JOSEPH S R DE SARAM
Computer Scientist
Архитектор информационной безопасности
مهندس أمن المعلومات
with Expertise in the Field of
Information Security Architecture.
Areas of Specialisation include
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
scroll down for more

ABOUT JOE

An Information Security Architect with expansive conceptual abilities.

Joseph S R de Saram CISSP FBCS CITP MACS Snr CP MSCS has expertise in distributed architectures, financial applications and strong cryptographic system design. Proven thought leadership, business development and technical mindset have evolved from over thirty years in the field.

Able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures.

Joseph’s successful implementation of projects from concept to delivery in terms of confidentiality, integrity and availability leads to the improvement in the quality and performance of complex software algorithms.

LATEST

20160920

Thank you for visiting my site today – we are just working on some updates.

 

Tania’s Throne

We have pleasure in confirming that Tania Marie de Saram is in charge of Rhodium Group entities, and she will be in touch to introduce herself over the forthcoming weeks. Tania will endeavour to contact every single organisation and to share Rhodium’s vision for the next 5yrs. Please be patient as there are a lot of people to contact now that we have resumed commercial operations.

Whilst the last 5yrs have been difficult for me from mid 2011 onwards due to an emergency SGD 28k operation in Singapore, data and ongoing heart issues, Tania’s pragmatic approach and emotional intelligence will rapidly return Rhodium to the right track. Having similar genes to me can’t be a bad thing either 🙂

 

Rhodium’s Revenge

I am astonished by the incredible level of ineptitude and blatant perversion of the course of justice that is being demonstrated by various parties (Law Enforcement included) in Melbourne, Colombo, Singapore, London, Stockport and Birmingham.

With Tania handling commercial operations that frees me up to Litig8 in no uncertain terms against all parties involved as a thank you for unlawful surveillance, planting and then discovering ‘their evidence’, inciting violence against me such as breaking my neck and generally making a nuisance of themselves.

It’s a shame for them that their destruction of my evidence (which I can demonstrate forensically) has the effect of reversing the burden of proof, and I look forward to wiping my arse on their pleadings and materials if they are dense enough to bring a case against me that is doomed to fail 🙂

 

Defamatory Diatribes

I have recently started addressing the various articles about me on the internet – here are the links, and relate to a concerted effort to make me look like a fool:-

Yahoo Answers – Answers Yahoo Question is JSRDS Dead or Alive

Show More Info – Show Me More Info on Joe de Saram

The Register – The Curious Case of Arthur C Clarke, MI5 and the Runaway Millionaire

Wired – What Are You Doing, Arthur ?

Computer Weekly – Credit Confusion Surrounds a Trade Reference

The Register – Software Tycoon ‘flees Tamil Tigers’

Forbes – Stranger than Science Fiction

ZDNet – Software Millionaire Dot-Gone with Rhodium Collapse

The Guardian – Founder Joe de Saram Absent as Rhodium Folds

The Daily Mail – MI5 Put Me out of Business

Such articles are obviously incorrect (except the last one is not too bad I must admit) and in fact incorrect to such a degree that they are ‘not even wrong’! I am presently finding that each inflammatory diatribe polarises foolish people against me.

 

Social Setting

A selection of my recent posts on LinkedIn may be of some interest:-

 

02 May 2016 – Can I Get A Witness? 02 July 2016 – DARPA should ask DISA
09 August 2016 – Tie Me Kangaroo Down Sport! 22 August 2016 – You’ve Been Framed!
28 August 2016 – Sins of the Father 01 September 2016 – MI5 Put Me IN Business
02 September 2016 – WLG Linked to Destruction of Evidence 04 September 2016 – Dirty Cash!
06 September 2016 – When Cases Collapse 07 September 2016 – No Ordinary Accident
08 September 2016 – Money, Money, Money 09 September 2016 – Please Mr Postman!
11 September 2016 – Decent Lawyers Required 12 September 2016 – Every Breath You Take
14 September 2016 – ‘Hadrian’s Firewall’ – JSRDS 18 September 2016 – Joe’s Kitchen
18 September 2016 – Schrodinger’s Cat XX September 2016 –

 

Please add me via LinkedIn, Twitter and Facebook as I want to get my social life back on track. And don’t forget to follow Rhodium Group as we plan the resources around some major project launches 🙂

 

Joe

 

RHODIUM

FLEXIPAY KRYPTODYNE REALTYCHECK SELL.IT SPANKTHEBANK FIGHTINJUSTICE JUSTBULLSHIT    

 

HUMAN RIGHTS

ACCOUNTS ISSUES

20160909 UPDATE

After contractors in Australia and Sri Lanka had caused significant damage to Rhodium’s commercial operations via injurious falsehoods, tortious interference and theft of resources and data, we are pleased to announce that our redesigned systems have now been implemented.

Every time we were close to completing the backlog, some clown or another would conveniently steal or destroy the materials, either paper-based or electronic!

We are now ameliorating the situation in the most expedient manner possible using a number of different contractors, although their involvement does not alter the contractual nature of your existing relationship with the Rhodium entity concerned.

 

Information Required

We require the following information as colour pdfs, without which we would not be in a position to resolve matters to our mutual satisfaction:-

1) The full legal name of the entity providing your goods and/or services, with postal address, url, phone, fax and general e-mail address;

2) The full name and e-mail address of the person responsible for Accounts Receivable / Credit Control;

3) Accounts Receivable Statements showing the full and detailed transaction histories between ourselves since the commencement of the relationship;

4) Tax Invoices (with your tax identification) issued to the correct Rhodium entity, together with supporting documentation such as detailed descriptions of the work product and detailed timesheets for contractors;

5) A detailed audit trail showing all payments received from us, including payment methods used such as credit cards or bank transfers and currency conversions applied;

6) Copies of all agreements entered into with yourselves including those that have been superseded;

7) Any other relevant information which would assist us in performing a full Creditor Circularisation.

Please be assured that our commitment to resolution of outstanding matters is not in question, and your patience during this time is gratefully appreciated.

INFORMATION SECURITY

Cryptography Theory

Banking and Financial Systems

Network Operations Security

P2P Tunnelling Protocols

Cryptographically Secure PRNGs

Key Exchange Mechanisms

Applied Cryptography

Secure Distributed Architectures

Assurance via Non-Repudiation

Multidimensional Obfuscation

Advanced Neural Networks

P2P Payment Authentication

Computational Infeasibility

Biometric Authentication

Application Security

Disaster Recovery / BCP

Financial Network Security

Law and Forensic Investigation

INFOSEC EXPERIENCE

  • Advanced Cryptographics
    22yrs 7mths (271mths)

  • Operations Security
    22yrs 7mths (271mths)

  • Telecommunications and Network Security
    22yrs 7mths (271mths)

  • Hybrid and Emerging Technology
    22yrs 6mths (270mths)

  • Security Leadership and Management
    22yrs 5mths (269mths)

  • Information Security Governance and Risk Management
    20yrs 8mths (248mths)

  • Forensic Science, Investigations and Techniques
    19yrs 11mths (239mths)

  • Software Development Security
    18yrs 7mths (216mths)

  • Requirements Analysis and Security Standards, Guidelines, Criteria
    18yrs 0mths (216mths)

  • Physical Security Integration
    17yrs 8mths (212mths)

  • Certification and Accreditation / Risk Management Framework
    17yrs 3mths (207mths)

  • Security Architecture Analysis and Design
    17yrs 1mths (205mths)

  • Enterprise-Wide System Development Security
    17yrs 1mths (205mths)

  • Enterprise Security Management Practices
    16yrs 8mths (200mths)

  • Access Control Systems and Methodology
    16yrs 8mths (200mths)

