22 December 2024

Next Level Censorship enacted

If people think they have a right to ‘free speech’ now, they are sadly mistaken.

You are only allowed to write/post what governments and corporations allow you to.

Eric Arthur Blair’s Nineteen Eighty-Four is kindergarten material compared to what is being enacted today.

Corporations like Google work with the FiveEyes governments in censoring, removing/deleting videos from their platforms, in this case YouTube in effect ‘removing’ history.


"I will rip out your heart"

A clip that was posted on YouTube features censored words, where attention was paid to one word.

Is this word vulgar or 'politically incorrect'?

Does this word 'hurt' people's feelings or offends a minority?

What is so heinous about this word that the 'public' cannot see it in its pure unadulterated spelling?

Well the word is "heart".

Not only is the subtitle censored but also the audio is edited

It's irrelevant whether it is self censored or whether the platform censored it, the problem is that it was censored. 

You can see the censored video in all its glory:

Link: https://www.youtube.com/shorts/mVm1udAU9dk

17 December 2024

Mandiant Demonstrats a Unique QR Code Technique to Bypass Browser Isolation Defenses


Cybersecurity firm Mandiant has unveiled a groundbreaking discovery that demonstrates how threat actors could potentially bypass browser isolation technologies using QR codes as a covert command-and-control (C2) communication channel. The research, disclosed on December 8, 2024, raises significant concerns about the effectiveness of current browser isolation security measures.

The novel technique, developed by Mandiant's Red Team, leverages machine-readable QR codes embedded within web pages to establish unauthorized communication channels. This method proves effective against all major types of browser isolation solutions, including remote, on-premises, and local implementations, potentially compromising organizations' security infrastructure.

"The discovery highlights a critical weakness in what many organizations consider a robust security measure," explained a senior researcher at Mandiant. "By utilizing QR codes as a transmission medium, attackers can effectively circumvent traditional browser isolation protections that are designed to separate user browsing activity from the corporate network."

The proof-of-concept implementation demonstrated by Mandiant researchers utilizes Google Chrome in headless mode, integrated with Cobalt Strike's External C2 feature. The malicious implant operates by rendering web pages in a headless browser, capturing screenshots of embedded QR codes, and subsequently decoding them to extract command data.


However, the technique does come with notable limitations. The researchers found that the QR code-based C2 method is constrained by a maximum data capacity of 2,189 bytes, primarily due to streaming quality issues. Additionally, the communication process experiences significant latency, with each request taking approximately five seconds to complete, making high-throughput operations like SOCKS proxying impractical.

"While the current implementation may not be optimal for large-scale data exfiltration, it proves the concept that browser isolation can be circumvented through creative means," stated a Mandiant Research Team. "This should serve as a wake-up call for organizations relying solely on browser isolation as their primary defense mechanism.

"In response to these findings, Mandiant has issued several recommendations for organizations to strengthen their security posture. These include implementing comprehensive traffic inspection mechanisms to detect anomalous patterns indicative of QR code-based C2 activity, conducting regular domain reputation checks, and deploying advanced URL scanning solutions.

Security experts emphasize the importance of adopting a multi-layered "defense in depth" strategy rather than depending on a single security solution. "Organizations need to understand that no single security measure is foolproof," noted a cybersecurity analyst familiar with the research. "This discovery reinforces the need for comprehensive security strategies that combine multiple protective layers."

The revelation has prompted increased attention from the cybersecurity community, with several organizations already beginning to evaluate their browser isolation implementations in light of this new threat vector. Security vendors are also expected to develop countermeasures to detect and prevent such QR code-based bypass attempts.

As organizations continue to rely on browser isolation technologies as part of their security infrastructure, Mandiant's discovery serves as a crucial reminder of the ever-evolving nature of cyber threats and the importance of maintaining robust, multi-layered security defenses.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

Source:thesecmaster.com

See also other articles on QR Codes:

http://web.archive.org/web/20201126001729/https://www.cyber.gov.au/acsc/view-all-content/publications/quick-response-codes-covid-19-environment

16 December 2024

Final report into CV - Australia (deliberately) failed the people - GOOGLE REMOVED THIS POST


We live in a fascist on-line world, where there is an attack on privacy and also 'free speech'.

Corporations that are in the top tier of surveillance, that being the 5Eyes, stringently moderate people's posts, just like they do in China.

An article that was published on the 13th of December 2024, was removed by Google, citing a violation of so called 'Community Standards'.

Was there a violation of 'Community Standards'?  

Can Google respond with which section was 'violated'?

The article contained government and mainstream media information, which was collated into one area.

YOU be the judge.

These are screen captures of the removed article:




These are the links that were within the post:

Australian health businesses advertising health information from global corporations?

 https://oversight.house.gov/wp-content/uploads/2024/12/12.04.2024-SSCP-FINAL-REPORT.pdf

https://corpau.blogspot.com/2020/07/covid-test-useless-faith-in-quick-test.html

https://constitutionwatch.com.au/the-covid-19-injections-do-not-confer-immunity-and-therefore-do-not-meet-the-definition-of-a-vaccine/

 

15 December 2024

Aussie telcos warned of China-backed phone hacking - Salt Typhoon

Urged to up security after 'Salt Typhoon' hackers breach providers worldwide.


Australia has issued a joint warning with its international partners as the United States accuses China-backed hacking group Salt Typhoon of targeting telecommunications networks in dozens of countries and recording phone conversations of American political figures.

The advisory was issued on Wednesday by cyber defence watchdog the Australian Signals Directorate (ASD) and its Australian Cyber Security Centre (ACSC), alongside security agency counterparts from the US, Canada, and New Zealand.

The notice urged telecommunications companies to increase their network security in the wake of some US residents having their phone conversations, text messages, or related call and text records accessed.

For many people, this allegedly included metadata being stolen — which can include information on the dates, times, locations, and recipients of calls and text messages.

"We believe a large number of Americans' metadata was taken," a US official told local journalists on the condition of anonymity, as Reuters reported.

"We do not believe it's every cell phone in the country, but we believe it's potentially a large number of individuals that the Chinese government was focused on."

At least eight US telecommunications providers have been affected by the cyber espionage campaign, and hackers were likely to maintain some access to US networks, according to the White House.

The wide-ranging incursion came to light earlier this year, and while the threat has remained since, the true extent to which Salt Typhoon hackers still had access to critical networks around the world remained unclear.

The Australian government has not confirmed whether Australian telecommunication networks have been breached.

US senator Mark Warner, chairman of the country’s senate intelligence committee, told The Washington Post in November that the attacks were the "worst telecom hack in our nation's history — by far".

Chinese officials have denied responsibility and have previously described allegations of state-based hacking as disinformation, or false narratives.


Australian organisations urged to boost cyber security

Telcos and organisations working to defend communications infrastructure in Australia should “strengthen their visibility and harden devices against [People’s Republic of China]-affiliated and other malicious cyber actors”, ASD said in a statement.

“Our US partners have observed these actors compromising networks of major global telecommunications providers.

“Actors have focused on large US internet backbone routers, such as provider edge and customer edge routers.

“The compromises and malicious activity target exposed and vulnerable services, unpatched devices, and under-secured environments.”

ASD said it encouraged Australian organisations to maintain "high visibility” networks so that cyber defenders had “detailed insight into network traffic, user activity, and data flow” to help them detect potential threats.

The Australian government has accused China of being behind numerous cyber attacks and related security incidents in recent years.

In September, authorities said around 2,400 devices in Australia had been compromised by a China-backed cyber crime group.

In July, the Australian government blamed a series of cyber attacks on the Chinese government and a state-sponsored group known as APT40.

'Very senior’ US figures allegedly had calls hacked

Telephone calls involving “very senior” US political figures had been targeted and recorded by Salt Typhoon hackers this year, the White House alleged on Saturday.

Anne Neuberger, the US deputy national security advisor for cyber and emerging technology, said while the metadata of a large number of Americans had likely been stolen, officials believed “the purpose of the operation was more focused”.

"We believe ... the actual number of calls that they took, recorded and took, was really more focused on very senior political individuals," she said, as Reuters reported.

Neuberger did not reveal the names of anyone who was targeted, but said the US was “still investigating the scope and scale” of the hacking campaign.

The New York Times reported in October that phones used by then-presidential candidate Donald Trump, members of Trump's family, members of president Joe Biden’s administration, and officials at the US State Department had been targeted by China-linked hackers.

Asked about US reports of potential telecommunications attacks on 28 October, a spokesperson for China’s Ministry of Foreign Affairs, Lin Jian, said, “China urges the US to stop various types of irresponsible moves to blame the victim, stop cyberattacks globally, and stop using cyber security issues to vilify China.”

Neuberger said on Saturday that Biden had been briefed on the US government’s latest findings and the White House "has made it a priority for the federal government to do everything it can to get to the bottom of this".

US government officials reportedly told NBC News that citizens could use encrypted messaging apps — the likes of which include Facebook Messenger, Signal, WhatsApp, and Telegram — to minimise the chance of their communications being intercepted.

A US senate commerce subcommittee hearing is expected to discuss the Salt Typhoon hacking on 11 December, local time.

Source: acsinformationage

06 December 2024

Corrupt Government REDACTS FOI on the Batch testing for the Pfizer/BioNTech vaccine


People in power will tell you this: “Nothing to hide, nothing to fear”, right?

So, let's have the password to your email, or code for your phone since you have "nothing to hide", no?


Sydney Criminal Lawyers will tell you of The Fallacy of 'You Have Nothing to Fear if You Have Nothing to Hide'.


Privacy is something valued by all of us, at least to some degree. Arriving home at the end of the day, it’s important to know that what goes on behind closed doors is not being monitored by authorities or some other party.

Equally, we may not want all of our personal communications with friends, partners and family members to be available without proper justification by some government employee, or our intimate images to be accessible to others without our consent.

In the 1949 novel Nineteen Eighty-Four, George Orwell imagined a dystopian future where telescreens monitoring citizens in both the public and private realms were ubiquitous. And while this idea might send shivers down the spine, the reality is that it’s not far from the truth in 2018.

Indeed, authoritarian leaders of days past could only have dreamed about having access to information as private and pervasive as metadata and the vast amounts of personal information contained in our mobile phones and other devices.

The use of CCTV cameras in public places has been well-established in this country for decades now. And soon, these cameras are set to be linked to a national database containing all Australian driver licence and passport photos, enabling almost-instantaneous biometric matching.

The 2013 Snowden leaks revealed just how far-reaching government digital surveillance has become, along with its deep encroachment upon people’s privacy. The documents revealed that the NSA, along with other Five Eyes nations, were involved in colossal global surveillance programs on their own people.

It doesn’t bother me

Many in the community simply shrug off the ever-increasing whittling away of the basic right to privacy, as it’s supposedly being carried out in the name of protecting us against terrorists. “If you’ve got nothing to hide,” they assert, “then you’ve got nothing to fear.”

But these people may want to think again, as the removal of a basic right is incremental, and, once it’s gone, the legislation and policies that withdrew it can be very hard to knock down.

Distorting the discussion

Chair of the Electronic Frontiers Australia policy team Angus Murray said the nothing to hide argument is a “fundamentally dangerous” proposition, as it creates the premise that “privacy is only invoked where criminals are involved.”

“Unfortunately, the nothing to hide rhetoric has created a situation where this fundamental right has been somewhat distorted,” Mr Murray told Sydney Criminal Lawyers®.

According to him, the starting point to the argument should not be grounded in “criminality or the criminal justice system,” but “rather it should be about a fundamental human right not to be subject to arbitrary interference in private life.”

“This is particularly pervasive in the context of mass surveillance,” he continued, “wherein law-abiding citizens have their private life, often unknowingly, interfered with on the pretence that this is in their best interest, or more correctly, it’s not in their worst interest.”

And the digital rights advocate should know. Electronic Frontiers Australia has been at the frontline of monitoring the encroachment upon the rights of Australians in the digital environment since 1994.

The Australian right to privacy

 Article 17 of the International Covenant on Civil and Political Rights enshrines the right to privacy in international law. Being a signatory to the agreement, Australia has committed to uphold the rights contained in the document at the international level.

But, at the domestic level, Australia doesn’t have a bill guaranteeing citizens’ basic rights under the law, and therefore there is no general recognition of privacy being a fundamental right. Indeed, Australia is the only democratic nation in the world without a national bill of rights.

The federal Privacy Act 1988 is the principle piece of legislation protecting Australians’ personal information, although, it’s long been criticised for providing inadequate protections against data breaches.

The Office of the Australian Information Commissioner is the body responsible for enforcing the provisions of the Act. It announced last month that the federal Department of Health had breached privacy laws after it published de-identified health records of 2.5 million Australians online.

It was subsequently found the data could be re-identified. And the commissioner made the announcement a year and a half on.

Your life’s in a databank at ASIO

The federal Coalition government has been implementing policies that have grave implications for citizens’ privacy. Its mandatory data retention regime, which requires all telcos and ISPs to store their customers’ metadata for the period of two years, came into effect on October 13 2015.

The metadata that is stored relates to the time and date of calls, emails, text messages and internet sessions. It reveals who an individual has been in contact with, and their location at the time. And privacy experts warn that a lot can be ascertained about a person via this information.

Currently, warrantless access to this data is reserved to 21 law enforcement agencies led by ASIO.

Mass surveillance

On October 5 last year, all state and territory leaders signed off on the Turnbull government’s National Facial Biometric Matching Capability, which is a database that will store all Australians’ drivers licence and passport photos.

This mass hoarding of most of the population’s images will then be linked up through an exchange, so that it can be instantaneously macheted to identify people captured on CCTV cameras in public places.

The legislation to enact this system was introduced into parliament last month, and is currently under the review of the joint parliamentary committee on intelligence and security. When the program was announced, the prime minister claimed it had nothing to do with mass surveillance.

And in July last year, Turnbull said his government was proposing new laws that would require social media and technology companies, such as Facebook and Google, to allow Australian security agencies access to people’s encrypted messages.

Staring into the sun

Those who simply scoff at this encroachment upon our privacy, declaring that they have nothing to hide, are missing the point. If you mine any individual’s data in a thorough way, it’s sure that you’ll find something that looks suspect.

The deniers are similar to climate change sceptics. Long-term changes to weather are almost imperceptible on a daily basis, just like the erosion of the right to privacy, so the benefits of new technologies are easy to utilise, whilst refraining to consider the detrimental impact they’re having.

Equating privacy with guilt

“Too many wrongly characterize the debate as security versus privacy,” US computer security expert Bruce Schneier explained. “The real choice is liberty versus control.” And with a network of CCTV cameras linked to facial recognition technology, the ability of authorities to control will be overwhelming.

As far as Murray is concerned, the nothing to hide argument sets off the debate around privacy on “an ill-founded footing,” as those who are most vocal about the need for the right to privacy to be upheld are somehow cast as suspects.

“A person does not require something to hide to care about their privacy and the burden should not be reversed onto citizens to demonstrate that they have nothing to hide,” Mr Murray concluded.

“This should be a matter for law enforcement in the course of lawfully obtaining a judicial warrant.”


In any event you can read the heavily redacted document that Australian taxpayers paid for:


See also a narrative on this document:



Keeping the serfs in the dark - another day in the colony.

03 December 2024

Australia’s new mass surveillance mandate

The Australian government has new laws on the books to hack your computer, your online accounts, and just about any piece of technology and networks you come into contact with. It can happen without a warrant and without you ever knowing. That’s just the start of it. Outraged? Good.

Earlier in August, the Parliamentary Joint Committee on Intelligence and Security (PJCIS) released a report on the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 recommending it be passed with significant changes. Most notably, they recommended narrowing the scope of the new powers introduced by the bill, by limiting the criteria for issuing new warrants, requiring approval from a superior court judge and calling for stronger oversight and review mechanisms.

The bill was passed just over a week later by both houses. Needless to say, most of the recommendations of the PJCIS report have gone ignored, similarly to the concerns previously raised by us, Human Rights Law Center and several others. So let’s dive right in and take a closer look at the powers the legislation will grant to law enforcement. The three big powers given to the Australian Federal Police (AFP) or the Australian Criminal Intelligence Commission (ACIC) are:

  1. Data Disruption Warrants
  2. Account Takeover Warrants
  3. Network Activity Warrants


A DATA DISRUPTION WARRANT enables the agencies to “add, copy, delete or alter” data on devices. And while it’s called a warrant, there is an emergency authorisation process for cases when it is “not practicable” to get a warrant. So a data disruption “warrant” can be issued under something referred to as an emergency authorisation; a new power which the PJCIS insisted in their report should be reserved for a superior court judge. This was ignored and so emergency authorisations remain — which means that Australia now has a warrantless surveillance regime on the books.

A couple of additional notes on data disruption “warrants” is that they: can be issued on devices even if the individual’s identity is not known, if the device is “likely connected” to a suspected offence, or if the information could “assist” in an investigation. It should also be noted that in the final text an emergency authorisation can also be used to simply get “access to data held in a computer.” To do this, the final text allows them to use a computer, a telecommunications facility, any other electronic equipment or a data storage device.

AN ACCOUNT TAKEOVER WARRANT enables the law enforcement agencies to take control of an account, and even lock the account holder out of it. This can be done covertly and without consent, so the individual wouldn’t necessarily know what is going on until or if they are ever charged. It includes removing two-factor authentication and using one account to gain access to others (directly contradicting cyber security best practices for staying safe and secure online). The warrant is applicable for a maximum of 90 days (though extensions are possible) — so that is the length of time a law enforcement officer can impersonate you or use your accounts to monitor your activity and gather information. The emergency authorisation, overseen by a magistrate, is also available under this power.

NETWORK ACTIVITY WARRANTS allow access to networks where there is suspicion of serious online offences, although what qualifies as “serious” has a variety of definitions in the legislation. The desire to “overcome security features like encryption” on this scale should have us all extremely concerned. In their submission to the PJCIS, the Human Rights Law Centre raised alarm at the definitions used under this power, which are so dangerously overbroad they would enable widespread surveillance across social media and messaging platforms. Yes, that means if someone is suspected of using Whatsapp (for instance) for criminal purposes, the power would allow the AFP and ACIC access to all of Whatsapp. They are subject to the same secrecy and time limitation (90 days with a possible extension) as account takeover warrants. Unlike the other powers, evidence gathered this way cannot be used in court, but it can inform further warrants and inform officials where to look — this warrant allows for mass network surveillance.

And we can also note that while there are some restrictions on the extraterritorial application of these warrants, mostly that a consenting official from another country is required in order to proceed with such an investigation, the judge is allowed to authorize network activity warrants for other jurisdictions if the location of the data is unknown or cannot be reasonably determined.

The PJCIS report also insisted on increased powers of reporting for the Independent National Security Legislation Monitor (INSLM). In fact, setting the egregious scope of these new warrants aside for a moment, there are fundamental shifts that happen in these laws about how surveillance power is distributed and overseen in Australia. The distinction between a superior court and the Administrative Appeals Tribunal (AAT) is huge, and most of TOLA is now subject to the oversight of the AAT (see below section on ‘context’ for more information). All these bodies are equipped and resourced in completely different ways. The rules of evidence are different, just as the decision-makers are different; only recently there was a scandal that Christian Porter was appointing underqualified people to the AAT. The INSLM can in fact provide independence in their review, but it is not immune from politics, and reports from the office can certainly be completely ignored at the discretion of the government.

In the final text of Identify and Disrupt, the AAT is given a massive task when evaluating the merits of any application. Among countless other things, it is up to them to determine whether:

  • There may be any privacy implications “to the extent known.”
  • The execution of the warrant is likely to cause a person to “suffer a temporary loss of: money, digital currency, or property (other than data).”
  • The public interest outweighs the importance of protecting a journalist and/or their sources.
  • There are alternative ways to access the data or otherwise proceed with the investigation.


On the last point, it is not the responsibility of the officers to present that to the tribunal members, just as it is not up to them to run a full privacy impact assessment, or consult software developers or engineers before compromising a piece of equipment. Ultimately, the tribunal members of the AAT who are overseeing these overbroad hacking powers are expected to have a level of technical expertise which many actual subject experts, let alone judges, would struggle to be certain of.

One of the recommendations by the PJCIS was to introduce a public interest advocate in the decisions regarding these warrants, which was also ignored across the board. A public interest candidate is someone who would argue on behalf of the affected individual in the room where right now only a police officer and a judge get to play judge and jury. The PJCIS foresaw using this only in certain instances, but we have suggested a similar mechanism for other surveillance operations. As it stands, the Australian government remains uninterested in allowing individuals to defend their rights: there is no one to argue on your behalf, and there is never any notification to the individual (even after the fact) so you will never know if you were subject to any of these powers.

The context of Australia’s expanding surveillance regime

There was an international uproar when the Australian government passed the Assistance and Access Act, also known as TOLA. Introduced in 2018, it contains some of the broadest powers for law enforcement to intercept and monitor encrypted communications. Its only international parallel is the UK’s equally infamous Investigatory Powers Act, which is under ongoing challenges in the UK Courts over its infringement on privacy — an avenue for challenge that remains unavailable to Australians where the right to privacy continues to be ignored by the federal government (and thus out of reach for such court challenges).

But TOLA, which gave law enforcement and intelligence agencies the power to infiltrate and compromise encrypted communication channels, has been deemed to be not quite enough. It should be said that TOLA remains under review for its incompatibility with human rights and the right to privacy and freedom of expression, and is still waiting for amendments as suggested by the Independent National Security Legislation Monitor (INSLM) in June 2020. In spite of that, the Australian government went on to add two new pieces of legislation to expand its mass surveillance mandate:

  1. International Productions Order (IPO) Bill — even though it passed in Australia, the powers will need to be approved by the US Congress before taking effect.
  2. Identify and Disrupt Bill.

We can refer to both now as acts because — in what is an increasing trend in the Australian Parliament — the bills flew through both houses in a single day. 

The Identify and Disrupt Act grapples with the same issue that TOLA did — the need for law enforcement to see and intercept what we do online. However, Identify and Disrupt goes much further and where it was not completely true to call TOLA an attempt at mass surveillance, Identify and Disrupt now provides that capability and overreach for both AFP and ACIC. 

In the INSLM report on TOLA, Dr James Renwick, who was serving as the INSLM at the time, recommended that the powers under TOLA be extended to a federal level Independent Commission Against Corruption (ICAC) — this was a calculated decision to pressure politicians to consider what this power means when it extends to investigations of corruption at the federal level. Alas, we will continue holding our breath and waiting for the politicians to hold themselves equally accountable to the surveillance regime they’ve built for the rest of us.

Finally, it should be noted that Australia’s electronic surveillance regime will be overhauled in the years ahead following the recommendations of the Richardson Review into the National Intelligence Community, made public last year. So if you are frustrated with the system, gear up and join us for an end to mass surveillance and a fair system in Australia.

What we recommend…

  1. If you want to have a private confidential conversation, and you have thought about the likelihood you may be subject to surveillance,  have it in person with no devices around. We know this is a challenge, particularly in COVID times, but especially for groups in climate activism and those attending protests, this is key.
  2. If it is possible, break your work and life across multiple devices, operating systems, and accounts so that it becomes more difficult for you to be thoroughly compromised.
  3. Digital security! Update your passwords regularly (use a password manager), check that you have 2FA enabled wherever possible, and keep an eye out for any suspicious activity (on your account or those of your friends and network). Always call the person or reach out over text/a second channel if you are unsure about a link/attachment/message that was sent to you. Governments are intent on compromising our digital security for their own purposes, so do your best to limit your exposure to the risks they have created for us. 
  4. Write to your MPs to voice your concern about the lack of individual’s rights in this legislation. You can use this post to illustrate your concerns. Ask for the legislation to be referred to INSLM for a human rights impact assessment. There will be a 5 year sunset for the powers in this legislation — meaning that they will need to be revisited and reapproved by Parliament. We can turn the tides on this!
  5. Sign the petition! The more signatures, the louder we will echo through the halls of Parliament.
  6. Support our Work! You can become a member of Digital Rights Watch and/or sign up to our updates. This way you will know once there are further actions for you to take! You can also help by donating to support our work, following us on social media, and sharing our work far and wide! 

Source:digitalrightswatch.org

28 November 2024

Warrantless and Lawless Surveillance



MANY nations around the world that are alleged democracies, have transitioned to a modern era of 'slavery' and rule over the general population taking the best out of some of the following terms like; fascism, totalitarian/authoritarian state, oligarchical rule, nepotism, corporatocracy, et al.

This has been accelerated with the advent of the best self-sponsored mass surveillance tool invented thus far, that being quite simply the smartphone.

The general population or 'herd' as commonly referred to the ignorant masses, transfers its ignorance to the world of smartphones.

Together with blatant lies by corporations with regards to the 'consumers' privacy, the herd ignorantly and without scrutiny accepts their lies generating more data than ever before in history.

The best part about all this is that this data is used against the people and not (truly) for their alleged 'benefit'.

Before if telecommunications data was needed for 'legal' purposes, then this would be given under the issue of a warrant.

Today this is not the case, where telecommunications data is collected without any so called warrant. 

Governments also set up shell corporations as so called 'advertising' companies in order to obtain the necessary metadata.

In the colony called Australia, in many legal cases warrants are required, but are not produced in their correct format, as required by law.

MANY police in Victoria deceive 'the accused' by showing for example a spreadsheet format document, or even a partially blank generic form, which the officer then claims to be a warrant.

Australia's courts are involved in a conspiracy against the people.

See document within the article:


The alleged sheriff of Victoria or any other person claiming to be a deputy or 'from' the Sheriff's Office, cannot produce, a lawfully issued warrant, arising from unpaid road traffic offences, partly because there is no lawfully appointed sheriff in the state of Victoria at least since 1984.

There are plenty examples of this under the "The corruption of - Sheriff's Office"  label on this site.


In many cases repossessions of domestic dwellings are not supported by a legal instrument that being a possession warrant, meaning those premises are stolen by force and deception.

No outcry in the mainstream media?

No 'investigative' journalism reporting into this?

The so called royal commission into banking, was nothing more than a money for mates job, a farce where no applicant (approx 10,000 persons) ever received a 'remedy'. 

While the 72 page document below specifically refers to the United States, actions described within also pertain to Australia.

See document:


The new age of slavery is upon us.

24 November 2024

Meta illegally promoting scams and harmful websites

Meta’s ‘asset’ illegally, at least in Australia, promotes ponzi schemes, gambling and phishing sites that will cause (financial) harm to people who click on those links.

If you’re running a dodgy business, wanting to defraud people of their hard earned cash, all you have to do is pay Meta the relevant ‘advertising’ fee and they will promote your post.




This has been going on for quite some time and the ‘Australian Government’ (Pty Ltd, LLC, etc etc) has been doing nothing about it.

What's also concerning, is that Australia's governments (state and federal) have also used taxpayer funds to falsely promote a trial drug as a so called 'vaccine' for a few years on this advertising forum referred to as Facebook, is also swept under the rug.

NO inquiry on that matter, thank you very much!

Forget the proposed 'Misinformation and Disinformation' law, legally referred to as the Communications Legislation Amendment (Combatting Misinformation and Disinformation) Bill 2024, this is plane Jane fraud 'supported' by Mark Zuckerberg.

Will the Australian Government truly put it's foot down on one of the resources it uses against people?

You can’t really trust the government to protect you now can you, as this is not the first job of government!

See what the first job of government is, in the post:

What is the first job of a government?

See also:

Facebook Knows Instagram Is Toxic for Teen Girls, Company Documents Show

21 November 2024

Bunnings privacy breach facial recognition, no legal action or repercussions?

So, Wesfarmers has breached the serfs people's privacy and there is no 'remedy' for those affected?


The OAIC has founded Bunnings to have invaded the privacy of what is estimated to be hundreds of thousands of customers through the use of “intrusive” facial recognition cameras at 63 stores across Victoria and NSW. However, the retail giant has defended its use of the technology and fired back at the OAIC’s determination, with its managing director Mike Schneider.

Michael Schneider

Bunnings and many other retailers record your face, many BEFORE you even enter the store.

Keep in mind that the ability for a retailer to record a customer’s face and store that information is a no go zone. 

In Australia it is classified as 'sensitive information', which is illegal to collect without the subject's consent.

The OAIC (Office of the Australian Information Commissioner) said Bunnings did just that for a three-year period, invading the privacy of hundreds of thousands of customers.

So will there be a class action law suite against Wesfarmers and OTHER corporations?

Will the corrupt Anglo-Masonic judiciary be honest in their actions?


17 November 2024

Constitutional expert Anne Twomey false information on the 'King of Australia'?

Anne Twomey is considered an expert on the colony’s Constitution, where her work is seen on her YouTube channel Constitutional Clarion.

So what happens to this professor if someone calls out her ‘inaccurate’/false/(deliberately?) misleading information?

First and foremost there is no such lawfully enacted entity as the ‘Queen of Australia’, period.

It may appear in legal documentation, but this is not proof that it is there ‘lawfully’.



The below Freedom of Information response shows a legal advice to the Prime Minister and Cabinets Office to update the Royal Style and Titles Act so as to create a new title for King Charles III to adopt in relation to Australia and its Territories. In a recent video of the Constitutional Clarion Professor Ann Twomey lays claim a title Act or amendment is not required for King Charles suggesting the King can effectively use the Queens title. The below advice clearly contradicts the video of Professor Twomey.


Source:constitutionwatch.com.au

12 November 2024

The Great IMEI Firewall of Australia

 China, North Korea and Egypt eat your hearts out.


China, as in the Chinese people are not on the internet, but rather it's one of the worlds largest intranets, 'protecting' its people from the big bad WWW.

North Korea, another tech Mecca for the select few, keeps their luddites away from the outside world, but the outside world got sneak peek after North Korea's pathetic firewall structure got 'extinguished', see video:



And let's not forget how the Egyptian government shut down those pesky plebs from exercising their (human) right to 'free speech' by flicking the switch on the internet, in 2011, see article:

https://www.theguardian.com/technology/2011/jan/28/egypt-cuts-off-internet-access

At law the place called ‘Down Under’ in 2024, some 236 years after the inception of a convict colony, is still a colony and therefore governed as one by the colonialists.

See article: 

Australia the self governing colony

People may believe that this place functions as a democracy, but the reality is as far as possible from that.

This colony is literally a corporate criminal’s paradise, especially if one is supported by the ‘brotherhood’.

It’s a fascist state that functions under protectionism, where the current topic is the telecommunications industry, where the serfs are the ones that are victims of government fraud.

This 12.5 minute video by Hugh Jeffreys explains this very well:



Will there be any fruitful inquiry into this? MOST DEFINITELY NOT!

“Australia is a lucky country... 

a lucky country run mainly by second-rate people who share its luck”

07 November 2024

Trump's bid for Sydney casino rejected due to 'mafia connections'

Still the same Trump? Does a leopard change its spots?

Cabinet documents reveal police warned NSW government about approving a 1986-87 plan to build city’s first casino in Darling Harbour


A bid by Donald Trump to build Sydney’s first casino was rejected 37 years ago after police expressed concerns about his links to the mafia.

News Corp revealed on Wednesday morning minutes of the New South Wales cabinet that show police had warned the state government against approving a 1986-87 bid by a Trump consortium to build and operate a casino in Darling Harbour.

Trump, in partnership with the Queensland construction company Kern, was one of four groups vying for the lucrative project. The NSW government dumped it from the process on 5 May 1987, along with two other bidders.

At the time, the state treasurer, Ken Booth, said he had received reports on the bids from the police board, the state’s Treasury, the Darling Harbour Authority, and an independent financial consultant.

“I wish to inform honourable members that in light of these reports the government has decided to eliminate three tenderers from further consideration,” Booth told the state parliament. “These are the HKMS consortium, the Federal-Sabemo consortium and the Kern-Trump consortium.”

The public was not told the substance of the NSW government’s concerns. Booth said the reports “contain confidential and commercially sensitive material” and refused to make them public.

Now, under rules that declassify NSW cabinet papers after 30 years, summaries of the various reports on the Kern/Trump bid have come to light.

The documents, obtained by News Corp, show the Kern/Trump group was one of three deemed “dangerous” by the police board. “Briefly stated, the Police Board considers that HKMS, Federal/Resorts/Sabemo, Kern/Trump, are unacceptable,” the summary of the police report said.

“Atlantic City would be a dubious model for Sydney and in our judgment, the Trump mafia connections should exclude the Kern/Trump consortium,” a summary of the police board’s report said.

The cabinet papers also show there were doubts about the viability of the Kern/Trump bid. A report prepared by the independent contractor, the Canadian Imperial Bank of Commerce, found the Kern/Trump bid was one of two that were “not financially viable”.

The report found that revenues for the casino were overstated. “The proposal is financially viable on the basis that the projected financial structure is reasonably based,” a summary said.

“However, projected casino revenue estimates are not soundly based and the quantum of the potential overstatement is so material that the tender is not financially viable. Also, the tender is not financially viable on the basis of expected returns to equity investors.”

The Darling Harbour Authority, which assessed the design of Trump’s proposed casino, was largely supportive. It described Kern/Trump casino design as “rich, attractive and well-integrated” and said it would have “strong public appeal”.

The casino control division also gave Kern/Trump “unqualified certification” for the running of a casino in NSW.

One of the chief critics of the proposed casino at the time was the Rev Fred Nile, who is still a sitting member of the NSW upper house.

When the government announced its rejection of the Kern/Trump bid, Nile described the process as a “disaster” and pushed for the NSW government to scrap the casino entirely.

Nile told Guardian Australia he had raised concerns about possible organised crime links with the planned casino. “We certainly wouldn’t have wanted any connection with organised crime,” he said.

“We talked about that and there was always problems – casinos attract prostitution and other things.”

He was also strongly opposed to it having poker machines. “Which upset [Kerry] Packer, because you make a lot of money from the poker machines,” he said. “We were able to get the government to pass the law that there would be no poker machines in the Crown casino.”

See the NSW Cabinet Papers from 1987:


See also:

Australia ‘went where US wouldn’t’ on Trump mafia links

The untold story of 'dangerous' Australian casino connections that saved Donald Trump from financial ruin

04 November 2024

Here's what REALLY happened with the Covid 'vaccine'

See short introduction to the topic from Readacted with Natali and Clayton Morris


Please note that the drug cannot be called a 'vaccine' as it does not confer immunity.


28 October 2024

3G shutdown today, your 4G device too - Dirt Report (Corrupt gov. and telcos)

Briefly,

The government and telecommunications corporations have conned mobile phone users, period.

The real question is will there be an inquiry and will there be 'consequences' or rather hefty financial penalties.

AS the government is subservient to corporations, banks and financial services institutions, the likelihood of penalties that matter is very unlikely.

Aussie, Tech Man Pat puts it together well in this short video:


23 October 2024

Covid-19 'vaccine' withdrawn




This is one of the largest global scams in living history.

A intergenerational theft of funds by governments and corporations.




They call it a 'vaccine' which technically it's not, as it does not confer immunity.

They said it was 'safe and effective', BUT they LIED!

Well at least from the above article one cannot say that the mainstream media didn't tell you.

Irrespective of which corporation the test drug came from, it still is not 'safe'.


17 October 2024

CONSUMER HEALTH WARNING: Cancer warning (deliberately?) omitted by JB Hi-Fi?



You know the story?

Profits before health, we’ll deal with the litigation IF it ever arises, (lol - at the litigants) where we’ll even gaslight them if we must.

We’ll even scam the consumer on an extended warranty, while we're at it!

SO, here’s the deal.

A watch sold by JB Hi-Fi, namely the NOTHING brand’s CMF Watch Pro 2 carries a couple of serious health warnings.

On the back of the original box, the warning states:

“CANCER AND REPRODUCTIVE HARM-”

Source: TechSpurt

The watch also does not have WiFi or celluar connectivity, only Bluetooth and GPS.

Well, you can’t argue that you weren’t told, right?

After it’s too late and you bought the product, or you missed that warning?

BUT on cigarette packaging the cancer warning is conspicuous, right?



Why?

Because of liability, so you can't sue the corporations of billions of dollars in profits producing addictive poison, laced with chemicals that give you cancer?

Well, no health warning from JB Hi-Fi on the product they’re selling, but they’ll try so scam you extra for warranty that you already are privy to under Australian consumer law.




That’s life in the colony called Australia.