Yin and Yang in Technology

By | WEAPONISED SOFTWARE
Yin and Yang in Technology

Yin and Yang in Technology (±x)

Published on 2nd August 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
988

Enter more text here

This is a short article about how certain types of software projects (cryptographic) come under the auspices of Aerospace & Defence… [I am still writing it]

As Mark Graff states in the above video, “cyberweapons.. are easy to make, easy to move, and hard to find.. so trying to limit their spread by export controls is never going to work.”

And he is COMPLETELY CORRECT!

The Wassenaar Arrangement (“WA”)

The Wassenaar Arrangement, was the first global multilateral arrangement on export controls for conventional weapons and sensitive dual-use goods and technologies. It received final approval by 33 co-founding countries in July 1996 and began operations in September 1996.

The WA was designed to promote transparency, exchange of views and information and greater responsibility in transers of conventional arms and dual-use goods and technologies, maintain fully effective export controls and adhere to relevant non-proliferation treaties and regimes.

http://www.wassenaar.org/

My American colleagues had advised me of the concepts in late 1993, since the framework directly impacted upon Integrated Systems Research Ltd (“ISR”) and the cryptographic work we were undertaking was clearly Dual-Use.

Furthermore, they also advised me in late 1994 that any new entities needed to be incorporated so that they were in existence a year before the final version was approved. Accordingly Rhodium PLC was incorporated on 12 June 1995 and just over a year later on 12 July 1996 the ‘Initial Elements’ of WA were defined.

The WA is also the reason that we use have used rhodium.com (since 09 September 1995) instead of rhodium.co.uk , despite the latter being the more appropriate domain for a UK company in 1995.

Dual-Use Items

Dual-use items have a primary commercial/civil application but have also have the potential for military or weapons applications. The U.S. Department of Commerce has listed the dual-use items, software, and technology it controls on the Commerce Control List found in 15 CFR 774.

This list is divided into ten broad categories, as follows:

0- Nuclear

1- Materials, Chemicals, Microorganisms and Toxins

2- Materials processing

3- Electronics

4- Computers

5- Telecommunications and Information Security

6- Lasers and Sensors

7- Navigation and Avionics

8- Marine

9- Propulsion Systems, Space Vehicles and Related Equipment

I am still in the process of writing this article, but I hope the foregoing makes sense 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

25yrs of Integrated Systems Research

By | WEAPONISED SOFTWARE
25yrs of Integrated Systems Research

25yrs of Integrated Systems Research

Published on 11th May 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
1085

Joseph de Saram discusses Intelligence, Surveillance and Reconnaissance (ISR), the co-ordinated and integrated acquisition, processing and provision of timely, accurate, relevant, coherent and assured information and intelligence to support the commander’s conduct of activities.

Ain’t No Use in Complaining When You Got a Job to Do

Today is the 25th Anniversary of the incorporation of Integrated Systems Research Ltd (“ISR”) on 11 May 1992, my first ever limited liability company and the special purpose vehicle for the really clever stuff!

Many people think of Rhodium PLC incorporated on 12 June 1995 as the launch of my career into Applied Cryptographics, Signals Intelligence and Financial Systems, but it was not.

From those early days and having to learn about fiduciary services whilst performing them for Americans, I gained a solid understanding of point of supply, point of control and point of consumption.

The longstanding asset protection structures designed in 2009 and in place today have 25yrs of defence heritage and can easily withstand a worldwide Mareva Injunction – very handy for the current locusts swarming around everyone 🙂

Following the Money Trail in Counter-Terrorism

There are actually quite a few articles on LinkedIn referencing ISR, but things kicked off with a chance meeting with an officer from SO13 on 28 April 1992 about two weeks earlier:-

Immunity from the age of 21yrs

As everyone knows my projects involved Command, Control, Communications, ComputersIntelligence, Surveillance and Reconnaissance (“C4ISR“).

Because of the utterly brilliant NSA and Israeli Aman tech guys who taught me, I named the company after Integrated Systems Research Corporation which was also in Marylan along with NSA.

http://www.israeldefense.co.il/en/company/isr-integrated-systems-research-corporation

Need to Know

Unless parties in 2017 understand how things began, they will never understand the evolution of the same and what I was doing in the recent years, until my heart issues…

But I have to get my head down now, so don’t ask me about anything as:-

Happy Anniversary to all my Aerospace & Defense colleagues, especially those who were there at the start…

Thank you for the hardcore training that ensured that I performed assignments perfectly, and the threats of torture that ensured that I always kept my mouth shut 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

The Importance of Immunisation

By | WEAPONISED SOFTWARE
The Importance of Immunisation

The Importance of Immunisation (±x)

Published on 4th March 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
979

Enter more text here

This post is about the Government Contractor Defense (“GCD”) and how various adversaries of mine have failed to recognise the fact it covers the type of work I perform and the clients I associate with, from issues arising from product liability as well as a more limited application to service contracts.

In my situation the application of GCD is far too complex to explain here especially due to the existence of a number of upstream intermediaries, though this article serves as a quick introduction to the type of issues I face because of the nature of the work.

In any event there are other ‘arrangements’ which ‘protect my ass and my assets as well’ and those remain confidential for reasons obvious enough, and also cover the upstream (and downstream) parties.

As an architect I absolutely hate it when people copy and/or steal any of ‘my stuff’. Edward Snowden may have had balls but he still broke the law – 18 U.S.C. 541/793 is crystal clear.

The Eye of the Tiger

As many Linkies would have realised from my articles and posts here, I have demonstrated significant experience in overcoming fairly hardcore tactical exercises from law enforcement. Their unlawful attempts to yield results which have been designed to break me invisibly, achieve nothing apart from getting their [inept] techniques exposed on LinkedIn.

The Questions People Ask:-

(a) ‘what does Joe actually do?’

(b) ‘why is Joe always ten steps ahead?’

(c) ‘why should law enforcement be interested in Joe in the first place?’

(d) ‘who will ultimately win?’

(e) ‘should I be dumping Joe like everyone else in Asia?’

What does Joe actually do?

Well that is a very interesting question and the hardest to answer. From 1992 and the days of Integrated Systems Research Ltd (“ISR“) the projects involved cryptographic technology and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (“C4ISR“).

Here is an example video about ISR from Northrop Grumman, although an association with NG is neither confirmed nor denied:-

My work then became a little more ‘money laundering systems design’ and ‘counter-terrorism’ projects via Rhodium PLC:-

and subsequently financing transactions.

Before my emergency surgery in September 2011 to resolve some heart issues (SGD 27,576) things were going pretty well:-

although life became a struggle after that, as I could not speak properly for 3 months.

I was working on applied cryptographics and weaponised software just like in the old days, which comes under munitions (military hardware):-

http://www.wassenaar.org/

Why is Joe always ten steps ahead?

That is an easy question – I identified the massive potential of ISR and Information Security before my peers so I have been doing it far longer. I also invested heavily to become extremely skilled, and focussed on working with people who were far better than me – it was always a struggle but it ‘kept my mind fresh’.

Additionally the level of the work that I have experienced is well-above the standard for even the best law enforcement agencies. Nothing confirms the experience better than my methods of dealing with a live [unlawful] operation, and that is why I am not fazed by the nonsense.

Also being 16yrs ahead of the UK Government is a nice touch!

Coupled with training that commenced in 1993 from certain organisations, I can identify and address hybrid threats ‘with my eyes closed’, before they have a hope of materialising.

As such matters that would be ‘stressful’ for the Average Joe, is ‘just another day in the office’ for the Genius Joe. In fact the present techniques are laughable and I publish information on LinkedIn so our commercial associates do not worry about adverse things that parties [including but not limited to investigators and/or law enforcement] have circulated as part of disinformation.

In fact it is their tortious interference that I have identified and am now addressing. The lies they propagate is a lot worse than the harassment surveillance.

We can both keep our mouths shut but they have chosen to try and get their ‘doom and gloom’ in first to furthers their objectives and polarise everyone against me. I therefore reluctantly have to explain a few items to try and allay the fears of others (not mine as I have no fears in relation to this).

Why should law enforcement be interested in Joe in the first place?

I have always had a relationship arising from ghostwriting Expert Testimony and Forensics therefore the simple answer is ‘the work I do’, but also:-

(f) the ‘Company I Keep’ – ie clients/contractors);

(g) the ‘Companies I Keep’ – asset protection mechanisms and tax-efficient structures;

(h) the Melbourne Fraudsters – Margaret Cunniffe, David Brown, Simon Thompson;

(i) agents of the Melbourne Fraudsters, who propagate the same lying themes;

(j) adversaries who want to cripple me and/or Rhodium financially;

(k) their own ignorance and misinterpretation of extremely complex scenarios.

Third parties at a lower level of intellect and experience do not have the capacity to understand that which is occurring. As a defence mechanism (this is particular true in Australia, Sri Lanka and Singapore) they will ‘fear the worst’ and ‘pre-empt failure to brace themselves for disappointment’. They also end up seeming ‘confident’ which is the Dunning-Kruger Effect.

However their irrational actions actually cause their worst fears to materialise as a ‘self-fulfilling prophecy’. Quite bizarre of course but that is a massive flaw in the timid South Asian culture as well as demonstrated in ‘average’ countries such as Australia 🙂

As such the words that they are able to process are ‘arms-dealing’, ‘money-laundering’, ‘fraud’. In fact I can simply say these words on a phone-call and the person on the other end will cough or another phone will ring!! Other keywords such as ‘usb drives’, ‘data’, ‘discs’, and ‘defence’ are also of interest.

Who will ultimately win?

Well me obviously, but not because I say so.

The work from the early days has specific defences in law in relation to immunity for defence contractors, which extends to parties that they sub-contract work to such as ISR or Rhodium or I.

Regardless of the unlawful and blatantly fraudulent exfiltration of data as well as planting of evidence and wholly deficient chain of evidence, my underlying defence is sound – it is that simple. Their theatrics fool no-one of any significance.

The specific case law confirming Government contractor immunity, was first articulated by the U.S. Supreme Court in Boyle v. United Technologies Corp. , 487 U.S. 500 (1987).

Government contractor immunity claims by third parties are subjected to a three-prong test. Liability cannot be imposed when:-

(1) the United States approved reasonably precise standards;

(2) fulfillment of the contract conformed to those specification; and

(3) the supplier warned the United States about known dangers.

All three standards naturally apply to the everyday design of computer software and associated network infrastructure, both of which are my areas of expertise of course. Me ‘keeping my mouth shut and covering for powerful associates’ comes under (2) and is in the agreements between me and my upstream handler. The NDAs are extremely tough.

In turn they are contracted under parallel terms to the ultimate provider who has actual contract with the US Government. The concepts of NTK and Least Privilege apply and in fact I know of about 20 levels above Top Secret 🙂

The 20 January 2016 decision of the US Supreme Court in Campbell-Ewald Co. v. Gomez, No. 14-857, which relates to ‘derivative sovereign immunity’ and is not relevant, although is the most recent decision from memory.

My work with ‘mysterious clients that I obfuscate the identities of’ is still something that I cannot be prosecuted for because the work is genuine, which ensures that the financial position is genuine, and the tax computations are correct.

It is particularly relevant to clandestine-type operations and therefore provides a solid defence in relation to matters concerning Integrated Systems Research Ltd, Immortal PLC and Rhodium PLC, and subsequent asset structures and special purpose vehicles.

A Complete Defence

By way of the historical provision of specific computer hardware

and how it really works:-

and asset protection:-

I can meet the higher threshold of proof and therefore have a complete defence to any allegations of impropriety.

Law Enforcement are Plain Wrong

Accordingly law enforcement are sadly misguided in their prospects of success, and their continuing representations to third parties in relation to the strength of their case is fraudulent.

Their failure to properly verify the perjurious statements of the Melbourne Fraudsters and their agents, instead relying upon parties that the Melbourne Fraudsters have in fact manipulated (who are certainly not disinterested witnesses) is a colossal failing.

The end result is Rhodium and I sustaining massive commercial damage, as well as the serious deterioration in my health thanks to the existence of a malicious prosecution, and their ‘investigations’ ahead of that.

As such I am simply ‘enjoying’ their ineptitude until I am fit enough to fly, quantify asset positions and structures and live in the UK again. I am lining up a massive claim for damages against various organisations and the Melbourne Fraudsters in fact.

Investigation is an absolutely normal part of law enforcement – however, their injurious falsehoods when they should have checked my background thoroughly AND they should have properly verified the statements of the Melbourne Fraudsters, is not something that I am going to be tolerating for one second longer.

Should I be dumping Joe like everyone else in Asia?

It is obvious that my enemies are trying to manipulate parties into attacking me from all directions, and lying about me to cause me harm by compounding time constraints. As it happens we have sent around 250,000 e-mails to various parties in the last few days.

My advice would be that they deal with those rather than demonstrating the self-victimisation and schadenfreude which they seem to prefer.

People in Asia suffer from GroupThink and are unable to make individual decisions that they would actually benefit from, preferring to mark time and go nowhere because others also go nowhere. They apply no critical analysis to that which they have been told and they will soon learn that they are ‘sheep being driven over a minefield’.

Amelioration

I have taken all prudent and of course intelligent steps to ameliorate the situation caused by the fraudsters and tortfeasors but whether parties wish to engage with me/us is entirely their prerogative. The time for ‘pushing sh*t up a hill’ has passed, permanently.

In fact given the frauds of three attorneys in Melbourne and one in Singapore that caused me the recent congestive heart failure issues and 3 months off work, I prefer if people with an issue simply deal with our UK lawyers – there will be an announcement this week hopefully.

Apart from that I am more than happy to engage with people of the Western Culture and those who can consider situations objectively, and of course Asians who are able to compartmentalise various facets of their life properly, and demonstrate independence of thought and clarity of mind 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

Dude, Where’s My Laptop?

By | WEAPONISED SOFTWARE
Dude Wheres My Laptop

Dude, Where's My Laptop?

Published on 12th February 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
836

Enter more text here

20171101 UPDATE

I am finally about to re-write this article so please have a look at the old version before I do so. Quite interesting how people call me a liar with no evidence yet I WAS using a USG laptop in Australia in 2009/2010 after returning from my Bahamas trip!

20171202 INITIAL

[Sorry this is really badly written – so I am in the process of re-writing it :)]

As many people who need to know, know, I have an interesting line of work which I prefer not to talk about, though I invariably do, but never discuss clients’ names.

However with the recent change of Government in the US, my contacts from the old days have come alive, and I am so happy that The Donald is interested in solid relationships with Israel and Russia. This is a quick draft and I need to switch sections later…

1993 – ISR (“C4ISR”)

George Bush Snr was the Republican in the White House when my work started in 1993 – I mean who do you think taught me about weaponised software if it was not the Americans and Israelis?

 In fact ISR is the 3-letter ISO-3166 code for Israel so it’s all there from 1992 if the perpetrators open their minds or ask a nursery school child to explain it to them.

And once the transactional immunity agreements were thrown into the pot, I could do whatever I liked and could not be prosecuted for the perceived crimes. Obviously immunity agreements are only given if there is a risk of an issue, so the mere fact that they are there means that I was authorised to sail close to the wind…

As an expert in Information Security, with particular specialisation in the areas of Aerospace & Defense and Banking & Finance, I end up getting involved in a number of clandestine projects which are incredibly interesting and pay very well 🙂

Specific laptops have been provided for this purposes over the years. Unlike Hillary Clinton and her e-mail server, hardware platforms must be completely isolated to protect Sensitive Compartmented Information.

Boot-up Sequence

It is clear from the boot-up sequence that ‘US Government Users Restricted Rights’ appears prominently, and this is a feature of equipment in which defence contractors have a degree of joint rights of the technology. I was working for various subcontractors of Defence Contractors as it happens and no governments directly.

My clients are well-connected and extremely powerful which is why I go to extraordinary lengths to protect their identities. Various Fiduciaries and Special Purpose Vehicles are continually utilised for reasons of confidentiality.

And even now The Donald is looking at overturning the Dodd-Frank Act which removes much of the regulation involving Fiduciaries and he is pro-Israeli:-

20100100 Joseph S R de Saram Strategic Defense Initiatives I

Laptops come via an obfuscated route though I cannot recall whether this one was from Bahamas in 2009/2010 or Hong Kong SAR in 2006/2007.

20100100 Joseph S R de Saram Strategic Defense Initiatives II

Various donkeys think the video ‘Strategic Defense Initiatives I’ https://youtu.be/5lDOmovoodk has been altered – it obviously has not and is one unbroken video.

However I located another video of the same laptop which was provided to me for my clandestine work, which started around 1993.

As can be seen my Rhodium business card was continually waved in front of the boot-up sequence before initial program load.

Unlike the fake ISIS videos, there is no slick production here 🙂

Data Rights in Intellectual Property

The following information would assist in determining the meaning of the boot up sequence with my laptop, which regrettably I do not have any more – its evidentiary value would have been immeasurable.

Actually over the years I was provided with a normal laptop, and in fact encouraged to buy my own so that it would not arouse suspicion – imagine being in an internet cafe and ‘US Government Users Restricted Rights’ coming up during coffee!!

How Retarded are my Adversaries?

Given there is already a ridiculous amount of proof on LinkedIn which non-dense parties can understand (obviously ‘non-dense’ does not include many of those in Australia and Sri Lanka in particular, and Singapore too to a degree, and especially my own fraudulent lawyers who all think I am lying), I would simply say that if parties would stop sabotaging our commercial operations, activities, then all would benefit.

As I have stated before, Tortious Interference and Injurious Falsehoods are their own Causes of Action, and I have the audio recordings of four lawyers who have Perverted the Course of Justice by their own Criminal Frauds against me. This is all some game to create the ‘perception of insolvency’ and prevent me deriving an income, and prevent me recovering my health – it is utterly ridiculous to say the least!!

Some files are still corrupted and some are duplicates but I hope this sends a clear signal to the fraudsters concerned:-

I am continually subjected to violence behind the scenes including theft of data and assault from my own parents (which can be defined as Honour Based Violence) which causes my health to deteriorate even further. Unfortunately for them I have the forensic information which nails them and their donkey pals, and their original conclusion about me is also wrong!

It is easy to consider these frauds against me in Sri Lanka in the UK and AU Jurisdiction simply because their detailed review yields Extra Territorial Jurisdiction:-

It is easy to consider these frauds against me in Sri Lanka in the UK and AU Jurisdiction simply because their detailed review yields Extra Territorial Jurisdiction:-

Then the fools at the courts say that I am not complying with judicial proceedings in a timely fashion? Well how laughable is this?

The culture in this part of the world is one of being Two-Faced and GroupThink – it is very easy for parties to become embroiled in their own stupidity and they continue to run their smear campaigns simply because they have other members in the group that will. Quite pathetic actually.

However I have some SPLENDID information that nails parties in the UK too – I would have already used it if I was not feeling unwell. Unfortunately all these fools believe their own lies, and it seems that a simple false explanation is more factual than a complex true one.

HMRC/UK Police Investigators inciting violence against me and having IMSI Catchers which have probably come from Tonbridge and have the name of a Chemical company (which they have forgotten to take off) in late 2015 before the Psychiatric Facility Fraud, is also laughable!!

The same people telling Sri Lankans to open their eyes wide when talking to me as if I they do not believe me (Upali Peris and Dale Gunaratne), as well as opening their shirt buttons when talking to me (Edward de Saram, Ray Callingham on 29 November 2015, Dale Gunaratne, KSA perera around 04 December 2015) is similarly laughable. All part of the theatrical crap, and I have recovered some videos too 🙂

And the little portable DVRs which they have at their waist to record me getting irritated by their antics – wow they are so clever really! I had no idea – NOT!

I obviously know what is going on and have done so for some time and irrevocable trusts which can withstand Mareva Injunctions have been in place since 2009 🙂

Straightforward Estoppel Arguments as well as Perversion of the Course of Justice can be run obviously but the perpetrators cannot seem to grasp that their unlawful actions are the reason for the issues that they now face. I am saving that for another post and these are classic lawyers constructs. So their response is lying some more!

What does it all mean Basil… and the Caribbean Connection?

The reason for the Caribbean is the tax free environment as well relaxed ability to use Special Purpose Vehicles. I am more than happy to explain some of the position and will do once I am feeling better.

My main tax returns were from Rhodium Hong Kong Ltd, and we are in the process of restoring it to the register. Its previous directors were Bahamas entities. But unlike the Panama Papers I fully disclosed the original asset structures.

What is happening is the case against me is a joke, but parties are getting onto the bandwagon and their absence of their cogent argument and evidence is why they run the self-victimisation as well as the ‘common, uniting belief’ as they can all cleanse themselves by wasting my time and harming me. It is actually a massive cabal and I love the way that all these fools are united in their own fraud!

Money4Nothing

But in simple terms, if my income is settled directly into a trust which I am not the beneficiary of, in order to obfuscate the clients’ identities then the money does not go into my own bank account but it IS earned income.

Physical Receipt of Salary into a Bank Account is Not Required

As such if my tax returns are used to borrow money, then there is no fraud – this is the really dim approach that my enemies are trying, and simply because they are not bright it doesn’t given them a reason to run criminal frauds against me after demonising me and branding me a criminal!!

Determining Annual Income by Mortgage Size

When I have actually have had no taxable income because of ill health and the lies of the Melbourne Fraudsters, then there are no tax returns – there have not been since 2012.

JSRDS TAX

So actually if the previous ones were fake as the fools conjecture, then maybe I could just make some more then use those to borrow with – theirs is an absolute joke to try and confiscate assets. I told Bill Orow yet he played dumb regrettably, and made a number of questionable statements on audio which Linguistic Analysis demonstrate are fraudulent.

Furthermore I am astonished at how dense my lawyers are when they have no clue about the concepts of a Garnishee Order in which money can be taken from source – so if I said I had an income that was running into the tens of millions of dollars in 2012, then that is the position. I am not someone who is bothered about what people think and the tax returns are merely sequelae of my genius. In fact I would not need tax returns running into the millions of dollars if I could manage my low level of borrowings with one at the USD 250,000 mark!

Here’s a simple example – if a man earns USD 500,000 per annum and his wife gets such an Order for alimony payments, then his income is the same regardless of how much actually gets to the bank account!!

If my income has been put into a series of irrevocable trusts and then lent to me, then I am not the Form A owner of those funds. An annoying thing is that the Trustees are also clients for projects that I am working on, and the absence of Professional Indemnity Insurance after 30 September 2009 means that extra funds have been placed as surety.

If I were the beneficiary then I would be telling them what to do but unfortunately the ultimate shareholdings are deliberately complex and bullet-proof for a reason – which means the bearer shares and asset structures have names that I just do not know any more. I had an idea but someone stole that information in December 2015!

After an emergency SGD 28,000 or so operation in Singapore at Mount Elizabeth Hospital in 2011 which was the first heart issue, I could not cope properly living on my own – I will explain at some point. Coupled with ANZ Bank’s rate manipulation things became a mess when I could not speak because of the surgery on my throat and airways to take the load off my heart, which was causing an enlarged Right Ventricle and reduced Ejection Fraction. (Obstructive Sleep Apnoea). Dr Kenny Pang performed the operation.

Someone will look at ANZ again this week as their judgment was obtained fraudulently and I was progressing a counter-claim which Gopal Perumal spectacularly messed up. He is a negligent fraudster as my audio recordings confirm. There are enough articles about ANZ Rate Manipulation and ANZ and their lawyers Harry Elias are heavily involved in the fraud against me, especially involving Ahlers – I have the forensic logs…

MY LAWYERS ARE DELIBERATELY MESSING UP MY CASES IN ORDER TO CREATE UNFORESEEN FINANCIAL STRESS, BEYOND MY CONTROL, AND THEN USE THE EXPERIENCE THAT THEY HAVE FABRICATED TO ASSIST THIRD PARTIES IN THEIR FRAUDULENT AGENDA WITH THEIR PERJURIOUS SELF-SERVING AFFIDAVITS.

However, returning to the tax returns, the absence of funds does not mean that my tax returns are fake – which is the sad line that people are trying to take. And if the funds are are taken from debtors to the trust directly along the line of a Garnishee Order then that DOES explain their absence from my bank accounts but my income is still genuine 🙂

Once I am living in a tax free jurisdiction and I finish the work, then funds can be advanced to me, and then yes, those funds will be in a bank account in my name. However I need that money myself, since my own expenses from 2012 initially were at the level of someone who earns around HKD 500 million not someone who earns zero.

Actually I am so behind on my work and need to sue the Melbourne Fraudsters and the Singapore Fraudsters as these fools are propagating their garbage as if there is ‘no tomorrow’ – well that is true for them, as I have recovered many Audio recordings after a year of struggling with data recovery 🙂

How did the lies start?

There was a Security of Costs decision against me in February 2014, fraudulently obtained as usual by Margaret Cunniffe, David Brown and/or their lawyers McDonald Slater & Lay, Ian Slater and Simon Thompson. They just talk up their case and fill it with Lawyer’s Constructs which are dim enough for Australians and Sri Lankans to believe. They enjoy sending copious amounts of paperwork all over the place which is effectively toilet paper containing ‘very convincing but ultimately flawed legal arguments’ 🙂

I urge parties not to buy into the David Brown-Margaret Cunniffe Fraud as well as their Australian/Sri Lankan/Singapore agents and counterparts despite the various organisations involved, who attempt to give ‘credibility’ to the lies. I will defend myself very easily indeed and with my heart playing up at the moment I am on the war path!

And everyone knows that also their Summary Judgment was fraudulently obtained, except the fraudsters propagating the frauds. And their Substituted Service application which was another Fraud in which they served documents at a Casino that I did not live in, and then lied in Affidavits that I was being elusive or evading service!

More on this later – I can’t work much these days due to this ankle issue, but for the record I’m No-one’s Bitch and if parties want a fight then bring it on 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

‘IT/Management Consulting’

By | WEAPONISED SOFTWARE
'IT/Management Consulting' v4

'IT/Management Consulting' (±x)

Published on 10th October 2016
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
1049

Enter more text here

This post is about an excellent article At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit written by Matthew Rosenberg which appeared in the New York Times on 07 October 2016. I have been ‘working at the carwash’ since 1993, and Matthew’s article is the most accurate that I have ever seen.

It really does happen like this and with 90% civilians (more like 95% after friends of friends get involved to meet tough deadlines) there are so many issues in which the wrong corners are cut, usually in the wrong way and at the wrong time 🙂

My comments, arising from direct experience of working for different parties, are interspersed in block capitals between paragraphs…

At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit

WASHINGTON — In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face the fallout: Booz Allen Hamilton, Mr. Martin’s employer.

Booz Allen, a consulting firm that earns billions of dollars by working for American intelligence agencies, has been called the world’s most profitable spy organization. News this week of Mr. Martin’s arrest in August could renew scrutiny of the firm’s operations and, more broadly, the lucrative contracting business that American intelligence now relies on to run its vast, global surveillance operations.

“GLOBAL SURVEILLANCE IS WHERE MOST MONEY IS MADE. I AM AN EXPERT IN THIS AREA AND CONSEQUENTLY RHODIUM IS ALWAYS PROFITABLE :)”

“SURVEILLANCE CAN BECOME ADDICTIVE SIMPLY BECAUSE YOU CAN ALWAYS SPEND MORE MONEY SPYING ON ‘PARTIES OF INTEREST’ AND BUY BETTER HARDWARE AND MORE BANDWIDTH. IT’S NOT A 9-5 JOB EITHER AND SHIRT/TIES ARE NOT REQUIRED :)”

“LAST WEEK I HAD A TEAM FROM THE NETHERLANDS, LINKED TO EUROPOL HACKING MY SYSTEMS IN SRI LANKA – THIS IS SAD AS IDENTIFYING THE PERPETRATORS IS EASY. NOTHING IS HERE FOR REASONS OBVIOUS ENOUGH, THOUGH THEIR LOGS MAKE INTERESTING READING :)”

Mr. Martin’s arrest is the second time in three years that a Booz Allen contractor has been accused of stealing potentially damaging material from the N.S.A. The company also employed Edward J. Snowden, who spirited out a cache of documents that, in 2013, exposed the extent of American surveillance programs in the United States and around the world.

“IT’S EASY TO BE ACCUSED OF NATIONAL SECURITY ISSUES, IF YOU ARE ACTUALLY GOOD AT SOMETHING. HOWEVER, YOU DON’T GO AND ARREST EVERY LOCKSMITH BECAUSE THEY HAVE THE ‘ABILITY’ TO OPEN CAR DOORS :)”

Booz Allen is one of a handful of defense and intelligence contractors that blur the line between the government’s intelligence work and private enterprise.

“FIFTY SHADES OF GREY”

Tens of thousands of contractors are believed to work for American intelligence agencies (the exact number is not known). They do everything from helping secure the military against cyberattacks and plan intelligence operations, to training spies and running war games for NATO generals.

“I WAS LAST INFORMED IN 2014 THAT THE FIGURE WAS APPROACHING 100,000 BECAUSE OF SUB-SUB-CONTRACTORS :)”

“What most people don’t realize is just the sheer scale of the intelligence work force that is outsourced,” said Peter W. Singer, a national security expert at New America, a think tank in Washington. “There will be meetings, and less than 10 percent of the people there are official U.S. government employees as opposed to contractors.”

“I HAVE ALWAYS MADE MONEY FROM OUTSOURCING AND RHODIUM HAS ALWAYS DONE IT BUT WE OBFUSCATE ALL ENTITIES (CONTRACTORS, CLIENTS, SUPPLIERS, BANKS, SPECIAL PURPOSE VEHICLES, TECHNOLOGY) BY NAME CHANGES – THIS MAINTAINS PROJECT SECURITY. AS SUCH IF INVESTIGATORS LOOK FOR SPECIFIC STRUCTURES THEY WILL NOT BE ABLE TO FIND THEM.”

“‘IT/MANAGEMENT CONSULTING’ IS THE HARMLESS DESCRIPTION PLACED ONTO [NON]-TAX INVOICES FOR CLANDESTINE WORK.”

Firms like Booz Allen provide a ready and potentially lucrative option for federal employees who are looking to cash in on their government experience.

“MONEY MAKES THE WORLD GO AROUND” – THE EXPERIENCE IS UNIQUE AND THE SELF-DISCIPLINE AND FOCUS GAINED FROM 1993 ONWARDS DEFINES ME AS A NO-NONSENSE INDIVIDUAL WHO DOESN’T CARE WHAT FOOLS THINK :)”

Booz Allen, founded in 1914, has done especially well at building its government business. Its clients include every branch of the military and a long list of intelligence organizations, from the N.S.A. to lesser-known outfits, such as the National Geospatial-Intelligence Agency, which is essentially a high-tech mapping operation. Overseas, Booz Allen has helped the United Arab Emirates build its own high-tech spy agency.

The director of national intelligence during the George W. Bush administration, Mike McConnell, was an executive at Booz Allen; President Obama’s director of national intelligence, James R. Clapper Jr., worked for the firm before returning to government to oversee the nation’s spy agencies.

In its last fiscal year, which ended in March, Booz Allen earned $3.9 billion — about three quarters of its total revenue — from its defense and intelligence business. Once its work for other parts of the government is factored in, Booz Allen’s government contracting accounted for 97 percent of its revenue.

“I CAN EASILY UNDERSTAND HOW FROM MY OWN EXPERIENCE”

But as the two thefts have made clear, employing large numbers of contractors brings security risks, though experts point out that there have been many leaks in recent years that came from government employees, as well.

“THAT IS THE SAD PART – YOU HAVE INDIVIDUALS WHO ARE GREEDY AND MESS UP THE WHOLE THING BY STEALING STUFF. CAN’T PEOPLE JUST ENJOY THE MONEY AND KEEP THEIR MOUTHS SHUT?”

Booz Allen weathered the Snowden leaks, and it was cleared of any wrongdoing by the Air Force. It has so far had little to say about the Martin case, issuing a brief statement on Wednesday saying it had fired Mr. Martin and was cooperating with the investigation.

Unlike Mr. Snowden, some officials have said, Mr. Martin does not appear to have leaked any of the information he is suspected of stealing, which is believed to be highly classified computer code.

“STEALING CLASSIFIED INFORMATION HAPPENS ALL THE TIME WHEN THERE ARE PEOPLE WHO ARE NOT SELF-DISCIPLINED. IT IS COMPLETELY WRONG AND AS AN ARCHITECT I HATE IT WHEN PEOPLE COPY AND/OR STEAL ANY OF MY OWN STUFF. EDWARD SNOWDEN MAY HAVE HAD BALLS BUT HE STILL BROKE THE LAW – 18 U.S.C. 541/793 IS CRYSTAL CLEAR.”

But the problem for Booz Allen is that at least some of the documents alleged to have been found in Mr. Martin’s possession date to 2014. That would call into question the effectiveness of reforms aimed at safeguarding the nation’s secrets announced in the wake of the Snowden affair.

“I DON’T KNOW ABOUT HAROLD MARTIN BUT I DID KNEW A GUY CALLED JAMES MARTIN IN THE 1990S AND HE CONFIRMED THAT DOCUMENTS GET PLANTED ALL THE TIME JUST TO CREATE FAKE PROBABLE CAUSE TO ACCESS EVEN MORE INFORMATION.”

“SOUNDS FAMILIAR TO WHAT HAPPENED TO ME IN LATE 2015!”

“We have been and will continue to assess the proper role of contract employees in the intelligence community, many of whom play a vital role,” said Representative Adam B. Schiff of California, the ranking Democrat on the House Intelligence Committee. “We must be careful not to overcorrect or to draw the wrong lessons. This issue is fundamentally about preventing and detecting insider threats, both from contractors like Edward Snowden and this individual, and from government employees.”

“GUNS DON’T KILL PEOPLE, PEOPLE KILL PEOPLE”

The leak in 2013 of the materials stolen by Mr. Snowden prompted calls from Sen. Dianne Feinstein of California, then the Democratic chairwoman of the Senate Intelligence Committee, for contractors like Booz Allen to lose their access to highly sensitive intelligence. The Obama administration, meanwhile, tightened security measures at intelligence agencies, and slashed the number of employees with access to classified information by 17 percent.

“I KNOW WHAT IT’S LIKE TO LOSE INTERNAL SECURITY CLEARANCES SIMPLY BECAUSE OF LYING AUSTRALIAN FRAUDSTERS IN FEBRYUARY 2014 WHO PERJURED THEIR WAY THROUGH SECURITY OF COSTS HEARINGS AND EVERYTHING ELSE!”

“BUT IRONICALLY, THANKS TO THE EVENTS OF FEBRUARY 2014 WHICH TRIGGERED SPECIFIC CLAUSES, I HAVE LOST CONTROL AND KNOWLEDGE OF VARIOUS ASSETS AND/OR ASSET-HOLDING STRUCTURES – A [VEXATIOUS] MAREVA INJUNCTION AGAINST ME WILL HAVE ABSOLUTELY NO EFFECT ON THE GOOD STUFF :)”

“FOOLS LOOKING FOR ‘OFFICIAL‘ SECURITY CLEARANCES FOR ME WILL NEVER FIND ANY, OBVIOUSLY, BUT THAT HAS NO BEARING ON EITHER THE COMPLEXITY OR VERACITY OF MY WORK.”

The role of contractors has grown since the 1990s, when they were seen as a way to save money, and accelerated in the aftermath of the Sept. 11 terrorist attacks.

“I DID SAY 1993 FROM THE OUTSET, ONCE AGAIN FROM DIRECT EXPERIENCE”

Proponents of using contractors say they allow the government to quickly bring in people with technical expertise, and allow government agencies to get around staffing and budgetary constraints set by Congress.

“TECHNICAL EXPERTISE AND SPEED IS THE OVER-RIDING REASON – THERE IS NO RED TAPE AND ACCELERATED DECISION MAKING BENEFITS EVERYONE, IF YOU HAVE THE RIGHT PERSONNEL. CLEVER PEOPLE ARE ALWAYS IN DEMAND, ESPECIALLY THOSE WHO DON’T SQUEAL WHEN THINGS ARE GOING WRONG :)”

A glaring example of how contractors are used to get around staffing limits can be seen in Afghanistan. There, the Obama administration has set a hard limit on the number of troops that can be deployed — it currently stands at 9,800. The Defense Department and State Department have, as a result, brought in thousands of contractors to do everything from serve food to analyze secret intelligence. There are currently believed to be about six contractors for every American government employee in Afghanistan.

“IN COUNTRIES SUCH AS IRAQ AND AFGHANISTAN THIS HAS ALL GONE WRONG, AND CONTRACTORS THINK THEY ARE ABOVE THE LAW AND GO AROUND SHOOTING PEOPLE!”

At the same time, the use of contractors has often failed to deliver on the promised savings. Critics also say that shifting sensitive work into the hands of private businesses, which are not subject to same disclosure rules as federal agencies, often limits the ability of Congress to provide oversight.

“AS WITH ANY BUSINESS, THE PEOPLE AT THE TOP MAKE THE DECISIONS. WHEN YOU HAVE POOR DECISION-MAKERS THEN THE ORGANISATION WILL SUFFER FOR IT. “

Conclusion

“‘UNLAWFUL’ HAS A DIFFERENT MEANING WHEN THE WORDS ‘MILITARY’ AND ‘MONEY’ ARE INVOLVED.” – JSR DS

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit

WASHINGTON - In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face...

DARPA should ask DISA

By | WEAPONISED SOFTWARE
darpa-should-ask-disa-joseph-de-saram-rhodium-linkedin

DARPA should ask DISA (±x)

Published on 2nd July 2016
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
795

Enter more text here

I read an article today about the Defense Advanced Research Projects Agency (DARPA) wanting “a public wall anyone can monitor or post messages on, but only correct people can decrypt“.

First and foremost who determines who the ‘correct people’ are? Does the United States still think it owns the Internet?

Secondly at USD 150,000 for the ‘keys to the kingdom’, who is going to accept a paltry sum for something worth hundreds of millions of dollars, or even more in pounds thanks to Brexit?

We are told “The advantages of this decentralized structure is that it would be more resilient, and there would be no centralized server where a spy or hacker could gather metadata, according to Frederic Jacobs, an independent security researcher who in the past worked as a developer for the encryption messaging app Signal.”

I used to use Signal when I was a child, and I brushed my teeth with it every morning before ‘creeping like a snail unwillingly to school’! We are then further informed: “The problem with that, he told me, is that such a structure would have higher latency and it’s harder to deploy at scale.”

Not necessarily – harder to deploy by script kiddies, probably. It goes on to say “’When a lot of people start using the service, it might become challenging to find messages that are addressed to you, without revealing to other people who have the data what exactly you are looking for,’ Jacobs said in an online chat.

Well apart from the encrypted English, it sounds like the ‘metadata’ described in the first paragraph would be harder to obtain by the absence of a ‘centralized server’. I used to know people at the National Security Agency (NSA) and they could easily vacuum up enough data from Utah to have a fool-proof method of detection going forward.

In any event why go looking for metadata when you can simply query the Google Play Store and see who downloaded it, and to which account/device? The journalist and/or source exhibit the Igon Value Problem and this article is just laughable.

I do however, believe in non-repudiation for reasons obvious enough although DARPA wants repudiation and plausible deniability. That sounds like a honeypot and one of the special projects that I have worked on enticed people to use a website as a forum to subsequently entrap them 🙂

By way of information, in 2012 my colleagues and I had a working prototype of a cryptographic platform that could be computationally infeasible to decrypt, using (i) current computing power (parts of it have been subjected to brute force attacks via Cray XC30s) and (ii) at the current level of mathematics.

The website at http://www.Kryptodyne.com is not ready yet (my marketing skills are not that great) but “Kryptodyne is the Ultra-Secure Communications and Data Storage Technology which is a key component of Rhodium’s Advanced Real-Time Encrypted Management Information System (“ARTEMIS”) operating at a level far exceeding the requirements for CTSA. Sensitive Compartmented Information is protected during transit and whilst at rest using cryptographically secure (computationally infeasible) nodes/networks. Confidential data resides invisibly within diverse secure wide area networks without risk of interception, modification and repudiation.”

I thought it would be the type of text that appeals to the Sheeple whom I have to say are increasing in numbers these days; however, such text does nothing for the technology so I might remove it. In fact our technology is far more fancy than the website graphics and has cost us around USD 40 million of private funding including virtually all my income plus blood, sweat and tears.

We will try and finish it in 2017 once the current Military Intelligence / Law Enforcement peeps get off my case – this video might help them in determining how good I am and whose side I am on 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP