Slavery or Freedom?

I saw this film ’12 Years a Slave’ the other day and was horrified by slavery and how it corrupts the slave owner and tortures the slave. In Australia the convicts were slaves and maybe this is why our nation has been selected as this experiment in Automation and Artificial Intelligence. I cried watching the film and it was a harsh reminder to me to keep working for peace, happiness and a better future for children. I see this film as where we are going if we do not awaken to the creeping totalitarianism that is embedding structures to prepare for modern day slavery.

The fact that slavery has not been abolished globally is of high concern. When one looks at the working life you are paid a wage, you decide yes/no to a job. Yet when on welfare here in Australia those unemployed were forced to ‘work for the dole’.

I visited a slavery camp in India as a clown and I saw and met slaves who had worked their whole lives, fingers worn to the bone. They had never known freedom. We clowned with them, taught them to juggle. The leader of the group got up and thanked us for creating ‘fun’ they had never experienced it in their lives.

That is the future I see. Under slavery it is lawful to use coercive control and cruelty of slaves as a ‘right’. The slave owner has a profile of emotional disconnection from their humanity believing violence is power, ownership is rights and the slave is born to serve the ‘ruling class’. The slave owner only values their people and looks upon the ‘other’ as worthless as a form of collective group think indocrinated by those in authority and justified as a economic right, racial/gender superiority and keeping the undesirables under control. They use contracts to validate their right to ownership and they can do what they want with their property. Women may go back to the era of ‘chattels’ where when a woman married she became the chattle of the man. We still today see in India, Pakistan, Afghanistan, Arab states the dowry or sense of chattle with women being arranged in marriages and outside of that marriage they become barren. Many women have felt slavery as they slaved for families and worked full time, particularly in situations without the man working alongside. We may identify with this in the workplace when we ‘work to live’ as it becomes an endless enslavement to bills rather than working towards our own dreams. So everyone can identify with the feeling of enslavement. Imagine it becomes a whole life where our country is owned by financiers and debt is how assets are aquired in contrived conditions of ‘not enough’ or planned austerity.

The announcement yesterday 18/9/2025 of climate targets of reducing CO2 by 60-70%. https://www.abc.net.au/news/2025-09-18/climate-targets-australia-2035-on-path-to-net-zero/105719910

Australia’s wealth is based on coal and commodities which means the nation will be driven into austerity due to global agreements. It will have massive impacts on every aspect of our lives as ‘working to live’ will become very difficult as wages are not increased to keep track of inflated prices due to climate targets. We will see a massive move of the middle class into poverty, where I live. Most people work as they fear unemployment, powerlessness and judgement of their status. In my experience we learn to not take anything for granted, gratitude becomes the mantra and we help each other as forefathers and mothers did in times of hardship. It may well bring out the best in us or the worst in us depending on how we choose to see ourselves and lives. It can create the conditions for slavery as people will ‘work/volunteer for the dole’ as they get primed to work for free. That is how the mindset of slavery is slowly embedded. I choose not to be part of the welfare system even though I would be positioned as the poorest of the poor, I feel abundant and self determining letting life determine how I move or don’t move, not some faceless face in another country determining policies I didn’t vote for.

As for the slave owners or property owners who become accustomed to obedience without question, they too are primed to believe they are entitled to control others via wages and then to keep them active. Some come from abusive harsh backgrounds where the ideology may well be based on learning that some are bred for leadership, some are bred to be enslaved. They may experience childhoods of indifference/abuse/violence/mind control and to believe that people are commodities to be traded and dehumanised minimising their individual talent, feelings, hopes and desires, as you grow up you become insensitive to other humans who are ‘othered’ as ‘less’. This is how inequality becomes embedded in notions of the right to rule, bloodlines and privilege where they have never had to work hard to get ahead, nothing was given it was all hard work (earned).

I’ve met many in this detached category some were commanders in Pol Pot’s Cambodia, others were security or military who displayed no emotion but followed orders even if that meant harming the people. People become identified with their role over and above their humanity and they do not bend even if their conscience does twinge, they hold the line of authority. Self knowledge, emotional intelligence and awareness of the needs of others can be a feature of our awareness and self development where we intuitively understand how people feel. Others may have suppressed their feelings, played the game, remained ignorant or in their mistaken belief that professionalism is detachment and that the end goal of profit is all that matters. For those with influence, courts can be paid off rather than sites to ensure accountability is learned, if parents fail. When we prize indifference as ‘power’ and lose our sensitivity our social fabric breaks down. This is how we create lawlessness and why abuses rise (pain projected) as those inflicting this have not dealt with their own childhood abuse and were not role modelled to ‘know thyself and be true’ but instead trained their kids that power is no emotion as they reward detachment, aggressive behaviour, violence as normalised to ensure we care nothing for someone crying but instead view them as weak. Women have had to deal with this projection for a long time rather than an understanding that it is ‘feeling’ to cry. When I taught peace, nonviolence and anti-bullying to children I explained to them the tear ducts were there to release tears as we feel pain, it was not weakness it was natural. I taught children to discuss what it feels like to be in the ‘inside group or the outside group’ how exclusion feels and the ways we can include others. I taught values as REAL HOPES – Responsibility, Empathy Awareness, Love, Honesty, Oneness, Pace, Enjoyment and Service. I used the ‘clown’ to model happiness, laughter, acceptance and no wrong anwers as we walked through bullying and false power structures to remember the true value of each other.

My REAL HOPES program was a first in the world. I had little boys having realisation that power is not ‘power over’ but ‘power within’. I shared Gandhi’s example with them. I went to Gandhi’s ashram and learned of Satyagraha and Ahimsa (love and nonviolence). I met elderly men who knew Gandhi and started to cry as they realised his true power was humility not control. Nonviolence is our true nature. The real freedom all are seeking under the guise of control, is to ‘know thyself’ in reality. My program is below see heading ‘Antibullying’.

Bullying, abuse and detachment disconnect people and lead to anti-social behaviours which become in the extreme anti-human, disconnecting the very important social fabric (security) rendering the victim suffering for years or suicidal from the abuse they experienced. If this is encouraged by those in governance it becomes a backward step into regressive dark times by those who have not grown and are fearful of what they cannot control.

The film ’12 Years a Slave’ below will provide an insight into the enslavement dynamic of the slave owner to his or her own weaknesses where no social ethic or values restrain anti-social behaviour. It reveals the victim trapped as a “commodity” or “object” owned and how cruelty without penalty validated by ‘ownership’ deepens the perceived right to enslaving others. It opens questions to government policy advancing commercial interests promoted by indifferent business models becoming the national interest via GDP (GNP) as security rather than social happiness.

As a former market analyst I can see today the flaws in the business model designed to drive costs to a minimum in order to maximise profit. Labour is a cost of production not a person earning money to survive and live their life. Cost of production concepts turns humans working to make a living into a cost to business which takes something away from them on a subtle psychological level. It would not for most, be consciously thought about, but for some the addiction to ‘more profit’ is rewarded as economic growth yet working against ecological sustainability. In the current climate climate modelling is blamed on consumption (public) not production (owners of capital, producers). This economic rationale conceptualises inputs and outputs, inventory costs, market segmentation, costs of production, prices and revenue and the reward (value) of net profit. Size in the current paradigm is multinational coporate (MNC) power where the market supply chain is purchased to achieve economies of scale internally to a MNC. Some multinationals have the revenue base larger than countries. Others source or supply componentry which straddles many nations. They control not only suppliers but markets in order to fix price and reduce competition. Finance led business dynamics marked a significant and seizmic shift since 911 from free market economics to finance backed trade (financing areas of interest, boards, mergers & acquistions). The financiers become key players in the New World Order that is arising and this is not about minimisation of price it is about maximisation of profit (higher prices) and digitisation (data) which becomes a very important tool for market/consumer/political/business intelligence and real time decision making.

Thus, the business/economic concept of growth indoctrinates the idea of self interest over best interest or the sum of the parts working against the whole (nature) yet at the same time marketing ONE as ‘oneness’, ‘inclusive capitalism’, ‘the party’, and ‘unity’ where all comply. The philosophy works against true unity as it is ‘forced’. As large corporations have acquired market power and political power we see their ambitions being rolled out in government policy as governments and regulators are captured. There is no vote on the Brave New World technologies but rather imposed upon people as is the modus operandi of control. This takeover is done without a shot being fired as if the same plan lifted out of the Silent Weapons for Quiet Wars doctrine by the Bilderberg Group in 1954.

We are witnessing the rights of business people as owners controlling public assets and services through selective contracting. Large contract prices to the tune of millions, billions and trillions are agreed to which has implications for public treasury’s. The more power via public-private contracting MNC acquire the more they acquire valid influence via contracts ie. consultancy. This then moves into policy making areas as they influence via lobbying politicians and then promise investment leads to higher employment. Governments that comply are rewarded by availability of finance or bonds purchased by financiers who ensure stability and reward them for loyalty. The public sector moves out of the control of bureaucrats and increasingly public goods and services are run via public-private partnership agreements (PPPs) and transferring public assets into privately controlled entities by virtue of Australian Business Numbers (ABNs). The public are silently excised from ‘sovereignty’ as their voice is no longer heard or responded to in any meaningful way, responses cast off by remote call centres that transform into Artitificial Intelligence removing the ‘human’ from service. The running of public and private lives increasingly becomes a business transaction as the public become commoditised and valued on the basis of ‘earning capacity’. This becomes more apparent due to the 2009 listing of The Commonwealth of Australia on the US Securities Exchange Commission. This was signed off by Treasury official Dr Ken Henry who signed away a Constitutional government with the stroke of a pen into a US corporation recognised by a foreign Securities Exchange Commission enabling ‘foreign third parties’ to finance and become stakeholders of a country as distinct from a typical corporate entity. This has massive ramifications for the sovereignty of “the people” who become assets on a balance sheet. Their birth certificates replace live birth evidence and CAPITALISATION of lettering on documents turns English into hieroglyphics (pictures) turning each person via licencing/birth certificates into business entities to legalise trading which is experienced as ‘users pay’ rather than consolidated revenue from the Treasury. This is how a country is taken over by largely US financiers as they are the agents for this New World Order (planned for 200 years). The Commonwealth forms and documents provided below reveal form 18K and report data showcasing the continent of Australia (great southern land) which has never been formally named and its assets, updated on a yearly basis for the SEC a foreign private entity.

https://www.sec.gov/Archives/edgar/data/805157/000134100410001324/0001341004-10-001324-index.htm

This arose out of 2008 financial crisis which was contrived by financiers. This opened the way for China to become a globally influential voice and member of the World Trade Organisation in its bid for total control. Our own leaders like Julia Gillard spruked the ‘Asian century’, Kevin Rudd spoke Mandarin and Victorian Premier Daniel Andrews believed this was the future as Chinese 26 planes flew into Melbourne at the start of lockdown as part of the One Belt One Road deal unlawfully signed.

What this silent takeover means is that the public identified as the real “sovereign” as verified by the document ‘Australia Revealed’:

“The preamble of this Act proclaims the Commonwealth to be “under the Crown of the United Kingdom of Great Britain and Ireland”. This legal entity ceased to exist as at 15th January 1922 when the Anglo-Irish Treaty was ratified. The Attorney-General of Eire states “The United Kingdom was unable to change the preamble because the Commonwealth of Australia was already acknowledged internationally as an independent sovereign nation”. The ratification of the Treaty of Versailles by the parliament of the Commonwealth of Australia is recognised under international law as
the date of
Australia’s independence (Hansard of the Commonwealth of Australia 10th September 1919 – 1st October 1919)...”

The alleged purpose for the listing of the Commonwealth of Australia included Debt securitisation whereby to ensure business viability the framework for operating a country ensured debt servicing when it has the second largest wealth base (resources) in the world. Australia is a very wealthy nation begging the question of why debt needed to be secured by privatisation as distinct from resource wealth? The Federal and State Governments came under corporatisation and were able to make economic purchases and enter deals, acquire finance under this corporate redefinition of the nation state. This brings in financial actors who then have a say over how the country is shape changed into their image under this ideology of a New World Order using a digital Technocracy as the template to transfer control, access data as intelligence and garner power over the organs of government and the people as a ‘asset’.

For those not valued as an asset ie. the unemploy or pensioners they only became viable if they enter business contracts using digital ID (drivers licences, birth certificates CAPITALS or debased latin) with the contracted service provider (large corporate players) via agreements access government consolidated revenue (Treasury finance). The selected service provider learns how to deliver public services and gathers data/intelligence on the operations of government as step by step they takeover functions. The Department of Finance is a lead advisor to the government.

The public revenue is to be used for public goods and services such as government services, transport, infrastructure, defence, welfare, emergency services, police, immigration and many others. This public ‘need’ is replaced by private ‘greed’ and the real needs of the public are provided by a corporatised “service provider” (many with foreign financiers on the boards) who use public monies and record on ‘balance sheets’ to offer services. As was found with the replacement of Commonwealth Employment Services (CES) and Social Security with Job providers there was significant rorting but not abandonment of this type of public-private partnership arrangement, as it was paving the way for full privatisation of the government using what they call social impact investment. This disconnected the citizen who became a ‘user’ or ‘customer’ in a business model and without informed consent excised them from the Australian Constitution. This meant that as privatisation commenced traditional representative government by the people (westminster system, vote) was replaced.

Under the US Securities Exchange Commission the goverment is now a privatised US corporate entity with financial stakeholders (ie. cayman islands) who advise and direct policy to ensure all nations are on the same page and cooperating with SEC frameworks rather than national policy frameworks under the Constitution. Entities like inclusive capitalism worked collaboratively with other corporate entities as they took over essential services, we see the same happening at the local goverment level. Local government is not in the Australian Constitution, which makes them a body corporate that does not have powers to raise taxes or rates. Those engaged with Councils see many property developers and business entities having influence in respect of land use and policy decisions removed from the real public needs. Those needs are confined to road works, users pay public amenities, the selling off of caravan parks, rezoning land use and so on.

As private entities take over and turn free services into users pay, we start to witness a larger divide occurring where not everyone can access an essential public service like housing, electricity, water, food, education, hospitals due to working to live and finding basic needs hard to cover. We see then large MNC Insurers enter the market in a US style system of capitalism winding back the welfare state. Insurance is another market that expands as people have to get insurance to afford basic services that were provided free under taxation. So this private business structure causes more austerity and the top-down hierarchical no questions type leadership becomes the template for corporate governance.

Note: Even on this DELL computer I notice ENG which means English so ENG United Kingdom (United Kingdom) and ENG Australia (US) this programs Australia as the US. US is not the United States of America it is the UNITED STATES registered in Washington D.C. So we come under the US city state legal system not Australia as the crown was disbanded in 1922 and under Whitlam 1973 (Royal Styles and Titles Act), Unidroit Treaty (1973). The public were never informed that the removal of sovereignty meant they became commodities losing the sovereignty King George granted under this current system. The weakness here is that the new system is illegal and enslaving a nation is a war crime.

The concept of slavery is really about not paying workers but owning them. That is why unemployment as welfare turned into ‘joblessness’ (less secure) bringing competition in (as it did for rent and mortgage auctions) to maximise profit. It is a future that moves towards massive unemployment due to replacement of human workers for Artificial Intelligence and Automation as the technology has advanced to the point where it can now replace workers. Lulling the population into using AI and automation has been done within both a business model and labour saving models to make it fun to ask Siri to get you a name or search for something, so you can experience power like having a servant. It is very subtle, very clever and has been very effective as people are trained to use technology to improve their lives so that there is little resistance when the end goal is their enslavement.

We see more and more people going into the welfare system using lucrative NDIS (disability) and including mental health as a disease (which it is not). Young people increasingly believing they have a mental health issue so they do not solve their problems. It is to normalise mental health and to place it in a category of disease which comes under the Biosecurity Act and can be locked down in the next pandemic.

Public-private partnerships or privatisation of public services become controlled by private actors not acting on behalf of the public but using this large pool to data gather, identify assets, and force them to learn to comply without question. This is how we are primed.

I wrote a report in 2016 which I submitted to Centrelink called ‘Democracy or Compliance’. It outlines the reality at the time and my own observation of this Brave New World arising. I refused to Work for he Dole as modern day slavery. I had visited a slave camp and new the reality of slavery for those enslaved. I said no to this.

https://www.academia.edu/130398231/Susan_Carew_Holmes_Examines_the_Accuracy_of_AI_Review_of_Compliance_or_Democracy_Report

I had a dispute with a large institution over sexual harassment and a request for mediation to a dispute. This was refused for many years. I understand well psychological abuse and how it affects the desire to live on. When people are principled they can find themselves ‘trapped’ or enslaved in systems that provide no ‘no’ or ‘solution’ to a problem. When leadership is about control and has no empathy for others or views any challenge as a ‘threat’ under risk management we end up in conflicts with no exit. This happened to me and it took me a long time to understand the narcissistic personality disorder issue behind it and foreign players who ‘do as thou wilt’ with no backward glance. Centrelink (Australian welfare) were aware of the problem offering disability. I said no to this as I wasn’t disabled, it was actually the other party in my view. I acted normally. However, I live in integrity and can’t agree to anything I know is untrue. I found out through research that disability is being reclassified as ‘disease’ again another issue under the Biosecurity Act. When I said no to this, I was cut off Centrelink. This was 8 years ago and I have been without income ever since learning to survive in integrity and not expecting anyone to save me. To my amazement life has a habit of providing for your needs just when you need it and I discovered I did not need the welfare state. If I was prepared to just go with flow, live without things and meet basic needs (free food) I was able to hold my own line in equality and integrity without my hand out. This is how I opted out of slavery. My report will explain the details.

Therefore, in this totalitarian ideology if you do not become part of ‘value creation’ as a contracted part of the system you become a useless eater and this becomes dangerous for those who say ‘no’ to systems of inequality, repression and control that remove democratic rights and basic human rights. This is how we become expendible and we are removed as if irrelevant via structural violence – rising prices, rising rents, isolation, no dispute resolution, no access to the courts, no recognition in a corporate system that is like a shadow over the real government.

Slavery has value as you own your slave, the slave learns through pain to not say ‘no’ but to please the slave owner to stave off punishment. The slave owners today believe this is ‘peace’ as they can’t navigate the complexity of human psychology or behaviour. They have to monitorise life to control it to make sure they get their need for power met, which is indeed a trained addiction that more augments the ego as they are more. Less means they have failed or are deficient or vulnerable. These are subtle drivers of power.

Slave owning models are similar to totalitarianism where those born into these systems have never known their own voice, group think moved them to ‘tow the party line’ as they obey and there is no jury system or public opinion to guide common sense and to stop abuses by those in power. These are critical issues in our time.

FOR THE RECORD:

I, Susan Carew-Holmes do not consent to modern day slavery.

I can see via digitisation we are being digitised, commoditised, corporatised using access as forced consent to embed enslavement to a technocracy that decides access or no access. There is no real wealth in a digital reality. The real wealth is in the real world making up part of our economic activity. The real wealth of the nation is in its people and in the pursuit of happiness as the founding fathers of the United States realised. The enemy is perceived as those believing in ‘freedom’s’ as ‘human rights’ becomes demonised and a risk to cyber freedoms where there is no ‘no’.

It is unbelievable horrifying to awaken to this Orwellian reality as real. My mother’s voice comes in here as she saw it.’ My mum

https://www.bitchute.com/video/cdCJSFdca43p

Her channel if the above doesn’t open: https://www.bitchute.com/channel/edAO8YRIlQPr

Mum mentions slavery in her talk and she herself read 1984. Her disclosure was about a doctor telling her ‘they will all be dead in 3 years’. That was 3 years ago. She went into hospital with a ulcer under her foot, it was immediately amplified and she was dead within 6 months. She was given execution drugs. I believe she was removed as she would put it because she spoke up in freedom. I could be wrong, but her case needs an investigation as she said no to end of life drugs and was administered. It turned out the hospital and nursing home were both privatised and consulting with each other. She could have been saved but those choices were not made by medical staff. Her other video is worth watching between her hospital stay and before entering the nursing home.

The Untold Story of What is Happening in the Australian Hospital System https://www.bitchute.com/video/AthtTvI460GG

Mum used her democratic right to say no to slavery. I believe she was targeted. However, I know my mum didn’t regret her message and bravely endured her decline. She never gave up or gave in to those who wanted my mother to comply. She spoke her truth to them and where she felt ‘yes’ was fair she would agree. However, what we both saw was in the compliance reality people are being forced to say ‘yes’ which is the basis of no rights and leads us to a form of enslavement.

It is in the public interest to investigate modern slavery embedded in multinational companies mission statement. A quick search for ‘modern slavery contracts’ revealed the Australian Government has a register.

To my surprise the Attorney Generals Department has a register. The word ‘registration’ I find concerning these days as slaves were registered.

https://modernslaveryregister.gov.au/

I searched for MIcrosoft as a test.

Modern slavery statement submission process updated

The process for submitting modern slavery statements to the Modern Slavery Statements Register has recently been updated. These changes are designed to help entities submit their statements correctly and reduce common submission errors. To learn more, read the MSS Submission Overview. You can access it via the More information link below or in the Resources section. If you need help or have any questions, please contact us through the Contact us page.
More information

The publication of modern slavery statements (statements) on this Register does not indicate compliance with the requirements of the Modern Slavery Act 2018 (the Act). Pursuant to section 19(2) of the Act, the Attorney-General’s Department publishes all statements properly submitted to this Register, including compliant and non-compliant statements, in order to maximise transparency and ensure entities are publicly accountable for their actions to address modern slavery risks. Statements that fail to meet the requirements for approval and signature set out in sections 13(2) or 14(2) of the Act will not be registered.

Blackrock, the new owner of the World Economic Forum was next. WEF is driving this technocracy which many academics are citing is slavery.

Film: 12 years a Slave (True Story)

This is the film that inspired this blog that has been on my mind for many days now, I feel inspired to post it in the public interest before we lose all say over our lives. In truth we are all equal and sovereign by virtue of being born onto this earth. Every person deserves to be respected and we collectively lose when a person’s energy is in service to labour not their highest potential. My vision is a renewable earth where each person lives to their highest expression.

Background on the film: https://en.wikipedia.org/wiki/12_Years_a_Slave_(film)

https://www.stan.com.au/watch/12-years-a-slave-2013

The Social Dilemma is in the public interest. There is a scene in there where a man is seeking to free children of pedophlia, the image is of the police handcuffing the one releasing the children not the perpetrator. This is what a Brave New World will look like, those who are upholding the public interest will become criminalised and those who are enslaving others to meet their needs ‘do as thou wilt’ (without love) will be protected. If this is not to happen then we have to question slavery and why we still see it in mission statements and then choose the future we all want, including those enslaved to these concepts.

Academia.com: A Discussion of Consent and No Consent about the Privacy Statement

Discussion:

Looking over this Privacy statement very few if any will read it nor will they full understand “informed consent” about what they are ticking a box to say ‘yes’ as agreement (contract). As I go through this I see themselves give themselves permission to gather and sell my data not strictly for administrative purposes but is in fact full of leaks to other third party actors who I do not know or have any idea aobut what they will do with the data. Given I have witten 14 Covid-19 reports, social contract, essays, reports in the public interest, I become a ‘person of interest’ to those who disagree with the research. I become perceived as a ‘threat’ by those who are driven by business interests and profit motives that end up undermining human rights, the public interest, freedom of speech. This then becomes a battle ground and has governments push for us all to be online it then silences those who have something meaningful to say, without profit motive, and we see our world sink into this Orwellian Brave New World (1984) that is being discussed globally. For me it is about being a human versus transhuman and a disconnecting to what is natural as a insensitive world order forces us to comply rather than asking us what we want. As a former market analyst who collected data, by law I had to disidentify data, I was diligent in how I recorded data and honouring of those voices I sought to capture to make sure they were heard by business clients who want to profit from markets or services. I used to spend a lot of time typing up each word (no automation in those days), I had to deeply listen to the voices, truncate truths using language as people are not always articulate in language about what they feel or think or are busy. In this environment it is a marketing boon for those who can automate everything and take data as they want forcing these terms and conditions as they operate outside the nation state and domestic laws that may well hold them to account. It becomes the ‘wild west [north, south, east as well] as techies, mostly men, create these services with little understanding of the real world impacts as feedback is not necessarily welcome if it affects profits. For me I have already been incorrectly profiled by actors with agenda’s and I can see these ‘negative’ actors can get hold or data and make peoples lives difficult. I was on a friends phone yesterday (optus) and they prevented me from access my website and emails, this was targeting. They gathered my research data as I feel social responsibility and investigate corruption. For those engaged in it anyone can be easily profiled. In the academic space, companies like Academia.edu can platform academic papers and identify those who may well be investigating the technocracy which is being labelled a ‘omniwar’ by one academic in UK where technology is not passive but actively data gathering in order to control global populations and enslave them. It is very concerning, particularly when we know pedophilia is happening at the highest levels. We become aware that government actors have moved into the private sector to profit from public services. We see our public assets sold off without any referendum. So much evidence of corruption it is mind blowing. Ethics becomes a word not a lived experience based on ‘what I do to another returns to the self’. Always life sends back to you the harm you cause but many do not understand that the social fabric has evolved over millions of years and community becomes security and mental health rather than endless isolation in mind control spaces that try to shape change people rather than allow them to evolve, naturally to improve upon what has come before. Today it appears we are regressing in a UNIDROIT private contract based world order.

The concept of a business contract most of the public, including young people and elderly, have no idea about. It brings up the ‘living breathing man or woman’ as distinct from a cyber entity, avatar as a digital ID giving permission to global actors to charge for services without a lot of choice, as terms and conditions lock you into contracts you are not fully informed about. I am no longer a business entity so does that mean I will be locked out of Academia.edu because I want to protect my privacy on the one hand and publish reports that are in the public interest (common good)? It comes down to a difference of corporate ownership versus open source and the ‘commons’. It is not a fair or balanced contract as you have to tick the box to access. I am forced to tick the box I do not consent to the detail but I need my reports to be in the public arena as they are vital for the public interest (safety). So that is my social dilemma I do not want to tick but am coerced to do it, it is then not my choice but a forced choice. That undermines democratic principles.

Australian Privacy Doesn’t Apply to Foreign Tech Companies

In Australia the Privacy Act 1988 as interpreted by the Office of the Australian Information Commission is outlined but again this is under Australia Law not USA or other countries, as follows:

This resource aims to assist entities bound by the Privacy Act 1988 to understand and apply the definition of ‘personal information’ in section 6(1) of the Act. This resource should be read together with the Australian Privacy Principle (APP) guidelines.[1]The concept of ‘personal information’ is broad, and in most cases, whether or not information is personal information will be a straightforward question. However, in some cases it may not be as clear, and the answer will depend on the context and circumstances. Where there is uncertainty, the Office of the Australian Information Commissioner (OAIC) encourages entities to err on the side of caution by treating the information as personal information, and handle it in accordance with the Australian Privacy Principles (APPs). This guidance aims to take you through the factors that you may wish to consider when determining whether information is personal information. The examples are provided for illustrative purposes only. The Privacy Act defines ‘personal information’ as: ’Information or an opinion about an identified individual, or an individual who is reasonably identifiable:

  1. whether the information or opinion is true or not; and
  2. whether the information or opinion is recorded in a material form or not.’

For more OAIC information go to: https://www.oaic.gov.au/privacy/privacy-guidance-for-organisations-and-government-agencies/handling-personal-information/what-is-personal-information

So clearly Academia.edu is based in California, not Melbourne, they will not be held accountable under Australian laws as they are US citizens. Is this why the New World Order/Global Reset wants to remove nation states? So terms and conditions become lip service from a human rights point of view. The tech reality trains programmers to ‘take’ what they want and they learn to not respect the so-called ‘user’ as there is no accountability in the cyber environment as they are in a lawless environment. There is no perception or connection with the human at the other end. We become dehumanised online and valued according to what we pay. This is a monetorised environment and social harms can be ignored. All techies can see is the money not the real people utilising (not users) services. This completely changes privacy in a no rules international order.

Remember, information is power and people can be profiled and set up very easily if they communicate in ways that are not approved by tech giants. They can be deplatformed, they can be discredited, they can be falsely fact checked or their sites inhibited so people can’t access. This is a controlled space. This is due to unacknowledged fears of the ‘other side’ of the discussion and a refusal to take responsibility for human impacts. I am saying this in a general sense the technology lends itself to dehumanisation and there are no personal relationships with the tech companies, no shopfront, no customer service with people you get to know. We become commoditised and our data owned by others, this is how you become disempowered under the reality of ‘no access’. So I write this to claim my own empowerment and ‘voice’ as no-one in this cyber world will give it to me as basic respect, honouring my right to be me. Most will just exclude those who make adverse noise. However under universal lores we all do have to confront at some point the damage we do through our ignorance or lakc of care.

For myself I have questions and will just include what I consent to and what I don’t imagining I had been given a real say and a choice (respect). It applies to academia.edu and other platforms equally, as follows:

  1. I have no problem with data being collected if it is critical to run a service and based on common sense to provide a fair service. I do have a problem with data gathering in order to profile in this New World Order Global Reset as this is using data to enslave the public not serve them.
  2. I do not consent to compliance but choice as democracy is the closest system at this time to our true nature which always requires ‘yes or no’.
  3. I do not consent to privatisation of open source world wide web as we can never know who is owning the IT platform/entity at any given time. Mergers & Acquisitions means that a platform can be bought up and then data is transferred to those we don’t know who may have agenda’s.
  4. If my privacy is breached how do you hold tech platforms accountable given they are based in foreign countries?
  5. Terms and Conditions force ‘yes’ even if you don’t agree. Any form of forced access to me is not democratic. In other words I should be able to tick a box to say yes or no to issues in the policy without losing access to my reports online.
  6. I definitely do not consent to Authenticating software and verifying individual identities. I prefer to be deidentified. This can be used to gather data and profile by actors who may not value freedom of speech or democracy turning these fundamental freedoms into ‘bads’ in a control paradigm that has lost connection with public needs.
  7. I do not consent data being collected for tax purposes, particularly when foreign.
  8. I did not consent to registering knowingly with Academia.edu, I just signed in to get an account so I could uploads my reports in the public interest. The tech environment became all about creating accounts for free and this is why people used them.
  9. I do not consent to being ‘the product’ as Silicon Valley insiders stated in the Social Dilemma. Nor did I consent to AI profiling me etc. refer https://www.youtube.com/watch?v=rvg0eY_Ls4Y
  10. I did not consent or know I was a member.
  11. I do not consent to my personal data being gathered.
  12. I do not consent to data retention.
  13. I do not consent to others accessing my data.
  14. I do not consent to data gathering ie. preferences and to identify who are the ‘third parties’, as follows: ” Cookies, Pixel Tags/Web Beacons, and Other Technologies. We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (“Technologies”) to automatically collect information through your use of our Services. ”
    Cookies. Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience.
    P
    ixel Tags/Web Beacons. A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded.
    Other Technologies:
    Operationally Necessary. This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality;
    Performance-Related. We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services (see Analytics below);
    Functionality-Related. We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed;
    Advertising- or Targeting-Related. We may use first party or third-party Technologies to deliver content, including ads relevant to your interests, on our Services or on third-party websites.
  15. No consent to using vague terms like ‘irregular’ then ‘fraud’. Irregular is not explained and can become data gathering.
  16. No consent to cookies identifying my preferences as profiling.
  17. No consent to embedded code (Pixel tags/web beacons) recording particular web pages as I want this to be private. Nor do I consent to web beacons in emails identifying if the message is opened, acted on or forwarded as data gathering and profiling.
  18. No consent to ‘identified’ data gathering on indivduals use, must all be disidentified when performance related.
  19. What are First party or third party technologies needs to be explained, I prefer a tick box ‘no advertising’ as we are bombarded and adverts are placed as mentions (see Social Dilemma) before us at moments of highest interest. Great for sales but manipulative to the customer who quickly buys, no cooling off period. Online is very exploitable of people for profit not public interest.
  20. I do not consent to AI and/or automated data gathering “We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider….” No way do I agree to location identification as a woman, that is stalking.
  21. I do not consent to data gathering of personal CV collected under job applications unless it is Academia directly employing: ” We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications…”
  22. I do not consent to expanded data gathering as this can lead to profiling: ” we may collect information that other people provide about you when they use our Services, including information about you when they tag you.”
  23. I do not consent to social media platforms gathering data and can’t receive ‘informed consent’ of other companies, it is too complex: “… Social Media Platforms. Our Services may contain social media buttons such as Google and LinkedIn that might include widgets such as the “share this” button or other interactive mini programs. These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it…”
  24. I do not consent to data gathering from other sources, third parties, social networking and accessing privacy settings (on my computer), this is so intrusive with no regulatory oversight: “We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service, or a social networking site, we may collect information about you from that third-party application that you have made available via your privacy settings…”
  25. I do not consent to personal information collected for surveys. As a former analyst we had to DISIDENTIFY personal data. In the current time this has been ignored as data is referred to as the new gold (profits incentivising the collection of data which can put people at risk, particularly when giving opinions)
  26. I do not consent to personal information collection including my name, voice, signature, photograph, likeness, city, institution and my personal interests nor to inform other users as to my activity or what I cite and given there is no adherence to Australian law: “We may use personal information (including, but not limited to, your name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, and areas of interest) to tailor and provide you with content and advertisements. We may also use your personal information (including, but not limited to, your name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, and areas of interest) to inform other Academia users of your activity in connection with our Services, including when you mention or cite another Academia user in a publication. We may provide you with these materials as permitted by applicable law…”
  27. I do not consent to data gathering for Career Fairs, Conferences, Trade Shows, and Other Events if this is not organised/programmed by Academia.edu.
  28. I do not consent to my personal information shared with individuals and third parties to assess and pursue potential business opportunities or for other reasons.
  29. I do not consent to my name in Academia search engines being inhibited (blocked) or others search access being blocked in searches for my account (as has happened – it appeared as few to zero visits)
  30. I do not consent to money being made on online as it turns what was once open source into paid business which changes the focus from true “sharing” as a public resource we can all learn from to controlled access and profiting to maximise profit. The business paradigm always moves to restrictions and ‘users pay’ ultimately turning the online environment into data seeling and buying to maximise ‘self interest’ not ‘shared interest’.
  31. I would need to be informed about what is done with the data collected. Academia states: “We and others who use our Services may collect personal information that you submit or make available through our interactive features…”
  32. No consent to transferring my data to other places, this can hide information or store it (see Iron Mountain – Silent Weapons for Quiet Wars). I am not confident anyone is safeguarding my information based on the emerging Brave New World being erected around us, including the techies themselves who have no idea of slavery and what it really means.
    “All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We endeavor to safeguard your information consistent with the requirements of applicable laws.”
  33. I do not consent to my data sold as a commodity to financiers or owners or providers as a transaction permitted by foreign laws, no way. “If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract…”

Privacy Policy

Last Updated: September 16, 2025

Academia.edu (“Academia”) provides a searchable repository to allow our users to search and share academic resources. This Privacy Policy is designed to help you understand how we collect, use, and share your personal information and to help you understand and exercise your privacy rights. Academia is the controller for the personal information we process, unless otherwise stated. For information on how to contact us, please refer to Section 13 below.

1. Scope

2. Personal Information We Collect

3. How We Use Your Information

4. How We Disclose Your Information

5. Your Privacy Choices and Rights

6. Security of Your Information

7. International Data Transfers

8. Retention of Personal Information

9. Supplemental Notice for California Residents

10. Supplemental Notice for Nevada Residents

11. Children’s Information

12. Other Provisions

13. Contact Us

1 Scope

This Privacy Policy applies to personal information processed by us, including on our websites, mobile applications, advertisements, marketing materials, email and other communications, and other online or offline offerings. To make this Privacy Policy easier to read, our websites, mobile applications, and other offerings are collectively called “Services.

2 Personal Information We Collect

The categories of personal information we collect depend on how you interact with us, our Services and the requirements of applicable law. We collect information that you provide to us, information we obtain automatically when you use our Services, and information from other sources such as third-party services and organizations, as described below.

2.1 Information You Provide to Us Directly

We may collect the following personal information that you provide to us.

  • Registration. When you register with us through the Services to become an Academia.edu Member, we collect your name, email address, and password. You may choose to add additional information in your profile such as your telephone number, postal address, biography, institutional affiliates, research interests, profile picture, social media accounts, and your CV. You may also choose to upload your papers and BibTeX file to your profile.
  • Course Creator Information. We may collect personal information from you if you provide course content as a course creator, including your name, biography, employment and background information, and other information and supporting materials related to the content you provide.
  • Purchases. We may collect personal information and details associated with your purchases, including payment information. Any payments made via our Services are processed by third-party payment processors. We do not directly collect or store any payment card information entered through our Services, but we may receive information associated with your payment card information (e.g., your billing details).
  • Course Creator Payment Information. We may collect personal information from you if you are a course creator to issue payments for the course content that you provide. This information may include tax information such as tax identification numbers, residency information, and other information necessary for tax purposes. We may also collect your bank account information and your contact information in order to issue the payments.
  • Your Communications with Us. We may collect personal information, such as email addresses, phone numbers, or mailing addresses, when you request information about our Services, register for our communications, request customer or technical support, apply for a job or otherwise communicate with us.
  • Surveys. We may contact you to participate in surveys. If you decide to participate, you may be asked to provide certain information, which may include personal information.
  • Interactive Features. We and others who use our Services may collect personal information that you submit or make available through our interactive features (e.g., making your Academia analytics or mentions/citations public, messaging and chat features, commenting functionalities, forums, blogs, and social media pages). Any information you provide on the public sections of these features will be considered “public”, unless otherwise required by applicable law, and is not subject to the privacy protections referenced herein.
  • Career Fairs, Conferences, Trade Shows, and Other Events. We may collect personal information from individuals when we attend career fairs, conferences, trade shows, and other events.
  • Business Development and Strategic Partnerships. We may collect personal information from individuals and third parties to assess and pursue potential business opportunities.
  • Job Applications. We may post job openings and opportunities on our Services. If you reply to one of these postings by submitting your application, CV and/or cover letter to us, we will collect and use your information to assess your qualifications.

2.2 Information Collected Automatically

We may collect personal information automatically when you use our Services:

  • Automatic Data Collection. We may collect certain information automatically when you use our Services, such as your Internet protocol (IP) address, user settings, MAC address, cookie identifiers, mobile carrier, mobile advertising and other unique identifiers, browser or device information, location information (including approximate location derived from IP address), and Internet service provider. We may also automatically collect information regarding your use of our Services, such as pages that you visit before, during and after using our Services, information about the links you click, the types of content you interact with, the frequency and duration of your activities, and other information about how you use our Services. In addition, we may collect information that other people provide about you when they use our Services, including information about you when they tag you.
  • Cookies, Pixel Tags/Web Beacons, and Other Technologies. We, as well as third parties that provide content, advertising, or other functionality on our Services, may use cookies, pixel tags, local storage, and other technologies (“Technologies”) to automatically collect information through your use of our Services.
  • Cookies. Cookies are small text files placed in device browsers that store preferences and facilitate and enhance your experience.
  • Pixel Tags/Web Beacons. A pixel tag (also known as a web beacon) is a piece of code embedded in our Services that collects information about engagement on our Services. The use of a pixel tag allows us to record, for example, that a user has visited a particular web page or clicked on a particular advertisement. We may also include web beacons in e-mails to understand whether messages have been opened, acted on, or forwarded.

Our uses of these Technologies fall into the following general categories:

  • Operationally Necessary. This includes Technologies that allow you access to our Services, applications, and tools that are required to identify irregular website behavior, prevent fraudulent activity and improve security or that allow you to make use of our functionality;
  • Performance-Related. We may use Technologies to assess the performance of our Services, including as part of our analytic practices to help us understand how individuals use our Services (see Analytics below);
  • Functionality-Related. We may use Technologies that allow us to offer you enhanced functionality when accessing or using our Services. This may include identifying you when you sign into our Services or keeping track of your specified preferences, interests, or past items viewed;
  • Advertising- or Targeting-Related. We may use first party or third-party Technologies to deliver content, including ads relevant to your interests, on our Services or on third-party websites.

See Section 5 below to understand your choices regarding these Technologies.

Analytics. We may use Technologies and other third-party tools to process analytics information on our Services, including Google Analytics. For more information, please visit Google Analytics’ Privacy Policy. To learn more about how to opt out of Google Analytics’ use of your information, please click here.

  • Social Media Platforms. Our Services may contain social media buttons such as Google and LinkedIn that might include widgets such as the “share this” button or other interactive mini programs. These features may collect your IP address, which page you are visiting on our Services, and may set a cookie to enable the feature to function properly. Your interactions with these platforms are governed by the privacy policy of the company providing it.

2.3 Information Collected from Other Sources

We may obtain information about you from other sources, including through third-party services and organizations. For example, if you access our Services through a third-party application, such as an app store, a third-party login service, or a social networking site, we may collect information about you from that third-party application that you have made available via your privacy settings.

3 How We Use Your Information

We use your information for a variety of business purposes, including to provide our Services, for administrative purposes, and to market our products and Services, as described below.

3.1 Provide Our Services

We use your information to fulfil our contract with you and provide you with our Services, such as:

  • Managing your information and accounts;
  • Providing access to certain areas, functionalities, and features of our Services;
  • Recommend and provide content that may be of more interest to you based on your activity and use of our Services;
  • Issue payments for certain course content that you provide;
  • Answering requests for customer or technical support;
  • Communicating with you about your account, activities on our Services, and policy changes;
  • Processing your financial information and other payment methods for products or Services purchased;
  • Processing applications if you apply for a job, we post on our Services; and
  • Allowing you to register for events.

3.2 Administrative Purposes

We use your information for various administrative purposes, such as:

  • Pursuing our legitimate interests such as direct marketing, research and development (including marketing research), network and information security, and fraud prevention;
  • Detecting security incidents, protecting against malicious, deceptive, fraudulent or illegal activity, and prosecuting those responsible for that activity;
  • Measuring interest and engagement in our Services;
  • Short-term, transient use, such as contextual customization of ads;
  • Improving, upgrading or enhancing our Services;
  • Developing new products and Services;
  • Ensuring internal quality control and safety;
  • Authenticating and verifying individual identities;
  • Debugging to identify and repair errors with our Services;
  • Auditing relating to interactions, transactions and other compliance activities;
  • Enforcing our agreements and policies; and
  • Complying with our legal obligations.

3.3 Marketing and Advertising our Products and Services

We may use personal information (including, but not limited to, your name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, and areas of interest) to tailor and provide you with content and advertisements. We may also use your personal information (including, but not limited to, your name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, and areas of interest) to inform other Academia users of your activity in connection with our Services, including when you mention or cite another Academia user in a publication. We may provide you with these materials as permitted by applicable law.

Some of the ways we market to you and to others include email campaigns, custom audiences advertising, and “interest-based” or “personalized advertising,” including through cross-device tracking.

If you have any questions about our marketing practices or if you would like to opt out of the use of your personal information for marketing purposes, you may contact us at any time as set forth below.

3.4 Other Purposes

We also use your information for other purposes as requested by you or as permitted by applicable law.

  • Consent. We may use personal information for other purposes that are clearly disclosed to you at the time you provide personal information or with your consent.
  • Automated Decision Making. We may engage in automated decision making, including profiling. Academia’s processing of your personal information will not result in a decision based solely on automated processing that significantly affects you unless such a decision is necessary as part of a contract we have with you, we have your consent, or we are permitted by law to engage in such automated decision making. If you have questions about our automated decision making, you may contact us as set forth below.
  • De-identified and Aggregated Information. We may use personal information and other information about you to create de-identified and/or aggregated information, such as de-identified demographic information, de-identified location information, information about the device from which you access our Services, or other analyses we create.
  • Share Content with Friends or Colleagues. Our Services may offer various tools and functionalities. For example, we may allow you to provide information about your friends through our referral services. Our referral services may allow you to forward or share certain content with a friend or colleague, such as an email inviting your friend to use our Services.

4 How We Disclose Your Information

We disclose your information to third parties for a variety of business purposes, including to provide our Services, to protect us or others, or in the event of a major business transaction such as a merger, sale, or asset transfer, as described below.

4.1 Disclosures to Provide our Services

The categories of third parties with whom we may share your information are described below.

  • Service Providers. We may share your personal information with our third-party service providers who use that information to help us provide our Services. This includes service providers that provide us with IT support, hosting, payment processing, payments to course creators, customer service, and related services.
  • Business Partners. We may share your personal information with business partners to provide you with a product or service you have requested. We may also share your personal information to business partners with whom we jointly offer products or services.
  • Affiliates. We may share your personal information with our company affiliates, for our administrative purpose including activities such as IT management, for them to provide services to you, or support and supplement the Services we provide.
  • Other Academia Users. If you use certain Academia features, such as browsing profiles or papers belonging to Academia Premium users, your profile information (e.g., your name, city, institutional affiliations, and areas of interest) and browsing/viewing activity may be visible to those Premium users. You can control what information is visible to Academia Premium users in your Academia account privacy settings. We may also disclose your personal information (including, but not limited to, your name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, and areas of interest) to inform other Academia users of your activity in connection with our Services, including when you mention or cite another Academia user in a publication.
  • Advertising Partners. We may share your personal information with third-party advertising partners. These third-party advertising partners may set Technologies and other tracking tools on our Services to collect information regarding your activities and your device (e.g., your IP address, cookie identifiers, page(s) visited, location, time of day). These advertising partners may use this information (and similar information collected from other services) for purposes of delivering personalized advertisements to you when you visit digital properties within their networks. This practice is commonly referred to as “interest-based advertising” or “personalized advertising.”
  • APIs/SDKs. We may use third-party Application Program Interfaces (“APIs”) and software development kits (“SDKs”) as part of the functionality of our Services. For more information about our use of APIs and SDKs, please contact us as set forth below.

4.2 Disclosures to Protect Us or Others

We may access, preserve, and disclose any information we store associated with you to external parties if we, in good faith, believe doing so is required or appropriate to: comply with law enforcement or national security requests and legal process, such as a court order or subpoena; protect your, our, or others’ rights, property, or safety; enforce our policies or contracts; collect amounts owed to us; to comply with civil discovery obligations and requests; or assist with an investigation or prosecution of suspected or actual illegal activity.

4.3 Disclosure in the Event of Merger, Sale, or Other Asset Transfers

If we are involved in a merger, acquisition, financing due diligence, reorganization, bankruptcy, receivership, purchase or sale of assets, or transition of service to another provider, your information may be sold or transferred as part of such a transaction, as permitted by law and/or contract.

5 Your Privacy Choices and Rights

Your Privacy Choices. The privacy choices you may have about your personal information are determined by applicable law and are described below.

  • Email Communications. If you receive an unwanted email from us, you can use the unsubscribe link found at the bottom of the email to opt out of receiving future emails. Note that you will continue to receive transaction-related emails regarding products or Services you have requested. We may also send you certain non-promotional communications regarding us and our Services, and you will not be able to opt out of those communications (e.g., communications regarding our Services or updates to our Terms or this Privacy Policy).
  • Mobile Devices. We may send you push notifications through our mobile application. You may opt out from receiving these push notifications by changing the settings on your mobile device. With your consent, we may also collect precise location-based information if you use our mobile application. You may opt out of this collection by changing the settings on your mobile device.
  • “Do Not Track. Do Not Track (“DNT”) is a privacy preference that users can set in certain web browsers. Please note that we do not respond to or honor DNT signals or similar mechanisms transmitted by web browsers.
  • Cookies and Interest-Based Advertising. You may stop or restrict the placement of Technologies on your device or remove them by adjusting your preferences as your browser or device permits. However, if you adjust your preferences, our Services may not work properly. Please note that cookie-based opt-outs are not effective on mobile applications. However, you may opt-out of personalized advertisements on some mobile applications by following the instructions for Android, iOS and others.

    The online advertising industry also provides websites from which you may opt out of receiving targeted ads from data partners and other advertising partners that participate in self-regulatory programs. You can access these and learn more about targeted advertising and consumer choice and privacy by visiting the Network Advertising Initiative, the Digital Advertising Alliance, the European Digital Advertising Alliance, and the Digital Advertising Alliance of Canada.

    Please note you must separately opt out in each browser and on each device.

Your Privacy Rights. In accordance with applicable law, you may have the right to:

  • Access Personal Information about you, including: (i) confirming whether we are processing your personal information; (ii) obtaining access to or a copy of your personal information; and (iii) receiving an electronic copy of personal information that you have provided to us, or asking us to send that information to another company (the “right of data portability”);
  • Request Correction of your personal information where it is inaccurate or incomplete. In some cases, we may provide self-service tools that enable you to update your personal information;
  • Request Deletion of your personal information;
  • Request Restriction of or Object to our processing of your personal information; and
  • Withdraw your Consent to our processing of your personal information.

If you would like to exercise any of these rights, please contact us as set forth below. We will process such requests in accordance with applicable laws.

6 Security of Your Information

We take steps to ensure that your information is treated securely and in accordance with this Privacy Policy. Unfortunately, no system is 100% secure, and we cannot ensure or warrant the security of any information you provide to us. We have taken appropriate safeguards to require that your personal information will remain protected and require our third-party service providers and partners to have appropriate safeguards as well. To the fullest extent permitted by applicable law, we do not accept liability for unauthorized disclosure.

By using our Services or providing personal information to us, you agree that we may communicate with you electronically regarding security, privacy, and administrative issues relating to your use of our Services. If we learn of a security system’s breach, we may attempt to notify you electronically by posting a notice on our Services, by mail or by sending an email to you.

7 International Data Transfers

All information processed by us may be transferred, processed, and stored anywhere in the world, including, but not limited to, the United States or other countries, which may have data protection laws that are different from the laws where you live. We endeavor to safeguard your information consistent with the requirements of applicable laws.

8 Retention of Personal Information

We store the personal information we collect as described in this Privacy Policy for as long as you use our Services or as necessary to fulfill the purpose(s) for which it was collected, provide our Services, resolve disputes, establish legal defenses, conduct audits, pursue legitimate business purposes (including the use and disclosure of your personal information to inform other Academia users of your activity in connection with our Services), enforce our agreements, and comply with applicable laws.

9 Supplemental Notice for California Residents

This Supplemental California Privacy Notice only applies to our processing of personal information that is subject to the California Consumer Privacy Act of 2018 (“CCPA”). The CCPA provides California residents with the right to know what categories of personal information Academia has collected about them and whether Academia disclosed that personal information for a business purpose (e.g., to a service provider) in the preceding 12 months. California residents can find this information below:

Category of Personal Information Collected by AcademiaCategory of Third Parties Information to Whom is Disclosed for a Business Purpose
Identifiers. A real name, voice, signature, photograph, likeness, city, institutional affiliations, citations, mentions, publications, areas of interest, alias, postal address, unique personal identifier, online identifier, Internet Protocol address, email address, account name, or other similar identifiers. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers Other Academia users
Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)) A name, address, telephone number, education, employment, employment history, bank account number, credit card number, debit card number, or any other financial information. Personal Information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Note: Some personal information included in this category may overlap with other categories. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Protected classification characteristics under California or federal law Age (40 years or older), gender. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Commercial information Records of personal property, products or services purchased, obtained, or considered, or other purchasing or consuming histories or tendencies. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Internet or other electronic network activity Browsing history, search history, information on a consumer’s interaction with an internet website, application, or advertisement. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Geolocation data Physical location or movements. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Sensory data Audio, electronic, visual, or similar information. Internet service providers Operating systems and platforms Social networks Service providers
Professional or employment-related information Current or past job history or performance evaluations. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers
Inferences drawn from other personal information to create a profile about a consumer Profile reflecting a consumer’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes. Advertising networks Internet service providers Data analytics providers Operating systems and platforms Social networks Service providers

The categories of sources from which we collect personal information and our business and commercial purposes for using personal information are set forth above.

“Sales” of Personal Information under the CCPA

For purposes of the CCPA, Academia does not “sell” personal information, nor do we have actual knowledge of any “sale” of personal information of minors under 16 years of age.

Additional Privacy Rights for California Residents

Non-Discrimination. California residents have the right not to receive discriminatory treatment by us for the exercise of their rights conferred by the CCPA.

Authorized Agent. Only you, or someone legally authorized to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child. To designate an authorized agent, please contact us as set forth below.

Verification. To protect your privacy, we will take steps the following steps to verify your identity before fulfilling your request. When you make a request, we will ask you to provide sufficient information that allows us to reasonably verify you are the person about whom we collected personal information or an authorized representative, which may include asking you to log in to your Academia account or verify the email address associated with your Academia account.

If you are a California resident and would like to exercise any of your rights under the CCPA, please contact us as set forth below. We will process such requests in accordance with applicable laws.

Refer-a-Friend and Similar Incentive Programs.As described above in How We Use Your Personal Information (“Share Content with Friends or Colleagues”), we may offer referral programs or other incentivized data collection programs. For example, we may offer incentives to you such as discounts or promotional items or credit in connection with these programs, wherein you provide your personal information in exchange for a reward, or provide personal information regarding your friends or colleagues (such as their email address) and receive rewards when they sign up to use our Services. (The referred party may also receive rewards for signing up via your referral.) These programs are entirely voluntary and allow us to grow our business and provide additional benefits to you. The value of your data to us depends on how you ultimately use our Services, whereas the value of the referred party’s data to us depends on whether the referred party ultimately becomes a user and uses our Services. Said value will be reflected in the incentive offered in connection with each program.

Accessibility. This Privacy Policy uses industry-standard technologies and was developed in line with the World Wide Web Consortium’s Web Content Accessibility Guidelines, version 2.1. If you wish to print this policy, please do so from your web browser or by saving the page as a PDF.

10 Supplemental Notice for Nevada Residents

If you are a resident of Nevada, you have the right to opt out of the sale of certain Personal Information to third parties who intend to license or sell that Personal Information. You can exercise this right by contacting us as set forth below with the subject line “Nevada Do Not Sell Request” and providing us with your name and the email address associated with your account. Please note that we do not currently sell your Personal Information as sales are defined in Nevada Revised Statutes Chapter 603A.

11 Children’s Information

The Services are not directed to children under 13 (or other age as required by local law), and we do not knowingly collect personal information from children.

If you are a parent or guardian and wish to review information collected from your child, or have that information modified or deleted, you may contact us as described below. If we become aware that a child has provided us with personal information in violation of applicable law, we will delete any personal information we have collected, unless we have a legal obligation to keep it, and terminate the child’s account.

12 Other Provisions

Third-Party Websites/Applications. The Services may contain links to other websites/applications and other websites/applications may reference or link to our Services. These third-party services are not controlled by us. We encourage our users to read the privacy policies of each website and application with which they interact. We do not endorse, screen or approve, and are not responsible for, the privacy practices or content of such other websites or applications. Providing personal information to third-party websites or applications is at your own risk.

Supervisory Authority. If you are located in the European Economic Area, Switzerland, the United Kingdom or Brazil, you have the right to lodge a complaint with a supervisory authority if you believe our processing of your personal information violates applicable law.

Changes to our Privacy Policy. We may revise this Privacy Policy from time to time in our sole discretion. If there are any material changes to this Privacy Policy, we will notify you as required by applicable law. You understand and agree that you will be deemed to have accepted the updated Privacy Policy if you continue to use our Services after the new Privacy Policy takes effect.

13 Contact Us

If you have any questions about our privacy practices or this Privacy Policy, or to exercise your rights as detailed in this Privacy Policy, please contact us at:

Academia
580 California Street
No. 400
San Francisco, CA 94104
privacy@academia.edu
SUPPLEMENTAL NOTICE FOR TÜRKİYE RESIDENTS

Where is the Police focus on Violent Video Games and Simulated Killing?

I am trained in the peace area and when you make killing into a game you are without doubt training children.

This article is worth reading.

I was born in 1951. World War II had only recently ended. I grew up playing army. I loved toy guns. I thought it would be cool to be a soldier. The idea of shooting the bad guys seemed exciting and patriotic.

I didn’t know the Truth.

Most soldiers in the Civil War died with a loaded gun. One loaded his gun 23 times with bullets flying all around and never took a shot. The cartridges stacked up in his barrel. He didn’t run from battle like a coward. He stood his ground. He just couldn’t bring himself to kill.

In World War II, 15 percent of combat soldiers fired their weapons. Only 2 percent did most of the killing in ground combat. Most had difficulty looking a German or Japanese soldier in the eye and killing them. Much of the killing was done from a distance by artillery, bombing and strafing.

The military learned of these surprising statistics in 1947. They experimented with drugs and other things to make soldiers more willing to kill. By the Vietnam War, the ratio of troops who could be counted on to actually kill rose above 90 percent. The secret was actual battle simulation.

Troops who trained by marching around in formation and shooting at paper bullseyes proved ineffective at killing actual human beings face to face. Troops that simulate actual battles are vastly more capable of performing real operations in the field. The military now uses games and actual simulation.

Today’s video games are getting more and more realistic. Long gone are the “tank” games with a total of 260 pixels. With millions of pixels, massive processing power and stereo headphones, you can look someone in the face, pull your trigger and hear his blood splatter.

Today, 8-year-olds can spend hours in battle simulators right in their bedroom. I have no doubt I’d have done so as a child if that technology had been available to me. Since it was not, my battle reenactments would probably have been comical to behold. Imagine 8-year-old boys arguing, “I got you,” and, “No, you didn’t.”

The vast majority of video game players will not become killers, but combine children who have deep emotional problems with simulated military training, and you can get real-life massacres.

Each of America’s recent mass murderers were withdrawn, psychotic, violent video game players.

Not everyone who drinks winds up killing people in a drunk driving accident. That doesn’t provide solace to those who’ve lost family members to drunk drivers. In the hands of the wrong people, alcohol is dangerous.

In the hands of the wrong people, video games are dangerous. The families who lost children at Sandy Hook Elementary don’t care about all the children who can play video games with little impact. They’re devastated by the one young man who trained on video games to kill their child.

