Doc Type: Strategic Analysis (AU)

The Common
Survival Report.

A Tactical Analysis of Systemic Filtration, Bureaucratic Violence, and the Infrastructure of Mutualism.

I. The Origin

By 23, I was operating inside the Fraud & Intelligence unit of one of Australia’s largest insurers. I’d moved fast: from frontline call centres to the inner sanctum where loss ratios, risk appetites, and “emerging threats” were discussed behind glass. My job was simple in theory and brutal in practice: protect the loss ratio.

On paper, the loss ratio is just a number — the percentage of premiums returned as claims. In reality, it is a measure of how much human misery can be absorbed, delayed, or denied before it becomes a problem for shareholders.

I was trained to see every claimant not as a person in crisis, but as a potential cost centre. The tools I was given:

  • Systems that flagged “suspicious” claims based on opaque rules.
  • Algorithms that triaged who got paid fast, who got investigated, and who got quietly starved of updates.
  • Internal playbooks that leaned on “wear and tear”, “pre-existing damage”, and “maintenance” exclusions to push storm and flood losses back onto households.

I watched hydrology reports commissioned not to find the truth, but to find a “riverine flood” angle that would trigger an exclusion. I saw “poor maintenance” used as a weapon against pensioners who couldn’t afford a new roof. I watched people be told, in polite legal language, that a rusted nail — not the cyclone, not the storm surge — was the “real” cause of their ruin.

The more I learned, the less I could pretend this was neutral. What I saw didn’t turn me into a company man. It radicalised me.

I saw how the industry weaponises information asymmetry and administrative friction. I saw systems built not to process claims, but to filter them — through delay, doubt, and documentation traps — until enough people gave up.

I walked out of that glass tower. I didn’t leave empty-handed. I left with the playbook. This report is what happens when that playbook is turned inside-out and handed back to the people it was used against.

1.1 The Mission: Democratizing Tradecraft

I realized that silence was complicity. The system relies on the consumer being passive, confused, and intimidated by technical jargon. My work is now dedicated to shattering that reliance. I exist to educate survivors—renters, precarious workers, and climate refugees—on the specific, "guerrilla" tactics necessary to survive in a market-driven economy that is fundamentally antithetical to human welfare.

This report is not just a guide; it is a weapon. It is the curriculum of a counter-education designed to level the playing field. I teach survivors how to think like an adjuster to defeat the adjuster. We replace "hope" with forensic documentation. We replace "politeness" with regulatory leverage. We turn the insurer’s own bureaucracy—the General Insurance Code of Practice, the Privacy Act, and the AFCA Rules—into a cage that traps them in their own obligations.

In a system where profit is extracted from the denial of safety, survival is an act of rebellion. This guide is your manual for that rebellion.

II. We Are Being Sorted

“We are being sorted by risk, by cost, and by inconvenience.”

The sorting mechanism is most visible — and most violent — where people anchor their lives: housing, credit, and climate-exposed property.

2.1 From Maps to Models: The Evolution of Redlining

Old-school redlining used physical maps. Whole suburbs and postcodes were coded as “hazardous” or “high risk”.

Today, that explicit discrimination is illegal. But the outcomes are eerily similar.

Now the red lines run through models, not maps.

  • Automated decision systems use “neutral” variables:
    • postcode
    • income band
    • credit file data
    • tenancy history
    • unpaid bills
  • These variables are statistically entangled with race, class, and history.

This creates Algorithmic Redlining: discrimination that has been mathematically laundered.

A landlord, bank, or insurer can say, truthfully:

“We didn’t reject you. The system did.”

The harm is displaced onto software. Responsibility evaporates.

2.2 The Tenant Screen: PropTech as Gatekeeper

Automated tenant screening has become the default filter in many rental markets.

These systems:

  • scrape credit reports, court lists, tenancy databases
  • treat almost any “record” as a black mark
  • heavily weight non-tenancy debts (medical bills, fines, old phone plans)

One of their most toxic outputs:

“Records Found.”

This can mean:

  • a dismissed case
  • a charge without conviction
  • another person with a similar name
  • a ten-year-old minor matter

To a landlord faced with 40 applications, “Records Found” is often an auto-no.

The effect:

  • people are banished from decent rentals
  • pushed into informal arrangements or unsafe housing
  • instability produces more debt, more stress, more bad data

The system then points to that instability as proof you were “high risk” all along.

Table 1: Disparate Impact in Mortgage Denials (2024 Data)
Applicant Demographic Denial Rate (2024) Risk Ratio vs. White
Black / African American 27.1% 1.64x
Native American (AIAN) 26.2% 1.58x
Hispanic / Latino 22.1% 1.33x
White (Non-Hispanic) 16.5% 1.00x
Asian 14.3% 0.86x

Source: National Fair Housing Alliance

2.3 Bluelining: Climate Risk as a Sorting Engine

As the climate destabilises, another kind of red line appears — one drawn in blue.

Insurers and reinsurers are redrawing their maps of what is “insurable”:

  • floodplains in Western Sydney
  • fire-exposed peri-urban belts
  • coastal and riverine communities

Where risk can’t be priced with confidence, the industry retreats:

  • eye-watering premiums
  • giant excesses
  • exclusions that hollow out cover
  • outright refusal to quote

This is Bluelining: sorting populations based on climate risk.

The overlap is not accidental:

  • communities with poor drainage, no trees, and old infrastructure
  • are often the same places historically starved of investment

The result is a kind of managed retreat without announcement:

  • people cannot insure → cannot rebuild → are quietly displaced
  • the protection gap between what was lost and what was paid out grows each year

FIG 1.1: THE DIVERGENCE (RENT VS WAGES)

III. Violence Is a PDF

“Violence in the 21st century is rarely a boot on the neck. It is a PDF that will not open.”

This section looks at Administrative Burden — what some researchers call sludge — as a weapon.

3.1 The Taxonomy of Burden

Administrative burden comes in three main forms:

  1. Learning Costs
    • recognising that help exists
    • understanding eligibility
    • decoding jargon and forms
  2. Compliance Costs
    • filling forms
    • gathering documents
    • waiting on hold
    • travelling to appointments
  3. Psychological Costs
    • shame, stigma, fear of being disbelieved
    • dread of making a mistake
    • exhaustion from repeated demands

None of this is accidental.

When the time-tax on a benefit exceeds what a working parent, a carer, or an injured worker can give, they drop out. The file is closed as “no response”. No formal denial required.

The system doesn’t need force when it can use exhaustion.

Table 2: The Economic Costs of Administrative Sludge
Burden Source Annual Economic Impact Mechanism of Loss
Health Insurance Admin $21.6 Billion Wages lost to time spent on phone/paperwork
Employee Absenteeism $26.0 Billion Sick days/leave taken to manage benefits
Productivity Decline $95.0 Billion Reduced engagement/burnout from admin stress
Total Sludge Cost ~$142.6 Billion

3.2 AI and the Automation of Denial

Automation accelerates this.

Insurers and welfare agencies are increasingly using:

  • scoring engines to decide who gets flagged
  • template-driven decisions at scale
  • “smart” systems that scan for reasons to reject or claw back

Investigations have shown:

  • claim batches processed in seconds
  • denial rates spiking when automated review tools are introduced
  • humans reduced to rubber-stamping algorithmic recommendations

When an AI is optimised for cost containment, the outcome is predictable: it becomes a denial amplifier.

IV. Surveillance Is Class Warfare

“The poor are transparent. Capital is opaque.”
“Surveillance turns everyday survival into a permanent trial.”

4.1 Bossware: The Architecture of Distrust

As work has shifted into call centres, home offices, warehouses, and platforms, surveillance has followed.

Bossware — employee monitoring software — tracks:

  • keystrokes and clicks
  • mouse movements
  • screen activity
  • time “idle” vs “active”

Productivity scores are generated from these signals.
Thinking, reading, planning — anything that looks like “not typing” — is punished.

The result:

  • performative busyness
  • fake activity to keep the meters happy
  • constant low-level anxiety

The workplace becomes:

  • not just a site of labour
  • but a site of continuous evidence collection against you

4.2 The Amazon Model & Biometric Oversight

In high-tempo logistics, the body itself is surveilled.

  • barcode scans tracked to the second
  • “Time Off Task” calculated and enforced
  • toilet breaks converted to metrics

Algorithms act as foremen that never sleep and never need to justify themselves.

In gig and delivery work:

  • AI-equipped cameras monitor eye movement and driving behaviour
  • apps track location, route choices, and “dwell time”
  • ratings decide who gets work and who is silently dropped

For many workers, every gesture is a data point.

Your behaviour becomes evidence:

  • to discipline you
  • to terminate you
  • or to justify squeezing more “efficiency” from you next quarter

Privacy becomes a class luxury.

FIG 1.2: THE COST (INJURY RATES IN MONITORED SECTORS)

V. Surveillance Is Infrastructure – So We Build Counter-Infrastructure

The Manifesto shifts here:

“We do not ask for protection — we build it. Survival is infrastructure.”

If the state and market are building systems that sort, score, and shed us, then survival requires parallel systems that keep us connected, informed, and less exposed.

5.1 Connectivity: Mesh Thinking

In fires, floods, heatwaves, or political crisis, the first things to fail are often:

  • power
  • mobile coverage
  • centralised online platforms

Mesh networking thinking says:

  • don’t rely on a single central point
  • connect devices and nodes to each other directly
  • host useful local services (chat, docs, maps) that work even when the wider internet doesn’t

The principle is bigger than radios and routers:

Our ability to coordinate should not be switchable at the socket of a single provider.
Table 3: Mesh Hardware Requirements & Costs
Component Function Example Hardware Est. Cost
Backbone Radio Long-range link (PtP) Ubiquiti LiteBeam 5AC ~$60-90
Omni Router Local distribution TP-Link EAP225-Outdoor ~$70
Mesh Node Low-power text comms Meshtastic (LoRa) Board ~$30
Power System Off-grid survival 100W Panel + LiFePO4 Battery ~$200

5.2 Obfuscation: Controlling the Exhaust

The Manifesto frames counter-surveillance as:

“Controlling your digital exhaust.”

Traditional privacy tools (VPNs, encryption, private messengers) limit who can read your traffic.

A more aggressive idea is data obfuscation: reducing the accuracy and usefulness of the behavioural profile built on you.

Conceptually, this includes:

  • generating benign noise that makes precise profiling harder
  • refusing to overshare when applying for benefits, jobs, leases
  • being intentional about what data trails you create under your real name

The target here is surveillance capitalism, not lawful safety checks or investigations. Any tactic must be:

  • lawful
  • proportionate
  • aligned with your own risk, not fantasy

The point is not to disappear.
It is to refuse free, high-resolution behavioural telemetry to entities that monetise or weaponise it.

5.3 Governance: Data Cooperatives

“Shared tools beat individual hacks.”

Data cooperatives are one way to turn extraction on its head:

  • people pool their data voluntarily into a member-owned body
  • the co-op has a legal duty to act in members’ interests
  • insights can be used to:
    • challenge unfair pay practices
    • reveal discriminatory outcomes
    • negotiate better terms collectively

Instead of thousands of isolated workers or tenants guessing what’s happening, a co-op can:

  • map patterns
  • publish evidence
  • bargain with institutions from a position of knowledge

The same logic that makes a union powerful can make data governance powerful.

5.4 Literacy: Algorithmic Accountability as Self-Defence

Survival now requires algorithmic literacy.

Not “everyone must learn to code,” but:

  • learn to ask what system made the decision
  • learn what data it depends on
  • learn what error or appeal channels exist
  • learn what laws or principles (if any) constrain it

A “high risk” tenant score might be based on:

  • a single old debt
  • a mis-matched record
  • someone else’s criminal history

A flagged welfare file might be based on:

  • income data out of context
  • an employer error
  • an automated cross-match that never got human review

Knowing that these are contestable outputs, not divine judgements, is as important as knowing basic first aid.

Technical illiteracy is now a form of enforced vulnerability.

VI. The Strike Is The Only Language

“Power concedes nothing without a demand. It never did and it never will.”

The systems described above — the sorting, the sludge, the surveillance — are not accidental glitches. They are optimisations for capital.

They will not be fixed by:

  • asking nicely
  • better design
  • ethical AI guidelines

They will be fixed only when they become too expensive to maintain.

6.1 The Withdrawal of Cooperation

The only leverage we have is our participation.

  • The Rent Strike: When tenants collectively withhold rent, the landlord's cash flow — and their leverage with the bank — evaporates.
  • The Data Strike: When users collectively poison the data well or refuse to generate the "exhaust" that trains the models.
  • The Labour Strike: When workers refuse to turn the gears.

In the algorithmic age, the strike must evolve.

It is not just about stopping the factory line. It is about jamming the signal.

6.2 Solidarity as Survival

The individual is easily crushed. The algorithm can route around one driver, one tenant, one claimant.

But it cannot route around a class.

We build unions not just for wages, but for dignity. To assert that we are not data points to be optimised, but human beings to be respected.

See our Workplace Defense Guide for tactical steps on building power where you work.

VII. COMMON SURVIVAL PROJECT_AU

Localized Operations: Australia

Australia is not a blank map for abstract theory. It is a live-fire test of administrative violence, climate acceleration, and the myth that “we’ll be right” if everyone just pitches in. The AU operations layer of this project takes the Manifesto’s arguments and grounds them in Robodebt, the rental market, and floods that happen twice in a month.

7.1 The Australian Diagnosis

Here, violence rarely looks like a baton. It looks like a Centrelink debt notice auto-generated by an averaging algorithm, a no‑grounds eviction dropped into your inbox, or a flood map that quietly makes your home uninsurable. What appears as chaos is in fact design.

The AU diagnosis identifies a convergence of Administrative Violence and Climate Acceleration:

  • Robodebt: algorithmic extortion of hundreds of thousands of people, proving the state is willing to experiment on the poor.
  • Housing: negative gearing and tax policy that financialised shelter into a speculative asset class.
  • Climate: fires and floods where unpaid volunteers and neighbours provide the real protection while capital is quietly bailed out.

7.2 The Myth of Mateship

“Mateship” is sold as a national virtue: when disaster hits, Australians just help each other out. The AU operations report reframes this as a crisis management strategy that relies on unpaid labour.

The Lie

  • Mateship is treated as a substitute for public infrastructure.
  • Heroic volunteers paper over hollowed‑out services.
  • Responsibility is shifted from institutions to “the community”.

The Reality: Mutual Aid

  • Mutual aid is horizontal, not charitable: abandoned people organising together.
  • It treats care as logistics, not sentiment.
  • It asks how we build standing structures, not one‑off heroics.

7.3 Evidence of Collapse

The AU layer visualises what many already feel:

  • Housing separation: indexed charts where median house prices take off from wages like a rocket, turning “the great Australian dream” into a sorting mechanism.
  • Event frequency: climate plots showing so‑called “1‑in‑100‑year” floods arriving every few years, invalidating the old actuarial story about risk.
  • Operational capacity: comparing the burnout curve of ad‑hoc “mateship” to the steadier capacity of organised mutual aid networks.

The conclusion is blunt: the “fair go” is not failing by accident. It has been replaced by a set of models and policies that manage decline.

FIG 2.1: CLIMATE EVENTS – FROM RARE TO ROUTINE

7.4 Tactical Response (AU)

From this diagnosis, AU operations sketch concrete vectors of resistance:

  • Housing defence: tenant unions, collective negotiation, and meticulous documentation of every interaction with landlords and agents.
  • Bureaucracy hacking: never accepting verbal rejections, forcing written decisions, and building paper trails that survive staff turnover and policy churn.
  • Disaster communications: mesh networks, UHF radios, and pre‑agreed neighbourhood check‑in protocols for when the towers burn and the network dies.

FIG 2.2: "MATESHIP" VS MUTUAL AID CAPACITY

If the system watches you, watch it back. If the system sorts you, organise the rejected. Survival is infrastructure.

Incorporating AU operations into the Manifesto is not an annex. It is the proving ground where theory is forced to answer: what do we do on Tuesday morning when the letter arrives?

VIII. Conclusion

Legibility Without Dependence

This report supports the Manifesto’s central claim:

The systems we rely on are not failing; they are succeeding at a goal we do not share.
  • Housing systems sort by profitability and convenience
  • Insurance systems retreat from unpriceable climate risk
  • Welfare systems ration support through friction and fear
  • Work systems extract maximum output under constant watch

In that environment:

  • “personal resilience” is a trap
  • no amount of individual optimisation can undo a structural filter

The path forward is Counter-Infrastructure:

  • We build communications that don’t vanish when one company fails us.
  • We practice documentation and evidence discipline that outlasts bureaucratic churn.
  • We pool data and stories in ways that give us leverage instead of shame.
  • We learn how algorithms work, not to admire them, but to challenge them.

We make ourselves legible to one another,
while remaining less legible to the systems that would quietly discard us.

The Manifesto ends:

“Survival under capitalism is no longer private. Neither is resistance.”

This report agrees — and adds:

Survival is now an engineering problem,
a legal problem,
and a community problem.

We do not wait for the system to correct itself.

We intervene.

Appendix: Tactical Resources & Further Reading

1. Privacy & Obfuscation Research Tools
  • -> Projects exploring ad tracking obfuscation and search noise generation
  • -> Always assess legality, terms of service, and ethical impact in your own context
2. Mesh & Community Networking
  • -> Community mesh documentation projects (antenna mounting, node deployment)
  • -> Open-source off-grid communication platforms and LoRa-based projects
3. Algorithmic Accountability & Rights
  • -> Toolkits on investigating public-sector algorithms
  • -> Reports on automated decision-making in welfare, policing, and credit
4. Cooperative Data Governance
  • -> Case studies of worker-owned data co-ops
  • -> Frameworks for building citizen-controlled data trusts