My Hops Don’t Lie

My Hops Don't Lie

My Hops Don't Lie (±x)

Published on 3rd March 2017
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
512

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

LOWER quality beliefs but PLENTY of them

Parties have gone to an INCREDIBLE amount of trouble to wipe key IP logs. Here is an example of one from Lower Plenty and relate to accessing of Rhodium servers and there are 11 of them in the space of 5mins. There were concomitant hacks as well:-

As I recall from the day, it may have been a Monday in Victoria and there were subsequent IP logs from Eltham Police Complex. Clearly the Melbourne Fraudsters want to get their lies and self-victimisation in early, I am STILL astonished that it is this this type of evidence that has been deliberately destroyed.

The new attorneys will obtain the information from the Police via Crime Fraud Exceptions and a host of other legislation, so it would be good for them to start collating it ahead of our requests 🙂

20170303 INITIAL London Calling – literally

From around 19:00 GMT on 03 March 2017 the UK came to me – I noticed it when I went to the GoDaddy website:-

Demonstrable by simply refreshing the browser. Note the SSL certificate status confirming active interception .

After refreshing browser, same page:-                                                          

Around 23:30 I made this quick video:-

Traceroute

As can be seen the traffic is passing from me at Hop 17 to Hop 1 which is the DNSStuff website.

At Hop 11 the packets have reached the US.

Filtering and rerouting is taking place at Hop 10:-

At Hop 11 the packets have reached the US.

and it is going to London for analysis, collection and enabling me to be hacked easily. My SSL sessions are decrypted at the first Hop in my direction (the ISP) as well.

At Hop 8 the process is completed and the traffic is then sent on its otherwise ‘merry way’ back to the US:-

At Hop 7 the packets (hopefully unmodified) ‘stay calm and carry on’ as if nothing has happened 🙂

My attorneys will obtain a Court Order against every hop, but we will start off with the UK. They will say ‘Knock Knock’ and see how the Authorisations were obtained. Then we will track back and see when the Melbourne Fraudsters provided their perjurious affidavits to the UK interceptors – not rocket science 🙂

December 2014 and Australians are LinkedIn

Read this post for background on the theft of data, which the Melbourne Fraudsters orchestrated. This article is still being written and more juicy information will appear shortly.

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP