Schrodinger’s Cat


Schrodinger's Cat (±x)

Published on 18th September 2016


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE



Erwin Schrödinger was born in Vienna on August 12 1887, and was awarded the Nobel Prize in Physics in 1933. He is best known for his work regarding quantum theory, particularly about his thought experiment involving a cat in order to explain the flawed interpretation of quantum superposition. This leads to various aspects of everyday scenarios that we face which are often not considered correctly…

The Copenhagen Interpretation of quantum mechanics essentially states that an object in a physical system can simultaneously exist in all possible configurations, but observing the system forces the system to collapse and forces the object into just one of those possible states. Schrödinger disagreed with this interpretation.

Schrödinger wanted people to imagine that a cat, poison, a geiger counter, radioactive material, and a hammer were inside a sealed container. The amount of radioactive material was minuscule enough that it only had a 50/50 chance of being detected over the course of an hour. If the geiger counter detected radiation, the hammer would smash the poison, killing the cat. Until someone opened the container and observed the system, it was impossible to predict the cat’s outcome. Thus, until the system collapsed into one configuration, the cat would exist in some superposition zombie state of being both alive and dead.

Of course, Schrödinger claimed, that was ridiculous. Quantum superposition could not work with large objects such as cats, because it is impossible for an organism to be simultaneously alive and dead. Thus, he reasoned that the Copenhagen Interpretation must be inherently flawed. While many people incorrectly assume Schrödinger supported the premise behind the thought experiment, he really didn’t. His entire point was that it was impossible.

While it is true that modern experiments have revealed quantum superposition does work for tiny things like electrons, larger objects must be regarded differently.

In the thought experiment, until the box was actually observed, the observer would not know the actual position. Something similar is present during investigations, in which the parties who are investigating are mere observers rather than directly linked to an event.

A case might get ‘stronger’ at various points in time, as more ‘information’ or ‘evidence’ appears which supports the predetermined conclusion. At the start of the experiment, the cat may be moving a lot having just been put into the box, whereas towards the end it might be more subdued. But to draw the analogy that it is dead would be flawed.

But would people really want a cat dead? Yes they would…


Deriving pleasure from the [often perceived] misfortune of others is known as ‘Schadenfreude’ and is a phenomenon prevalent in South Asian and Anglospheric countries such as Australia and the United Kingdom. A related theme is ‘Tall Poppy Syndrome‘.

Individuals exhibiting Schadenfreude often have a greater sense of elation from seeing their adversary fail, than themselves doing well. Once members of a Groupthink define a party as ‘bad’ then that person is demonised and becomes the focus of their hatred.

The issue with the Groupthink is that there is little critical evaluation or reassessment of that which they are doing due to the desire to seek conformity.

Investigations and Questionable Evidence

During investigations it is clear that parties prefer a negative outcome to make their task worthwhile, rather than the facts. Often investigators are paid to achieve specific results, for example in the case of ‘Is my husband cheating on me?’, the investigator might seek to achieve the wife’s desire of ‘yes he is’ rather than ‘I am not sure’ or ‘your husband has joined a book-club’.

If the investigator is not sure, then the wife will conclude ‘the investigator has failed’ and ‘perhaps my husband is cheating on me’. Investigators invariably focus on achieving the client’s desired outcome only by obtaining materials and information that support their objectives, however flawed they might be, rather than that which confirms the actual position.

As such investigators are often over-zealous in their approach and ‘do whatever they need to do’ to obtain the desired results. Associated parties are allowed and encouraged to lie, as long as there are sufficient layers between different groups and plausible deniability. 

After a while they will fail to actually investigate and merely follow the course that a previous investigation ran, drawing incorrect analogies; this is an effect of specialist training or forensics, for example.

Often this results in a blinkered approach and more seriously it gives rise to a failure in full and frank disclosure as evidence that does not support the flawed approach is disregarded completely.

More training ‘should’ result in a better investigator, but does that translate to a better investigation? No not necessarily, and training can impact negatively upon correct interpretation of evidence and scenarios.

Specialist Firearms Training and Cognitive Bias

I knew various police officers from 1992 onwards who were in the specialist firearms section of the Metropolitan Police Service, known as SO19.

An interesting issue arose in which the more training was provided in terms of making the decision of when to use deadly force, the greater the subsequent inability to recall peripheral aspects of the event. Tactical officers in live operations ended up being poor witnesses and lost scenic information, and yet they were making decisions on the live operation as it was unfolding.

Another issue is that when more training was given to officers to determine whether deadly force was required or not, there was a cognitive bias in classifying the situation as one in which deadly force was acceptable, resulting in less fallout if something went wrong. In recent months a police pal on LinkedIn confirmed this as well.

Incorrect Classification of the Scenario

An excellent example which occurs time and time again is when a batsman is given LBW in cricket. Often the batsman plays off the back foot and the ball hits him below the knee-roll. He thinks to himself ‘oh that ball stayed low’ and ‘that is why I am now out’ as he shakes his head and trudges to the pavilion.

Only after watching the replay he realises that he should have not gone onto the back foot. If he had played on his front foot then the ball would not have been perceived as ‘being low’ and would have hopefully been dispatched for a few runs. His initial interpretation and concomitant mistake about the ball height are the issue.


In the aforementioned experiment, people who are merely observers or investigators will only find out the correct position upon the opening of the box. Until that time they may well have deluded themselves into thinking that their position is correct and/or strong, since the Groupthink and sycophants around them will reinforce their thinking. The desire to please their client as well as schadenfreude play a part in the direction that an investigation follows, even if it is incorrect from the outset.

Is there anyone who knows the correct position of the cat at an earlier point in time? Yes there is only one, and that is the cat himself! But no-one has chosen to ask the cat – and in fact it is not in the interest of the investigator to ask the cat as it might cut such an experiment short, and thereby reduce the amount of money derived from a lengthy multi-jurisdictional investigation 🙂

Cat-lovers might hope that the cat is alive at the end of the hour. Cat-haters might be hoping that it would be dead. The proportion of people wanting one outcome over the other would vary as the investigation proceeded due to their desire to align themselves in a politically-useful fashion.

Joe is a Cat

Let us say that I am the cat. Many people, 95%, want me to fail and only a few people, 5%, want me to succeed. Bearing in mind that cryptographic work and defence is a niche market, then the clients who like me and who actually know what is going on, demonstrates 5% vs 95% – not much and certainly not the popular vote in terms of numbers.

However given that 5% of the people are controlling 95% of the global power then the people that like me, actually equate to 95% in power terms 🙂

Sail a ship into any iceberg and you will find that 90% is below the surface. Look at the ‘popular’ part of the internet and compare it to the ‘dark web’ – the former is not even 1% of what is actually out there but many people are deluded into thinking that Facebook and LinkedIn plus the sites indexed by Google is all there is. They are sadly mistaken 🙂

The greater the ability of a person in terms of conceptual abilities and intellect, the greater the number of parties with inferior intellect beneath them. This is not arrogance, it is a statement of fact.

It is laughable to think that someone operating at Grade C is going to have a better understanding of a particular matter than someone operating at Grade A+++, regardless of how many stakeholders have bought into their beliefs. This is classic Dunning-Kruger Effect.

In Summary:-

(a) clandestine projects are obfuscated for reasons obvious enough, but simply because the observer cannot see them, it does not mean that they do not exist;

(b) those who are not directly involved in a project cannot possibly provide an opinion on the nature of that project;

(c) those who do not have my level of conceptual abilities and intellect will not succeed against me in matters where the determinant of eventual success is based on intellect;

(d) until someone actually asks me (and I may or may not explain), the position will remain unknown (if I have not forgotten of course);

(e) breaking my neck and wiping my evidence was a truly bad move…



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

PS apologies to various adversaries – you should have checked your facts at a much earlier point in time. But here are some songs to cheer you up…


London and Kent




Cheshire – no music but the image for my post is a Cheshire Cat 🙂

Every Breath You Take


Every Breath You Take (±x)

Published on 12th September 2016


Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE


From around 2006 onwards I became involved in securing communications for various projects involving Directed Energy Weapons. This post is primarily about the quite bizarre way valuable intellectual property and evidence relating to various cases, was destroyed in late 2015, and how I can easily identify what’s going on thanks to operational experience.

One of the issues of being an Information Security Architect involved with advanced cryptographics and electronic surveillance, is that the whole world seems to want to know (a) what you are designing, (b) who your clients are, (c) where does the money come from, and, (d) where does the money go.

Arbitrary Interference occurs all the time and being investigated for absolutely anything under the sun is just another day at the office!

The mere fact that I have a no-nonsense personality type as well as the fact that I am non-conformist seems to cause many political issues for adversaries as I end up being portrayed as a threat to National Security.

However one of the massive benefits of live operations against me is that I have the perfect environment to understand the types of attacks, their signatures and frequency, the frequencies of jamming devices and wireless transmitters, and everything else in-between!

Many people provide consulting services in a purely theoretical fashion. I have raw data from when my clients have had major investigations, which can be analysed. That is why I was charging around CHF 9888 per hour in 2012 (around USD 10,200 per hour) before I had serious heart problems. For the last four years I have earned USD 0.00 in total but I’m getting back into thing finally..

Two types of Adversaries

(1) The script kiddies who put low level devices around my house to capture what I say and do, use devices like this:-

I obviously knew about everything going on in Autumn 2015, which is why I put on quite a spectacular show, to give them something to produce statements about. Virtually everything I said in my house was disinformation, and simply analysing the responses of people around me confirmed the ongoing fraud by the investigators. I threw things around and chose as many keywords as I possibly could in every sentence!

(2) The government agents who should be a lot better, but are not really.

Directed Energy Weapons

There are essentially two main types, (a) those that are high-energy lasers which can shoot down long range airborne targets, and, (b) those based on radio-frequency which have the effect of a non-nuclear Electromagnetic Pulse which operate at short range. For this post I will be focussing on the weapons that use microwave radiation.

Radio-frequency Weapons

Microwaves are a form of electromagnetic radiation with wavelengths ranging from one metre to one millimetre; with frequencies between 300 MHz (100 cm) and 300 GHz (0.1 cm). This broad definition includes both UHF and EHF (millimetre waves), and various sources use different boundaries. In all cases, microwave includes the entire SHF band (3 to 30 GHz, or 10 to 1 cm) at minimum, with RF engineering often restricting the range between 1 and 100 GHz (300 and 3 mm).

After I was subjected to a staged road traffic accident in October 2015, I have mentioned that my house was rewired with wireless cameras and mics. But one of the worst aspects was a continual transmission of high doses of microwave radiation onto my equipment as well as me.

After Edward de Saram left my house on 17 December 2015 I heard a high-pitched sound and ran upstairs. I saw that there were electromagnetic pulses which targeted one of my main systems. This system had particular significance in that it contained evidence that I would need to use in various cases, as defences and/or counterclaims.

I think this is the first time data destruction by a government using an Electromagnetic Pulse has been captured on video – even the keyboard had been rendered inoperative. The computer was NOT connected to the internet either and the wireless network had also been switched off. The laptop, an Asus G75VX with two 1Tb SSDs, was being turned into an expensive concrete slab!

David Kelly was the Ministry of Defence advisor to the UK government before he ended up dead over the Weapons of Mass Destruction issue.

The interesting part of this paragraph is:-


The BBC broadcast a programme on Kelly on 25 February 2007 as part of the series The Conspiracy Files;[34] the network commissioned an opinion poll to establish the views of the public on his death. 22.7% of those surveyed thought Kelly had not killed himself, 38.8% of people believed he had, and 38.5% said they did not know.[35].

On 19 May 2006 Norman BakerLiberal Democrat MP for Lewes, who had previously investigated the Hinduja affair, which led to the resignation of government minister Peter Mandelson, announced that he had been investigating “unanswered questions” from the official inquiry into Kelly’s death.[36] He later announced that he had uncovered evidence to show that Kelly did not die from natural causes.[37]

In July 2006, Baker claimed that his hard drive had been wiped remotely.[38] Baker’s book The Strange Death of David Kelly was serialised in the Daily Mail before publication in November 2007.

And who is involved with a soon to be launched political site which is called, aimed at exposing the fraud of how the British people were misled about the UK/US invasion of Afghanistan, as governments are looking for terrorist groups they themselves have created? – yes Joe de Saram!

Remote Wiping of Hard Drives

I am well aware of the National Security Agency’s capabilities in this area. An easy to understand article is this one:-

Microwave Radiation Expert Barrie Trower - Royal Navy and British Secret Service

Very interesting video next – listen very carefully from 6:40 to 8:23, and compare what happened to me at the hands of my parents!!

If I was not an expert in directed energy weapons then I would have been unable to correctly identify what was happening. That in itself confirms the work I have performed is genuine and also confirms my level of experience!

Scientific Basis

Non-thermal microwave/lower frequency electromagnetic fields (EMFs) act via voltage-gated calcium channel (VGCC) activation. Calcium channel blockers block EMF effects and several types of additional evidence confirm this mechanism. Low intensity microwave EMFs have been proposed to produce neuropsychiatric effects, sometimes called microwave syndrome, and the focus of this review is whether these are indeed well documented and consistent with the known mechanism(s) of action of such EMFs.

VGCCs occur in very high densities throughout the nervous system and have near universal roles in the release of neurotransmitters and neuroendocrine hormones. Soviet and Western literature shows that much of the impact of non-thermal microwave exposures in experimental animals occurs in the brain and peripheral nervous system, such that nervous system histology and function show diverse and substantial changes. These may be generated through roles of VGCC activation, producing excessive neurotransmitter/neuroendocrine release as well as oxidative/nitrosative stress and other responses.

Among the more commonly reported changes are sleep disturbance/insomnia, headache, depression/depressive symptoms, fatigue/tiredness, dysesthesia, concentration/attention dysfunction, memory changes, dizziness, irritability, loss of appetite/body weight, restlessness/anxiety, nausea, skin burning/tingling/dermographism and EEG changes.

Technical Surveillance Countermeasures ("TSCM")

I use a JJN Digital WAM-108T Multiband Wireless Activity Monitor, a high specification portable handheld multiband detector for the detection and logging of all types of radio frequency devices. Designed for the ever-increasing threat from more sophisticated and higher frequency RF devices, the WAM-108T provides complete coverage and logging of all activity in the surrounding area.

The WAM-108T is designed to detect and locate transmissions from all types of radio frequency devices. It contains an unprecedented eight separate RF detectors operating simultaneously to give complete RF coverage: 1 x 0-14 GHz Wideband, 5 x Cellular 2G/3G/4G and 2 x Wifi/Bluetooth 2.4 GHz and 5 GHz.

The 0-14 GHz Wideband detector provides the highest range of coverage of all RF activity in the target area. The frequency of the detected signal (up to 6GHz) can be seen simultaneously and the new ‘Livescan’ software shows the detected live signal pattern graphically to help identify the signal type. This can be particularly useful when searching for pulsing or burst devices such as GPS trackers.

The five cellular bands offer complete detection of all 2G/3G/4G mobile based devices including mobile phones, smartphones, vehicle trackers, GSM listening devices (bugs) and covert wireless 3G/4G cameras. There are now more devices than ever using these cellular bands and the WAM-108t ensures they will all be detected.

The WAM-108T also has a separate 2.4 GHz and a new 5 Ghz band for the rapidly growing threat from Wifi/Bluetooth/Video and other latest generation ‘Store & Forward’ devices. Such devices can for example, record audio over long periods and then transmit it in short regular bursts. It will also detect other devices that use these bands such as covert wireless video transmitters. Complex algorithms analyse the detected signal to help identify the signal type, ie. Bluetooth, Wifi, or other 2.4Ghz or 5Ghz signals.

The WAM-108T can be used in any environment where radio frequency detection is required such as sensitive meeting rooms/offices to check for hidden listening devices, covert cameras, unauthorised mobile phone usage in offices, exam halls, hospitals or prisons and in vehicles to locate hidden GPS tracking devices. Multiple high gain amplifiers ensure detection up to 50 meters depending on signal strength and ambient conditions.

The WAM-108t is designed and manufactured in the UK to the highest specification and is enclosed in customised machined aircraft-grade aluminium enclosure. The complete system is supplied in a heavy duty military standard carry case for ultimate protection.

Video of WAM-108T in normal environment (Italian version but look at the left-most column in the videos of the device)

Video of WAM-108T in an environment with Massive Microwave Radiation - (my house)

However, what is happening to me is extremely serious from a legal perspective – (a) evidence that I would use to defend myself in judicial proceedings has been destroyed, (b) evidence that I have obtained to identify the perpetrators has been partially corrupted, and, (c) I am being converted from Genius Joe to Average Joe every minute of every day!

Thankfully I do NOT have mental problems and have the personality type and intellect to rise above this nonsense. These are the lies being pushed by parties in Australia and Sri Lanka who love to question the veracity of everything I do in order to produce a massive amount of self-serving garbage, with which to try and bring some case or another!

And finally I have to mention that I said more prayers from 17 December 2015 – 21 December 2015 whilst in that Mental Asylum than I did the entire five years before!



Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM