Corporate Australia
A look into Corporate fraud in Australia, Stranglehold of Monopolies, Telecom's Oppression, Biased Law System, Corporate influence in politics, Industrial Relations disadvantaging workers, Outsourcing Australian Jobs, Offshore Banking, Petrochemical company domination, Invisibly Visible. It's not what you see, it's what goes on behind the scenes. Australia, the warrantless colony. Note: Site has more info in desktop mode or 'web version' as seen at bottom of page, when on smartphone.
28 February 2026
Age Verification At Operating System Level, i.e. Windows/Linux
22 February 2026
They ask us to complete ID Verification. 1 billion personal/ID information is leaked by IDMerit
This is huge news, that the time of this post, it's not covered by Australia's mainstream media.
For your benefit, realistically do not rely on Information Technology news by Australian 'news' outlets, but rather refer to trusted specific sources.
Approximately 12 million Australians are affected.
What Personal Data Was Leaked?
Because IDMerit is an AI-powered KYC (Know Your Customer, a government requirement fro U.S. telecomms) provider, the data it collects is incredibly sensitive. The unsecured 1-terabyte database didn't just leak passwords—it leaked the core personal identifiers used for your financial and digital life. The following structured data was left open for anyone to download:
-
Full names
-
Addresses
-
Post codes
-
Dates of birth
-
National IDs
-
Phone numbers
-
Genders
-
Email addresses
-
Telco metadata
-
Breach status and social profile annotations
The last data point – breach status and social profile annotations – could refer to a database identifier indicating whether the data originated from a data breach or a leaked database. However, at this point, the true meaning of the data point is unclear. The team noted that this specific data point was present only in some regions.
“At this scale, downstream risks include account takeovers, targeted phishing, credit fraud, SIM swaps, and long-tail privacy harms. Industry-wide, the case underlines how third-party identity vendors have become critical infrastructure and can become single points of catastrophic failure,” our team explained.
See more:
https://cybernews.com/security/global-data-leak-exposes-billion-records/
15 February 2026
Secret Control Room In Victoria's Parliament House
MANY of the colony’s party officials that are in office are not elected democratically by the people, but rather decided in house which one of them would be a better corporate whore.
With regards to Victoria, it is truly irrelevant which premier puppet is on display whether it’s Labor’s Jacinta Allan, Daniel Andrews or the Liberals’ Denis Napthine or ‘Ted’ Ballieu, the most important room in the building is the one the politicians or staff aren’t allowed to talk about that is the ‘blue room’.
This masthead was informed under the condition of anonymity, that what is in store for Victoria over a period that exceeds the tenure of a premier is decided by ‘faceless men’, the men that truly run the nation and states.
Nothing gets done unless it's passed by members of the 'blue room', said the source.
It is what they decide that happens not only within the state but what is coordinated by their brethren in similar positions in other states is what will be executed over the years that follow.
Whether it’s new law they have waiting, for a particular trigger moment to occur that will oppress the people to town planning or infrastructure projects and who will benefit from the falsified tenders to immigration arrivals, even though they are a federal task, they still are discussed at state level.
The 'housing crisis' is a deliberate political move to cause turmoil and financial harm for the good people of Australia that will have a generational effect.
The people are truly conned if they believe that they have voted for a person that will serve them.
These politicians only take actions that are of benefit to them, where one of the goals is to fleece from the public purse as much as possible, where even if whatever is classified as ‘too much’ will not incur any consequences.
Australia’s governments are some of the most corrupt in the world, where currently Victoria’s ‘Big Build’ is just one example of this government supported fraud.
11 February 2026
Privacy and Security Warning: myki system bank card upgrade
Australia’s governments are all about creating more customers.
Creating more 'consumers' and importing more useless eaters, where that subject is beyond the scope of this article.
What could go 'wrong', right?
Well, banks and financial institutions do factually commit offences and breach various Australian law, but they’re allowed to get away with it as seen within the Royal Commission, which at the end of the day was a ‘money for mates’ farce at the expense of the Australian Taxpayers.
Another action banks do, is aggregate your information, package it up, and sell it many times over.
If you ‘tap on’ and ‘tap off’ with your bank issued credit or debit card, then the bank will know your movements, package up this data and again, sell it many times over.
If you truly value your privacy, and therefore security you will not use your card or even phone with its virtual card for myki related travel.
In any event, that will just be another database which hackers will be able to eventually access and use it for whatever purpose they see fit.
The question is not ‘if’ but rather ‘when’ will your data get hacked?
09 February 2026
How to determine Australian currency is real
Middle Eastern criminal syndicates from Melbourne and Sydney have been involved in the production of counterfeit currency for quite some time, and it seems that there is no stopping them.
Unfortunately the authorities are not doing enough, where the good people are ultimately victims of this highly organised criminal venture.
The new generation of Australian notes shown in the illustration below show that under UV (Ultra Violet) light features birds and flora which currently cannot be replicated in counterfeit currency.
Also, the other side of the notes shows their year of production under UV light as shown in the photo below.
See also a 'counterfeit detection guide' document from the Reserve Bank of Australia which contains information on the first generation of polymer notes:
02 February 2026
Facebook wants your biometrics, DON’T give it to them!
The reality is that Meta cannot be trusted with your private and confidential information and now especially with your bio-metrics.
On occasions. Zuckerberg has provided false information to [US] Congress, with ZERO consequences.
Why?
Is it because he’s in bed with the Five Eyes ‘Anglo-sphere’ surveillance network?
He has provided false information about your data, also abusing it, therefore he can no longer be trusted with it, yet too many people turn a blind eye to this.
He wants/needs you to take a selfie or video, yet he himself covers up his own laptop camera.
Your selfie picture or short video will feed his A.I. platform and your ‘likeness’ will go to places where you’re not told about, as usual.
And on whichever database your data goes to, that database may get hacked given enough resources.
Just say you haven't got a laptop, where you only use a Personal Computer with no camera, for privacy & security purposes, where Zuckerberg is discriminating against you, as this is the only method he is accepting, meaning there is no alternative.
Do you STILL want to participate in a discriminatory platform?
In short, we do not recommend giving your bio-metric data to any platform, especially Meta which is run by a ‘dishonourable’ person, to put it very nicely.
31 January 2026
Victoria Police search powers unlawful! Corrupt police & government MUST be prosecuted!
Briefly,
In their respective states and territories, Australians no longer live in a democracy but rather a corrupt police state that is unlawfully enabled by parliament.
The colony called Australia is a Human Rights abuser both abroad and domestically, where this was more evident from 2020 onwards, BUT this is rarely called out by the corrupt Anglo-Masonic legal system.
This instance, the Melbourne CBD ‘random’ search powers is not an isolated case of terrorism against the general population but rather deliberate systemic abuse of the general population.
The corrupt judicature deliberately hides too many cases of abuse by police, by either concealing the case files, ‘enticing’ persons to sign NDAs (Non-Disclosure Agreements), otherwise compensation will not be given or just plain and simply the registrars or the ‘gatekeepers’ not allowing matters to be brought before the courts against police.
Over the past decade successful claims have doubled against Victoria Police, by those who have chosen to sue VicPol, and did not decide to delegate their abuse into the ‘too hard basket’, meaning that corruption by VicPol is rife and they cannot be trusted.
Victoria Police have been given just as many powers as the Gestapo in 1930s Germany and how well did that go for the people?
People’s rights are being diminished and destroyed by a corrupt government and it’s only going to get worse, for the plebs.
The authorities deliberately create an environment that allegedly requires “reasonably necessary” action that is analogous to Nazi occupied Germany.
Within the Federal Court of Australia, in the matter of Browne v Assistant Commissioner of Police, North West Region [2026] FCA15, on the date of judgement of 23rd of January 2026, the Court struck down the six month police search powers.
In the judgment, the Court made it clear that the powers were unlawful and incompatible with fundamental rights, including the rights to privacy, freedom of movement, and peaceful assembly.
These are NOT just minor oversights, they are core protections that underpin a functioning democracy.
The lawmakers that enabled this including the Premier of Victoria, must be brought before the courts for charges against human rights, and realistically removed from their positions.
Keep in mind that you are not lawfully bound to answer any questions in initial interactions with police.
In whichever predicament you many find yourself in, many questions from an officer may seem to be benign, BUT their main objective is for you to incriminate yourself, therefore as mentioned by Ray Shoesmith in ‘Mr. Inbeteen’, “I do not answer questions”.
26 January 2026
Victoria Police: A corrupt vexatious litigant.
Irrespective of which state or territory one lives in, the colony’s police forces are corrupt, period.
Australians live under a police state, a totalitarian government, a fascist state, however else one would like to describe it.
What’s worse is that the Anglo-Masonic judiciary is supportive of their actions, actions that cause harm to the community.
Their corruption is wide and varies where it’s not limited to; false accusations and tampering with evidence in courts, illegal, unlawful and criminal actions.
In court even when evidence proves that the police have deliberately misled the court, or falsified evidence the judges/magistrates take zero action.
Basically the police terrorise the good people with impunity.
Any action from alleged road offences, to other criminal actions such as alleged drugs possession or assault or even alleged domestic violence, Victoria Police has a hand in it committing illegal, unlawful or even criminal actions against the accused.
Victoria Police take many accused to court with zero legal/lawful right to do so, making their actions vexatious, but the courts support their charade as it 'feeds' the system.
The allegation that IBAC (Independent Broad-based Anti-corruption Commission) is ‘independent’ is a laughable farce, at the expense of the Victorian tax-payer.
It’s also quite ironic that ‘Ibac’ is an American comic book super-villain empowered by Lucifer, or is the acronym deliberate by design?
From 2020 onwards Victoria Police have been acting illegally and unlawfully, a statement that is not a personal opinion, but rather a legal opinion coming from the Victorian courts therefore Victoria Police as an organisation that cannot ever be trusted at all.
There are many case files that expose the criminality of Victoria Police, some on public record but many deliberately hidden from the general population, even though it is in the interest of the public to know the criminality of Victoria Police.
Some organisations do not operate with half of the criminality of Victoria Police and they are ‘outlawed’.
The newly exposed random search designation of Melbourne’s CBD being unlawful is just another example of a corrupt police state in action.
Keep in mind, that the system is not ‘broken’, but rather it’s functioning perfectly, the way it is intended to.
See also:
Corrupt NZ cop Mike Bush, Chief Commissioner of Victoria Police must resign
20 January 2026
Google’s false information about 'protecting' its community.
Corporations lie to their stakeholders, users and the general population every single day.
Google has recently been lying on a global scale and there is zero repercussions.
There are a few ways into interact on the internet which can be summed up as either an active user or a passive one.
Let’s start with the passive example first.
A person can be the recipient of a TikTok/Instagram/YouTube link where it can be opened up in a web browser such as Brave/FireFox/Chromium without that person having to log in that corporation’s platform.
At that point in time that person cannot interact with the poster or community by writing a comment or even give a thumbs up to whatever was shown, where that person is also known as a ‘lurker’.
Since no interaction can be made, that person cannot allegedly be a danger to the community, as the community is not aware that the person even exists.
Now, if a person is logged in to TikTok/Facebook/YouTube then that person can post content that may not be safe for work, or even exercising one’s right to (alleged) ‘free speech’ by criticising a government’s new agenda or the passing of an unlawfully enacted law.
Those comments may then have to be moderated in order to allegedly ‘protect’ that online community.
So now Google (via Youtube) claims that when you are lurking on their platform, you could be a bot, implying that you could hurt the community, and when you log in “this helps protect our community”.
Quite simply put, no it does not! That is a blatant lie.
When will people wake up to the lies and deception by corporations.
It’s NOT about protecting their ‘community’ but rather surveillance capitalism, keeping in mind that Google is one of the world’s largest advertising data harvesting corporations, where they need to you log in to their platform so that they can sell you (the product) to others.
Who is "our community"? The people working for Google or the people using their platforms?
In the same vein as the above question, see link:
What is the first job of a government?
19 January 2026
Surveillance Capitalism: How ICE uses phone and internet data to identify and track people
What acting ICE Director Todd Lyons called the “largest immigration enforcement operation ever” continues to unfold in Minnesota. And we are learning about the tools federal law enforcement agents use to track the people they're trying to arrest, as well as protesters.
ICE recently purchased two programs called Tangles and Webloc, which are used to track the cell phone activity of entire neighborhoods and monitor people over social media and through internet data, according to reporting by 404 Media. 404 Media journalist Joseph Cox joined MPR News host Nina Moini with insight on those tools and how they’re used to track people.
The following has been edited for length and clarity. Use the audio player above to listen to the full conversation.
People are curious about how much surveillance is going on in society in general these days — and that includes ICE. Let’s start with one of the tools ICE is using: Tangles.
Tangles is a social media monitoring tool. We've seen that before, where companies will scrape sites like Twitter or Bluesky and then make that information much more accessible to the authorities.
What's different here is that Tangles is in combination with the tool call Webloc, the other tool we'll speak about in a minute. But it sort of gives an all-in-one solution for following people online. When it comes to their social media activity, ICE officials can add them to a watch list so they will be alerted whenever this person posts.
They are able to use AI to build some sort of sentiment analysis about what they're posting as well. The idea is that whenever somebody posts something online that ICE is interested in, the officials are going to see it.
How does the program obtain the location data from the phones in the first place? For example, what if you're a person who turns your location off?
If you turn your location off, that is actually probably a very, very good thing to do if you are trying to get around this sort of surveillance. It does not get the data from the telecoms. It doesn't get it from AT&T, Verizon, T-Mobile, that sort of thing. It actually gets it, weirdly, through the online advertising ecosystem.So whenever that little advert loads in your app, in Candy Crush or whatever, you'll see an advert there in the background. There's all of this tech going on where different companies are trying to get that advertisement in front of you.
There are also spy companies essentially harvesting that data, including phone location data. They then sell access to that to the government. It's basically a side product of the advertising ecosystem we see every day. But of course, somebody who is browsing the internet or just using an app has no idea that this is happening in the background.
What about this other program that ICE is using, Webloc? How does it work?
Webloc obtains information likely that same way — the location data — and it allows a user, in this case ICE, to search a map-style interface for phones and, by extension, people they might be interested in.
You log into the interface, you draw a circle or rectangle around a place of interest, maybe an ICE facility, maybe somewhere where a protest is happening. It then shows all of the location data and phones it has for that location, and the user is able to then track the phones to other places. So maybe this phone went over here and it stayed here overnight. Well, that's probably where the person slept. That is probably where the person lives. You track the phone to another location during the day after a protest. Well, maybe that's where this person works. So it allows users of this program to figure out probably who these people are and where else they're going after the fact.
And of course, that could be useful for ICE in many different contexts. The Wall Street Journal years ago, reported ICE was already using this sort of location data to catch immigrants and Customs and Border Protection was using it to monitor the U.S.-Mexico border as well.
What do you know about how these tools are being used so far here in Minnesota?
That is, unfortunately, the one thing we really don't know. And of course, I would love to have more information on that. All we know is that this tool was bought for millions of dollars. I obtained the information about how it works, but we don't know what exactly they're using it for.
Now, what I would do again is point to that earlier Wall Street Journal reporting where this has been used to catch people that ICE wishes to catch, and it has been used by other parts of DHS to monitor the border. The only thing I would add on there is that, at least in marketing material, the company behind this technology has sort of floated the idea of using it to monitor Black Lives Matter protests as well. So First Amendment protected activity has come up explicitly in the marketing material for this technology.
How have you found that these types of tools are typically used? Is it about mass deportation efforts or is it about tracking protesters?
What I would say is that from everything I've learned, from looking at material from this company others and speaking to government officials as well, these sorts of tools for ICE and other agencies are really good for looking at movements of people or groups of people.
It can actually be quite difficult for ICE to focus on a particular phone and, by extension, the person. They almost have to be lucky that the target is included in that particular data set. But if you see a big group of phones moving to a certain location or away from it, that is probably how this technology is best going to be used.
A U.S. government official told me this data is definitely not as useful as the stuff you would get from AT&T, but that would require a warrant, whereas this data, crucially, they don't need a warrant to use it because they're simply buying it from a government contractor.
What can people concerned about being tracked do about this? Do they have any legal protection? How can people better control whether they're being tracked?
Yeah, you're right about the legal protection. Unfortunately, there doesn't seem to be much around this sort of data at all. On a more technical level, it is simply being more aware of the things you're installing on your phone. Maybe you downloaded a flashlight app and it's requesting location data. Well, does it really need that permission that's requested on my phone? Maybe you can deny that, maybe you can delete that app.
And of course, getting some sort of ad blocker potentially could help. But as I said earlier, I think turning off location services is probably the more solid and robust way to combat this, if you wish to do so.
But no, there isn't really a legal protection. It's more a technical protection that you have to do yourself as an individual phone user.
Source:mprnews.org