LEGAL - We are aware that various prevaricators
are propagating injurious falsehoods against
us and tortiously interfering with our commercial
operations. However since my cryptographic work
has been covered by several immunity agreements
from 1993 onwards their lies will go nowhere :)
LEGAL - We are aware that various prevaricators
are propagating injurious falsehoods against
us and tortiously interfering with our commercial
operations. However since my cryptographic work
has been covered by several immunity agreements
from 1993 onwards their lies will go nowhere :)
JOSEPH S R DE SARAM
A British Computer Scientist
with Expertise in the Field of
Information Security Architecture.
Areas of Specialisation include
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
scroll down for more

ABOUT JOE

An Information Security Architect with expansive conceptual abilities.

Joseph S R de Saram CISSP FBCS CITP MACS Snr CP MSCS has expertise in distributed architectures, financial applications and strong cryptographic system design. Proven thought leadership, business development and technical mindset have evolved from over thirty years in the field.

Able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures.

Joseph’s successful implementation of projects from concept to delivery in terms of confidentiality, integrity and availability leads to the improvement in the quality and performance of complex software algorithms.

LATEST

05 June 2016

Timing is everything as they say and many would have to say my timing is generally impeccable. But I have made one major miscalculation.

On 26 July 2000 the Regulation of Investigatory Powers Act 2000 came into existence and shortly afterwards I was subjected to the nonsense that most free-thinking people are subjected to.

But unlike the ones that have long hair, smoke drugs and only come out at night, I was designing technology, appeared on television and radio and was experienced in matters of banking, finance, aerospace, defence, law, information technology and of course information security. The letters after my name are longer than my name and it was an entirely different proposition, in terms of credibility.

Fast forward to 01 March 2016 – the timing could not be worse as only a few days earlier I had confirmed an intention to live in the UK again. And worse still a couple of weeks ago on 19 May 2016. So actually since this electronic surveillance issue prevents me from deriving an income, I really can’t sit in London trying to make money with an abacus 🙂

In any event the first thing is that I have started addressing the various articles about me on the internet – here are the links, and relate to a concerted effort to make me look like a fool:-

Yahoo Answers – Answers Yahoo Question is JSRDS Dead or Alive
Show More Info – Show Me More Info on Joe de Saram
The Register – The Curious Case of Arthur C Clarke, MI5 and the Runaway Millionaire
Wired – What Are You Doing, Arthur ?
Computer Weekly – Credit Confusion Surrounds a Trade Reference
The Register – Software Tycoon ‘flees Tamil Tigers’
Forbes – Stranger than Science Fiction
ZDNet – Software Millionaire Dot-Gone with Rhodium Collapse
The Guardian – Founder Joe de Saram Absent as Rhodium Folds
The Daily Mail – MI5 Put Me out of Business

Such articles are obviously incorrect and in fact incorrect to such a degree that they are ‘not even wrong’! I am presently finding that each inflammatory diatribe polarises foolish people against my loved ones and I.

Please have a look at our websites as I bring them back online over the forthcoming weeks – there are more than 500 domains and this process will take time although there is something for everyone. And don’t forget to add me via LinkedIn as I am powering forward with our ongoing projects now that I am back!

 

Joe

GB +44 778 RHODIUM / LK +94 78 RHODIUM

HUMAN RIGHTS

"He who sacrifices information security for freedom deserves neither." – Joseph S R de Saram, Computer Scientist.

During various award ceremonies and events for Rhodium PLC, was an interview that I gave on BBC Breakfast News in March 2000, in which I was probably the first person to publicly advocate the use of ‘levels of encryption’ to create a ‘secure medium for trading’. During a subsequent interview on the same day for BBC World, I also spoke about buying an island, building a server farm and then setting up an internet bank known as Immortal.

Obviously the ‘powers that think they be’ (aka Civil Servants) did not like that – and it was good enough to convince them that I was laundering money. I was already on MI5 lists because of (a) having NSA-approved military grade Intimus cross-cut shredders (b) continually background-checked when I was on the guest-lists at award ceremonies, and where members of the Royal family were present (c) and having some investigation in which the officers were lying all the way through fabricating evidence as they went along and attributing it to me, saying that I had ‘cooked the books’.

By way of information, using pseudonyms in the preparation of financial statements is neither tax nor accounting fraud, because the financial position itself is unaffected and the tax computations are the same.

Particularly interesting is how my my work in Anti-Money Laundering / Fake-Bank Systems / Black Projects was forgotten (it was all the rage at the time) and various contacts in the Metropolitan Police Service and City of London Police decided not to assist after I had covered for a whole load of informants.

Rhodium PLC needed to get some proper Information Technology consultants since the ones from the US that I was using at the time were expensive and awkward at times. I had decided to outsource to Sri Lanka and was one of the first to consider the country as a primary center for outsourcing.

I had a working prototype of a cryptographic system which upheld Articles 12 and 19 of the Universal Declaration of Human Rights, and which unavoidably made a mockery of the Regulation of Investigatory Powers Act 2000. But to be honest RIPA itself made a mockery of human rights, so was fair game.

I was subjected to harassment surveillance, call interception and Rhodium PLC, the UK entity of Rhodium Group was forced to enter insolvent liquidation in November 2000, despite my significant efforts to the contrary. I was the largest creditor and in Sri Lanka at the time yet I got blamed.

The circumstances were unsual and I was working on a well-publicised Public Flotation which was set to raise USD 40 million for the same Rhodium PLC. In fact I was working with Sir Arthur C Clarke and he endorsed the technology which was known as Xencrypt.

Only a government agency with something to gain would prevent the Flotation since USD 40 million is a larger amount than the GBP 1 million or so which was ultimately owed by Rhodium PLC.

Step forward HMCE / NCIS who propagated injurious falsehoods, tortiously interfered with our suppliers and generally made a nuisance of themselves via commercial disruption. We were creaming the former in a VAT tribunal at the time and they felt it was easier to get heavy-handed with me.

I was the first to identify unlawful government surveillance in the UK because I elucidated their primitive attack signatures over an ISDN-128k connection as well as their continual attempt to get access to servers by dozy assets they had working for them – systems engineers would phone me and ask me for passwords but not know why they were asking for them. And of course driving around a sleepy village called Eckington jamming a 2G Cellnet connection with the odd Ford Focus or two.

Various police contacts aluded to it at the time and then deliberately misled me – cheers guys. It was only years later that I had the final proof from a couple of friends who had ended up in SOCA.

In any event, it was my baptism of fire and I desired to FightInjustice from that point onwards because what had happened to me was JustBullshit and regardless of what journalists say MI5PutMeOutOfBusiness.

However ImNoOnesBitch and ILoveMyEncryptionTechnology enough to take a beating. Fifteen years later my colleagues and I have architected a vastly superior cryptographic platform known as Kryptodyne, at the cost of tens of millions of dollars and plenty of blood, sweat and tears.

The Unlawful Surveillance problem is spectacularly spiralling out of control because of politically-motivated WeaponsOfMassDistraction and being in a PrismCell or forced to enjoy TemporaPrawns are not things that the AverageJoe find acceptable.

MI5’s antics over more than a decade were confirmed in 2015 and it feels good to be Finally Vindicated.

However it is patently obvious that ImBeingFramedAgain and terribly bored of my computer systems being unlawfully accessed every day as well as data stolen after enumeration of my home network, or the deliberate destruction of my own forensic evidence which implicates the perpetrators.

By way of information this nonsense has been going on for some time but frankly I am experienced and can easily identify parties by deep packet inspection, heuristics, attack signatures and metadata.

Thankfully around 2.28 Petabytes of CTSA level data (which is ours and not stolen) is safely with my colleagues and not even God knows the jurisdiction or the strength of encryption algorithms used 🙂

Should members of the Intelligence, Defence and Law Enforcement fraternity have any legitimate concerns please contact me directly rather than wasting my time with the current ‘cloak and dagger’ approach which I find it extremely irritating and a disgraceful Perversion of the Course of Justice in any event.

Seriously, can you stop this going around slagging me off everywhere? Lawyers in Australia are shitting their pants and I have the voice recordings of them humiliating themselves, by asking questions that they are not interested in having answers to.

My colleagues and I will only put up with so much, and I would hate for there to be an information security leak thousands of times the size of Edward Snowden’s 🙂

ACCOUNTS ISSUES

31 May 2016

Updates in Progress

INFORMATION SECURITY

Cryptography Theory

Banking and Financial Systems

Network Operations Security

P2P Tunnelling Protocols

Cryptographically Secure PRNGs

Key Exchange Mechanisms

Applied Cryptography

Secure Distributed Architectures

Assurance via Non-Repudiation

Multidimensional Obfuscation

Advanced Neural Networks

P2P Payment Authentication

Computational Infeasibility

Biometric Authentication

Application Security

Disaster Recovery / BCP

Financial Network Security

Law and Forensic Investigation

INFOSEC EXPERIENCE

  • Advanced Cryptographics
    22yrs 7mths (271mths)

  • Operations Security
    22yrs 7mths (271mths)

  • Telecommunications and Network Security
    22yrs 7mths (271mths)

  • Hybrid and Emerging Technology
    22yrs 6mths (270mths)

  • Security Leadership and Management
    22yrs 5mths (269mths)

  • Information Security Governance and Risk Management
    20yrs 8mths (248mths)

  • Forensic Science, Investigations and Techniques
    19yrs 11mths (239mths)

  • Software Development Security
    18yrs 7mths (216mths)

  • Requirements Analysis and Security Standards, Guidelines, Criteria
    18yrs 0mths (216mths)

  • Physical Security Integration
    17yrs 8mths (212mths)

  • Certification and Accreditation / Risk Management Framework
    17yrs 3mths (207mths)

  • Security Architecture Analysis and Design
    17yrs 1mths (205mths)

  • Enterprise-Wide System Development Security
    17yrs 1mths (205mths)

  • Enterprise Security Management Practices
    16yrs 8mths (200mths)

  • Access Control Systems and Methodology
    16yrs 8mths (200mths)

  • Government Information Security Assurance
    16yrs 6mths (198mths)

  • Business Continuity Planning and Disaster Recovery Planning
    16yrs 1mths (193mths)

  • Legal, Regulations, Investigation and Compliance
    15yrs 9mths (189mths)

OPERATING SYSTEMS EXPERIENCE

Microsoft Windows 10 to Windows for Workgroups 3.11, MS-DOS 3.2 (1992-2016)
Android Donut to Marshmallow 6.01 (2009-2016)
Oracle Linux 6 to 7 (2014-2016)
BSD OpenBSD 5.6 to 5.8 (2014-2016)
Apple Mac OS 8.1 to 10.11.3 (1981-2016), iPhone OS 3.0 to iOS 9.2.1 (2009-2016)
Red Hat Enterprise Linux (2004-2016)
Canonical Ubuntu 9.04 (2008-2010)
Acorn Machine Operating System to RISC OS (1982-2005)

PROGRAMMING LANGUAGE EXPERIENCE

PL/SQL [Procedural Language/Structured Query Language] (2002-2016)
BASIC [Beginner’s All-purpose Symbolic Instruction Code] (1982-2005)
PASCAL [a high level programming language] (1982-1990)
FORTRAN 77-90 [Formula Translating System] (1982-1990)
COBOL [Common Business-Oriented language] (1982-1990)
ADA [used by United States Department of Defense] (1982-1985)
ALGOL 68 [Algorithmic Language 1968] (1982-1985)

DATABASE EXPERIENCE

Microsoft SQL Server 2005 to 2015 (2005-2016)
MYSQL MySQL Classic (2004-2016)
ORACLE Oracle 12c to 6i (1999-2016)

ENTERPRISE RESOURCE PLANNING

SAP R/3 and R/3 Enterprise Release 3.0F-4.6C (1997-2010), Release 4.70 (2002-2010)
mySAP Business Intelligence BW 2.0B/2.1C/3.0A/3.0B (2000-2005)
mySAP Customer Relationship Management CRM 3.0/3.1/4.0 (2002-2005)
mySAP Financials SEM-BW 3.1B-3.50 (2002-2005), SEM-BCS 3.1B-3.50 (2002-2005)
mySAP Supply Chain Management APO 3.1 (2002-2005), SCM 4.0/4.1 (2004-2005)


IT TRAINING AND PROFESSIONAL DEVELOPMENT (SFIA 6)

Strategy and Architecture

Information strategy

IT governance
GOVN
567
 
IT Strategy & Planning
ITSP
567
 
Information management
IRMG
4567
 
Information systems coordination
ISCO
67
 
Information security
SCTY
34567
 
Information assurance
INAS
567
 
Analytics
INAN
34567
 
Information content publishing
ICPM
123456 
 

Advice and guidance

Consultancy
CNSL
567
 
Technical specialism
TECH
456 
 

Business strategy and planning

Research
RSCH
23456 
 
IT Management
ITMG
567
 
Innovation
INOV
56 
 
Business process improvement
BPRE
567
 
Enterprise and business architecture development
STPL
567
 
Business risk management
BURM
4567
 
Sustainable strategy
SUST
56 
 

Technical strategy and planning

Emerging technology monitoring
EMRG
456 
 
Continuity management
COPL
45  
 
Software development process improvement
SPIM
56 
 
Sustainability management
SUMI
56 
 
Network planning
NTPL
56 
 
Solution architecture
ARCH
56 
 
Data management
DATM
23456 
 
Methods and tools
METL
456 
 

Skills & Quality

Skill Management

Learning and Development Management
ETMG
234567
 
Learning Assessment and Evaluation
LEDA
3456 
 
Learning Design and Development
TMCR
456 
 
Learning Delivery
ETDL
345  
 
Teaching & Subject Formation
TEAC
56 
 

People Management

Performance Management
PEMT
456 
 
Resourcing
RESC
456 
 

Quality and conformance

Quality management
QUMG
4567
 
Quality assurance
QUAS
3456 
 
Quality standards
QUST
2345  
 
Conformance review
CORE
3456 
 
Safety assessment
SFAS
56 
 
Digital Forensics
DGFS
456 
 

Development and implementation

Systems Development

Systems development management
DLMG
567
 
Data analysis
DTAN
2345  
 
System design
DESN
23456 
 
Network design
NTDS
56 
 
Database design
DBDS
23456 
 
Programming/software development
PROG
2345  
 
Animation development
ADEV
3456 
 
Safety engineering
SFEN
3456 
 
Sustainability engineering
SUEN
456 
 
Information content authoring
INCA
123456 
 
Testing
TEST
123456 
 

User Experience

User experience analysis
UNAN
23456 
 
User experience design
HCEV
3456 
 
User experience evaluation
USEV
23456 
 

Installation and integration

Systems integration
SINT
23456 
 
Porting/software Configuration
PORT
3456 
 
Hardware Design
HWDE
456 
 
Systems installation/decommissioning
HSIN
12345  
 

Change & Transformation

Business change implementation

Portfolio management
POMG
567
 
Programme management
PGMG
67
 
Project management
PRMG
4567
 
Portfolio, programme and project support
PROF
23458 
 

Business change implementation

Business analysis
BUAN
3456 
 
Requirements definition and management
REQM
23456 
 
Business process testing
BPTS
456 
 
Change implementation planning and management
CIPM
56 
 
Organisation design and implementation
ORDI
56 
 
Benefits management
BENM
56 
 
Business modelling
BSMO
23456 
 
Sustainability assessment
SUAS
456 
 

Relationships and engagement

Stakeholder management

Sourcing
SORC
234567
 
Contract Management
ITCM
456 
 
Relationship management
RLMT
4567
 
Customer Service Support
CSMG
123456 
 

Delivery and Operation

Service Design

Availibility Management
AVMT
456 
 
Service Level Management
SLMO
234567
 

Service Operation

System Software
SYSP
345&nbsl; 
 
Capacity management
CPMG
456 
 
Security Administration
SCAD
23456 
 
Penetration Testing
PENT
456 
 
Radio Frequency Engineering
RFEN
23456 
 
Application Support
ASUP
1234   
 
IT Infrastructure
ITOP
1234   
 
Database Administration
DBAD
2345  
 
Storage Management
DBAD
2345  
 
Network Support
NTAS
23456 
 
Problem Management
PBMG
2345  
 
Incident Management
USUP
2345  
 
Facilities Management
DCMA
3456 
 

Sales and marketing

Digital Marketing
MKTG
23456 
 
Selling
SALE
456 
 
Sales Support
SSUP
123456 
 
Product Management
PROD
3456 
 


SFIAplus

SFIAplus contains the SFIA framework of IT skills plus detailed training and development resources. Additional competency, training and development detail for all 96 skills and 344 tasks (skill at a level), makes SFIAplus a three dimensional model.The result is the most established and widely adopted IT skills, training and development model that reflects current industry needs.

QUOTES

It take ‘Brains, Balls and Financial Muscle’ to help ordinary people solve the extraordinary problems of Fighting Injustice.

Joseph S R de Saram, Information Security Architect

He who sacrifices information security for freedom deserves neither.

Joseph S R de Saram, Information Security Architect

I prefer to struggle every week to reach for the stars and the high standards I set for myself, than set low standards and achieve them daily.

