Jamming

By 4th May 2017UN-LINKEDIN

Jamming (±x)

Published on 4th May 2017
Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
513

Enter more text here

I am sure my peers in the AU Australian Signals Directorate (“ASD”), UK Government Communications Headquarters (“GCHQ”) and US Central Intelligence Agency (“CIA”) understand the significance of my articles and videos…

The videos provide a rare glimpse of what happens when a Military / Law Enforcement Operation is run against someone who actually has significant tactical Military and Law Enforcement experience. In future check my background properly

In December 2016 I recovered these videos that I had made from 21 October 2015 and they demonstrate a mixture of jamming and cellular interception.

Penal Code

The Penal Code of Sri Lanka provides for a defendant to justify a violent act against an aggressor under the theory of “private defence.”

Every person is granted the right to defend his own body or the body of another “against any offence affecting the human body” or the property of himself or another against acts of “theft, robbery, mischief or criminal trespass.”

The right of private defense in no case extends to inflicting more harm than is necessary for the purposes of defense.

Accordingly Adrian Cumine (“the Cat”) obtained a Cellular Jammer when we were being jammed and our calls intercepted, and of course followed by various vehicles (under some flawed Mutual Legal Assistance Treaty request no doubt).

Cell IDs and IMSI Catchers

This is the latest installment in Cell ID and IMSI – quite boring really but it does confirm that I was correct. As can be seen we have Base Transceiver Locations as well as the Cell IDs and Location Area Codes. Clearly a telecommunications device has provided this information to the mobile phone, and the software (which I am not the author of, and is commercial in nature and available from Google Play Store) independently confirms Cellular Interception.

There are a few duplicate screenshots but these videos are the first drafts, to assist parties in understanding that I do not suffer fools gladly and already have evidence on hand which exceeds various evidentiary burdens for different Causes of Action 🙂

However the continual connection of our mobiles to Fake Base Transceiver Stations resulted in deliberate introduction of malware which re-wrote mobile firmware (often when rebooting) and as well as the injection of malware onto our local area networks when such phones were connected.

This malware then elucidated our local area network topologies, both physical and logical, and then enumerated files containing specific keywords, either destroying or collecting files.

Watch these videos in HD – first up is SnoopSnitch

https://www.hackread.com/snoopsnitch-the-app-that-detects-govts-stingray-mobile-trackers

March 2015 onwards:-

September 2015 onwards was quite fascinating and I have some real gems in reserve of course.

This is the same Chamaree Silva who was writing the bogus Affidavits for the Melbourne Fraudsters et al – odd how she has forgotten that which actually transpired, instead lying about me along with everyone else:-

The Signalling System 7 Attack (“SS7”) against me from the UK one month before the 12/17 Fraud was a nice touch:-

Easy to understand article from the UK Guardian, April 2016:-

These images were obtained using Cell Map:-

July 2015 – 241 Images

August 2015 – 236 Images

September 2015 – 1542 Images

October 2015 – 1135 Images

November 2015 – 92 Images

December 2015 – 129 Images

Should parties be dim enough to still bring a case then I can say right now that Discovery will be running into tens of terabytes, and I have just recovered some really meaty evidence which really nails everyone.

In fact should any party attempt to commence judicial proceedings, I will immediately make an application to Stay those proceedings on the basis of Criminal Fraud and Perversion of the Course of Justice, and request that these latter [more complex] matters be fully determined first.

Adrian The Cat in Singapore – October 2015

We needed various items from Singapore as part of upgrading our commercial systems, and Adrian Cumine (aka The Cat) went to Sim Lim Square to obtain the same in October 2015. It was a useful test of the mobile phone software as well, and to gather further forensic evidence of foreign organisations who appear to have become obsessed with me 🙂

As the evidence shows there was a ridiculous amount of IMSI Catchers:-

Joanne Cochrane in Australia – January 2016

Here is the Cell Map Evidence of parties in Victoria, (the home of the Melbourne Fraudsters) monitoring and/or intercepting the calls of my colleague Joanne Cochrane (aka Twitchie), whom I had worked with between May 2007 and July 2016, and who was Director of Rhodium Australia Pty Ltd and involved in many Asset-holding structures in Australia.

As is evident, there was an excessive amount of Base Transceiver Stations which did not appear to be genuine, or function in a genuine manner. The evidence of the latter I will disclose at the right time when I collapse the case 🙂

GPS Accuracy is 4m (within usual range)

This is a good example of how a fake BTS has commanded the phone to change its method of GPS, resulting in loss of accuracy. A BTS can easily reprogram a mobile phone and introduce malware – don’t forget ‘Over The Air updates’ 🙂

Evidence of GPS Jamming against Joe in 2015

These two screenshots are classic – from the first the GPS Accuracy is 10m – not bad and acceptable I suppose.

However, once GPS Jamming was occurring, my GPS Accuracy fell to 91m – all over a period of 32 seconds:-

So what is the significance of GPS Jamming when identifying IMSI catchers? Well the main issue is that the Latitude and Longitude of the [Fake] Base Transceiver Station are affected. However I obtained a clever way around this as well and I will discuss it at the right time in a Court of Competent Jurisdiction 🙂

Identical Attack Signatures

So given the fact that the signatures of attack and modus operandi are IDENTICAL, and events are occurring in Australia as well as Sri Lanka CONCURRENTLY, there are two scenarios:-

  1. Sri Lankans are behind the operation, telling Australians what to do, providing Australians with expensive equipment and training, promising a better life for Australians in Sri Lanka, education of family members, Sri Lankan healthcare, and Residency Visas for living in Sri Lanka; or
  2. Australians are behind the operation, telling Sri Lankans what to do, providing Sri Lankans with expensive equipment and training, promising a better life for Sri Lankans in Australia, education of family members, Australian healthcare, and Residency Visas for living in Australia.

It is really not rocket science is it? It is extremely easy to Subpoena a Telecoms Provider to produce a detailed list of its Cell IDs and Location Area Codes, as well as connectivity of a specific MSISDN to its network.

This would further demonstrate the existence of Fake BTS and then specific parties who have obtained ‘Authorisations’ would be targeted to ascertain how such ‘Authorisations’ were obtained and then those ‘Authorisations’ would be quashed together with all associated derivative work products and/or further ‘Authorisations’.

Another Fine Mess that they have Got Themselves Into

All this could have been avoided if someone from the foreign parties concerned approached me in an official manner – interviewing me under caution would have been absolutely fine and the correct way to proceed.

Instead this bizarre Cloak & Dagger Operation was entered into, in some sad attempt to intimidate me – which has failed obviously…

[insert evidence]

and have a Staged Road Traffic Accident to break my neck and get me out of my house on 22 October 2015:-

use the opportunity thus created to install wireless cameras and mics:-

use Directed Energy Weapons to wipe data:-

the screen effect is characteristic of an Electromagnetic Pulse:-

and even continue to harm me using psychotronic weapons after all that:-

Using equipment against me that is effectively classified as Munitions which give adversaries an unfair advantage in legal cases, is utterly ridiculous!

People should have properly assessed my background and credentials in this area, as well as my hardcore personality type, instead of making such poor decisions in terms of strategy after reading incorrect Google Articles and listening to the Melbourne Fraudsters!

“Government Spooks don’t spook me!” – JSRDS

Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP

Further reading:-