MI5 Put Me IN Business

By 1 September 2016TECHNIQUES

MI5 Put Me IN Business (±x)

Published on 1st September 2016


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Enter more text here

I read an interesting article today about Mass Electronic Surveillance and was pleased that a fellow Fellow Kevin Cahill FBCS CITP has the courage to stand up for all of us.

However I am actually surprised that not more is being done for a technological solution (my focus) instead of relying on the law which is flawed in so many ways, and people in the street should investigate the investigators!

I would like to quote one of my colleagues Milton Firman, from his article Should I Appeal:-

‘I have realised over recent years that justice is often just an illusion. You are dependent upon those who purport to represent you, and the judgement of another fallible human being.’

So true Milton, I get this all the time when there are legal issues in low IQ countries.

Human Rights

As many people know I am a proponent of the Fundamental Human Rights, and in particular:-

Article 12 – No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

Article 19 – Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

In the world of mass electronic surveillance, arbitrary interference (Article 12) occurs every second for most people connecting to the internet or using their mobile phones. Colleagues tell me that the NSA can easily collect around two million petabytes per year of ‘fresh stuff’.

By way of comparison, Rhodium Group and/or various associated/non-associated entities has less than 25 petabytes in different locations, mainly intellectual property in nature, although some hidden gems as well – and we keep it offline for a reason!

Article 19 is directly compromised by mass electronic surveillance simply because it is much easier to ‘find out’ about people executing their right to ‘freedom of opinion and expression’, and the communications they have with their pals who are like-minded. 

Most people who want to speak out are too afraid to do so; not because of the consequences but because of the ridiculous speed that their opinions are intercepted and nullified before they can get the word out. It causes such efforts to be somewhat futile.

Google and Facebook are two multinational giants who provide such information to Big Sibling, my attempt at political correctness! For example, Facebook has incredible ways of collecting data and determining the minimum number of key people that would need to be compromised, to knock out vast groups of people. Every other day they run sociology experiments on sections of users and gauge their responses to adverts, words and imagery.

MI5 known as the Security Service, has a blue logo (not the old black Illuminati Triangle) and its motto is ‘Regnum Defende’ – Protector of the Realm or something like that.

Edward Snowden

Whilst Edward Snowden famously leaked information in 2013, I knew about the antics of MI5 twenty years earlier.


Edward was a SysAdmin who accessed other people’s stuff. As an Architect I would be typically one of those ‘other people’. I would love to meet him one day but am NOT impressed about his theft of government data – that is wrong however it is presented by the media.

And my motto is ‘Rectum Defende’ which means ‘Cover Your Arse’.

I always rely on technological solutions to protect data and communications and do not use public key infrastructure, or any systems that rely on any type of certificate-reliant trust model.

When structures have to be used they are longstanding and robust enough to withstand worldwide Mareva Injunctions. As an example, my income is settled directly into structures and then the trustees loan it to me if I have been a good boy. It means that there can never be an unlawful preference, so transactions cannot be reversed either, and freezing my own personal bank accounts will achieve nothing because the balances are negligible.

When I have to communicate I have face to face meetings only, with cellular jammers and white-noise generators present to deal with IEDs and mics. I discuss nothing on e-mail whatsoever and there is nothing on our systems either. In the early days I saw schematics of different projects, all with their silly names such as Palladium or Magic Lantern and I never speak in lifts either because of voice recognition.

But there are ways in which we can fight back…

Brothers in Arms - Human Rights and Electronic Surveillance v3

These days electronic surveillance, usually warrantless, is a disgraceful abuse of process and most people do not know it's going on. This post is version 1 of an introduction to IMSI Catchers, what they are and how to deal with them using Secure...

Electromagnetic Fields

However the Electromagnetic Field created by Ray/Kim when they came to visit was detected by this app on my mobile – https://play.google.com/store/apps/details?id=com.mreprogramming.ultimateemfdetector&hl=en and looked something like this artificial waveform, from memory. These are ones from the actual 29 January 2016 visit of Kalasegaran Genkatharan, another fool planting/stealing data.

First screenshot time-stamped 22:06:34, transmitter on, and an artificial waveform. Second screenshot at 22:06:50 transmitter off, a drop from 369mG to 112mG and a random waveform!

Recording of Intercepted Call

A rare example of an intercepted call between myself and Daljit Gill, whom I assisted with obtaining a judgement for AUD 247,137 in connection with Margaret Cunniffe. It was therefore another call of interest but demonstrates an IMSI catcher failure. I am speaking in real-time and his part of the call repeats twice – they should have dropped the call to avoid this embarrassment!

All part of the re-writing of phone firmware/remote destruction of evidence that I face every day, and people have the audacity to say that I edit calls! I record them for protection otherwise it is so easy to be framed by the construction of my voice from phonemes and the production of entire sentences that I did not even say! People would just not believe this has happened!

The Daily Mail 28 November 2000

The article in the Daily Mail specifically stated:-

“Yesterday [Joe de Saram] claimed his expertise had made him ‘a thorn in Big Brother’s eye’. He said: ‘What I’ve developed will protect everyone’s personal emails. Can you imagine what this means to a Government which has just introduced legislation known as the Regulation of Investigatory Powers Act with the intention of ordering anyone and everyone to reveal their email password whenever asked?

But it goes further than that. We know MI5 is building a multimillion pound facility to monitor all email sent and received in Britain. With my technology they won’t be able to read anything.'”

People said I was nuts about my calls being intercepted and electronic surveillance, a James Bond character or a Walter Mitty, but actually regardless of the label that the journalists chose, I WAS RIGHT:-

Questions that were never asked

But something that everybody missed and never explored is this:-

‘How DID Joe know from the mid-90s onwards that MI5 was planning a facility to monitor all email sent and received in Britain and that it was MI5 hacking his systems and intercepting his calls in the late 90s?’

If you can answer that question then you will know the type of clients I have, and also why I go to extraordinary lengths to obfuscate their identity. And over the years I have become better at identifying hostile threats/attack signatures against me and my pals.

So actually, all things considered I have to say ‘thank you’ to the government spooks – because MI5 Put Me IN Business!



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM