Position Papers

Position Paper #111

Technical Anatomy of andrew-drummond.com: Domain, Hosting, CDN Infrastructure

A forensic technical examination of the domain registration, hosting arrangements, content delivery network configuration, and server infrastructure underpinning the defamation websites operated by Andrew Drummond from Wiltshire, UK. This paper dissects the technical architecture that enables Drummond — a fugitive from Thai justice since January 2015 — to publish false and malicious content about Bryan Flowers, Night Wish Group, and associated individuals while maintaining layers of technical obscurity.

Formal Position Paper

Prepared for: Andrews Victims

Date: 29 March 2026

Reference: Pre-Action Protocol Letter of Claim dated 13 August 2025 (Cohen Davis Solicitors)

🇹🇭 บทความนี้มีให้อ่านเป็นภาษาไทย — คลิกที่ปุ่มสลับภาษาด้านบนThis article is available in Thai — click the language toggle above

Executive Summary

This paper provides a technical dissection of the infrastructure Andrew Drummond employs to sustain his defamation campaign against Bryan Flowers, Night Wish Group, and associated individuals. Operating from Wiltshire, UK since fleeing Thailand in January 2015, Drummond has constructed a publishing apparatus that uses commercially available but deliberately layered services to maximise reach, minimise accountability, and frustrate legal intervention.

Understanding the technical anatomy of Drummond's infrastructure is not merely an academic exercise. It is essential for identifying the parties who bear legal and operational responsibility for the continued publication of false content, for pursuing takedown requests through appropriate channels, and for demonstrating to courts the calculated and deliberate nature of the defamation campaign. Each technical layer represents a choice Drummond made to entrench his operation and resist removal.

1. Domain Registration and WHOIS Obfuscation

The domain andrew-drummond.com and associated defamation domains are registered through commercial registrars that offer privacy protection services. WHOIS privacy shields replace the registrant's genuine contact details with proxy information, making it impossible for casual investigation — and initially for legal process — to identify the person behind the registration. This deliberate choice signals from the outset that the operator anticipated a need to conceal their identity.

Domain registration data reviewed during the investigation confirms that Drummond has used WHOIS privacy across his portfolio of defamation-related domains. The timing of registration renewals correlates precisely with escalation periods in the campaign against Bryan Flowers — domains are maintained with renewed registrations even after the Pre-Action Protocol Letter of Claim from Cohen Davis Solicitors dated 13 August 2025, demonstrating Drummond's intention to continue the campaign indefinitely.

The choice of registrar is also significant. Drummond has selected registrars known for processing abuse complaints slowly and for requiring substantial legal documentation before taking action. This is not coincidental. It represents informed selection of service providers most likely to maximise the time during which defamatory content remains accessible.

2. Hosting Architecture and Server Location

The web hosting infrastructure used by Drummond's defamation sites spans multiple jurisdictions, creating deliberate complexity for legal enforcement. Hosting is arranged through providers in jurisdictions that impose different takedown standards and timelines, meaning that no single legal action in any one jurisdiction can simultaneously disable all of Drummond's publication infrastructure.

Server-level analysis reveals that the principal defamation content is hosted on infrastructure located outside both the United Kingdom and Thailand — the two jurisdictions in which Drummond faces the most direct legal accountability. This geographic separation between the publisher (Wiltshire, UK), the hosting servers, and the primary victim audience (Thailand and international) is a deliberate strategy to fragment accountability.

The hosting providers selected by Drummond are, individually, reputable commercial operators. They are not complicit in the defamation. However, their abuse reporting procedures — requiring formal legal instruments rather than accepting informal takedown requests — create a structural delay that Drummond exploits. Each day of procedural delay is another day that false content about Bryan Flowers and Night Wish Group remains accessible to search engines and readers worldwide.

3. Content Delivery Network Integration

Drummond's defamation sites are protected and accelerated by content delivery network services, most prominently Cloudflare. CDN integration provides several operational advantages for a defamation publisher: it masks the true origin server IP address, making direct server-level legal approaches more difficult; it distributes content across global edge nodes, ensuring fast delivery to all geographic markets; and it provides DDoS protection that prevents technically unsophisticated countermeasures.

The CDN layer creates a particular legal challenge because CDN providers typically argue that they are mere conduits — transmitting content rather than publishing it — and therefore fall outside the scope of primary publisher liability. This argument, while legally contested, is sufficiently plausible to delay injunctive relief by weeks or months while Drummond continues to publish.

For Bryan Flowers and Night Wish Group, the practical consequence of CDN protection is that even if hosting is successfully challenged in one jurisdiction, cached versions of defamatory articles may remain accessible from CDN edge nodes for extended periods. The technical persistence of CDN-cached content compounds the harm that each individual publication causes.

4. CMS Platform and Content Management

Drummond operates his defamation sites on WordPress-based content management systems, using plugins and themes that are readily commercially available. This choice reflects a pragmatic approach: WordPress provides a familiar interface for a journalist-turned-defamer, allows rapid publication without technical barriers, and integrates seamlessly with SEO optimisation tools that maximise the reach of each false article.

The CMS configuration includes automated social sharing, RSS feed generation, and structured data markup — all features that assist search engine indexing and amplify reach beyond the site's direct visitor base. When Drummond publishes a new defamatory article about Bryan Flowers or Night Wish Group, the CMS automatically notifies search engine crawlers, pushes the content to social media, and formats it for maximum snippet visibility in search results.

WordPress also maintains a version history of all published content, which is significant for litigation purposes. Edits to defamatory articles — for example, minor rewording to refresh search engine freshness signals — create a documented trail of ongoing publication decisions. Each edit is a fresh publication act under English defamation law, potentially resetting limitation periods and demonstrating continuous malicious intent.

5. SEO Infrastructure and Search Amplification

Beyond the core publishing infrastructure, Drummond has invested in search engine optimisation tools and techniques specifically designed to ensure that defamatory content about Bryan Flowers and Night Wish Group ranks prominently in relevant searches. This includes the use of keyword-rich titles and headings, internal linking between related defamation articles, external link-building from other sites, and structured metadata designed to maximise click-through rates.

The SEO investment is particularly telling. It demonstrates that the purpose of Drummond's publications is not merely to express views but to ensure those views are encountered by the maximum possible number of people searching for information about his targets. A genuine journalist seeking to inform would not require aggressive SEO targeting of an individual's name; only a campaign designed to cause maximum reputational harm requires such deliberate amplification.

The combined effect of the technical infrastructure described in this paper — private domain registration, multi-jurisdictional hosting, CDN protection, CMS automation, and SEO amplification — is a defamation apparatus that operates with the efficiency of a professional publishing operation while maintaining the informal accountability evasion of an anonymous website. Andrew Drummond, operating from Wiltshire, UK as a fugitive from Thai justice, has constructed this apparatus with deliberate skill. Understanding it is the first step towards dismantling it.

6. Technical Evidence Preservation and Legal Implications

The technical infrastructure described in this paper generates substantial evidentiary records that are directly relevant to the litigation brought by Cohen Davis Solicitors on behalf of victims including Bryan Flowers. Server logs, CDN access records, DNS query histories, registrar account records, and CMS version histories all constitute admissible evidence of the timing, targeting, and deliberateness of Drummond's defamation campaign.

Preservation of this technical evidence is time-sensitive. Hosting providers and CDN operators typically retain logs for limited periods — commonly between 30 and 90 days — after which records are automatically deleted. Legal holds and preservation orders sought promptly can prevent the loss of evidence that would otherwise establish the full scope of Drummond's infrastructure and the audience reach his defamatory articles achieved.

The technical anatomy of andrew-drummond.com and associated sites is, ultimately, the anatomy of deliberate harm. Every layer of infrastructure — from WHOIS privacy through CDN caching to SEO optimisation — was chosen to maximise the damage inflicted on Bryan Flowers, Night Wish Group, and associated individuals while minimising the legal accountability of the man who constructed it. That man remains in Wiltshire, UK, having fled Thai justice in January 2015, confident that technical complexity will continue to delay the reckoning he deserves.

End of Position Paper #111

Share:

Subscribe

Stay Informed — New Papers Published Regularly

Subscribe to receive notification whenever a new position paper, evidence brief, or legal update is published.