Placeholder Content Image

Are older adults more vulnerable to scams? What psychologists have learned about who’s most susceptible, and when

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554">Natalie C. Ebner</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p>About 1 in 6 Americans <a href="https://www.census.gov/library/stories/2023/05/2020-census-united-states-older-population-grew.html">are age 65 or older</a>, and that percentage <a href="https://www.ncoa.org/article/get-the-facts-on-older-americans">is projected to grow</a>. Older adults often hold positions of power, have retirement savings accumulated over the course of their lifetimes, and make important financial and health-related decisions – all of which makes them attractive targets for financial exploitation.</p> <p>In 2021, there were more than 90,000 older victims of fraud, according to the FBI. These cases resulted in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf">US$1.7 billion in losses</a>, a 74% increase compared with 2020. Even so, that may be a significant undercount, since embarrassment or lack of awareness <a href="https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf">keeps some victims from reporting</a>.</p> <p><a href="https://ncea.acl.gov/elder-abuse#gsc.tab=0">Financial exploitation</a> represents one of the most common forms of elder abuse. Perpetrators are often individuals in the victims’ inner social circles – family members, caregivers or friends – but can also be strangers.</p> <p>When older adults experience financial fraud, they typically <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/AgeandFraud/Infographic">lose more money</a> than younger victims. Those losses can have <a href="https://doi.org/10.1057/sj.2012.11">devastating consequences</a>, especially since older adults have limited time to recoup – dramatically reducing their independence, health and well-being.</p> <p>But older adults have been largely neglected in research on this burgeoning type of crime. We are <a href="https://ebnerlab.psych.ufl.edu/natalie-c-ebner-phd/">psychologists who study social cognition</a> and <a href="https://ebnerlab.psych.ufl.edu/didem-pehlivanoglu/">decision-making</a>, and <a href="https://ebnerlab.psych.ufl.edu/">our research lab</a> at the University of Florida is aimed at understanding the factors that shape vulnerability to deception in adulthood and aging.</p> <h2>Defining vulnerability</h2> <p>Financial exploitation involves a variety of exploitative tactics, such as coercion, manipulation, undue influence and, frequently, some sort of deception.</p> <p>The majority of current research focuses on <a href="https://doi.org/10.1002/acp.3052">people’s ability to distinguish between truth and lies</a> during interpersonal communication. However, deception occurs in many contexts – increasingly, over the internet.</p> <p>Our lab conducts laboratory experiments and real-world studies to measure susceptibility under various conditions: investment games, lie/truth scenarios, phishing emails, text messages, fake news and deepfakes – fabricated videos or images that are created by artificial intelligence technology.</p> <p>To study how people respond to deception, we use measures like surveys, brain imaging, behavior, eye movement and heart rate. We also collect health-related biomarkers, such as being a carrier of <a href="https://pubmed.ncbi.nlm.nih.gov/8346443/">gene variants</a> that increase risk for Alzheimer’s disease, to identify individuals with particular vulnerability.</p> <p>And <a href="https://doi.org/10.20900/agmr20230007">our work</a> shows that an older adult’s ability to detect deception is not just about their individual characteristics. It also depends on how they are being targeted.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=3 2262w" alt="A figure with two circles and an arrow between them. One circle shows icons that symbolize individual susceptibility to deception -- like a brain, and a walking cane -- while the other has icons of types of deception, like mail or a text message." /></a><figcaption><span class="caption">Vulnerability depends not only on the person, but also the type of fraud being used.</span> <span class="attribution"><span class="source">Natalie Ebner and Didem Pehlivanoglu</span></span></figcaption></figure> <h2>Individual risk factors</h2> <p>Better cognition, social and emotional capacities, and brain health are all associated with less susceptibility to deception.</p> <p>Cognitive functions, such as how quickly our brain processes information and how well we remember it, <a href="https://doi.org/10.1177/1745691619827511">decline with age</a> and impact decision-making. For example, among people around 70 years of age or older, declines in analytical thinking are associated with <a href="https://doi.org/10.1037/xap0000426">reduced ability to detect false news stories</a>.</p> <p>Additionally, low memory function in aging is associated with <a href="https://doi.org/10.1093/geronb/gby036">greater susceptibility to email phishing</a>. Further, according to recent <a href="https://osf.io/preprints/osf/6f2y9">research</a>, this correlation is specifically pronounced among older adults who carry a gene variant that is a genetic risk factor for developing Alzheimer’s disease later in life. Indeed, some research suggests that greater financial exploitability may serve as <a href="https://doi.org/10.1016/j.neubiorev.2022.104773">an early marker</a> of disease-related cognitive decline.</p> <p>Social and emotional influences are also crucial. Negative mood can enhance somebody’s ability to detect lies, while <a href="https://doi.org/10.1037/xap0000426">positive mood in very old</a> age can impair a person’s ability to detect fake news.</p> <p>Lack of support and loneliness exacerbate susceptibility to deception. Social isolation during the COVID-19 pandemic has led to <a href="https://doi.org/10.1093/gerona/glaa077">increased reliance on online platforms</a>, and older adults with lower digital literacy are <a href="https://doi.org/10.1093/geront/gnac188">more vulnerable to fraudulent emails and robocalls</a>.</p> <p>Finally, an individual’s brain and body responses play a critical role in susceptibility to deception. One important factor is <a href="https://doi.org/10.1016/j.tins.2020.10.007">interoceptive awareness</a>: the ability to accurately read our own body’s signals, like a “gut feeling.” This awareness is correlated with <a href="https://doi.org/10.1093/geroni/igad104.3714">better lie detection</a> in older adults.</p> <p>According to <a href="https://doi.org/10.1093/gerona/glx051">a first study</a>, financially exploited older adults had a significantly smaller size of insula – a brain region key to integrating bodily signals with environmental cues – than older adults who had been exposed to the same threat but avoided it. Reduced insula activity is also related to greater difficulty <a href="https://doi.org/10.1073/pnas.1218518109">picking up on cues</a> that make someone appear less trustworthy.</p> <h2>Types of effective fraud</h2> <p>Not all deception is equally effective on everyone.</p> <p><a href="https://doi.org/10.1145/3336141">Our findings</a> show that email phishing that relies on reciprocation – people’s tendency to repay what another person has provided them – was more effective on older adults. Younger adults, on the other hand, were more likely to fall for phishing emails that employed scarcity: people’s tendency to perceive an opportunity as more valuable if they are told its availability is limited. For example, an email might alert you that a coin collection from the 1950s has become available for a special reduced price if purchased within the next 24 hours.</p> <p>There is also evidence that as we age, we have greater difficulty detecting the “wolf in sheep’s clothing”: someone who appears trustworthy, but is not acting in a trustworthy way. In <a href="https://doi.org/10.1038/s41598-023-50500-x">a card-based gambling game</a>, we found that compared with their younger counterparts, older adults are more likely to select decks presented with trustworthy-looking faces, even though those decks consistently resulted in negative payouts. Even after learning about untrustworthy behavior, older adults showed greater difficulty overcoming their initial impressions.</p> <h2>Reducing vulnerability</h2> <p>Identifying who is especially at risk for financial exploitation in aging is crucial for preventing victimization.</p> <p>We believe interventions should be tailored, instead of a one-size-fits-all approach. For example, perhaps machine learning algorithms could someday determine the most dangerous types of deceptive messages that certain groups encounter – such as in text messages, emails or social media platforms – and provide on-the-spot warnings. Black and Hispanic consumers are <a href="https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf">more likely to be victimized</a>, so there is also a dire need for interventions that resonate with their communities.</p> <p>Prevention efforts would benefit from taking a holistic approach to help older adults reduce their vulnerability to scams. Training in <a href="https://doi.org/10.1007/s40520-019-01259-7">financial, health</a> and <a href="https://www.nature.com/articles/s41598-022-08437-0.pdf">digital literacy</a> are important, but so are programs to <a href="https://doi.org/10.1186/s12889-021-10363-1">address loneliness</a>.</p> <p>People of all ages need to keep these lessons in mind when interacting with online content or strangers – but not only then. Unfortunately, financial exploitation often comes from individuals close to the victim.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/227991/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554"><em>Natalie C. Ebner</em></a><em>, Professor of Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, Postdoctoral Researcher, Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-older-adults-more-vulnerable-to-scams-what-psychologists-have-learned-about-whos-most-susceptible-and-when-227991">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

Could a recent ruling change the game for scam victims? Here’s why the banks will be watching closely

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/jeannie-marie-paterson-6367">Jeannie Marie Paterson</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/nicola-howell-1160247">Nicola Howell</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>In Australia, it’s scam victims who foot the bill for the overwhelming majority of the money lost to scams each year.</p> <p>A 2023 <a href="https://download.asic.gov.au/media/mbhoz0pc/rep761-published-20-april-2023.pdf">review</a> by the Australian Securities and Investments Commission (ASIC) found banks detected and stopped only a small proportion of scams. The total amount banks paid in compensation paled in comparison to total losses.</p> <p>So, it was a strong statement this week when it was revealed the Australian Financial Conduct Authority (AFCA) had <a href="https://my.afca.org.au/searchpublisheddecisions/kb-article/?id=f9f8941f-7379-ef11-ac20-000d3a6acbb4">ordered</a> a bank – HSBC – to compensate a customer who lost more than $47,000 through a sophisticated bank impersonation or “spoofing” scam.</p> <p>This decision was significant. An AFCA determination is binding on the relevant bank or other financial institution, which has <a href="https://www.afca.org.au/make-a-complaint#:%7E:text=Any%20determinations%20we%20make%20are,service%20is%20free%20to%20access">no direct right of appeal</a>. It could have implications for the way similar cases are treated in future.</p> <p>The ruling comes amid a broader push for sector-wide reforms to give banks more responsibility for <a href="https://www.fico.com/blogs/detection-prevention-tackling-scams-every-angle">detecting</a>, deterring and responding to scams, as opposed to simply telling customers to be “more careful”.</p> <p>Here’s what you should know about this landmark ruling, and what it might mean for consumers.</p> <h2>A highly sophisticated ‘spoofing’ scam</h2> <p>You might be familiar with “push payment” scams that trick the victim into paying money to a dummy account. These include the “<a href="https://www.acma.gov.au/articles/2024-01/scam-alert-re-emergence-hi-mum-scam">mum I’ve lost my phone</a>” scam and some <a href="https://www.scamwatch.gov.au/types-of-scams/online-dating-and-romance-scams">romance</a> scams.</p> <p>The <a href="https://www.smh.com.au/national/dragged-kicking-and-screaming-banking-giant-loses-battle-against-scam-victim-20241015-p5kide.html">recent case</a> concerned an equally noxious “bank impersonation” or “spoofing” scam. The complainant – referred to as “Mr T” – was tricked into giving the scammer access to his HSBC account, from which an unauthorised payment was made.</p> <p>The scammer sent Mr T a text message, purportedly asking him to investigate an attempted Amazon transaction.</p> <p>In an effort to respond to the (fake) unauthorised Amazon purchase, Mr T revealed security passcodes to the scammer, enabling them to transfer $47,178.54 from his account and disappear with it.</p> <p>The fact Mr T was dealing with scammers was far from obvious – scammers had information about him one might reasonably expect only a bank would know, such as his bank username.</p> <p>On top of this, the scam text message appeared in a thread of other legitimate text messages that had previously been sent by the real HSBC.</p> <h2>AFCA’s ruling</h2> <p>HSBC argued to AFCA that having to pay compensation should be ruled out under the <a href="https://download.asic.gov.au/media/lloeicwb/epayments-code-published-02-june-2022.pdf">ePayments Code</a>, a voluntary code of practice administered by ASIC.</p> <p>Under this code, a bank is not required to compensate a customer for an unauthorised payment if that customer has disclosed their passcode. The bank argued the complainant had voluntarily disclosed these codes to the scammer, meaning the bank didn’t need to pay.</p> <p>AFCA disagreed. It noted the very way the scam had worked was by creating a sense of urgency and crisis. AFCA considered that the complainant had been manipulated into disclosing the passcodes and had not acted voluntarily.</p> <p>AFCA awarded compensation covering the vast majority of the disputed transaction amount, lost interest charged to a home loan account, and $5,000 towards Mr T’s legal costs.</p> <p>It also ordered the bank to pay compensation of $1,000 for poor customer service in dealing with the matter, including communication delays.</p> <h2>Other cases may be more complex</h2> <p>In this case, the determination was relatively straightforward. It found Mr T had not voluntarily disclosed his account information, so was not excluded from being compensated under the ePayments Code.</p> <p>However, many payment scams fall outside the ePayments Code because they involve the customer directly sending money to the scammer (as opposed to the scammer accessing the customer’s account). That means there is no code to direct compensation.</p> <p>Still, AFCA’s jurisdiction is broader than merely applying a code. In considering compensation for scam losses, AFCA must consider what is “fair in all the circumstances”. This means taking into account:</p> <ul> <li>legal principles</li> <li>applicable industry codes</li> <li>good industry practice</li> <li>previous AFCA decisions.</li> </ul> <p>Relevant factors might well include whether the bank was proactive in responding to known scams, as well as the challenges for individual customers in identifying scams.</p> <h2>Broader reforms are on the way</h2> <p>At the heart of this determination by AFCA is a recognition that, increasingly, detecting sophisticated scams can be next to impossible for customers, which can mean they don’t act voluntarily in making payments to scammers.</p> <p>Similar reasoning has informed a range of recent reform initiatives that put more responsibility for detecting and responding to scams on the banks, rather than their customers.</p> <p>In 2023, Australia’s banking sector committed to a new “<a href="https://www.ausbanking.org.au/scam-safe-accord/">Scam-Safe Accord</a>”. This is a commitment to implement new measures to protect customers, including a confirmation of payee service, delays for new payments, and biometric identity checks for new accounts.</p> <p>Changes on the horizon could be more ambitious and significant.</p> <p>The proposed <a href="https://treasury.gov.au/consultation/c2024-573813">Scams Prevention Framework</a> legislation would require Australian banks, telcos and <a href="https://pursuit.unimelb.edu.au/articles/accc-vs-big-tech-round-10-and-counting">digital platforms</a> to take reasonable steps to prevent, detect, report, disrupt and respond to scams.</p> <p>It would also include a compulsory external dispute resolution process, like AFCA’s, for consumers seeking compensation for when any of these institutions fail to comply.</p> <p>Addressing scams is not just an Australian issue. In the United Kingdom, newly introduced <a href="https://www.bbc.com/news/articles/cy94vz4zd7zo">rules</a> make paying and receiving banks responsible for compensating customers, for scam losses up to £85,000 (A$165,136), unless the customer is grossly negligent.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/241558/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/jeannie-marie-paterson-6367">Jeannie Marie Paterson</a>, Professor of Law, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/nicola-howell-1160247">Nicola Howell</a>, Senior lecturer, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/could-a-recent-ruling-change-the-game-for-scam-victims-heres-why-the-banks-will-be-watching-closely-241558">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

"This is horrific": Queen icon calls out convincing scam

<p>Brian May has spoken out after becoming the target of a dangerous scam, urging people to be careful online. </p> <p>The guitarist of iconic rock band Queen was made aware of the scam by a fan, who sent him the TikTok of what seems to be May himself offering concert tickets at a discount. </p> <p>The video, which is actually AI-generated and has nothing to do with May or with Queen, shows the rockstar offering music fans the chance to see a concert from backstage. </p> <p>“I hope you’re all well out there,” says the fake Brian May in the video. “Some good news. Backstage tickets for my next show in your cities are now going for only $800, which were previously $2000. I’m only selecting 10 people in the comments, so if you’re ready to make payment, comment, ‘ready’.”</p> <p>May responded to the post publicly, sharing his horror and anger with fans over the “creepy” video, saying, “My God. This is horrific.”</p> <p>“I suppose this is now so easy to do – and there are always people who will sink to any depths to try to make a quick buck. Disgusting.”</p> <p>He continued, “Thanks for the alert dear (TikTok username) stereojazz. I’ve alerted our team and hopefully we can squash this.”</p> <p>Fans were quick to comment that they had almost been fooled by the convincing video. </p> <p>“That they abuse your beautiful personality for this scam hurts even more and is really scary. I hate it,” commented one. </p> <p>“It is insanely terrifying what AI can do these days,” wrote another.</p> <p><em>Image credits: TikTok</em></p>

Legal

Placeholder Content Image

Do mobile phones cause brain cancer? Science makes definitive call

<p>The question of whether mobile phones - specifically the electromagnetic radiation or radio waves emitted by these devices - cause cancer has been debated and researched for a long time, and now scientists have made a definitive call. </p> <p>A new comprehensive review commissioned by the World Health Organization has found that mobile phones are NOT linked to brain and head cancers. </p> <p>The systematic review, led by the Australian Radiation Protection and Nuclear Safety Agency (Arpansa), examined over 5,000 studies, which included 63 observational studies on humans published between 1994 and 2022 and is "the most comprehensive review to date" according to review lead author, associate prof Ken Karipidis. </p> <p>“We concluded the evidence does not show a link between mobile phones and brain cancer or other head and neck cancers," he said. </p> <p>The review, which was published on Wednesday, focused on cancers of the nervous system, salivary gland and brain tumours. </p> <p>They found no overall association between mobile phone use and cancer, even if people have used it for a long time (over 10 years) or spend a lot of time on their phones. </p> <p>“I’m quite confident with our conclusion. And what makes us quite confident is … even though mobile phone use has skyrocketed, brain tumour rates have remained stable,” Karipidis continued. </p> <p>Despite emitting electromagnetic radiation, also known as radio waves, the exposure is relatively low. </p> <p>Karipidis said people hear the word radiation and assume it is similar to nuclear radiation, “and because we use a mobile phone close to the head when we’re making calls, there is a lot of concern.”</p> <p>He clarified that “radiation is basically energy that travels from one point to another. There are many different types, for example, ultraviolet radiation from the sun." </p> <p>“We’re always exposed to low-level radio waves in the everyday environment.”</p> <p>While exposure from mobile phones is still low, it is much higher than exposure from any other wireless technology sources since they are used close to the head, Karipidis said. </p> <p>The association between mobile phones and cancers came about from early studies comparing differences between those with and without brain tumours and asking about their exposure history. </p> <p>According to Karipidis, who is also the vice-chair of the International Commission on Non-Ionizing Radiation Protection, the results from these kind of studies tend to be biased, as the group with the tumour tend to overreport their exposure. </p> <p>Based on these early studies WHO’s International Agency for Research on Cancer (IARC) designated radio-frequency fields like those from mobile phones as a possible cancer risk, but Karipidis said "this classification doesn’t mean all that much”.</p> <p>This is because the IARC has different classifications of cancer risk, with some substances classified as  a “definite” carcinogen (such as smoking), and others as “probable” or “possible” carcinogens.</p> <p>Tim Driscoll, a professor at the University of Sydney and chair of the Australian Cancer Council’s occupational and environmental cancers committee, also backed the systematic review. </p> <p>“I think people should feel reassured by this study … but it’s worthwhile just remembering that the studies aren’t perfect, but the weight of evidence certainly is that mobile phones should be considered safe to use in terms of any concerns about increased risk of cancer,” Driscoll said.</p> <p><em>Images: Shutterstock</em></p> <p> </p>

Body

Placeholder Content Image

Romance fraud doesn’t only happen online – it can turn into real-world deception

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>We often think of fraudsters as people on the opposite side of the world. They will manipulate and exploit victims through words on a computer screen, or loving messages through the phone. But romance fraud can also happen in person, with the fraudster sleeping in the bed beside you.</p> <p>This was the circumstance Australian writer Stephanie Wood found herself in. It’s also the basis for the new <a href="https://www.paramountanz.com.au/news/fake-breaks-subscription-and-streaming-records-on-paramount/">television series Fake</a>, currently screening on Paramount+. A dramatisation of Wood’s powerful memoir by the same name, the series outlines the many lies and betrayals of an intimate relationship.</p> <p>It’s a brutal insight into the world of deception which characterises romance fraud.</p> <h2>When love hurts</h2> <p>Romance fraud (or romance scams) is what it sounds like – offenders use the guise of a relationship to gain a financial reward. In most cases, it’s through the direct transfer of money from the victim, but it can also be through using personal credentials to commit identity crimes.</p> <p>From the outside, it’s hard to understand how romance fraud is so effective. However, <a href="https://eprints.qut.edu.au/233966/">research has documented</a> the range of grooming techniques, social engineering tactics and methods of psychological abuse deployed by offenders. Offenders know exactly what to do and say to gain the compliance of their victim.</p> <hr /> <hr /> <p>Offenders target a person’s vulnerability and work hard to build strong levels of trust. There are endless calls, texts and emails that create a bond. Then follows the inevitable “crisis”, whereby the offender needs money urgently for a health emergency, criminal justice situation, business need or even a <a href="https://www.accc.gov.au/media-release/romance-baiting-scams-on-the-rise">cryptocurrency investment</a> opportunity.</p> <p>For many, this can result in ongoing payments and substantial losses. Over <a href="https://www.accc.gov.au/about-us/publications/serial-publications/targeting-scams-reports-on-scams-activity/targeting-scams-report-of-the-accc-on-scams-activity-2023">A$200 million</a> was reported lost by Australians to this fraud type in 2023, but this is likely a gross underestimation of actual figures. It also doesn’t capture the many <a href="https://www.aic.gov.au/sites/default/files/2020-05/29-1314-FinalReport.pdf">non-financial harms</a>, including physical and emotional declines in wellbeing.</p> <p>When the relationship finally ends, it’s too late. The money is gone, the extent of the deception is laid bare, and recovery from the heartache and loss is a constant battle.</p> <p>There is a well-documented “<a href="https://journals.sagepub.com/doi/full/10.1177/1748895815603773">double hit</a>” of victimisation, with individuals needing to grieve the relationship as well as any financial losses.</p> <h2>Seeing is not believing</h2> <p>There are countless incidents of romance fraud where the offender and victim never meet: the deception takes place entirely online. But it’s important to know fraudsters also operate in person.</p> <p>Wood’s memoir details an extraordinary level of lies and dishonesty presented to her throughout her relationship. Stories that laid the groundwork for later fabrications. Stories that were deliberate and calculated in how they were used to gain her trust, and later used against her.</p> <p>The motivations of these real-world deceivers are not always straightforward. Often it’s about money, but not always. For Wood, not being asked for money allayed potential suspicions, but it didn’t reduce her feelings of loss and emotional devastation upon discovering the extent of the lies.</p> <figure><iframe src="https://www.youtube.com/embed/K_1Akqhjy6M?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe></figure> <p>Wood is by no means alone in her experience. Marketing executive Tracy Hall endured a similarly sophisticated and all-encompassing level of deceit in her relationship with <a href="https://www.theguardian.com/australia-news/2019/jun/20/conman-hamish-mclaren-jailed-for-up-to-16-years-after-swindling-76m-from-victims">convicted conman Hamish McLaren</a> (known to her as Max Tavita).</p> <p>In her book, <a href="https://tracyhall.com.au/the-last-victim">The Last Victim</a>, Hall recounts snippets of their daily lives over a 16-month period, with McLaren portraying himself as a successful professional in finance. His mail was addressed to Max Tavita and his phone conversations were with real people. Yet his whole identity and the world he represented to Hall was a complete fabrication.</p> <p>The experiences of Wood and Hall highlight the sheer depth of elaborate deception that can be perpetrated in an intimate relationship. Critically, it highlights romance fraud isn’t relegated to an online environment.</p> <h2>How can we prevent romance fraud?</h2> <p>There is an overwhelming amount of <a href="https://eprints.qut.edu.au/83702/">shame and stigma</a> associated with romance fraud. The dynamics of these deceptive relationships are misunderstood, and this perpetuates negative stereotypes and a discourse of victim blaming, even from friends and family.</p> <p>In hindsight, the warning signs might seem obvious, but fraudsters tend to effectively disguise these in real time and deploy deliberate tactics to overcome any suspicion.</p> <p>We must all create a culture that empowers victims to come forward to raise awareness. This isn’t intended to create fear or anxiety, but to normalise the threat fraud poses, and to allow for difficult conversations if it happens. Ongoing silence from victims only favours the offender.</p> <h2>How to protect yourself from romance fraud</h2> <p>It’s inevitable we’ll continue to swipe right in our efforts to find love. But keep a healthy level of scepticism and an open dialogue with family and friends in any quest for a new relationship.</p> <p>Don’t be afraid to conduct your own searches of people, places and situations presented to you in a relationship. There is a memorable moment in Fake where the protagonist refutes her friend’s offer of assistance, saying “this is a love story not an investigation”. Sadly, sometimes an investigation is necessary.</p> <p>No matter what the circumstance or the person, think carefully before sending any money. Only give what you are willing to lose.</p> <p>Deception comes in many forms. We must recognise it for what it is, and the impact it has on victims. But we must also not give into those who lie, and let them define who we are or dictate our ability to trust.</p> <p><em>If you or someone you know has been a victim of romance fraud, you can report it to <a href="https://www.cyber.gov.au/report-and-recover/report">ReportCyber</a>. For support, contact <a href="https://www.idcare.org/">iDcare</a>. For prevention advice, consult <a href="https://www.scamwatch.gov.au/">Scamwatch</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/237653/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/romance-fraud-doesnt-only-happen-online-it-can-turn-into-real-world-deception-237653">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

New support system helps older Aussies who have fallen victim to scams

<p>A new support system has been set up to help vulnerable older Australians who have fallen victim to dangerous scams. </p> <p>With millions of Aussies targeted every year, many of these targets are elderly with 30 percent of victims hesitant to come forward because they are too embarrassed to admit what's happened to them.</p> <p>One such victim, 86-year-old Mary, said she was humiliated after falling for a scam saying she is old enough to know better. </p> <p>"It serves me right, I shouldn't have been so trusting," she said.</p> <p>"You blame yourself and you don't really want to tell people how stupid you are, so you think, 'Well, I'll just have to bear it'."</p> <p>Mary was scammed when she received a call from a man pretending to be a technician, saying he needed access to her computer to resolve a problem in her area. </p> <p>Step by step, the "technician" got Mary to log-in and give him complete access to her entire online identification, completely cleaning her out of $20,000 in savings.</p> <p>This is why <a title="ID Support NSW" href="https://www.nsw.gov.au/id-support-nsw" target="_blank" rel="noopener">ID Support NSW</a> is now offering a free service to help older Australians be able to protect themselves online and spot suspicious activity.</p> <p>"The most common scams are romance and impersonation scams, where people pretend to be someone they're not," ID Support NSW's Jacqueline Wilson told <em><a href="https://9now.nine.com.au/today/scam-awareness-week-id-support-nsw-offering-free-help-for-older-australians/20d3f8d6-fe32-4b1d-af32-294e47f4412d" target="_blank" rel="noopener">Today</a></em>.</p> <p>"Most start with a text or call and once someone responds or engages, they usually end up losing money."</p> <p>Jacqueline said the best thing you could do if you even suspect a scammer was to just hang up the phone, saying, "You don't need to indulge them, you don't need to be polite, you don't need to engage in a long conversation."</p> <p><em>Image credits: Today</em> </p>

Legal

Placeholder Content Image

It’s tax time and scammers are targeting your myGov account. Here’s how to stay safe

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>For many, tax time is an exciting part of the year – there’s the potential for a refund. However, it’s also an attractive time for fraudsters looking for ways to get money and deceive unsuspecting victims.</p> <p>Each year Australians lose large amounts of money to scams. In 2023, Australians reported <a href="https://www.accc.gov.au/media-release/scam-losses-decline-but-more-work-to-do-as-australians-lose-27-billion">losses of more than A$2.7 billion</a>. While this is a slight reduction from the $3.1 billion in 2022, there are still millions of victims who’ve suffered at the hands of scammers.</p> <p>Impersonation scams are one common approach. Scamwatch reports that in 2023, <a href="https://www.scamwatch.gov.au/news-alerts/shopping-for-online-bargains-this-black-friday-weekend-make-sure-its-the-real-deal">70% of reports to them</a> involved impersonation.</p> <p>A large number of these were linked to the Australian Taxation Office (ATO) and myGov.</p> <h2>What is an impersonation scam?</h2> <p>Impersonation scams are what they sound like: when an offender pretends to be someone or something they are not. Offenders may pretend to be family members or friends in our contact lists.</p> <p>In many cases, they will say they’re from an organisation such as a bank or a well-known retailer, or a government department – like the ATO.</p> <p>Offenders take on the identity of a known and trusted organisation to increase the chances of success. While we may ignore communications from unknown entities and strangers, we’re more likely to engage with what’s familiar.</p> <p>Additionally, the ATO has a powerful status as a government agency, and we are unlikely to ignore its messages – especially at tax time.</p> <h2>What are they trying to get out of my myGov account?</h2> <p>myGov is the gateway to a range of government services, including Medicare, Centrelink, My Health Record, the National Disability Insurance Scheme, and of course, the ATO.</p> <p>Being able to log in to myGov gives offenders access to a wide range of your personal details. This can help them build a fuller profile of you to potentially commit identity theft (such as opening new accounts in your name).</p> <p>There’s also the potential for direct fraud. With access to myGov, offenders can change your bank account details and redirect any refunds into their accounts, whether from the ATO or other linked services.</p> <p>They can even submit false tax returns, medical claims or other forms to obtain fraudulent funds. As the legitimate owner of the account, you may not immediately notice this.</p> <h2>What does a myGov scam look like?</h2> <p>In most instances, a myGov scam will look like one of the many phishing attempts we all receive on a daily basis. While each approach can be worded differently, their desired outcome is the same: to acquire your personal information.</p> <p>Fraudsters are sending text messages and emails pretending to be from the ATO, advising you there’s a refund available if you click the provided link.</p> <p>Another approach is to flag a “problem” with your tax return or bank account, and direct you to take immediate action via a link. Creating a sense of urgency can trick users into acting in the moment, without thinking through the request.</p> <p>The text or email may also be very neutral, simply stating there’s a new message waiting – with a link to where you can read it.</p> <p>Regardless of what the message says, the goal is to direct you to a website that looks genuine, but is fake. If you enter your myGov details into such a fake site, the offender can capture your login details and use them to log into your actual myGov account.</p> <h2>What to do if you’ve been a victim?</h2> <p>If you have clicked on a scam link and provided your personal details, there are steps you can take.</p> <p><strong>Change your password</strong> and review your account settings if you still have access to your myGov account.</p> <p><strong>Check your bank accounts</strong>, to see what, if anything, has been lost. Contact your bank or financial institution immediately if you notice any withdrawals or suspicious transactions.</p> <p><strong>Contact any other organisation</strong> linked to your myGov account to see if any unauthorised actions have been taken.</p> <p>For anyone who has lost personal information and experienced identity crime, <a href="https://www.idcare.org/">IDCARE is the national support centre</a> for identity crime victims. They will be able to assist with a personalised response plan to your specific situation.</p> <h2>How do I keep my account safe?</h2> <p><strong>Never click on links</strong> in text messages or emails that direct you to log in to your accounts. Always access your accounts independently, through details you have found independently of any text or email.</p> <p><strong>Review your security settings.</strong> There have been recent reports of people’s myGov accounts being targeted <a href="https://www.theguardian.com/australia-news/article/2024/aug/01/ato-mygov-tax-return-refund-scam">with repeated login attempts</a>. Using your unique eight-digit myGov username for logging in can be safer than <a href="https://my.gov.au/en/about/help/mygov-website/help-using-your-account/manage-sign-in-details#updatingyourusername">using your email address</a>.</p> <p><strong>Enable <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a></strong> where possible. myGov uses two-factor authentication in the form of a text message in addition to an online login. While this is not foolproof, it offers an additional layer of protection and can stop offenders accessing your account with only partial pieces of your information.</p> <p><strong>Be vigilant on all communications.</strong> Always keep in mind that all may not be what it seems and the person you are communicating with may not be who they say they are. It is okay to be sceptical and do your own checks to verify details of what is presented to you.</p> <p>Remember, fraudsters thrive on the silence and shame of those who respond or fall victim to their scams. We need to communicate openly about these schemes and talk to family and friends, to increase everyone’s knowledge and awareness.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/235785/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/its-tax-time-and-scammers-are-targeting-your-mygov-account-heres-how-to-stay-safe-235785">original article</a>.</em></p> </div>

Money & Banking

Placeholder Content Image

Yes, blue light from your phone can harm your skin. A dermatologist explains

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p>Social media is full of claims that everyday habits can harm your skin. It’s also full of recommendations or advertisements for products that can protect you.</p> <p>Now social media has blue light from our devices in its sights.</p> <p>So can scrolling on our phones really damage your skin? And will applying creams or lotions help?</p> <p>Here’s what the evidence says and what we should really be focusing on.</p> <h2>Remind me, what actually is blue light?</h2> <p>Blue light is part of the visible light spectrum. Sunlight is the strongest source. But our electronic devices – such as our phones, laptops and TVs – also emit it, albeit at levels <a href="https://melasmaclinic.com.au/wp-content/uploads/2024/01/Melasma-LEDS.pdf">100-1,000 times</a> lower.</p> <p>Seeing as we spend so much time using these devices, there has been some concern about the impact of blue light on our health, including <a href="https://theconversation.com/do-blue-light-glasses-really-work-can-they-reduce-eye-strain-or-help-me-sleep-213145">on our eyes and sleep</a>.</p> <p>Now, we’re learning more about the impact of blue light on our skin.</p> <h2>How does blue light affect the skin?</h2> <p>The evidence for blue light’s impact on skin is still emerging. But there are some interesting findings.</p> <p><strong>1. Blue light can increase pigmentation</strong></p> <p><a href="https://academic.oup.com/ced/article-abstract/46/5/934/6598472?redirectedFrom=fulltext&amp;login=false">Studies</a> <a href="https://onlinelibrary.wiley.com/doi/full/10.1111/srt.13401">suggest</a> exposure to blue light can stimulate production of melanin, the natural skin pigment that gives skin its colour.</p> <p>So too much blue light can potentially worsen hyperpigmentation – overproduction of melanin leading to dark spots on the skin – especially in people with darker skin.</p> <p><strong>2. Blue light can give you wrinkles</strong></p> <p>Some research <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6280109/">suggests</a> blue light might damage collagen, a protein essential for skin structure, potentially accelerating the formation of wrinkles.</p> <p>A laboratory <a href="https://pubmed.ncbi.nlm.nih.gov/29399830/">study suggests</a> this can happen if you hold your device one centimetre from your skin for as little as an hour.</p> <p>However, for most people, if you hold your device more than 10cm away from your skin, that would reduce your exposure <a href="https://en.wikipedia.org/wiki/Inverse-square_law">100-fold</a>. So this is much less likely to be significant.</p> <p><strong>3. Blue light can disrupt your sleep, affecting your skin</strong></p> <p>If the skin around your eyes looks dull or puffy, it’s easy to blame this directly on blue light. But as we know blue light affects sleep, what you’re probably seeing are some of the visible signs of sleep deprivation.</p> <p>We know blue light is particularly good at <a href="https://journals.physiology.org/doi/full/10.1152/japplphysiol.01413.2009?rss=1">suppressing</a> production of melatonin. This natural hormone normally signals to our bodies when it’s time for sleep and helps regulate our sleep-wake cycle.</p> <p>By suppressing melatonin, blue light exposure before bed disrupts this natural process, making it harder to fall asleep and potentially reducing the <a href="https://www.tandfonline.com/doi/abs/10.1080/07420528.2023.2173606">quality of your sleep</a>.</p> <p>The stimulating nature of screen content further disrupts sleep. Social media feeds, news articles, video games, or even work emails can keep our brains active and alert, hindering the transition into a sleep state.</p> <p>Long-term sleep problems can also <a href="https://academic.oup.com/ced/article-abstract/40/1/17/6621145?login=false">worsen</a> existing skin conditions, such as acne, eczema and rosacea.</p> <p>Sleep deprivation can elevate cortisol levels, a stress hormone that breaks down collagen, the protein responsible for skin’s firmness. Lack of sleep can also weaken the skin’s natural barrier, making it more susceptible to environmental damage and dryness.</p> <h2>Can skincare protect me?</h2> <p>The beauty industry has capitalised on concerns about blue light and offers a range of protective products such as mists, serums and lip glosses.</p> <p>From a practical perspective, probably only those with the more troublesome hyperpigmentation known as <a href="https://dermnetnz.org/topics/melasma">melasma</a> need to be concerned about blue light from devices.</p> <p>This condition requires the skin to be well protected from all visible light at all times. The only products that are totally effective are those that block all light, namely mineral-based suncreens or some cosmetics. If you can’t see the skin through them they are going to be effective.</p> <p>But there is a lack of rigorous testing for non-opaque products outside laboratories. This makes it difficult to assess if they work and if it’s worth adding them to your skincare routine.</p> <h2>What can I do to minimise blue light then?</h2> <p>Here are some simple steps you can take to minimise your exposure to blue light, especially at night when it can disrupt your sleep:</p> <ul> <li> <p>use the “night mode” setting on your device or use a blue-light filter app to reduce your exposure to blue light in the evening</p> </li> <li> <p>minimise screen time before bed and create a relaxing bedtime routine to avoid the types of sleep disturbances that can affect the health of your skin</p> </li> <li> <p>hold your phone or device away from your skin to minimise exposure to blue light</p> </li> <li> <p>use sunscreen. Mineral and physical sunscreens containing titanium dioxide and iron oxides offer broad protection, including from blue light.</p> </li> </ul> <h2>In a nutshell</h2> <p>Blue light exposure has been linked with some skin concerns, particularly pigmentation for people with darker skin. However, research is ongoing.</p> <p>While skincare to protect against blue light shows promise, more testing is needed to determine if it works.</p> <p>For now, prioritise good sun protection with a broad-spectrum sunscreen, which not only protects against UV, but also light.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/233335/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, Associate Professor of Dermatology, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/yes-blue-light-from-your-phone-can-harm-your-skin-a-dermatologist-explains-233335">original article</a>.</em></p> </div>

Body

Placeholder Content Image

Optus giving away 20,000 free phones to vulnerable customers

<p>Optus will be giving away 20,000 mobile phones to vulnerable customers ahead of the 3G network shut down. </p> <p>Following the footsteps of Telstra, who gave out <a href="https://www.oversixty.com.au/finance/money-banking/telstra-giving-free-phones-to-elderly-and-remote" target="_blank" rel="noopener">12,000 mobile phones</a> to their most vulnerable remote and elderly customers last month, Optus will offer thousands of free mobile phones to customers enduring financial hardship and vulnerable customers finding it difficult to replace their current phones. </p> <p>“We know that many impacted customers are actually using a 4G handset that reverts to 3G for calls, so it’s vital these customers understand the importance of upgrading their handsets when notified,” Optus’ head of new products Harvey Wright said.</p> <p>Messages have been sent to eligible customers, and the telco giant has also rolled out special deals encouraging Australian's to upgrade. </p> <p>The move to switch off 3G means that soon certain mobile devices will no longer be able to send texts, make calls, or contact triple-0 in an emergency. A few older 4G handsets will also be affected. </p> <p>Telstra will turn off their 3G network on August 31, while Optus will turn it off on September 1. </p> <p>TPG Telecom and Vodafone have already turned it off. </p> <p>Australia's mobile network operators say that the move will help boost the capacity, speed and reliability of the newer 4G and 5G networks. </p> <p>The Australian Mobile Telecommunications Association (AMTA) have also urged customers to take action to ensure that they stay connected. </p> <p>“Whether it’s your day-to-day mobile or one you keep in the drawer for an emergency, we encourage you to check all of your devices to ensure they will be supported once Australia’s 3G networks are switched off,” AMTA chief executive Louise Hyland said. </p> <p>The AMTA suggests that concerned customers should visit their <a href="https://amta.org.au/3g-closure/" target="_blank" rel="noopener">website</a> to find out if their devices will be supported. </p> <p>“It is important to note that while 3G networks are still in operation, those affected mobile devices will continue to connect to any available 3G network while in coverage, to make emergency calls to triple-0,” Hyland said.</p> <p>“However, once the 3G networks are fully closed, these phones will not be able to make emergency calls.</p> <p>“It is crucial to act now if you know you have an older mobile device and you haven’t already upgraded.”</p> <p><em>Image: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Been scammed? Here's how to financially recover

<p>Many people feel shame and embarrassment after realising they have been scammed. But you shouldn’t. You did nothing wrong; you are the victim of a crime. </p> <p>Not only are such feelings bad for your mental wellbeing, but they also often stop people reporting the scam or taking action to avoid further losses. </p> <p>Remember too that you’re not alone: victims reported more than 601,000 scams to the ACCC in 2023, together losing a staggering $2.74 billion. People of all ages, professions, and backgrounds have been affected. </p> <p>As hard as it may be, try to leave emotion aside and approach this like any other money matter – logically and methodically. Doing so will help you act faster and more decisively, which is crucial to your financial recovery. </p> <p>The following checklist will help you through this process:</p> <ul> <li><strong>Step 1 – Try to recoup your stolen money</strong></li> </ul> <p>Report the scam immediately. Contact your bank or card provider to stop the transaction being processed. Notify the company or marketplace where it occurred – they may have options to reverse the payment or for you to claim compensation for fraud. </p> <p>Also inform the ACCC’s Scamwatch and police if relevant, which may aid in tracking down the scammer and will help them alert the wider public on what to look out for. </p> <p>Unfortunately, the money is likely gone for good, but prompt action may just help you get some or all of it back. </p> <ul> <li><strong>Step 2 – Secure your accounts from further thefts</strong></li> </ul> <p>Once scammers have found a way to steal money, they often go back to try for more. Don’t let them! </p> <p>Freeze or cancel affected debit and credit cards, accounts etc. Change and strengthen all your passwords. Set up two-factor authentication if you haven’t already. Remove any suspicious applications on electronic devices. </p> <p>Double check the registrations of any business, adviser or tradesperson before engaging their services. Regularly check your superannuation, investments etc. to monitor for any inconsistencies.</p> <ul> <li><strong>Step 3 – Safeguard your cash flow</strong></li> </ul> <p>Don’t multiplying your losses by racking up new debts to cover the stolen money. That means limiting the use of credit cards, payday lenders and Buy Now, Pay Later schemes. Consider paying with cash instead to help you stick to a budget.</p> <p>If you have lost everything, register with Centrelink for income support. You may also be able to apply for hardship provisions with your bank, phone and energy providers and other essential services.</p> <ul> <li><strong>Step 4 – Get reputable advice</strong></li> </ul> <p>Legal advice may be able to get you out of bogus contracts, like loans or phone plans, and help you in the event your personal information has been stolen (which can be used in various ways to steal money). If you can’t afford a lawyer, there are free alternatives such as Legal Aid or Community Legal Centres. Specialist services such as the Women’s Legal Service may offer support where partner coercion or domestic abuse is involved.</p> <p>Accounting and financial advice may also help you navigate assistance options and longer term recovery efforts.</p> <ul> <li><strong>Step 5 – Rebuild your finances</strong></li> </ul> <p>Your ability to rebuild your finances after a scam will depend on a range of factors, including how much was lost plus your age and circumstances.</p> <p>You could seek to increase your earnings and/or cut your spending by tweaking your household budget, delaying retirement, or temporarily taking a second job to boost your income. </p> <p>Another option is to make your remaining finances work harder than before, such as adjusting your investment strategies (e.g. changing your risk weightings or selling assets) including within your superannuation or accessing equity in your home.</p> <p>If you’re a self-funded retiree, you may now qualify for a part or full pension if your scam losses push your total assets below the means test threshold.</p> <p>Ultimately, the most important things when dealing with the fallout from a scam is to look after yourself and protect what you have left.</p> <p>Scammers have already taken off with your dollars. Don’t let them steal your sense too!</p> <p><em><strong>Helen Baker is a licensed Australian financial adviser and author of On Your Own Two Feet: The Essential Guide to Financial Independence for all Women. Helen is among the 1% of financial planners who hold a master’s degree in the field. Proceeds from book sales are donated to charities supporting disadvantaged women and children. Find out more at <a href="http://www.onyourowntwofeet.com.au/">www.onyourowntwofeet.com.au</a></strong></em></p> <p><em><strong>Disclaimer: The information in this article is of a general nature only and does not constitute personal financial or product advice. Any opinions or views expressed are those of the authors and do not represent those of people, institutions or organisations the owner may be associated with in a professional or personal capacity unless explicitly stated. Helen Baker is an authorised representative of BPW Partners Pty Ltd AFSL 548754.</strong></em></p> <p><em>Image </em><em>credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Aussies warned over new nbn scam

<p>Aussies have been warned against a new nbn scam targeting businesses and residents. </p> <p>Last year,  about 1,800 Australians lost more than $1.2 million to scammers pretending to be nbn employees in a remote access scam. </p> <p>Now, they have found a new way to scam unsuspecting businesses and residents by pretending to be employees and getting people to hand over their personal details and money in areas where <em>actual</em> nbn employees are working. </p> <p>The opportunistic scammers have been randomly knocking on doors or cold calling homes in areas where nbn technicians are installing new fibre. </p> <p>A few people have already been duped, with nbn impersonators calling customers claiming they need money to pay for new internet hardware or postage costs. </p> <p>Scammers have also offered to inspect people's homes for a nbn fibre upgrade and took their bank account details in the process. </p> <p>Other impersonators have called customers saying they would show up a few days later, despite having no prior appointment booked. </p> <p>Scammers have also impersonated staff, and used the presence of actual nbn vehicles on the street as proof of their authenticity. </p> <p>“These impersonators are also asking residents for payment to test their services or secure upgrades and repair works in the future,” nbn Local head Chris Cusack said. </p> <p>“In taking the payment these people are then skimming banking and card details to extract more money afterwards.</p> <p>“We are asking residents to be extra-vigilant against scams, especially while legitimate nbn work is underway.”</p> <p>Nbn has advised that their technicians would always contact people to ensure they were aware of visits before their appointments, and inform them of where they will be doing fibre upgrades. </p> <p>They also send their customers texts to confirm or cancel the appointment, and let them know when they are on their way. </p> <p>Nbn technicians never ask for payment for an appointment, postage costs, hardware costs, or access to any devices. </p> <p>Approved technicians and workers all carry identification cards, and the nbn Local head suggested that customers should always request to see the card before providing access to their residence. </p> <p>“Do not share your bank or personal details with an unsolicited caller or with people who door knock claiming to be from nbn trying to sell you an nbn service or seeking payment for related services,” Cusack said.</p> <p>“If you get contacted like this, please close your door, or hang up the phone and report it to the ACCC’s Scam watch.”</p> <p><em>Images: news.com.au</em></p>

Legal

Placeholder Content Image

Andrew "Twiggy" Forrest's major win over scam ads

<p>Andrew "Twiggy" Forrest has had a major win against Facebook owner Meta, with a US court allowing him to continue to sue the platform over fake advertisements using his name. </p> <p>The scam Facebook ads show him promoting fake cryptocurrency and other fraudulent investments.</p> <p>The ruling means that the court will consider whether Meta breached its duty by publishing the advertisements, and whether they operated in a way that facilitated scam ads by using defective screening and review procedures.</p> <p>US District Judge Casey Pitts in San Jose, California, made the decision on Monday, and said that Forrest can try to prove Meta's negligence and whether his name and likeness was misappropriated by Meta, and not just by fraudsters behind the bogus ads.</p> <p>"Dr Forrest claims that Meta profited more from ads that included his likeness than it would have if the ads had not," Pitts wrote.</p> <p>"This is enough to adequately plead that the alleged misappropriation was to Meta's advantage."</p> <p>Forrest said that there were over 1000 ads scam ads using his name that appeared on Facebook in Australia between April and November 2023, leading to millions of dollars in losses for victims.</p> <p>The billionaire reportedly first raised the fraudulent advertisements with Meta back in 2014, but nothing happened, according to the <em>Herald Sun. </em></p> <p>This is the first time a social media company was unable to invoke Section 230 immunity in a US civil case over its advertising business. </p> <p>It's a significant move, as social media companies in the US are usually immune from liability in the US for content posted by third parties. </p> <p>"This is a crucial strategic victory in the battle to hold Facebook accountable," Forrest said.</p> <p>The billionaire is seeking compensatory and punitive damages. </p> <p><em>Image: Dinendra Haria/LNP/ Shutterstock Editorial</em></p>

Legal

Placeholder Content Image

Why you should be wary of charging your phone in an airport

<p dir="ltr">While charging stations at airports can often be life-savings before boarding a flight, it turns out these handy outlets can be leaving you vulnerable. </p> <p dir="ltr">Many people have fought over a spot to charge up your devices at the last minute before embarking on a holiday, but next time you leave home with your phone or laptop needing some more juice, think again. </p> <p dir="ltr">Emily Stallings, co-founder of tech retailer <em><a href="https://www.getcasely.com/">Casely</a></em>, says that by plugging your phone into a power outlet at a public USB charging station, you're at risk of data breaches and malware infection.</p> <p dir="ltr">"If a device gets infected, it could end up leaking sensitive information or even stop working properly," she told <em><a href="https://travel.nine.com.au/latest/charging-phone-at-the-airport-danger-expert/57d141df-33ba-4a50-89e5-26f6f2a0c18d">9Travel</a></em>.</p> <p dir="ltr">These public USB ports have often been compromised by cybercriminals, who then use these unsecured ports to steal sensitive information transmitted between devices.</p> <p dir="ltr">"From personal emails to financial data, the information intercepted through these compromised ports could lead to identity theft, financial loss, and other serious consequences," explains Stallings.</p> <p dir="ltr">The best way to get around this threat, without letting your phone run out of battery, is to pack a portable charging device in your carry-on bag every time you travel.</p> <p dir="ltr">With your own cord and power bank, it's far less likely that any sneaky hackers will be able to access your device's data.</p> <p dir="ltr">Stallings says you can also enable security features such as USB Restricted Mode on your device, for those moments when you're desperate for a charger and have to rely on public ports. </p> <p dir="ltr">"This adds an extra layer of protection against potential data breaches and malware infections when charging from public USB ports."</p> <p dir="ltr">"By activating USB Restricted Mode or similar security features, you restrict data transfer over USB connections, effectively preventing unauthorised access to your device's data while charging in public spaces."</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p> <p> </p>

Travel Tips

Placeholder Content Image

Telstra giving free phones to elderly and remote

<p>With the 3G network set to shut down completely on August 31, Telstra announced that it will be giving 12,000 mobile phones away for free in a bid to help the most vulnerable customers switch to 4G. </p> <p>Starting from Tuesday, the telecommunications company will be issuing complimentary phones to customers who are elderly, live rurally or are facing difficult situations. </p> <p>These include those facing financial issues, recovering from natural disasters, or those who have a life-threatening medical condition and therefore rely on a working phone. </p> <p>Telstra have also identified those who live regionally or are over 80 years old and may require extra transition support, as they may have difficulty accessing a physical store to make the switch. </p> <p>Those who are flagged as eligible will be contacted by the telco company, and they are encouraging customers who receive the message to follow the instructions given to make the switch. </p> <p>Major Brendan Nottle from The Salvation Army has praised this initiative for helping the "most vulnerable members of our community."</p> <p>“Connection is one of the most important things to maintain in our society, whether it is with friends and family or with housing and support services,” he said.</p> <p>“Ensuring that every Australian, from any background or level of income, can take part in our modern digital society is crucial.</p> <p>“A phone can be a gateway to social inclusion, community connection and support, and with the upcoming closure of 3G networks in Australia it is important for us to reach out and ensure that this can continue for everyone.”</p> <p>Customers who are yet to upgrade are also told to make the switch sooner than later. </p> <p>Other devices that will be affected by the shutdown include certain smart watches, tablets, medical alarms, EFTPOS terminals and security monitors.</p> <p><em>Images: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

Worried your address, birth date or health data is being sold? You should be – and the law isn’t protecting you

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Australians don’t know and can’t control how data brokers are spreading their personal information. This is the core finding of a newly <a href="https://www.accc.gov.au/system/files/Digital-platform-services-inquiry-March-2024-interim-report.pdf">released report</a> from the Australian Competition and Consumer Commission (ACCC).</p> <p>Consumers wanting to rent a property, get an insurance quote or shop online are not given real choices about whether their personal data is shared for other purposes. This exposes Australians to scams, fraud, manipulation and discrimination.</p> <p>In fact, <a href="https://www.accc.gov.au/media-release/consumers-lack-visibility-and-choice-over-data-collection-practices">many don’t even know</a> what kind of data has been collected about them and shared or sold by data firms and other third parties.</p> <p>Our privacy laws are due for reform. But Australia’s privacy commissioner <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">should also enforce</a> an existing rule: with very limited exceptions, businesses must not collect information about you from third parties.</p> <h2>What are data brokers?</h2> <p><a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">Data brokers</a> generally make their profits by collecting information about individuals from various sources and sharing this personal data with their many business clients. This can include detailed profiles of a person’s family, health, finances and movements.</p> <p>Data brokers often have no connection with the individual – you may not even recognise the name of a firm that holds vast amounts of information on you. Some of these data brokers are large multinational companies with billions of dollars in revenue.</p> <p>Consumer and privacy advocates provided the ACCC with evidence of highly concerning data broker practices. <a href="https://www.accc.gov.au/system/files/Salinger%20Privacy.pdf">One woman</a> tried to find out how data brokers had got hold of her information after receiving targeted medical advertising.</p> <p>Although she never discovered how they obtained her data, she found out it included her name, date of birth and contact details. It also included inferences about her, such as her retiree status, having no children, not having “high affluence” and being likely to donate to a charity.</p> <p>ACCC found another data broker was reportedly creating lists of individuals who may be experiencing vulnerability. The categories included:</p> <ul> <li>children, teenage girls and teenage boys</li> <li>“financially unsavvy” people</li> <li>elderly people living alone</li> <li>new migrants</li> <li>religious minorities</li> <li>unemployed people</li> <li>people in financial distress</li> <li>new migrants</li> <li>people experiencing pain or who have visited certain medical facilities.</li> </ul> <p>These are all potential vulnerabilities that could be exploited, for example, by scammers or unscrupulous advertisers.</p> <h2>How do they get this information?</h2> <p>The ACCC notes <a href="https://cprc.org.au/wp-content/uploads/2023/03/CPRC-working-paper-Not-a-fair-trade-March-2025.pdf">74% of Australians are uncomfortable</a> with their personal information being shared or sold.</p> <p>Nonetheless, data brokers sell and share Australian consumers’ personal information every day. Businesses we deal with – for example, when we buy a car or search for natural remedies on an online marketplace – both buy data about us from data brokers and provide them with more.</p> <p>The ACCC acknowledges consumers haven’t been given a choice about this.</p> <p>Attempting to read every privacy term is near impossible. The ACCC referred to a recent study which found it would take consumers <a href="https://www.mi-3.com.au/06-11-2023/aussies-face-10-hour-privacy-policy-marathon-finds-study">over 46 hours a month</a> to read every privacy policy they encounter.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=131&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/595623/original/file-20240522-23-2zkuc.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=165&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">The approximate length and time it would take to read an average privacy policy in Australia per month.</span> <span class="attribution"><a class="source" href="https://www.accc.gov.au/about-us/publications/serial-publications/digital-platform-services-inquiry-2020-25-reports/digital-platform-services-inquiry-interim-report-march-2024">ACCC Digital Platform Services Inquiry interim report</a></span></figcaption></figure> <p>Even if you could read every term, you still wouldn’t get a clear picture. Businesses use <a href="https://cprc.org.au/wp-content/uploads/2024/02/CPRC-Singled-Out-Final-Feb-2024.pdf">vague wording</a> and data descriptions which <a href="https://theconversation.com/70-of-australians-dont-feel-in-control-of-their-data-as-companies-hide-behind-meaningless-privacy-terms-224072">confuse consumers</a> and have no fixed meaning. These include “pseudonymised information”, “hashed email addresses”, “aggregated information” and “advertising ID”.</p> <p>Privacy terms are also presented on a “take it or leave it” basis, even for transactions like applying for a rental property or buying insurance.</p> <p>The ACCC pointed out 41% of Australians feel they have been <a href="https://www.choice.com.au/consumers-and-data/data-collection-and-use/how-your-data-is-used/articles/choice-renttech-report-release">pressured to use “rent tech” platforms</a>. These platforms collect an increasing range of information with questionable connection to renting.</p> <h2>A first for Australian consumers</h2> <p>This is the first time an Australian regulator has made an in-depth report on the consumer data practices of data brokers, which are generally hidden from consumers. It comes <a href="https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf">ten years after</a> the United States Federal Trade Commission (FTC) conducted a similar inquiry into data brokers in the US.</p> <p>The ACCC report examined the data practices of nine data brokers and other “data firms” operating in Australia. (It added the term “data firms” because some companies sharing data about people argue that they are not data brokers.)</p> <p>A big difference between the Australian and the US reports is that the FTC is both the consumer watchdog and the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913">privacy regulator</a>. As our competition and consumer watchdog, the ACCC is meant to focus on competition and consumer issues.</p> <p>We also need our privacy regulator, the Office of the Australian Information Commissioner (OAIC), to pay attention to these findings.</p> <h2>There’s a law against that</h2> <p>The ACCC report shows many examples of businesses collecting personal information about us from third parties. For example, you may be a customer of a business that only has your name and email address. But that business can purchase “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4224653">data enrichment</a>” services from a data broker to find out your age range, income range and family situation.</p> <p>The <a href="https://www.legislation.gov.au/C2004A03712/latest/text">current Privacy Act</a> includes <a href="https://www.oaic.gov.au/privacy/australian-privacy-principles/read-the-australian-privacy-principles">a principle</a> that organisations must collect personal information only from the individual (you) unless it is unreasonable or impracticable to do so. “Impracticable” means practically impossible. This is the direct collection rule.</p> <p>Yet there is no reported case of the privacy commissioner enforcing the direct collection rule against a data broker or its business customers. Nor has the OAIC issued any specific guidance in this respect. It should do both.</p> <h2>Time to update our privacy laws</h2> <p>Our privacy law was drafted in 1988, long before this complex web of digital data practices emerged. Privacy laws in places such as California and the European Union provide much stronger protections.</p> <p>The government has <a href="https://ministers.ag.gov.au/media-centre/speeches/privacy-design-awards-2024-02-05-2024">announced</a> it plans to introduce a privacy law reform bill this August.</p> <p>The ACCC report reinforces the need for vital amendments, including a direct right of action for individuals and a rule requiring dealings in personal information to be “fair and reasonable”.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/230540/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/katharine-kemp-402096">Katharine Kemp</a>, Associate Professor, Faculty of Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/worried-your-address-birth-date-or-health-data-is-being-sold-you-should-be-and-the-law-isnt-protecting-you-230540">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

"I felt duped": 95-year-old loses $1.6 million in bank scam

<p>A 95-year-old has been left feeling "sick" after she was scammed out of $1.6 million by heartless scammers claiming to be a bank. </p> <p>In November last year, Harriet Spring received a call from a man who called himself George Thompson, and said he worked for ING Bank. </p> <p>The man gained Harriet's trust over several months, at the difficult time that the great-grandmother was handling the sale of her mother's house.</p> <p>"Over time, I completely thought he was from ING, I had no reason to believe he wasn't," she told <a href="https://9now.nine.com.au/today/95-year-old-great-grandmother-loses-more-than-1-million-life-savings-to-scammers/f41540e7-f5c9-4c3b-89a7-ac94dd81bf6a" target="_blank" rel="noopener"><em>Today</em></a>.</p> <p>"George" then convinced Harriet the money from the sale of the house could build interest in an ING account, but it was actually being held by Westpac Bank.</p> <p>"It sounds implausible now, but the scammer had me convinced and I told my mother's bank, Teachers Mutual Bank, that this was an ING fixed term deposit, but it was being put in the Westpac bank," she said.</p> <p>"I put down the BSB number and the account number and what I thought was my name attached to the account, (my mother's bank) pointed out that it seems strange and ING account would be held with Westpac, but they still went ahead and authorised the transfer."</p> <p>When Harriet realised the scammers had taken hold of her life savings totalling $1.6 million, she felt "sick". </p> <p>"Obviously my world just fell out from under me - I just felt sick," she said.</p> <p>"I felt utterly responsible, I felt duped, foolish, ashamed - a lot of shame associated with it and I think that's why a lot of people don't come forward and talk about this kind of thing."</p> <p>Harriet has shared her story as a warning for others to be wary of potential scammers, while also calling on banks to have better protocols in place to stop suspicious transactions from going through. </p> <p>"Someone with basic training from the bank would have known that ING don't bank with any other banks and they should have flagged it," she said.</p> <p>"I believe the reality is that the banks 100 per cent put the blame on the victims and they minimise their own liability."</p> <p>"There should be some sort of system for compensating victims, the banks don't commit the theft, but they certainly drive the getaway car and they need to be held responsible for being complicit with this."</p> <p><em>Image credits: Today </em></p>

Legal

Placeholder Content Image

How to avoid 6 common tourist scams

<p>Often when people are on holidays their focus is on relaxing or seeing the sights of the area. But if you don’t keep your wits about you, it’s possible you might end up losing everything to scammers who will do anything to get their hands on your belongings.</p> <p>Here we have six common scams to look out for while you are travelling abroad.</p> <p><strong>Scam 1:</strong> You are in a busy bar in a tourist friendly area when some locals ask where you’re from and offer to buy you a drink. Without thinking, you accept the drink and then find yourself waking up hours later without any of your belongings as you’ve had your drink spiked.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> If people seem too friendly, be aware that they may be scammers. Don’t accept drinks from people you don’t know, and don’t leave your drink unattended to use the bathroom.</p> <p><strong>Scam 2:</strong> You are about to put your handbag and computer on the conveyer belt to go through the scanner. The people in front of you walk through the metal detector and while one goes through, the other sets off the alarms. They step back into where you are standing and take their time removing wallets and coins from their pockets. While you are waiting for your turn to walk through the metal detector, the other person has taken your belongings and is long gone.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Don’t place your items on the conveyer belt until there is no one else waiting in front of you to go through the metal detector.</p> <p><strong>Scam 3:</strong> In a busy area such as after a concert or a busy night like New Year’s Eve it can be impossible to get public transport or a taxi back to your hotel. A friendly looking guy comes by and offers you a lift for a reasonable fee using his private car. The scam itself can then range from being charged an exorbitant amount when you arrive at your hotel – or you could even find yourself robbed and dropped by the side of the road with no way home.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> However tempting it is, never get in the car with an unlicensed taxi driver. This is even more important to note if you are travelling alone.</p> <p><strong>Scam 4:</strong> While you are waiting with your luggage for a train or bus, a passer-by appears to drop their wallet and walk off without noticing. You might try to do the right thing by grabbing the wallet and running after the person to return it. By the time you get back, your luggage is missing.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> When travelling alone, never leave your items unattended even if it means you don’t help someone when you normally would. This is especially true in airports where baggage will quickly be confiscated if left alone.</p> <p><strong>Scam 5:</strong> You’re taking in the sights when a couple of men dressed as policemen approach you. They demand to see your wallet and let you know that counterfeit money has been given to tourists in the area. When your wallet is returned it has had much of the contents removed.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Police would never demand to see your wallet. If something doesn’t feel right, suggest that you continue the discussion at the nearest police station as you don’t feel comfortable. Most likely they will not push their luck.</p> <p><strong>Scam 6:</strong> You receive a phone call in your hotel room late at night from someone claiming to be from the front desk. They apologise for the late call but request that you just confirm your credit card details as their system is playing up. You read out the numbers and hang up. Before too long your credit card has rung up a huge bill as this was a scammer calling you, not a staff member.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Organise payment in person by letting the caller know that you will come down to the front desk to discuss it.</p> <p><em>Image credits: Getty Images </em></p>

Travel Tips

Placeholder Content Image

Kochie's thoughtful act for scam victim

<p>David Koch has given back to a hard-working Aussie who lost her life savings to a convincing scam. </p> <p>For many years, scammers have been using the likeness of Australian celebrities to con people out of their money. </p> <p>Kochie is just one of many high-profile personalities who have had their identities used to run convincing scams, that thousands of people have fallen victim to. </p> <p>The former <em>Sunrise</em> host has often taken to social media to warn people of the illegitimate ads, but it hasn't been enough to stop the scammers in their tracks. </p> <p>In a special <em>7News Spotlight</em> investigation, Kochie joined the team to lift the lid on the multi-billion-dollar scam industry in which fake advertisements featuring well-known celebrities have been used to con more than 600,000 Aussies.</p> <p>“It’s devastating because it’s my reputation on the line,” says Koch.</p> <p>“And these scams are so good, they’re so believable that people who trust me look at me and say, ‘Wow, I’m getting some comfort out of what this bloke is saying,’ and then are ripped off by some scammer from overseas.”</p> <p>Koch is desperately trying to stop this criminal act, saying, “I’ve reported it to the ACCC and ASIC. I’m part of an ACCC case against Meta at the moment surrounding these scam ads.”</p> <p>As part of the investigation, Kochie met Allison, who lost $250,000 when she invested her money in what she thought was a reputable company, fronted by who she believed to be the former <em>Sunrise</em> host.</p> <p>As an avid Port Adelaide supporter, she trusts Koch, who is also the Chairman of the football club.</p> <p>“Port Adelaide members are all part of a big family,” says Koch. “And the fact that these scammers use my association with the club to prey on members is just abhorrent.”</p> <p>After losing her savings, Allison has been struggling to make ends meet, and is on a payment plan so she can stay as a member of the AFL club she loves.</p> <p>After learning of her story, Koch himself has stepped in and ensured she has lifelong membership.</p> <p>“It’s the least we can do,” says Koch to Allison. “Because, football has got to be your haven.”</p> <p>Allison is just one of the many victims of complex scams in Australia, with reporter Sarah Greenhalgh believes millions of dollars have been illegally stolen.</p> <p>“The scammers successfully prey on these people’s unique vulnerabilities and the victims’ lives have changed forever as a result,” she says.</p> <p><em>Image credits: 7News Spotlight</em></p>

Money & Banking

Our Partners