The de Saram Code

By 4 October 2017Z UNCATEGORISED
the-de-saram-code-joseph-de-saram-rhodium-linkedin

The de Saram Code (Β±x)

Published on 31st October 2017
Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
436

Enter more text here

“I like to stay ahead of the curve, especially if it is hyper-elliptic :)” – Joseph S R de Saram

but this article is not about cryptography πŸ™‚

Following from this article:-

Words Do Come Easy - Vox Populi

"Are you like a crazy person?" - ha ha, people say this to me all the time too πŸ™‚ β€œAll warfare is based on deception. Hence, when we are able to...

I demonstrate how I ‘mark the audio/video’ at certain points, to provide an indelible mark by which I can always refer to at a later time.

These excerpts are from 10 March 2000 – it is directly relevant to matters in 2017, 17.6yrs later πŸ™‚

Celebrity Apprentice

One of Margaret Cunniffe‘s ‘great’ ideas was to ‘enter competitions’ and ‘be a celebrity’ – I had neither the time not the inclination to do so but I eventually agreed because she thought it might be good for marketing. The below video excerpts are from 10 March 2000 and is from an interview I gave on BBC Breakfast News with Tanya Beckett.

Behavioural Analysis (“BA”)

BA is the broad term in which behavioural sciences are used to assist in criminal investigations, particularly in their initial stages.

First Key Excerpt

“We develop banking software, financial software… you mentioned the B2B arena, that’s the kind of market place we’re involved with”.

This is a coded message. Analysing the segment confirms:-

(a) we develop banking software, financial software;

(b) the B2B arena;

(c) the kind of market place we’re involved with.

The first and most obvious thing is that I am using the word “we” yet it was only I in Rhodium PLC who had the brains to architect systems – so who is the “we” I am referring to? They are in fact the members of the team (US peeps), and I was “involved” with them.

Whilst I have used the word “develop” I am not referring to ‘coding’ but ‘architecting’. I am referring to taking a concept and prototyping an ‘end result’ for developers to code.

I have also referred to “banking” software as different to “financial” software. I have specifically stated this because under the Money Laundering Systems:-

were the “banking” part meaning ‘Treasury Management’, and the “financial” software meaning ‘Inflow/Outflow of funds’. Money Laundering cannot be successfully proved and obtain a criminal conviction, if the money does not actually move anywhere πŸ™‚

“B2B” means ‘business to business’ – means hardcore commercial organisations – I was not interested in end-user projects or servicing ‘Ma & Pa shops’.

And what does “the kind of market place” even mean?!

Everyone knows how precise I am yet I have deliberately structured sentences so that an intelligent party receives the actual information but the ‘normal folk’ would accept information at face value πŸ™‚

Second Key Excerpt

Many years ago when I set up the company, I realised that the internet or banks or whatever would be dependent on secure systemslevels of encryption… and the public perception to be a secure medium for trading.. we use that, we put alot of effort into that and getting us up to speed and now we are enjoying the reaps of our foresight.”

This message is also coded:-

(d) Many years ago;

(e) the company;

(f) the internet or banks or whatever;

(g) dependent on secure systems;

(h) levels of encryption;

(i) public perception;

(j) secure medium for trading;

(k) enjoying the reaps of our foresight;

When I say “many years ago” and “the company” I am actually referring to Integrated Systems Research Ltd (“ISR”) not Rhodium – otherwise I would have simply said “I set up Rhodium”.

Using the odd phrase “the internet or banks or whatever means Dual-Use Technologies – the internet and bank uses cryptography for items such as SSL certificates, whereas Aerospace & Defence uses cryptography for Communications Security (“COMSEC”) and a whole host of ‘interesting’ projects is the “whatever” πŸ™‚

Also note how I deliberately drop my eyes and make it look like I am lying about the ‘whatever’. I used exactly the same technique when Ray Callingham was asking me questions about work and I said the words ‘police informant’ which ended up making the lights flicker in my house!!

The part Callingham just could not grasp is that I was marking the audio track with confirmation that I had been identified him as a C.H.I.S. !!

β€œEngage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment β€” that which they cannot anticipate.”

― Sun Tzu, The Art of War

The reason that I deliberately look like I am lying is because then an analysis of the video will be inconclusive. It basically keeps my options open. In both situations (BBC Interview, and Callingham) I actually told the truth but packaged it in a very unusual way πŸ™‚

By way of information when I was in New York in September 1999 and met my US peeps

it was they that told me to do that if ever I was being interviewed by the police or otherwise (but not if I were formally cautioned obviously) that I should do various things to obfuscate certain topics.

I can make truths look like lies but I cannot make lies look like truth – so my ability to mislead is poor – this is a product of having a hyperthymestic memory:-

Liars tend to be convincing and are all things to everyone – no-one believes anything I say – often because I am direct and can’t care less. I sugar-coat nothing whatsoever!

But to say that ‘Joe is not convincing therefore he is not a liar’ would be another logical fallacy πŸ™‚ As it happens my materials are extremely complex and parties prefer to determine they are lies, rather than acknowledging that they themselves are too dense to understand:-

“Dependent on secure systems” covers commercial banking as well as military applications, and “levels of encryption” refers to the strength of the ciphers used which result ultimately in an increase or decrease in work factor required when attacking a cryptosystem.

I then talk about “public perception” which is obviously irrelevant because in the first excerpt above I have specifically referred to “you mentioned B2B arena” as opposed to ‘B2C‘ which is ‘Business to Consumer’.

In B2C public perception (if end-users were the target market) keeping end-users informed and happy is a prerequisite. Tanya herself referred to B2C not B2B in the prior segment before my interview and me specifically referring to something that she has not said as if she has stand out a mile, to parties who understand BA.

My use of “public perception” was particularly ironic since the projects were clandestine!!

I really do not know how I managed to keep a straight face, but Sacha Baron Cohen is the true maestro at this πŸ™‚

Dual-Use Technologies

Dual use goods are products and technologies normally used for civilian purposes but which may have military applications, and this is where things get interesting…

Video Killed The Radio Star

As it happened this ‘marketing’ took my eye off the project-work ball in 1999/2000 because of these ‘Rich Lists’ etc, and after dozy journalists wrote rubbish about me I decided to obfuscate literally every single thing that I do, everywhere πŸ™‚

However, it is abundantly clear that that which I am stating in 2017 cannot possibly be an afterthought, since names of entities, dates and events from 1993 onwards follow a sequence that could only have been determined due to the events AT THAT TIME.

The case continues…

Joseph-S-R-de-Saram

Joseph S R de Saram (JSRDS)

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP