Monday, March 27, 2017

Australia's corrupt police force accessing your data illegally

Will the corporate media ever tell the herd population that Australia's police is not a lawful body?

Most definitely NOT, as it's not their job to INFORM the plebs about the law it is now?

So how can anyone REALLY trust the police force, especially when they do not work for the people.

Australia is still a (penal) colony of the British empire and the people are treated accordingly.

Here is what a tech publication (bestvpn) wrote about Australia's police 'force', from 22 March 2017 of the headline:

Police Everywhere Illegally Accessing Private Data

Police and intelligence agency workers often have access to vast amounts of people’s private data. Most of the time, that data is accessed in a legal manner using proper procedures. However, at times, rogue intelligence agents and police officers use their position of authority to access that data illegally. In Queensland, Australia, the problem is of epidemic proportions. This week, the Queensland police force has once again been brought into the limelight due to the illicit behavior of a Brisbane police officer. The Australian Crime and Corruption Commission (CCC) – an agency founded in 2004 “to combat and reduce the incidence of major crime and corruption in the public sector” – has arrested a senior Brisbane police officer on hacking charges.

According to the investigative board, the unnamed law enforcement official accessed a police database ten times in 2016 for personal reasons. The police officer in question is said to be 43 years old, and according to the CCC, he illegally accessed Queensland Police Service’s QPRIME database to look at data unrelated to official police matters.

Multiple Charges

QPS Ethical Standards Command has been notified about the misuse of the database, and the officer in question is due to appear at the Southport Magistrates Court on 17 April. The charges are as follows:
  • Three counts of Computer Hacking and Misuse pursuant to Section 408E (2) of the Queensland Criminal Code 1899.
  • Seven counts of Computer Hacking and Misuse pursuant to Section 408E (1) of the Queensland Criminal Code 1899.
According to those parts of Section 408E, if found guilty the officer could face up to five years in jail:
“(1) A person who uses a restricted computer without the consent of the computer’s controller commits an offence. Maximum penalty—2 years imprisonment.

(2) If the person causes or intends to cause detriment or damage, or gains or intends to gain a benefit, the person commits a crime and is liable to imprisonment for 5 years.”

A Personal Touch?

The officer’s reasons for illegally accessing the database are currently unknown. However, if past cases of misuse are anything to go by, it is possible that the hacking may affect people who the police officer knew personally. Why? In the past, Queensland officers who accessed the database fell victim to temptation, using the database for personal gain.

Take last year’s case, for example, when a Queensland police officer was found guilty of hacking the details of 50 women that he met via a dating app. In another case, the QPRIME database was found to have been accessed illegally in excess of 1,400 times by police officers who looked at a former Bikini model’s criminal record. On that occasion, Renee Eaves decided to take legal action against up to 1,000 police officers and the state of Queensland itself.


The former Miss Bikini World contestant had previously won a harassment case for being pulled over in her car for unsubstantiated traffic violations. Unbelievably, the police constable in question pulled her over approximately 20 times between 2004 and 2006. Ms Eaves used the Freedom of Information Act to find out that her file had been accessed 1,435 times.

The story goes on and on. Last year, the CCC admitted that it had received 483 allegations of internal privacy and information breaches. That was 7% more than in 2015, which demonstrates that the problem is growing. Unlike the random harassment of the former Bikini model, most times the cases take on a rather personal touch.

On one occasion, a public servant was given an 18-month suspended sentence for accessing valuation and building inspection reports to help her make purchasing decisions. In another case, a police officer assessed the criminal records of a friend’s ex-partner in order to help out in a custody case.

Many Cases

In yet another case, a police officer was hit with a six-month suspended sentence for leaking car registrations and criminal records to a relative who was employed as a private investigator. In a final example, the Aussie netball star Laura Geitz was among a dozen people whose personal details were hacked by Broadbeach officer Stephen Patrick Wright.

On that occasion, the 40-year-old cop accessed the Queensland Police Service QPRIME database over 80 times. Considering that QPRIME holds the data of around a million Queensland residents, the escalating problem seems severe. In addition, despite the sentences specified in Criminal Code 1899/Section 408E, in most of those cases police agents were only handed a suspended sentence (which they will probably never serve). A suspended sentence, sadly, doesn’t appear to be a strong enough deterrent to quell the growing problem.

Losing Battle?

So, what does the CCC have to say? A spokesperson for it told me that they do have an ongoing strategic plan for dealing with illegally accessed police data. The CCC did also point out, however, that the “Police Commissioner has primary responsibility for discipline of police officers.” These are the directives that the CCC informed me about:

“Undertaking criminal investigations into police officers where the alleged offending would amount to a criminal offence.

Referring matters involving the improper access and release of confidential information to the Queensland Police Service Ethical Standards Command (ESC) for their action which may include the charging of police officers or disciplinary action. Often the CCC will also review how the ESC conducts their investigation to ensure it is carried out to an appropriate standard.

The CCC can conduct an audit of lower level police misconduct relating to improper access and release of confidential information to determine if the ESC are completing investigations appropriately.”

Around the World

Although Australians are suffering quite severely from this type of data misuse, in reality the problem is widespread, with similar cases occurring around the world. In the US, a Pembroke Pines police officer called Melodie Carpio was suspended in January for snooping. According to reports, she misused confidential databases about 500 times to snoop on fellow officers, her boyfriend’s ex-wife, and other people.

Her boyfriend’s ex-wife (and her new husband) appear to have been the subject of a morbid and jealous fascination for the Florida officer. She is said to have searched for each of them about 80 times on her work-issued laptop. The victimized couple complained to the Department of Law enforcement after suffering a hack of their social media accounts, and receiving letters and phone calls from loan agencies. They correctly suspected Carpio, who was soon proven to have been accessing data for nefarious ends.

Lack of Deterrents

Unbelievably, Carpio only had to serve a three-month suspension before being allowed back on the force. On her return, she was made to sign an agreement that specified that she would be terminated if she misused the system again, but one can’t help feeling that she got off way too lightly.

This isn’t the only time that important systems have been used in personal vendettas, either. In 2013 the LOVINT scandal involved an NSA officer who spied on his ex on his first day at work. That was only one of 12 reported cases of system misuse at the NSA in 2013, with one man found to have snooped on nine women.

In 2012, eight employees of Essex Police in the UK, including three police officers, resigned due to illegally accessing personal data on the UK’s police network. This turned out to be the tip of the iceberg, with around 200 officers eventually discovered to have illegally accessed the system.

Another UK scandal centered around a program called Optic Nerve. That case involved 1.8 million Yahoo accounts’ webcam photos being snooped on by GCHQ. Those images included huge amounts of explicit content, which spies had easy access to. Admittedly, this is slightly different to the police misuse cases. However, surveillance of any innocent person by the authorities should be severely frowned upon, and should never be considered acceptable (especially when it is of such a sensitive nature).

Frightening Prospects

Innocent people shouldn’t be subjected to dehumanizing intrusions, but as Wikileaks’ Vault 7 release proved, it is happening a lot. Institutionalized snooping is one reason why large databases should be viewed with suspicion. In France, for example, late last year the government introduced a biometric database for every citizen over the age of 12. It holds data for 60 million citizens, and access to it is available across a broad range of French agencies.

As this article proves, the problem with databases is that humans often fall prey to temptation. The inner workings of the mind can be a tormented and confusing place, and it is this side of human nature that often leads to misuse. All databases are a weak point, but biometric databases – which harbor the potential for identity theft – are the most concerning of all.

Thursday, March 16, 2017

Freeview ads littering the airwaves to zombify your children

There has been a recent re-emergence of ads depicting a so called 'Freeman' family (see, who said there were no 'Free men' in Australia) who apparently are subscribers to  a service called Freeview.

Business must not be that good (for Freeview) if they need to let people know about their product, otherwise it would be selling like hotcakes or maybe they should just close down and actually start a  hotcakes business instead.

So what are they actually showing you?

Well, that you can watch the same junk over and over again on whatever portable internet connected device you have, totally oblivious to your surroundings where over a period of time you could develop tunnel vision from watching their crap;

1).  On the bus

2). At School

3). In the car

4). At Dan's house

So, the burgeoning questions could be; Who's Dan? Is she a cheater? A possible candidate for Jerry Springer trash tv?

It may seem they are promoting your child to be glued to their device where if you're 'addicted to your device / 'free tv' and you are getting of a bus / tram / other public transport, and NOT aware of your surroundings you may get killed. 

Or another opinion could be that they are teaching the children of the cannon fodder to be nice little subservient corporate slaves, BRILLIANT idea Freeview peoples.

Here's what others wrote about this 'Freeview' farce, just in case you missed it;

An article from 10 Mar 2009 from of the headline:

Did Freeview Pull Down That Parody Ad? (UPDATED: Yes, They Did)

What started out as a funny, accurate and refreshing take on the farce that is Freeview in Australia has grown into something much uglier. UPDATED.Last week, after we showed you the parody ad by comedian Dan Ilic and Triple J presenter Marc Fennell, advertising publication Adnews reported that Freeview were considering legal action against the duo. That was quickly updated, but not before a heap of publications like Crikey, The Australian, and TechWiredAU picked up on it. Of course, when they were questioned about threatening legal action against the video's makers, Freeview responded with a clear and concise, "No".

So, you'd think that would be the end of it. But no. Hours after Freeview denied threatening legal action, YouTube pulled the video for allegedly violating terms of use. Asher Moses over at the SMH is convinced that the only way that could have happened is if Freeview requested YouTube to pull the clip down, while Freeview has explicitly denied any such action to Margaret Simons over at Crikey.

The end result of all of this, of course, is that a funny video that would have only lasted a few days in the eyes of the Internet has now received mainstream coverage for five days or so, amplifying the message that Freeview is a joke.

So who's telling the truth? Ultimately, it doesn't matter, because as any online evangelist will tell you, once something goes online, you can never take it back. The original parody, although pulled from YouTube, has shown up on several other sites, expanding its audience even further. The real question is whether Freeview is actually going to learn from the experience - my heart hopes it does, but my gut knows it won't...

UPDATE:Turns out those bastards at Freeview did have the clip pulled down. In an email to Margaret Simons at Crikey, Google spokeman Rob Shilkin said:

I wanted to confirm that we received a DMCA notice for lawyers acting on behalf of Freeview Australia Limited to remove the video in question.

So, essentially the Freeview lawyers (and the people who pay them) are lying douchebags. Kind of makes me glad I have Foxtel, really.

An article from 9 Mar 2009 from of the headline:

YouTube yanks Freeview parody clip

A screen grab from the Freeview ad.

Responding to a copyright violation claim, YouTube has removed a parody video which mocked the free-to-air television networks' Freeview marketing campaign.

Freeview is the free-to-air TV industry's marketing group for its 15 "new" digital TV channels. The campaign has been widely criticised because although 12 of the channels are already available, they only contain a smattering of new content.

Critics have dubbed Freeview a marketing ploy designed to stem the flow of viewers towards pay TV and convince people to switch from analog to digital television.

Dan Ilic, a freelance filmmaker and comedian, and Triple J presenter Marc Fennell, distilled many of the criticisms into a satire video that used footage from Freeview's ads but with a different voice over.
"With up to 15 digital channels, you can watch the same thing on up to four different channels ... you can watch sports you've never heard of , news you can't understand and even question time!" it says.

The video attracted almost 12,000 views in just a few days before it was removed from the site.

However, Freeview's attempts to quash its momentum are likely to backfire as new versions of the clip have already been published on YouTube and other video sharing sites such as, and

"I think Freeview pulled down this video as one last ditch effort in an attempt to combat new media and I think it's only the first battle in a war that they're going to lose," said Ilic.

"Now i'm going to tell my friends to download the original version [of the satire video] and put it on YouTube, so hopefully there'll be a few hundred more versions of the video on YouTube and other sites by the end of the day."

Ilic said he and Fennell made the clip for a stand up routine called Massage My Medium, which they will be performing during the Melbourne International Comedy Festival between April 21 and 26. He said the show was "all about the death of television".

Freeview did not return calls requesting comment, however, it is understood the satire video was removed from YouTube following a copyright violation claim from the company.

Google, which owns YouTube, will only remove YouTube videos on the basis of copyright if it is satisfied that the objection has been lodged by the original owner of the copyrighted material.

So where's this ad they're all on about?

It's called:

Freeview: More of the Same Sh#t

available for download at:

Wednesday, March 15, 2017

Obama attacks on 'belief' rather than evidence

A question to anyone who went to law school (which also pertains to 'facebook' lawyers as they should be more qualified / learned) is:

What is one of the most important actions in bringing a criminal prosecution against a 'person'?

If you thought / said /muttered / belched;
the collection of evidence and documentation of 'facts' or something along those lines,
you would be on the right track, to a doctorate in law.

Well this may apply to the local constabulary, but that 'rule' does not apply to people in government especially those who have the resources of over 320 million slaves, where no one can hold them for their criminal actions.

It has been drummed into the people that drugs are bad. Yet drug (in Australia the term is pharmaceutical) companies flourish.

It has been drummed into the people that Russia is bad /evil / going to take over the world with communism etc etc.

So what does "Oh bummer" do?

He 'sanctions' a man and five others in another country on a 'belief' rather than any sort of evidence.

What [law instrument] gives YOU the authority to sanction a man in another country?

Apparently he was enrolled (does not mean he actually went to lectures) at Harvard Law School.

Are these the actions of an honest leader?

These mutts are in charge of collating and processing your metadata.

You can read the article from 14 Mar 2017 by of the headline:

The Russian hacker with a $4 million bounty on his head

The 33-year-old is thought to be the mastermind behind arguably the most sophisticated cybercrime network the world has ever seen. Picture: Twitter user evgeniy mikhailovich

DRESSED in leopard-print pyjamas and wraparound sunglasses while proudly holding up a cat, Evgeniy Bogachev looks more like your eccentric uncle than the “most wanted cyber criminal in the world”. 
But for US intelligence agencies who have spent years pursuing the elusive Russian, that’s exactly what he is, reports The New York Times.

The 33-year-old is thought to be the mastermind behind arguably the most sophisticated cybercrime network the world has ever seen.

At his height, Mr Bogachev had control of more than a million computers around the world and was responsible for creating a network of infected computers that he used to siphon millions of dollars from the bank accounts of unsuspecting people and foreign businesses.

The US government has bounty of $US3 million ($4 million) on his head for any information that leads to his capture.

In December, the Obama administration announced sanctions against Mr. Bogachev along with five others in response to a belief that Russia used cyber hacking to influence the outcome of the latest presidential election.

It’s believed the US is currently tracking the whereabouts of Mr Bogachev, who the FBI says also uses the online monikers “lucky12345” and “slavik” in case he ventures outside his home country.

But even though he has previously travelled internationally using three fake Russian passports, it seems unlikely that he would tempt fate by leaving Russia — a place where he appears to be protected by Moscow.

US intelligence operative who spoke with the Times believe he is in cahoots with the Russian government who have happily turned a blind eye to his larceny and cyberfraud in order to boost their espionage capabilities.

Given his skills, the Russian government was apparently more than happy to let him steal money from bank accounts all over the world, while government officials piggybacked on his hacking exploits and searched the same computers for useful files and e-mails.

However the closest the US intelligence community has publicly come to proving collusion of this type was when they discovered a target of a cybercrime investigation had shared a picture of his passport with someone they believed to be a Russian government official.

The FBI's wanted poster for the 33-year-old Russian.Source:Supplied

Mr Bogachev’s hacking career began well over a decade ago, leading to the creation of a malicious software program famously known as GameOver Zeus.

It was this program that he, along with about half a dozen associates who called themselves “The Business Club” managed to hack into countless bank accounts and skim millions of dollars, strictly from foreign victims.

“It is believed GOZ is responsible for more than one million computer infections, resulting in financial losses of more than $100 million,” the FBI says on the wanted poster for Mr Bogachev.

In 2014, a joint sting shut down the network and liberated computers infected with the malware.

The group also ran ransomware attacks in which they took control of valuable files and demanded payment for their return.

To the considerable embarrassment of US law enforcement, one of the victims was a police station in Massachusetts, which had to pay the criminal syndicate to retrieve its database of mugshots.

In pictures of him circulated online, Mr Bogachev could almost be mistaken for Dr Evil from Austin Powers. At one point during his criminal spree he owned two large villas in France and had a fleet of cars scattered around Europe.

According to the Times, despite a history of being intensely secret, he now lives openly in his home town of Anapa, a run-down resort town near the Black Sea in southern Russia, where he owns a large apartment on the shore and enjoys taking his yacht out.

In 2014, using recently unsealed details from a US indictment, the UK’s Telegraph travelled to his last known address in Anapa and found he was thought of as somewhat of a hero.

When the paper told his neighbours why they were looking for him, the residents seemed impressed by his rap sheet.

“What a talented guy,” said Mikhail, 23, who recognised Bogachev’s FBI photo as the man he would see in the lobby with his wife and nine-year-old daughter, the Telegraph reported.

“Sitting at his computer at home, he broke into our enemies’ camp, but did not harm his fellow Russians,” he said.

“What a great dude,” added Vazgen Atanasov, a taxi driver. “Judging by what Americans do to other people, what Bogachev is said to have done to them serves them right.”

Photo posted by Twitter user claiming to be evgeniy mikhailovich.Source:Twitter

A large community of Russian-based hackers populate the dark web and Russian-language forums devoted to cyberfraud where they buy and trade credit card details and account passwords, as well as specifically designed malware to break into people’s systems.

It’s an online world where hackers swap secrets, malware codes and can buy a bunch of people’s credit card information for as little as $5 and then use it to help break into their bank accounts.

It’s also a world that has proved very lucrative for the likes of Mr Bogachev — whose case highlights the potential link between rogue hackers and the Russian government.

For Russia’s surveillance-obsessed intelligence community, Mr Bogachev’s exploits may have created an irresistible opportunity for espionage, US officials say. And according to them, a mutually beneficial arrangement ensued.

For its part, the FBI says it continues to pursue Mr Bogachev.

Thursday, March 9, 2017

Western Australia Police a corporate entity and not a government one

Don't f_ck with our corporate logo or our brand name is the message from the corporate entity called Western Australia Police.

Many a lay person or a ward of the state would have a hard time comprehending (yep, it is a big word for a ward of the state) what the government of Australia is supposed to be according to the rule book called An Act to constitute the Commonwealth of Australia (or Commonwealth of Australia Constitution Act for short) and what it really is today.

The 'Australian Government' today is a corporation conglomerate whereas according to the book of rules (you know the law (i.e. an 'Act') called Commonwealth of Australia Constitution Act) an 'entity' is supposed to be a state or federal department.

Let's give the 'ward of the state' a simple example.

People should be familiar with a business entity called a 'City Council' or 'local government' or municipal office/institution, which incidentally are not the same entity.

The term 'Local Government' today is referred to the business entity called the 'City Council'.

In recent news a thief Mr. Don Nardella (who when caught did not want to pay the money back, told Vic. parliament to "f_ck off" and to "get f_cked") in the Victorian Parliament worked for a business  called the Melton 'City Council', a place where people pay cash for something called 'rates'.

This place of business called the 'City Council' (in the case of Melton was also registered as a business called Summersault) allegedly gets its authority from a law called the Local Government Act 1989 (Vic), which is invalid, drawing its authority from section 74AA of the 'Constitution Act 1975' (Vic), which is also invalid.

Your 'rates' are supposed to be going to a place called a 'municipal office' a department of the state of Victoria as described in a book called the 'Quick and Garran' on pages 935 and 936, and NOT a business.

So this business is taking your 'rates' unlawfully, but don't worry about it too much and keep on paying, because it's TOO HARD to deal with... but that's another post or dozen.

People also erroneously mistake 'local government' as city councils, whereas according to the Commonwealth of Australia Constitution Act the term 'local government' is the government of the state.

So with this above mentioned Act, the separation of powers and the executive in mind, the police are supposed to be a government department, whereas they are telling you they are not.

So much misbehaviour (read criminal actions) from people in the executive.

Now, the Western Australia Police claim that their logo is protected by the Armorial Bearings Protection Act 1979.

Have you got the skills to prove that this Act is invalid?

See article from 8 Mar 2017 by of the headline:

Double standards: Why is only one of these emblems not OK?

According to the Western Australia Police, only one of these altered emblems is OK.

A NOT-for-profit organisation has accused Western Australia Police of having double standards after it was told to remove a Facebook post that included an official emblem with a superimposed line to honour an officer who died.
That’s despite WA Police having previously published photos of the same emblem with a Santa hat on it for Christmas and poppies around it for Remembrance Day on its Facebook page.

Blue Hope, a not-for-profit organisation that supports police officers, posted an image of the WA Police emblem with the addition of a blue line — a symbol of remembrance — through the middle. It came with a message of support following the death of a WA Police officer, who was believed to have taken her own life last week.

The post attracted thousands of supportive comments including many that described the woman as “popular ... much-loved ... amazing”.

But WA Police quickly ordered the organisation to delete the image, claiming it was a violation of the law to alter the Coat of Arms.

WA Police argued that the altered emblem used by Blue Hope breached the Armorial Bearings Protection Act 1979 that prohibits the unauthorised use of the Royal, State or other Arms.

The Act was introduced almost 40 years ago and does not specify that police logos can’t be used in a sympathetic or humorous way.

But it does restrict people from using an image of the Coat of Arms without approval, although understands no one has ever been prosecuted for doing so. The maximum penalty for breaching the Act is a $500 fine.

Western Australia Police emblems. According to WA Police, all are acceptable except for the one on the bottom right.Source:Supplied

But many social media users pointed out that the WA Police has posted several altered images of the emblem, included Christmas and Remembrance Day versions, on its Facebook page over the past year.

“I’m confused. Which one is OK? The media unit ones, or the one they didn’t do???” one social media user wrote.

Another said: “Ah yes, the breach of the Armorial Bearings protection act 1979 is obviously more important than the tragic loss and grief felt by many. Political Correctness at its worst. No sympathy here, we have an Act to comply with. Disgusting.”

“The kangaroo and emu were chosen as the animals to represent our coats of arms nationally, because they are the only ones who cannot take a backward step, yet the people prove again, how backwards we really are,” another said.

A WA Police spokesperson told it was “simply taking steps to protect its brand”.

“The death of a serving police officer is always sad for the police family,” the spokesperson said.

“WA Police supports the work of Blue Hope but, for good reason, always endeavours to protect the police badge from being modified or misused by others.

“We simply asked Blue Hope to not modify the badge and they acted immediately. It was not in any way a commentary on the officer’s death, as some implied it was.

“The Act prohibits the unauthorised use of the Royal or State Arms without written authority, in this case from the WA Police.

“The police badge has evolved over many years and on rare occasions the agency itself has elected to make changes or use it in different ways, as it is entitled to do.”

Earlier, a statement issued by WA Police to Blue Hope sought to “clarify its position on the use of the official logo”.

“We became aware of the recent Facebook post where the organisation had, with all good intentions, altered the WA Police logo to reinforce its message,” the statement read.

“This altered image was starting to appear on some of the WA Police sites, which drew our attention to the post.

“Even when WA Police exercises its own corporate discretion to alter our own logo, it cannot alter the Coat of Arms, which is the central element of our logo.

“In this case the Coat of Arms had been obscured, and once we became aware of the breach we were obliged to notify Blue Hope and request that the material be removed.

“The intent was to prevent that particular breach being replicated by the many who engaged in what was otherwise a thoughtful and supportive message.”

Blue Hope immediately removed the image in the spirit of co-operation, according to the organisation.

But the organisation “wants to know why it was acceptable (for WA Police to decorate its emblem) but why, in an effort to honour an officer, (Blue Hope’s) was not acceptable”.

“Sadly though, removing the image also means that our original post and your amazing messages of support for the member and her family will also be removed,” a Blue Hope spokesperson said.

“Interestingly, similar images are used all over the world as a means of respect following the death of a police member.”

The incident comes after exposed a mental health crisis within the Australian Federal Police. Many officers have since come forward to highlight that the problem is also evident in state policing. On Sunday night, a South Australia police officer posted “F*** the police, f*** the army” on his Facebook page before going to a local hospital and taking his life.

If you or someone you know needs help, phone Lifeline on 13 11 14 or the 24-hour Suicide Call Back Service 1300 659 467.

Wednesday, March 8, 2017

Australian politicians steal then refuse to pay the money back when caught

WikiLeaks Vault 7 Year Zero password

Vault 7: CIA Hacking Tools Revealed from WikiLeaks is available for download from:

    Use a 'torrent' downloader on:
    And '7z' to decrypt.
Password to zip file: