Placeholder Content Image

Prince Philip's final phone call to King Charles revealed

<p>Prince Philip was known for his quick wit and sense of humour, and now his family have shared their favourite moments with him in the BBC documentary <em>Prince Philip: The Family Remembers</em>. </p> <p>In the documentary, King Charles revealed the cheeky remarks the Duke made in their final phone call just hours before his passing on April 9, 2021 at the age of 99. </p> <p>Charles recalled discussing the Duke's upcoming 100th birthday celebrations and having to raise his voice so his father could hear him better, saying: “We’re talking about your birthday! And whether there’s going to be a reception!” </p> <p>The Duke quipped: “Well, I’ve got to be alive for it, haven’t I?”</p> <p>King Charles fondly shared what he said to his father's cheeky remark, “I told him ‘I knew you’d say that!'”.</p> <p>In another part of the documentary, the monarch recalled the benefits of having young parents. </p> <p>“He was marvellous at arranging silly games. I mean, the fun of having obviously young parents was… there were lots of chasing around and mad things," he said.</p> <p>Prince William also shared some of his fond memories with his late grandfather, recalling the pranks they used to pull together, and one of them being squirting mustard all over the ceiling - much to the Queen’s annoyance.</p> <p> “He used to take the lid off [the tube] and put it in your hands … and then he’d squish your hands together to fire the mustard onto the ceiling," William said. </p> <p>“He used to get in a lot of trouble from my grandmother,” he added.</p> <p>William’s cousins, Princess Anne’s children Zara Tindall and Peter Phillips, also remembered the same prank. </p> <p>“He gets you to hold it in your hands and I can’t remember exactly what he says — but he ends up slamming your hands together… it goes all over the ceiling,” Zara said.</p> <p>Her brother Peter added: “I actually think the marks are still there.”</p> <p><em>Image: Canadian Press/ Shutterstock Editorial</em></p> <p> </p>

Family & Pets

Placeholder Content Image

Bondi Junction attack victim's family reveals final phone call

<p>Heartbreaking details have emerged of the final video call hero security guard Faraz Tahir made hours before the tragedy. </p> <p>Tahir, was one of six victims killed during the Bondi Junction stabbing attack on April 13, and the only male victim to die in the attacks as he confronted knifeman Joel Cauchi.</p> <p>His loved ones have shared details of the final video call he made before going to work on that tragic day, ahead of a coronial inquest into the massacre beginning on Tuesday. </p> <p>Tahir's family said he was very excited to be starting his new life in a country he described as safe and "very peaceful". </p> <p>"That day ... he was talking to the whole family on a video call in Pakistan, and he was dressed up, and he told us that he was preparing to go to a job," the family told <em>Seven News</em>. </p> <p>"He said it's my first shift in Bondi Junction ... and he was really excited.</p> <p>"He finally felt safe in Australia … he said 'Australia is very beautiful, Australia is very exciting and very peaceful.'"</p> <p>Tahir and colleague Muhammad Taha ran to help when they heard people screaming and shouting.</p> <p>His family said they were proud of the courage Tahir showed during the horrific event. </p> <p>"He was serving as a security guard, and he went above and beyond ... we definitely consider him a hero," they told <em>Seven News</em>. </p> <p>“He did what he was meant to do to protect humanity." </p> <p>“And his sacrifice will make things better in future... to prevent these sorts of incidents happening again.”</p> <p>The inquest is set to go over evidence and hear from a handful of witnesses, which the family said will bring back painful memories. </p> <p>“It is an emotional time... to be going through it again,” they said.</p> <p>"The memories will come back."</p> <p><em>Images: 7News</em></p>

Family & Pets

Placeholder Content Image

"I thought I was Bear Grylls": Woman speaks out after being trapped upside-down for 7 hours

<p>A young woman who spent hours stuck upside-down between two boulders has spoken out about her horrific <a href="https://oversixty.com.au/travel/travel-trouble/woman-rescued-after-getting-stuck-in-between-two-boulders" target="_blank" rel="noopener">ordeal</a> as she was reunited with her rescuers. </p> <p>Matilda Campbell, a 23-year-old from Newcastle, was on a trip away with friends in Laguna, about a 30-minute drive from Cessnock, when she dropped her phone between two huge rocks.</p> <p>The young woman climbed down to retrieve her phone, and when she got stuck upside-down, her friends called 000 for help. </p> <p>Paramedics had to move the boulders using a specialist winch to reach Matilda, before facing the tricky task of “navigating” her out from her precarious position.</p> <p>After suffering minor injuries from the ordeal, Matilda has spoken out about how she ended up in the sticky situation. </p> <p>“We wanted to see nature ... and we saw these beautiful rocks so we sat there ... and then my friend had my phone and it slipped off the rock,” she told <em>7News</em>.</p> <blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-permalink="https://www.instagram.com/reel/DBsj-x1CYI2/?utm_source=ig_embed&utm_campaign=loading" data-instgrm-version="14"> <div style="padding: 16px;"> <div style="display: flex; flex-direction: row; align-items: center;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"> </div> </div> </div> <div style="padding: 19% 0;"> </div> <div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"> </div> <div style="padding-top: 8px;"> <div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div> </div> <div style="padding: 12.5% 0;"> </div> <div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"> <div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"> </div> <div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"> </div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"> </div> </div> <div style="margin-left: 8px;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"> </div> <div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"> </div> </div> <div style="margin-left: auto;"> <div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"> </div> <div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"> </div> <div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"> </div> </div> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"> </div> </div> <p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DBsj-x1CYI2/?utm_source=ig_embed&utm_campaign=loading" target="_blank" rel="noopener">A post shared by 7NEWS Sydney (@7newssyd)</a></p> </div> </blockquote> <p>“And I thought oh no I’m still paying off that phone I need it ... so I ventured down and thought I was Bear Grylls ... and I slipped head first into the crevice where I was stuck for seven hours."</p> <p>“I didn’t freak out at the start ... it took me about half an hour to realise I was fully stuck and then I started to have a big cry."</p> <p>“I’m very thankful I was with my friends, otherwise it would have been a very different story.”</p> <p>Campbell has since been reunited with her rescuers, to whom she says she owes her life, as she said, “I’m just thankful to see them again ... I wouldn’t be here today without them. So, I’m really thankful.”</p> <p>Specialist rescue paramedic Peter Watts said the rescue was “challenging but incredibly rewarding”, saying after the rescue, “In my 10 years as a rescue paramedic, I had never encountered a job quite like this.”</p> <p>In total, the woman spent seven hours hanging upside-down before she was freed, with only minor scratches and bruises but still without her phone, which could not be retrieved.</p> <p><em>Image credits: 7News</em></p>

Travel Trouble

Placeholder Content Image

Aussie mum jailed after faking her own death for major insurance payout

<p>A Perth woman who faked her own death to secure a $700,000 insurance payout has been sentenced to three years behind bars. </p> <p>Karen Salkilld, 43, an F45 gym franchise owner, claimed she died in a car accident in Broome in December 2023. </p> <p>The mother-of-two, also provided a falsified death certificate, a coroner report and funeral documents, when she made the claim in January.</p> <p>A month later, she received more than $718,000 from Insuranceline, which she accessed by posing as her former partner who was the beneficiary of the sum and opening a bank account in her name. </p> <p>The "relatively sophisticated" scheme was initially successful, until police became suspicious and froze her account after she moved large amounts of the money around, according to<em> Nine News</em>. </p> <p>Salkilld had to visit Palmyra Police Station in person to certify her fake documents, but after three visits, officers realised something was up and arrested her in March. </p> <p>There is no evidence that her former partner knew of the crime. </p> <p>The fitness instructor admitted that she got the idea from a movie after she fell into debt, although she didn't specify which one. </p> <p>"Your offending could not be described as opportunistic," Judge Vicki Stewart told Perth District Court said in sentencing the fitness instructor. </p> <p>"It was calculated and required both effort and persistence."</p> <p>"You were living beyond your means and over-committed yourself," Stewart added. </p> <p>Salkilld pleaded guilty to gaining benefit by fraud and knowingly using a false record to defraud, and was sentenced to three years in prison on Monday. </p> <p>She was ordered to pay a $101,771 compensation to the insurance company. A restitution order for funds in the bank account was also issued - one for $549,195 and another for $67,995 - with the latter being held in the bank's fraud recoveries account. </p> <p>Speaking to <em>Nine News</em> outside court after the sentencing, Salkilld's estranged sister Ann said "it doesn't surprise me that she is capable of doing things like that."</p> <p>She will be eligible for parole in February 2026.</p> <p><em>Image: Nine News </em></p>

Legal

Placeholder Content Image

Are older adults more vulnerable to scams? What psychologists have learned about who’s most susceptible, and when

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554">Natalie C. Ebner</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p>About 1 in 6 Americans <a href="https://www.census.gov/library/stories/2023/05/2020-census-united-states-older-population-grew.html">are age 65 or older</a>, and that percentage <a href="https://www.ncoa.org/article/get-the-facts-on-older-americans">is projected to grow</a>. Older adults often hold positions of power, have retirement savings accumulated over the course of their lifetimes, and make important financial and health-related decisions – all of which makes them attractive targets for financial exploitation.</p> <p>In 2021, there were more than 90,000 older victims of fraud, according to the FBI. These cases resulted in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf">US$1.7 billion in losses</a>, a 74% increase compared with 2020. Even so, that may be a significant undercount, since embarrassment or lack of awareness <a href="https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf">keeps some victims from reporting</a>.</p> <p><a href="https://ncea.acl.gov/elder-abuse#gsc.tab=0">Financial exploitation</a> represents one of the most common forms of elder abuse. Perpetrators are often individuals in the victims’ inner social circles – family members, caregivers or friends – but can also be strangers.</p> <p>When older adults experience financial fraud, they typically <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/AgeandFraud/Infographic">lose more money</a> than younger victims. Those losses can have <a href="https://doi.org/10.1057/sj.2012.11">devastating consequences</a>, especially since older adults have limited time to recoup – dramatically reducing their independence, health and well-being.</p> <p>But older adults have been largely neglected in research on this burgeoning type of crime. We are <a href="https://ebnerlab.psych.ufl.edu/natalie-c-ebner-phd/">psychologists who study social cognition</a> and <a href="https://ebnerlab.psych.ufl.edu/didem-pehlivanoglu/">decision-making</a>, and <a href="https://ebnerlab.psych.ufl.edu/">our research lab</a> at the University of Florida is aimed at understanding the factors that shape vulnerability to deception in adulthood and aging.</p> <h2>Defining vulnerability</h2> <p>Financial exploitation involves a variety of exploitative tactics, such as coercion, manipulation, undue influence and, frequently, some sort of deception.</p> <p>The majority of current research focuses on <a href="https://doi.org/10.1002/acp.3052">people’s ability to distinguish between truth and lies</a> during interpersonal communication. However, deception occurs in many contexts – increasingly, over the internet.</p> <p>Our lab conducts laboratory experiments and real-world studies to measure susceptibility under various conditions: investment games, lie/truth scenarios, phishing emails, text messages, fake news and deepfakes – fabricated videos or images that are created by artificial intelligence technology.</p> <p>To study how people respond to deception, we use measures like surveys, brain imaging, behavior, eye movement and heart rate. We also collect health-related biomarkers, such as being a carrier of <a href="https://pubmed.ncbi.nlm.nih.gov/8346443/">gene variants</a> that increase risk for Alzheimer’s disease, to identify individuals with particular vulnerability.</p> <p>And <a href="https://doi.org/10.20900/agmr20230007">our work</a> shows that an older adult’s ability to detect deception is not just about their individual characteristics. It also depends on how they are being targeted.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=3 2262w" alt="A figure with two circles and an arrow between them. One circle shows icons that symbolize individual susceptibility to deception -- like a brain, and a walking cane -- while the other has icons of types of deception, like mail or a text message." /></a><figcaption><span class="caption">Vulnerability depends not only on the person, but also the type of fraud being used.</span> <span class="attribution"><span class="source">Natalie Ebner and Didem Pehlivanoglu</span></span></figcaption></figure> <h2>Individual risk factors</h2> <p>Better cognition, social and emotional capacities, and brain health are all associated with less susceptibility to deception.</p> <p>Cognitive functions, such as how quickly our brain processes information and how well we remember it, <a href="https://doi.org/10.1177/1745691619827511">decline with age</a> and impact decision-making. For example, among people around 70 years of age or older, declines in analytical thinking are associated with <a href="https://doi.org/10.1037/xap0000426">reduced ability to detect false news stories</a>.</p> <p>Additionally, low memory function in aging is associated with <a href="https://doi.org/10.1093/geronb/gby036">greater susceptibility to email phishing</a>. Further, according to recent <a href="https://osf.io/preprints/osf/6f2y9">research</a>, this correlation is specifically pronounced among older adults who carry a gene variant that is a genetic risk factor for developing Alzheimer’s disease later in life. Indeed, some research suggests that greater financial exploitability may serve as <a href="https://doi.org/10.1016/j.neubiorev.2022.104773">an early marker</a> of disease-related cognitive decline.</p> <p>Social and emotional influences are also crucial. Negative mood can enhance somebody’s ability to detect lies, while <a href="https://doi.org/10.1037/xap0000426">positive mood in very old</a> age can impair a person’s ability to detect fake news.</p> <p>Lack of support and loneliness exacerbate susceptibility to deception. Social isolation during the COVID-19 pandemic has led to <a href="https://doi.org/10.1093/gerona/glaa077">increased reliance on online platforms</a>, and older adults with lower digital literacy are <a href="https://doi.org/10.1093/geront/gnac188">more vulnerable to fraudulent emails and robocalls</a>.</p> <p>Finally, an individual’s brain and body responses play a critical role in susceptibility to deception. One important factor is <a href="https://doi.org/10.1016/j.tins.2020.10.007">interoceptive awareness</a>: the ability to accurately read our own body’s signals, like a “gut feeling.” This awareness is correlated with <a href="https://doi.org/10.1093/geroni/igad104.3714">better lie detection</a> in older adults.</p> <p>According to <a href="https://doi.org/10.1093/gerona/glx051">a first study</a>, financially exploited older adults had a significantly smaller size of insula – a brain region key to integrating bodily signals with environmental cues – than older adults who had been exposed to the same threat but avoided it. Reduced insula activity is also related to greater difficulty <a href="https://doi.org/10.1073/pnas.1218518109">picking up on cues</a> that make someone appear less trustworthy.</p> <h2>Types of effective fraud</h2> <p>Not all deception is equally effective on everyone.</p> <p><a href="https://doi.org/10.1145/3336141">Our findings</a> show that email phishing that relies on reciprocation – people’s tendency to repay what another person has provided them – was more effective on older adults. Younger adults, on the other hand, were more likely to fall for phishing emails that employed scarcity: people’s tendency to perceive an opportunity as more valuable if they are told its availability is limited. For example, an email might alert you that a coin collection from the 1950s has become available for a special reduced price if purchased within the next 24 hours.</p> <p>There is also evidence that as we age, we have greater difficulty detecting the “wolf in sheep’s clothing”: someone who appears trustworthy, but is not acting in a trustworthy way. In <a href="https://doi.org/10.1038/s41598-023-50500-x">a card-based gambling game</a>, we found that compared with their younger counterparts, older adults are more likely to select decks presented with trustworthy-looking faces, even though those decks consistently resulted in negative payouts. Even after learning about untrustworthy behavior, older adults showed greater difficulty overcoming their initial impressions.</p> <h2>Reducing vulnerability</h2> <p>Identifying who is especially at risk for financial exploitation in aging is crucial for preventing victimization.</p> <p>We believe interventions should be tailored, instead of a one-size-fits-all approach. For example, perhaps machine learning algorithms could someday determine the most dangerous types of deceptive messages that certain groups encounter – such as in text messages, emails or social media platforms – and provide on-the-spot warnings. Black and Hispanic consumers are <a href="https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf">more likely to be victimized</a>, so there is also a dire need for interventions that resonate with their communities.</p> <p>Prevention efforts would benefit from taking a holistic approach to help older adults reduce their vulnerability to scams. Training in <a href="https://doi.org/10.1007/s40520-019-01259-7">financial, health</a> and <a href="https://www.nature.com/articles/s41598-022-08437-0.pdf">digital literacy</a> are important, but so are programs to <a href="https://doi.org/10.1186/s12889-021-10363-1">address loneliness</a>.</p> <p>People of all ages need to keep these lessons in mind when interacting with online content or strangers – but not only then. Unfortunately, financial exploitation often comes from individuals close to the victim.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/227991/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554"><em>Natalie C. Ebner</em></a><em>, Professor of Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, Postdoctoral Researcher, Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-older-adults-more-vulnerable-to-scams-what-psychologists-have-learned-about-whos-most-susceptible-and-when-227991">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

Could a recent ruling change the game for scam victims? Here’s why the banks will be watching closely

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/jeannie-marie-paterson-6367">Jeannie Marie Paterson</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/nicola-howell-1160247">Nicola Howell</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>In Australia, it’s scam victims who foot the bill for the overwhelming majority of the money lost to scams each year.</p> <p>A 2023 <a href="https://download.asic.gov.au/media/mbhoz0pc/rep761-published-20-april-2023.pdf">review</a> by the Australian Securities and Investments Commission (ASIC) found banks detected and stopped only a small proportion of scams. The total amount banks paid in compensation paled in comparison to total losses.</p> <p>So, it was a strong statement this week when it was revealed the Australian Financial Conduct Authority (AFCA) had <a href="https://my.afca.org.au/searchpublisheddecisions/kb-article/?id=f9f8941f-7379-ef11-ac20-000d3a6acbb4">ordered</a> a bank – HSBC – to compensate a customer who lost more than $47,000 through a sophisticated bank impersonation or “spoofing” scam.</p> <p>This decision was significant. An AFCA determination is binding on the relevant bank or other financial institution, which has <a href="https://www.afca.org.au/make-a-complaint#:%7E:text=Any%20determinations%20we%20make%20are,service%20is%20free%20to%20access">no direct right of appeal</a>. It could have implications for the way similar cases are treated in future.</p> <p>The ruling comes amid a broader push for sector-wide reforms to give banks more responsibility for <a href="https://www.fico.com/blogs/detection-prevention-tackling-scams-every-angle">detecting</a>, deterring and responding to scams, as opposed to simply telling customers to be “more careful”.</p> <p>Here’s what you should know about this landmark ruling, and what it might mean for consumers.</p> <h2>A highly sophisticated ‘spoofing’ scam</h2> <p>You might be familiar with “push payment” scams that trick the victim into paying money to a dummy account. These include the “<a href="https://www.acma.gov.au/articles/2024-01/scam-alert-re-emergence-hi-mum-scam">mum I’ve lost my phone</a>” scam and some <a href="https://www.scamwatch.gov.au/types-of-scams/online-dating-and-romance-scams">romance</a> scams.</p> <p>The <a href="https://www.smh.com.au/national/dragged-kicking-and-screaming-banking-giant-loses-battle-against-scam-victim-20241015-p5kide.html">recent case</a> concerned an equally noxious “bank impersonation” or “spoofing” scam. The complainant – referred to as “Mr T” – was tricked into giving the scammer access to his HSBC account, from which an unauthorised payment was made.</p> <p>The scammer sent Mr T a text message, purportedly asking him to investigate an attempted Amazon transaction.</p> <p>In an effort to respond to the (fake) unauthorised Amazon purchase, Mr T revealed security passcodes to the scammer, enabling them to transfer $47,178.54 from his account and disappear with it.</p> <p>The fact Mr T was dealing with scammers was far from obvious – scammers had information about him one might reasonably expect only a bank would know, such as his bank username.</p> <p>On top of this, the scam text message appeared in a thread of other legitimate text messages that had previously been sent by the real HSBC.</p> <h2>AFCA’s ruling</h2> <p>HSBC argued to AFCA that having to pay compensation should be ruled out under the <a href="https://download.asic.gov.au/media/lloeicwb/epayments-code-published-02-june-2022.pdf">ePayments Code</a>, a voluntary code of practice administered by ASIC.</p> <p>Under this code, a bank is not required to compensate a customer for an unauthorised payment if that customer has disclosed their passcode. The bank argued the complainant had voluntarily disclosed these codes to the scammer, meaning the bank didn’t need to pay.</p> <p>AFCA disagreed. It noted the very way the scam had worked was by creating a sense of urgency and crisis. AFCA considered that the complainant had been manipulated into disclosing the passcodes and had not acted voluntarily.</p> <p>AFCA awarded compensation covering the vast majority of the disputed transaction amount, lost interest charged to a home loan account, and $5,000 towards Mr T’s legal costs.</p> <p>It also ordered the bank to pay compensation of $1,000 for poor customer service in dealing with the matter, including communication delays.</p> <h2>Other cases may be more complex</h2> <p>In this case, the determination was relatively straightforward. It found Mr T had not voluntarily disclosed his account information, so was not excluded from being compensated under the ePayments Code.</p> <p>However, many payment scams fall outside the ePayments Code because they involve the customer directly sending money to the scammer (as opposed to the scammer accessing the customer’s account). That means there is no code to direct compensation.</p> <p>Still, AFCA’s jurisdiction is broader than merely applying a code. In considering compensation for scam losses, AFCA must consider what is “fair in all the circumstances”. This means taking into account:</p> <ul> <li>legal principles</li> <li>applicable industry codes</li> <li>good industry practice</li> <li>previous AFCA decisions.</li> </ul> <p>Relevant factors might well include whether the bank was proactive in responding to known scams, as well as the challenges for individual customers in identifying scams.</p> <h2>Broader reforms are on the way</h2> <p>At the heart of this determination by AFCA is a recognition that, increasingly, detecting sophisticated scams can be next to impossible for customers, which can mean they don’t act voluntarily in making payments to scammers.</p> <p>Similar reasoning has informed a range of recent reform initiatives that put more responsibility for detecting and responding to scams on the banks, rather than their customers.</p> <p>In 2023, Australia’s banking sector committed to a new “<a href="https://www.ausbanking.org.au/scam-safe-accord/">Scam-Safe Accord</a>”. This is a commitment to implement new measures to protect customers, including a confirmation of payee service, delays for new payments, and biometric identity checks for new accounts.</p> <p>Changes on the horizon could be more ambitious and significant.</p> <p>The proposed <a href="https://treasury.gov.au/consultation/c2024-573813">Scams Prevention Framework</a> legislation would require Australian banks, telcos and <a href="https://pursuit.unimelb.edu.au/articles/accc-vs-big-tech-round-10-and-counting">digital platforms</a> to take reasonable steps to prevent, detect, report, disrupt and respond to scams.</p> <p>It would also include a compulsory external dispute resolution process, like AFCA’s, for consumers seeking compensation for when any of these institutions fail to comply.</p> <p>Addressing scams is not just an Australian issue. In the United Kingdom, newly introduced <a href="https://www.bbc.com/news/articles/cy94vz4zd7zo">rules</a> make paying and receiving banks responsible for compensating customers, for scam losses up to £85,000 (A$165,136), unless the customer is grossly negligent.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/241558/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/jeannie-marie-paterson-6367">Jeannie Marie Paterson</a>, Professor of Law, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/nicola-howell-1160247">Nicola Howell</a>, Senior lecturer, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/could-a-recent-ruling-change-the-game-for-scam-victims-heres-why-the-banks-will-be-watching-closely-241558">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

"This is horrific": Queen icon calls out convincing scam

<p>Brian May has spoken out after becoming the target of a dangerous scam, urging people to be careful online. </p> <p>The guitarist of iconic rock band Queen was made aware of the scam by a fan, who sent him the TikTok of what seems to be May himself offering concert tickets at a discount. </p> <p>The video, which is actually AI-generated and has nothing to do with May or with Queen, shows the rockstar offering music fans the chance to see a concert from backstage. </p> <p>“I hope you’re all well out there,” says the fake Brian May in the video. “Some good news. Backstage tickets for my next show in your cities are now going for only $800, which were previously $2000. I’m only selecting 10 people in the comments, so if you’re ready to make payment, comment, ‘ready’.”</p> <p>May responded to the post publicly, sharing his horror and anger with fans over the “creepy” video, saying, “My God. This is horrific.”</p> <p>“I suppose this is now so easy to do – and there are always people who will sink to any depths to try to make a quick buck. Disgusting.”</p> <p>He continued, “Thanks for the alert dear (TikTok username) stereojazz. I’ve alerted our team and hopefully we can squash this.”</p> <p>Fans were quick to comment that they had almost been fooled by the convincing video. </p> <p>“That they abuse your beautiful personality for this scam hurts even more and is really scary. I hate it,” commented one. </p> <p>“It is insanely terrifying what AI can do these days,” wrote another.</p> <p><em>Image credits: TikTok</em></p>

Legal

Placeholder Content Image

Do mobile phones cause brain cancer? Science makes definitive call

<p>The question of whether mobile phones - specifically the electromagnetic radiation or radio waves emitted by these devices - cause cancer has been debated and researched for a long time, and now scientists have made a definitive call. </p> <p>A new comprehensive review commissioned by the World Health Organization has found that mobile phones are NOT linked to brain and head cancers. </p> <p>The systematic review, led by the Australian Radiation Protection and Nuclear Safety Agency (Arpansa), examined over 5,000 studies, which included 63 observational studies on humans published between 1994 and 2022 and is "the most comprehensive review to date" according to review lead author, associate prof Ken Karipidis. </p> <p>“We concluded the evidence does not show a link between mobile phones and brain cancer or other head and neck cancers," he said. </p> <p>The review, which was published on Wednesday, focused on cancers of the nervous system, salivary gland and brain tumours. </p> <p>They found no overall association between mobile phone use and cancer, even if people have used it for a long time (over 10 years) or spend a lot of time on their phones. </p> <p>“I’m quite confident with our conclusion. And what makes us quite confident is … even though mobile phone use has skyrocketed, brain tumour rates have remained stable,” Karipidis continued. </p> <p>Despite emitting electromagnetic radiation, also known as radio waves, the exposure is relatively low. </p> <p>Karipidis said people hear the word radiation and assume it is similar to nuclear radiation, “and because we use a mobile phone close to the head when we’re making calls, there is a lot of concern.”</p> <p>He clarified that “radiation is basically energy that travels from one point to another. There are many different types, for example, ultraviolet radiation from the sun." </p> <p>“We’re always exposed to low-level radio waves in the everyday environment.”</p> <p>While exposure from mobile phones is still low, it is much higher than exposure from any other wireless technology sources since they are used close to the head, Karipidis said. </p> <p>The association between mobile phones and cancers came about from early studies comparing differences between those with and without brain tumours and asking about their exposure history. </p> <p>According to Karipidis, who is also the vice-chair of the International Commission on Non-Ionizing Radiation Protection, the results from these kind of studies tend to be biased, as the group with the tumour tend to overreport their exposure. </p> <p>Based on these early studies WHO’s International Agency for Research on Cancer (IARC) designated radio-frequency fields like those from mobile phones as a possible cancer risk, but Karipidis said "this classification doesn’t mean all that much”.</p> <p>This is because the IARC has different classifications of cancer risk, with some substances classified as  a “definite” carcinogen (such as smoking), and others as “probable” or “possible” carcinogens.</p> <p>Tim Driscoll, a professor at the University of Sydney and chair of the Australian Cancer Council’s occupational and environmental cancers committee, also backed the systematic review. </p> <p>“I think people should feel reassured by this study … but it’s worthwhile just remembering that the studies aren’t perfect, but the weight of evidence certainly is that mobile phones should be considered safe to use in terms of any concerns about increased risk of cancer,” Driscoll said.</p> <p><em>Images: Shutterstock</em></p> <p> </p>

Body

Placeholder Content Image

Romance fraud doesn’t only happen online – it can turn into real-world deception

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>We often think of fraudsters as people on the opposite side of the world. They will manipulate and exploit victims through words on a computer screen, or loving messages through the phone. But romance fraud can also happen in person, with the fraudster sleeping in the bed beside you.</p> <p>This was the circumstance Australian writer Stephanie Wood found herself in. It’s also the basis for the new <a href="https://www.paramountanz.com.au/news/fake-breaks-subscription-and-streaming-records-on-paramount/">television series Fake</a>, currently screening on Paramount+. A dramatisation of Wood’s powerful memoir by the same name, the series outlines the many lies and betrayals of an intimate relationship.</p> <p>It’s a brutal insight into the world of deception which characterises romance fraud.</p> <h2>When love hurts</h2> <p>Romance fraud (or romance scams) is what it sounds like – offenders use the guise of a relationship to gain a financial reward. In most cases, it’s through the direct transfer of money from the victim, but it can also be through using personal credentials to commit identity crimes.</p> <p>From the outside, it’s hard to understand how romance fraud is so effective. However, <a href="https://eprints.qut.edu.au/233966/">research has documented</a> the range of grooming techniques, social engineering tactics and methods of psychological abuse deployed by offenders. Offenders know exactly what to do and say to gain the compliance of their victim.</p> <hr /> <hr /> <p>Offenders target a person’s vulnerability and work hard to build strong levels of trust. There are endless calls, texts and emails that create a bond. Then follows the inevitable “crisis”, whereby the offender needs money urgently for a health emergency, criminal justice situation, business need or even a <a href="https://www.accc.gov.au/media-release/romance-baiting-scams-on-the-rise">cryptocurrency investment</a> opportunity.</p> <p>For many, this can result in ongoing payments and substantial losses. Over <a href="https://www.accc.gov.au/about-us/publications/serial-publications/targeting-scams-reports-on-scams-activity/targeting-scams-report-of-the-accc-on-scams-activity-2023">A$200 million</a> was reported lost by Australians to this fraud type in 2023, but this is likely a gross underestimation of actual figures. It also doesn’t capture the many <a href="https://www.aic.gov.au/sites/default/files/2020-05/29-1314-FinalReport.pdf">non-financial harms</a>, including physical and emotional declines in wellbeing.</p> <p>When the relationship finally ends, it’s too late. The money is gone, the extent of the deception is laid bare, and recovery from the heartache and loss is a constant battle.</p> <p>There is a well-documented “<a href="https://journals.sagepub.com/doi/full/10.1177/1748895815603773">double hit</a>” of victimisation, with individuals needing to grieve the relationship as well as any financial losses.</p> <h2>Seeing is not believing</h2> <p>There are countless incidents of romance fraud where the offender and victim never meet: the deception takes place entirely online. But it’s important to know fraudsters also operate in person.</p> <p>Wood’s memoir details an extraordinary level of lies and dishonesty presented to her throughout her relationship. Stories that laid the groundwork for later fabrications. Stories that were deliberate and calculated in how they were used to gain her trust, and later used against her.</p> <p>The motivations of these real-world deceivers are not always straightforward. Often it’s about money, but not always. For Wood, not being asked for money allayed potential suspicions, but it didn’t reduce her feelings of loss and emotional devastation upon discovering the extent of the lies.</p> <figure><iframe src="https://www.youtube.com/embed/K_1Akqhjy6M?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe></figure> <p>Wood is by no means alone in her experience. Marketing executive Tracy Hall endured a similarly sophisticated and all-encompassing level of deceit in her relationship with <a href="https://www.theguardian.com/australia-news/2019/jun/20/conman-hamish-mclaren-jailed-for-up-to-16-years-after-swindling-76m-from-victims">convicted conman Hamish McLaren</a> (known to her as Max Tavita).</p> <p>In her book, <a href="https://tracyhall.com.au/the-last-victim">The Last Victim</a>, Hall recounts snippets of their daily lives over a 16-month period, with McLaren portraying himself as a successful professional in finance. His mail was addressed to Max Tavita and his phone conversations were with real people. Yet his whole identity and the world he represented to Hall was a complete fabrication.</p> <p>The experiences of Wood and Hall highlight the sheer depth of elaborate deception that can be perpetrated in an intimate relationship. Critically, it highlights romance fraud isn’t relegated to an online environment.</p> <h2>How can we prevent romance fraud?</h2> <p>There is an overwhelming amount of <a href="https://eprints.qut.edu.au/83702/">shame and stigma</a> associated with romance fraud. The dynamics of these deceptive relationships are misunderstood, and this perpetuates negative stereotypes and a discourse of victim blaming, even from friends and family.</p> <p>In hindsight, the warning signs might seem obvious, but fraudsters tend to effectively disguise these in real time and deploy deliberate tactics to overcome any suspicion.</p> <p>We must all create a culture that empowers victims to come forward to raise awareness. This isn’t intended to create fear or anxiety, but to normalise the threat fraud poses, and to allow for difficult conversations if it happens. Ongoing silence from victims only favours the offender.</p> <h2>How to protect yourself from romance fraud</h2> <p>It’s inevitable we’ll continue to swipe right in our efforts to find love. But keep a healthy level of scepticism and an open dialogue with family and friends in any quest for a new relationship.</p> <p>Don’t be afraid to conduct your own searches of people, places and situations presented to you in a relationship. There is a memorable moment in Fake where the protagonist refutes her friend’s offer of assistance, saying “this is a love story not an investigation”. Sadly, sometimes an investigation is necessary.</p> <p>No matter what the circumstance or the person, think carefully before sending any money. Only give what you are willing to lose.</p> <p>Deception comes in many forms. We must recognise it for what it is, and the impact it has on victims. But we must also not give into those who lie, and let them define who we are or dictate our ability to trust.</p> <p><em>If you or someone you know has been a victim of romance fraud, you can report it to <a href="https://www.cyber.gov.au/report-and-recover/report">ReportCyber</a>. For support, contact <a href="https://www.idcare.org/">iDcare</a>. For prevention advice, consult <a href="https://www.scamwatch.gov.au/">Scamwatch</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/237653/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/romance-fraud-doesnt-only-happen-online-it-can-turn-into-real-world-deception-237653">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

New support system helps older Aussies who have fallen victim to scams

<p>A new support system has been set up to help vulnerable older Australians who have fallen victim to dangerous scams. </p> <p>With millions of Aussies targeted every year, many of these targets are elderly with 30 percent of victims hesitant to come forward because they are too embarrassed to admit what's happened to them.</p> <p>One such victim, 86-year-old Mary, said she was humiliated after falling for a scam saying she is old enough to know better. </p> <p>"It serves me right, I shouldn't have been so trusting," she said.</p> <p>"You blame yourself and you don't really want to tell people how stupid you are, so you think, 'Well, I'll just have to bear it'."</p> <p>Mary was scammed when she received a call from a man pretending to be a technician, saying he needed access to her computer to resolve a problem in her area. </p> <p>Step by step, the "technician" got Mary to log-in and give him complete access to her entire online identification, completely cleaning her out of $20,000 in savings.</p> <p>This is why <a title="ID Support NSW" href="https://www.nsw.gov.au/id-support-nsw" target="_blank" rel="noopener">ID Support NSW</a> is now offering a free service to help older Australians be able to protect themselves online and spot suspicious activity.</p> <p>"The most common scams are romance and impersonation scams, where people pretend to be someone they're not," ID Support NSW's Jacqueline Wilson told <em><a href="https://9now.nine.com.au/today/scam-awareness-week-id-support-nsw-offering-free-help-for-older-australians/20d3f8d6-fe32-4b1d-af32-294e47f4412d" target="_blank" rel="noopener">Today</a></em>.</p> <p>"Most start with a text or call and once someone responds or engages, they usually end up losing money."</p> <p>Jacqueline said the best thing you could do if you even suspect a scammer was to just hang up the phone, saying, "You don't need to indulge them, you don't need to be polite, you don't need to engage in a long conversation."</p> <p><em>Image credits: Today</em> </p>

Legal

Placeholder Content Image

It’s tax time and scammers are targeting your myGov account. Here’s how to stay safe

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>For many, tax time is an exciting part of the year – there’s the potential for a refund. However, it’s also an attractive time for fraudsters looking for ways to get money and deceive unsuspecting victims.</p> <p>Each year Australians lose large amounts of money to scams. In 2023, Australians reported <a href="https://www.accc.gov.au/media-release/scam-losses-decline-but-more-work-to-do-as-australians-lose-27-billion">losses of more than A$2.7 billion</a>. While this is a slight reduction from the $3.1 billion in 2022, there are still millions of victims who’ve suffered at the hands of scammers.</p> <p>Impersonation scams are one common approach. Scamwatch reports that in 2023, <a href="https://www.scamwatch.gov.au/news-alerts/shopping-for-online-bargains-this-black-friday-weekend-make-sure-its-the-real-deal">70% of reports to them</a> involved impersonation.</p> <p>A large number of these were linked to the Australian Taxation Office (ATO) and myGov.</p> <h2>What is an impersonation scam?</h2> <p>Impersonation scams are what they sound like: when an offender pretends to be someone or something they are not. Offenders may pretend to be family members or friends in our contact lists.</p> <p>In many cases, they will say they’re from an organisation such as a bank or a well-known retailer, or a government department – like the ATO.</p> <p>Offenders take on the identity of a known and trusted organisation to increase the chances of success. While we may ignore communications from unknown entities and strangers, we’re more likely to engage with what’s familiar.</p> <p>Additionally, the ATO has a powerful status as a government agency, and we are unlikely to ignore its messages – especially at tax time.</p> <h2>What are they trying to get out of my myGov account?</h2> <p>myGov is the gateway to a range of government services, including Medicare, Centrelink, My Health Record, the National Disability Insurance Scheme, and of course, the ATO.</p> <p>Being able to log in to myGov gives offenders access to a wide range of your personal details. This can help them build a fuller profile of you to potentially commit identity theft (such as opening new accounts in your name).</p> <p>There’s also the potential for direct fraud. With access to myGov, offenders can change your bank account details and redirect any refunds into their accounts, whether from the ATO or other linked services.</p> <p>They can even submit false tax returns, medical claims or other forms to obtain fraudulent funds. As the legitimate owner of the account, you may not immediately notice this.</p> <h2>What does a myGov scam look like?</h2> <p>In most instances, a myGov scam will look like one of the many phishing attempts we all receive on a daily basis. While each approach can be worded differently, their desired outcome is the same: to acquire your personal information.</p> <p>Fraudsters are sending text messages and emails pretending to be from the ATO, advising you there’s a refund available if you click the provided link.</p> <p>Another approach is to flag a “problem” with your tax return or bank account, and direct you to take immediate action via a link. Creating a sense of urgency can trick users into acting in the moment, without thinking through the request.</p> <p>The text or email may also be very neutral, simply stating there’s a new message waiting – with a link to where you can read it.</p> <p>Regardless of what the message says, the goal is to direct you to a website that looks genuine, but is fake. If you enter your myGov details into such a fake site, the offender can capture your login details and use them to log into your actual myGov account.</p> <h2>What to do if you’ve been a victim?</h2> <p>If you have clicked on a scam link and provided your personal details, there are steps you can take.</p> <p><strong>Change your password</strong> and review your account settings if you still have access to your myGov account.</p> <p><strong>Check your bank accounts</strong>, to see what, if anything, has been lost. Contact your bank or financial institution immediately if you notice any withdrawals or suspicious transactions.</p> <p><strong>Contact any other organisation</strong> linked to your myGov account to see if any unauthorised actions have been taken.</p> <p>For anyone who has lost personal information and experienced identity crime, <a href="https://www.idcare.org/">IDCARE is the national support centre</a> for identity crime victims. They will be able to assist with a personalised response plan to your specific situation.</p> <h2>How do I keep my account safe?</h2> <p><strong>Never click on links</strong> in text messages or emails that direct you to log in to your accounts. Always access your accounts independently, through details you have found independently of any text or email.</p> <p><strong>Review your security settings.</strong> There have been recent reports of people’s myGov accounts being targeted <a href="https://www.theguardian.com/australia-news/article/2024/aug/01/ato-mygov-tax-return-refund-scam">with repeated login attempts</a>. Using your unique eight-digit myGov username for logging in can be safer than <a href="https://my.gov.au/en/about/help/mygov-website/help-using-your-account/manage-sign-in-details#updatingyourusername">using your email address</a>.</p> <p><strong>Enable <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a></strong> where possible. myGov uses two-factor authentication in the form of a text message in addition to an online login. While this is not foolproof, it offers an additional layer of protection and can stop offenders accessing your account with only partial pieces of your information.</p> <p><strong>Be vigilant on all communications.</strong> Always keep in mind that all may not be what it seems and the person you are communicating with may not be who they say they are. It is okay to be sceptical and do your own checks to verify details of what is presented to you.</p> <p>Remember, fraudsters thrive on the silence and shame of those who respond or fall victim to their scams. We need to communicate openly about these schemes and talk to family and friends, to increase everyone’s knowledge and awareness.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/235785/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/its-tax-time-and-scammers-are-targeting-your-mygov-account-heres-how-to-stay-safe-235785">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

Yes, blue light from your phone can harm your skin. A dermatologist explains

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p>Social media is full of claims that everyday habits can harm your skin. It’s also full of recommendations or advertisements for products that can protect you.</p> <p>Now social media has blue light from our devices in its sights.</p> <p>So can scrolling on our phones really damage your skin? And will applying creams or lotions help?</p> <p>Here’s what the evidence says and what we should really be focusing on.</p> <h2>Remind me, what actually is blue light?</h2> <p>Blue light is part of the visible light spectrum. Sunlight is the strongest source. But our electronic devices – such as our phones, laptops and TVs – also emit it, albeit at levels <a href="https://melasmaclinic.com.au/wp-content/uploads/2024/01/Melasma-LEDS.pdf">100-1,000 times</a> lower.</p> <p>Seeing as we spend so much time using these devices, there has been some concern about the impact of blue light on our health, including <a href="https://theconversation.com/do-blue-light-glasses-really-work-can-they-reduce-eye-strain-or-help-me-sleep-213145">on our eyes and sleep</a>.</p> <p>Now, we’re learning more about the impact of blue light on our skin.</p> <h2>How does blue light affect the skin?</h2> <p>The evidence for blue light’s impact on skin is still emerging. But there are some interesting findings.</p> <p><strong>1. Blue light can increase pigmentation</strong></p> <p><a href="https://academic.oup.com/ced/article-abstract/46/5/934/6598472?redirectedFrom=fulltext&amp;login=false">Studies</a> <a href="https://onlinelibrary.wiley.com/doi/full/10.1111/srt.13401">suggest</a> exposure to blue light can stimulate production of melanin, the natural skin pigment that gives skin its colour.</p> <p>So too much blue light can potentially worsen hyperpigmentation – overproduction of melanin leading to dark spots on the skin – especially in people with darker skin.</p> <p><strong>2. Blue light can give you wrinkles</strong></p> <p>Some research <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6280109/">suggests</a> blue light might damage collagen, a protein essential for skin structure, potentially accelerating the formation of wrinkles.</p> <p>A laboratory <a href="https://pubmed.ncbi.nlm.nih.gov/29399830/">study suggests</a> this can happen if you hold your device one centimetre from your skin for as little as an hour.</p> <p>However, for most people, if you hold your device more than 10cm away from your skin, that would reduce your exposure <a href="https://en.wikipedia.org/wiki/Inverse-square_law">100-fold</a>. So this is much less likely to be significant.</p> <p><strong>3. Blue light can disrupt your sleep, affecting your skin</strong></p> <p>If the skin around your eyes looks dull or puffy, it’s easy to blame this directly on blue light. But as we know blue light affects sleep, what you’re probably seeing are some of the visible signs of sleep deprivation.</p> <p>We know blue light is particularly good at <a href="https://journals.physiology.org/doi/full/10.1152/japplphysiol.01413.2009?rss=1">suppressing</a> production of melatonin. This natural hormone normally signals to our bodies when it’s time for sleep and helps regulate our sleep-wake cycle.</p> <p>By suppressing melatonin, blue light exposure before bed disrupts this natural process, making it harder to fall asleep and potentially reducing the <a href="https://www.tandfonline.com/doi/abs/10.1080/07420528.2023.2173606">quality of your sleep</a>.</p> <p>The stimulating nature of screen content further disrupts sleep. Social media feeds, news articles, video games, or even work emails can keep our brains active and alert, hindering the transition into a sleep state.</p> <p>Long-term sleep problems can also <a href="https://academic.oup.com/ced/article-abstract/40/1/17/6621145?login=false">worsen</a> existing skin conditions, such as acne, eczema and rosacea.</p> <p>Sleep deprivation can elevate cortisol levels, a stress hormone that breaks down collagen, the protein responsible for skin’s firmness. Lack of sleep can also weaken the skin’s natural barrier, making it more susceptible to environmental damage and dryness.</p> <h2>Can skincare protect me?</h2> <p>The beauty industry has capitalised on concerns about blue light and offers a range of protective products such as mists, serums and lip glosses.</p> <p>From a practical perspective, probably only those with the more troublesome hyperpigmentation known as <a href="https://dermnetnz.org/topics/melasma">melasma</a> need to be concerned about blue light from devices.</p> <p>This condition requires the skin to be well protected from all visible light at all times. The only products that are totally effective are those that block all light, namely mineral-based suncreens or some cosmetics. If you can’t see the skin through them they are going to be effective.</p> <p>But there is a lack of rigorous testing for non-opaque products outside laboratories. This makes it difficult to assess if they work and if it’s worth adding them to your skincare routine.</p> <h2>What can I do to minimise blue light then?</h2> <p>Here are some simple steps you can take to minimise your exposure to blue light, especially at night when it can disrupt your sleep:</p> <ul> <li> <p>use the “night mode” setting on your device or use a blue-light filter app to reduce your exposure to blue light in the evening</p> </li> <li> <p>minimise screen time before bed and create a relaxing bedtime routine to avoid the types of sleep disturbances that can affect the health of your skin</p> </li> <li> <p>hold your phone or device away from your skin to minimise exposure to blue light</p> </li> <li> <p>use sunscreen. Mineral and physical sunscreens containing titanium dioxide and iron oxides offer broad protection, including from blue light.</p> </li> </ul> <h2>In a nutshell</h2> <p>Blue light exposure has been linked with some skin concerns, particularly pigmentation for people with darker skin. However, research is ongoing.</p> <p>While skincare to protect against blue light shows promise, more testing is needed to determine if it works.</p> <p>For now, prioritise good sun protection with a broad-spectrum sunscreen, which not only protects against UV, but also light.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/233335/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, Associate Professor of Dermatology, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/yes-blue-light-from-your-phone-can-harm-your-skin-a-dermatologist-explains-233335">original article</a>.</em></p> </div>

Body

Placeholder Content Image

Optus giving away 20,000 free phones to vulnerable customers

<p>Optus will be giving away 20,000 mobile phones to vulnerable customers ahead of the 3G network shut down. </p> <p>Following the footsteps of Telstra, who gave out <a href="https://www.oversixty.com.au/finance/money-banking/telstra-giving-free-phones-to-elderly-and-remote" target="_blank" rel="noopener">12,000 mobile phones</a> to their most vulnerable remote and elderly customers last month, Optus will offer thousands of free mobile phones to customers enduring financial hardship and vulnerable customers finding it difficult to replace their current phones. </p> <p>“We know that many impacted customers are actually using a 4G handset that reverts to 3G for calls, so it’s vital these customers understand the importance of upgrading their handsets when notified,” Optus’ head of new products Harvey Wright said.</p> <p>Messages have been sent to eligible customers, and the telco giant has also rolled out special deals encouraging Australian's to upgrade. </p> <p>The move to switch off 3G means that soon certain mobile devices will no longer be able to send texts, make calls, or contact triple-0 in an emergency. A few older 4G handsets will also be affected. </p> <p>Telstra will turn off their 3G network on August 31, while Optus will turn it off on September 1. </p> <p>TPG Telecom and Vodafone have already turned it off. </p> <p>Australia's mobile network operators say that the move will help boost the capacity, speed and reliability of the newer 4G and 5G networks. </p> <p>The Australian Mobile Telecommunications Association (AMTA) have also urged customers to take action to ensure that they stay connected. </p> <p>“Whether it’s your day-to-day mobile or one you keep in the drawer for an emergency, we encourage you to check all of your devices to ensure they will be supported once Australia’s 3G networks are switched off,” AMTA chief executive Louise Hyland said. </p> <p>The AMTA suggests that concerned customers should visit their <a href="https://amta.org.au/3g-closure/" target="_blank" rel="noopener">website</a> to find out if their devices will be supported. </p> <p>“It is important to note that while 3G networks are still in operation, those affected mobile devices will continue to connect to any available 3G network while in coverage, to make emergency calls to triple-0,” Hyland said.</p> <p>“However, once the 3G networks are fully closed, these phones will not be able to make emergency calls.</p> <p>“It is crucial to act now if you know you have an older mobile device and you haven’t already upgraded.”</p> <p><em>Image: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Been scammed? Here's how to financially recover

<p>Many people feel shame and embarrassment after realising they have been scammed. But you shouldn’t. You did nothing wrong; you are the victim of a crime. </p> <p>Not only are such feelings bad for your mental wellbeing, but they also often stop people reporting the scam or taking action to avoid further losses. </p> <p>Remember too that you’re not alone: victims reported more than 601,000 scams to the ACCC in 2023, together losing a staggering $2.74 billion. People of all ages, professions, and backgrounds have been affected. </p> <p>As hard as it may be, try to leave emotion aside and approach this like any other money matter – logically and methodically. Doing so will help you act faster and more decisively, which is crucial to your financial recovery. </p> <p>The following checklist will help you through this process:</p> <ul> <li><strong>Step 1 – Try to recoup your stolen money</strong></li> </ul> <p>Report the scam immediately. Contact your bank or card provider to stop the transaction being processed. Notify the company or marketplace where it occurred – they may have options to reverse the payment or for you to claim compensation for fraud. </p> <p>Also inform the ACCC’s Scamwatch and police if relevant, which may aid in tracking down the scammer and will help them alert the wider public on what to look out for. </p> <p>Unfortunately, the money is likely gone for good, but prompt action may just help you get some or all of it back. </p> <ul> <li><strong>Step 2 – Secure your accounts from further thefts</strong></li> </ul> <p>Once scammers have found a way to steal money, they often go back to try for more. Don’t let them! </p> <p>Freeze or cancel affected debit and credit cards, accounts etc. Change and strengthen all your passwords. Set up two-factor authentication if you haven’t already. Remove any suspicious applications on electronic devices. </p> <p>Double check the registrations of any business, adviser or tradesperson before engaging their services. Regularly check your superannuation, investments etc. to monitor for any inconsistencies.</p> <ul> <li><strong>Step 3 – Safeguard your cash flow</strong></li> </ul> <p>Don’t multiplying your losses by racking up new debts to cover the stolen money. That means limiting the use of credit cards, payday lenders and Buy Now, Pay Later schemes. Consider paying with cash instead to help you stick to a budget.</p> <p>If you have lost everything, register with Centrelink for income support. You may also be able to apply for hardship provisions with your bank, phone and energy providers and other essential services.</p> <ul> <li><strong>Step 4 – Get reputable advice</strong></li> </ul> <p>Legal advice may be able to get you out of bogus contracts, like loans or phone plans, and help you in the event your personal information has been stolen (which can be used in various ways to steal money). If you can’t afford a lawyer, there are free alternatives such as Legal Aid or Community Legal Centres. Specialist services such as the Women’s Legal Service may offer support where partner coercion or domestic abuse is involved.</p> <p>Accounting and financial advice may also help you navigate assistance options and longer term recovery efforts.</p> <ul> <li><strong>Step 5 – Rebuild your finances</strong></li> </ul> <p>Your ability to rebuild your finances after a scam will depend on a range of factors, including how much was lost plus your age and circumstances.</p> <p>You could seek to increase your earnings and/or cut your spending by tweaking your household budget, delaying retirement, or temporarily taking a second job to boost your income. </p> <p>Another option is to make your remaining finances work harder than before, such as adjusting your investment strategies (e.g. changing your risk weightings or selling assets) including within your superannuation or accessing equity in your home.</p> <p>If you’re a self-funded retiree, you may now qualify for a part or full pension if your scam losses push your total assets below the means test threshold.</p> <p>Ultimately, the most important things when dealing with the fallout from a scam is to look after yourself and protect what you have left.</p> <p>Scammers have already taken off with your dollars. Don’t let them steal your sense too!</p> <p><em><strong>Helen Baker is a licensed Australian financial adviser and author of On Your Own Two Feet: The Essential Guide to Financial Independence for all Women. Helen is among the 1% of financial planners who hold a master’s degree in the field. Proceeds from book sales are donated to charities supporting disadvantaged women and children. Find out more at <a href="http://www.onyourowntwofeet.com.au/">www.onyourowntwofeet.com.au</a></strong></em></p> <p><em><strong>Disclaimer: The information in this article is of a general nature only and does not constitute personal financial or product advice. Any opinions or views expressed are those of the authors and do not represent those of people, institutions or organisations the owner may be associated with in a professional or personal capacity unless explicitly stated. Helen Baker is an authorised representative of BPW Partners Pty Ltd AFSL 548754.</strong></em></p> <p><em>Image </em><em>credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Aussies warned over new nbn scam

<p>Aussies have been warned against a new nbn scam targeting businesses and residents. </p> <p>Last year,  about 1,800 Australians lost more than $1.2 million to scammers pretending to be nbn employees in a remote access scam. </p> <p>Now, they have found a new way to scam unsuspecting businesses and residents by pretending to be employees and getting people to hand over their personal details and money in areas where <em>actual</em> nbn employees are working. </p> <p>The opportunistic scammers have been randomly knocking on doors or cold calling homes in areas where nbn technicians are installing new fibre. </p> <p>A few people have already been duped, with nbn impersonators calling customers claiming they need money to pay for new internet hardware or postage costs. </p> <p>Scammers have also offered to inspect people's homes for a nbn fibre upgrade and took their bank account details in the process. </p> <p>Other impersonators have called customers saying they would show up a few days later, despite having no prior appointment booked. </p> <p>Scammers have also impersonated staff, and used the presence of actual nbn vehicles on the street as proof of their authenticity. </p> <p>“These impersonators are also asking residents for payment to test their services or secure upgrades and repair works in the future,” nbn Local head Chris Cusack said. </p> <p>“In taking the payment these people are then skimming banking and card details to extract more money afterwards.</p> <p>“We are asking residents to be extra-vigilant against scams, especially while legitimate nbn work is underway.”</p> <p>Nbn has advised that their technicians would always contact people to ensure they were aware of visits before their appointments, and inform them of where they will be doing fibre upgrades. </p> <p>They also send their customers texts to confirm or cancel the appointment, and let them know when they are on their way. </p> <p>Nbn technicians never ask for payment for an appointment, postage costs, hardware costs, or access to any devices. </p> <p>Approved technicians and workers all carry identification cards, and the nbn Local head suggested that customers should always request to see the card before providing access to their residence. </p> <p>“Do not share your bank or personal details with an unsolicited caller or with people who door knock claiming to be from nbn trying to sell you an nbn service or seeking payment for related services,” Cusack said.</p> <p>“If you get contacted like this, please close your door, or hang up the phone and report it to the ACCC’s Scam watch.”</p> <p><em>Images: news.com.au</em></p>

Legal

Placeholder Content Image

Andrew "Twiggy" Forrest's major win over scam ads

<p>Andrew "Twiggy" Forrest has had a major win against Facebook owner Meta, with a US court allowing him to continue to sue the platform over fake advertisements using his name. </p> <p>The scam Facebook ads show him promoting fake cryptocurrency and other fraudulent investments.</p> <p>The ruling means that the court will consider whether Meta breached its duty by publishing the advertisements, and whether they operated in a way that facilitated scam ads by using defective screening and review procedures.</p> <p>US District Judge Casey Pitts in San Jose, California, made the decision on Monday, and said that Forrest can try to prove Meta's negligence and whether his name and likeness was misappropriated by Meta, and not just by fraudsters behind the bogus ads.</p> <p>"Dr Forrest claims that Meta profited more from ads that included his likeness than it would have if the ads had not," Pitts wrote.</p> <p>"This is enough to adequately plead that the alleged misappropriation was to Meta's advantage."</p> <p>Forrest said that there were over 1000 ads scam ads using his name that appeared on Facebook in Australia between April and November 2023, leading to millions of dollars in losses for victims.</p> <p>The billionaire reportedly first raised the fraudulent advertisements with Meta back in 2014, but nothing happened, according to the <em>Herald Sun. </em></p> <p>This is the first time a social media company was unable to invoke Section 230 immunity in a US civil case over its advertising business. </p> <p>It's a significant move, as social media companies in the US are usually immune from liability in the US for content posted by third parties. </p> <p>"This is a crucial strategic victory in the battle to hold Facebook accountable," Forrest said.</p> <p>The billionaire is seeking compensatory and punitive damages. </p> <p><em>Image: Dinendra Haria/LNP/ Shutterstock Editorial</em></p>

Legal

Placeholder Content Image

Why you should be wary of charging your phone in an airport

<p dir="ltr">While charging stations at airports can often be life-savings before boarding a flight, it turns out these handy outlets can be leaving you vulnerable. </p> <p dir="ltr">Many people have fought over a spot to charge up your devices at the last minute before embarking on a holiday, but next time you leave home with your phone or laptop needing some more juice, think again. </p> <p dir="ltr">Emily Stallings, co-founder of tech retailer <em><a href="https://www.getcasely.com/">Casely</a></em>, says that by plugging your phone into a power outlet at a public USB charging station, you're at risk of data breaches and malware infection.</p> <p dir="ltr">"If a device gets infected, it could end up leaking sensitive information or even stop working properly," she told <em><a href="https://travel.nine.com.au/latest/charging-phone-at-the-airport-danger-expert/57d141df-33ba-4a50-89e5-26f6f2a0c18d">9Travel</a></em>.</p> <p dir="ltr">These public USB ports have often been compromised by cybercriminals, who then use these unsecured ports to steal sensitive information transmitted between devices.</p> <p dir="ltr">"From personal emails to financial data, the information intercepted through these compromised ports could lead to identity theft, financial loss, and other serious consequences," explains Stallings.</p> <p dir="ltr">The best way to get around this threat, without letting your phone run out of battery, is to pack a portable charging device in your carry-on bag every time you travel.</p> <p dir="ltr">With your own cord and power bank, it's far less likely that any sneaky hackers will be able to access your device's data.</p> <p dir="ltr">Stallings says you can also enable security features such as USB Restricted Mode on your device, for those moments when you're desperate for a charger and have to rely on public ports. </p> <p dir="ltr">"This adds an extra layer of protection against potential data breaches and malware infections when charging from public USB ports."</p> <p dir="ltr">"By activating USB Restricted Mode or similar security features, you restrict data transfer over USB connections, effectively preventing unauthorised access to your device's data while charging in public spaces."</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p> <p> </p>

Travel Tips

Placeholder Content Image

Telstra giving free phones to elderly and remote

<p>With the 3G network set to shut down completely on August 31, Telstra announced that it will be giving 12,000 mobile phones away for free in a bid to help the most vulnerable customers switch to 4G. </p> <p>Starting from Tuesday, the telecommunications company will be issuing complimentary phones to customers who are elderly, live rurally or are facing difficult situations. </p> <p>These include those facing financial issues, recovering from natural disasters, or those who have a life-threatening medical condition and therefore rely on a working phone. </p> <p>Telstra have also identified those who live regionally or are over 80 years old and may require extra transition support, as they may have difficulty accessing a physical store to make the switch. </p> <p>Those who are flagged as eligible will be contacted by the telco company, and they are encouraging customers who receive the message to follow the instructions given to make the switch. </p> <p>Major Brendan Nottle from The Salvation Army has praised this initiative for helping the "most vulnerable members of our community."</p> <p>“Connection is one of the most important things to maintain in our society, whether it is with friends and family or with housing and support services,” he said.</p> <p>“Ensuring that every Australian, from any background or level of income, can take part in our modern digital society is crucial.</p> <p>“A phone can be a gateway to social inclusion, community connection and support, and with the upcoming closure of 3G networks in Australia it is important for us to reach out and ensure that this can continue for everyone.”</p> <p>Customers who are yet to upgrade are also told to make the switch sooner than later. </p> <p>Other devices that will be affected by the shutdown include certain smart watches, tablets, medical alarms, EFTPOS terminals and security monitors.</p> <p><em>Images: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Worried your address, birth date or health data is being sold? You should be – and the law isn’t protecting you

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Australians don’t know and can’t control how data brokers are spreading their personal information. This is the core finding of a newly <a href="https://www.accc.gov.au/system/files/Digital-platform-services-inquiry-March-2024-interim-report.pdf">released report</a> from the Australian Competition and Consumer Commission (ACCC).</p> <p>Consumers wanting to rent a property, get an insurance quote or shop online are not given real choices about whether their personal data is shared for other purposes. This exposes Australians to scams, fraud, manipulation and discrimination.</p> <p>In fact, <a href="https://www.accc.gov.au/media-release/consumers-lack-visibility-and-choice-over-data-collection-practices">many don’t even know</a> what kind of data has been collected about them and shared or sold by data firms and other third parties.</p> <p>Our privacy laws are due for reform. But Australia’s privacy commissioner <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">should also enforce</a> an existing rule: with very limited exceptions, businesses must not collect information about you from third parties.</p> <h2>What are data brokers?</h2> <p><a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">Data brokers</a> generally make their profits by collecting information about individuals from various sources and sharing this personal data with their many business clients. This can include detailed profiles of a person’s family, health, finances and movements.</p> <p>Data brokers often have no connection with the individual – you may not even recognise the name of a firm that holds vast amounts of information on you. Some of these data brokers are large multinational companies with billions of dollars in revenue.</p> <p>Consumer and privacy advocates provided the ACCC with evidence of highly concerning data broker practices. <a href="https://www.accc.gov.au/system/files/Salinger%20Privacy.pdf">One woman</a> tried to find out how data brokers had got hold of her information after receiving targeted medical advertising.</p> <p>Although she never discovered how they obtained her data, she found out it included her name, date of birth and contact details. It also included inferences about her, such as her retiree status, having no children, not having “high affluence” and being likely to donate to a charity.</p> <p>ACCC found another data broker was reportedly creating lists of individuals who may be experiencing vulnerability. The categories included:</p> <ul> <li>children, teenage girls and teenage boys</li> <li>“financially unsavvy” people</li> <li>elderly people living alone</li> <li>new migrants</li> <li>religious minorities</li> <li>unemployed people</li> <li>people in financial distress</li> <li>new migrants</li> <li>people experiencing pain or who have visited certain medical facilities.</li> </ul> <p>These are all potential vulnerabilities that could be exploited, for example, by scammers or unscrupulous advertisers.</p> <h2>How do they get this information?</h2> <p>The ACCC notes <a href="https://cprc.org.au/wp-content/uploads/2023/03/CPRC-working-paper-Not-a-fair-trade-March-2025.pdf">74% of Australians are uncomfortable</a> with their personal information being shared or sold.</p> <p>Nonetheless, data brokers sell and share Australian consumers’ personal information every day. Businesses we deal with – for example, when we buy a car or search for natural remedies on an online marketplace – both buy data about us from data brokers and provide them with more.</p> <p>The ACCC acknowledges consumers haven’t been given a choice about this.</p> <p>Attempting to read every privacy term is near impossible. The ACCC referred to a recent study which found it would take consumers <a href="https://www.mi-3.com.au/06-11-2023/aussies-face-10-hour-privacy-policy-marathon-finds-study">over 46 hours a month</a> to read every privacy policy they encounter.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">The approximate length and time it would take to read an average privacy policy in Australia per month.</span> <span class="attribution"><a class="source" href="https://www.accc.gov.au/about-us/publications/serial-publications/digital-platform-services-inquiry-2020-25-reports/digital-platform-services-inquiry-interim-report-march-2024">ACCC Digital Platform Services Inquiry interim report</a></span></figcaption></figure> <p>Even if you could read every term, you still wouldn’t get a clear picture. Businesses use <a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">vague wording</a> and data descriptions which <a href="https://theconversation.com/70-of-australians-dont-feel-in-control-of-their-data-as-companies-hide-behind-meaningless-privacy-terms-224072">confuse consumers</a> and have no fixed meaning. These include “pseudonymised information”, “hashed email addresses”, “aggregated information” and “advertising ID”.</p> <p>Privacy terms are also presented on a “take it or leave it” basis, even for transactions like applying for a rental property or buying insurance.</p> <p>The ACCC pointed out 41% of Australians feel they have been <a href="https://www.choice.com.au/consumers-and-data/data-collection-and-use/how-your-data-is-used/articles/choice-renttech-report-release">pressured to use “rent tech” platforms</a>. These platforms collect an increasing range of information with questionable connection to renting.</p> <h2>A first for Australian consumers</h2> <p>This is the first time an Australian regulator has made an in-depth report on the consumer data practices of data brokers, which are generally hidden from consumers. It comes <a href="https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf">ten years after</a> the United States Federal Trade Commission (FTC) conducted a similar inquiry into data brokers in the US.</p> <p>The ACCC report examined the data practices of nine data brokers and other “data firms” operating in Australia. (It added the term “data firms” because some companies sharing data about people argue that they are not data brokers.)</p> <p>A big difference between the Australian and the US reports is that the FTC is both the consumer watchdog and the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913">privacy regulator</a>. As our competition and consumer watchdog, the ACCC is meant to focus on competition and consumer issues.</p> <p>We also need our privacy regulator, the Office of the Australian Information Commissioner (OAIC), to pay attention to these findings.</p> <h2>There’s a law against that</h2> <p>The ACCC report shows many examples of businesses collecting personal information about us from third parties. For example, you may be a customer of a business that only has your name and email address. But that business can purchase “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">data enrichment</a>” services from a data broker to find out your age range, income range and family situation.</p> <p>The <a href="https://www.legislation.gov.au/C2004A03712/latest/text">current Privacy Act</a> includes <a href="https://www.oaic.gov.au/privacy/australian-privacy-principles/read-the-australian-privacy-principles">a principle</a> that organisations must collect personal information only from the individual (you) unless it is unreasonable or impracticable to do so. “Impracticable” means practically impossible. This is the direct collection rule.</p> <p>Yet there is no reported case of the privacy commissioner enforcing the direct collection rule against a data broker or its business customers. Nor has the OAIC issued any specific guidance in this respect. It should do both.</p> <h2>Time to update our privacy laws</h2> <p>Our privacy law was drafted in 1988, long before this complex web of digital data practices emerged. Privacy laws in places such as California and the European Union provide much stronger protections.</p> <p>The government has <a href="https://ministers.ag.gov.au/media-centre/speeches/privacy-design-awards-2024-02-05-2024">announced</a> it plans to introduce a privacy law reform bill this August.</p> <p>The ACCC report reinforces the need for vital amendments, including a direct right of action for individuals and a rule requiring dealings in personal information to be “fair and reasonable”.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/230540/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, Associate Professor, Faculty of Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/worried-your-address-birth-date-or-health-data-is-being-sold-you-should-be-and-the-law-isnt-protecting-you-230540">original article</a>.</em></p> </div>

Legal

Our Partners