tag:blogger.com,1999:blog-45655928440902077932024-03-19T13:52:12.730+11:00Corporate AustraliaA look into Corporate fraud in Australia, Stranglehold of Monopolies, Telecommunications Oppression, Biased Law System, Corporate influence in politics, Industrial Relations disadvantaging workers, Outsourcing Australian Jobs, Offshore Banking, Petrochemical company domination, Invisibly Visible.
It's not what you see, it's what goes on behind the scenes. Australia, the warrantless colony.AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.comBlogger4966125tag:blogger.com,1999:blog-4565592844090207793.post-82270288309322966962024-03-18T20:30:00.014+11:002024-03-18T23:30:34.620+11:00Australia importing the world’s rubbish<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0bXUMpofr1z2ypKf2kCoZxhKOqY29c2uai_0vVdR67UtM4YJRMlbvZDPNW78qNEBwmpyKBjjOEeB9PgF72miaIcKEvXdge8GzlpVDgoBuRINu6Cd7cyAwegcjJOhSzhe0IsxW4XKZnsLXpphMU9G6HWehUavBil01W4Rn2bKeLYhHQLGb4qAKLEtB8gKV/s460/Manila-Bay-covered-with-p-007.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="276" data-original-width="460" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0bXUMpofr1z2ypKf2kCoZxhKOqY29c2uai_0vVdR67UtM4YJRMlbvZDPNW78qNEBwmpyKBjjOEeB9PgF72miaIcKEvXdge8GzlpVDgoBuRINu6Cd7cyAwegcjJOhSzhe0IsxW4XKZnsLXpphMU9G6HWehUavBil01W4Rn2bKeLYhHQLGb4qAKLEtB8gKV/s320/Manila-Bay-covered-with-p-007.jpg" width="320" /></a></div><br /><p class="dropcontent"><b><span style="color: #2b00fe;">BRIEFLY:</span></b></p><p class="dropcontent">The colony we know as Australia, is well known for its long history of importing ‘trash’ into its ecology, where it all started in 1788.</p><p class="dropcontent">Even the Imperial Government didn’t respect human life on Terra Australis, but rather saw it as a (colonial) wasteland full of resources such as cannon fodder, ripe for experimentation, when it detonated nuclear explosions in the Montebello Islands, Emu Field and Maralinga.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgkHqKrjc472Wv3pInwOyiYbCI2mckJ7zVI74SaHBfNADdXxT5qT4hsbNRbu9bhNxVZg2GYskFCc6jHffWVXjNdtZxI0f4rtqaR86ld-FBusJj4IPpxL_NFH2eMqrhpMuVHPGgk7djWjd2DFeUdhcRZNDEMpPLv0Z31I5gMHmU1tZdymphR1WC6SSeyDhf/s1278/Maralinga.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="717" data-original-width="1278" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgkHqKrjc472Wv3pInwOyiYbCI2mckJ7zVI74SaHBfNADdXxT5qT4hsbNRbu9bhNxVZg2GYskFCc6jHffWVXjNdtZxI0f4rtqaR86ld-FBusJj4IPpxL_NFH2eMqrhpMuVHPGgk7djWjd2DFeUdhcRZNDEMpPLv0Z31I5gMHmU1tZdymphR1WC6SSeyDhf/s320/Maralinga.png" width="320" /></a></div><i><span style="color: #666666;">The people seen in this picture were not given 'full disclosure' in being used as test subjects by the British and Australian governments.</span></i><br /><p class="dropcontent">Throughout the decades there were different policies with regards to importing ‘resources’ / slave labour or a more modern term; corporate fodder.</p><p class="dropcontent">From cheap Chinese labour during the colony’s gold rush period to an Anglo-Masonic (racist) White Australia policy, to a current low quality human trash imports that no other governments want.</p><p class="dropcontent">Low quality, i.e. low moral or financial/societal value humans are imported from all over the world where a majority now come from Africa, Middle East and India, that being the norm over the past couple of decades.</p><p class="dropcontent">Just to spice things up a bit for the general population, the people in government even import ‘known’ criminals or people that have zero intentions of leading a law abiding life in the colony thereby causing harm to the community.</p><p class="dropcontent">What are the consequences? Why nothing of course.</p><p class="dropcontent">As if there would be a RICO (Racketeer Influenced and Corrupt Organisations Act) type law for Australia, where those responsible in government for causing harm would be held accountable. As if the colony’s law makers would make a law against their ‘brethren’.</p><p class="dropcontent">In any event those in government have screwed over ‘everyday’ Australians, mums & dads taxpayers, young people going out on their own, trying to make a home for themselves.</p><p class="dropcontent">From the ‘Housing/Rental Crisis’ to overburdened utilities e.g public transport to overpopulation in many suburbs causing much dis-ease in the community.</p><p class="dropcontent">They don’t care as they live in their ivory towers isolated from the trials (also criminal) and tribulations of the serfs.</p><p class="dropcontent">Australia is ‘bust’, you know, financially kaput! So how do you fix it?</p><p class="dropcontent">Let the government import another 1-100 million units of (human) trash into the colony to bring up the economy, as that’s what it’s all about, where most importantly they can be bank slaves where more money can be printed out of thin air, off the slave labour (as it’s no longer gold backed) of the imported serfs.</p><p class="dropcontent"><b><span style="color: #990000;"><i>That’s life in a colony! Viva la corporate promissory notes.</i></span></b></p><p class="dropcontent">The myth: “<b><i>Australia is a lucky country</i></b>” (because it sure isn’t a clever one!)</p><p class="dropcontent">The REALITY: "a lucky country run mainly by second-rate people who share its luck”</p><p class="dropcontent"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAuaqMbpy6jQ_5sjPsM0-rJXxdo1qMWHb-AjWogMysAIvQ4RZ_SrfoI9YXUve5rRI73QL5Jiuerpy_D_GVXPGHtJMABbs5sPetQ3Y6hZW2_vT7WGGJfu3omqhGdYuYigg11GnlXnZl7K05zPYIPVFELgdrXb5A1C8Dt9iC5UOUO51qX1Xci_yWD4njEN8/s354/Australia%20the%20lucky%20Country.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="354" data-original-width="220" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAuaqMbpy6jQ_5sjPsM0-rJXxdo1qMWHb-AjWogMysAIvQ4RZ_SrfoI9YXUve5rRI73QL5Jiuerpy_D_GVXPGHtJMABbs5sPetQ3Y6hZW2_vT7WGGJfu3omqhGdYuYigg11GnlXnZl7K05zPYIPVFELgdrXb5A1C8Dt9iC5UOUO51qX1Xci_yWD4njEN8/s320/Australia%20the%20lucky%20Country.webp" width="199" /></a></div><p></p><h3 style="text-align: left;"><a href="https://www.reddit.com/r/australia/comments/3le155/til_calling_australia_the_lucky_country_was/"><i><span style="color: #38761d;">TIL calling Australia 'The Lucky Country' was actually intended as an insult, not a compliment.</span></i></a> </h3><p class="dropcontent"><i><span style="color: #800180;">Source:supplied.</span></i></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-8528617078019376372024-03-14T10:08:00.012+11:002024-03-14T10:14:59.017+11:00Victoria's child protection services gives children to paedophiles and rapists<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1YwcZ335fHIA4wAfcxUHzQe1g-GOMdxjAe9jwYbEwVOqTlAqNVLWLebGIym-MrbvEuj5ZjSRCEcaJg0FRmyqA0_hIubR5XVisCL88Rj0KoLbUCGOb1VUhNZ262St_MPLLGLEe0tqKHaTVmwCvHlTqqIJMob9lOquAvWcKFKsd1o7Q5QGRjAoIst4QZFd9/s839/Paedos_1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="769" data-original-width="839" height="293" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1YwcZ335fHIA4wAfcxUHzQe1g-GOMdxjAe9jwYbEwVOqTlAqNVLWLebGIym-MrbvEuj5ZjSRCEcaJg0FRmyqA0_hIubR5XVisCL88Rj0KoLbUCGOb1VUhNZ262St_MPLLGLEe0tqKHaTVmwCvHlTqqIJMob9lOquAvWcKFKsd1o7Q5QGRjAoIst4QZFd9/s320/Paedos_1.png" width="320" /></a></div><br /><p class="dropcontent">The mainstream media drew attention to a recent posting by Anthony Lees, under his YouTube channel <i>'<a href="https://www.youtube.com/channel/UCecAIXPb5KTJz5BFnUzlTaA">Spanian</a>' </i>from the 'Into the hood' series, where this time the crime ridden outer western town of Melton was the focus of the trials and tribulation of criminals living there.</p><p class="dropcontent">While the media focused on the 'trivial' matters of some individuals, a more serious matter was aired, which was deliberately(?) ignored, that being paedophilia.</p><p class="dropcontent">The boy whose face was blurred recounts how paedophiles within the department pass on children to paedophiles masquerading as carers or foster parents within the community.</p><div class="x11i5rnm xat24cr x1mh8g0r x1vvkbs xtlvy1s x126k92a"><div dir="auto" style="text-align: start;">An agenda on a high priority list of those in positions of government/power is a little taboo called paedophilia. E.g. ‘alleged’ ( – you know ‘cause it was never proven in court) paedophile Lionel Murphy was given the task (by his mates) to look after Family Law, you know taking away children from families, then putting them in foster care, so they can have their pickings…</div></div><p class="dropcontent"><span class="x193iq5w xeuugli x13faqbe x1vvkbs x1xmvt09 x1lliihq x1s928wv xhkezso x1gmr53x x1cpjm7i x1fgarty x1943h6x xudqn12 x3x7a5m x6prxxf xvq8zen xo1l8bm xzsf02u x1yc453h" dir="auto"></span></p><div class="x11i5rnm xat24cr x1mh8g0r x1vvkbs xtlvy1s x126k92a"><div dir="auto" style="text-align: start;">It seems that the Victorian department for child protection services (DFFH Services) is knowingly(?) supplying children to paedophiles, as seen by the testament of this child:</div><div dir="auto" style="text-align: start;"><span><a class="x1i10hfl xjbqb8w x1ejq31n xd10rxx x1sy0etr x17r0tee x972fbf xcfux6l x1qhh985 xm0m39n x9f619 x1ypdohk xt0psk2 xe8uvvx xdj266r x11i5rnm xat24cr x1mh8g0r xexx8yu x4uap5 x18d9i69 xkhd6sd x16tdsg8 x1hl2dhg xggy1nq x1a2a7pz xt0b8zv x1fey0fg" href="https://www.youtube.com/watch?v=hQ3xpRuat1U&t=2881s&fbclid=IwAR1tCuP8hwa8vUDq3sq6CBJHzy4b2t4CwgVNKEJYVwYMuMDaXJ4LHcbs9LA" rel="nofollow noreferrer" role="link" tabindex="0" target="_blank">https://www.youtube.com/watch?v=hQ3xpRuat1U&t=2881s</a></span></div></div><p class="dropcontent">Another concerning element coming from the judicature, is that the system releases known to re-offend criminals, who then once released continue their crime spree, terrorising the general population.</p><p class="dropcontent">Would the system react differently of a judge's, magistrates' or police officer's home was invaded an a family member shot or stabbed.</p><p class="dropcontent">After all the first job of government is to look after <i><u><b>its</b></u></i> people.</p><p class="dropcontent">See post: </p><h3 class="post-title entry-title" itemprop="name" style="background-color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 22px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;"><a href="https://corpau.blogspot.com/2015/06/what-is-first-job-of-government.html"><i><span style="color: #38761d;">What is the first job of a government?</span></i></a></h3><p class="dropcontent"><b><span style="color: #cc0000;">The system is not broken, but rather functions exactly, as the law makers, judiciary and MPs intend it to.</span></b></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-16289832905805959142024-03-10T19:35:00.004+11:002024-03-10T19:35:55.746+11:00 Android 14 introduces first-of-its-kind cellular connectivity security features<div id="cyclelinks"></div>
<p>Android is the first mobile operating system to introduce advanced
cellular security mitigations for both consumers and enterprises.
Android 14 introduces support for IT administrators to disable 2G
support in their managed device fleet. Android 14 also introduces a
feature that disables support for null-ciphered cellular connectivity.
</p><h3><strong>Hardening network security on Android</strong></h3><p>
The Android Security Model assumes that all networks are hostile to keep
users safe from network packet injection, tampering, or eavesdropping
on user traffic. Android does not rely on link-layer encryption to
address this threat model. Instead, Android establishes that all network
traffic should be end-to-end encrypted (E2EE).
</p><p class="dropcontent">
</p><p>
When a user connects to cellular networks for their communications
(data, voice, or SMS), due to the distinctive nature of cellular
telephony, the link layer presents unique security and privacy
challenges. <a href="https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/">False Base Stations (FBS) and Stingrays</a> exploit weaknesses in cellular telephony standards to cause harm to users. Additionally, a smartphone cannot reliably <a href="https://www.wired.com/story/stingray-surveillance-cell-tower-pre-authentication/">know the legitimacy of the cellular base station</a>
before attempting to connect to it. Attackers exploit this in a number
of ways, ranging from traffic interception and malware sideloading, to
sophisticated dragnet surveillance.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDKNnC_iuKiJt-oZoGu1FCo1f-W3VJ4ain6A4i42mCxOFsSRQn16TUP6t4-amMy8qn0pX4SJMlRbhJu3aJS3jU_lfR-HaxBz5Dd7r09LRuJW0ho0Ngy0lLkfk0OtwD_PoMgNNOMVKEs1pfU_iXC4pYfKav3GmYdKx_dPBFhwd-APzvujuaCt0HaR1_AM5g/s1600/GSB_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="764" data-original-width="1600" height="153" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDKNnC_iuKiJt-oZoGu1FCo1f-W3VJ4ain6A4i42mCxOFsSRQn16TUP6t4-amMy8qn0pX4SJMlRbhJu3aJS3jU_lfR-HaxBz5Dd7r09LRuJW0ho0Ngy0lLkfk0OtwD_PoMgNNOMVKEs1pfU_iXC4pYfKav3GmYdKx_dPBFhwd-APzvujuaCt0HaR1_AM5g/s320/GSB_1.png" width="320" /></a></div><br /><p> Recognizing the far reaching implications of these attack vectors,
especially for at-risk users, Android has prioritized hardening cellular
telephony. We are tackling well-known insecurities such as the <a href="https://www.eff.org/deeplinks/2020/06/your-phone-vulnerable-because-2g-it-doesnt-have-be">risk presented by 2G networks</a>, the risk presented by null ciphers, other false base station (FBS) threats, and <a href="https://security.googleblog.com/2023/02/hardening-firmware-across-android.html">baseband hardening with our ecosystem partners</a>.
</p><h3><strong>2G and a history of inherent security risk</strong></h3><p>
The mobile ecosystem is rapidly adopting 5G, the latest wireless
standard for mobile, and many carriers have started to turn down 2G
service. In the United States, for example, most major carriers have <a href="https://www.fcc.gov/consumers/guides/plan-ahead-phase-out-3g-cellular-networks-and-service">shut down 2G</a>
networks. However, all existing mobile devices still have support for
2G. As a result, when available, any mobile device will connect to a 2G
network. This occurs automatically when 2G is the only network
available, but this can also be remotely triggered in a malicious
attack, <a href="https://www.ndss-symposium.org/wp-content/uploads/2017/09/practical-attacks-against-privacy-availability-4g-lte-mobile-communication-systems.pdf">silently inducing devices to downgrade to 2G-only connectivity</a>
and thus, ignoring any non-2G network. This behavior happens regardless
of whether local operators have already sunset their 2G infrastructure.
</p><p>
2G networks, first implemented in 1991, do not provide the same level of
security as subsequent mobile generations do. Most notably, 2G networks
based on the Global System for Mobile Communications (GSM) standard <a href="https://www.youtube.com/watch?v=fQSu9cBaojc">lack mutual authentication</a>, which enables trivial Person-in-the-Middle attacks. Moreover, since 2010, security researchers have <a href="https://fahrplan.events.ccc.de/congress/2010/Fahrplan/attachments/1783_101228.27C3.GSM-Sniffing.Nohl_Munaut.pdf">demonstrated</a> trivial over-the-air interception and decryption of 2G traffic.
</p><p>
</p><p>
The obsolete security of 2G networks, combined with the ability to
silently downgrade the connectivity of a device from both 5G and 4G down
to 2G, is the <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks">most common use </a>of FBSs, IMSI catchers and Stingrays.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizZDi9U5UIPW8q2qN_gog97m0piHkKom3BhBWJ_-IOKd3Izxm9zKMfGTq_a4eYnc04EDaCNetMzyAUkvAOX_BiFHZXTjsF23u0O4jTdhzerncj5IS99tOaHdu7moOST08D8MpoBev32LVT1p97xOaQcHrJkIO9OZqbI_-QoDThMS1qZH0jCe7uA9cKjqFg/s1600/GSB_2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="764" data-original-width="1600" height="153" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizZDi9U5UIPW8q2qN_gog97m0piHkKom3BhBWJ_-IOKd3Izxm9zKMfGTq_a4eYnc04EDaCNetMzyAUkvAOX_BiFHZXTjsF23u0O4jTdhzerncj5IS99tOaHdu7moOST08D8MpoBev32LVT1p97xOaQcHrJkIO9OZqbI_-QoDThMS1qZH0jCe7uA9cKjqFg/s320/GSB_2.png" width="320" /></a></div><br /><p> Stingrays are obscure yet very powerful surveillance and interception
tools that have been leveraged in multiple scenarios, ranging from
potentially <a href="https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/">sideloading Pegasus malware into journalist phones</a> to a <a href="https://commsrisk.com/paris-imsi-catcher-mistaken-for-bomb-was-actually-used-for-health-insurance-sms-phishing-scam/">sophisticated phishing scheme</a> that allegedly impacted hundreds of thousands of users with a single FBS. This <a href="https://commsrisk.com/sixth-suspect-arrested-for-massive-paris-imsi-catcher-sms-scam/">Stingray-based fraud attack</a>, which likely downgraded device’s connections to 2G to inject <a href="https://www.trendmicro.com/en_us/what-is/phishing/smishing.html">SMSishing</a> payloads, has highlighted the risks of 2G connectivity.
</p><p>
To address this risk, Android 12 launched a <a href="https://source.android.com/docs/setup/about/android-12-release#2g-toggle">new feature</a> that enables users to disable 2G at the modem level. <a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">Pixel 6 was the first device to adopt</a> this feature and it is now supported by all Android devices that conform to <a href="https://cs.android.com/android/platform/superproject/+/master:hardware/interfaces/radio/1.6/IRadio.hal">Radio HAL 1.6</a>+. This feature was carefully designed to ensure that users are not impacted when making emergency calls.
</p><h3><strong>Mitigating 2G security risks for enterprises</strong></h3><p>
The industry <a href="https://www.eff.org/deeplinks/2022/01/victory-google-releases-disable-2g-feature-new-android-smartphones">acknowledged</a>
the significant security and privacy benefits and impact of this
feature for at-risk users, and we recognized how critical disabling 2G
could also be for our <a href="https://www.android.com/enterprise/">Android Enterprise</a> customers.
</p><p>
Enterprises that use smartphones and tablets require strong security to
safeguard sensitive data and Intellectual Property. Android Enterprise
provides robust management controls for connectivity safety
capabilities, including the ability to <a href="https://developer.android.com/reference/android/os/UserManager#DISALLOW_CONFIG_WIFI">disable WiFi</a>, <a href="https://developer.android.com/reference/android/os/UserManager#DISALLOW_CONFIG_BLUETOOTH">Bluetooth</a>, and even <a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setUsbDataSignalingEnabled(boolean)">data signaling over USB</a>.
Starting in Android 14, enterprise customers and government agencies
managing devices using Android Enterprise will be able to restrict a
device’s ability to <a href="https://developer.android.com/reference/android/os/UserManager#DISALLOW_CELLULAR_2G">downgrade to 2G connectivity</a>. <span class="space"></span>
</p><p>
</p><p>
The 2G security enterprise control in Android 14 enables our customers
to configure mobile connectivity according to their risk model, allowing
them to protect their managed devices from 2G traffic interception,
Person-in-the-Middle attacks, and other 2G-based threats. IT
administrators can configure this protection as necessary, always
keeping the 2G radio off or ensuring employees are protected when
traveling to specific high-risk locations.</p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzksXbuS9pFkqBdY_n2sme-k-yrPmQGHxo0MayYUxR0mGU3Jr1jR8UJ5lbV7uj0ObEOEHgCIA0bdpW5YSfdzIUstUCBYeU8SP96NP_eJIXebH58ACAZvquNQGxOoLG4_yNOLBLCE2RlLWDLg5O1JonneRuf1zXJlIBdWFc6U4KMOXC2ltKjAueUpigIp_v/s1600/GSB_3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="764" data-original-width="1600" height="153" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzksXbuS9pFkqBdY_n2sme-k-yrPmQGHxo0MayYUxR0mGU3Jr1jR8UJ5lbV7uj0ObEOEHgCIA0bdpW5YSfdzIUstUCBYeU8SP96NP_eJIXebH58ACAZvquNQGxOoLG4_yNOLBLCE2RlLWDLg5O1JonneRuf1zXJlIBdWFc6U4KMOXC2ltKjAueUpigIp_v/s320/GSB_3.png" width="320" /></a></div><br /> These new capabilities are part of the comprehensive set of 200+
management controls that Android provides IT administrators through
Android Enterprise. Android Enterprise also provides comprehensive audit
logging with over 80 events including these new management controls.
Audit logs are a critical part of any organization's security and
compliance strategy. They provide a detailed record of all activity on a
system, which can be used to track down unauthorized access, identify
security breaches, and troubleshoot system problems.<h3><strong>Also in Android 14</strong></h3>
<p>
The upcoming Android release also tackles the risk of <a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/3/slides.pdf">cellular null ciphers</a>.
Although all IP-based user traffic is protected and E2EE by the Android
platform, cellular networks expose circuit-switched voice and SMS
traffic. These two particular traffic types are strictly protected only
by the cellular link layer cipher, which is fully controlled by the
network without transparency to the user. In other words, the network
decides whether traffic is encrypted and the user has no visibility into
whether it is being encrypted.
</p>
<p>
<a href="https://www.umlaut.com/uploads/documents/20210615_Analysis_of_EGPRS_ciphering_algorithms.pdf">Recent reports</a>
identified usage of null ciphers in commercial networks, which exposes
user voice and SMS traffic (such as One-Time Password) to trivial over
the air interception. Moreover, some commercial Stingrays provide
functionality to trick devices into believing ciphering is not supported
by the network, thus downgrading the connection to a null cipher and
enabling traffic interception.
</p>
<p>
Android 14 introduces a user option to disable support, at the
modem-level, for null-ciphered connections. Similarly to 2G controls,
it’s still possible to place emergency calls over an unciphered
connection. This functionality will greatly improve communication
privacy for devices that adopt the latest radio hardware abstraction
layer (HAL). We expect this new connectivity security feature to be
available in more devices over the next few years as it is adopted by
Android OEMs.</p><h3><strong>Continuing to partner to raise the industry bar for cellular security</strong></h3>
<p>
Alongside our Android-specific work, the team is regularly involved in
the development and improvement of cellular security standards. We
actively participate in standards bodies such as <a href="https://www.gsma.com/">GSMA</a> <a href="https://www.gsma.com/aboutus/workinggroups/fraud-security-group">Fraud and Security Group</a> as well as the 3rd Generation Partnership Project (<a href="https://www.3gpp.org/">3GPP</a>), particularly its security and privacy group (<a href="https://www.3gpp.org/3gpp-groups/service-system-aspects-sa/sa-wg3">SA3</a>). Our long-term goal is to render FBS threats obsolete.
</p>
<p>
In particular, Android security is leading a new initiative within GSMA’s Fraud and Security Group (<a href="https://www.gsma.com/aboutus/workinggroups/fraud-security-group">FASG</a>)
to explore the feasibility of modern identity, trust and access control
techniques that would enable radically hardening the security of telco
networks.
</p>
<p>
Our efforts to harden cellular connectivity adopt Android’s
defense-in-depth strategy. We regularly partner with other internal
Google teams as well, including the Android Red Team and our <a href="https://bughunters.google.com/about/rules/6171833274204160/android-and-google-devices-security-reward-program-rules">Vulnerability Rewards Program</a>.
</p>
<p>
Moreover, in alignment with Android’s openness in security, we actively
partner with top academic groups in cellular security research. For
example, in 2022 we funded via our Android Security and Privacy Research
grant (<a href="https://security.googleblog.com/2018/12/aspire-to-keep-protecting-billions-of.html">ASPIRE</a>)
a project to develop a proof-of-concept to evaluate cellular
connectivity hardening in smartphones. The academic team presented the <a href="https://www.researchgate.net/profile/Evangelos-Bitsikas/publication/371695252_UE_Security_Reloaded_Developing_a_5G_Standalone_User-Side_Security_Testing_Framework/links/64909ee78de7ed28ba3e20e9/UE-Security-Reloaded-Developing-a-5G-Standalone-User-Side-Security-Testing-Framework.pdf">outcome</a> of that project in the last <a href="https://wisec2023.surrey.ac.uk/home/">ACM Conference on Security and Privacy in Wireless and Mobile Networks</a>.
</p>
<h3><strong>The security journey continues</strong></h3>
<p>
User security and privacy, which includes the safety of all user
communications, is a priority on Android. With upcoming Android
releases, we will continue to add more features to harden the platform
against cellular security threats.
</p>
<p>We look forward to discussing the future of telco network security with
our ecosystem and industry partners and standardization bodies. We will
also continue to partner with academic institutions to solve complex
problems in network security. We see tremendous opportunities to curb
FBS threats, and we are excited to work with the broader industry to
solve them.</p><p><em>Special thanks to our colleagues who were instrumental in supporting
our cellular network security efforts: Nataliya Stanetsky, Robert
Greenwalt, Jayachandran C, Gil Cukierman, Dominik Maier, Alex Ross,
Il-Sung Lee, Kevin Deus, Farzan Karimi, Xuan Xing, Wes Johnson, Thiébaud
Weksteen, Pauline Anthonysamy, Liz Louis, Alex Johnston, Kholoud
Mohamed, Pavel Grafov</em></p><p><i><span style="color: #800180;">googleblog.com </span></i></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-55409826452280968302024-03-09T11:25:00.005+11:002024-03-09T11:29:16.249+11:00Fuel Rip off as government does NOTHING!<div id="cyclelinks"></div>
<p class="dropcontent">Aussies have been getting ripped off by the petrochemical industry for decades, and the people in government have stood by doing nothing about it.</p><p class="dropcontent">Why should they? The higher the prices, the more tax is ripped from the ‘consumer’s’ wallet to feed the <strike>leeches</strike> blood sucking sociopaths in government.</p><p class="dropcontent">The (Labour Day) long weekend is upon us in a few states; SA, ACT, Tas, Vic, which means MANY people jump in their cars to get away from the hustle and bustle.</p><p class="dropcontent">So what do the companies do?</p><p class="dropcontent">They jack up the price 50 cents per litre to $2.319 per litre.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW6VnS-xh_nVnpZctcAz2CA0Ofr5fLUZDfDj6R72n7v0rVbFRX7ZFooxSVRapp4GrAlHf_wdudFiL16ihVf6eE7zqkXCM-x5V7sEjBmUBJOqERXBOPFhUVmb_DjtIckZ0fBXHEjQ0k3e0XAY_mKAPex6GWMvnPG9JK5t6jNMrH9nP7rbiNTtWaddiTamAZ/s822/Labour%20Day%20Fuel%20Price.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="822" data-original-width="252" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW6VnS-xh_nVnpZctcAz2CA0Ofr5fLUZDfDj6R72n7v0rVbFRX7ZFooxSVRapp4GrAlHf_wdudFiL16ihVf6eE7zqkXCM-x5V7sEjBmUBJOqERXBOPFhUVmb_DjtIckZ0fBXHEjQ0k3e0XAY_mKAPex6GWMvnPG9JK5t6jNMrH9nP7rbiNTtWaddiTamAZ/s320/Labour%20Day%20Fuel%20Price.jpg" width="98" /></a></div><br /><p class="dropcontent"><b><span style="color: #cc0000;">No outrage from motorists?</span></b></p><p class="dropcontent">- Obviously quite satisfied with the price hike.</p><p class="dropcontent"><br /></p><p class="dropcontent"><b><span style="color: #cc0000;">No ‘Royal Commission’ into this decades long scam?</span></b></p><p class="dropcontent">- No need, as nothing will change just like it didn’t with the RC into the banking & financial institutions industry.</p><p class="dropcontent"><br /></p><p class="dropcontent"><b><span style="color: #2b00fe;">That’s life in a corporatocracy/totalitarian colony, ‘advertised’ as a democracy.</span></b></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-6118285326348977172024-03-07T21:14:00.009+11:002024-03-08T10:24:43.631+11:00The sinister web of deception by Freemasons detrimental to ALL Australians<div><i><span style="color: #800180;">The Anglo-Masonic system of governance over Australians is deeply rooted into this colony’s history, where it ultimately works only for the benefit of its members and to the detriment of the general population as a whole.</span></i></div><div><div><i><span style="color: #800180;"><br /></span></i></div><div><i><span style="color: #800180;">From falsified tenders, ripping off the public purse to the tune of billions per year, to courtroom theatrics, it is ultimately the ‘ordinary’ Australians that lose, MANY of them unaware of the sinister actions in play, telling 'conspiracy theorists' to put on their tin foil hats, how sad of them to be so ignorant.</span></i></div><div><i><span style="color: #800180;"><br /></span></i></div><div><i><span style="color: #800180;">At the end of the day irrespective of whether it’s the Fabians, Masons or the Hillsong cult, or whether it’s (Matthew) Guy or (Dan) Andrews, where in the case of Andrews, he has the full support of the Anglo-Masonic courts and police to aid his criminal, oops ‘alleged’ criminal activities (e.g. Red shirts), not forgetting his staff of thugs that dig up dirt on anyone and threaten them and their families.</span></i></div><div><i><span style="color: #800180;"><br /></span></i></div><div><i><span style="color: #800180;">See also:</span></i></div><div><h3 class="post-title entry-title" itemprop="name" style="background-color: white; color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 22px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;"><a href="https://corpau.blogspot.com/2021/06/who-owns-courts-in-australia.html" style="color: #cc1119; text-decoration-line: none;"><i>Who ‘owns’ the courts in Australia?</i></a></h3></div><div><br /></div><div><h3 class="post-title entry-title" itemprop="name" style="background-color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 22px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;"><a href="https://corpau.blogspot.com/2022/05/more-to-come-soon.html"><i><span style="color: #cc0000;">Courts acting under dictation owned by financial services institutions</span></i></a> <i><span style="color: #cc0000;">(see pdf)</span></i></h3></div><div><br /></div><div><h3 class="post-title entry-title" itemprop="name" style="background-color: white; color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 22px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;"><a href="https://wakeup-world.com/2014/10/27/cracking-the-canberra-code/" style="color: #cc1119; text-decoration-line: none;"><i>Cracking the Canberra Code</i></a></h3></div><div><i><span style="color: #800180;"><br /></span></i></div><div><i><span style="color: #800180;"><br /></span></i></div><div><i><span style="color: #800180;">Here is one story that you, the general population are allowed to know a little about:</span></i></div></div><div><br /></div><div><div><b><span style="color: #2b00fe;">Guy silence on Freemasons membership raises ‘conflict’ questions</span></b></div><div><br /></div><div>Former opposition leader and planning minister Matthew Guy did not declare his years-long Freemasons Victoria membership, at a time when the secretive order pursued significant property developments around the state.</div><div><br /></div><div>Guy’s membership of Freemasons Victoria was confirmed by grand master Anthony Bucca, leaked internal documents and five internal Freemasons sources, who spoke anonymously due to rules prohibiting members from speaking publicly.</div></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjesBGw9T9B-YyDRcR4-u2iN_vZQAbQmMDIqGBhGYjkfvIrIMpnJELmU4PuiUIHJFUfx4BtTlsDnpbQMRRo1SqwZpkVcAdMDFOocQF5gSwUQ-SWxM52shX2GQHBLapbEYK7ECmPJ_oh9AA_rj5KtvRHoo1q54cisoS0OPCd6mj0C2q_daV4UGaCsRQyvrgd/s740/Guy_1.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="493" data-original-width="740" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjesBGw9T9B-YyDRcR4-u2iN_vZQAbQmMDIqGBhGYjkfvIrIMpnJELmU4PuiUIHJFUfx4BtTlsDnpbQMRRo1SqwZpkVcAdMDFOocQF5gSwUQ-SWxM52shX2GQHBLapbEYK7ECmPJ_oh9AA_rj5KtvRHoo1q54cisoS0OPCd6mj0C2q_daV4UGaCsRQyvrgd/s320/Guy_1.webp" width="320" /></a></div><span class="_2Li3P"><div style="text-align: center;"><i><span style="color: #666666;">Former opposition leader Matthew Guy, also a former Liberal planning minister, in 2022</span></i></div></span><div><br /></div><div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Documents obtained by <i>The Age</i>
show Guy was registered as a Freemasons Victoria member in 2018 in the
rank of “mark mason”, which is the third level of membership of the
secret fraternity. <a href="https://www.theage.com.au/link/follow-20170101-p50i5d">Guy lost the state election that year to Labor’s Daniel Andrews</a>.</p><p>It
is not known what year Guy’s membership began, but Bucca said it had
ceased in recent years, without providing an exact date, and dismissed
questions about potential or perceived conflicts during the politician’s
membership.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>“What
a minister chooses to do and doesn’t is a matter for the minister,”
Bucca said. “What’s it got to do with us? Did we deal with Matthew Guy
personally? Did we approach him on a one-to-one? I very much doubt it.”</p><p>One
former senior freemason, who had a leadership position in the
fraternity from 2000 to 2011, said he was aware of Guy’s membership
during that period.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH41Bc-rS-V4pjYa1U8f2GmKn6Hc_APUwFikhxJsfGFZgeAkGm9CrT2f6gi-Igp8vo3omo4GNiCRaimsz7q9iE7nMIrw7Z2fuC-oYJgcOWFed2pe4Ig-hlz4dOZV0_CVSEfZS0h53WF0cJd0K4V4rBcPMH-M8c2NdpcLGVhpbZvXg7SVsIEY3LEmediq0L/s740/Freemasons%20Vic.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="416" data-original-width="740" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH41Bc-rS-V4pjYa1U8f2GmKn6Hc_APUwFikhxJsfGFZgeAkGm9CrT2f6gi-Igp8vo3omo4GNiCRaimsz7q9iE7nMIrw7Z2fuC-oYJgcOWFed2pe4Ig-hlz4dOZV0_CVSEfZS0h53WF0cJd0K4V4rBcPMH-M8c2NdpcLGVhpbZvXg7SVsIEY3LEmediq0L/s320/Freemasons%20Vic.webp" width="320" /></a></div><div aria-label="enlarge image" class="_1lwW_" role="button" style="text-align: center;" tabindex="0"><i><span style="color: #444444;">The Dallas Brooks Hall was turned into luxury apartments in a deal between Mirvac and Freemasons Victoria. </span></i></div><div aria-label="enlarge image" class="_1lwW_" role="button" tabindex="0"><br /></div><div aria-label="enlarge image" class="_1lwW_" role="button" tabindex="0"><section class="_1Rw6X" data-testid="article-body-top"><div class="_1ysFk" data-testid="article-body"><div class="_1665V _2q-Vk" data-testid="body-content"><p>“He would have been <a href="https://www.theage.com.au/link/follow-20170101-p58pho">a rising star in the Liberal Party</a>. It would come up when we were looking for support. Whether anything ever happened, I don’t know,” he said.</p><p>Two other freemasons said they were aware of Guy’s longstanding membership but could not recall what date he joined.</p></div><div id="hard-reg-wall-piano-id"></div></div></section><div class="_1FVfK"></div><section class="vPaWe" data-testid="article-body-bottom"><div class="_1ysFk"><div class="_1665V _2q-Vk" data-testid="body-content"><p>Freemasons
meet regularly at the organisation’s all-male clubs to raise money for
charity, network and practise ancient rituals. Once a community of
society’s most powerful – notable past members in Australia include Sir
Donald Bradman and Sir Robert Menzies – membership has declined in
recent decades.</p><p>Guy has not disclosed the membership on his
parliamentary register of interests, which are annual statements that
require politicians to report investments and associations with clubs,
religions or groups that could represent an actual or perceived conflict
of interest.</p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dz-egUzvWpajKT3D9KiSXnw64Ajwa6XWEk2UCftpfIsDRMmZ9SEG2pk0cTSHrpFkVRb5K1i_HpYj4xxEgKReA' class='b-hbp-video b-uploaded' frameborder='0'></iframe></div><p style="text-align: center;"><i><span style="color: #444444;">Dallas Brooks Hall</span></i></p><div class="_1665V _2q-Vk" data-testid="body-content"><p>In 2018, Guy did declare membership of the Qantas Chairman’s Lounge and the Sir Henry Bolte Lecture Trust.</p><p><em>The Age</em>
is not suggesting that Guy acted inappropriately in making any planning
decisions or that he made those decisions based on any relationship
with the Freemasons, only that he may not have made necessary
declarations.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Guy
declined an interview request saying he would not be “replying to a
vague fishing expedition”. “I’m not a member. Go away and cease
harassing me,” Guy said.</p><p>An opposition spokesperson later
clarified that Guy was a “non-financial member” in 2018 and “hadn’t been
a financial member for many years before that”. The spokesperson did
not answer specific questions about the duration of Guy’s membership.</p></div><div class="_1665V _2q-Vk" data-testid="body-content"><p><a href="https://www.theage.com.au/link/follow-20170101-p5c9gh">Victorian Nationals leader Peter Walsh</a>
is a current member of Freemasons Victoria and appears regularly on the
organisation’s newsletters to promote its charitable work.</p><p>Public
records show Walsh discloses membership of organisations including the
Echuca Workers Club, Swan Hill Field & Game, Geelong Football Club
and the Athenaeum Club, yet does not disclose his Freemasons membership.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>When contacted for comment, Walsh accepted that he had been Freemason for many years but did not think disclosure was necessary.</p></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Former Victorian MP <a href="https://www.theage.com.au/link/follow-20170101-p5f86x">Ken Coghill, who is a founding member of the Accountability Round Table and an adjunct professor at Swinburne University</a>, said Freemasons was a membership that Guy should have disclosed.</p><p>“There
is an obligation to disclose any interest that might be affected by
decisions you make,” Coghill said. “I certainly would have expected it
[disclosure] in this case. There is a possibility that he would be
influenced by his membership of Freemasons, whether as an opposition
member or government member.”</p><p>Centre for Public Integrity director
Joo-Cheong Tham, also a Melbourne Law School professor, said the
omission of Guy’s Freemasons membership “strongly appears” to be a
breach of his obligation under laws to disclose membership of
organisations.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>“This
is especially so because of the perceived conflict of interest [if he
was a Freemasons member] when he was Victorian planning minister and
made consequential decisions in relation to the commercial interests of
Freemasons Victoria,” he said.</p><p>Tham supported greater transparency of these memberships. “There is a
good case for members of parliament to disclose their membership of
Freemasons Victoria as its size and influence mean that such membership
could give rise to a conflict of interest in the discharge of
parliamentary duties.”</p><p>Guy was planning minister for four years to
December 2014, during which time Freemasons Victoria was involved in
two major property development projects, in East Melbourne and Box Hill<strong>. </strong>It’s not known whether Guy was a Freemasons member during those years, and <em>The Age</em> does not suggest he made decisions based on any relationship with the Freemasons.</p><p>The
largest and most controversial was the re-development of Freemasons
Victoria’s East Melbourne headquarters, the Dallas Brooks Hall, in a
$450 million partnership with Mirvac.</p><p>The proposal was first lodged with the then Coalition state
government in 2013 and generated 11 objections, including from the City
of Melbourne and Epworth HealthCare. The objections related to heritage
concerns, height, overshadowing and privacy concerns for the
neighbouring hospital.</p><p>Mirvac and Freemasons Victoria sought
permission from Guy, as minister, to substantially increase the
development to two towers with 17 and 11 levels respectively.</p><div class="_1665V _2q-Vk" data-testid="body-content"><p>Guy appointed
an expert panel to advise the government on the project, and it reported
just after the 2014 election. Labor’s then planning minister, Richard
Wynne, ultimately approved a plan for the site in 2016.</p><p>Wynne said
he had to make significant adjustments to ensure the development did
not overshadow Fitzroy Gardens, directly opposite. “The initial
application was way over the odds,” he said.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Guy
was also involved in a planning decision at about the same time another
property was eventually developed by Freemasons Victoria.</p><p>Freemasons
Victoria mounted a strong objection when its 90-year-old Masonic centre
in Box Hill was considered for heritage protection in 2011, as part of a
wider planning change.</p><p>Freemasons Victoria’s expert consultant argued that there was insufficient justification for heritage protection.</p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dx9mksWDKsDV_sMOzpPkd-FJITRZQs1QDA06CnCDS_xz4coBBSZRbgNoHUOA1leBoJaU3K7drhhgaiyzpPeaw' class='b-hbp-video b-uploaded' frameborder='0'></iframe></div><i><div style="text-align: center;"><i><span style="color: #444444;">710 Station St, Box Hill</span></i></div></i><p>“From an
architectural and aesthetic perspective, the Box Hill site is a typical
building from the 1920s of which there are many examples developed
throughout Melbourne,” its submission from the time stated.</p><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>However,
Whitehorse City Council found this did not detract from the
“importance”, “historical significance” and “social memories associated”
with the building.</p><p>An independent panel ultimately agreed with
Freemasons Victoria and recommended to the minister that the centre not
receive heritage protection. Guy approved the amendment in March 2013,
according to the government gazette.</p><p>Freemasons Victoria then backed a project that razed the centre to make way for a 10-storey apartment complex.</p><p>Freemasons
Victoria’s 2017-18 annual report noted the last four apartments had
been sold, signalling the completion of the project.</p><p>During the
same planning process another masonic lodge, in Blackburn, was granted
heritage protection. This was not opposed by Freemasons Victoria, but it
did request consideration be given to acknowledging its development
potential.</p></div></div></div></div></div></section></div></div></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-35025058640770023782024-03-07T19:57:00.003+11:002024-03-07T19:57:22.793+11:00Your Noisy Fingerprints Vulnerable To New Side-Channel Attack<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid3Ysb1zaqlC9JblsQzCIeDgElfBolDTbRUjjRrxf-IqVultEqCDljmbfzBN1zLmPnmp6ZnkDyGieQc11OOKUBnTBl_JNRh-bvrhohg5fzk6gR60Zvx3Gon92YGrvCxtBWEK3ndj857d2H4F5IVy0Suq_Yzr9iZTU1vwh7_PT0fZHbNv1MNAI1YN88JfMW/s800/fingerprint_phone.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid3Ysb1zaqlC9JblsQzCIeDgElfBolDTbRUjjRrxf-IqVultEqCDljmbfzBN1zLmPnmp6ZnkDyGieQc11OOKUBnTBl_JNRh-bvrhohg5fzk6gR60Zvx3Gon92YGrvCxtBWEK3ndj857d2H4F5IVy0Suq_Yzr9iZTU1vwh7_PT0fZHbNv1MNAI1YN88JfMW/s320/fingerprint_phone.webp" width="320" /></a></div><br /><div class="entry-content" itemprop="articleBody">
<p>Here’s a warning we never thought we’d have to give: when
you’re in an audio or video call on your phone, avoid the temptation to
doomscroll or use an app that requires a lot of swiping. Doing so just
might save you from getting your identity stolen through the most
improbable vector imaginable — by <a href="https://www.ndss-symposium.org/wp-content/uploads/2024-618-paper.pdf" target="_blank">listening to the sound your fingerprints make on the phone’s screen</a> (PDF).</p>
<p>Now, we love a good side-channel attack as much as anyone, and we’ve
covered a lot of them over the years. But things like exfiltrating data
by <a href="https://hackaday.com/2017/02/25/do-you-trust-your-hard-drive-indication-light/">blinking hard drive lights</a> or <a href="https://hackaday.com/2020/04/24/gpu-turned-into-radio-transmitter-to-defeat-air-gapped-pc/">turning GPUs into radio transmitters</a> always seemed a little far-fetched to be the basis of a field-practical exploit. But PrintListener, as [Man Zhou] <em>et al</em>
dub their experimental system, seems much more feasible, even if it
requires a ton of complex math and some AI help. At the heart of the
attack are the nearly imperceptible sounds caused by friction between a
user’s fingerprints and the glass screen on the phone. These sounds are
recorded along with whatever else is going on at the time, such as a
video conference or an online gaming session. The recordings are
preprocessed to remove background noise and subjected to spectral
analysis, which is sensitive enough to detect the whorls, loops, and
arches of the unsuspecting user’s finger.</p>
<p>Once fingerprint patterns have been extracted, they’re used to synthesize a set of five similar fingerprints using <a href="https://beebom.com/master-print-ai-generated-fingerprint-unlock-smartphone/" target="_blank">MasterPrint</a>,
a generative adversarial network (GAN). MasterPrint can generate
fingerprints that can unlock phones all by itself, but seeding the
process with patterns from a specific user increases the odds of
success. The researchers claim they can defeat Automatic Fingerprint
Identification System (AFIS) readers between 9% and 30% of the time
using PrintListener — not fabulous performance, but still pretty scary
given how new this is.</p><p><span style="color: #800180;"><i>Source: hackaday.com</i></span></p></div><p class="dropcontent"><br /></p><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-18796906359750190072024-03-06T12:20:00.005+11:002024-03-06T12:24:21.555+11:00Medical test company’s ‘serious and systemic failures’ led to cyber-attack, watchdog says<div id="cyclelinks"></div>
<p class="dropcontent">Australian Clinical Labs hack alleged to have resulted in more than
200,000 health records and credit card details being published on dark
web</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqYy9r-haI2uQC6KSKnN2xOT458VJRzsJYsWWF_hZ7-JcFIuoigIZLHz9m91b4ea1fbVcm3tht7ZfmofjnHl9C_v3DsS_cPUDsXcyo3FvFSGKpdl8JXn2nTgrVt8cWxThhE7UOSaDUg_G9WfoMjZVBrcLuJVZdElnBlK62NWvO3EuIj9PopNRpg1FKZ4i-/s1157/Au%20Hack.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="701" data-original-width="1157" height="194" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqYy9r-haI2uQC6KSKnN2xOT458VJRzsJYsWWF_hZ7-JcFIuoigIZLHz9m91b4ea1fbVcm3tht7ZfmofjnHl9C_v3DsS_cPUDsXcyo3FvFSGKpdl8JXn2nTgrVt8cWxThhE7UOSaDUg_G9WfoMjZVBrcLuJVZdElnBlK62NWvO3EuIj9PopNRpg1FKZ4i-/s320/Au%20Hack.png" width="320" /></a></div><span class="dcr-n4pnam"><div style="text-align: center;"><i><span style="color: #cc0000;"><span class="dcr-1qvd3m6">OAIC alleges significant failures by ACL to protect customer data from the hack by a group known as Quantum.</span> Photograph: Wietse Michiels/Alamy</span></i></div></span><div><br /></div><div><p class="dcr-4cudl2">Medical testing company Australian Clinical Labs
had “serious and systemic failures” that resulted in a cyber-attack that
led to more than 200,000 customer health records and credit card
details being published on the dark web, the Australian information
commissioner has alleged.</p><p class="dcr-4cudl2">In October last year,
in the midst of the Medibank and Optus cyber-attacks, Medlab’s parent
company, ACL, confirmed it had been the victim of a cyber-attack eight
months earlier in February.</p><div id="sign-in-gate"><gu-island config="{"renderingTarget":"Web","darkModeAvailable":false}" data-island-status="hydrated" deferuntil="visible" name="SignInGateSelector" priority="feature" props="{"contentType":"Article","sectionId":"australia-news","tags":[{"id":"australia-news/business-australia","type":"Keyword","title":"Business"},{"id":"technology/cybercrime","type":"Keyword","title":"Cybercrime"},{"id":"australia-news/australia-news","type":"Keyword","title":"Australia news"},{"id":"australia-news/health","type":"Keyword","title":"Health"},{"id":"campaign/email/morning-mail","type":"Campaign","title":"Morning Mail AUS (newsletter signup)"},{"id":"technology/internet","type":"Keyword","title":"Internet"},{"id":"type/article","type":"Type","title":"Article"},{"id":"tone/news","type":"Tone","title":"News"},{"id":"profile/josh-taylor","type":"Contributor","title":"Josh Taylor","twitterHandle":"joshgnosis","bylineImageUrl":"https://i.guim.co.uk/img/uploads/2019/08/06/Josh_Taylor2.jpg?width=300&quality=85&auto=format&fit=max&s=8f0817a8c42fa3c8151074378eedf09f","bylineLargeImageUrl":"https://i.guim.co.uk/img/uploads/2019/08/06/Josh_Taylor.png?width=300&quality=85&auto=format&fit=max&s=a1e8502bb438342885b78582aeeb8ce9"},{"id":"tracking/commissioningdesk/australia-technology","type":"Tracking","title":"Technology (Australia)"}],"isPaidContent":false,"isPreview":false,"host":"https://www.theguardian.com","pageId":"australia-news/2023/nov/29/australian-clinical-labs-hack-quantum-cyber-attack-oaic","idUrl":"https://profile.theguardian.com","switches":{"prebidAppnexusUkRow":true,"externalVideoEmbeds":true,"abSignInGateMainVariant":true,"lightbox":true,"ophanNext":true,"commercialMetrics":true,"prebidTrustx":true,"scAdFreeBanner":false,"adaptiveSite":true,"prebidPermutiveAudience":true,"compareVariantDecision":false,"enableSentryReporting":true,"lazyLoadContainers":true,"ampArticleSwitch":true,"remarketing":true,"articleEndSlot":true,"keyEventsCarousel":true,"registerWithPhone":false,"targeting":true,"remoteHeader":true,"slotBodyEnd":true,"prebidImproveDigitalSkins":true,"ampPrebidOzone":true,"extendedMostPopularFronts":true,"emailInlineInFooter":true,"showNewPrivacyWordingOnEmailSignupEmbeds":true,"prebidAnalytics":true,"extendedMostPopular":true,"ampContentAbTesting":false,"prebidCriteo":true,"okta":true,"imrWorldwide":true,"acast":true,"automaticFilters":true,"twitterUwt":true,"prebidAppnexusInvcode":true,"ampPrebidPubmatic":true,"a9HeaderBidding":true,"prebidAppnexus":true,"enableDiscussionSwitch":true,"prebidXaxis":true,"stickyVideos":true,"interactiveFullHeaderSwitch":true,"discussionAllPageSize":true,"prebidUserSync":true,"audioOnwardJourneySwitch":true,"brazeTaylorReport":false,"callouts":true,"sentinelLogger":true,"geoMostPopular":true,"weAreHiring":false,"relatedContent":true,"thirdPartyEmbedTracking":true,"prebidOzone":true,"ampLiveblogSwitch":true,"ampAmazon":true,"prebidAdYouLike":true,"mostViewedFronts":true,"discussionInApps":false,"optOutAdvertising":true,"abSignInGateMainControl":true,"headerTopNav":true,"googleSearch":true,"brazeSwitch":true,"darkModeInApps":true,"prebidKargo":true,"consentManagement":true,"crosswordMobileBanner":true,"personaliseSignInGateAfterCheckout":true,"redplanetForAus":true,"prebidSonobi":true,"idProfileNavigation":true,"confiantAdVerification":true,"discussionAllowAnonymousRecommendsSwitch":false,"dcrTagPages":true,"permutive":true,"comscore":true,"ampPrebidCriteo":true,"abMpuWhenNoEpic":false,"newsletterOnwards":false,"youtubeIma":true,"webFonts":true,"prebidImproveDigital":true,"ophan":true,"crosswordSvgThumbnails":true,"prebidTriplelift":true,"weather":true,"disableAmpTest":true,"prebidPubmatic":true,"serverShareCounts":false,"autoRefresh":true,"enhanceTweets":true,"prebidIndexExchange":true,"prebidOpenx":true,"prebidHeaderBidding":true,"mobileDiscussionAds":true,"idCookieRefresh":true,"discussionPageSize":true,"smartAppBanner":false,"boostGaUserTimingFidelity":false,"historyTags":true,"brazeContentCards":true,"surveys":true,"remoteBanner":true,"emailSignupRecaptcha":true,"prebidSmart":true,"shouldLoadGoogletag":true,"inizio":true}}"></gu-island></div><p class="dcr-4cudl2">The
hacker group responsible – known as Quantum – was able to exfiltrate
86GB worth of data, including customer passport information, health
information, and credit card details including number, expiry date and
CCV.</p><p class="dcr-4cudl2">The data had been published on the dark web on 16 June last year, four months before ACL publicly confirmed the attack.</p><p class="dcr-4cudl2">This
month, the Office of the Australian information commissioner (OAIC)
took ACL to court over its failure to protect customer data during the
breach. The OAIC’s concise statement, released last week, alleges
significant failures by the company to protect customer data and inform
the commissioner about the breach when required.</p><p class="dcr-4cudl2">According to the documents, within four hours from
the time the first employee noticed the ransomware message on a desktop
computer in Medlab, it had spread to other computers in Brisbane and
Sydney, which were then encrypted by the attackers.</p><p class="dcr-4cudl2">ACL,
which generated revenue of almost $1bn during the 2022 financial year,
did not have a dedicated cybersecurity team, the documents state. Its
response was led by an IT team leader, overseen by ACL’s CIO and head of
technical services, but the OAIC alleges none of these staff had formal
cybersecurity qualifications or experience in responding to a
cyber-attack.</p><p class="dcr-4cudl2">The head of technical services
provided the IT team leader with the company’s playbook for ransomware
and malware, but the IT team leader had not been trained to use these
books, and OAIC alleges critical steps in the playbook were not
followed, including analysing the ransomware.</p><p class="dcr-4cudl2">The
company then brought in a third-party company, StickmanCyber, to assist
in the response. The OAIC found that monitoring agents were only
deployed on three of the at least 121 computers infected with
ransomware.</p><p class="dcr-4cudl2">StickmanCyber’s short engagement
with ACL, including reviewing one hour of firewall logs and dark web
scans, concluded at the time no data had been taken.</p><p class="dcr-4cudl2">By
21 March 2022 the IT team leader, after a conversation with the
company’s general counsel, sent an email stating “as per information
available to the IT department there was no unauthorised access,
disclosure, or loss of any personal information … as a result of the
incident”. The company did not inform the OAIC about the attack.</p><p class="dcr-4cudl2">On 25 March, the Australian Cyber Security Centre
informed ACL it had intelligence that Medlab may be a victim of a
ransomware attack, and reminded ACL of its notification requirements.
ACL did not investigate further, OAIC alleges.</p><p class="dcr-4cudl2">ACSC
alerted ACL again on 16 June that data had been published to the dark
web. It would take the company nearly one month (10 July) to inform the
OAIC, which OAIC alleges is in breach of the act. ACL would take until
October to announce the breach publicly.</p><p class="dcr-4cudl2">The
OAIC alleges ACL was “aware of serious deficiencies in its cybersecurity
framework” at least nine months before the cyber-attack, and did not
take appropriate steps to protect personal information.</p><p class="dcr-4cudl2">The
OAIC said the failures were “serious and systemic”, noting that ACL’s
IT budget was $1.3m in 2022, with a cybersecurity budget of $350,000 –
“significantly lower than that of industry standards”, the OAIC alleges.</p><p class="dcr-4cudl2">The OAIC is seeking civil penalties and costs.</p><p class="dcr-4cudl2">A spokesperson for ACL said the company is “vigorously defending the action”.</p><p class="dcr-4cudl2">The case continues.</p><p class="dcr-4cudl2">The
OAIC is still investigating Optus and Medibank over cyber-attacks last
year, which could lead to similar court action against the two
companies.</p><p class="dcr-4cudl2"><i><span style="color: #800180;">Source: The Guardian</span></i></p><p class="dcr-4cudl2"><b><span style="color: #990000;">Australian's will see more of these so called <i>failures</i> with regards to their 'private and confidential' data, where only huge fines may wake up corporations to better protect their 'consumer's' data.</span></b></p>
<div align="right" id="cyclelinks2"></div></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-19227843278465811782024-03-01T09:08:00.004+11:002024-03-01T09:08:52.004+11:00Windows BitLocker Hacked in 43 seconds!<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnQira6qcxkHER4zm68z8ieKK1Ba9wIj_2MDf1uWxEgEd4BW1OpXsPtE0eGpjADVy_o9hcvd4-VXlKSN9fKugOgtA3n2FinX9DmAi4BRhqUBh1rjtGkGLbAeceZKyDYX2G4nIUJkuE8ZLElb9P62o7XHqFu1zbgXYWwhBuIet4QxZ3ff9nEtiHzpvQD3E3/s480/BitLocker%20hacked%20in%2043%20Seconds.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="360" data-original-width="480" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnQira6qcxkHER4zm68z8ieKK1Ba9wIj_2MDf1uWxEgEd4BW1OpXsPtE0eGpjADVy_o9hcvd4-VXlKSN9fKugOgtA3n2FinX9DmAi4BRhqUBh1rjtGkGLbAeceZKyDYX2G4nIUJkuE8ZLElb9P62o7XHqFu1zbgXYWwhBuIet4QxZ3ff9nEtiHzpvQD3E3/s320/BitLocker%20hacked%20in%2043%20Seconds.jpg" width="320" /></a></div><br /><div><br /></div><div><div>A security expert has managed to break Windows’ BitLocker encryption using a Raspberry Pi Pico microcontroller.</div></div><div><br /></div><div><div>It took him just 43 seconds to steal BitLocker’s master key and access a locked laptop. He claimed to have exploited a flaw in the TPM security standard.</div></div><div><br /></div><div><b><span style="color: #990000;"><i>(For privacy and security, Microsoft products are not recommended.)</i></span></b></div><div><br /></div><div>See video:</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/wTl4vEednkQ" width="320" youtube-src-id="wTl4vEednkQ"></iframe></div><br /><div><br /></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-5001428257751361712024-02-29T09:47:00.006+11:002024-02-29T09:48:48.745+11:00The Full Charles Murray: Race and IQ Government Welfare and Crime - John Stossel<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCRkl35Ej0aCWDobFHy-weU_HjcqE_uGbB878faEbBxpUcGtQCZq4-JZY63fZzvFQk3_683VJpxSNiGD019RQohJyJ1-A9zTITUC-0W1EgEFZnOpxd-L8DO5Q9lfvDEeYl8isHxPktzGAtTGBJeHyYPqNVxuz3iZAZoMJPLNbN19SX-z5c0L4xFgbenxiZ/s1055/The%20Bell%20Curve%20-%20Murray.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1055" data-original-width="647" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCRkl35Ej0aCWDobFHy-weU_HjcqE_uGbB878faEbBxpUcGtQCZq4-JZY63fZzvFQk3_683VJpxSNiGD019RQohJyJ1-A9zTITUC-0W1EgEFZnOpxd-L8DO5Q9lfvDEeYl8isHxPktzGAtTGBJeHyYPqNVxuz3iZAZoMJPLNbN19SX-z5c0L4xFgbenxiZ/s320/The%20Bell%20Curve%20-%20Murray.png" width="196" /></a></div><br /><p class="dropcontent">See interview with the author:</p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/5vBLFchXCGY" width="320" youtube-src-id="5vBLFchXCGY"></iframe></div><br /><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-90959539775598740112024-02-26T20:31:00.007+11:002024-02-26T20:53:06.829+11:00Which VPN? Be careful of the reviews!<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjr2nOFAbpLouGRvBnxAxFSjQxxG4It5G9RPSpvAJVeFSyMgjE_XBHpz-JJFRULs4ISSk1DZorcs4grnSGcF3ahAgrGHuYtMPp2L3XhVigl5NaVCzgla500MwL15O-uP0Yqg-GReiAPQspNz0Wg5b9v0Pm-uYS8OsyyAXo3q8qwuBiL9bqFd8luMDjHCSdX/s721/ExpressVpn.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="499" data-original-width="721" height="221" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjr2nOFAbpLouGRvBnxAxFSjQxxG4It5G9RPSpvAJVeFSyMgjE_XBHpz-JJFRULs4ISSk1DZorcs4grnSGcF3ahAgrGHuYtMPp2L3XhVigl5NaVCzgla500MwL15O-uP0Yqg-GReiAPQspNz0Wg5b9v0Pm-uYS8OsyyAXo3q8qwuBiL9bqFd8luMDjHCSdX/s320/ExpressVpn.png" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><span style="text-align: left;"><b><span style="color: #cc0000;">Trust, but verify: An in-depth analysis of ExpressVPN's terrible, horrible, no good, very bad week</span></b></span></div><p class="dropcontent">In light of ExpressVPN's double-whammy of troubling news, we take a deep dive into the facts, and whether you can feel safe or suspicious about using one of the world's most popular VPNs. </p><p class="dropcontent">ExpressVPN has been all over the news for the past week, and not in a
good way. Because we recommend ExpressVPN here at ZDNet as one of the <a href="https://www.zdnet.com/article/best-vpn/" rel="follow">top VPNs</a> out there, I've gotten a flood of reader questions asking for an objective read on the news. In this article, I'll do my best.</p><h2> Sitrep </h2><p class="dropcontent">Let's start with a <a class="c-regularLink" href="https://en.wikipedia.org/wiki/Command_center#Military_and_government" rel="noopener noreferrer nofollow" target="_blank">sitrep</a> (situation report). There are two key items which are tangentially related.</p><p>The first item is that <a href="https://www.zdnet.com/article/expressvpn-sells-to-kape-technologies-for-936-million/" rel="follow">Kape Technologies has announced plans to acquire ExpressVPN</a>
for $986 million. I do have concerns about this because Kape was once
considered a malware provider. I'll talk more about this in a bit. </p><p>The second item is <a class="c-regularLink" href="https://www.reuters.com/world/us/american-hacker-mercenaries-face-us-charges-work-uae-2021-09-14/" rel="noopener noreferrer nofollow" target="_blank">a report in Reuters</a>
indicating that ExpressVPN CIO Daniel Gericke is among three men fined
$1.6 million by the US Department of Justice for hacking and spying on
US citizens on behalf of the government of the UAE (United Arab
Emirates).</p><p>I'll discuss each of these reports individually, and
then share with you some thoughts about how these situations might
impact your decision to use (or not use) ExpressVPN. </p><h2> Kape Technologies </h2><p>Kape Technologies has had quite a convoluted history. According to <a class="c-regularLink" href="https://www.forbes.com/sites/thomasbrewster/2015/06/09/from-israel-unit-8200-to-ad-men" rel="noopener noreferrer nofollow" target="_blank">a report in <em>Forbes</em></a>,
a company called Crossrider was formed in 2011 by "billionaire Teddy
Sagi, a serial entrepreneur and ex-con who was jailed for insider
trading in the 1990s. His biggest money maker to date is gambling
software developer Playtech," and Koby Menachemi. </p><div class="g-outer-spacing-bottom-large"></div><p class="dropcontent">Menachemi was a developer for <a class="c-regularLink" href="https://en.wikipedia.org/wiki/Unit_8200" rel="noopener noreferrer nofollow" target="_blank">Unit 8200</a>,
an Israeli signals intelligence unit responsible for hacking and
collecting data (think of it as part CIA, part NSA, and part high
school, because the unit hires and trains teenagers in hacking and
coding skills).</p><p>Crossrider's business was ad injection. Remember back in the day when
companies like Yahoo tried to convince you to download their browser
extension with their search bar? Crossrider's business was creating
tools that allowed them to inject ads into other companies' web pages,
sometimes overriding even ads that were paid to run on the sites that
were being compromised. </p><p>Ad injection skirted the line between just being scummy and being malware. <em>Forbes</em>
reported that Symantec's anti-malware identified software based on
Crossrider's product as malware, in part because the product effectively
stole the ad revenue from the sites its users visited, and in part
because it collected whatever data it could find in the process. </p><div class="g-outer-spacing-bottom-large"></div><p>According to <a class="c-regularLink" href="https://www.publift.com/blog/what-you-need-to-know-about-ad-injection" rel="noopener noreferrer nofollow" target="_blank">Publift</a>,
an ad partnering service founded by ex-Googlers, the ad injection
business is still out there. But Google has been fighting it for about
five years now, meaning it's not nearly as lucrative a business as it
once was. </p><p>According to <a class="c-regularLink" href="https://en.globes.co.il/en/article-crossrider-renamed-kape-after-switching-to-cybersecurity-1001227178" rel="noopener noreferrer nofollow" target="_blank">a 2018 report</a> in the Israeli business daily <em>Globes</em>,
Kape Technologies was a rebranding effort on the part of then
relatively new Crossrider CEO Ido Erlichman. Crossrider's share price
had fallen to a low of £0.27 on the London Stock Exchange and the
company was seeking a new strategy. </p><p>What better strategy for a
company dedicated to siphoning users' data and eyeballs than to branch
out into the one area of cybersecurity where users are obsessed with
anonymity and information security? </p><div class="g-outer-spacing-bottom-large"></div><p class="dropcontent">You can cut the irony with a knife.</p><p>In any case, the newly renamed Kape Technologies set out on an acquisition binge. The company <a class="c-regularLink" href="https://www.crunchbase.com/acquisition/crossrider-acquires-cyberghost-srl--6d40ffd8" rel="noopener noreferrer nofollow" target="_blank">started buying</a> in 2017, <a class="c-regularLink" href="https://en.globes.co.il/en/article-crossrider-buys-german-cyber-security-co-cyberghost-1001180764" rel="noopener noreferrer nofollow" target="_blank">acquiring CyberGhost VPN for about $9 million</a>. Next, in 2018, came Mac antivirus company <a class="c-regularLink" href="https://www.calcalistech.com/ctech/articles/0,7340,L-3742992,00.html" rel="noopener noreferrer nofollow" target="_blank">Intego for $16 million</a>. A few months later, Kape gobbled up another VPN provider, <a class="c-regularLink" href="https://www.crunchbase.com/acquisition/crossrider-acquires-zenmate--f07be86a" rel="noopener noreferrer nofollow" target="_blank">ZenMate, for about $5 million</a>. A year later, in 2019, <a class="c-regularLink" href="https://www.techradar.com/news/cyberghost-owner-buys-pia-for-dollar955m-to-create-vpn-giant" rel="noopener noreferrer nofollow" target="_blank">Kape spent $95 million for Private Internet Access</a>, one of the best known VPN providers at the time. </p><p>After a 2020 IPO on the London Stock Exchange (<a class="c-regularLink" href="https://en.globes.co.il/en/article-kape-technologies-raises-115m-in-london-offering-1001347631" rel="noopener noreferrer nofollow" target="_blank">which raised $115 million</a>), and <a class="c-regularLink" href="https://www.calcalistech.com/ctech/articles/0,7340,L-3888751,00.html" rel="noopener noreferrer nofollow" target="_blank">a year of record earnings</a> where the pandemic and <a href="https://www.zdnet.com/article/working-from-home-trend-causes-surge-in-cybersecurity-costs-security-breaches/" rel="follow">work-from-home cybersecurity concerns</a>
drove VPN demand, Kape was riding high. Back in March of this year, the
company bought Webselenese for $149 million. This is worthy of further
discussion. </p><div class="g-outer-spacing-bottom-large"></div><p class="dropcontent">At
first glance, it's tough to pin down what Webselenese does. The company
describes itself as "an online platform specialising in consumer-focused
privacy and security content." What does this mean? According to
investment site <em>The Twenties Trader</em>, <a class="c-regularLink" href="https://www.thetwentiestrader.com/post/be-wary-of-kapes-webselenese-acquisition" rel="noopener noreferrer nofollow" target="_blank">Webselense owns two very high profile review sites</a>,
VPNMentor and Wizcase. According to Alexa (Amazon's traffic monitoring
service, not Amazon's voice assistant -- I know, it's confusing), <a class="c-regularLink" href="https://www.alexa.com/siteinfo/vpnmentor.com" rel="noopener noreferrer nofollow" target="_blank">VPNMentor has a rank of 5,807</a>. Wizcase has a rank of 7,280.</p><p>Are you seeing where this is going? Adware provider pivots to become a
provider of VPN services, then that company buys up two of the largest
VPN review sites on the internet. Does anyone think those reviews will
remain unbiased? <a class="c-regularLink" href="https://restoreprivacy.com/vpn-review-websites-owned-by-vpns/" rel="noopener noreferrer nofollow" target="_blank">According to site RestorePrivacy.com</a>
(which itself traffics in VPN reviews), VPN rankings on both VPNMentor
and Wizcase changed in Kape Technologies' favor just as soon as Kape
bought Webselenese. </p><div class="g-outer-spacing-bottom-large"></div><p>Can you spell "conflict of intererest?" Sure. I knew you could. </p><p class="dropcontent">And then, last week, <a href="https://www.zdnet.com/article/expressvpn-sells-to-kape-technologies-for-936-million/" rel="follow">Kape siphoned up ExpressVPN for $936 million</a>,
its biggest deal to date. With Kape's somewhat sordid history, you can
see the concern. I'll mention one other issue about Kape, and then we'll
move on.</p><p class="dropcontent"> Last year, my CNET colleague Rae Hodge did <a class="c-regularLink" href="https://www.cnet.com/tech/services-and-software/what-is-kape-technologies-what-you-need-to-know-about-the-parent-company-of-cyberghost-vpn/" rel="noopener noreferrer nofollow" target="_blank">an extensive analysis of Kape Technologies</a>.
At the time, she was looking at Kape as it pertained to its ownership
of CyberGhost. But one thing she pointed out should be a concern. She
pointed out that even after the change from Crossrider to Kape, "Kape
still operated the infamous scareware Reimage -- a potentially unwanted
program that positions itself as a computer performance enhancer but
which has been known to signal false positives on security threats in
order to persuade you to pay for its premium service." She also pointed
out that as recently as 2019, "new Crossrider-Kape mutations have been
cropping up on the web."</p><div class="g-outer-spacing-bottom-large"></div><p>So, there's that. Now let's get to know Daniel Gericke a little better. </p><h2> ExpressVPN CIO Daniel Gericke </h2><p>Last week, as a completely separate story from Kape's acquisition of ExpressVPN, <a class="c-regularLink" href="https://www.reuters.com/world/us/american-hacker-mercenaries-face-us-charges-work-uae-2021-09-14/" rel="noopener noreferrer nofollow" target="_blank"><em>Reuters</em> reported</a>
that, "Three former U.S. intelligence operatives who worked as cyber
spies for the United Arab Emirates admitted to violating U.S. hacking
laws and prohibitions on selling sensitive military technology." </p><p>They were Marc Baier, Ryan Adams, and...Daniel Gericke. Gericke, as it turns out, is also ExpressVPN's CIO. </p><p>Baier,
Adams, and Gericke were not good boys. They were hired guns for a
special intelligence unit set up by the United Arab Emirates (UAE) to
gather intelligence on journalists, activists, dissidents, and rival
governments. According to some <a class="c-regularLink" href="https://www.reuters.com/investigates/special-report/usa-spying-raven" rel="noopener noreferrer nofollow" target="_blank">excellent in-depth reporting</a> by <em>Reuters</em>,
Raven was a substantial project, using money from Arab royalty to hire
at least a dozen former NSA and CIA operatives to hack into networks in
the US and other countries on behalf of their clients.</p><p>Remember Project Raven. We'll come back to that in a bit, with even more irony. </p><p>Unfortunately,
Gericke doesn't have a profile on LinkedIn. There is a profile for a
Daniel Gericke listing his sole position as "IT Director at Professional
Corporation," so if that's our Daniel, it's not much to go on. The most
we know is in <a class="c-regularLink" href="https://www.expressvpn.com/blog/daniel-gericke-expressvpn/" rel="noopener noreferrer nofollow" target="_blank">the 1,563-word statement issued by ExpressVPN regarding Mr. Gericke</a>.
ExpressVPN said it hired him in 2019. It did not say whether he was
still doing work for Project Raven or the UAE at that time.</p><p>If you're deeply interested in this, the best thing to do is read <a class="c-regularLink" href="https://www.expressvpn.com/blog/daniel-gericke-expressvpn/" rel="noopener noreferrer nofollow" target="_blank">ExpressVPN's statement</a>.
It's a bit of a marvel. It goes on to say that the company knew Gericke
was involved in spy stuff, but did not know about anything illegal,
immoral, or fattening. The company explains that it's necessary to hire
someone "steeped and seasoned in offense" in order to build the best
defenses. Then it goes on to state how it protected its services from
corruption from within and have subsequently hardened its services from
external attack. </p><p>As of September 17, the company reaffirmed its support of Gericke and did not indicate any plans to terminate him.</p><h2> Edward Snowden and his glass house </h2><p>Y'all remember Edward Snowden? Back in 2013 and 2014, Snowden used up <a class="c-regularLink" href="https://www.google.com/search?q=site:www.zdnet.com+gewirtz+snowden" rel="noopener noreferrer nofollow" target="_blank">a lot of my column inches</a>. For those of you doomed to forget history, Edward Joseph Snowden was a former NSA employee and CIA contractor <a class="c-regularLink" href="https://en.wikipedia.org/wiki/Edward_Snowden#Size_and_scope_of_disclosures" rel="noopener noreferrer nofollow" target="_blank">who stole and then leaked</a> <a class="c-regularLink" href="https://www.bloomberg.com/news/articles/2014-01-09/pentagon-finds-snowden-took-1-7-million-files-rogers-says" rel="noopener noreferrer nofollow" target="_blank">more than a million top secret documents</a> from the governments of the United States, Australia, and Great Britain. </p><p>After
the leak, he ran from the US to Hong Kong, and then from Hong Kong to
Russia, where he received asylum after living in the Sheremetyevo
Alexander S. Pushkin International Airport for about 40 days and 40
nights. In 2020, Snowden <a class="c-regularLink" href="https://www.theguardian.com/us-news/2020/nov/02/edward-snowden-applies-for-russian-citizenship-for-sake-of-future-son" rel="noopener noreferrer nofollow" target="_blank">applied for and was granted permanent residency in Russia</a>. He then went on to apply for dual Russian-American citizenship in December of that year. </p><p>In
his years subsequent to his theft and escape to Russia, Snowden has
made quite the name for himself. A movie was based on his exploits. And
he makes a living doing remote speaking engagements for willing and
credulous audiences.</p><p>So how did Mr. Snowden wind up in our story? As it turns out, he
weighed in on ExpressVPN and Daniel Gericke when the news broke last
week. On September 15, <a class="c-regularLink" href="https://twitter.com/Snowden/status/1438291654239215619" rel="noopener noreferrer nofollow" target="_blank">he tweeted</a>, "If you're an ExpressVPN customer, you shouldn't be." This came out the day after the <em>Reuters</em> report on Gericke and ExpressVPN and was picked up by media sources across the internet. </p><p>You've
probably heard the phrase, "people who live in glass houses shouldn't
throw stones." Well, here's Snowden's glass house. According to <a class="c-regularLink" href="https://www.reuters.com/investigates/special-report/usa-spying-raven" rel="noopener noreferrer nofollow" target="_blank"><em>Reuters</em>' in-depth report on Project Raven</a>,
two months before Snowden's fateful theft of US government top secret
information, he was recommended for work at military contractor Booz
Allen Hamilton (which then subcontracted him out to the three letter
agencies) by Lori Stroud, who herself was later recruited to Project
Raven by Marc Baier. Baier worked at NSA Hawaii along with Snowden.
Baier was also one of the three men indicted by the Justice Department
along with ExpressVPN's Gericke. </p><p>So, as we wade deeper in irony,
we have a former NSA operative who stole millions of documents from the
US Government and ran to Russia, who is complaining about the employer
of a former colleague of a former colleague, both of whom were involved
in shady activities, but nothing as vastly criminal as his own actions.</p><h2> What now? </h2><p>Okay, so now you're up to date. You know about
the company that just acquired ExpressVPN and its somewhat shady past
and, at the very least unethical <a class="c-regularLink" href="https://medium.com/@roshanrevankar/juking-the-stats-5926eaf5464" rel="noopener noreferrer nofollow" target="_blank">juking of the stats</a> when it comes to VPN reviews. You know about the background of ExpressVPN's CIO. </p><p>But what of ExpressVPN itself? The key question is, should you use it or skip it? </p><h2> What I use </h2><p>One
of the most frequently asked questions I get is which VPN service I
use. This week, it's been all about whether I'm going to stop using
ExpressVPN as my VPN service. </p><p>Here's the hard truth: I don't use a
commercial VPN service. I don't like the idea of my data going through
any of the VPN players' servers. But I'm a bit of an outlier. I've long
run my own bare-metal Linux VPN server network located across a few
cloud infrastructure providers. I've been hacking my own Linux kernel
mods for years, and I'm just as comfortable spinning up a series of
servers that bounce traffic as I am making a cup of coffee in the
morning. </p><p>I do test all the VPN services I review, but only for a
limited time, and only on dedicated test machines. Any that I have
concerns about have been documented in my reviews. So far, at least
among the top players, I haven't found anything much worse than a VPN
connection indicating that the connection is routing through a VPN. </p><p>But
it's important to note that I personally only use a VPN for
communication security at airports, hotels, and coffee shops -- which
I'm visiting a whole lot less these days. I don't have any need to
obfuscate my location in order to illegally route around sports viewing
restrictions, or to cheap out and not pay for new episodes of <em>Star Trek Discovery</em> or <em>Picard</em>.</p><p>I am also not a dissident, or someone running from an abusive
relationship. I don't do financial transactions online when away from my
home network. As such, I don't need all the services and all the
clients offered by many of the VPN service providers I've profiled. </p><p>None of the VPN services I recommend are bad -- I just don't need them in my day-to-day life because I built my own. </p><h2> But what about ExpressVPN? </h2><p>What
about ExpressVPN? Do these revelations change anything? To answer that
for yourself, you'll need to ask yourself three questions. </p><h3> How good is ExpressVPN for my needs? </h3><p><a href="https://www.zdnet.com/article/expressvpn-review/" rel="follow">When I looked at ExpressVPN</a>,
I called it "an easy-to-use VPN with middle-of-the-road everything." I
did find that an ExpressVPN connection routed through Security Firewall
Ltd, a firm with a surprisingly high Google fraud rating. ExpressVPN
reached out to say that Security Firewall is just one of many companies
it leases infrastructure from, and its network is secure. You can read
the company's statement in my review.</p><p><strong>Also: </strong><a href="https://www.zdnet.com/article/expressvpn-review/" rel="follow"><strong>ExpressVPN review: A fine VPN service, but is it worth the price?</strong></a></p><p>Overall, I didn't find that ExpressVPN was the fastest or the
cheapest VPN, but it did have great documentation, support for a whole
lot of clients, a nice user interface, and was easy to setup. So, from a
functional point of view, it's fine. Not great, but generally good
enough. </p><h3> Will the Kape acquisition change things? </h3><p>Kape
has genuinely been going hard after acquiring cybersecurity companies.
I'd be comfortable with its pivot (we all did things in the past we
regret) if it weren't for the Webselenese acquisition this year.
Acquiring those review sites for $149 million just has terrible optics. I
reviewed both CyberGhost and Private Internet Access well after their
acquisition by Kape, and both products were good.</p><p><strong>Also: </strong></p><ul><li><a href="https://www.zdnet.com/article/cyberghost-vpn-review-more-than-just-vpn-an-all-in-one-security-kit/" rel="follow">CyberGhost VPN review: More than just VPN, an all-in-one security kit</a></li><li><a href="https://www.zdnet.com/article/private-internet-access-review/" rel="follow">Private Internet Access review: A cheap, powerful VPN</a></li></ul><p>Kape
has had a past that's at odds with the mission of a VPN provider. Kape,
back when it was Crossrider, liked to hoover up users' data, probably
to sell to advertisers. Will it continue to do so? I don't know, but
it'd be really foolish if it did. The VPN market is a vastly more
profitable business than ad informatics, and Kape's VPN brands are now
its golden geese. It'd be insane to risk those cash cows (I know, the
mixed metaphor hurts), in favor of selling out its users' data. </p><h3> What about keeping Gericke on staff? </h3><p>The <a class="c-regularLink" href="https://www.expressvpn.com/blog/daniel-gericke-expressvpn/" rel="noopener noreferrer nofollow" target="_blank">company's blog post</a> went to great lengths to show how it is restricting Gericke's access so he won't do <em>baaaad</em>
things. But I agree with the premise that you need some offensive
warriors when you're at war. I'm not sure Gericke should stay as the
company's CIO with any infrastructure responsibility, but keeping a
stable of folks who know and understand the enemy is important in this
business. </p><h2> So what's the bottom line? </h2><p>One thing I'm
asked regularly is whether or not ExpressVPN (or any other VPN) is going
to share information with the FBI (or name your favorite intelligence
agency). The prevailing wisdom is that VPN vendors located outside the <a class="c-regularLink" href="https://en.wikipedia.org/wiki/UKUSA_Agreement" rel="noopener noreferrer nofollow" target="_blank">various "Eyes" intelligence sharing treaties</a> are somehow safer for those hiding information from government access. This is generally not true. As I discussed in <a href="https://www.zdnet.com/article/meet-nordsec-the-company-behind-nordvpn-wants-to-be-your-one-stop-privacy-suite/" rel="follow">my analysis of NordVPN</a>, most VPN providers have enough of a footprint in <a class="c-regularLink" href="https://2009-2017.state.gov/j/inl/rls/nrcrpt/2014/vol2/222469.htm" rel="noopener noreferrer nofollow" target="_blank">MLAT treaty</a> countries that if a three-letter agency wants your information, it'll get it.</p><div class="c-articleContent"><div class="c-ShortcodeContent"><p>So, unless you're a very serious dissident (or, I guess, a criminal) on the run from the government, the whole issue of jurisdiction is merely VPN theatre for the benefit of good marketing hype. And if you are relying on a VPN service to protect your life and freedom, why are you relying on something you read online for your truth? I just showed you that the biggest VPN review sites are owned by a VPN conglomerate. You need to do some very serious investigation and testing on your own, if you want to be truly safe.</p><p>If you're currently using ExpressVPN for general-purpose safe computing (like checking your mail at the local coffee shop) and you like it, I wouldn't say you should give it up. If you're relying on any of the Kape brands for a life and death situation, I'd say it's probably not worth the risk.</p><p>If you're shopping for a VPN, read all the reviews and try them out. Most give you thirty days, so see how they actually work for you. Again, I wouldn't necessarily dismiss ExpressVPN out of hand because of these reports, but it's up to you to gauge your risk level.</p><p>In the mid-1980s, US president Ronald Wilson Reagan was preparing for a summit with Soviet president Mikhail Sergeyevich Gorbachev and wanted to bond with his Soviet counterpart. When Reagan spoke with Russian history scholar Susanne Massie, an American, she introduced him to the phrase <em>doveryai, no proveryai</em>. In English, that's <a class="c-regularLink" href="https://en.wikipedia.org/wiki/Trust,_but_verify" rel="noopener noreferrer nofollow" target="_blank">trust, but verify</a>. Reagan apparently liked the phrase so much, <a class="c-regularLink" href="https://www.rbth.com/lifestyle/330521-reagan-trust-but-verify-chernobyl" rel="noopener noreferrer nofollow" target="_blank">he overused it</a>, much to the annoyance of Gorbachev.</p><p>In any case, that's how I recommend approaching ExpressVPN: trust, but verify. We'll keep an eye on how the company behaves. Does Kape do anything else that indicates their moral compass is askew? Does Gericke's access become more limited or does he leave the company? Does data secured by ExpressVPN turn out to be less secure?</p><p>I don't believe we need to pillory ExpressVPN just yet. All the bad news is tangential to its operations. But I'd advise the company to walk very carefully, to hold its new masters at Kape accountable, and to both know where the line is and stay firmly on the angels' side of that line.</p><hr /><p><em>You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at <a class="c-regularLink" href="https://twitter.com/davidgewirtz" rel="noopener noreferrer nofollow" target="_blank">@DavidGewirtz</a>, on Facebook at <a class="c-regularLink" href="https://www.facebook.com/davidgewirtz" rel="noopener noreferrer nofollow" target="_blank">Facebook.com/DavidGewirtz</a>, on Instagram at <a class="c-regularLink" href="https://www.instagram.com/DavidGewirtz/" rel="noopener noreferrer nofollow" target="_blank">Instagram.com/DavidGewirtz</a>, and on YouTube at <a class="c-regularLink" href="https://www.youtube.com/user/DavidGewirtzTV" rel="noopener noreferrer nofollow" target="_blank">YouTube.com/DavidGewirtzTV</a>.</em></p><p><em><br /></em></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPmH8JHgMlLEBiDFdg4O8zQ1X3Wwpc0mB0zTpbdaqfgcVyjHBj3LBJmU7Jy7-VjI9txFIJW5BL42dj2K4NmbEu63o-J2_qE4OmHSdbqiTB2PsiSHD_j25-yxJzepK7CYOzyAET9rwN5r-mzVIFauCyLGWXNO5KkKO-K76_sUr5PICradn-RROG48zcezCk/s610/ExpressVPN%20Reddit%20-%20Existing_Ad7730.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="217" data-original-width="610" height="114" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPmH8JHgMlLEBiDFdg4O8zQ1X3Wwpc0mB0zTpbdaqfgcVyjHBj3LBJmU7Jy7-VjI9txFIJW5BL42dj2K4NmbEu63o-J2_qE4OmHSdbqiTB2PsiSHD_j25-yxJzepK7CYOzyAET9rwN5r-mzVIFauCyLGWXNO5KkKO-K76_sUr5PICradn-RROG48zcezCk/s320/ExpressVPN%20Reddit%20-%20Existing_Ad7730.png" width="320" /></a></div><p></p><p><em>See source: </em><i><a href="https://www.reddit.com/r/vpngeeks/comments/e0gr9p/expressvpn_review_reddit_review/"><span style="color: #38761d;">https://www.reddit.com/r/vpngeeks/comments/e0gr9p/expressvpn_review_reddit_review/</span></a></i></p></div></div>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-45486732580568604982024-02-24T08:06:00.004+11:002024-02-24T08:22:47.553+11:00Smart Watches are DUMB <div id="cyclelinks"></div>
<p class="dropcontent"><b><span style="color: red;">Apple:- "The king of manufacturing problems and then selling us the solutions"</span></b></p><p class="dropcontent">Apple invented sneakily a whole now product class, that they could have people replace in every year or two with planned obsolescence. </p><p class="dropcontent">It's truly a great business model, <u><i><b>terrible</b></i></u> for the environment and everyone else, but a great business model for them.</p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/5oHDKJ6e0h4" width="320" youtube-src-id="5oHDKJ6e0h4"></iframe></div><br /><p class="dropcontent"><b>If we're outsourcing our self-awareness and motivation to these smartwatches, we're basically setting ourselves up to be controlled by them.</b></p><p class="dropcontent"><br /></p><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-30511791110452635362024-02-20T20:49:00.005+11:002024-02-20T20:54:40.323+11:00Police snoop 'breached the trust of us all'<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQQTgSVdP4cvP8lh5DsyIYCYjEV0m1j1Fk8DiIqcvogydlBjyMLgeds7ojVkSwXgJ0cfEM7DeWbCivza3GLOsqBgmcb8HUSVmOdtrTzHgd_KsKZKP3RVkqUGopO76PNbnxA9650bWz1qWrNesG3FY042KH6AJLLJPsZEkoQ-A9x3zEcO_HMUOGpXMZs4Qw/s1055/Police%20Snoop.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="731" data-original-width="1055" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQQTgSVdP4cvP8lh5DsyIYCYjEV0m1j1Fk8DiIqcvogydlBjyMLgeds7ojVkSwXgJ0cfEM7DeWbCivza3GLOsqBgmcb8HUSVmOdtrTzHgd_KsKZKP3RVkqUGopO76PNbnxA9650bWz1qWrNesG3FY042KH6AJLLJPsZEkoQ-A9x3zEcO_HMUOGpXMZs4Qw/s320/Police%20Snoop.jpg" width="320" /></a></div><br /><p class="dropcontent">Here is another corrupt cop, which you (the people) are allowed to read about.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqAYYLs_0fx7nwAb_-aBP5gUbDr9WMa5HBxxmrz4dpxRY8cpBbxGUU-NDsd1pLBVfKdP_pQPFzALOsh2undRf4T9CbUnhssm4yGSLtlnSaPJb-mVwRIov4sKPgNg8dqcYQKrOKb4i6D5o_nscM8iFl8661_bWnMjVqtSdF-VEMs3Cu3M_EF52au4IPo1Yt/s2105/Police%20snoop%20'breached%20the%20trust%20of%20us%20all'.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="788" data-original-width="2105" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqAYYLs_0fx7nwAb_-aBP5gUbDr9WMa5HBxxmrz4dpxRY8cpBbxGUU-NDsd1pLBVfKdP_pQPFzALOsh2undRf4T9CbUnhssm4yGSLtlnSaPJb-mVwRIov4sKPgNg8dqcYQKrOKb4i6D5o_nscM8iFl8661_bWnMjVqtSdF-VEMs3Cu3M_EF52au4IPo1Yt/s320/Police%20snoop%20'breached%20the%20trust%20of%20us%20all'.jpg" width="320" /></a></div><br /><p class="dropcontent">There are plenty more corrupt cops out there in every state and territory of this colony, but the mainstream media are limited as to what and whom they can write about, as exposing corruption in government, will give the public a 'vote' of no confidence.</p><p class="dropcontent">That's life in the colony!</p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-46315431232115426682024-02-18T19:37:00.007+11:002024-02-18T19:45:28.797+11:00India bans ‘private’ email service under false pretences?<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBY9YbApHeM385O7CI9pbTi002TVSLhxfM2OSOjJC98Znk55-Wu7c1ecmQDNh23ElDSGsSAt5nWVEqgwH8Gtx0d9MogNHo0mkx1oPLaQkkz4WC_RQOuRDBRI0R5_NvcNwhlCixoevGC_6Y0_RVMb2ZNOz2cUOB377viL6hkU_oUtfq-7s3AJIHZHJSKOPK/s523/Proton%20Mail.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="290" data-original-width="523" height="177" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBY9YbApHeM385O7CI9pbTi002TVSLhxfM2OSOjJC98Znk55-Wu7c1ecmQDNh23ElDSGsSAt5nWVEqgwH8Gtx0d9MogNHo0mkx1oPLaQkkz4WC_RQOuRDBRI0R5_NvcNwhlCixoevGC_6Y0_RVMb2ZNOz2cUOB377viL6hkU_oUtfq-7s3AJIHZHJSKOPK/s320/Proton%20Mail.png" width="320" /></a></div><br /><p class="dropcontent">Worldwide, governments hate the general population/serfs/plebs having ‘private’ communications, citing the obvious excuse, that being not crime but this next level thing called ‘terrorism’, where some nation’s governments are the very definition of terrorists.</p><p class="dropcontent">End-to-end encrypted services such as Proton Mail, Signal, Telegram et al, are under attack by governments where in the colony called Australia, the uneducated MPs in government want the manufacturers to build a “systemic weakness” or a backdoor into the product.</p><p class="dropcontent">Apple or Meta 'encrypted' products aren't truly 'private' as your communications data is handed over to authorities, once requested. </p><p class="dropcontent">They do not want the plebs to have ANY sort of (digital) privacy, where if they could in the colony, they would install a law that bans houses from having curtains/drapes/shutters.</p><p class="dropcontent">The Indian government used a ‘convenient’ excuse to ban Proton Mail, alleging that hoax bomb threat was sent to 13 schools.</p><p class="dropcontent">See article: <a href="https://www.hindustantimes.com/india-news/it-ministry-looks-to-block-proton-mail-on-request-of-tamil-nadu-police-101707938167006.html"><i><span style="color: #38761d;">https://www.hindustantimes.com/india-news/it-ministry-looks-to-block-proton-mail-on-request-of-tamil-nadu-police-101707938167006.html</span></i></a></p><p class="dropcontent"><b>The Indian government 'supports' the <span style="color: red;"><i>criminal actions</i></span> of 'scammers' from call centres specifically set-up to rip-off westerners.</b> </p><p class="dropcontent">As if they (the Indian government) cares that some pensioner in the US/Australia was robbed of their life savings, because if the government factually did care, these criminal actions would have stopped decades ago.</p><p class="dropcontent">In any event, would this also have been the case if a Hotmail or Gmail address was used?</p><p class="dropcontent">Was the source of the email an actual hoax or a job seconded by the government?</p><p class="dropcontent">In reality we will never know, as governments lie to people every single day.</p><p class="dropcontent">What we do know is that end-to-end encryption services are under attack!</p><p class="dropcontent">We therefore encourage more people to use them and support them financially if one can.</p><p class="dropcontent">This action is part of the global Nanny State agenda.</p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-68517912752746876792024-02-17T08:24:00.002+11:002024-02-17T08:24:16.388+11:00AFP cop William Wheatley accused of stealing Bitcoin now worth $6M<div id="cyclelinks"></div>
<h1 class="headline g_font-title-xl"></h1><p class="standfirst g_font-long-format">An
AFP cop has been accused of stealing Bitcoin discovered during a police
raid, with the value of the cryptocurrency now worth $6m.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifVNcoY9E8WjL7toTV1G-axghqIS6VoG_LWMU3v3VKqu5BuUtDbEq-9hc9rLbMrdyMoJRE9bic-YeRWQoLk_g4T4FE2tBd4JMKBaK-4rsFZub1tX75ZbKL2aF5Da7IAsvcOZujipm5MTtrohtNX1YKsTCeMmcivvfDu3UxYstI9HN4JSwt5zMmmnxpkkM9/s1024/Corrupt%20cop%20-%20William%20Wheatley.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="576" data-original-width="1024" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifVNcoY9E8WjL7toTV1G-axghqIS6VoG_LWMU3v3VKqu5BuUtDbEq-9hc9rLbMrdyMoJRE9bic-YeRWQoLk_g4T4FE2tBd4JMKBaK-4rsFZub1tX75ZbKL2aF5Da7IAsvcOZujipm5MTtrohtNX1YKsTCeMmcivvfDu3UxYstI9HN4JSwt5zMmmnxpkkM9/s320/Corrupt%20cop%20-%20William%20Wheatley.jpg" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><i>William Wheatley has been accused of stealing Bitcoin after a police raid at Hoppers Crossing in 2019. Picture: NCA NewsWire / Luis Enrique Ascui</i></div><p class="dropcontent">It was an accused crooked
cop’s connection to a lady friend that put him in the can for an
alleged theft of 81 stolen crypto belonging to a suspected peptide crime
ring, a court has heard.</p><div class="g_font-long-format" id="story-body">
<p>An intelligence unit probing the missing Bitcoin - currently worth
$6m - found at a Hoppers Crossing steroid trafficking raid ended up
linking Australian Federal Police officer William Wheatley to the theft
through a woman’s Richmond address.</p><p>Ashley Tell’s home location
was uncovered in an IP address search linked to the stolen Bitcoin as
authorities were treating the AFPs cyber team as prime suspects, the
Melbourne Magistrates’ Court heard on Thursday.</p><p>“The link there
was purely between (Mr Wheatley) and Ms Tell, we went through 10 members
of the cyber team - only he had a connection to her,” Australian
Commission for Law Enforcement Integrity senior intelligence analyst
Anthony Todd-Egglestone told Mr Wheatley’s defence lawyer.</p><p>“All the evidence that we’ve collected goes back to your client.”</p><p>ACLEI
started probing the AFPs entire cyber unit after its IP address at
federal police headquarters on Latrobe St was found to have dealt with
the stolen coins.</p><p>Five staff were looked at more closely after it
was found they were all on-shift when the police IP address was used on
February 8, 2019.</p><p>But Mr Wheatley became the target when Ms Tell’s Richmond home popped up in another search.</p><p>It
comes after the court earlier heard Mr Wheatley is facing corruption
and money laundering charges after he was accused of stealing the 81
Bitcoin from an alleged drug trafficker.</p><p>The 45-year-old allegedly
stole the cryptocurrency found on a device during a police raid into a
“steroid trafficking ring” in Hoppers Crossing, on January 25, 2019.</p><p>The
court on Wednesday heard that a “metallic device” that looked like an
“overgrown dog tag” with digits on it was found at the property raided
as part of Operation Viridian, a joint venture between AFP and Victoria
Police.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuhVna-duHHoyTT98IgpVKb8OzNt7Yq6xU_NgDO7ZRGDVqb1UuH2IZEuVEvevWJbliIwJDJfAXqyXCT0apow6rsxjenWzvNKivrLT1QiIp8lyVKI1HlEXO1E6nj8LgEkID3RUD3QvL0reXqzhEmSq4wX-aT1BNCyhDWwWE9HB4SAadWeMbNZkJYnz6uM69/s1024/William%20Wheatley_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="576" data-original-width="1024" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuhVna-duHHoyTT98IgpVKb8OzNt7Yq6xU_NgDO7ZRGDVqb1UuH2IZEuVEvevWJbliIwJDJfAXqyXCT0apow6rsxjenWzvNKivrLT1QiIp8lyVKI1HlEXO1E6nj8LgEkID3RUD3QvL0reXqzhEmSq4wX-aT1BNCyhDWwWE9HB4SAadWeMbNZkJYnz6uM69/s320/William%20Wheatley_2.jpg" width="320" /></a></div><p><i>William Wheatley is seen outside the Magistrates Court during his Committal for charges of corruption alongside theft and money-laundering offences after an internal investigation. Picture: NCA NewsWire / Luis Enrique Ascui</i></p><p>“Ever seen one of these?” federal agent Jesse Whyte wrote in a
message to his AFP offsider and cyber team specialist, Mr Wheatley, who
wasn’t at the raid.</p><p>Attached was an image of a Bitcoin hardware
wallet located under a desk at the property, where Mr Whyte said an
“overwhelming amount of peptides” was discovered.</p><p>The agent told the court he didn’t know anything about computer crime, and that he must have contacted Mr Wheatley for advice.</p><p>According
to court documents, police couldn’t crack into the crypto wallet for
more than three weeks, when they discovered 81 Bitcoin on the device had
been moved into an unknown wallet just four days after they seized it.</p><p>At the time, the crypto was worth $452.5k.</p><p>It now has a price tag of $6.36m.</p><p>Police
were unable to track the currency and considered the matter over with,
using the incident as a training example of the “unique risks posed by
cryptocurrency”.</p><p>That was until 2021, when Victoria Police got a
new tracing program and set up a “cold case” team that discovered the
Bitcoin was moved on January 29 into another wallet, then to other
wallets and traded into other coins until April 9.</p><p>The currency
was tracked to an international crypto exchange called Binance, with the
cyber crime unit then finding IP addresses linked to the stolen coin.</p><p>One account holder was found to be based at 383 Latrobe St Melbourne — then the AFP’s Melbourne headquarters.</p><p>In
a witness statement, Cyber Crime Detective Sergeant Dion Achtypis said
he “formed the opinion” that a police member may have been involved in
moving the currency and alerted his senior manager.</p><p>The probe led to police getting a warrant to search Mr Wheatley’s Kensington home in December 2022.</p><p>Mr Wheatley is facing charges including theft, dealing in Bitcoin
that was the suspected proceeds of crime, dishonestly obtaining property
owned by Victoria Police and using information he obtained as a
Commonwealth public official with the intention of dishonestly obtaining
a benefit for himself.</p><p>Magistrate Malcolm Thomas asked both the
prosecution and defence to turn their minds to whether Bitcoin could be
considered property, or whether just the crypto wallet could be
considered property but information could not.</p><p>The committal
hearing testing the evidence against Mr Wheatley was expected to finish
on Thursday, but will now continue on Friday.</p><p><i><span style="color: #800180;">This is just one instance of the public news media informing the people about a corrupt cop, but the reality is that many more corrupt cops are deliberately hidden by the media and government from the public's view.</span></i></p><p><i><span style="color: #800180;">Will William Wheatley factually be incarcerated or will the corrupt judiciary give him a 'good behaviour' don't do it again sentence?</span></i></p></div>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-81038182585156825192024-02-13T22:53:00.018+11:002024-02-13T23:16:50.764+11:00JUDICIARY CONDONES POLICE CONTEMPT OF COURT<div id="cyclelinks"></div>
<p class="dropcontent">The colony’s Anglo-Masonic set-up legal system is corrupt to the core.</p><p class="dropcontent">Sure, just because many serfs may and do obtain remedies in relation to their (petty) matters before the courts, does not paint the dark and sinister agenda against the good people of Australia.</p><p class="dropcontent">If one is to present a challenge to a law, a question of law, or technically a Section 78B (in reference to the Judiciary Act 1903), or even a matter that is in the ‘public interest’, that’s when the going gets tough and the deception by the legal system is taken to the next level, with full support of the judiciary, as it is in their vested interest to do so.</p><p class="dropcontent">With particular reference to Victoria, from a time period in early 2020, when an alleged ‘<i><span style="color: #666666;">state of emergency</span></i>’ was declared, the tier of government referred to as the <i>Judiciary</i>, that being the courts and police have gone into overdrive with regards to covering up the criminal actions of their ‘brethren’, those in positions of power/authority.</p><p class="dropcontent">From when people started to stand up and take their alleged ‘Infringements’ to court to challenge the actions of those in government, we have sighted many documents pertaining to the matters brought before the courts, where one recurring theme was present.</p><p class="dropcontent">Instructions were clearly given not to take photographic evidence of the documents, as this may or rather will reveal the source. </p><p class="dropcontent">Since the ‘<i>burden of proof</i>’ is on the accuser, in these cases the prosecution, that being Victoria Police, they MUST prove ALL aspects of their claim.</p><p class="dropcontent">The Defendant or Accused has the right to obtain a ‘Full Brief’ containing ‘Full disclosure’ of documents that the prosecution relies on, that being the actual document declaring the so called ‘State of Emergency’ to whether or not the person issuing this document factually had the authority to do so.</p><p class="dropcontent">Another fundamental aspect of the matter is that the prosecution must prove that the accused was ‘notified’ of said document, where an ‘advertisement’ over television or radio frequencies is not 'proof of service'.</p><p class="dropcontent">The Victorian people have been conned out of their tax dollars in supporting Magistrates’ or judicial registrar’s salaries in bogus court hearings over ‘COVID’ fines, as in reality there is no lawfully enacted instrument that can give rise to the existence of said ‘infringement’, something both the police and judiciary are well aware of.</p><p class="dropcontent">In many cases Victoria Police have been ordered/subpoenaed to produce the required documents, which they do not, with zero consequences arising from ‘contempt of court’.</p><p class="dropcontent">The judiciary turns a blind eye to contempt of court by Victoria Police.</p><p class="dropcontent">How ‘fair’ is that to the accused? </p><p class="dropcontent">Yet, when an Accused commits contempt of court a reaction by the judiciary is swift.</p><h3 style="text-align: left;"><span style="color: red;"><b>NO ‘<i>right to a fair hearing</i>’ in the Magistrates’ Court of Victoria.</b></span></h3><p class="dropcontent">No ‘person’ in Victoria will have a fair and impartial hearing in the jurisdiction of the Magistrates’ Court of Victoria (MCV), period.</p><p class="dropcontent">On a side-note, a fundamental legal fact is that a sheriff (of any state in Australia), is an officer of that state’s Supreme Court.</p><p class="dropcontent">With regards to the state of Victoria, there has not been a lawfully enacted Sheriff, for quite sometime, therefore the collections by any ‘deputy’ sheriff are unlawful, actions which are tied into the MCV, which is another lengthy series of posts described elsewhere.</p><p class="dropcontent">Another hidden fact is that the 'Infringements Court' is 3 computers operating out of the ground floor of the 277 William St, Melbourne, VIC 3000.</p><p class="dropcontent">Another legal fact is that ALL courts must operate without prejudice or bias independently of external influence and most importantly to the ‘Crown, in right of [Victoria]’ in this case.</p><p class="dropcontent">But there is one huge problem that many people many not be aware of.</p><p class="dropcontent">That is, the Magistrates’ Court of Victoria does not operate independently nor without external influence.</p><p class="dropcontent">A document from 2021, authored by the MAGISTRATES’ COURT OF VICTORIA</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv148KGUNllj0f7CxH_YqxRW7LL20uKJFVVjB7WLI4ubQuLNC-pE9mZeYUlSMWZ5y5hQw3fWML0mPC0hy0lh5Jm_6FwRKqabltM4AV1TVDZj5NwQpINVNfh6f-CoZQ-3ylfH9IFrOza9dy4Z8IBxTbhBWMPk3WZHN5LHACaAoraLJsSvWEXHOMHar0Tg/s800/MCV%20-%20influence%20decision%20making.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="800" data-original-width="606" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv148KGUNllj0f7CxH_YqxRW7LL20uKJFVVjB7WLI4ubQuLNC-pE9mZeYUlSMWZ5y5hQw3fWML0mPC0hy0lh5Jm_6FwRKqabltM4AV1TVDZj5NwQpINVNfh6f-CoZQ-3ylfH9IFrOza9dy4Z8IBxTbhBWMPk3WZHN5LHACaAoraLJsSvWEXHOMHar0Tg/s320/MCV%20-%20influence%20decision%20making.jpg" width="242" /></a></div><br /><p class="dropcontent">states the business known as the Court operates under the following conditions:</p><p class="dropcontent"><b><i><span style="color: #2b00fe;">"Develop, maintain, and enhance key relationships with internal and external stakeholders to influence decision making processes and outcomes critical to the success of MCV, including court staff and judiciary, Court Services Victoria, and other Victorian government departments."</span></i></b></p><p class="dropcontent">'External Stakeholders' to the MCV are the banks and financial institutions such as Goldman Sachs, BlackRock, et al.</p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-78464800094353008012024-02-12T21:01:00.004+11:002024-02-12T21:04:02.637+11:00Australian Competition & Consumer Commission - Internet activity report<div id="cyclelinks"></div>
<p class="dropcontent">For the period ending 30 June 2023</p><p class="dropcontent">December 2023</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijAwduoOlnFvFsBdGj-jvCMIKwYEFk4Xy9_SfqUaOXEqUCPsD14Zj0_Tz4XB4yItUTCecP4kULk3opj-Uo35AT07JNqkPOuhkZcfbZhi25NKycgGxKgSR87lzGmCkTRKc3QEAIqKAyjkuUHDq0E3oc7EWQmZ1I10s83JrWHM3D7swQSKrCAIkYOEM99XZC/s1171/ACCC%20-%20Internet%202023.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1171" data-original-width="926" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijAwduoOlnFvFsBdGj-jvCMIKwYEFk4Xy9_SfqUaOXEqUCPsD14Zj0_Tz4XB4yItUTCecP4kULk3opj-Uo35AT07JNqkPOuhkZcfbZhi25NKycgGxKgSR87lzGmCkTRKc3QEAIqKAyjkuUHDq0E3oc7EWQmZ1I10s83JrWHM3D7swQSKrCAIkYOEM99XZC/s320/ACCC%20-%20Internet%202023.png" width="253" /></a></div><br /><p class="dropcontent">See report:</p><p class="dropcontent"><br />
<iframe height="480" src="https://drive.google.com/file/d/1m1cFFO4-9sFyIcbUcvUPYnKB_85El2Km/preview" width="460">
</iframe>
</p><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-83900587601335646862024-02-11T10:30:00.003+11:002024-02-11T10:43:05.817+11:00Google/YouTube monopoly, anti-competitive must see court time!<div id="cyclelinks"></div>
<p class="dropcontent">YouTube censors creators, especially if the content does not follow a particular narrative.</p><p class="dropcontent">See video of the title:</p><h1 class="style-scope ytd-watch-metadata">Youtube THREATENS Massive Youtuber Louis Rossmann & It BACKFIRES Immediately!</h1><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/6zWaqm5MxEA" width="320" youtube-src-id="6zWaqm5MxEA"></iframe></div><div><br /></div>This is an example of how the people in governments, the legal profession are in bed together with the large multinationals.<div><br /></div><div>Google should be in the courts over this behaviour immediately!<br /><div><br /></div><div>ALL part of the (global) Nanny State agenda. <br /><div><br /></div>
<div align="right" id="cyclelinks2"></div></div></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-26771545663873868662024-02-04T19:56:00.004+11:002024-02-04T19:56:48.821+11:00Police senior constable charged for alleged sexual assault<div id="cyclelinks"></div>
<p class="dropcontent">A high-ranking police officer has been charged for allegedly sexually assaulting several people while on duty.</p><p class="dropcontent"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi6krKPJL20ukY1jv7UUzDtGKm3ASFiSJB6nT4AnyWv5PoWrXR8_yaf7GfF2zQZKNauTqqYwtL1NI7mGVHyfbYKtZG_x_gTS_u_mYFqArTW_ZDGcUB5hcmXhhggvYEMltI51yEoF4Grl524FyDWILQKxyIgKgDNyoqVYGj1fp11JrmqexBfl-BSPro9mTYa" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="576" data-original-width="1024" height="180" src="https://blogger.googleusercontent.com/img/a/AVvXsEi6krKPJL20ukY1jv7UUzDtGKm3ASFiSJB6nT4AnyWv5PoWrXR8_yaf7GfF2zQZKNauTqqYwtL1NI7mGVHyfbYKtZG_x_gTS_u_mYFqArTW_ZDGcUB5hcmXhhggvYEMltI51yEoF4Grl524FyDWILQKxyIgKgDNyoqVYGj1fp11JrmqexBfl-BSPro9mTYa" width="320" /></a></div>A Victoria Police leading senior constable will face court on sexual assault charges.<div><br /></div><div><div class="description g_font-long-format"><p>A police officer allegedly sexually assaulted multiple people while on duty.</p></div><div class="g_font-long-format" id="story-body">
<p>The leading senior constable from Victoria’s northwest region has
been charged over a string of alleged assaults committed across Epping,
Fawkner, Greensborough and Kalkallo between 2020 and 2023.</p><p>The
49-year-old officer was allegedly on duty at the time of each offence
and has been charged with three counts of sexual assault.</p><p>He will front court at a later date.</p><p><span style="color: #800180;"><i>Notice how the mainstream media, deliberately omits the officer's picture/name?</i></span></p><p><span style="color: #800180;"><i>Is it truly 'in the public interest' to keep a sexual predator 'anonymous' within the community?</i></span></p><p><span style="color: #800180;"><i>Is this what the general population truly wants?</i></span></p></div><p></p>
<div align="right" id="cyclelinks2"></div></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-70965666821034101682024-01-29T15:33:00.009+11:002024-01-29T18:17:40.616+11:00An Effective System for Investigating Complaints Against Police<div id="cyclelinks"><b style="color: #2b00fe;">A study of human rights compliance in police complaint models in the US, Canada, UK, Northern Ireland and Australia.</b></div><div id="cyclelinks"><b style="color: #2b00fe;"><br /></b></div><div id="cyclelinks"><b style="color: #2b00fe;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgKPppplAUtlwhSFh_1f-54ysq8eb9N4EVhMz9Vtf0hYY3Z1-ZYRAoe2AMdwoHgHfpa_LjiJ79TooIKaCTCjEEaeFRFwKqfaORAeTmLaZrjCh15YdUUzgShBHQi0qEtzH6166b34jCN0C8Fd9f4bulMoGy-EbXgESSsBtKktNgdjwVBcc7h5yTg3aYPYf9V" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="850" data-original-width="677" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEgKPppplAUtlwhSFh_1f-54ysq8eb9N4EVhMz9Vtf0hYY3Z1-ZYRAoe2AMdwoHgHfpa_LjiJ79TooIKaCTCjEEaeFRFwKqfaORAeTmLaZrjCh15YdUUzgShBHQi0qEtzH6166b34jCN0C8Fd9f4bulMoGy-EbXgESSsBtKktNgdjwVBcc7h5yTg3aYPYf9V" width="191" /></a></div><br /><br /></b></div><p> See 160 page document:</p><p><br />
<iframe height="480" src="https://drive.google.com/file/d/1zPYXR5zvY5Q165xtV3HJgq2WwG4gLM6u/preview" width="460">
</iframe>
</p><p>Source: <a href="https://www.policeaccountability.org.au/wp-content/uploads/2014/03/An-effective-System-for-Investigating-Complaints-Against-Police.pdf"><span style="color: #38761d;"><i>https://www.policeaccountability.org.au/wp-content/uploads/2014/03/An-effective-System-for-Investigating-Complaints-Against-Police.pdf</i></span></a></p><p><b style="color: red;">NOTE:</b></p><p><span style="color: #2b00fe;">From 2020 soon after the declaration of a global pandemic, Australia's police forces have disregarded Human Rights legislation of every state, despite there not being any lawful override of the state's Act, where if a person should seek a remedy it may be given in court or not.<br /></span></p><p><b>Australia is truly a Police State.</b><br /></p><div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-25175240808485855222024-01-26T08:34:00.012+11:002024-01-26T08:51:25.097+11:00Australia Day 1788 Empires and Imperialism<div id="cyclelinks"></div>
<p class="dropcontent"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtNTmjhmoUY-pYIJnVPoks2NNyfGj3-gYRC6y6gkYmfoEFnSaEedIbNMfzHYxmTba7rtmniCX4yhtWjb-1lUwGciQN51k3w0Wsu1j_vx2p_qGy_oI1DPtBvye79xaUkJW1TqKChk88oZopXkqTLM7QT9TzW4Bbdpz_xVyte5sv-7vVKvkN0ioaj6GVsjeK" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="597" data-original-width="926" height="206" src="https://blogger.googleusercontent.com/img/a/AVvXsEjtNTmjhmoUY-pYIJnVPoks2NNyfGj3-gYRC6y6gkYmfoEFnSaEedIbNMfzHYxmTba7rtmniCX4yhtWjb-1lUwGciQN51k3w0Wsu1j_vx2p_qGy_oI1DPtBvye79xaUkJW1TqKChk88oZopXkqTLM7QT9TzW4Bbdpz_xVyte5sv-7vVKvkN0ioaj6GVsjeK" width="320" /></a></div><i><div style="text-align: center;"><i><span style="color: #444444;">‘The Founding of Australia 1788’, an oil painting by Algernon Talmage.
<span class="attribution">Mitchell Library, State Library of New South Wales</span></span></i></div></i><p></p><p class="dropcontent">“England, in what is now Britain, wanted more land overseas where it could build new communities, known as colonies. These colonies would provide England with valuable materials, like metals, wool, sugar and tobacco, which they could also sell to other countries.”</p><p class="dropcontent">The purpose of expanding an empire is therefore to enrich and empower the empire by exploiting labour, in the extraction of natural resources to sell to other countries. In a fanciful, modern world, a reigning empire would not need to permanently occupy or colonise other countries to enrich itself, the empire would expand its power by;</p><p class="dropcontent">1. Inserting the world's most market dominate and disruptive companies within pre-existing colonies, extracting the most value from those colonies and paying the least taxes in those colonies.</p><p class="dropcontent">2. Ensuring that a colony's most valued corporations are majority owned and controlled by the empire.</p><p class="dropcontent">3. Buying companies and strategic assets in the colonies they want to extract value from.</p><p class="dropcontent">4. Funding the media in the colonies they want to influence and extract value from. Once a colony's media is influenced by the empire, the media can then propagandise the public to manufacture consent for government policies that enrich the empire.</p><p class="dropcontent">5. Fabricating propaganda to justify bombing existing colonies and toppling democratically elected leaders of those colonies. The empire would then plant empire friendly leaders and station themselves in these colonies for as long as it took, to; build military bases, extract valuable natural resources, and sell over priced military equipment and other contracts to colluding colonies. </p><p class="dropcontent"><span style="color: #2b00fe;">For an empire to succeed under these conditions it would need to rely on the following;</span></p><p class="dropcontent">1. That a colony's ruler(s), values money, public opinion and political tenure / power and therefore can be influenced by money, public opinion and positive media coverage to increase their political tenure. </p><p class="dropcontent">2. That media proprietors and shareholders value money and therefore can be influenced by it. If media proprietors can be influenced by money, political narratives can be influenced by money. </p><p class="dropcontent">3. That a society is generally predisposed to revering authorities, group-think, convenience, comfort and safety and therefore can be influenced by authorities, popular opinion, repeated narratives and political initiatives that allegedly promise more convenience, comfort and safety for the colony's inhabitants.</p><p class="dropcontent">What a crazy and fanciful idea. Who would ever believe it?</p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-58667991633688446652024-01-24T15:47:00.009+11:002024-01-24T15:52:39.070+11:00Google Data Collection policy<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQKupaQVv6FW4YLa-cbjheT1_r69gELSyFYHAyB0Ogo1Uiigdxrz6mVdmmUL8QvA5rf_6V5ixYgn-h9sdBQwdgZhuZ74n0EuSQE9VnjDrkY7I7mZijhZ6LpQqg9_ELbNZZYISyqVc09mmUcuvOsSDs2iI9PBLen15sE2SZioqdUW5WCuB__LQyiNukHrle/s1108/Google%20Data%20Collection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="823" data-original-width="1108" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQKupaQVv6FW4YLa-cbjheT1_r69gELSyFYHAyB0Ogo1Uiigdxrz6mVdmmUL8QvA5rf_6V5ixYgn-h9sdBQwdgZhuZ74n0EuSQE9VnjDrkY7I7mZijhZ6LpQqg9_ELbNZZYISyqVc09mmUcuvOsSDs2iI9PBLen15sE2SZioqdUW5WCuB__LQyiNukHrle/s320/Google%20Data%20Collection.png" width="320" /></a></div><br /><p class="dropcontent">See 55 page document:</p><p class="dropcontent"><iframe height="480" src="https://drive.google.com/file/d/1HrmtUCbkteIBCXOIIqdzuxarPO8ko37f/preview" width="460">
</iframe></p><div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-1224316054076269762024-01-21T13:49:00.002+11:002024-01-21T13:49:35.156+11:00Tobacconists distributing fake $50 notes<div id="cyclelinks"></div>
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidjsdHpgyhjXuTy1JOLW5rN31pMtCpxe4O0gRW5SJtiLdMrwAzTvgjqPHht0kvOBYGW_flQobY7Bgo83DQAiQpmDXu7Ksq6GPpWVkRMCoBUdhclXlfuyqRXgFrNU5bWMPaCHfHKsFHNfto3sdO7N_yVKutIxQuZcCA0eTnuR0ut76z_5efTFTpcmMQ-Dsi/s474/Au%20cash.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="355" data-original-width="474" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidjsdHpgyhjXuTy1JOLW5rN31pMtCpxe4O0gRW5SJtiLdMrwAzTvgjqPHht0kvOBYGW_flQobY7Bgo83DQAiQpmDXu7Ksq6GPpWVkRMCoBUdhclXlfuyqRXgFrNU5bWMPaCHfHKsFHNfto3sdO7N_yVKutIxQuZcCA0eTnuR0ut76z_5efTFTpcmMQ-Dsi/s320/Au%20cash.jpeg" width="320" /></a></div><br /><p class="dropcontent">Middle Eastern criminal syndicates that are involved in the drug trade via their network of tobacconist/’vape’ stores are also distributing a new type of product.</p><p class="dropcontent">This venture has been going on for quite some time, under the alleged watchful eyes of the police, where no action has been taken and most importantly the public has not been notified of this type of criminal activity.</p><p class="dropcontent">The criminal empire is producing fake Australian $50 notes, which are not too difficult to spot.</p><p class="dropcontent">They are double sided with a side that is plastic like glued to a discoloured version of the original legal tender.</p><p class="dropcontent">The cashier or person behind the counter of the tobacco business ‘hides’ the fake note among others, while hand over your change, where this is usually done when a $100 note is used for the purchase of goods.</p><p class="dropcontent">If you are tendered such a note, then it would be advisable to contact police as soon as possible.</p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-55859726341911360802024-01-16T11:01:00.001+11:002024-01-16T11:01:17.314+11:00Apple masters of deception, environmental vandals, makers of overpriced lacklustre products<div id="cyclelinks"></div>
<p class="dropcontent">Apple is a corporation that is against its consumers or 'customers'.</p><p class="dropcontent">It lies about privacy, and its business model is questionable to say the least.</p><p class="dropcontent"><br /></p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/VMOBTyJbu1A" width="320" youtube-src-id="VMOBTyJbu1A"></iframe></div><br /><p class="dropcontent">The so called reviewers of Apple products are either (secretly) paid handsomely, 'fan boys' of Apple, or just cheap corporate whores.</p><p class="dropcontent">See explanation:</p><p class="dropcontent"></p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/9mQzQ_ETqnU" width="320" youtube-src-id="9mQzQ_ETqnU"></iframe></div><br /> Apple's iOS is NOTHING to write home about:<p></p><p class="dropcontent">See:</p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/XwOGpc6rLFc" width="320" youtube-src-id="XwOGpc6rLFc"></iframe></div>and<div><br /></div><div><br /><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/VR0Q68SoKfs" width="320" youtube-src-id="VR0Q68SoKfs"></iframe></div><br /><p class="dropcontent">Hear how Apple lies about its (alleged) privacy, from an ex employee:</p><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" class="BLOG_video_class" height="266" src="https://www.youtube.com/embed/TgQhvrRyCZc" width="320" youtube-src-id="TgQhvrRyCZc"></iframe></div><br /><p class="dropcontent"><br /></p><p class="dropcontent"><br /></p><p class="dropcontent">For privacy and therefore security, the use of Apple products is not recommended.</p><p class="dropcontent"><br /></p><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-4834937750630610942024-01-13T09:36:00.006+11:002024-01-29T18:22:08.530+11:00Officers charged with perjury after botched intercept of army reservist<div id="cyclelinks"></div>
<p>Two detectives have been charged with perjury and perverting the
course of justice after they attempted to prosecute an army reservist
who fled a police road stop he thought was a late-night carjacking.</p><p>Victoria
Police alleged in a statement on Wednesday that the detective senior
constables made false statements about an attempted intercept in
Longwarry, south-east of Melbourne, in June 2020.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGty1TiQ88qUzjyF7YjjSUX8Odw7OmxpodAC9Iqum9vUtsNuZlPE7DpX6g9vHoDO3iLjdl9wJums_OCyX9kFXNKBBD1e29BU8R8Kbtph_o77vmWxAsXWdcFu3iFJnOoqMAn5DmM4Iei7g85-KMcB0A2H_nF_abcTqUNmjTD5RcsXsyW93ITpQ1WTqE0jd0/s740/Corrupt%20Police_0.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="493" data-original-width="740" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGty1TiQ88qUzjyF7YjjSUX8Odw7OmxpodAC9Iqum9vUtsNuZlPE7DpX6g9vHoDO3iLjdl9wJums_OCyX9kFXNKBBD1e29BU8R8Kbtph_o77vmWxAsXWdcFu3iFJnOoqMAn5DmM4Iei7g85-KMcB0A2H_nF_abcTqUNmjTD5RcsXsyW93ITpQ1WTqE0jd0/s320/Corrupt%20Police_0.webp" width="320" /></a></div><br /><div class="_1665V _2q-Vk" data-testid="body-content"><p>The charges follow inquiries from <i>The Age</i> about the conduct of the officers. Last April, <a href="https://www.theage.com.au/link/follow-20170101-p5d20e">this masthead revealed</a>
the pair were arrested over allegations they maliciously prosecuted a
man after he was charged with endangering an officer’s safety at a
regional service station.</p><p>Following questions from <em>The Age</em>
about the officers’ account that the man had driven off with a
policeman’s arm and torso still inside his car, properties connected to
the two officers were raided.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Tony, whose name has been changed for privacy reasons, <a href="https://www.theage.com.au/national/victoria/he-didn-t-know-we-were-there-army-reservist-to-sue-victoria-police-for-alleged-malicious-prosecution-20230412-p5czw1.html" rel="noopener" target="_blank">told <em>The Age</em></a>
he intended to sue the force over the incident after CCTV challenged
the officers’ stories and did not show police inside his vehicle.</p><p>Police
said a 32-year-old detective had now been charged with misconduct in
public office, attempting to pervert the course of justice and six
counts of perjury.</p><section class="_1Rw6X" data-testid="article-body-top"><div class="_1ysFk" data-testid="article-body"><div class="_1665V _2q-Vk" data-testid="body-content"><p>The
other detective, also aged 32, has been charged with three counts of
misconduct in public office, perjury and one count of attempting to
pervert the course of justice.</p><p>Tony said last year that he was
travelling along the Princes Highway between Drouin and Longwarry when
he noticed headlights approaching from behind at 3.30am.</p></div><div id="hard-reg-wall-piano-id"></div></div></section><div class="_1FVfK"></div><section class="vPaWe" data-testid="article-body-bottom"><div class="_1ysFk"><div class="_1665V _2q-Vk" data-testid="body-content"><p>As
the Drouin man pulled over near a service station, where he intended to
buy cigarettes, two senior constables out on patrol in a marked
divisional van pulled up alongside his right rear taillight.</p><p>Unaware
the headlights belonged to a police car, Tony said he locked eyes with a
man in a dark-coloured beanie before driving away, fearing he was about
to be carjacked.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNhwTeH9y0TGRE-rHErR6ZNFe2kqPgNVNFFbeZfU81uhBtJu0WSOJWzh7w5WPGJ1zQWzQwdmMWwRll4wKLUg21LmUKkxdxMqeaIw6AMfOvxvw3AGBh9SsNN_qab4PWhgtdlv0RRQiwU9CjQvLNJ5JcSFljxubxxqR3QD8-NyoIGusTiUbVtLGn85c5xQlm/s731/Tony.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="486" data-original-width="731" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNhwTeH9y0TGRE-rHErR6ZNFe2kqPgNVNFFbeZfU81uhBtJu0WSOJWzh7w5WPGJ1zQWzQwdmMWwRll4wKLUg21LmUKkxdxMqeaIw6AMfOvxvw3AGBh9SsNN_qab4PWhgtdlv0RRQiwU9CjQvLNJ5JcSFljxubxxqR3QD8-NyoIGusTiUbVtLGn85c5xQlm/s320/Tony.png" width="320" /></a></div><span class="_2Li3P">Tony*, who asked for his real name to be withheld, says he’s been shattered by the police case against him</span></div><div class="_1665V _2q-Vk" data-testid="body-content"><br /></div><div class="_1665V _2q-Vk" data-testid="body-content"><div class="_1665V _2q-Vk" data-testid="body-content"><p>After he fled,
Tony crashed into a ditch and said he walked and then hitchhiked home to
get help to recover his vehicle, but when he returned the vehicle was
gone.</p><p>The following day, Tony, aged in his 40s, called the local
police station in an attempt to track down the white 1998 B-Class
Mercedes.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Court documents show that hours later, he was arrested and charged with risking the safety of an emergency service worker.</p><div class="_1665V _2q-Vk" data-testid="body-content"><p>In their signed
statements and brief of evidence submitted to court in 2020, the two
officers alleged that as the driver of the white Mercedes pulled into
the service station, they activated their lights and sirens before one
of the officers – who was wearing a beanie at the time – jumped from
their divisional van.</p><p>The officers alleged one of them then opened
the door of the Mercedes and leant inside to remove the driver’s keys.
Tony, they alleged, then drove off with the officer’s arm and torso
still inside.</p><p>The officer signed a statement that alleged he feared for his life during the brief encounter.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>But serious discrepancies in the officers’ account emerged from service station CCTV footage.</p><p>“I
just didn’t get the door quite open,” one officer is heard saying on
CCTV captured inside the service station after the incident. “He didn’t
know we were there.”</p><div class="_1665V _2q-Vk" data-testid="body-content"><p>In his police interview seen by <i>The Age</i>,
and conducted by the two officers involved in the incident, Tony
maintained he was unaware the other vehicle was a police car and did not
see red and blue police lights flashing. He also denied hearing any
verbal commands to pull over or that the door of his Mercedes was
opened.</p><p>While the more serious charges laid against Tony were
later dropped in court, the army reservist of 20 years pleaded guilty to
careless driving and hitchhiking – which occurred soon after his
interaction with the police – and was fined $500 without conviction.</p></div><div class="_1lC_G"></div><div class="_1665V _2q-Vk" data-testid="body-content"><p>Tony
said he’d always respected law enforcement and was working alongside
police on a 24-hour roster as part of the state’s COVID-19 response when
his arrest occurred. But he said he now feared police.</p><p>Both officers will appear before court at a later date.</p></div></div></div></div></div></section></div>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0tag:blogger.com,1999:blog-4565592844090207793.post-2709061261635118502024-01-10T08:17:00.000+11:002024-01-10T08:17:27.317+11:00Apple begins paying out after claims it 'deliberately slowed down iPhones'<div id="cyclelinks"></div>
<p class="dropcontent"><i><span style="color: #800180;">Apple is a dishonest corporation, where it acts against the consumer/ their customers, and this is just one example:</span></i></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7I8r-rdUZX_WN4lldTkT1U8lG4YaIxrnxTkDJumV6eCgzcMP2jXS_UOqK0kwByQ5oxybkXwItwV0AQUa7AfHN9hHaXArhYR5GVFyztmnTlW5Qw4g0jM2zuC27Gapxln_DP2TWboJAwwI_q8QnyIHlv-eT5QGJuyhn1rYT68oMBtPScITIOoTu0Byugm8_/s384/resize.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="384" data-original-width="384" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7I8r-rdUZX_WN4lldTkT1U8lG4YaIxrnxTkDJumV6eCgzcMP2jXS_UOqK0kwByQ5oxybkXwItwV0AQUa7AfHN9hHaXArhYR5GVFyztmnTlW5Qw4g0jM2zuC27Gapxln_DP2TWboJAwwI_q8QnyIHlv-eT5QGJuyhn1rYT68oMBtPScITIOoTu0Byugm8_/s320/resize.webp" width="320" /></a></div><br /><h2 class="summary_summary__q_VAA">Apple doesn't admit wrongdoing in the $500 million lawsuit.</h2><p class="text_text__nEn66">Apple has started making payments in a class action lawsuit over claims it deliberately slowed down certain iPhones in the US.</p><p class="text_text__nEn66">X users have posted about the payments, which look to work out to around $92 (£72) per person.</p><p class="text_text__nEn66">This is all part of a $500m (£394m) settlement, after <a class="link_link__LDfG6" href="https://www.uniladtech.com/apple" rel="noopener" target="_blank">Apple</a>
admitted back in 2017 it was slowing down phone performance in older
models to avoid unexpected shutdowns related to battery fatigue.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9LrJmKIaouuQthNSqNqDUsiDl7oROQWeQ5DpK36ZMgXhRjEWlHRR_h__egLCOVtfKjZGMIfhxJlDus6EbjN2QDo0_5tMXQE4btlU9EnQmm0GjKJr8YCO5PPHvofJh4CVMW06jOFWnGzT_a_w5SsEyBYEZV110yHjx_qOtHOpHEaiU4j7LpwZ6DNZcZDCB/s1440/resize_2.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="964" data-original-width="1440" height="214" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9LrJmKIaouuQthNSqNqDUsiDl7oROQWeQ5DpK36ZMgXhRjEWlHRR_h__egLCOVtfKjZGMIfhxJlDus6EbjN2QDo0_5tMXQE4btlU9EnQmm0GjKJr8YCO5PPHvofJh4CVMW06jOFWnGzT_a_w5SsEyBYEZV110yHjx_qOtHOpHEaiU4j7LpwZ6DNZcZDCB/s320/resize_2.webp" width="320" /></a></div><br /><p class="text_text__nEn66">After admitting it was slowing down older phones, Apple started offering discounted <a class="link_link__LDfG6" href="https://www.uniladtech.com/apple/iphone/former-apple-employee-charging-iphone-235549-20231228">battery</a>
replacements at $29 (£23) - but many people claimed they had already
spent hundreds of dollars to buy new phones. Some claimants said if they
knew they could just buy new batteries, they might not have bought a
new handset.</p><p class="text_text__nEn66">Apple did not admit
wrongdoing. As part of the settlement, the company agreed to pay $310
million (£240 million) to $500 million (£400 million), including about
$93 million (£73 million) to lawyers representing consumers.</p><p class="text_text__nEn66">And it would seem like the payments have started to happen. When the settlement was announced, it was reported that affected <a class="link_link__LDfG6" href="https://www.uniladtech.com/apple/iphone/apple-two-ways-to-make-iphone-battery-last-longer-346427-20231211">iPhone</a> owners could get $25 (£20) - but it seems like that number has gone up to $92 (£72).</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpCUype_QqWTKHl8wXOrpXkK_BtxrMQIUH1exLuM58B3qiXYUco6DVi7iKjybMPkZlh02__jknR-AzPRK0gzZIoClpgO7-dd-V4hPOnu5KdDWg-FtSed-NgBoTsEiRMi-3PD5JtI4AV0JSAuLdFV_K03o2e0ORpTPY-D1HUbBZKwV947VqgCDOOYKUPfUq/s1440/resize_3.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="960" data-original-width="1440" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpCUype_QqWTKHl8wXOrpXkK_BtxrMQIUH1exLuM58B3qiXYUco6DVi7iKjybMPkZlh02__jknR-AzPRK0gzZIoClpgO7-dd-V4hPOnu5KdDWg-FtSed-NgBoTsEiRMi-3PD5JtI4AV0JSAuLdFV_K03o2e0ORpTPY-D1HUbBZKwV947VqgCDOOYKUPfUq/s320/resize_3.webp" width="320" /></a></div><br /><p class="text_text__nEn66">Consumer champion Justin Gutmann has brought
a similar case to the UK courts. He filed a claim with the Competition
Appeal Tribunal in 2022, seeking damages of approximately £768 million
for up to 25 million UK owners of a range of older <a class="link_link__LDfG6" href="https://www.uniladtech.com/apple/iphone" rel="noopener" target="_blank">iPhone</a> models.</p><p class="text_text__nEn66">The
claim alleges that Apple misled users over the incident by pushing them
to download software updates it said would improve the performance of
some devices but, in fact, slowed them down.</p><p class="text_text__nEn66">It relates to the <a class="link_link__LDfG6" href="https://www.uniladtech.com/apple/iphone/tech-expert-shares-iphone-screenshot-hack-saved-life-595841-20231227">iPhone</a> 6, 6 Plus, 6S, 6S Plus, SE, 7, 7 Plus, 8, 8 Plus and iPhone X models.</p><p class="text_text__nEn66">Gutmann
told the BBC he was pleased about the payments starting to be made in
the US, but indicated it doesn't impact the UK case.</p><p class="text_text__nEn66">"It doesn't advance our position here, they haven't admitted anything - they've settled," he told the BBC.</p><p class="text_text__nEn66">"It's a moral victory but not much use to me. I've got to plough on and pursue the case in the UK jurisdiction."</p><p class="text_text__nEn66">In
a statement, Apple said: “We have never, and would never, do anything
to intentionally shorten the life of any Apple product, or degrade the
user experience to drive customer upgrades.</p><p class="text_text__nEn66">“Our
goal has always been to create products that our customers love, and
making iPhones last as long as possible is an important part of that.”</p><p class="text_text__nEn66"><b><i><span style="color: #800180;">Source:uniladtech</span></i></b></p><p class="dropcontent"><br /></p>
<div align="right" id="cyclelinks2"></div>AuCorphttp://www.blogger.com/profile/06535580971589284510noreply@blogger.com0