Introduction: The New Rules of Business Warfare
Competition in business is supposed to be about superior products, sharper marketing, and smarter pricing. But in the shadows of unregulated industries, a far more sinister reality is taking shape—one where rivals aren't just outmaneuvered, they are systematically and violently eliminated. For one entrepreneur named Jess, who had overcome childhood abandonment and homelessness to build a thriving events business from nothing, this reality became a year long nightmare. Her success wasn't met with competition; it was met with a corporate hit.
A new, hybrid playbook for sabotage is emerging, blending sophisticated digital attacks with the old-school physical intimidation of organised crime. This is not business; it is a blueprint for predatory destruction. This article breaks down the five key tactics from this modern playbook, using the methodical execution of Jess's takedown as a chilling case study.
1. Tactic 1: Eliminate, Don't Compete — The Strategy of Predatory Market Displacement
The foundational strategy of this new corporate warfare is brutally simple: eliminate, don't compete. This approach, termed "Predatory Market Displacement," flourishes in industries that lack formal oversight. The "lifestyle" or "NSFW" events sector, described in case documents as an industry that "lacks a formal governing body," creates a power vacuum where criminal methodologies can take root and thrive.
This lawless environment is ripe for infiltration. The Victorian Law Reform Commission found that moving into lawful industries is a "key strategy of organised crime groups." The goal is not to win market share through innovation but to forcibly remove a competitor from the board entirely, clearing the field for a hostile takeover. It is a strategic choice to annihilate, not outperform.
2. Tactic 2: The Hybrid Attack — Blending Digital Smears with Physical Terror
The attack methodology is a brutal two-pronged assault, synchronising digital character assassination with real-world physical terror designed to induce psychological collapse.
First, the digital offensive, or "Social Sabotage," is launched. In this case, investigators found a coordinated smear campaign using the real profiles of the extortionist and his assistant: up to eight fake Reddit profiles to manufacture a "moral panic." These defamatory posts successfully reached an audience of over 20,000 people, inflicting massive and immediate reputational damage. The digital offensive, or 'Social Sabotage,' was a coordinated campaign designed to manufacture a 'moral panic.' Investigators identified a smear campaigns utilising the primary profiles of Matt, Isadora and his associate Carly, alongside eight (8) fraudulent 'sock-puppet' accounts run by Carly.
These defamatory publications reached an audience exceeding 20,000, causing immediate and quantifiable reputational damage. The strategy succeeded to destroy the brand reopening once she resolved the safety issues at home. The nail in the coffin was when Matt threatened "do the deal or suffer the consequences", he further threatened to destroy her by making posts on forums, social media and email marketing. He followed through on this threat when Jess repeatedly refused to hand over the brand, the post publicly weaponised a 'Mental Health' narrative to discredit the Applicant and ensure any requests for assistance by the community or forum moderators were ignored. Critically, this post contained specific details of the residential siege—information not yet in the public domain—proving Matt’s proximity to the events while simultaneously mocking the Applicant’s safety protocols and falsely alleging the misappropriation of ticket funds whilst in private acknowledging Jess hadn't infact run away with the money, proving the malicious intent behind his actions.
This digital assault was amplified by a relentless, six-month campaign of physical terror carried out by an Outlaw Motorcycle Gang (OMCG), it was later discovered this is an OMCG Matt is a member of. This campaign was not subtle. The campaign included a brazen display of intent to cause terror with a chainsaw brought to the victim’s front door and guns openly displayed in her apartment. The psychological cruelty extended to hacking her pet cam and committing unauthorised entries into her home, leaving her with the constant fear that even her private sanctuary had been breached.
3. Tactic 3: The Trojan Horse — Weaponising Positions of Trust for Insider Access
To ensure the takedown is surgically effective, attackers infiltrate the target organisation from the inside. Investigators uncovered that an operative named Carly Taylor was placed within the victim's business in the trusted role of a "consent angel," a position ostensibly responsible for guest safety.
This position was weaponised. Instead of ensuring safety, the operative gathered critical intelligence on guest lists, team dynamics, and operational procedures. More insidiously, she worked to "Turn Jess's network of friends against her at the start of the OMCG floor takeover, when Jess needed her friends more than ever," corrupting the organisation's internal support system and isolating the target before the final assault. With intelligence flowing from their insider, the network was ready to execute the next phase.
"Operational Infiltration for the Purpose of Commercial Sabotage... proves that the network uses the role of 'safety personnel' (Consent Angels) as a cover to gather intelligence on competitors."
4. Tactic 4: The Digital Land Grab — Hijacking a Brand Before the Attack Begins
This modern playbook demonstrates a chilling level of premeditation, extending to intellectual property theft. The tactic of "Anticipatory Business Hijacking & Brand Squatting" involves stealing a target's brand identity before the main assault even begins.
The digital paper trail reveals that the perpetrator, a man identified as Matt, systematically identifies successful brands and registers "confusingly similar" business names under his own ABN. In a prior attack, he registered the business name "Erotic Fantasies," which belonged to victims Marty & Mishka, forcing them to abandon their brand. This is not speculation; historical details registered to the perpetrator's Australian Business Number, confirmed by ASIC records, show his ownership of the name. This action proves the reputational attack is just one phase of a calculated asset seizure. The connection was made explicit when a third party delivered a warning to Jess.
"Be careful, eyes on you, you're next."
5. Tactic 5: Corrupting the Ecosystem — The Critical Role of Enablers
A target is most vulnerable when they are completely isolated. The final tactic involves corrupting the ecosystem around the victim, turning potential sources of help into facilitators of the attack. The linchpin of the physical terror campaign was the building manager, Daliah.
Investigators uncovered a direct, physical link: Daliah lived next door to the OMCG occupants responsible for the terror in St Kilda in the lead up to the terror campaign and also during the first few months, they went between the St Kilda property and Jess's building that Daliah managed before residing on Jess's floor full time from early January 2025. This transforms her from a merely negligent manager into a direct associate of the criminal gang. She used her position to enable the harassers' access to the victim's residential building, allowing them to unlawfully access an apartment directly across from Jess, they turned a blind eye to any safety complaints Jess made. This inside access was essential to the inescapable, 24/7 nature of the terror campaign. Daliah's alleged complicity was captured in a statement she made when the victim identified the harassers as OMCG members.
"They need to make money somehow."
Conclusion: A Blueprint for Destruction
The tactics detailed here are not random acts of malicious competition. They form a coordinated and repeatable blueprint for the complete destruction of a business. This hybrid model—fusing digital sabotage, organised crime, insider infiltration, and the corruption of support systems—is a formidable threat in emerging industries where rules are still being written and oversight is weak. It leaves a critical question for the modern economy: As new digital-first industries emerge, how can we shield innovators from predators who rewrite the rules of competition with a playbook of pure destruction?