Joseph S R de Saram, Information Security Architect

I’m not afraid of Unjust Laws or Corrupt Cops – I have a brilliant legal mind and my favourite colour is blue.

Joseph S R de Saram, Information Security Architect

Whilst the person who lies will eventually change his story once the pressure becomes too great, the man who speaks the truth cannot change the facts to anything else, even if he faces disbelief and ridicule.

Joseph S R de Saram, Information Security Architect

They tried to milk me like a cow, but I’m a bull and hate being milked.

Joseph S R de Saram, Information Security Architect

It does not take big balls to stand up for what you believe in – it just takes two.

Joseph S R de Saram, Information Security Architect

I have found it necessary to define my own paradigms because there is no-one around me whom I can look up to.

Joseph S R de Saram, Information Security Architect

I always like to thank those that believed in me, and remember those that didn’t – because without them I would have probably taken an easier path.

Joseph S R de Saram, Information Security Architect

When I lost my mind for 5 years, I realised what it was like to be ‘Just an Average Joe’.

Joseph S R de Saram, Information Security Architect

If you’re smarter than the people giving you advice then you’re an idiot if you listen to them.

Joseph S R de Saram, Information Security Architect

Nothing beats the assurance of a relationship with a major International Investment Bank, especially when you see their staff wearing Rolex watches.

Joseph S R de Saram, Information Security Architect

If I wanted to work with vegetables then I would get a job in a market.

Joseph S R de Saram, Information Security Architect

When making a critical decision, I would always be prepared to seek forgiveness afterwards, than obtain permission before.

Joseph S R de Saram, Information Security Architect

The worst thing about being a genius is that most people are not smart enough to appreciate it.

Joseph S R de Saram, Information Security Architect

First the people refused martial law, then the people requested martial law, now the people plead for martial law.

Joseph S R de Saram, Information Security Architect

When it comes to financial matters, I prefer to follow the best strategy and lose money than listen to mediocre advice and get mediocre results.

Joseph S R de Saram, Information Security Architect

Many people say ‘the glass is half full’; many say ‘the glass is half empty’. Only a few of us ask ‘What’s actually in the glass?’

Joseph S R de Saram, Information Security Architect

I do not waste time drowning in other people’s stupidity, when there are so many things that can be achieved with a brilliant mind.

Joseph S R de Saram, Information Security Architect

I do not suffer fools gladly – I get pissed off like everyone else.

Joseph S R de Saram, Information Security Architect

I always aspire to perfection as there is no limit as to what perfection could be.

Joseph S R de Saram, Information Security Architect

Two heads ARE better than one, particularly if one of them is mine.

Joseph S R de Saram, Information Security Architect

‘Finishing in 2nd position’ is just a fancy phrase for ‘being thrashed’.

Joseph S R de Saram, Information Security Architect

I have always encouraged my peers to ‘push the envelope’ but when ‘licking the envelope’ is too challenging then you know you will have admin problems.

Joseph S R de Saram, Information Security Architect

Most battles are won logically in the mind, before the physical battle even starts on the field.

Joseph S R de Saram, Information Security Architect

Most people associate red for hot and blue for cold – when a flame is blue, it is actually hotter than a red flame, so what do they say then?

Joseph S R de Saram, Information Security Architect

I am not interested in just answers, I want the right answers.

Joseph S R de Saram, Information Security Architect

Trying hard to win is not the same thing as avoiding defeat.

Joseph S R de Saram, Information Security Architect

Regardless of what I am playing, my music will never be appreciated when the audience is deaf.

Joseph S R de Saram, Information Security Architect

Many people dream small and then get surprised when big things don’t happen to them.

Joseph S R de Saram, Information Security Architect

Everybody is so talented nowadays that the only people I care to honour as deserving real distinction are those who harness encryption.

Joseph S R de Saram, Information Security Architect

‘State of the Art’ depends greatly on the ability of the artist.

Joseph S R de Saram, Information Security Architect

Sure there is no ‘I’ in ‘TEAMWORK’ but there is one in ‘GENIUS’, and also one in ‘RICH’.

Joseph S R de Saram, Information Security Architect

Most people wait for it to happen – I prefer to Make I.T. Happen.

Joseph S R de Saram, Information Security Architect

SUBSCRIBE

STAY CONNECTED

Real time web analytics, Wordpress visitor counter, Wordpress visitor tracking