Exposing Covert Surveillance via the Existence of Triangulation

By 10 January 2018KEY ARTICLES
the-significance-of-cellular-triangulation-in-covert-surveillance-operations-joseph-de-saram-rhodium-linkedin

Exposing Covert Surveillance via the Existence of Triangulation

Published on 10th January 2018
Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
874

Joseph S R de Saram CISSP provides thought-provoking insights into Military Intelligence and Law Enforcement, how they operate beyond (as opposed to above) the law, and how their various antics foreseeably lead to the destruction of Fundamental Human Rights. Updates are in progress so check back regularly – verified articles end with . Please feel free to LIKE and SHARE

IMSI Catchers Used In Concert to Locate the Target’s Position

Notwithstanding the hundreds of videos that I have of actors farting around with bikes and rucksacks, this article confirms via forensic evidence that

I WAS ACTUALLY BEING FOLLOWED – READ ON…

Cell Tower Triangulation – How it Works

First, I refer you to Martin Yant’s earlier post on this subject: The post makes the point that data from a single cell tower is essentially worthless in trying to place someone in a partic …

A Minimum of Three Base Transceiver Stations are Required for Accuracy

Page 01
Page 02
Page 03
screenshot_2015-12-30-23-38-29_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-31_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-39_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-42_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-53_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-56_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-59_sm-a500g_jds-41305
screenshot_2015-12-30-23-38-59_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-03_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-05_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-08_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-14_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-17_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-20_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-23_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-26_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-30_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-34_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-37_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-40_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-44_sm-a500g_jds-41305
screenshot_2015-12-30-23-39-51_sm-a500g_jds-41305
screenshot_2015-12-30-23-40-04_sm-a500g_jds-41305
screenshot_2015-12-30-23-40-07_sm-a500g_jds-41305
screenshot_2015-12-30-23-40-18_sm-a500g_jds-41305
screenshot_2015-12-30-23-40-27_sm-a500g_jds-41305
screenshot_2015-12-31-00-09-42_sm-a500g_jds-41305
screenshot_2015-12-31-00-09-51_sm-a500g_jds-41305

Forensic Evidence Confirming Active Triangulation

On 30 December 2015 I had been to Lanka Hospitals (Apollo) to [voluntarily!] see a Psychiatrist (that old chestnut) remember the journey. it was dark and raining, and I would have been difficult to track visually. However, a group of IMSI catchers [virtually] simultaneously received the command to lock onto me. This is actually quite easy to do in software – if I were running the operation I would have used a laptop (one main, one failover) to send the commands to the ISMI catchers in series to acquire the target’s location, with say a few centiseconds delay – and then cycle that process for a bit 🙂

However, in a similar way to a [normal] ‘Klingon Bird of Prey being unable to fire its torpedoes whilst cloaked‘, the group of IMSI catchers are forced to reveal their IDs at [virtually] the same time in order to triangulate my position.

Forensic Evidence Confirming Active Triangulation

Note how my mobile has been downgraded to a 2.0/2.5G EDGE connection, represented by the E icon at the top!

Forensic Evidence Confirming Active Triangulation

Accordingly, I simply took screenshots of the Cell IDs of each IMSI Catcher (now 6) in turn, and we have this.

2015-12-30-23-38-39

a

2015-12-30-23-38-39

a

2015-12-30-23-39-51

a

Also note how Cell 1071 increases in signal strength to -65dBm

2015-12-30-23-39-51

a

2015-12-30-23-39-51

a

2015-12-30-23-39-51

a

Also note how Cell 1071 increases in signal strength to -65dBm

2015-12-30-23-40-07

a

2015-12-30-23-40-07

a

2015-12-30-23-40-07

a

2015-12-31-00-09-42

And back to ‘normal’ cellular interception once I was at home for the night:-

2015-12-31-00-09-51

And control has been passed to a previously dormant fake base transceiver station afterwards. As it happened that particular one was one of the ‘primary cellular interceptors’:-

The Significance of Triangulation in Covert Surveillance

As I have mentioned earlier Cellular Interception via IMSI Catchers allow the calls to be decrypted and monitored. Only one BTS is required for this function, and the target mobile would connect to that.

However the evidence confirming Triangulation is significant because:-

(A) My rough location could already be determined from connecting to only one BTS;

(B) However, it would not be accurate enough, if the operational prerequisites were that there had to be ‘VISUAL CONFIRMATION AT ALL TIMES’;

(C) The [foreign] actors cannot ‘MAINTAIN VISUAL CONFIRMNATION AT ALL TIMES’ if they do not know my ACCURATE PHYSICAL LOCATION;

(D) To reacquire ‘Joe’s accurate physical locationforvisual confirmation at all times‘, especially in the dark:-

* * TRIANGULATION IS UNAVOIDABLE * *

(E) Accordingly:-

* * THE EXISTENCE OF TRIANGULATION CONFIRMS THAT ‘PHYSICAL SURVEILLANCE INVOLVING VISUAL CONFIRMATION AT ALL TIMES’ WAS AN OPERATIONAL PREREQUISITE * *

Joe’s Operation

This is EXACTLY what I was looking to achieve by MY OPERATION. I waited until it was dark and raining, and told the driver to take shortcuts to get me home (meaning using small side roads and not using the main roads wherever possible).

I knew that the actors would not be able to maintain visual confirmation at all times, and it would force them to triangulate my position, if indeed the operational prerequisite was to FOLLOW ME 🙂

* * BOOYAH ! * *

As I have said before:-

fancy [foreign] equipment is no match for Joe’s fancy experience since 1993:-

25yrs of Integrated Systems Research

Please add me to your connections and read other unusual articles relating to Information Security, Forensics, and Fundamental Human Rights...

20150000 LK Adrian Cumine Triangulation re Joseph de Saram MLAT

These are the Cell Map forensics for Adrian Cumine, confirming the existence of Traingulation and therefore confirmation of ‘visual pursuit’ – ie ‘FOLLOWING’

20150000 LK Chamaree Silva Triangulation re Joseph de Saram MLAT

These are the Cell Map forensics for Chamaree Silva, confirming the existence of Traingulation and therefore confirmation of ‘visual pursuit’ – ie ‘FOLLOWING’

20150000 LK Joseph de Saram Triangulation re MLAT

These are my Cell Map forensics confirming the existence of Traingulation and therefore confirmation of ‘visual pursuit’ – ie ‘FOLLOWING’

'Paranoid Persecutory Delusions' Label in Military Intelligence Operations - the Martha Mitchell Effect

Please add me to your connections and read other unusual articles relating to Information Security, Forensics, and Fundamental Human Rights...

By now everyone should know why the retards have the audacity to say that I am the one with the ‘mental problem

they just can’t get past the forensics!

Joseph-S-R-de-Saram

Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect / Intelligence Analyst / Computer Scientist / Human Rights Activist / COMSEC / SIGINT / TSCM
RHODIUM GROUP