see the test results which were VERY impressive 🙂

Bits and Bytes

1 Byte = 8 Bit

1 Kilobyte = 1,024 Bytes

1 Megabyte = 1,048,576 Bytes

1 Gigabyte = 1,073,741,824 Bytes

1 Terabyte = 1,099,511,627,776 Bytes

Storage

1 Terabyte (TB) = 1,099,511,627,776 Bytes (around 217 DVDs)

1 Petabyte (PB) = 1,125,899,906,842,624 Bytes (around 223,100 DVDs)

1 Exabyte (EB) = 1,152,921,504,606,846,976 Bytes (around 228,455,700 DVDs)

How big is a Petabyte, Exabyte, Zettabyte, or a Yottabyte? - High Scalability -

Rhodium & Co’s Data

Globally Rhodium and/or its associates stores around 25 Petabytes of data, equivalent to around 5,577,500 DVDs. Until 2014 I had a reasonable idea of where it was but lost knowledge of it thanks to the Melbourne Fraudsters and their bogus Security for Costs – long story…

Around 2.5 Petabytes is Sensitive Compartmented Information (“SCI”) at a level of CTSA or higher – there are many levels above Top Secret and I know of at least 20. CTSA stands for Cosmic Top Secret Atomal and much of it is Research & Development – certainly not stolen 🙂

Actually it comes under Restricted Rights:-

and you cannot steal something that you own, albeit the Special Purpose Vehicles own them of course 🙂

Unlike the CIA, Rhodium & Co’s data is looked after properly:-

Around 1.7 Petabytes is general commercial and/or operational data, and the remaining 20 Petabytes is one of the great mysteries of life 🙂

L666 AU MTC SLW DAB Syn

As I have mentioned continually, my house was ransacked and data deliberately wiped – thankfully none of the REALLY confidential stuff was present but various evidentiary materials for the Melbourne Fraudsters and their associates’ cases has been taken.

The folder ‘L666 AU MTC SLW DAB Syn’ relates squarely to them, namely:-

AU=Australia, MTC=Margaret Teresa Cunniffe, SLW=Sandra Lillian White, DAB=David Andrew Brown, SYN=Synergize Consulting Pty Ltd

For well over 500 days I have been recovering data and running scans across systems. A couple of weeks ago I was scanning a 4TB Hard drive which previously contained key evidentiary materials for judicial proceedings. The recovery software I have been using is R-Studio, very effective and reliable too.

To my absolute amazement the hard drive has been corrupted in such an incredible way as to completely mess up the drive geometry and even general reporting:-

How can -3287.55 Exabytes be stored in over 285 million files on a 4 Terabyte hard drive?

In the examples below, the path of L666 AU MTC SLW DAB Syn is clearly visible but the file sizes are all wrong and the data is corrupted:-

23.25 EB – excuse me?

3.00 EB?

768.00 TB in one file?

1.25 EB ?

Conclusion

I have only ever seen this type of corruption in highly classified forensic analysis typically involving counter-terrorism operations, so I am naturally surprised to see my home systems corrupted like this!!

My theory is HMRC/NCA Mobile Forensic peeps primarily but some aspects could be more akin to US / UK Military Intelligence which makes more sense given the other meaty forensic evidence that I have but have not disclosed 🙂

Clearly a tremendous amount of effort has gone into protecting the Melbourne Fraudsters and destroying my evidence against them and others.

However this is simply more information to confirm that I AM COMPLETELY CORRECT and was silenced because I know too much

The case continues…

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

How My Recovery’s Coming HMRC

By | DATA RECOVERY
How My Recovery's Coming HMRC

How My Recovery's Coming HMRC (±x)

Published on 3rd May 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
869

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

20170507 UPDATE – RAY CALLINGHAM HMRC FORM FRAUD EXPOSED / DONALD

EVIDENCE OF ‘DONALD’

20170503 INITIAL

I have been scanning drive surfaces continuously for nearly 500 days solid. It is an extremely laborious process and the main issues are drives overheating, and a massive concomitant reduction in speed.

I am unable to derive an income because (a) people wiped my data and (b) I am spending hours on this process. Clearly a claim would be acceptable for me to be restored to my original position, BUT FOR the antics of Edward de Saram and Gang.

Tools of the Trade

There are few tools that I have used over the years and I find EnCase Forensic the best for really hardcore assignments although I have not used it for a few years. However an extremely good product for straightforward data recovery off drive surfaces is R-Studio. The Network version is only USD 179.99 and I have found that the results are excellent.

Heavily Messing Rhodium’s Cases – HMRC

It’s really not looking good for HMRC as they are connected in so many ways to the theft of my evidence as well as destruction of data – and I am analysing evidence that their mobile forensics peeps (with the Tonbridge / Chemical Company connection) may have been the ones with the IMSI catchers…

Given the fact that HMRC are the party that processes HMRC forms, then my conclusions would be some cause of action involving HMRC, or a third party that wishes to bring a Private Prosecution against me, or as the investigative phase of a major case.

Full and Frank Disclosure

FaFD is a two-way street – I have evidence to demonstrate that the various warrants are deficient in so many ways, and of course the Parallel Construction which destroys the evidentiary trail for my opponents.

and I too have to ascertain the asset position as best as possible

Full and frank disclosure is the first commandment

In protection of the first commandment – the Court’s duty to draw adverse inferences. In the most recent judgment in the case of Al-Baker v Al-Baker [2016], deputy High Court Judge, Nicholas Cusworth QC hearing the case, drew adverse inferences in assessing the extent of the matrimonial pot, where the husband had failed to provide full and frank disclosure of his assets in financial remedy proceedings....

which is exactly that which I am doing too:-

By obtaining full independence in quantifying the accounting position:-

(a) my own assets are located and quantified (if they were to be frozen);

(b) the Rhodium accounting position (which confirms that I am completely correct and the balance sheets and/or income are valid and do not contain toxic and/or non-existent assets, as retards claim);

(c) the monies fraudulently-obtained by the Melbourne Fraudsters; and

(d) the quantification of damages against various parties such as Ahlers and Simon Vincent Breguet Thompson;

will all be confirmed – surely only a good thing. In fact those parties who are debtors of mine mean that their debts are my assets and any enforcement against me will only result in enforcement against them – something they have obviously not considered 🙂

And allowing overseas structures to be owned and/or controlled by UK entities is another good thing:-

(e) it facilitates the seizure/confiscation of the frozen assets in (a) and/or (b);

(f) allows me to have sufficient security for costs within the jurisdiction to go and hammer everyone in the most spectacular fashion possible 🙂

Clearly it is I who enjoys the stronger position and I am a great proponent of the doctrine of ‘Clean Hands’ in any event.

Every call that I have nowadays with everyone is designed to obtain some evidence – too little too late because I have evidence which will demolish any cases brought – and that is despite people stealing my immunity documents which is completely unfair and another classic perversion of the course of justice.

Ray Callingham and Beeley Hawley & Co

Ray Callingham was pushed by Edward de Saram and Praxy de Saram as the person who should provide the book-keeping service in order to regularise our accounts. Additionally he was responsible for the incorporation of three new entities in the UK, that I and other entities could transfer assets to.

I knew from the first trip that he was acting in the capacity of an Agent of Law Enforcement (“LE”) but it did not bother me, as I thought he would actually do some work. I recall he was asking me about various lawyers and banks and it was clear even from then that he was merely asking for my support infrastructure, so that Investigators could make a nuisance of themselves – which of course they did.

[insert evidence]

Even before he came, him sending me an e-mail telling me where I lived confirmed LE involvement – often parties get obsessed with documenting names of software during conversations, as well as addresses, amounts, urls so that it is confirmed. Many people started repeating that which I had said to them and it became really irritating.

[insert evidence]

One thing I noticed that Ray was really annoyed about was that he forgot to bring the HMRC Agent form on the first trip. He made such a fuss about it I wondered what the issue was because there were no sales in the UK or anticipated sales in the foreseeable future. We were in the process of obtaining asset inventories and missing paperwork for non-UK entities in any event.

[insert evidence]

Around November 2015 Ray and Kim Worrall were coming to scan the documentation and then work on them, since Joanne Cochrane and Kalasegaran Genkatharan (who are directors of Rhodium Australia Pty Ltd and Rhodium Singapore Pte Ltd had done f*** all during my heart issues).