Sandy Hook Elementary was not a school in some violent ghetto. It was a school with a waiting list in a nice neighborhood. Adam Lanza was not poor. He and his mother lived in a $537,000 home. Her alimony checks were over $250,000 a year.

The children in training to be the next mass murderers are not your local thugs and bullies. They’re smart, quiet, withdrawn bombs being primed to explode. To them, a violent video game is like pornography to a pedophile—it heightens evil desires until the only way left to satisfy them is to act them out in real life.

Yes, the danger is the psychopaths—not the average child—but who can say which girl or boy will become a psychopath?You can’t rate a game “N—not for psychopaths.”

If Adam Lanza’s parents’ divorce set him off, how common is divorce?

Those who are repulsed by the killings in Colorado and Connecticut need to be repulsed by the production and sale of violent video games. Those who make and sell such games are the trainers of those who mass murder children. It should be considered shameful to train mass murderers.

If the CEO of each retailer who sells violent video games had to walk through Sandy Hook Elementary and see the carnage of young children shot in the face at point-blank range, could they sleep at night and continue to sell violent video games? Will the next smart, quiet, withdrawn psychopath be trained in a bedroom, in a gated community, in Bentonville, Ark.?

We don’t know where the next killer is being trained. We just know he is being trained.

He could be down the street from you. His mother could have bought him Call of Duty: Black Ops II for Christmas.

Click here for the original article from Movieguide.org.

Erin Patterson’s Police Interview and Transcripts – Guilty or Setting a Precedent for those Pleading Innocent?

Erin Patterson had no criminal history, no motive and yet received a unprecedented life sentence of 33 years.  This is during a time when murder is being downgraded to manslaughter when pleading “guilty” even if they are not.

Refer https://www.abc.net.au/news/2023-06-22/andrew-price-jake-brown-four-years-jail-jarrad-lovison-killing/102511224

There was also discussions of judge only trials I noted on the Supreme Court of Victoria audio files. That would be a travesty.  However, when the media places a spotlight on cases like this they affect ‘hate’ of a person rate than understanding and solutions.  Trial juries are needed as there is a likely greater sense of fairness and reflection of public opinion.

It is important to look at how guilty verdicts come with benefits.  Innocence appears to be treated more harshly by the courts.

A critical question around Erin Patterson is that had she pleaded guilty she would have a lesser term, why would a guilty person say they are innocent if they get the maximum jail term?

Julian Assange pleaded guilty of journalism to get a lesser sentence- 26 Jun 2024:  Julian Assange been convicted under the US Espionage Act, with his guilty plea enabling him to come home to Australia. Here’s the exact charge he admitted to and what we know about it.  The ABC is not a trusted source but it will provide insight.  https://www.abc.net.au/news/2024-06-26/julian-assange-pleads-guilty-to-espionage/104023224

Another case was Bishop George Pell.  Why was a convicted pedophile, George Pell released by the High Court without appearing?  What of the children he harmed and the suicides? He was only sentenced to 6 years on 13 Mar 2019 and then released in 2020. He was allowed to fly to the Vatican when the country was under lockdown.  Why?  

https://www.abc.net.au/news/2019-03-13/george-pells-full-sentencing,-as-issued-by-peter-kidd/10897650

https://www.hcourt.gov.au/sites/default/files/assets/publications/judgment-summaries/2020/hca-12-2020-04-07.pdf

Our Judicial system is in crisis.  My core question is – is it a system based on justice, law or profit or power?  Are laws fair and appropriate?  Are they valid?  Or are they drafted for purposes unknown to the public?  Is the criminal justice system working when judges cannot be held to account.  How can a person judge another if they are above the legal system and not a member of the community subject to the same laws?  

Refer https://kangaroocourtofaustralia.com/

Erin Patterson’s defence barrister has told the jury in her triple-murder trial that the “devoted” mother had no motive to deprive her children of their “wonderful” grandparents.  Ms Patterson, 50, has pleaded not guilty to three charges of murder and one of attempted murder over a beef Wellington lunch she hosted at her regional Victorian home in 2023.

As Patterson begins her life sentence — with the possibility of parole in 2056 — the 28-day timer has begun for her lawyers to lodge an appeal.

https://www.abc.net.au/news/2025-09-08/mushroom-murder-erin-patterson-legacy-analysis/105745284

If the public are obsessed how much of that is due to repetition of the media on this case?  Erin Patterson had her eyes closed but when the Judge mentioned the media, she opened her eyes and glared, She was clearly angered as their whipping up of public interest has impacted justice for her.  Her isolation in jail was blamed on public interest. There would be little public interest if the media hadn’t made this into a spectacle like a Roman Colesium.  I have concerns about serious matters like this becoming entertainment using people’s lives to generate ‘drama’.

The ABC state: “…With the court case over, a looming ethical question for the media and its audiences is in sharper focus than ever. When does “informing the public” cross into the realm of exploiting others’ pain for profit and entertainment?…”

Another quote: “…As a court reporter, it is a privilege to cover cases the public is interested in. But when the demand for news strays into voyeurism, I’m left feeling uneasy….”

What of the Covid-19 bioweapon of mass poisoning as a crime against humanity, that didn’t get the coverage it deserved but instead was referred to as ‘disinformation’ when clear evidence was ignored by the media and the criminal justice system.  We see the public criminalised and this amplified yet the larger crimes – genocide, depopulation, genetical engineering of biology, cults, secret societies (world power elites), psychological operations attacking vulnerability, pedophilia, corruption at the highest levels and the like are not treated in the same way, they are often de-escalated or risk managed or the perpetrator whisked out of the country.  However, the public interest is very strong on this and if anything public awareness is growing as organised protests are revealing.  People want answers of why our country has been corrupted.  Is this case a true case of a woman poisoning relatives or was she set up for this spotlight to criminalise those innocent?  I have real questions around this as my concern is the targeting of innocent civilians speaking up for the very values that make us Australian – fair go and saying it like it is.

There are not enough questions around the inherent structural violence in a system that is for profit and appears to be weaponised by data gathering, profiling and a belief in an ‘enemy’ when the real enemy is unquestioned thinking, ‘group think’ of the mob and violent projection onto others believing this is truth.  Truth looks at all sides and would never condemn a person unless the evidence is clear.  The next step would be how to help a person criminalised learn about life, how to stand in the other’s shoes, how to deal with dark thoughts, how to resolve anger.  We don’t go on witch hunts for sensation, we calmly examine the facts to determine what is true. We have so much to learn about what real justice means.  Until we became targeted, we can’t understand how it would feel to be the victim of violence – family of the Patterson’s and Ian Wilkinson or if the accused is innocent, how public humiliation and condemnation would be felt.  You would be terrified and not wanting to live.

The most important fact here that no-one gives much reflection to is her children.  Not only did they lose grandparents and an aunt, they lost their mother.  What happens to these kids?  How did they cope with not being able to see their mother, hug her and be with her.  She will always be their mother.  What of the breakdown of marriages, how people don’t support each other post breakup, why this is happening in our modern society that struggles with long term relationship.  What part does the business community play in creating this full time work life, and the greed of economic growth placing profit at the centre not families?  What of real estate agents (mortages, rents), what of food prices, petrol prices going up forcing people to work whilst their social relationships breakdown?    What of the politicians who seem unable to understand the deeper psychological challenges the public are subject to and who appear to no longer care as they do not see themselves in ‘service’ to the public.  Some in leadership regard ‘service’ as servitude not a privilege and expression of building ‘unity or utopia’.  How many envisage a better world rather than a totalitarian view of life where control never works as we see in court cases.  Those dominating, causing harm, trying to ‘kill’ the problem never succeed if their goal is abundance and freedom.  What you push against pushes back.  Very few understand the self defeating paradigms of power over arising from insecurity within.  They do not stop long enough to deeply look into their inner world to discover what is out of balance and that the old paradigm never worked and never will.

What of a new paradigm that prevents violence and enables self understanding via public spending in training in conflict resolution, mediation, peace studies, self knowledge and techniques to turn negative thinking around awakening to the idea that what you think about you bring about?  This is how group think works.  We can project any unquestioned thoughts and believe they are true.  The media does this consistently in its promotion of violence in so many ways.  Violent video games for children normalises killing. I heard a 8 year old say to his friend ‘I am going to kill you for real’. No parent there to correct that.  So we are co-creating a future where the public are mind controlled by inputs that do not solve problems but generate fear and teach that violence works.  I see no real inner reflection on that, just condemnation when the crime happens.

Questions: 

Did Erin Patterson get the maximum sentence because she did not plead guilty, that is, the courts are harsher on those who do not plead guilty. Those who plead guilty have lesser sentences?  

The death cap mushrooms are actually very rare in Australia.  The ACT is where they are found.  So how did she get hold of these mushrooms?

https://www.act.gov.au/environment/animals-and-plants/death-cap-mushrooms

In her testimonial it turns out she too was sick with diarrhea.  She reported an attack of gastro.  She says the nurse gave her an anti-dote, what was that anti-dote and did the other’s  at the dinner party (Donald, Gail, Heather and Ian) receive the same anti-dote?  Did they receive treatment at Dandenong (Monash Health) or the Austin in Heidelberg Melbourne?  The latter is a good 40 minutes drive away?  Why send patients there?  Did they all receive the same treatment?  How did Ian Wilkinson survive?

Was the treatment the cause of death?

Maybe the fact the grandparents were such lovely people that the public became interests as the question of why? would be there.  I felt touched by this quote: “…Their incredible love, support, wisdom, knowledge, intelligence, warmth, gentleness, guidance, and humour in both spirit and truth are gone,” Simon reflected in a victim impact statement…” 

Maybe they will teach the rest of us from the grave, that goodness, kindness and humour, are the values we all share.  

Why when held in jail was Erin Patterson subject to isolation for up to 23 of 24 hours?  How does that impact her mental health?  Do jails breach Universal Declaration of Human Rights and Civil and Political protocols?  Was her incarceration akin to inhuman and cruel treatment isolating her pre-sentencing and it appears after sentencing for her safety or to punish her?   Is that true?  

The reason cited for her incarceration without 11 hour breaks was due to media attention whipping up hatred about her calling her Mushroom murderer and not raising important pubic interest questions.  This is not peace journalism it is trial by media.  The corporations controlling the media need to be examined for their intent and if they truly serve the public or themselves and those who invest in them.  What are their agendas?

Is it our system that is based on a culture of abuse and pain?  If that is so, then how can you judge a person if the system is using processes that are impacting wellbeing, mental health and rehabilitation?  What consideration is given to her mental health and healing of the accused, whether they are guilty or not.  What does justice look like?  If they are innocent this is an entirely different matter and that provides another lense to look at guilty until proven innocent rather than innocent until proven guilty.  We see the same ideology creeping in via intervention orders.  .  The IVO system or PSIO system use ‘consent without admission’ as an alleged means of protecting people.  Yet this system is increasingly used to silence people or create a process of criminalisation without evidence.  Totalitarian regimes do not care about justice, they just take the person and jail them.  Are we becoming primed to allow guilty until proven innocent as the modus operandi?  What of zero tolerance taught by the emerging technocracy when internal actors are committing fraud and breaching privacy with impunity.  What of zoom in courts?  Who owns zoom?  What of televised court cases? What of privacy?  What if it was you?

https://en.wikipedia.org/wiki/Zoom_Communications

We allow third parties into the courts via digitisation, IT telecommunications, surveillance and tracking.  What of the right to privacy?  As we can get it wrong even with all the data gathering in the world, we can make the wrong call, we may project our biases as we have never been held to account for our own mistakes.  Truth is about fairness not winning the argument.  The courts are battlefields.  

Gandhi comes to mind?  Does an eye for an eye make the whole world blind?  

Lindy Chamberlain came to me as I was writing this.  Was Erin’s case, similar to Lindy Chamberlain’s trial by media? Her life was destroyed by the media and police who believed she was guilty when she was innocent.  What happens in the future if Erin is found innocent?  

Legal Process and Findings

I have many more questions as I haven’t deeply explored the topic, this is a first look as I am not accessing media.  Immediately I see there is more to this than meets the eyes.  This wisdom comes to me to reflect on.  Often truth is obscured by narratives but there is more below the tip of the iceberg.

I am looking beyond 4 and I see many many layers in this that have nothing to do with Erin.

The precedent set for a maximum term when a person pleads innocent and without a criminal record seems to me to be injustice within a justice system.  Why would innocence get a longer term than guilty?  Clearly this is not about justice and fairness, what is it about?   

What if a person is set up due to other agenda’s going on that may not be related to the case under the microscope?  What if precedents are being set of maximum penalties to those pleading innocent with no motive or criminal background?  

I can feel for justice as balance and fairness.   Metaphorically I sit with the image of the woman holding the scales of justice and impartiality.  I consider what is real justice?  I wonder at the amplification of the media and their intentions behind this, more attention, profits and ways to get viewers?  Or a real public interest story that is unbiased or biased?  

Why Is Lady Justice Blind? The Meaning of Her Symbols

This audio The Australian media has released. We can’t be sure it is 100% accurate as audio can be doctored and I note the transcript has been edited. It sounds like she is reading. Turns out actors are performing the transcript. I’d prefer as a member of the public the ‘real’ interview so I can hear Erin’s voice, I can learn a lot from the sound of her voice not an actors.

However, it is worth listening to her as a primary step to explore the nature of the allegations and sentencing which was broadcast on Channel Nine today 8 September 2025.

Wonthagie police station.

https://www.police.vic.gov.au/wonthaggi-police-station

https://monashhealth.org/contact/dandenong-hospital/

This is audio of the first interview of Erin Patterson. The Australian has released it. It is worth downloading the transcript to compare.

The transcript is not exact.

https://www.smh.com.au/interactive/hub/media/tearout-excerpt/46251/Exhibit-63–%5bredacted%5d_Redacted.pdf

What value do we put on truth. I put 100% value on it as innocent people go to jail or crucified by our collective ignorance. We need to find enlightened ways to resolve violence.

Go to my websites if you want some ideas, I’ve been working on peace most of my adults life.

www.worldpeacefull.com
ha.worldpeacefull.com

I see another world arising. It is a world where from childhood we grow up in happy families. We learn how to live in community. How to share. How to see everyone as gifted and unique. I live in a world that values everyONE, I value the perpetrator and the victim and recognise we are all here to learn. I am not into condemnation but solutions to ensure it doesn’t happen again or innocent people do not go to jail for life.

We are in times where innocent people are being targeted by actors who do not respect human life. Who see the value of a human as a lot less than their assets.

We are observing those who commit crimes as getting off with less time. We are seeing them fly out of the country. We see they have friends in high places or a emerging ideology that uses violence as a form of power not love. We are indeed coming to the end of this paradigm as the people have without doubt ‘had enough’. Enough is enough is the slogan of this time.

2026 is going to be interesting as inconvenient truths keep rising out of obscurity to test our sense of what is fair and what is right?

Changes to Courts as a Result of Covid-19

This is the audio from the Supreme Court in reference to changes due to Covid-19. Today we know that SARS-CoV-2 was never proven. Uncritically the courts have just complied with government edicts and allowed changes to courts that have narrowed justice moving towards single judge courts. I’ve personally experienced this to discover the judge was compromised. So I listen to this with many questions about potential judicial bias and privacy breaches normalised by actors unseen. We appear to trade off convenience for justice. Does justice matter. Yes. Why? It rebalances disputation and crime to ensure fairness and truth is heard and seen to be heard.

https://www.supremecourt.vic.gov.au/about-the-court/multimedia-on-demand/gerties-law-podcast

The Victorian County Court Facility was opened in 2002. It is privately owned, maintained and operated by The Liberty Group, a wholly owned subsidiary of Challenger Limited.

The supreme Court of Victoria speaks about justice under Coronavirus. There are moves to remove the jury system. Victorian Supreme court may well be the last jurisdiction. The issue of coronavirus has been disputed given the RT-PCR doesn’t detect live infectious viruses as the pathogen wasn’t isolated or purified. Why did the Judges not question the alleged pandemic.

Project name: Victorian County Court Project Value – $195m (net present value, as at October 2000)
Status Service delivery commenced
Department or agency Court Services Victoria
Private sector partner: The Liberty Group Pty Ltd consisting of ABN AMRO, NM Rothschild & Sons (Aust) Ltd (financiers), Multiplex Construction Ltd (construction), and Honeywell Limited (facility services).

Rothschild corruption: https://www.independent.co.uk/news/uk/politics/the-rothschilds-and-their-200-years-of-political-influence-969772.html

The audio discusses masks being worn, why did Judges not investigate the fact the masks don’t work. a NSW Fair Trading Minister stated in 2003: “…

Retailers who cash in on community fears about SARS by exaggerating the health benefits of surgical masks could face fines of up to $110,000. NSW Fair Trading Minister Reba Meagher yesterday warned that distributors and traders could be prosecuted if it was suggested the masks offered unrealistic levels of protection from the disease. “I’m sure everyone would agree that it is un-Australian to profiteer from people’s fears and anxieties,” Ms Meagher said. “There appears to be some debate about whether surgical masks are able to minimise the effects of SARS.” Ms Meagher said her department would investigate any complaints about false mask claims which concerned the public.

https://www.smh.com.au/national/farce-mask-its-safe-for-only-20-minutes-20030427-gdgnyo.html

People spend longer on remand (guilty until proven innocent)? Isolation has increased due to COVID-19 restrictions and restrictions on movement and hours out of cells. Permitted 11 hours out of cells, in other cases it has become a lockdown situation. Big difference being held in cell 23/24 hours. Anxiety over and above community anxiety. Those in custody suffered more during the alleged pandemic.

Lockdown caused harm to children due to covid. How has justice been perverted?

Online causes a major breach of privacy given the owners of software. I was told by a IT person who worked at the County Court that they were able to gather data. How can judges not show concern about privacy breaches?

Who owns Zoom? https://en.wikipedia.org/wiki/Zoom_Communications

Online is the new gold. The IP addresses of barristers and witnesses is found out via online access, their addresses, their online activity which gives other players unseen access to data. The IT companies are seeking to use Artificial Intelligence to assist lawyers like free assistants, yet accesses their computer systems. Fair hearings are disrupted and IT is a major leak of courts that is allowed as if neutral when Silicon Valley and the digital reality is reported to be about ‘control’ not labour saving.

AI in the Federal Court is of major concern. People can be sentenced on technicalities when the human morality is not at the centre in our appeal for fairness. People need to feel the connection to other humans and problems can be solved in our depth understanding of human nature. AI is a robot it is not able to calculate justice as it is about fairness not technicalities in my view.

https://lawcouncil.au/publicassets/e4c1fdf4-334b-f011-94b6-005056be13b5/4686%20-%20S%20-%20AI%20use%20in%20the%20Federal%20Court%20of%20Australia.pdf

I am amazed at the naivety and lack of awareness around this digital dystopia arising around humanity to move us towards slavery and an extinction level event.

I, Susan Carew (Carew-Holmes) do not consent to online trials and corruption in the judiciary above the law.

Unicorn and Lion crest is in the court. This is the real law in Australia.

Judge alone trials are very concerning as they can be biased.

Everything should be questioned including the criminality of Covid-19 which is a fair worse crime than anything the world has witnessed.

If there are judges and lawyers interested in real judgement I submit this as my reasons.

https://dhughes.substack.com/p/omniwar-symposium-september-21-2024

https://solari.com/omniwar-pdf-now-available/