Numerous Western Fiat "Governments" Pushing For New Wave of Internet Totalitarianism

The Australia's Department of Home Affairs published a statement, since deleted annoucing an agreement during a 5Eyes meeting to pursue measures "prevent illegal and illicit content from ever being uploaded"1 and this move among the 5Eyes has been comfirmed by French collaborator Macron who argued for measures rather similar to those being whispered by the Anglophone 5Eyes cartel (archived). Another since deleted memo2 originally published by the Australian Home Affairs referring to conclusions reached during the 5Eyes powwow suggests New Zealand's recent adoption of "Digital Customs Searches" is a preview of things to come for the rest of the totalitarian criminal Anglophone block.


  1. Full statement since deleted:

    This is Google's cache of https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/countering-illicit-use-online-spaces. It is a snapshot of the page as it appeared on Oct 14, 2018 05:10:38 GMT. The current page could have changed in the meantime. Learn more. Full versionText-only versionView source Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar. Home Menu Five Country Ministerial 2018 Access to evidence and encryption Countering the illicit use of online spacesCurrently selected Department of Immigration and Border Protection Ministers Contact us Report suspicious behaviour Search this site Search ​​Individuals and Travellers Businesses, Agents and Trade Professionals Australian Border Force About Us About Us Five Country Ministerial 2018 Access to evidence and encryption Countering the illicit use of online spacesCurrently selected Skip Navigation LinksHome > About Us > National security > Five Country Ministerial 2018 > Countering the illicit use of online spaces Five Country Ministerial Statement on Countering the Illicit Use of Online Spaces We, the Homeland Security, Public Safety, and Immigration Ministers of Australia, Canada, New Zealand, the United Kingdom, and the United States, stand united in our commitment to protect our citizens from child predators, terrorists, violent extremists and other illicit actors. We are as determined to counter these threats online as we are to counter them in the physical world. We note with disappointment that senior digital industry leaders did not accept our invitation to engage on critical issues regarding the illicit use of online spaces at the 2018 Five Country Ministerial meeting. Nevertheless, we reiterate our determination to work together constructively to ensure our response is commensurate to the gravity of the threat. Our citizens expect online spaces to be safe, and are gravely concerned about illegal and illicit online content, particularly the online sexual exploitation of children. We stand united in affirming that the rule of law can and must prevail online. We are committed to an open, safe and secure internet; one that provides global connectivity, better access to services, and new ways to conduct business and share news and information. But we recognise that the anonymous, instantaneous and networked nature of the online environment has magnified the threats we face, and has opened up new vectors for harm. We are determined to ensure that the technologies that have been developed to enhance prosperity and freedom are not exploited by those who seek to promote terrorism and violent extremism; prey upon and exploit our children; or spread disinformation and discord to undermine our democratic institutions. The evolution of digital technology has created new opportunities for widespread transmission of child exploitation material, and for perpetrating the most abhorrent kinds of child sexual exploitation, such as live-streaming of abuse. And it is not only in the recesses of the dark web that such material is accessible. Much is hosted on the most common top‑level domains. Moreover, the growing sophistication of mobile technology has enabled offenders to target children, including through apps that can be used to recruit and coerce children to engage in sexual activity. The low financial cost, and the anonymised nature of this criminal enterprise, is contributing to a growth in the sexual exploitation of children. We must escalate government and industry efforts to stop this. We also affirm the need to build upon efforts to counter the use of the internet by terrorists and violent extremists who continue to exploit online spaces to share materials designed to radicalise and mobilise individuals to violence. These materials are used for recruitment, facilitation, training and financing purposes, often with devastating consequences. Governments and industry have made some progress in tackling this issue. However, the task is far from complete. Terrorists and violent extremists remain able to disseminate propaganda promoting violence, and to use online platforms to radicalise and recruit. And, despite concerted efforts, a great deal of terrorist and violent extremist content remains accessible online to anyone inclined to seek it out. We therefore call upon industry to go further in proactively and innovatively addressing the illicit use of their platforms and applications at pace. In this context we welcome and support the Global Internet Forum to Counter Terrorism (GIFCT). But we urge industry leaders to champion more rapid responses, both under the auspices of the GIFCT and beyond. Digital industry must take responsibility to reduce the availability of online terrorist and violent extremist content across all platforms and applications, and to do so comprehensively. Recognizing the G7 Interior Ministers' statement on terrorism and violent extremism, we echo and amplify their call to action, and we affirm that efforts must extend to all types of illegal and illicit online content. We are also increasingly seeing the use of online spaces to spread disinformation, sow division, and undermine our democratic institutions. The proliferation of interference activities and disinformation undermines the trust of citizens in online communications and information, delegitimizing the benefits and opportunities that communications and social media platforms create. We call upon industry to meet public expectations regarding online safety by: Developing and implementing capabilities to prevent illegal and illicit content from ever being uploaded, and to execute urgent and immediate takedown where there is a failure to prevent upload. Deploying human and automated capabilities to seek out and remove legacy content. Acting on previous commitments to invest in automated capabilities and techniques (including photo DNA tools) to detect, remove and prevent re‑upload of illegal and illicit content, as well as content that violates a company's terms of service. Prioritising the protection of the user by building user safety into the design of all online platforms and services, including new technologies before they are deployed. Building upon successful hash sharing efforts to further assist in proactive removal of illicit content. Setting ambitious industry standards, and increasing assistance to smaller companies in developing and deploying illicit content counter-measures. Building and enhancing capabilities to counter foreign interference and disinformation. Preventing live streaming of child sexual abuse on all platforms. We recognise that governments also have a major role to play in addressing the spread of illicit content online. We commit to build the capacity of non-'five eyes' countries to protect and defend the most vulnerable. We undertake to enhance information flows from government to industry, and work towards overcoming barriers to cross-sectoral collaboration. We agree to ensure our enforcement capabilities, including technical data such as hashes, can be shared with industry to support the development of scalable, Artificial Intelligence-driven solutions. Through the same innovation and cross-sectoral collaboration that has underpinned so many technological advances, the challenge of countering illicit online content is not insurmountable. To focus our collective efforts, we agree to establish a senior officials group charged with monitoring industry progress on the above actions on a quarterly basis and reporting back to us. We welcome digital industry Chief Executive Officers to future meetings of the Five Country Ministerial to update us on their efforts directly. Australian Border Force (ABF) Who ​We Are A career with us Border Force officer recruit traineeship Report something suspicious​ ​About us

     

  2. Full text:

    This is Google's cache of https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption. It is a snapshot of the page as it appeared on Nov 2, 2018 21:38:38 GMT. The current page could have changed in the meantime. Learn more. Full versionText-only versionView source Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar. Home Menu Department of Immigration and Border Protection Search Skip Navigation LinksHome > About Us > National security > Five Country Ministerial 2018 > Access to evidence and encryption Statement of Principles on Access to Evidence and Encryption Preamble The Governments of the United States, the United Kingdom, Canada, Australia and New Zealand are committed to personal rights and privacy, and support the role of encryption in protecting those rights. Encryption is vital to the digital economy and a secure cyberspace, and to the protection of personal, commercial and government information. However, the increasing use and sophistication of certain encryption designs present challenges for nations in combatting serious crimes and threats to national and global security. Many of the same means of encryption that are being used to protect personal, commercial and government information are also being used by criminals, including child sex offenders, terrorists and organized crime groups to frustrate investigations and avoid detection and prosecution. Privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute. It is an established principle that appropriate government authorities should be able to seek access to otherwise private information when a court or independent authority has authorized such access based on established legal standards. The same principles have long permitted government authorities to search homes, vehicles, and personal effects with valid legal authority. The increasing gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data is a pressing international concern that requires urgent, sustained attention and informed discussion on the complexity of the issues and interests at stake. Otherwise, court decisions about legitimate access to data are increasingly rendered meaningless, threatening to undermine the systems of justice established in our democratic nations. Each of the Five Eyes jurisdictions will consider how best to implement the principles of this statement, including with the voluntary cooperation of industry partners. Any response, be it legislative or otherwise, will adhere to requirements for proper authorization and oversight, and to the traditional requirements that access to information is underpinned by warrant or other legal process. We recognize that, in giving effect to these principles, governments may have need to engage with a range of stakeholders, consistent with their domestic environment and legal frameworks. Principles The Attorneys General and Interior Ministers of the United States, the United Kingdom, Canada, Australia and New Zealand affirm the following principles in relation to encryption. 1. Mutual Responsibility Diminished access to the content of lawfully obtained data is not just an issue for Governments alone, but a mutual responsibility for all stakeholders. Providers of information and communications technology and services - carriers, device manufacturers or over-the-top service providers -– are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications. Safe and secure communities benefit citizens and the companies that operate within them. We are always willing to work with technology providers in order to meet our public safety responsibilities and ensure the ability of citizens to protect their sensitive data. Law enforcement agencies in our countries need technology providers to assist with the execution of lawful orders. Currently there are some challenges arising from the increasing use and sophistication of encryption technology in relation to which further assistance is needed. Governments should recognize that the nature of encryption is such that that there will be situations where access to information is not possible, although such situations should be rare. 2. Rule of law and due process are paramount All governments should ensure that assistance requested from providers is underpinned by the rule of law and due process protections. The principle that access by authorities to the information of private citizens occurs only pursuant to the rule of law and due process is fundamental to maintaining the values of our democratic society in all circumstances – whether in their homes, personal effects, devices, or communications. Access to information, subject to this principle, is critical to the ability of governments to protect our citizens by investigating threats and prosecuting crimes. This lawful access should always be subject to oversight by independent authorities and/or subject to judicial review. 3. Freedom of choice for lawful access solutions The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries. Governments should not favor a particular technology; instead, providers may create customized solutions, tailored to their individual system architectures that are capable of meeting lawful access requirements. Such solutions can be a constructive approach to current challenges. Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions. Australian Border Force (ABF) Who ​We Are A career with us Border Force officer recruit traineeship Report something suspicious​ ​About us

     

Media Force "Bomb" Identity On To Harmless Packages In Attempt To Foment Hysteria

In the last 48 hours a number of famous Pantsuitist party figures in the United States have had packages address to them seized in transit, with the notable exception of the first which was allegedly located in George Soros's New York mailbox at a time the noted terrorist happened to be away from "home" for an extended period. These packages are egregiously being misgendered as "bombs" by pantsuit media in spite of an apparent incapacity on the part of the packages to explode.

The Pantsuit press has begun hyping this phenomenon under the hashtag #MAGABomber and attributing the phenomenon to US President Donald Trump. This is as the Pantsuit political left in the United States has been issuing increasingly loud demands for political violence for more than two years. Purported photos of the packages being misgendered as "bombs" floating around on social media and US media organs completely lack any markings indicating they had been processed by the US postal service. This, once again, is in spite of many of them being "intercepted" in sorting facilities.

US President Donald Trump has already issued a statement from his podium calling for civility and condemning violence, a stark contrast to the Pantsuitists seeking to blame him for "the incivility" while themselves promoting violence and celebrating incivility.

It seems indisputable that the perpetrator or perpetrators behind this hoax hopes to influence the outcome of the local US midterm election which is set to provide a "Red Wave" cementing Trump's control over the legislature. It is also clear that the perpetrator(s) either intended no harm to the package recipients or is functionally retarded. In light of the scant facts, there are two very probable hypothesis for the packages being mailed:

  1. Pantsuit loyalist "law enforcement professionals" of the well documented sort that tried and failed to prevent the election of US President Donald Trump and have since tried and failed to delegitimize his presidency did it. Using the package in Soros mailbox or another pretext1 to enter postal service facilities, more harmless packages were inserted into the mail processing stream.
  2. The FBI, as they are known to do, cultivated a stupid and socially inept fellow to carry out what the fellow thought was an actual terror plot at the FBI's encouragement. In this scenario the fellow's handlers took the opportunity to use this fellow for their own political purposes. Normally they would just swoop in to claim credit for arresting they terrorist they created.

With the low amount of information available at this time, it could as well be some combination of one and two involving a left wing activist group. Or something else. Given what has happened in Britain over the past year, the biggest surprise might be that they didn't just sacrifice one of the lower ranked leftist stooges in an nerve agent hoax to revive the "Russian Bot" narrative.


  1. War on Drugs  

USG And Victims Deny Allegations Of Chinese Ownership Of Their Implanted Servers

Various "national security" agencies in the US and Airstrip One are aggressively denying reports that server motherboards assembled in China for their darlings including Amazon and Apple by way of a defense contractor, contained hardware implants allowing for Chinese ownership of the machines (archived). The language of the denials, especially on the part of the afflicted darlings, involves substantial claims and fabrications of ignorace with respect to this particular embarrassing episode. At the same time the denials on the part of the companies are sufficiently slimey to likely evade claims of fraud over the denials when weighed according to the rituals performed by empire courts at a later date.

Given their hallucinations of immunity from claims, denials by "national security" agencies are rarely bounded by such cautions. Given the weight of incentives, hedging by parties that might have problems, and the contrasting boldness by parties imagining themselves to immunity from those problems… The credibility of these denials is very low.

Jizz Mopper Josh Garza To Mop Prison Jizz For 21 Months After Pleading Out To Wire Fraud Over "Paycoin" Drama

Josh Garza of GAW miners infamy has been sentenced to 21 months in prison to be followed by 6 months of home confinement and 3 years of "supervised release" after pleading guilty to one count of wire fraud. The wire fraud relates to Garza's "paycoin" altcoin with the rest of his vaporware operation swept under the criminal liability rug.

NY Times Attempting To Meddle In Brazilian Election By Publishing Essay By Corrupt Motherfucker

Today the New York Times published an opinion piece by disgraced and imprisoned former Brazilian president Luiz Inácio Lula da Silva with the apparent intent to influence the outcome of the upcoming Brazilian election (archived). This comes after the New York Times has spent nearly two years attempting to delegitimize US President Donald Trumpś election with a social engineering campaign alleging Russian influence in the form of foreign Facebook memes affected the outcome of the 2016 US presidential election.1

In the piece Lula attempts to frame his and his party's decade and a half long kleptocratic reign as a "labor movement" and the criminal investigations that leaded him in jail and his successor impeached as a "right-wing coup".

Lula is attempting to run in the Brazilian presidential election from prison against a "Great Again" candidate despite his conviction as a corrupt motherfucker. Brazilian prosperity peaked in the 19th century under Emperor Pedro II, and lags behind the successes of its imperial age as it as been afflicted by socialists and kleptocrats of all flavors. For maximum meddling value the New York Times published the corrupt motherfucker's piece in English, Spanish, and Portuguese.


  1. Editor's note: Qntra is not particularly concerned with the pretense of legitimacy fiat sovereigns try to drape themselves with by using "democratic" electoral processes.  

Puerto Rican Election Commisions Allowing Relief Aid To Rot

Numerous reports are alleging that supplies meant to provide for Puerto Ricans in the wake of last year's devastating hurricane strike on the island are rotting at local election commision offices (archived). Intended to have been distributed, many of the perishable supplies have rotted after sitting for a year under the watch of the election commisions. Relatedly, the Puerto Rican government has conceeded this week that Hurricane casualties numbered at least 1427 despite their official tally having sat at 64 for an entire year following the Hurricane's end. "Our Democracy" strikes again.

Amazon Washington Post Sinks To New Lows Of Undisclosed Advertorial Content

A recent review of a new "feature" of the Amazon Alexa appears within the Amazon Washington Post's online magazine Slate without any disclaimer of it's advertorial nature (archived). The "feature" being hyped is named "Alexa Blueprints", and it allows users to substitute written notes for an African call and response system implemented on Amazon's surveillance device. Unlike with written notes the "voice computing" system relies on Amazon's cloud, a dependency Amazon is already abusing by censoring "hate speech" and vulgarity. You provide the system a question and an answer, then so long as they next time you try the trick pantsuit hasn't decided your question or answer is racist Amazon's altavoz negro will respond.

For the nominal price of some bezzel bucks and surrendering the sanctity of your home's audio privacy to Amazon; you too can have a creepier, lossier, and less adorable alternative to Teddy Ruxpin take the place of your notebook. This is a proposition the Jeff Bezos owned media outlet fraudulently misrepresents as

"Now [Amazon's] Alexa is fully at your command"

Provided your idea of command is someone other than you having command of the thing. If you wanted that, there are plenty of microcassette recorders around.

Pantsuit Media Mocks Reality Of Prison Sexual Violence Against Men

Pantsuit media outlets today are trivializing the reality of rape in the US prison system to win a petty political point (archived). Former Trump Attorney Jay Goldberg in a CNN interview made an accurate assessment of a major driving factor in the number of pleas produced by the Pantsuit injustice system:

I do think so. I think in many ways, and it’s difficult to say this, prison has a racial overtone. And a person like Michael doesn’t see himself walking down Broadway while people are clamoring, ‘you’re going to be my wife.’ And so he’s under pressure from his family to try to figure out what it would take to bring the government aboard as his sponsor.

For all the Pantsuit concern about imagined sexual violence, black supremacist and racially motivated sexual slavery of white and jewish men is the reality of the US prison system (archived), and it is a substantial form of inhuman leverage used by Pantsuit prosecutors pursing extrajudicial "admissions" of guilt.

US SEC, Elizabeth Holmes, And Theranos Announce "Massive Fraud"Charges And Proposed Settlement Together

The United States Securities and Exchange Commision announced it was filing charges of "Massive Fraud" against Elizabeth Holmes and her Initial Coin Offering, Theranos Labs. Curiously the press release revelaing charges also announced that a settlement has already been agreed to (archived). Also curiously absent from mainstream pantsuit coverage of the charges is the scent of corruption allowing the well connected pantsuits to escape with this sweetheart settlement:

Theranos and Holmes have agreed to settle the fraud charges levied against them.  Holmes agreed to pay a $500,000 penalty, be barred from serving as an officer or director of a public company for 10 years, return the remaining 18.9 million shares that she obtained during the fraud, and relinquish her voting control of Theranos by converting her super-majority Theranos Class B Common shares to Class A Common shares.  Due to the company’s liquidation preference, if Theranos is acquired or is otherwise liquidated, Holmes would not profit from her ownership until – assuming redemption of certain warrants – over $750 million is returned to defrauded investors and other preferred shareholders.  The settlements with Theranos and Holmes are subject to court approval.  Theranos and Holmes neither admitted nor denied the allegations in the SEC’s complaint.

Civil Unrest Continues In Charleston: Leftist Culture Warriors Move Historical Revisionism Target To University Founder Thomas Jefferson

Following last month's violence in Charlottesville, Virginia at the hands of antifa terrorists another leftist group is escalating its nuisance presence. A group of neo-Maoist cultural revolutionaries advocating for an agenda authored by a group calling itself "the Black Student Alliance" but which the neo-Moaists calling themselves "the Black Student Alliance" insist was not actually them, vandalized a statute of third United States President and University of Virginia founder Thomas Jefferson.

The unnamed neo-Maoists <sarcasm>who surely weren't the named nao-Maoists</sarcasm> covered the statue in a black shroud and placed signs alleging the dead polymath is "racist" and "rapist" [sic]. Today's president of the university founded by Jefferson, a different kind of cultural Marxist calling itself Teresa A. Sullivan offered a number of utterances which included:

I strongly disagree with the protestors’ decision to cover the Jefferson statue. I also recognize the rights of those present at the protest to express their emotions and opinions regarding the recent horrific events that occurred on our Grounds and in Charlottesville…

however, he was also a slave owner… The University1 has acknowledged its controversial history and we continue to learn from it through open dialogue and civil discourse.

The yet another kind of Marxist Law Center intent on perpetuating Southern Poverty has failed to name "the Black Student Alliance" as a hate group.


  1. Once again founded by the memorialized man in question on his initiative