  • Government Information Security Assurance
    16yrs 6mths (198mths)

  • Business Continuity Planning and Disaster Recovery Planning
    16yrs 1mths (193mths)

  • Legal, Regulations, Investigation and Compliance
    15yrs 9mths (189mths)

OPERATING SYSTEMS EXPERIENCE

Microsoft Windows 10 to Windows for Workgroups 3.11, MS-DOS 3.2 (1992-2016)
Android Donut to Marshmallow 6.01 (2009-2016)
Oracle Linux 6 to 7 (2014-2016)
BSD OpenBSD 5.6 to 5.8 (2014-2016)
Apple Mac OS 8.1 to 10.11.3 (1981-2016), iPhone OS 3.0 to iOS 9.2.1 (2009-2016)
Red Hat Enterprise Linux (2004-2016)
Canonical Ubuntu 9.04 (2008-2010)
Acorn Machine Operating System to RISC OS (1982-2005)

PROGRAMMING LANGUAGE EXPERIENCE

PL/SQL [Procedural Language/Structured Query Language] (2002-2016)
BASIC [Beginner’s All-purpose Symbolic Instruction Code] (1982-2005)
PASCAL [a high level programming language] (1982-1990)
FORTRAN 77-90 [Formula Translating System] (1982-1990)
COBOL [Common Business-Oriented language] (1982-1990)
ADA [used by United States Department of Defense] (1982-1985)
ALGOL 68 [Algorithmic Language 1968] (1982-1985)

DATABASE EXPERIENCE

Microsoft SQL Server 2005 to 2015 (2005-2016)
MYSQL MySQL Classic (2004-2016)
ORACLE Oracle 12c to 6i (1999-2016)

ENTERPRISE RESOURCE PLANNING

SAP R/3 and R/3 Enterprise Release 3.0F-4.6C (1997-2010), Release 4.70 (2002-2010)
mySAP Business Intelligence BW 2.0B/2.1C/3.0A/3.0B (2000-2005)
mySAP Customer Relationship Management CRM 3.0/3.1/4.0 (2002-2005)
mySAP Financials SEM-BW 3.1B-3.50 (2002-2005), SEM-BCS 3.1B-3.50 (2002-2005)
mySAP Supply Chain Management APO 3.1 (2002-2005), SCM 4.0/4.1 (2004-2005)


IT TRAINING AND PROFESSIONAL DEVELOPMENT (SFIA 6)

Strategy and Architecture

Information strategy

IT governance
GOVN
567
 
IT Strategy & Planning
ITSP
567
 
Information management
IRMG
4567
 
Information systems coordination
ISCO
67
 
Information security
SCTY
34567
 
Information assurance
INAS
567
 
Analytics
INAN
34567
 
Information content publishing
ICPM
123456 
 

Advice and guidance

Consultancy
CNSL
567
 
Technical specialism
TECH
456 
 

Business strategy and planning

Research
RSCH
23456 
 
IT Management
ITMG
567
 
Innovation
INOV
56 
 
Business process improvement
BPRE
567
 
Enterprise and business architecture development
STPL
567
 
Business risk management
BURM
4567
 
Sustainable strategy
SUST
56 
 

Technical strategy and planning

Emerging technology monitoring
EMRG
456 
 
Continuity management
COPL
45  
 
Software development process improvement
SPIM
56 
 
Sustainability management
SUMI
56 
 
Network planning
NTPL
56 
 
Solution architecture
ARCH
56 
 
Data management
DATM
23456 
 
Methods and tools
METL
456 
 

Skills & Quality

Skill Management

Learning and Development Management
ETMG
234567
 
Learning Assessment and Evaluation
LEDA
3456 
 
Learning Design and Development
TMCR
456 
 
Learning Delivery
ETDL
345  
 
Teaching & Subject Formation
TEAC
56 
 

People Management

Performance Management
PEMT
456 
 
Resourcing
RESC
456 
 

Quality and conformance

Quality management
QUMG
4567
 
Quality assurance
QUAS
3456 
 
Quality standards
QUST
2345  
 
Conformance review
CORE
3456 
 
Safety assessment
SFAS
56 
 
Digital Forensics
DGFS
456 
 

Development and implementation

Systems Development

Systems development management
DLMG
567
 
Data analysis
DTAN
2345  
 
System design
DESN
23456 
 
Network design
NTDS
56 
 
Database design
DBDS
23456 
 
Programming/software development
PROG
2345  
 
Animation development
ADEV
3456 
 
Safety engineering
SFEN
3456 
 
Sustainability engineering
SUEN
456 
 
Information content authoring
INCA
123456 
 
Testing
TEST
123456 
 

User Experience

User experience analysis
UNAN
23456 
 
User experience design
HCEV
3456 
 
User experience evaluation
USEV
23456 
 

Installation and integration

Systems integration
SINT
23456 
 
Porting/software Configuration
PORT
3456 
 
Hardware Design
HWDE
456 
 
Systems installation/decommissioning
HSIN
12345  
 

Change & Transformation

Business change implementation

Portfolio management
POMG
567
 
Programme management
PGMG
67
 
Project management
PRMG
4567
 
Portfolio, programme and project support
PROF
23458 
 

Business change implementation

Business analysis
BUAN
3456 
 
Requirements definition and management
REQM
23456 
 
Business process testing
BPTS
456 
 
Change implementation planning and management
CIPM
56 
 
Organisation design and implementation
ORDI
56 
 
Benefits management
BENM
56 
 
Business modelling
BSMO
23456 
 
Sustainability assessment
SUAS
456 
 

Relationships and engagement

Stakeholder management

Sourcing
SORC
234567
 
Contract Management
ITCM
456 
 
Relationship management
RLMT
4567
 
Customer Service Support
CSMG
123456 
 

Delivery and Operation

Service Design

Availibility Management
AVMT
456 
 
Service Level Management
SLMO
234567
 

Service Operation

System Software
SYSP
345&nbsl; 
 
Capacity management
CPMG
456 
 
Security Administration
SCAD
23456 
 
Penetration Testing
PENT
456 
 
Radio Frequency Engineering
RFEN
23456 
 
Application Support
ASUP
1234   
 
IT Infrastructure
ITOP
1234   
 
Database Administration
DBAD
2345  
 
Storage Management
DBAD
2345  
 
Network Support
NTAS
23456 
 
Problem Management
PBMG
2345  
 
Incident Management
USUP
2345  
 
Facilities Management
DCMA
3456 
 

Sales and marketing

Digital Marketing
MKTG
23456 
 
Selling
SALE
456 
 
Sales Support
SSUP
123456 
 
Product Management
PROD
3456 
 


SFIAplus

SFIAplus contains the SFIA framework of IT skills plus detailed training and development resources. Additional competency, training and development detail for all 96 skills and 344 tasks (skill at a level), makes SFIAplus a three dimensional model.The result is the most established and widely adopted IT skills, training and development model that reflects current industry needs.

QUOTES

It take ‘Brains, Balls and Financial Muscle’ to help ordinary people solve the extraordinary problems of Fighting Injustice.

Joseph S R de Saram, Information Security Architect

He who sacrifices information security for freedom deserves neither.

Joseph S R de Saram, Information Security Architect

I prefer to struggle every week to reach for the stars and the high standards I set for myself, than set low standards and achieve them daily.

Joseph S R de Saram, Information Security Architect

I’m not afraid of Unjust Laws or Corrupt Cops – I have a brilliant legal mind and my favourite colour is blue.

Joseph S R de Saram, Information Security Architect

Whilst the person who lies will eventually change his story once the pressure becomes too great, the man who speaks the truth cannot change the facts to anything else, even if he faces disbelief and ridicule.

Joseph S R de Saram, Information Security Architect

They tried to milk me like a cow, but I’m a bull and hate being milked.

Joseph S R de Saram, Information Security Architect

It does not take big balls to stand up for what you believe in – it just takes two.

Joseph S R de Saram, Information Security Architect

I have found it necessary to define my own paradigms because there is no-one around me whom I can look up to.

Joseph S R de Saram, Information Security Architect

I always like to thank those that believed in me, and remember those that didn’t – because without them I would have probably taken an easier path.

Joseph S R de Saram, Information Security Architect

When I lost my mind for 5 years, I realised what it was like to be ‘Just an Average Joe’.

Joseph S R de Saram, Information Security Architect

If you’re smarter than the people giving you advice then you’re an idiot if you listen to them.

Joseph S R de Saram, Information Security Architect

Nothing beats the assurance of a relationship with a major International Investment Bank, especially when you see their staff wearing Rolex watches.

Joseph S R de Saram, Information Security Architect

If I wanted to work with vegetables then I would get a job in a market.

Joseph S R de Saram, Information Security Architect

When making a critical decision, I would always be prepared to seek forgiveness afterwards, than obtain permission before.

Joseph S R de Saram, Information Security Architect

The worst thing about being a genius is that most people are not smart enough to appreciate it.

Joseph S R de Saram, Information Security Architect

First the people refused martial law, then the people requested martial law, now the people plead for martial law.

Joseph S R de Saram, Information Security Architect

When it comes to financial matters, I prefer to follow the best strategy and lose money than listen to mediocre advice and get mediocre results.

Joseph S R de Saram, Information Security Architect

Many people say ‘the glass is half full’; many say ‘the glass is half empty’. Only a few of us ask ‘What’s actually in the glass?’

Joseph S R de Saram, Information Security Architect

I do not waste time drowning in other people’s stupidity, when there are so many things that can be achieved with a brilliant mind.

Joseph S R de Saram, Information Security Architect

I do not suffer fools gladly – I get pissed off like everyone else.

Joseph S R de Saram, Information Security Architect

I always aspire to perfection as there is no limit as to what perfection could be.

Joseph S R de Saram, Information Security Architect

Two heads ARE better than one, particularly if one of them is mine.

Joseph S R de Saram, Information Security Architect

‘Finishing in 2nd position’ is just a fancy phrase for ‘being thrashed’.

Joseph S R de Saram, Information Security Architect

I have always encouraged my peers to ‘push the envelope’ but when ‘licking the envelope’ is too challenging then you know you will have admin problems.

Joseph S R de Saram, Information Security Architect

Most battles are won logically in the mind, before the physical battle even starts on the field.

Joseph S R de Saram, Information Security Architect

Most people associate red for hot and blue for cold – when a flame is blue, it is actually hotter than a red flame, so what do they say then?

Joseph S R de Saram, Information Security Architect

I am not interested in just answers, I want the right answers.

Joseph S R de Saram, Information Security Architect

Trying hard to win is not the same thing as avoiding defeat.

Joseph S R de Saram, Information Security Architect

Regardless of what I am playing, my music will never be appreciated when the audience is deaf.

Joseph S R de Saram, Information Security Architect

Many people dream small and then get surprised when big things don’t happen to them.

Joseph S R de Saram, Information Security Architect

Everybody is so talented nowadays that the only people I care to honour as deserving real distinction are those who harness encryption.

Joseph S R de Saram, Information Security Architect

‘State of the Art’ depends greatly on the ability of the artist.

Joseph S R de Saram, Information Security Architect

Sure there is no ‘I’ in ‘TEAMWORK’ but there is one in ‘GENIUS’, and also one in ‘RICH’.

Joseph S R de Saram, Information Security Architect

Most people wait for it to happen – I prefer to Make I.T. Happen.

Joseph S R de Saram, Information Security Architect

SUBSCRIBE

STAY CONNECTED