I had been putting money into entities that I did not control and following their instructions to my detriment – my loan accounts are massive in fact, and I am owed tens of millions of dollars via my role as Financier! I have too much ‘skin the game’ to let this ‘one go through to the keeper’ 🙂

As Ray did not want to come unless it was Business Class, and I politely declined since Praxy de Saram was paying for the tickets. I recall he was adamant about Business Class. However he suddenly changed his mind and he and Kim were scheduled for the visit. I wondered why and when he came it was evident.

[insert evidence]

From the moment he came on 28 November 2015, I noticed Electromagnetic Emanation from the pair of them, in particular I thought it was Kim. Kim looked at me intently whilst I was speaking without moving her head, and Ray looked down. This is classic surveillance, in which two people have a conversation but only one looks – they also sit in a non-parallel fashion which caused to me to rotate my head continually. It was painful because of the recent accident and I am sure she was recording video 🙂

This is the part where I was talking about ‘Police Informant’ and work in which I ghostwrite Expert Testimony’ and I obviously recognised the surveillance so deliberately talked about a whole host of ‘key’ areas, such as Iain’s Jones’ case with his bank statements

[insert evidence]

(it reminded me of a project I did and I only realised when explaining it to Ray, and I was genuinely shocked):-

and the lights flickered EXACTLY as I predicted when I used keywords. Ray and Kim responded by saying ‘Kim did you see, that, the light flickered’ or words to that effect – classic LE!

Ray then wanted me to sign the HMRC Tax form – he wanted me to simply sign it and write nothing else, and he seemed agitated when I wanted to fill even Beeley Hawley on it etc. This confirmed that he wanted to keep options open or he was bringing the form for another party.

Ray continually told me that he would complete the other sections. The conclusion that could be drawn was that he was not the ultimate user of the Authorisation, and it was going to be completed with different information and faxed to third parties in multiple jurisdictions – really not rocket science. If he was the ultimate user he would have already completed the information. In fact he had one photocopy with all the information filled in but the original was blank – how could he then no know the information?

Data Recovery

In December 2016 I recovered the Beeley Hawley Audio and Video recordings – another one of those great mysterious of life is how they too have been deleted during Edward de Saram’s clean-up operation – there are some duplicates here and I am still recovering data. The updated screenshot will appear later

These audio recordings (hundreds of them) confirm the [fraudulent] misrepresentations made by Ray ahead of the visits, the deliverables he promised but reneged on, and most importantly confirms lack of a genuine interest to regularise our accounts. A simple Private Prosecution to recover the monies arising from Ray’s fraud would be good as I can get him into court for cross-examination.

As the calls went on, it became more of him wanting certain items in his particular order, rather than him doing the work thoroughly and obtaining the items in any event, but merely not in his order…

Around August 2016 I found the audio recordings of special interest, in which Ray asked me to sign the HMRC Authorisation on 29 November 2015, and I am in in the process of re-analysing these:-

Ray’s instruction to me was “Don’t date it because if they lose it then I will need to submit another one later on” – excuse me? What utter bullshit! If Ray has to submit another one later on then it would need to be another original.

Ray had to submit the original in order for it to be valid so how will not dating it make the slightest bit of difference. Why does Ray think HMRC will lose it? Or is it going to be a template with my signature on for every Corporate Entity and Trust, the number yet to be determined!! Seems like the ‘Gift that keeps on giving’! Basically the fraud would have been me sign the blank HMRC form which could be colour scanned and e-mailed all over the place.

Not wishing me to date it would have given two options of either 28 November 2015 or 29 November 2015, if the audio evidence and discussions from the previous day were going to be used. Classic Police and/or HMRC investigation thrown in 🙂

Ray had a bizarre interest in Taxation, Income and Payments, despite the fact that he is not qualified and/or licensed to give Taxation Advice for any of the jurisdictions in question. We had not even started the bookkeeping yet so how is taxation relevant? I had not earned for years so how was Income relevant? It was tiring though I was still polite (very unusual of me) after I cleverly identified his fraud 🙂

So I asked for the forms back, after Ray confirmed that they were effectively obsolete:-

And Ray was reluctant to, saying “Let me copy it as that will give me some information.” What information – the only thing is essentially my signature. Another bullshit excuse since it was he who typed the document and therefore he had his information already. I knew that that the form was going to be amended continually and faxed to third parties!

And of course the existence of a VAT Investigation against me in the late 1990s would allow my enemies to gather information and go on a fishing trip – Margaret Cunniffe is the liar at the heart of all this, obviously, and she does not know the actual position!

So after a while I simply told him that I knew what was going on. His guilty responses and how he subseqently slinked away was funny, but to truly appreciate you really had to have been there 🙂

This is still being written but I have tonnes of evidence and it will be ‘hammer time’ sooner rather than later 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

Grand Theft Data v5

By | DATA EXFILTRATION
Grand Theft Data

Grand Theft Data v5 (±x)

Published on 2 November 2016
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
1099

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

20161122 LATEST SERVER HACK FROM LITTLE BRITAIN

Tania has been reporting a number of unauthorised accesses of her home computer (in Rotherham) over the past few weeks, and I review server logs from time to time in addition.

Yesterday I reset the password for the [email protected] account, an address that is unmonitored and used for internal purposes [only] as we are running with the new domains of course. I have been connecting via POP3 as part of various testing that we are undertaking and in fact I spent time yesterday producing an new document in relation to e-mail procedures.

A few moments ago, I noticed that the server had been accessed in an unauthorised manner, in which my credentials had been obtained [without my permission] and were being fraudulently used to gain access to at least e-mail if nothing else.

The image above demonstrates an actor using IPv4 address 92.4.111.2 attempted to access an e-mail server. Using the POP3 protocol it is easy to remove the e-mails directly from the server and I would not be any the wiser.

A quick trace on the Registrant of the IP address shows Carphone Warehouse Broadband Services in Irlam.

So I wonder who was behind this? Irlam – where’s that – sounds ‘Up North’ somewhere:-

Salford AGAIN?? Did I not publish an article on LinkedIn on 18 September 2016 about inept investigators, as well as the song Matchstalk Men and Matchstalk Cats and Dogs, which has the lyrics “He painted SALFORD’S Smokey tops” in the very first line? I wonder why I wrote that 🙂

Tania has therefore decided to file a criminal complaint with South Yorkshire Police and I will increase the level of verbose logging on all Rhodium infrastructure. Getting a Norwich Pharmacal Order is extremely straightforward should Carphone Warehouse provide anything less than Full and Frank Disclosure since there is clear criminal cause of action against the user of the IP address.

Once we have the IP address we can simply track back through all them and all the perpetrators until the source is [re]confirmed – I already know who is behind this of course 🙂

And I can do the same for LinkedIn against those people sending contrived messages to me – we will write to them first and if the answer is deficient we will get their communications logs and also get an NPO against LinkedIn itself!!

E-mail Server Issues

Issues such as this the reason why I am not on e-mail presently – if someone sends me an e-mail and the e-mail is directly removed from the server without my knowledge then I will not see the e-mail. And every time I reset the password and then login, after a few hours the server is compromised again.

As such, I am only sending e-mails from my systems here, as I can get delivery confirmation from our servers directly. A copy of the e-mail itself is sitting in my Sent Items folder so that at least I have a copy of it. This does not work for Incoming Mail, as no e-mail will go to my Inbox if it has already been deleted off the server.

However from the perspective of the sender of the e-mail, they will have confirmation that their e-mail has been delivered. Accordingly it would be reasonable for them to expect a response from Rhodium.

I have noticed this issue for some time, and THIS is the reason we have put specific e-mail terms in place, as well as rejecting e-mails that are sent to obsolete addresses and those which are not specifically white-listed. I have communicated these issue to all our contacts via phone and e-mails (yes I have checked the SMTP logs and our messages have been delivered 🙂

Interestingly enough, this parallels the issue with my LinkedIn account below in which people want to send things and confirm that they have sent it and that I have received it. However, if I throw someone a cricket ball, I can guarantee that I have thrown it but not that they have or will catch it. What the perpetrators are doing is fraudulently stating that I am the recipient and I have caught it…

Given the fact that I have not communicated the password to anyone, including Tania, then the primary ways that this could have occurred is via:-

(a) SSL Decryption,

(b) ADSL Interception

Personally, the ADSL linespeed is shocking and nothing close to the bandwidth that should be coming – a poorly configured device between me and the ISP, or at the ISP would account for this. Having worked with people from Law Enforcement, these devices are never as passive as claimed, and the Man-In-The-Middle is always an extra mouth to feed 🙂

And this just happened, which appears to be a Session Hi-Jack:-

The Case Continues…

20161113 UPDATE ON MCDONALD SLATER & LAY / DAVID BROWN

I have continually referred to the fact that specific evidentiary material that is required for judicial proceedings has been deliberately wiped by parties associated and/or acting as agents for my adversaries.

A classic example of McDonald Slater & Lay’s (“MSL”) / Ian Slater / Simon Thompson’s propensity to pervert the course of justice by their Lawyer’s Constructs and bogus affidavits is presented here. There was a Security of Costs Hearing in February 2014 and ahead of that MSL has produced an affidavit which was classic lawyer’s construct. I have never seen a firm who actively disregards the rule of law – and employs the use of affidavits as a way of attaching credibility to their lies.

I wrote in response to the same ahead of the hearing but they and their Barrister John Werner preferred to perjure themselves in any event. I will explain this matter in more detail later..

However it is clear from this recording that it is in fact MSL is responsible for the lies, and have just fabricated a concept about Rhodium Australia Pty Ltd’s share capital (despite having no evidence).

In my experience it is the actual litigants that instruct the lawyers, not the other way around and MSL have this sad propensity to put words into the mouths of others, and draft affidavits which attempt to achieve the desired result, rather than a factual account of that which actually occurred to their clients! I must add Subornation of Perjury to the list of offences against MSL as we have some very interesting evidence that has been recovered 🙂

Trotters Independent Traders:-

Furthermore, I sent MSL two specific letters in relation to their lies and to this day they have not bothered to respond to either. Interestingly enough, the concepts of my Tax Returns and Defence work is contained in the same.

When I had decided to sue MSL, then that is when they and/or their agents started their smear campaign in August 2015.

Since MSL had no evidence to either substantiate their original bogus affidavit with which they obtained a security of costs or question the veracity of either my defence work and/or tax returns they began the Injurious Falsehoods campaign of branding me a criminal and getting classless individuals (many of those in Sri Lanka) to plant and steal various items. Obviously they were writing to the US State Department and various US Defence Contractors (I was informed) and I know the responses provided by them (if any) would have been the official non-committal ones which prove nothing either way 🙂

This is merely Simon Thompson’s way of producing a lot of irrelevant paperwork with names that allude to some type of importance/credibility for themselves.

Even my own lawyers have been contaminated and I am happy to report that they will receive their just desserts via some new sites which we are launching – once those audio recordings are uploaded then their licence to practise law will be severely compromised.

In fact it is my call recordings that will nail everyone, as well as the various logs we have demonstrating destruction of data from the United Kingdom as well as Singapore. Because our evidence is so powerful, adversaries say that they are fake or that I have edited them – their lies merely demonstrate the sad desperation of criminals 🙂

SYNERGIZE CONSULTING PTY LTD

Another example of destruction of data that is entirely relevant to David Brown / Margaret Cunniffe is their managing of Synergize Consulting Pty Ltd – a company that Rhodium Australia, Dr Daljit Gill and myself have judgments in excess of AUD 1.4 million.

David Brown and Margaret Cunniffe were contracting through Synergize and obtained significant funds from me and Rhodium Australia via theft and unjust enrichment. They instructed us to pay Synergize which confirms the real agreement, not this garbage about the purchase of 56-03 The Sail, which is a red herring. That agreement was superseded obviously 🙂

Whilst the David Brown judgment in the sum of around AUD 300,000 was obtained fraudulently (we are having it set aside in any event) the existence of a massive set-off which dwarfs his judgment is a serious problem for David Brown et al, and especially Law Enforcement who has also bought into the lies.

Rhodium Group restored Synergize Consulting to the Australian Securities and Investments Commission (“ASIC”) register around February 2015 and is preparing to sue its previous directors David Brown and Margaret Cunniffe for dereliction of duties and insolvent trading.

However, as part of the Synergize Fraud, David Brown and Margaret Cunniffe controlled Synergize as ‘de facto’ and ‘shadow’ directors respectively and their names did not appear on the ASIC record.

I did however have evidence but their associated parties deleted the files!!

However, today after around 2500 hours I have recovered the previous proof that David Brown was indeed the ‘de facto’ director and ultimately responsible for his failure to address the losses incurred by Synergize.

The screenshots presented here were obtained from one of our own laptops which David Brown and Margaret Cunniffe had been provided with for their contract work through their company Synergize. Software known as Sonar Central obtained the screenshots and evidence was obtained legally – Rhodium Contractor Terms specifically allow this 🙂

David Brown Pay Pal Account

In any event we also have the videos of their LinkedIn profiles, and the references to Synergize have been removed by them. It is a well-known fact that false exculpatory statements is a feature of criminal intent 🙂

November 2016:-

A few days before we commenced action against Synergize in January 2013:-

Warning

In view of the foregoing and the files which we have recovered, we have decided to bring charges of Theft, Fraud and Perversion of the Course of Justice and an enormous damages claim against the parties named in this articles.

Obviously all the evidence is not here but it should serve as a warning to others not to get involved with, or to join the cabal of the foregoing.

Should you have issues with any Rhodium entity then simply e-mail the addresses already provided and your matter will be resolved expediently – buying into the lies of these individuals will only result in your involvement in a multi-jurisdictional fraud.

And the irony is that is what these clowns accuse me of – and excellent example of Psychological Projection:-

“Psychological projection is a theory in psychology in which humans defend themselves against their own unconscious impulses or qualities (both positive and negative) by denying their existence in themselves while attributing them to others.”

20161105 UPDATE

I apologise for the typographical and syntax errors in the original post – I was having a ‘bad heart’ day’. I am making the corrections. Today’s update contains screenshots from my ADSL connection and they confirm the same thing.

From around May 2014 I noticed that my ADSL connection appeared to be on a leased circuit and I had millions of files (millions as in literally multiples of 1,000,000) and various items of evidence in my possession before they were conveniently stolen in December 2014 and December 2015.

Data exfiltration on a leased circuit is far more efficient, and it is extremely easy to modify rules in essentially realtime at the UK end. It is easy to see the wallpaper suddenly disappearing, keyboard slowing down for text input, as well as the keyboard layout change from ENG US to ENG UK 🙂

Much of the initial data gathering was blatantly unlawful, enumeration of network/nodes initially, installation of malware, indexing of files, keyword searches against files,

Files that are considered ‘of interest’ to the perpetrators have been copied and the sources often deleted (which facilitate modification at their end and they are able to then produce the only copy, which is not the original). Files which I would rely upon as a defence/counterclaim have been deliberately destroyed – however I have had some luck in recovering some and they will be presented at the appropriate time 🙂

Demonstration of the destruction of data is not difficult, simply because recovered data gives an indication of when files were last modified. If it was not accessible by normal means (via the usual filesystem applications) before the start of the data recovery process though afterwards files are obtained, then destruction is proven.

However. non-deliberate destruction of data can occur inadvertently and slack space often contains file fragments. This brings us onto Intent – often difficult to prove in a straightforward manner by direct means and this is where we have to rely upon circumstantial evidence, and really look at the big picture itself, essentially everything:-

(a) Seemingly unrelated unlawful acts occurring at the same time that would facilitate an Opportunity;

(b) Motives overtly/covertly demonstrated by seemingly unrelated parties.

On this point I can think of an excellent example – 9/11 . I was working on an Algorithmic Trading System (“robot trading”) for three specific clients in the World Trade Center, and my focus was the Disaster Recovery and Business Continuity Planning (“DR/BCP”).

I can recall from direct experience that there was around 0.25 trillion dollars of financial instruments that were coming up for maturity and 9/11 conveniently forced the Securities and Exchange Commission to completely relax its anti-money laundering protocols so that funds could be mobilised with the absolute minimum level of identity verification 🙂

As it happens I think this is the real reason for 9/11 and Mass Electronic Surveillance and Middle East/Oil is secondary to that..

From my own experience, being kidnapped and unlawfully imprisoned in a Psychiatric Facility on 12/17 whilst 10 terabytes of evidentiary data and materials was stolen is the same concept 🙂

Back to the Screenshots

These are the SHA-256 hashes of the ExpressVPN installer as well as the Hashing Tool used, known as Nirsoft HashMyFiles:-