How ‘Neighbours Acting’ Exposed Another CHIS

By 5 January 2018KEY ARTICLES
how-neighbours-acting-exposed-another-chis-joseph-de-saram-rhodium-linkedin/

How 'Neighbours Acting' Exposed Another CHIS (±x)

Published on January 5, 2018
Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
542

Enter more text here

Background

On 28 and 29 November 2015 Raymond Michael Callingham of Beeley Hawley & Co, along with his co-worker Kim Worrall came to see me in order to provide a full accounting and book-keeping service. By way of information I had known Callingham since around 1996 and from memory they provided audited accounts for the original Rhodium PLC in the UK, for the years 1997 and 1998.

Callingham is also the Director of Cryptodyne Ltd, and it and/or associated entities presently owe Rhodium entities and/or myself around USD 3 million.

Please see the following article for background (which I need to finish):-

How My Recovery's Coming HMRC

20170507 UPDATE - RAY CALLINGHAM HMRC FORM FRAUD EXPOSED / DONALD EVIDENCE OF 'DONALD' 20170503 INITIAL I have been scanning drive surfaces ...

Covert Human Intelligence Sources

There are many ways to detect the presence of a CHIS:-

What They Say

“I need the Police, I need the Police, I need the Police, do you understand?” and “Police, Police, Police, do you understand?”

Covert Human Intelligence Sources - CHIS

still writing this - check back please Covert Human Intelligence Sources ("CHIS") The utilisation of CHIS against me in 2015 onwards was a nothing ...

What They Carry

Transmitting devices whose electromagnetic emanations can be detected by an android mobile phone’s magnetometer:-

Government Health Warning

20170611 EVIDENCE INSERTED In December 2014 I was the victim of a theft of data and destruction of Pure Forensics One of the 'purely forensic' features of the 12/17 Fraud was the covert electronic surveillance and cellular jamming. The evidence is ...

I will write a separate article about equipment, but listen to this for now

“he’s lying… he didn’t bring… he had one file… and that file I think was a modified file that can take photos as it happens… but anyway…”

surveillance equipment

and

Overacting

Overacting (also referred to as hamming or mugging) refers to acting that is exaggerated and overblown, usually in the pejorative sense. There are numerous theatrical euphemisms for overacting. “Chewing the scenery[1] or “scenery chewing” refers to extreme overacting, with the purpose or effect of dominating other performers at the expense of the production. A “ham” refers to an unskilled actor who resorts to overacting, and thus overacting can be called “hamming”.

Audio Recordings

When CHIS are being utilised, their primary purpose is to gather information. That could be taking photos of items, asking the target various questions and recording my responses.

The information gathered in this way would have been generally useful, but in my case

I correctly identified the existence of the operation MONTHS previously so provided disinformation whenever possible – it was hilarious actually 🙂

“All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”

– Sun Tzu, The Art of War


and

“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”

– Sun Tzu, The Art of War


So was able to take them in an entirely incorrect direction:-

Words Do Come Easy - Vox Populi

"Are you like a crazy person?" - ha ha, people say this to me all the time too 🙂 “All warfare is based on deception. Hence, when we are able to

Should the target state specific words of specific significance to the specific investigation itself, then the investigators would provide an audio/visual or other indicators to the CHIS.

However, the audio track (at least) has to be marked at that specific point, to ensure the door is shut on a defence along the lines of ‘the recordings have been tampered with’.

WHICH NECESSARILY MEANS THAT ALL PARTIES, INCLUDING THE TARGET SEES THE EVENT OR HEARS THE EVENT. AND/OR HEARS THE VISUAL EVENT BEING DESCRIBED.

Audio Recordings

The following are selection of audio recordings made on the day between Edward de Saram, Praxy de Saram and I. Since I had already identified them as CHIS, for months, then providing them with audio recordings would be an acceptable method of ensuring that the event was documented properly – meaning I would have a recording and the investigators would have the same recording.

Raymond, Leave a Light on For Me

The following is a selection of excerpts, primarily relating to the Lights issue, and are self-explanatory…

20151129 232500 Excerpt 08

20151129 232500 Excerpt 09

20151129 232500 Excerpt 11

20151129 232500 Excerpt 12

20151129 232500 Excerpt 17

20151129 232500 Excerpt 18

20151129 232500 Excerpt 32

20151129 232500 Excerpt 37

20151129 232500 Excerpt 43

20151129 232500 Excerpt 47

Interim Conclusions

Clearly I was/am the target of an investigation – but actually

I DERIVE GREAT PLEASURE ‘INVESTIGATING THE INVESTIGATORS’ AND I NOW HAVE RECOVERED SUFFICIENT FORENSIC EVIDENCE TO COLLAPSE THE CASE WHENEVER I WANT TO 🙂

and therefore

THE LONG WINTER NIGHTS WOULD JUST FLY 🙂

Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP