How 'Neighbours Acting' Exposed Another CHIS (±x)
Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with √. Please feel free to LIKE and SHARE…
On 28 and 29 November 2015 Raymond Michael Callingham of Beeley Hawley & Co, along with his co-worker Kim Worrall came to see me in order to provide a full accounting and book-keeping service. By way of information I had known Callingham since around 1996 and from memory they provided audited accounts for the original Rhodium PLC in the UK, for the years 1997 and 1998.
Callingham is also the Director of Cryptodyne Ltd, and it and/or associated entities presently owe Rhodium entities and/or myself around USD 3 million.
Please see the following article for background (which I need to finish):-
How My Recovery's Coming HMRC
20170507 UPDATE - RAY CALLINGHAM HMRC FORM FRAUD EXPOSED / DONALD EVIDENCE OF 'DONALD' 20170503 INITIAL I have been scanning drive surfaces ...
Covert Human Intelligence Sources
There are many ways to detect the presence of a CHIS:-
What They Say
“I need the Police, I need the Police, I need the Police, do you understand?” and “Police, Police, Police, do you understand?”
Covert Human Intelligence Sources - CHIS
still writing this - check back please Covert Human Intelligence Sources ("CHIS") The utilisation of CHIS against me in 2015 onwards was a nothing ...
What They Carry
Transmitting devices whose electromagnetic emanations can be detected by an android mobile phone’s magnetometer:-
Government Health Warning
20170611 EVIDENCE INSERTED In December 2014 I was the victim of a theft of data and destruction of Pure Forensics One of the 'purely forensic' features of the 12/17 Fraud was the covert electronic surveillance and cellular jamming. The evidence is ...
I will write a separate article about equipment, but listen to this for now
“he’s lying… he didn’t bring… he had one file… and that file I think was a modified file that can take photos as it happens… but anyway…”
Overacting (also referred to as hamming or mugging) refers to acting that is exaggerated and overblown, usually in the pejorative sense. There are numerous theatrical euphemisms for overacting. “Chewing the scenery“ or “scenery chewing” refers to extreme overacting, with the purpose or effect of dominating other performers at the expense of the production. A “ham” refers to an unskilled actor who resorts to overacting, and thus overacting can be called “hamming”.
When CHIS are being utilised, their primary purpose is to gather information. That could be taking photos of items, asking the target various questions and recording my responses.
The information gathered in this way would have been generally useful, but in my case
I correctly identified the existence of the operation MONTHS previously so provided disinformation whenever possible – it was hilarious actually 🙂
“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
So was able to take them in an entirely incorrect direction:-
Words Do Come Easy - Vox Populi
"Are you like a crazy person?" - ha ha, people say this to me all the time too 🙂 “All warfare is based on deception. Hence, when we are able to
Should the target state specific words of specific significance to the specific investigation itself, then the investigators would provide an audio/visual or other indicators to the CHIS.
However, the audio track (at least) has to be marked at that specific point, to ensure the door is shut on a defence along the lines of ‘the recordings have been tampered with’.
WHICH NECESSARILY MEANS THAT ALL PARTIES, INCLUDING THE TARGET SEES THE EVENT OR HEARS THE EVENT. AND/OR HEARS THE VISUAL EVENT BEING DESCRIBED.
The following are selection of audio recordings made on the day between Edward de Saram, Praxy de Saram and I. Since I had already identified them as CHIS, for months, then providing them with audio recordings would be an acceptable method of ensuring that the event was documented properly – meaning I would have a recording and the investigators would have the same recording.
Raymond, Leave a Light on For Me
The following is a selection of excerpts, primarily relating to the Lights issue, and are self-explanatory…
20151129 232500 Excerpt 08
20151129 232500 Excerpt 09
20151129 232500 Excerpt 11
20151129 232500 Excerpt 12
20151129 232500 Excerpt 17
20151129 232500 Excerpt 18
20151129 232500 Excerpt 32
20151129 232500 Excerpt 37
20151129 232500 Excerpt 43
20151129 232500 Excerpt 47
Clearly I was/am the target of an investigation – but actually
I DERIVE GREAT PLEASURE ‘INVESTIGATING THE INVESTIGATORS’ AND I NOW HAVE RECOVERED SUFFICIENT FORENSIC EVIDENCE TO COLLAPSE THE CASE WHENEVER I WANT TO 🙂
THE LONG WINTER NIGHTS WOULD JUST FLY 🙂
Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP