HackedIn (±x)

Published on 3rd September 2017


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

Almost a year ago, I wrote the following article:-

Grand Theft Data v5

20161122 LATEST SERVER HACK FROM LITTLE BRITAIN Tania has been reporting a number of unauthorised accesses of her home computer (in Rotherham) over the past few weeks, and I review server logs from time to time in addition...

and having just re-read it I see that various audio recordings have been removed. Notwithstanding that, one of the issues relates to the hacking of my social media accounts.

Incoming Social Media Messages

As I have mentioned frequently, I do not read incoming messages on social media – there is no readily available audit trail in relation to the source of the messages, and of course those messages can be easily modified or deleted.

Additionally LinkedIn takes no steps to verify the profiles of its members either in terms of standard ID or verification of credentials.

Last Week

These screenshots are from 24 August 2017:-


showing over a hundred unread messages. The figure in the subsequent days was much higher due to ‘endorsing weekend’.

By way of information, ‘Linked Helper’ is a browser plugin which I have installed but not used.

Additional Sessions

On 28 August 2017 I was using LinkedIn via my Android Tablet and noticed an additional session which suddenly appeared, 9mins before 20:43 time:-

Close up:-

Blank Image

Evidence of Message Interception and/or Modification

The following screenshots from the following morning 29 August 2017 confirm that the number of unread messages have decreased:-


This is clearly the work of parties who have access to the internal interface of LinkedIn and/or able to use a specific IP address which the LinkedIn app can ignore, which results in no footprint – I reckon Law Enforcement or an Intelligence agency.


Restating of Contact Methods

On the front page of my LinkedIn profile


the reliable methods for communicating with me are listed, and an excerpt of the text is:-

“Having enhanced our e-mail systems, general business-related contact can be made via [email protected] and friends can use [email protected] . You may use [email protected] for matters of a financial nature and [email protected] for legal issues. Contractors are responsible for handling e-mail and there are specific terms that need to be accepted first otherwise your e-mails will be rejected automatically at server level.”

“You may apply for access to the general e-mail system using https://secureform.luxsci.com/forms/17179/8622/lFz0/form.html . Legal issues can be resolved using https://secureform.luxsci.com/forms/17179/8624/W1zQ/form.html .”

“Incoming messages to social media accounts such as LinkedIn, Facebook and Twitter are not monitored for similar reasons because human resources are already stretched. Autoresponders have been removed to minimise backscatter bounce.”

“You may also use voice communications to speak to me directly due to the various hacking issues, caused by tortious interference and injurious falsehoods by fraudulent parties in Australia, Singapore, Sri Lanka and elsewhere.”

The Bottom Line

Frankly I am past caring about how the security services have become so politicized. But me being labelled as having Paranoid Schizophrenia and having my fundamental human rights withdrawn despite forensic evidence, is the utterly disgraceful part…

The case continues…



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

US Marines Also Suffered Data Rape

US Marines Also Suffered Data Rape

US Marines Also Suffered Data Rape (±x)

Published on 30th June 2017


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

On 20 June 2017 I wrote the following article about a technique that I had coined ‘Data Rape’:-

The main thrust of the article was to demonstrate that I had been incapacitated on 22 October 2015 for the specific purpose of gaining access to Rhodium systems and to set up my home for electronic surveillance.

One of other references was another article that I had written involving the CIA.

Theft of Military Intelligence and Data

As it happens, this Data Rape method is a textbook technique which the CIA, various military agencies and even terrorists use as well. I have been looking for an article which confirms this technique being used by or against military personnel and I have located the following from the Miami Herald:-

The key paragraphs of this article are:-

“The report recommended that Marine Col. Roger T. McDuffie, a Harrier pilot who serves as the chief of operations at the unit known as MARFORSOUTH; Maj. Andrew L. Mueller, described as a theater security cooperation planner; and Maj. Mauricio Saenz, exercise planner, face “appropriate administrative or judicial proceedings.”

All three officers were involved in operational strategies.

“The investigation noted that at the start of their trip the Marines were briefed on “the specific hazard associated with local nationals utilizing the drug scopolamine to incapacitate and rob their victims.” It also found that, while all members of the delegation had taken Survival, Evasion, Resistance and Escape or SERE training, Mueller had not taken Anti-Terrorism Level 1 training, a prerequisite for travel to Colombia.”


“Somewhere along the way, according to the report, two of the men were slipped benzodiazepines, probably in their drinks. And all three drank aguardiente, a highly intoxicating Colombian liquor, before returning to their hotel with the four women. Subsequently, someone stole Mueller’s work laptop and iPhone 6 as well as McDuffie’s iPhone 6, all government-issued equipment. Mueller’s personal iPad and iPhone were also stolen, the report said, as were McDuffie’s personal iPhone and iPod and cash.

“It is impossible to know at what point Col. McDuffie and Maj. Mueller were poisoned by their companions or when the drugs took effect,” Farrell wrote in the report. “It is indisputable however that Col. McDuffie and Maj. Mueller placed themselves in a situation that directly resulted in being drugged, robbed, hospitalized and the loss of U.S. government property.”

and finally

Saenz apparently never blacked out and wasn’t drugged, according to the report. But he joined the other two as they “associated with women other than their spouses throughout the night, to include imbibing for a prolonged period of time, dancing with the women in public and being with them privately in their hotel rooms,” the investigation found. “This conduct is prejudicial to good order and discipline and constitutes conduct unbecoming an officer.”


Whilst it is poignant that government-issued equipment and military intelligence was stolen, using the similar method that was used on me on 22 October 2015, that is not the really interesting part of the account…

From the above and in particular the report of Marine Colonel Michael Farrell the theft of ‘Mueller’s laptop’ and the fact that Mueller had not undertaken ‘Anti-Terrorism Level 1 Training’ is something of deep concern to Farrell.

Mueller’s role was ‘theater security co-operation planner’. Theatre Security Co-operation Strategy (“TSCS”) means the documentation of a geographic combatant commander which plans, prioritise, and propose allocation of DoD resources across the full spectrum of military engagement within an area of operations.

Normally, the TSCS is augmented by individual plans for each country, routinely termed country campaign plans. The TSCS responds to the Office of the Secretary of Defence-level Security Cooperation Guidance and, when approved, serves as the roadmap for the execution of security co-operation activities by the combatant command staff, the component commands, and the assigned Security Co-operation Organisations (“SCOs”).

Three officers had gone out drinking yet only two of them were incapacitated. The third one Major Maurico Saenz was unaffected. I find this very odd, and it either suggests that he had foreknowledge of third parties wishing to incapacitate his colleagues, or it was he who incapacitated his colleagues.

Of course perhaps he simply did not drink the specific drinks containing the benzodiazepines but my experience of these types of operations would suggest otherwise.

But in any event if Saenz was with the other officers and “Saenz apparently never blacked out and wasn’t drugged, according to the report. But he joined the other two”, well duh – ask him exactly what happened, and who took the military hardware!! Or perhaps they do not want to know!

Drugs and Terrorism

Given the location of Bogota, Colombia, it would not surprise me about the terrorism aspect and the flow of money.

But in this particular incident which occurred on 03-04 February 2017, my theory is that there may be an ISIS connection and I am wondering if Saenz was a Filipino with Philippine connections?

What’s Long, Hard, and Full of Seamen ?

Obviously the US Marine Corp is a component of the US Department of the Navy, and recently the USS Fitzgerald (DDG 62) was involved in a ‘mysterious’ collision with a Philippine-flagged merchant vessel

Additionally the incident appears to have occurred at 01:30 whereas the notification by the crew of ACX Crystal to the Japanese Coastguard around an hour later at 02:20 was the first. The USS Fitzgerald did not communicate the collision for some reason…

The location of the collision appears to be a bit of a mystery but what is absolutely clear is that the US Navy is lying about a few things in relation to it. However from the above chart of the ACX Crystal the sharp right hand turn appears to be it!

What is also absolutely clear is that the Fitzgerald had no transponder track, as well as accounts of sailors who were having difficulty navigating in the area.

GPS Jamming?

Airborne Jamming?

US military tests massive GPS jamming weapon over California

Joe Jamming?

I am sure my peers in the AU Australian Signals Directorate ("ASD"), UK Government Communications Headquarters ("GCHQ") and US Central Intelligence...

Additionally the Fitzgerald should have given the right of way to the ACX Crystal which it did not do either – perhaps it was unable to do so?

Firstly the transponder being off for a military vessel is not significant. However the apparent lack of navigation and/or communications is an extremely interesting issue. Secondly it could have been dead in the water when ACX Crystal hit it.

A Communications Disruption Could Mean Only One Thing – INVASION

“The Arleigh Burke-class guided-missile destroyer USS Fitzgerald (DDG 62) arrived in Subic Bay for a brief port call that highlights the strong community and military connections between the Philippines and the United States, April 1.”

USS Fitzgerald arrives in Subic Bay for port visit

SUBIC BAY, Philippines - The Arleigh Burke-class guided-missile destroyer USS Fitzgerald (DDG 62) arrived in Subic Bay for a brief port call....

So for two days there were maintenance crew onboard and perhaps some stowaways as well? It would not be difficult to sabotage the gas turbines!

Arleigh Burke-class Guided Missile Destroyer

The Fitzgerald was fitted with the AEGIS Combat System, designed by Lockheed Martin:-


I of course have had dealings with guys from Martin Marietta in the early 1990s, the previous name of Lockheed Martin:-


I will be able to validate the following when I am next in Hong Kong SAR 🙂 , but for the moment the USS Donald Cook (DDG 75) which is also an Arleigh Burke-class destroyer appears to have been incapacitated by a Russian directed energy weapon known as Khibiny:-

Veterans Today article


So if AEGIS has been rolled out among NATO allies, and the system can be compromised, then this is an extremely serious problem! This would be an excellent reason for the Navy to lie and act all dense!

Back to the Collision of the USS Fitzgerald

It would seem that communications were disabled or jammed, and my theory is that the Fitzgerald was either running slowly or dead in the water, and the ACX Crystal was informed where the Fitzgerald would be.

Given the theft of military intelligence in February 2017 as referred to above, collateralisation of the data would facilitate financing for this type of terrorist attack. As referenced ISIS have infiltrated the Philippines and the Fitzgerald itself stopped in Subic, Philippines which is public knowledge.

The Plot Thickens

A sailor onboard the USS Shiloh (CG 67), which incredibly was also operating in the Philippine Sea at the same time as the Fitzgerald, had gone missing on 08 June 2017. He was presumed to have fallen overboard, only to be found to be hiding in the engine room:-


It is interesting that Peter Mims was a Gas Turbine Systems Technician (Mechanical) 3rd Class and he was the second sailor to have ‘fallen overboard’ in recent months.


So who was providing this technician with food and water whilst he was hiding? Were there others like him on other ships? Was there a saboteur onboard the Fitzgerald itself? I think yes!

Terrorism at Sea

I just find all these events which conveniently assist each other as if there were a predetermined goal, too coincidental, and in fact their combination is statistically improbable.

As such my theory based solely on the accounts of third parties (as opposed to my own evidence) would suggest that this was an act of terrorism, firstly to incapacitate the Fitzgerald and then secondly to have it rammed by a containership 4 times its size.

And how did they know about the Fitzgerald’s movements ahead of ramming? Well the exfiltration of data from Mueller (as referenced at the start of my article) who was the ‘theatre security co-operation planner’ suggests that Terrorists probably have the Theatre Security Co-operation Strategy in their back pockets!

Driving a containership into a destroyer is an interesting extension of driving a vehicle into pedestrians as we have seen recently in various European countries.

In one sense it is nice to see Filipinos take up careers outside the call center… But extrapolate the exfiltration of data and ISIS in the region and this situation extremely dangerous…


The case continues…



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Articles in this series:-

Just Because You're Paranoid

Summary This article is about blatant Fundamental Human Rights violations. It centres around my absolutely correct identification of MI5 overseeing the unlawful interception and storage of my data communications by NCIS in 1999/2000....

Listening In

I watched an interesting video of Tucker Carlson, in which he had Senator Jim Himes on his show. Senator Himes is a member of the Permanent Select...

Eversheds Exposed in ‘Destruction of Rhodium Evidence’ Case


Eversheds Exposed in 'Destruction of Rhodium Evidence' Case (±x)

Published on 11th June 2017


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

20170613 updates in progress – watch the above video in HD…

In really simple terms, a SPECIFIC IP address

is associated with multi-million dollar frauds perpetrated against Rhodium and I from at least 2014 onwards.

On 04 April 2017 Eversheds Sutherland purported to complete the e-mail access authorisation form

using the same – this ip address is not on Eversheds’ assigned IP block obviously.

On 10 April 2017, Eversheds requested access again from which is in their assigned block.

Norwich Pharmacal Order

Eversheds is necessarily WELL AWARE of the identity of the user of as they permitted that party to fraudulently obtain access to Rhodium Systems under the guise of Eversheds. That party could have easily made a request itself but Eversheds chose to assist them obfuscate their identity instead.

I have pursued every other avenue for 2.5 years but I do not have full identities of the perpetrators for their crimes against me. Accordingly Eversheds is in the position that they can provide the information and it is required in the interests of justice, both to sue the correct perpetrators of the original frauds against me as well as injunct parties who are furthering the fraud and causing me losses in the present.

Clearly it is the intention of the other party to be able to e-mail me/us but not reveal its identity. This basis is extremely foolish, simply because I have already established the various parties and if I saw the e-mail then I would know anyway 🙂

Or perhaps they think it is somehow ‘magical’ to serve me via my lawyer? Another ridiculous basis as I love litigation and will deal with any case that is provided to me. The party concerned has deliberately sabotaged my other legal cases by tortiously interfering with my existing peeps under the pretext of ‘justice’ and/or deceiving them about me. These interference have obviously caused me even further significant losses and it is a type of self-victimisation on their part.

One of the parties appears to be Gowling WLG in any event, but I would like it confirmed by Eversheds as there are a whole host of conspirators involved in this multi-jurisdictional fraud and the leads vary at different times.

In any event Eversheds is the FACILITATOR which confirms that it is not merely a witness – or is ACCESSORY AFTER THE FACT the better term 🙂

Criminal Intent

Eversheds’ criminal intent has been to obfuscate the party concerned despite I advising Eversheds from January 2015 as to the fraud being perpetrated using that IP address. I now understand why the relationship changed in January 2015 when I instructed them to handle this matter.

The audio recordings alone from that time confirm a sudden and complete lack of interest to actually perform any useful work, though they were happy to charge for work that they simply had not performed.

In 2015 I thought Eversheds was merely negligent, but revisiting the facts in the light of new evidence demonstrates fraud. Even at that point they were continually defending the Melbourne Fraudsters and I found their behaviour ‘nauseating‘.

Signature Theme

This feature of ‘lawyers lying to me‘ was something I noticed from mid to late 2015 but actually Eversheds was demonstrating this signature theme from early 2015 and were the first.

I am uploading evidence presently which demonstrates that Eversheds, then and now, chose to assist parties evade criminal culpability and various other deceptions which are evident from voice recordings.

In fact the data theft of 2014 laundered into the current case is known as Parallel Construction. Its purpose it to obfuscate the true methods by which materials were [unlawfully] obtained. As such the various ex-parte applications for search and seizure were deficient. And coming after the original theft in 2014, they were Lawyers’ Constructs – as I have been saying continually 🙂

Solicitors Regulation Authority

It is always disappointing when a UK Firm acts in this manner…



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

PS This must be a significant post – my LinkedIn account was suspended on Monday and then my YouTube account was suspended yesterday 🙂

Further reading

Grand Theft Data v5

Grand Theft Data

Grand Theft Data v5 (±x)

Published on 2 November 2016


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE


Tania has been reporting a number of unauthorised accesses of her home computer (in Rotherham) over the past few weeks, and I review server logs from time to time in addition.

Yesterday I reset the password for the [email protected] account, an address that is unmonitored and used for internal purposes [only] as we are running with the new domains of course. I have been connecting via POP3 as part of various testing that we are undertaking and in fact I spent time yesterday producing an new document in relation to e-mail procedures.

A few moments ago, I noticed that the server had been accessed in an unauthorised manner, in which my credentials had been obtained [without my permission] and were being fraudulently used to gain access to at least e-mail if nothing else.

The image above demonstrates an actor using IPv4 address attempted to access an e-mail server. Using the POP3 protocol it is easy to remove the e-mails directly from the server and I would not be any the wiser.

A quick trace on the Registrant of the IP address shows Carphone Warehouse Broadband Services in Irlam.

So I wonder who was behind this? Irlam – where’s that – sounds ‘Up North’ somewhere:-

Salford AGAIN?? Did I not publish an article on LinkedIn on 18 September 2016 about inept investigators, as well as the song Matchstalk Men and Matchstalk Cats and Dogs, which has the lyrics “He painted SALFORD’S Smokey tops” in the very first line? I wonder why I wrote that 🙂

Tania has therefore decided to file a criminal complaint with South Yorkshire Police and I will increase the level of verbose logging on all Rhodium infrastructure. Getting a Norwich Pharmacal Order is extremely straightforward should Carphone Warehouse provide anything less than Full and Frank Disclosure since there is clear criminal cause of action against the user of the IP address.

Once we have the IP address we can simply track back through all them and all the perpetrators until the source is [re]confirmed – I already know who is behind this of course 🙂

And I can do the same for LinkedIn against those people sending contrived messages to me – we will write to them first and if the answer is deficient we will get their communications logs and also get an NPO against LinkedIn itself!!

E-mail Server Issues

Issues such as this the reason why I am not on e-mail presently – if someone sends me an e-mail and the e-mail is directly removed from the server without my knowledge then I will not see the e-mail. And every time I reset the password and then login, after a few hours the server is compromised again.

As such, I am only sending e-mails from my systems here, as I can get delivery confirmation from our servers directly. A copy of the e-mail itself is sitting in my Sent Items folder so that at least I have a copy of it. This does not work for Incoming Mail, as no e-mail will go to my Inbox if it has already been deleted off the server.

However from the perspective of the sender of the e-mail, they will have confirmation that their e-mail has been delivered. Accordingly it would be reasonable for them to expect a response from Rhodium.

I have noticed this issue for some time, and THIS is the reason we have put specific e-mail terms in place, as well as rejecting e-mails that are sent to obsolete addresses and those which are not specifically white-listed. I have communicated these issue to all our contacts via phone and e-mails (yes I have checked the SMTP logs and our messages have been delivered 🙂

Interestingly enough, this parallels the issue with my LinkedIn account below in which people want to send things and confirm that they have sent it and that I have received it. However, if I throw someone a cricket ball, I can guarantee that I have thrown it but not that they have or will catch it. What the perpetrators are doing is fraudulently stating that I am the recipient and I have caught it…

Given the fact that I have not communicated the password to anyone, including Tania, then the primary ways that this could have occurred is via:-

(a) SSL Decryption,

(b) ADSL Interception

Personally, the ADSL linespeed is shocking and nothing close to the bandwidth that should be coming – a poorly configured device between me and the ISP, or at the ISP would account for this. Having worked with people from Law Enforcement, these devices are never as passive as claimed, and the Man-In-The-Middle is always an extra mouth to feed 🙂

And this just happened, which appears to be a Session Hi-Jack:-

The Case Continues…


I have continually referred to the fact that specific evidentiary material that is required for judicial proceedings has been deliberately wiped by parties associated and/or acting as agents for my adversaries.

A classic example of McDonald Slater & Lay’s (“MSL”) / Ian Slater / Simon Thompson’s propensity to pervert the course of justice by their Lawyer’s Constructs and bogus affidavits is presented here. There was a Security of Costs Hearing in February 2014 and ahead of that MSL has produced an affidavit which was classic lawyer’s construct. I have never seen a firm who actively disregards the rule of law – and employs the use of affidavits as a way of attaching credibility to their lies.

I wrote in response to the same ahead of the hearing but they and their Barrister John Werner preferred to perjure themselves in any event. I will explain this matter in more detail later..

However it is clear from this recording that it is in fact MSL is responsible for the lies, and have just fabricated a concept about Rhodium Australia Pty Ltd’s share capital (despite having no evidence).

In my experience it is the actual litigants that instruct the lawyers, not the other way around and MSL have this sad propensity to put words into the mouths of others, and draft affidavits which attempt to achieve the desired result, rather than a factual account of that which actually occurred to their clients! I must add Subornation of Perjury to the list of offences against MSL as we have some very interesting evidence that has been recovered 🙂

Trotters Independent Traders:-

Furthermore, I sent MSL two specific letters in relation to their lies and to this day they have not bothered to respond to either. Interestingly enough, the concepts of my Tax Returns and Defence work is contained in the same.

When I had decided to sue MSL, then that is when they and/or their agents started their smear campaign in August 2015.

Since MSL had no evidence to either substantiate their original bogus affidavit with which they obtained a security of costs or question the veracity of either my defence work and/or tax returns they began the Injurious Falsehoods campaign of branding me a criminal and getting classless individuals (many of those in Sri Lanka) to plant and steal various items. Obviously they were writing to the US State Department and various US Defence Contractors (I was informed) and I know the responses provided by them (if any) would have been the official non-committal ones which prove nothing either way 🙂

This is merely Simon Thompson’s way of producing a lot of irrelevant paperwork with names that allude to some type of importance/credibility for themselves.

Even my own lawyers have been contaminated and I am happy to report that they will receive their just desserts via some new sites which we are launching – once those audio recordings are uploaded then their licence to practise law will be severely compromised.

In fact it is my call recordings that will nail everyone, as well as the various logs we have demonstrating destruction of data from the United Kingdom as well as Singapore. Because our evidence is so powerful, adversaries say that they are fake or that I have edited them – their lies merely demonstrate the sad desperation of criminals 🙂


Another example of destruction of data that is entirely relevant to David Brown / Margaret Cunniffe is their managing of Synergize Consulting Pty Ltd – a company that Rhodium Australia, Dr Daljit Gill and myself have judgments in excess of AUD 1.4 million.

David Brown and Margaret Cunniffe were contracting through Synergize and obtained significant funds from me and Rhodium Australia via theft and unjust enrichment. They instructed us to pay Synergize which confirms the real agreement, not this garbage about the purchase of 56-03 The Sail, which is a red herring. That agreement was superseded obviously 🙂

Whilst the David Brown judgment in the sum of around AUD 300,000 was obtained fraudulently (we are having it set aside in any event) the existence of a massive set-off which dwarfs his judgment is a serious problem for David Brown et al, and especially Law Enforcement who has also bought into the lies.

Rhodium Group restored Synergize Consulting to the Australian Securities and Investments Commission (“ASIC”) register around February 2015 and is preparing to sue its previous directors David Brown and Margaret Cunniffe for dereliction of duties and insolvent trading.

However, as part of the Synergize Fraud, David Brown and Margaret Cunniffe controlled Synergize as ‘de facto’ and ‘shadow’ directors respectively and their names did not appear on the ASIC record.

I did however have evidence but their associated parties deleted the files!!

However, today after around 2500 hours I have recovered the previous proof that David Brown was indeed the ‘de facto’ director and ultimately responsible for his failure to address the losses incurred by Synergize.

The screenshots presented here were obtained from one of our own laptops which David Brown and Margaret Cunniffe had been provided with for their contract work through their company Synergize. Software known as Sonar Central obtained the screenshots and evidence was obtained legally – Rhodium Contractor Terms specifically allow this 🙂

David Brown Pay Pal Account

In any event we also have the videos of their LinkedIn profiles, and the references to Synergize have been removed by them. It is a well-known fact that false exculpatory statements is a feature of criminal intent 🙂

November 2016:-

A few days before we commenced action against Synergize in January 2013:-


In view of the foregoing and the files which we have recovered, we have decided to bring charges of Theft, Fraud and Perversion of the Course of Justice and an enormous damages claim against the parties named in this articles.

Obviously all the evidence is not here but it should serve as a warning to others not to get involved with, or to join the cabal of the foregoing.

Should you have issues with any Rhodium entity then simply e-mail the addresses already provided and your matter will be resolved expediently – buying into the lies of these individuals will only result in your involvement in a multi-jurisdictional fraud.

And the irony is that is what these clowns accuse me of – and excellent example of Psychological Projection:-

“Psychological projection is a theory in psychology in which humans defend themselves against their own unconscious impulses or qualities (both positive and negative) by denying their existence in themselves while attributing them to others.”

20161105 UPDATE

I apologise for the typographical and syntax errors in the original post – I was having a ‘bad heart’ day’. I am making the corrections. Today’s update contains screenshots from my ADSL connection and they confirm the same thing.

From around May 2014 I noticed that my ADSL connection appeared to be on a leased circuit and I had millions of files (millions as in literally multiples of 1,000,000) and various items of evidence in my possession before they were conveniently stolen in December 2014 and December 2015.

Data exfiltration on a leased circuit is far more efficient, and it is extremely easy to modify rules in essentially realtime at the UK end. It is easy to see the wallpaper suddenly disappearing, keyboard slowing down for text input, as well as the keyboard layout change from ENG US to ENG UK 🙂

Much of the initial data gathering was blatantly unlawful, enumeration of network/nodes initially, installation of malware, indexing of files, keyword searches against files,

Files that are considered ‘of interest’ to the perpetrators have been copied and the sources often deleted (which facilitate modification at their end and they are able to then produce the only copy, which is not the original). Files which I would rely upon as a defence/counterclaim have been deliberately destroyed – however I have had some luck in recovering some and they will be presented at the appropriate time 🙂

Demonstration of the destruction of data is not difficult, simply because recovered data gives an indication of when files were last modified. If it was not accessible by normal means (via the usual filesystem applications) before the start of the data recovery process though afterwards files are obtained, then destruction is proven.

However. non-deliberate destruction of data can occur inadvertently and slack space often contains file fragments. This brings us onto Intent – often difficult to prove in a straightforward manner by direct means and this is where we have to rely upon circumstantial evidence, and really look at the big picture itself, essentially everything:-

(a) Seemingly unrelated unlawful acts occurring at the same time that would facilitate an Opportunity;

(b) Motives overtly/covertly demonstrated by seemingly unrelated parties.

On this point I can think of an excellent example – 9/11 . I was working on an Algorithmic Trading System (“robot trading”) for three specific clients in the World Trade Center, and my focus was the Disaster Recovery and Business Continuity Planning (“DR/BCP”).

I can recall from direct experience that there was around 0.25 trillion dollars of financial instruments that were coming up for maturity and 9/11 conveniently forced the Securities and Exchange Commission to completely relax its anti-money laundering protocols so that funds could be mobilised with the absolute minimum level of identity verification 🙂

As it happens I think this is the real reason for 9/11 and Mass Electronic Surveillance and Middle East/Oil is secondary to that..

From my own experience, being kidnapped and unlawfully imprisoned in a Psychiatric Facility on 12/17 whilst 10 terabytes of evidentiary data and materials was stolen is the same concept 🙂

Back to the Screenshots

These are the SHA-256 hashes of the ExpressVPN installer as well as the Hashing Tool used, known as Nirsoft HashMyFiles:-

The Activation of ExpressVPN is the time that ExpressVPN detetermines the correct Point of Presence to connect to:-

In this case UK:-

Other UK locations also appear:-

I thought that Sri Lanka was an island off India, separated by about 20 miles but recalling that I obtained an ‘E’ in GCSE Geography I am probably wrong 🙂

India is not nearer because my data traffic tells me that the UK is nearer – India (the obvious choice) has not been selected:-

However what the screenshots demonstrate is that the UK jurisdiction is enlivened as the most appropriate jurisdiction for judicial proceedings to occur. This works nicely in my favour in view of my knowledge of the laws of England and Wales and more importantly the competence of UK lawyers, so that I don’t need to be the lawyer 🙂

Furthermore, should anyone suddenly bring a case against me, they will inextricably link themselves to the various perversions of the course of justice already demonstrated, thereby making elucidation even easier.

I will collapse this case when I am ready, but not yet as this Amateur Night is fun :).

20161102 POST

Investigators are getting desperate, and continually try new methods against me to pervert the course of justice and get the result they desire, rather than the lawful one.

As I have mentioned on previous occasions, my evidence required in judicial proceedings as well as evidence of data destruction and evidence of the exfiltration itself, is continually accessed and destroyed remotely by parties in the United Kingdom, intent on teaching me one lesson or another.

Two things I would say to that (a) I enjoy learning and (b) I am not interested in learning primitive, easily detectable low level techniques from parties with significantly inferior intellect whose flawed conclusions lead them to believe I am a criminal 🙂

Exfiltration also called data extrusion, is the unauthorized transfer of data from a computer. Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.


A few days ago I updated my profile and stated that I was not going to be on LinkedIn until the middle of next month, [because we are seeing who is owed money so we can pay them].

However, my LinkedIn account has been behaving strangely and I made a complaint to LI a couple of days ago:-

Essentially the issue I have is that (a) I don’t read my linkedin messages, yet (the count is going down) and (b) people who I would never add, have added themselves following an invitation from me that I would never have sent!

This means that someone is reading my messages, so that it appears that I have read them. Given the fact that I am under various sad investigations presently this is clearly some attempt to fraudulently obtain substituted service.

Given the fact that I have not actually read them, the parties will tell the Court that I have, then the resulting authorisation for substituted service would constitute ‘fraud on the court’ – not rocket science really 🙂

The following screenshot was obtained:-

The terms referred to are 20160929 meaning 29 September 2016. The e-mailshot itself was sent weeks ago. Yet 3 people write identical messages over 48hrs? All having been read by someone else? And all being after I said I would not be on LinkedIn? I love these Lawyer’s Constructs 🙂

Motive is generally difficult to establish in criminal proceedings but the desperation of prosecutors/investigators after believing the lies of the Melbourne Fraudsters is not my problem.

By way of information Daniel Penney was from Eckington school, always had his white shirt hanging out and dated pretty girls. But I do specifically recall he copied the password and intro screens of my ‘A’-level Computer Studies project ‘System-V’ (a relational database management system running off an Acorn Archimedes A3000) which I complained to Mr Tony Wareham about – I have this thing about people copying my intellectual property and data 🙂

Frank Purcell and Gareth Flanders I don’t know.


So who is reading such messages? Examination of devices is interesting. I recently installed ExpressVPN on a mobile device without a sim – not for the VPN aspect but because they have a feature called Smart Location which enables a person to connect their nearest PoP via their geographical location.

Ironically they do refer to the new reincarnation (the Investigatory Powers Bill) of my ‘old friend’, the Regulation of Investigatory Powers Act 2000:-

However Encryption and Mass Electronic Surveillance are not the focus of this post…

I have installed ExpressVPN on a mobile device containing the LinkedIn App (with no sim card I have been continually hacked by IMSI catchers remember, although the wireless connection is coming from an AccessPoint with a 3G data connection, which is hacked from the UK).

Where Am I?

However Encryption and Mass Electronic Surveillance are not the focus of this post…

I have installed ExpressVPN on a mobile device containing the LinkedIn App (with no sim card I have been continually hacked by IMSI catchers remember, although the wireless connection is coming from an AccessPoint with a 3G data connection, which is hacked from the UK).

This once again confirms the issue with IMSI catchers – additionally I have noticed that my 3G Data connection’s usb modems dial-up successfully initially and then drop the connection and appear to be either being called back or having their routing modified in realtime. The perpetrators obviously have experience of Telecommunications, Law Enforcement, and Investigations – and so do I, since I have ghostwritten Expert Testimony in relation to InfoSec Forensics for various criminal matters of a Defence nature 🙂

Who Let the Dogs Out?

First and foremost there are better places to live in than Berkshire and secondly the only time I have been there was when I was dating a girl called Penny around 1994. The relationship did not work out and I subsequently referred to her as the Cow from Slough – but I don’t think she is still pissed off is she?

Also I had been wondering why my Skype calls are being continually cut half way through my conversations – it is clearly based on me using certain words (which I deliberately provide for disinformational purposes).

The deliberate dropping of the call is tantamount to editing my conversations, and using those segments as misleading representations of that which I am actually saying if I was allowed to get the words in. This is just an extension of all the call interception and my words being deconstructed into phonemes to effectively say what ever I am required to say, for fake probable cause.

An excellent example of this is when I am discussing case strategies and obtaining legally privileged advice from lawyers – I will upload those at some point 🙂

So who do I know in Berkshire? Well we did a project for Vodafone in Newbury around 1993/94 in relation to Oracle 6 RDBMS – but no-one comes to mind. So is it a LinkedIn contact?

Given the law enforcement, particularly investigation theme, I reviewed my posts, and only one focusses squarely on Investigators, their flawed conclusions and even names their locations. It is Schrodinger’s Cat from 18 September 2016:-

The Berkshire theme (‘bark’) is contained within ‘Matchstalk Men and Matchstalk Cats and Dogs‘ and the Cheshire Cat relates to the origin of the surveillance devices in my home – it’s all there, you just need to look and this is not an afterthought 🙂

Reviewing the Analytics for the post we see:-

Looking at the site visits there we see Slough – a good 5% of people. Someone else who I don’t know named David Cannon has chosen to share it:-

Oh wow – what an interesting background David has, didn’t I write above ‘The perpetrators obviously have experience of Telecommunications, Law Enforcement, and Investigations‘.

And he’s from Slough, Berkshire of all places! Excellent experience David, I should try and update mine at some point. David connected with me on 01 September 2016 but shared or liked none of my other posts except that one, either before or since! Maybe he needed to let his pals know that ‘Joe’s on to us’?

Of course it could all be a magical series of coincidences, but my other data which has not been disclosed, demonstrates a statistical infeasibility of anything less than an agenda.


The bottom line is this (a) 3 named people have written the same signature message to me over a 48hr period, (b) there has been interception of data (via session hijacks and/or re-routing of traffic) through Berkshire during the same period, (c) LinkedIn messages from the 3 named people have been ‘confirmed as read’ even though I did not read them and (d) it certainly looks like collusion/conspiracy with perhaps substituted service for something..

Seriously, feel free to hand me any legal documents during my next walk or hand them to my new lawyers…

Eureka Moment

Actually I have only now realised why the previous lawyers Gopal Perumal, Nick Sevdalis, Bill Orow and Katarina Klaric were continually dragging their feet and messing up my cases against Margaret Cunniffe / David Brown / McDonald Slater & Lay and Ahlers / ANZ Bank 🙂

All four were perverting the course of justice by (a) refusing to follow my instructions yet continually representing that they would even after I had got annoyed with them (b) following instructions from third parties which conflicted with me (c) trying to elicit information from me of a defence and tax nature, completely unrelated to the cases that they were handling for me [to be used as probable cause] and (d) by them parking their backsides between me and the Court and then doing nothing of any significance, natural justice and procedural fairness was denied.

It also explains their signature themes (which are jointly flawed) and how their self-serving e-mails did not reflect the actual conversations I had with them (which are on voice-record and will be uploaded) and them concomitantly giving me a bad reputation in relation to a situation that they had themselves fabricated!

Their actual role was to be gatekeepers preventing justice and serve me with documents – I had no idea and terminated their services because of their negligence and frauds, rather than the service issue. The e-mail address issue which was due to a clumsy misconfiguration on my part, took months to resolve and no wonder they were getting stroppy about it, yet having a phone conversation most days. Even in those calls they struggled to deal with my faster thought processes and they had to ‘wait for their phone to ring at their end’ or receive those message updates advising them what to say to me.

I identified issues very early on but the lawyers had no interest in furthering them. Instead they furthered the frauds of their actual instructors to my detriment – as everyone knows getting the identities of those instructors and their instructions via Crime Fraud Exceptions is a straightforward process.

Everyone knows litigation is my favourite indoor sport in any event and I love this stuff, especially if I know the source of the lies/investigation (Margaret Cunniffe) and know that their interpretation and therefore conclusions are plain wrong 🙂

And no wonder Praxy de Saram (“PDS”) was so keen to go and meet all of them face to face, and how the situation deteriorated rapidly after that meeting, in a similar fashion to December 2015 and Edward de Saram and Ray Callingham’s frauds against me!

Perhaps items were shown and discussed confidentially and PDS was reluctant for me to change lawyers as well despite Katerina being rude to her. Fresh lawyers would (a) not want to be a party to the frauds of the perpetrators and (b) the perpetrators have a risk of exposure of trying to get anyone new on-side. Wow!

This is just incredible – I missed this until now. I think it is time for me and Rhodium to flex our muscles 🙂



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

PS ‘Full and Frank’ disclosure is required, so remember to let your associates know about this post and in fact all my posts here, and all the websites that I publish materials on.

PPS In view of the foregoing it is going to be extremely easy to quash authorisations for interception and surveillance – I’m so excited!

WLG and Melbourne Fraudsters Linked to Destruction of Evidence


WLG and Melbourne Fraudsters Linked to Destruction of Evidence (±x)

Published on 2nd September 2016


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE


In December 2014 I was the victim of a theft of data and destruction of evidentiary materials from my apartment, by a Sri Lankan named JV Lasantha Priyadarshana (“JVLP”), directly following the visit of Edward de Saram (“EDS”). Various USB drives were stolen, paperwork, as well as DVDs and Blu-rays.

By January 2015 I had imaged the SSD from the laptop that JVLP had been using and it was clear that he had obtained unauthorised access to various devices in the days before he left. Most interestingly it was data relating to Margaret Cunniffe (“MTC”) / David Brown (“DAB”) / Simon Thompson (“SVBT”) / Ian Slater (“ICS”) / McDonald Slater & Lay (“MSL”), parties in Australia who continually pervert the course of justice by their bad faith antics, injurious falsehoods, perjurious affidavits, diversionary tactics, and whom we are suing or in which cases litigation is pending.

It was obvious that JVLP had neither the brains nor the balls to mastermind this on his own, and his subsequent self-serving e-mails were written by a native English speaker rather than a local who had learned English. In fact it was Margaret Cunniffe’s style, and her signature themes do get tiring after a while and pop up everywhere.

On 11 January 2015 I sent JVLP an e-mail containing a number of links, one of which was a secret url that no-one outside Rhodium knew about. Within Rhodium only three people knew of this and were all instructed not to visit the secret url.

The secret url was designed to exclusively track the flow of information. Since no-one outside Rhodium knew about it our systems could simply monitor the url to ascertain who was involved (a little like the dust we have used to track locations people have visited).

The Melbourne Fraudsters

As if by magic, MTC DAB accessed the secret URL less than three hours later, using a VPN service from HideMyAss which obfuscated their IP address. I knew it was them because of monitoring their visits to our sites during the preceding years, and using metadata/traffic analysis.

I later recovered evidence that showed that DAB’s HideMyAss account was linked to his [email protected] account.


After their visit I queried our logs and ascertained WLG had visited other sites on 13 January 2015, around five times from memory.

I then traced them back to 08 January 2015

as well as from around 23 October 2014 onward:-

I already had evidence of SVBT taking trains around the UK in early Autumn 2014!

Spoliation of Evidence

Destruction of Evidence in my legal proceedings is a signature theme associated with MSL/MTC/DAB and we brought a case against the latter’s company Synergize Consulting Pty Ltd (before Rhodium acquired it) and obtained a WA DC 2462 judgement in 2014 to the sum of around AUD 730,000 in our favour.

Unfortunately I had serious heart problems during 2015 and could not proceed with instructions at that point.

The Plot Thickens (thick being the operative word 🙂

However from September 2015 onward, I noticed that a number of hard-copy documents relating to WLG/MSL/Augusta Ventures (“AV”)/Jason Edwards (“JGE”)/Rita Pal (“RP”)/Ahlers/Harry Elias (“HE”) plus their Sri Lankan counterparts, were also going missing.

I was involved in a Staged Accident (my neck was broken, and I had dislocated cervical vertebrae which were pressing on my spinal cord) on 22 October 2015 and was out of the house for around six days.

During that time the Sri Lankan workers Chamaree Silva (“CS”) and KSA Perera (“KP”) were in residence. I returned to find my house rewired (ground had been removed as an example) and more items missing, this time DVDs and further data; plus wireless cameras and mics had been installed.

I also noticed new items that I had never seen before and volumes of documents which had been printed by an inkjet printer and also double-sided to save money. I always use laser printers and don’t care about saving trees, so they were not mine.

Then I found that the WLG evidence for their site visits in Autumn 2014 and January 2015 onward was missing from our usual systems – that was so strange.

I decided to provide varying amounts of disinformation to the workers and it was clear that CS was the main perpetrator, and person on the ground. Because my neck was damaged (I had no upper-body strength) I had to sit quiet for a couple of months but I found more and more items going missing every night. It was clear that they were being removed, checked with a third party, and being returned a day or so later, though sometimes not at all.

Ray Callingham (“RMC”) came to visit me at the end of November 2015 and I noticed an apparent connection he had to CS, despite them never having met before, to my knowledge. CS had arranged my tax returns for RMC without either myself or RMC saying a word, as well as asset structures and mortgage statements.

When I exposed RMC and sent him packing, CS started crying saying ‘what are we going to do now?’. I have never seen that type of behaviour from a woman when an accountant had left, but presumably he had promised a better life for her son in the UK as a freebie, and mentioned this to her when he took her to the kitchen out of sight.

In any event, I was quite concerned about my data and our evidence. By some miracle I managed to locate the WLG/AV files on another backup network attached storage device and stored them on a separate portable hard disk and DVDs offline.

Daddy’s Dirty Deeds

Edward de Saram (“EDS”) turned up around the beginning of December 2015 after RMC had left and he was carrying on the bizarre RMC/CS behaviour. EDS wanted to know where evidence was and where case files were and I lost my temper because of his gaslighting antics and trying to kill my cat. His behaviour was getting out of hand and on 17 December 2015 he decided to brutally assault me and put into a mental facility, entirely unlawfully.

Nurses there were asking me odd questions, such as ‘do you think there are too many people living in Birmingham?’ and ‘you don’t like Indians and Muslim people do you?’ – I agreed as part of disinformation, though I was wondering ‘why the obsession with Birmingham?’.

I have a brown face and am obviously Asian – what’s wrong with being Asian? I am proud of being Asian but I dislike ultracrepidarianism whatever a person’s skin colour. Everyone knows that I am a Catholic who is also Pro-Muslim (and Pro-Jewish), and I find Indians intelligent and hardworking, in the UK and US at least.

However I pretended to the contrary and saw the questioner’s eyes light up, which gave the game away. This is known as duping delight.

[insert video]

It seemed that I was put into a mental facility to be interviewed as well! It was easier for me to give people disinformation and see where it reappeared, because I can make a case against me collapse by the reliance of third parties upon things I have previously stated.

One Flew OUT of the Cuckoo’s Nest

After getting a lawyer and Armed Police to get me out a few days later, I returned to the strong smell of burnt paperwork in my house, and accounting documentation and data devices were physically missing – not this again, I thought!

I immediately looked for the WLG/AV/MSL/HE/MTC/DAB evidentiary material – it was missing AGAIN! But this time around ten terabytes of schematics, technology patents, tax avoidance data (not tax evasion), a Windows font of my handwriting called GeniusJ and a One-Time Pad were missing from storage systems!

I then decided to try and locate the files on other devices, by scanning the drive surfaces to see if I could locate files that had been deleted, which I could potentially recover, and also non-current areas.

File Recovery

I spent 20 hours per day for the following 250 days looking for the actual evidence of the WLG site visit in particular, because that demonstrated a direct link to theft of data and destruction of evidence, and obviously was the trigger which started all this nonsense.

Yesterday, after 5000 hours of searching I obtained the evidence that WLG had in fact accessed the secret url, at 11:12 on 13 January 2015. BOOYAH!

[insert evidence]


It doesn’t matter about intermediaries, agents and parties who try to obfuscate the ‘handling of stolen materials’, or act as ‘accessories after the fact’. It doesn’t matter about layers/lawyers that have been put into position afterwards so parties can distance themselves from the source.

Legal Position

The Law Society states:-

6.4.5 Crime/fraud exception

LPP protects advice you give to a client on avoiding committing a crime [Bullivant v Att-Gen of Victoria [1901]AC 196] or warning them that proposed actions could attract prosecution [Butler v Board of Trade [1971] Ch 680]. LPP does not extend to documents which themselves form part of a criminal or fraudulent act, or communications which take place in order to obtain advice with the intention of carrying out an offence [R v Cox & Railton (1884) 14 QBD 153]. It is irrelevant whether or not you are aware that you are being used for that purpose [Banque Keyser Ullman v Skandia [1986] 1 Lloyds Rep 336].

Intention of furthering a criminal purpose

It is not just your client’s intention which is relevant for the purpose of ascertaining whether information was communicated for the furtherance of a criminal purpose. It is also sufficient that a third party intends the lawyer/client communication to be made with that purpose (e.g. where the innocent client is being used by a third party) [R v Central Criminal Court ex p Francis & Francis [1989] 1 AC 346].

Rhodium’s Revenge

I would like ALL my data back IMMEDIATELY, with full and frank disclosure as to how WLG obtained the url, and any and all parties that they are advising or are communicating with in relation to anything to do with me and/or Rhodium – this includes Government Departments, Military Intelligence and Law Enforcement in any jurisdiction.

I was entirely correct about the Lawyer’s Constructs, Fabrication and Planting of Evidence, Fake Probable Cause, Destruction of Data, Deficient Chain of Custody, Injurious Falsehoods, Tortious Interference, and most importantly, the Destruction of my own Evidence that I would use to defend myself against issues in any jurisdiction, civil and/or criminal.

Given the continual destruction of specific evidence involving WLG/Augusta Ventures/McDonald Slater & Lay/Harry Elias/Margaret Cunniffe/David Brown/Simon Vincent Breguet Thompson) in Sri Lanka, plus foolish references to Birmingham by all and sundry, and every attempt under the sun to make me look like I have no money and am just ripping people off through having no ability in areas of Information Security etc, it is obvious who is actually linked to the intellectual property theft and destruction of my evidence.

By way of information MSL is the law firm representing MTC and DAB in various cases that we have in Australia. Ian Slater, principal of MSL produced a perjurious affidavit stating that the Share Capital of Rhodium Australia Pty Ltd was bogus. I think Simon Thompson and his brother/cousin/namesake work for MSL and reside in Lower Plenty, Victoria. I think this screenshot relates to the traffic ahead of their visit to Eltham Police Complex 🙂

[insert evidence]

We have traffic analysis that confirms that data is coordinated from there and stored on various servers (or a VPN) involving those of RedStation in the UK.

[insert evidence]

Simon Thompson works for Augusta Ventures, apparently in UK/AU at the same time. AV is a litigation funder.

[insert evidence]

Harry Elias is the Singapore Law firm that is defending ANZ Bank against my USD 11.5 million damages counterclaim for fraudulent rate manipulation and income loss due to ANZ’s fraud and/or negligence. Harry Elias also represent Ahlers, against whom we have another multi-million dollar claim for holding various items belonging to me and attempting to convert them criminally. Ahlers were holding valuable information in relation to unregistered technology patents from 2013 that no doubt have now been compromised.

David Brown obtained a judgement against me fraudulently using an inchoate agreement (that he also confirmed in writing as ‘null and void’) and with his bogus interest calculation.

And Wragge is the lawyer that the DTI were using to bring a case against me in relation to I Love My Encryption Technology PLC (formerly Rhodium PLC) which entered insolvent liquidation thanks to the nonsense from NCIS/MI5/HMRC in 2000.

And everyone knows about that liar Margaret Cunniffe!!

So they ALL had an axe to grind, and of course Means, Motive and Opportunity – I live on my own in Sri Lanka (since 2013) and have had numerous heart attacks and I suffer from coronary artery ectasia, which is why I was slow at organising payments. It was a simple Human Resources deficit and compounded by people stealing my stuff! These clowns made it accounting fraud!

Actually this situation is just laughable, as ‘the multi-jurisdictional, multi-faceted wild goose chase has been utterly pointless’, simply because of various immunity agreements that have been in place from 1993. Plus. the nature of my work creates its own defences in any event! If someone had simply ASKED me then all this could have been avoided.

By way of information I lost more money than all the other creditors combined when Rhodium PLC went into liquidation, and that was caused by external factors, not me – very unusual reasons in fact relating to a Money Laundering Project I was assisting government contractors with.

[insert evidence]

As soon as I am given an opportunity to present my material and affidavits, cases against me will collapse, even if some ‘inclusionary principle’ allows deliberately-tainted, fraudulent evidence with a deficient chain of custody, to be admitted.

WLG have 7 days to deliver before my own case against them starts and we are obviously involving West Midlands Police and the Serious Fraud Office immediately!

In view of the foregoing and crime/fraud exception, please feel free to send us any/all information received in connection with me/Rhodium, as it will save me having to get them via a Court Order 🙂



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

PS Email should be up and running next week!