Irrefutable Identification of Cellular Interception via Pure Forensic Analysis
One of the precursors to a Military Intelligence operation is the controlling of communications – whether internet traffic or mobile. Cellular interception is the key to obtaining the strategies of the target in real-time – it is extremely easy to effect and the data of multiple targets can be obtained over a relatively short period of time. However, the greatest problem with cellular interception is that it leaves a digital footprint on the device of the target. Accordingly Joseph de Saram reconfigured his devices to capture copious volumes of such evidence – which by its nature, is actually irrefutable…
The video above is by Annie Machon, an ex-Intelligence Officer who worked for MI5. Annie is one of the few of us left who actually have Brains & Balls.
Annie specifically confirms the types of criminal activities that Intelligence Agencies typically involve themselves with. Anyone who has worked in this area knows that her statements are true.
I also refer to my own article:-
MI5 - How 'Being Posh and a Little Bit Gay' Destroys Fundamental Human Rights
COVER-UPS, ASSASSINATIONS AND INCOMPETENCE - EXACTLY! Today is (I think) the 17 year Anniversary of when Rhodium PLC, the UK entity founded on 12 June...
The first 20 seconds of the above video is relevant in this article “Irrefutable Identification of Cellular Interception via Pure Forensic Analysis” as it relates squarely to
“illegal phone taps”.
Early Identification of Hostile Actors is Vital for Personal Security
From visuals alone, an indication of an issue may be determined. This is not Forensic Analysis but at least a list of actors can be identified with a view to dragging them and their donkey pals into a UK Court 🙂
How to Identify Cellular Interception via Pure Forensic Analysis
This article was originally published on Joseph de Saram’s LinkedIn page. As can be seen it proved extremely popular because the techniques Joseph used has significant implications on covert surveillance operations.
Joe's Linkedin (1,544 views)
Tania's Linkedin (194 views)
Tania de Saram’s LinkedIn account also enjoyed significant and relevant traffic in connection with this article.
Perhaps some of the perpetrators have ‘returned to the scene of the crime’ 🙂
The Snoop Snoop Song - It's in his CHIS
"Do they jam him, I wanna know. How can I tell if they're following Joe?" - Cher IMPORTANT MORAL OF THE STORY:- * * "Never Send Sheep to Kill a Wolf"...
Dressed for Failure - Poor Choice of Attire Exposes Surveillance
Following on from my article about CHIS:- this is Part 2 of the series. 20150923 The Mobitel Experience / Truman Show I now present a few more videos...
Body-Worn Surveillance Equipment Doesn't Come in Childrens' Sizes
23 September 2015 - BODY-WORN IMSI CATCHER EXPOSED Similar to, if not Gamma Group Equipment Model 4062 Surveillance Image Following on from other
In such a scenario the existence of Covert Human Intelligence Sources (“CHIS”) means that physical security could be compromised imminently, and a covert surveillance operation may become harassment surveillance, and then escalate to torture when the CHIS find that their fancy equipment is no match for my fancy experience 🙂 :-
Harassment Surveillance - Psychological Torture
I have published this series of Articles so that Linkies can see the true extent of Harassment Surveillance in today's world, as well as the degree...
The above September 2015 photos/videos were predated by Software Analysis from March 2015, which is clearly more robust than visuals, and which meets the standard for Evidentiary Grade Materials for a UK Criminal Prosecution against the clowns.
But better still is the use of Hardware Devices such as Cellular Jammers, which would REALLY NAIL PARTIES, such as the National Clown Agency etc…
Given the fact that:-
Cellular Interception UNAVOIDABLY provides IRREFUTABLE FORENSIC EVIDENTIARY GRADE MATERIAL to the TARGET.
The use of ‘covert’ electronic surveillance is a double-edged sword, in which
A SKILLED INTELLIGENCE ANALYST CAN EASILY EXPOSE AND IDENTIFY THE PERPETRATORS.
Please review this article in detail for the entirely legal justification that I have for my activities:-
The Unalienable Right of Private Defence
THIS MUST SURELY BE ONE OF THE MOST UNIQUE APPLICATIONS OF THE RIGHT OF PRIVATE DEFENCE THAT PEOPLE HAVE SEEN 🙂 I refer to the article by Preveena...
Joe90’s Jam Job
* * THIS IS UNDOUBTEDLY THE PERFECT EXAMPLE OF ABSTRACT THINKING AND VASTLY SUPERIOR COGNITIVE PROCESSES – WHICH UTTERLY DESTROYS THE FRAUDULENT SCHIZOPHRENIA DIAGNOSIS AS WELL. * *
Strategy – MCC and MNC
The list below provides a list of Cellular Networks in Sri Lanka. ‘413’ is the Mobile Country Code (“MCC”) and the second number is the two-digit Mobile Network Code (“MNC”), such as ’05’ for Airtel.
Note that there is no MNC of either 04 or 11 in the above list…
The underlying theory behind this Forensic Analysis is as follows:-
(a) Various unknown parties are deliberately intercepting cellular connectivity to my mobile when connected to any of the 5 cellular networks in Sri Lanka and elsewhere;
(b) Usual calls made from and received to a specific MSISDN are being intercepted and even blocked on occasion (via a simple denial of service using the IMSI) – I was unable to contact my lawyers and the Police on occasions;
(c) Cell Map software can identify the currently connected BTS as well as provide its GPS location as well as maintain a list of historic BTS that the phone has connected to;
(d) The vast majority of BTS are fake and do not exist as fixed locations on the maps of the relevant providers;
(e) The vast majority of BTS which are fake are vehicle mounted, rider-carried or body-worn;
(f) Simply photographing the vehicle’s registration plate and querying it against the Department of Motor Traffic (http://www.motortraffic.gov.lk) would confirm the ownership of the vehicle and further enquiries into the identity of the driver at the time as the potential suspect. In relation to the identity of the individual concerned a First Incident Report can be filed with the CID or photos published publicly requesting assistance in their identification – very humiliating for the ShitLankansTM involved;
(h) Once a cellular jammer is activated, the ‘usual’ [public] networks would immediately cease to function and ‘no signal’ would appear;
(i) In a normal scenario nothing would happen further. If the party had specific instructions under an MLAT, they would be required to re-acquire the target’s devices – no breaks in surveillance operation are permitted obviously;
(j) If the party was foolish enough to use another public provider’s MNC during my cellular jamming, then it would be obvious that the BTS used was fake. I would simply contact the legitimate provider to advise them to review logs and provide them to me which would provide the incriminating evidence of the third party – this would be far higher risk for the perpetrators;
(k) However, this is EXACTLY what I was counting on. With the cellular jammer in operation, the ONLY party that would then connect to my devices (VIA ACTIVE INTERCEPTION) IS the specific party involved, who would NECESSARILY USE THEIR OWN MNC;
(l) Using the information obtained in (f) and (k) I can just obtain witness subpoenas and drag them into a UK court and they can explain about the MLAT or the Pseudo-MLAT – more humiliation for the ShitLankansTM concerned but they are Material Witnesses if nothing else 🙂
HOW I DESCRIBE THE FOREIGN INSTRUCTORS MAKES NO DIFFERENCE TO THAT WHICH I AM ABOUT TO DO TO THE PERPETRATORS – THESE FORENSICS ARE IRREFUTABLE 🙂
Recovered Forensic Evidence
The following 5 videos were recorded on 21 October 2015 and are ESPECIALLY DAMNING. I have the actual originals having recovered the files and they are in my possession again:-
They have been uploaded to my YouTube channel https://www.youtube.com/channel/UCqBIq4tQxQRvjYDWvJrAlEw
and may be viewed from there. However the SHA-256 hashes presented relate to the original .MOV files not the YT files 🙂
20151021_095545_dscn0057_s9900 Cellular Interception via IMEI eff763b1d864ac756ebe4e702edb89dc5e9acbeecbefa6e733b4e71e1aa428e4
The model of the three mobile phones in this video is Samsung SM-A500G
For each of reference they are labelled as ‘A’, ‘B’ and ‘C’ from left to right.
Upon the activating of the cellular jammer, A, B and C lost their cellular connection, confirmed by the appearance of the ‘no parking’ image to the top right on the display of each device.
Additionally there was an effect on the phone’s ability to determine its position via GPS, when GPS was dependent on triangulation via base transceiver stations. The location icon appears intermittently.
On A the green icon of ‘IMSI interception’ is present, with no MCC/MNC/LAC and Cell ID assigned.
On B the yellow icon of ‘IMSI interception’ has appeared, and an MNC of 11 has been determined by B despite no [normal] cellular signal.
Previously there was an LAC of 65534 and a Cell ID of 13314, before the commencement of the forensic analysis.
Just before focus is passed to C, an LAC of 65534 and a Cell ID of 13324 has been assigned to the B and the ‘wedge’ shaped ‘signal icon appears on the top right of the display.
The MNC of 11 does not appear on the official list so it is either Military/Police or Foreign (via a temporary assignment).
Phone C has two ‘no signal’ icons, and MCC/MNC/LAC/Cell ID have been assigned.
20151021_095622_dscn0060_s9900 Cellular Interception via IMEI 89359231a934eb19795c8f29290e8043323ef0e66d6f4e0e5012b299e62fd2ca
Following on from the first video the location symbol is flashing intermittently on C and B
20151021_100037_dscn0062_s9900 Cellular Interception via IMEI 065cd6fcbe3c159e62ac2d017de4a168f4d5e6cd008027c7b767f38e0b22e624
Following on from the last video, C now has been assigned the same LAC as B, of 65534 as well as a Cell ID of 35328.
The MNC of 04 does not appear on the official list so it is either Military/Police or Foreign (via a temporary assignment).
The MNC is 04 rather than 11 which appeared on B on the first video.
Assigning the same LAC of 65534 to B and C, despite two different MNCs of 11 and 04 is careless as it immediately links the two providers to this operation, as well as the source of devices used.
By way of information an LAC can be defined arbitrarily and is not fixed…
However two different MNCs which use the same LAC at the same time, when BOTH have been initially jammed, is ABSOLUTELY NO COINCIDENCE!
This is where laziness and/or ineptitude make things patently obvious even to an Average Joe. It is embarrassing for my adversaries when their ‘military intelligence operations’ lack military precision and insufficient intelligence against me 🙂
On C the SIM 01 is now showing a signal and SIM 02 has no signal.
20151021_100113_dscn0063_s9900 Cellular Interception via IMEI 15fb342b3f9db3756a99d238bc34a5aec937eae039accf517a7734096f0be999
As can be seen both B and C are being controlled by base transceiver stations which are ACTIVELY overcoming the cellular jamming, and the location symbol is flashing intermittently.
20151021_100338_dscn0071_s9900 Cellular Interception via IMEI 8d058b68d4db7e3532463c0f864302e8f47c58596922e960547d5f389429e809
B is connected to:-
MNC 11 / LAC 65534 / CELL ID 13324
C is connected to:-
MNC 04 / LAC 65534 / CELL ID 35328
MNC 11 / LAC 65534 / CELL ID 13324
MNC 04 / LAC 65534 / CELL ID 35328
I AM ONLY JUST GETTING STARTED WITH FORENSIC ANALYSIS AND RECOVERED EVIDENCE MEANS
* * ‘HOUSTON THEY HAVE A MASSIVE PROBLEM’ * *
Joseph S R de Saram CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP