Placeholder Content Image

How to avoid 6 common tourist scams

<p>Often when people are on holidays their focus is on relaxing or seeing the sights of the area. But if you don’t keep your wits about you, it’s possible you might end up losing everything to scammers who will do anything to get their hands on your belongings.</p> <p>Here we have six common scams to look out for while you are travelling abroad.</p> <p><strong>Scam 1:</strong> You are in a busy bar in a tourist friendly area when some locals ask where you’re from and offer to buy you a drink. Without thinking, you accept the drink and then find yourself waking up hours later without any of your belongings as you’ve had your drink spiked.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> If people seem too friendly, be aware that they may be scammers. Don’t accept drinks from people you don’t know, and don’t leave your drink unattended to use the bathroom.</p> <p><strong>Scam 2:</strong> You are about to put your handbag and computer on the conveyer belt to go through the scanner. The people in front of you walk through the metal detector and while one goes through, the other sets off the alarms. They step back into where you are standing and take their time removing wallets and coins from their pockets. While you are waiting for your turn to walk through the metal detector, the other person has taken your belongings and is long gone.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Don’t place your items on the conveyer belt until there is no one else waiting in front of you to go through the metal detector.</p> <p><strong>Scam 3:</strong> In a busy area such as after a concert or a busy night like New Year’s Eve it can be impossible to get public transport or a taxi back to your hotel. A friendly looking guy comes by and offers you a lift for a reasonable fee using his private car. The scam itself can then range from being charged an exorbitant amount when you arrive at your hotel – or you could even find yourself robbed and dropped by the side of the road with no way home.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> However tempting it is, never get in the car with an unlicensed taxi driver. This is even more important to note if you are travelling alone.</p> <p><strong>Scam 4:</strong> While you are waiting with your luggage for a train or bus, a passer-by appears to drop their wallet and walk off without noticing. You might try to do the right thing by grabbing the wallet and running after the person to return it. By the time you get back, your luggage is missing.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> When travelling alone, never leave your items unattended even if it means you don’t help someone when you normally would. This is especially true in airports where baggage will quickly be confiscated if left alone.</p> <p><strong>Scam 5:</strong> You’re taking in the sights when a couple of men dressed as policemen approach you. They demand to see your wallet and let you know that counterfeit money has been given to tourists in the area. When your wallet is returned it has had much of the contents removed.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Police would never demand to see your wallet. If something doesn’t feel right, suggest that you continue the discussion at the nearest police station as you don’t feel comfortable. Most likely they will not push their luck.</p> <p><strong>Scam 6:</strong> You receive a phone call in your hotel room late at night from someone claiming to be from the front desk. They apologise for the late call but request that you just confirm your credit card details as their system is playing up. You read out the numbers and hang up. Before too long your credit card has rung up a huge bill as this was a scammer calling you, not a staff member.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Organise payment in person by letting the caller know that you will come down to the front desk to discuss it.</p> <p><em>Image credits: Getty Images </em></p>

Travel Tips

Placeholder Content Image

Tourist slapped with $225k bill after simple mistake

<p>An American tourist has revealed the moment he was charged with a $US143k (AU$225k) bill after a short holiday to Switzerland. </p> <p>Rene Remund and his wife Linda went on the trip last September.</p> <p>Prior to their travels, Remund made sure to inform his mobile phone provider, T-Mobile, that he was going overseas and as a customer of 30 years, he was told he was “covered”.</p> <p>So, with no worries at all, the tourist shared photos of his moments in the Swiss countryside with friends and family via photo messages. </p> <p>Imagine his surprise when he came home to a six-figure bill, after he racked up thousands and thousands of dollars in daily roaming costs. </p> <p>“I get this T-Mobile bill and it doesn’t bother me very much because I was reading $143,” he explained, adding it wasn’t until he went to pay the bill that he realised a few more zeros were involved.</p> <p>“I look at the bill and I say, ‘excuse me’,” he said.</p> <p>“$143,000 … are you guys crazy?”</p> <p>According to the bill, Remund had racked up 9.5 gigabytes of data while in Europe, which cost him thousands of dollars each day. While it wasn't a huge amount of data, not being covered by roaming fees will cause a user to run up a huge bill very quickly. </p> <p>“I called [T-Mobile] and the girl put me on hold for a while,” he explained.</p> <p>“She said let me check this out and I’ll get back to you. She gets back and says, yeah this is a good bill.</p> <p>“I said, ‘what do you mean it’s a good bill?’ And she says ‘well, this is what you owe’.</p> <p>“I said ‘you’re kidding me … you’re crazy’.”</p> <p>After confirming that his bill was in fact  AU$225,000, Remund hired a lawyer to argue the fact that he was covered for international roaming. </p> <p>His lawyer issued a letter to the president of T-Mobile, and they only received a reply a few days ago. </p> <p>The letter from T-Mobile allegedly said that the service provider was “sorry” for the charges, and that Remund would receive a “credit” to eliminate the entire bill. </p> <p>In an email shared to local media <em>Scripps News Tampa</em>, the mobile phone provider said that customers should always “check the travel features of their plan, such as international data roaming, before departing”.</p> <p>“If a customer is on an older plan that doesn’t include international roaming for data and calling, they’ll need to make sure they’re using aeroplane mode and wi-fi when using data to be certain the device doesn’t connect to an international network.”</p> <p><em style="box-sizing: inherit; margin: 0px; padding: 0px; border: 0px; font-size: 16px; vertical-align: baseline; color: #323338; font-family: Figtree, Roboto, 'Noto Sans Hebrew', 'Noto Kufi Arabic', 'Noto Sans JP', sans-serif; background-color: #ffffff; outline: none !important;">Images: ABC Action News</em></p> <p> </p>

Travel Trouble

Placeholder Content Image

What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

<p><em><a href="https://theconversation.com/profiles/mike-johnstone-106590">Mike Johnstone</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p>Not a day goes by without a headline <a href="https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories">about a victim being scammed</a> and losing money. We are constantly warned about new scams and staying safe from cybercriminals. Scamwatch has <a href="https://www.scamwatch.gov.au/research-and-resources/tools-resources/online-resources/spot-the-scam-signs">no shortage of resources</a>, too.</p> <p>So why are people still getting scammed, and sometimes spectacularly so?</p> <p>Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</p> <p>This “<a href="https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html">psychological warfare</a>” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</p> <p>Let’s unpack some of these psychological techniques, and how you can defend against them.</p> <h2>1. Random phone calls</h2> <p>Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</p> <p>The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</p> <p>If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know. They can use this info either immediately or at a later date.</p> <h2>2. Creating a sense of urgency</h2> <p>Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</p> <p>The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls <a href="https://theconversation.com/we-have-filed-a-case-under-your-name-beware-of-tax-scams-theyll-be-everywhere-this-eofy-162171">alleging to be from the Australian Tax Office</a> (ATO) are a great example. You have a debt to pay (apparently) and things will go badly if you don’t pay <em>right now</em>.</p> <p>Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</p> <h2>3. Building rapport with casual talk</h2> <p>Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</p> <p>After staying on the line for long periods of time, the victim also becomes cognitively fatigued. This not only makes the victim more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</p> <h2>4. Help me to help you</h2> <p>In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</p> <p>Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: they helped you first.</p> <p>For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</p> <p>Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You <em>know</em> company policy is to not divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</p> <p>The balance of the social debt says you will help them.</p> <h2>5. Appealing to authority</h2> <p>By posing as line managers, officials from government agencies, banks, or other authoritative bodies, scammers exploit our natural tendency to obey authority.</p> <p>Such scams operate at varying levels of sophistication. The simple version: your manager messages you with an <em>urgent</em> request to purchase some gift cards and send through their numbers.</p> <p>The complex version: your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because <a href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402">it sounds exactly</a> like your manager on the phone – but the scammer <a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559">is using a voice deepfake</a>. In a recent major case in Hong Kong, such a scam even involved a <a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">deepfake video call</a>.</p> <p>This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create <a href="https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/">a voice deepfake</a> using just three seconds of sampled audio from a real person.</p> <h2>How can you defend against a scam?</h2> <p>First and foremost, <strong>verify identity</strong>. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</p> <p>In the face of rampant voice deepfakes, it can be helpful to <strong>agree on a “safe word” with your family members</strong>. If they call from an unrecognised number and you don’t hear the safe word just hang up.</p> <p>Watch out for <strong>pressure tactics</strong>. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</p> <p>Lastly, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, the ATO will write to you.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/223959/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/mike-johnstone-106590"><em>Mike Johnstone</em></a><em>, Security Researcher, Associate Professor in Resilient Systems, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, Postdoctoral research fellow, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

8 places you should never keep your phone

<p><strong>In your pocket</strong></p> <p>Keeping your phone in your pocket seems logical, but you could be doing more harm than good. According to Dr Lilly Friedman, this is actually the worst place to store your phone. “When phones are on, connected to a wireless network, and placed in a pocket, the radiation is two to seven times higher than if it were placed in a purse or holster,” she says. </p> <p>There is a correlation between radiation from a mobile phone and tumour growth, she adds. Plus, radiation can change the structure of DNA and affect male fertility, according to Dr Friedman. The World Health Organization’s International Agency for Research on Cancer also found that mobile phone radiation is additionally carcinogenic to humans. Merely sitting on your phone could cause health issues such as sciatica or back problems.</p> <p><strong>In your bra</strong></p> <p>Some research and case studies show that keeping your phone in your bra could be linked to breast cancer due to the radiations and vibrations from the phone. That said, there is not enough evidence to establish a definite relationship between the two. Still, keeping your phone in your bra, especially a sports bra, is a bad idea due to the skin-irritating bacteria it could harbour, Muscle &amp; Fitness reports.</p> <p><strong>In your bed or under your pillow</strong></p> <p>Sleeping with your phone is a bad idea for a few reasons. First, keeping your phone under your pillow could build up heat and present a potential fire hazard, especially if your phone is charging or has a defect. It’s also known that the LED light from phone screens can disrupt melatonin production and circadian rhythms, hurting your sleep quality, according to the National Sleep Foundation.</p> <p>And, of course, there’s also radiation to consider. The amounts of radio frequency radiation mobile phones give off are the same ones emitted from microwaves. There is also concern about the safety of mobile phone use with respect to cancer and brain tumours, per the American Cancer Society.</p> <p><strong>Plugged in</strong></p> <p>Keeping your phone plugged in when it has a full battery causes damage to the battery itself, according to pcmag.com. It’s not that your phone ‘overloads’ with power, but heat build-ups from stacking things on top of your phone or keeping it under your pillow, making your phone hotter and damaging your battery.</p> <p><strong>Close to your face</strong></p> <p>Keeping your phone close to your face means bacteria transfers to and from your phone, making your skin and phone dirtier. This combination leads to more acne, skin irritation and even wrinkles, according to Allure. Try using ear pods instead to keep the surface of your phone at a distance from your face.</p> <p><strong>In your glovebox</strong></p> <p>Extreme temperatures are the worst conditions for your phone. So keeping your device in your car’s glovebox during the extremely hot or cold months of the year could lead to problems. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. The cold weather presents just as many issues for your device. In cold temperatures, many smartphones shut off, have display problems, shortened battery life and in rare cases screen shattering.</p> <p><strong>On your beach towel </strong></p> <p>Notice a theme here? The extreme sun and heat at the beach is a recipe for phone disaster. Protect your device after you finish taking beautiful beach pictures. Hot and sunny conditions could, again, cause your phone to overheat – and getting sand in your phone won’t help either.</p> <p><strong>Anywhere in the bathroom</strong></p> <p>Although phones could arguably be the new newspaper, it’s not a good idea to take yours into the bathroom. Even if you keep your device on a counter or away from the toilet, anything within a metre of a flushing toilet could mean bacteria or viruses in the air end up on your phone, according to a study published in Applied and Environmental Microbiology. </p> <p>“The detection of bacteria and viruses falling out onto surfaces in bathrooms after flushing indicated that they remain airborne long enough to settle on surfaces throughout the bathroom,” wrote the study authors.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/healthsmart/8-places-you-should-never-keep-your-phone" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

How to protect yourself from cyber-scammers over the festive period

<p><em><a href="https://theconversation.com/profiles/rachael-medhurst-1408437">Rachael Medhurst</a>, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p>The festive season is a time for joy, family and festive cheer. However, it’s also a prime target for cybercriminals. As online shopping ramps up, so does the risk of falling prey to cyber-attacks. That’s why it’s crucial to be extra vigilant about your <a href="https://blog.tctg.co.uk/12-cyber-security-tips-of-christmas">cybersecurity</a> during this time.</p> <p>Here are some essential tips to safeguard yourself and your data during the festive period:</p> <h2>Phishing</h2> <p>Phishing is when criminals use scam emails, text messages or phone calls to trick their victims. Their <a href="https://www.ncsc.gov.uk/collection/phishing-scams">goal</a> is often to make you visit a certain website, which may download a virus on to your computer, or steal bank details or other personal data.</p> <p>This type of scam tends to <a href="https://www.egress.com/blog/phishing/holiday-phishing-scam-guide">increase</a> at this time due to the amount of people having bought or received new gadgets and technology.</p> <p>Look out for there being no direct reference to your name in any communications, with wording such as “Dear Sir/Madam” or other terms such as “valued customer” being used instead. Grammar and spelling mistakes are also often present.</p> <p>Be wary of any suspicious links or attachments within emails too, and don’t click them. It’s better to contact the company directly to check if the message is genuine. You can also <a href="https://www.ncsc.gov.uk/collection/phishing-scams">report</a> suspicious messages and phishing scams to the government’s National Cyber Security Centre.</p> <h2>Shopping safely online</h2> <p>The convenience of online shopping is undeniable, especially during the festive season. However, it’s crucial to prioritise your security when buying online.</p> <p>Before entering your personal and financial information on any website, ensure it’s legitimate and secure. Look for the “https” in the address bar and a <a href="https://theconversation.com/the-vast-majority-of-us-have-no-idea-what-the-padlock-icon-on-our-internet-browser-is-and-its-putting-us-at-risk-216581">padlock</a> icon, which indicates a secure and encrypted connection.</p> <p>When creating passwords for online shopping accounts, use strong, unique combinations of letters, numbers and symbols. Avoid using the same password for multiple accounts, as a breach on one site could compromise all your others.</p> <p>As with shopping in the real world, be cautious when encountering offers that are significantly below usual prices or which make extravagant promises. Always conduct thorough research on the seller and product before making a purchase. If a deal seems too good to be true, it probably is.</p> <p>And if you are out shopping in towns or city centres, there will often be a large number of public wifi options available to you. However, criminals can intercept the data that is transferred across such open and unsecured wifi. So, avoid using public wifi where possible, especially when conducting any financial transactions.</p> <h2>Social media</h2> <p>While social media platforms provide people with a means to keep in touch with family and friends over the festive period, they are often a goldmine for <a href="https://www.which.co.uk/consumer-rights/advice/how-to-spot-a-social-media-scam-aMtwF3u1XKGt">scams</a> and malware (software designed to disrupt, damage or gain unauthorised access to a computer). In the spirit of the festive season, people often share an abundance of personal information on social media, often without considering the potential consequences.</p> <p>This trove of data can make people vulnerable to cyber-attacks. Scammers can exploit this information to gain unauthorised access to social media accounts, steal personal information, or even commit identity theft. To protect yourself, be mindful of what you share.</p> <p>Be wary when interacting with posts and direct messages, especially if they contain suspicious links or attachments. Before clicking on anything, hover over the link to verify its destination. If it shows a website you don’t recognise or seems unrelated to the message, do not click on it. If you receive a message from someone you know but the content seems strange or out of character, contact them directly through a trusted channel to verify its authenticity.</p> <p>Likewise, be wary of messages containing urgent requests for money or personal information from businesses. Genuine organisations will never solicit sensitive details through social media.</p> <p>There are many buy and sell platforms available on social media. But while such platforms can be a great place to find a unique gift, it is also important to remember that not all sellers may be legitimate. So, it’s vital that you don’t share your bank details. If the seller sends a link to purchase the item, do not use it. When meeting to collect an item, it’s generally safer to use cash rather than transferring funds electronically.</p> <figure><iframe src="https://www.youtube.com/embed/aO858HyFbKI?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Advice for staying safe online.</span></figcaption></figure> <h2>Package delivery scams</h2> <p>As well as being a time for giving and receiving gifts, the festive season is also ripe for cybercriminals to exploit the excitement surrounding <a href="https://www.citizensadvice.org.uk/about-us/about-us1/media/press-releases/scams-linked-to-parcel-deliveries-come-top-in-2023/">package deliveries</a>.</p> <p>Scammers often pose as legitimate delivery companies, sending emails or text messages claiming that a delivery attempt was unsuccessful or requiring additional fees for processing, or even customs clearance. Typically, these messages contain links or phone numbers that, when clicked or called, lead to fake websites or automated phone systems designed to collect personal information or payments.</p> <p>To protect yourself, always verify the legitimacy of any delivery notifications you receive. Check the sender’s email address or phone number against the official contact information for the delivery company. If the information doesn’t match or seems suspicious, don’t click any links or provide personal details.</p> <p>Legitimate delivery companies will never ask for upfront payment or sensitive information through unsolicited messages or calls.</p> <p>Remember, cybercriminals are skilled at manipulating the festive spirit to their advantage. Stay vigilant, exercise caution, and don’t let your excitement for gifts and deliveries compromise your cybersecurity.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/218294/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/rachael-medhurst-1408437"><em>Rachael Medhurst</em></a><em>, Course Leader and Senior Lecturer in Cyber Security NCSA, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p><em>Image credits: Getty Images </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-to-protect-yourself-from-cyber-scammers-over-the-festive-period-218294">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

How risky is it to give card details over the phone and how do I reduce the chance of fraud?

<p><em><a href="https://theconversation.com/profiles/paul-haskell-dowland-382903">Paul Haskell-Dowland</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/ismini-vasileiou-1031778">Ismini Vasileiou</a>, <a href="https://theconversation.com/institutions/de-montfort-university-1254">De Montfort University</a></em></p> <p>Paying for things digitally is so common, most of us think nothing of swiping or tapping our card, or using mobile payments. While doing so is second nature, we may be more reluctant to provide card details over the phone.</p> <p>Merchants are allowed to ask us for credit card details over the phone – this is perfectly legal. But there are minimum standards they must comply with and safeguards to protect consumer data.</p> <p>So is giving your card details over the phone any more risky than other transactions and how can you minimise the risks?</p> <h2>How is my card data protected?</h2> <p>For a merchant to process card transactions, they are expected to comply with the <a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">Payment Card Industry Data Security Standard</a>. This is a set of security requirements designed to protect cardholder data and the trillions of dollars of transactions each year.</p> <p>Compliance involves various security measures (such as encryption and access controls) together with strong governance and regular security assessments.</p> <p>If the information stored by the merchant is accessed by an unauthorised party, encryption ensures it is not readable. That means stealing the data would not let the criminals use the card details. Meanwhile, access controls ensure only authorised individuals have access to cardholder data.</p> <p>Though all companies processing cards are expected to meet the compliance standards, only those processing large volumes are subject to mandatory regular audits. Should a subsequent data leak or misuse occur that can be attributed to a compliance failure, a <a href="https://www.csoonline.com/article/569591/pci-dss-explained-requirements-fines-and-steps-to-compliance.html">company can be penalised</a> at levels that can escalate into millions of dollars.</p> <p>These requirements apply to all card transactions, whether in person, online or over the phone. Phone transactions are likely to involve a human collecting the card details and either entering them into computer systems, or processing the payment through paper forms. The payment card Security Standards Council has <a href="https://docs-prv.pcisecuritystandards.org/Guidance%20Document/Telephone-Based%20Payments/Protecting_Telephone_Based_Payment_Card_Data_v3-0_nov_2018.pdf">detailed guides for best practice</a>:</p> <blockquote> <p>A policy should be in place to ensure that payment card data is protected against unauthorised viewing, copying, or scanning, in particular on desks.</p> </blockquote> <p>Although these measures can help to protect your card data, there are still risks in case the details are misplaced or the person on the phone aren’t who they say they are.</p> <h2>Basic tips for safe credit card use over the phone</h2> <p>If you provide card details over the phone, there are steps you can take to minimise the chance you’ll become the victim of fraud, or get your details leaked.</p> <p><strong>1. Verify the caller</strong></p> <p>If you didn’t initiate the call, hang up and call the company directly using details you’ve verified yourself. Scammers will often masquerade as a well-known company (for example, an online retailer or a courier) and convince you a payment failed or payment is needed to release a delivery.</p> <p>Before you provide any information, confirm the caller is legitimate and the purpose of the call is genuine.</p> <p><strong>2. Be sceptical</strong></p> <p>If you are being offered a deal that’s too good to be true, have concerns about the person you’re dealing with, or just feel something is not quite right, hang up. You can always call them back later if the caller turns out to be legitimate.</p> <p><strong>3. Use secure payment methods</strong></p> <p>If you’ve previously paid the company with other (more secure) methods, ask to use that same method.</p> <p><strong>4. Keep records</strong></p> <p>Make sure you record details of the company, the representative you are speaking to and the amount being charged. You should also ask for an order or transaction reference. Don’t forget to ask for the receipt to be sent to you.</p> <p>Check the transaction against your card matches the receipt – use your banking app, don’t wait for the statement to come through.</p> <h2>Virtual credit cards</h2> <p>In addition to the safeguards mentioned above, a <a href="https://www.forbes.com/advisor/credit-cards/virtual-credit-card-numbers-guide/">virtual credit card</a> can help reduce the risk of card fraud.</p> <p>You probably already have a form of virtual card if you’ve added a credit card to your phone for mobile payments. Depending on the financial institution, you can create a new credit card number linked to your physical card.</p> <p>Some banks extend this functionality to allow you to generate unique card numbers and/or CVV numbers (the three digits at the back of your card). With this approach you can easily separate transactions and cancel a virtual card/number if you have any concerns.</p> <h2>What to do if you think your card details have been compromised or stolen?</h2> <p>It’s important not to panic, but quick action is essential:</p> <ul> <li> <p>call your bank and get the card blocked so you won’t lose any more money. Depending on your situation, you can also block/cancel the card through your banking app or website</p> </li> <li> <p>report the issue to the police or other relevant body</p> </li> <li> <p>monitor your account(s) for any unusual transactions</p> </li> <li> <p>explore card settings in your banking app or website – many providers allow you to limit transactions based on value, restrict transaction types or enable alerts</p> </li> <li> <p>you may want to consider registering for <a href="https://theconversation.com/your-credit-report-is-a-key-part-of-your-privacy-heres-how-to-find-and-check-it-116999">credit monitoring services</a> and to enable fraud alerts.</p> </li> </ul> <h2>So, should I give my card details over the phone?</h2> <p>If you want to minimise risk, it’s best to avoid giving card details over the phone if you can. Providing your card details via a website still has risks, but at least it removes the human element.</p> <p>The best solution currently available is to use virtual cards – if anything goes wrong you can cancel just that unique card identity, rather than your entire card.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/216833/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/paul-haskell-dowland-382903">Paul Haskell-Dowland</a>, Professor of Cyber Security Practice, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/ismini-vasileiou-1031778">Ismini Vasileiou</a>, Associate Professor, <a href="https://theconversation.com/institutions/de-montfort-university-1254">De Montfort University</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from </em><a style="font-style: italic;" href="https://theconversation.com">The Conversation</a><em> under a Creative Commons license. Read the </em><a style="font-style: italic;" href="https://theconversation.com/how-risky-is-it-to-give-card-details-over-the-phone-and-how-do-i-reduce-the-chance-of-fraud-216833">original article</a><em>.</em></p>

Money & Banking

Placeholder Content Image

1 in 6 older adults fall victim to impersonation scams

<p>More older adults are likely to fall victim to scams than are currently recognised according to new US research. The problems are global. </p> <div class="copy"> <p>A research team from Rush University Medical Center in Chicago, US, says older Americans who aren’t cognitively impeded, are also at risk.  </p> <p>In their study <a href="https://10.1001/jamanetworkopen.2023.35319" target="_blank" rel="noreferrer noopener">published</a> today in <em>JAMA Network Open</em>, the group reports on a behavioural experiment where they targeted 644 adults aged 64-104 in Rush’s Memory and Aging Project – a local scheme that draws on participants from metropolitan Chicago to participate in research – with a pitch mimicking a real-world impersonation scam. </p> <p>The study’s fictitious ‘US Retirement Protection Task Force’ pitched itself to participants as a government social security initiative.  </p> <p>This USRPTF told participants via either post, email or a telephone call there’d been irregular activity on their Medicare or social security file and the inquiry was a routine account security check. As part of this, the fake agency asked participants to call a telephone hotline or login to a provided website to provide their details.  </p> <p>Over two-thirds of the study failed to respond to any attempts to obtain information by the phoney scheme.  </p> <p>The remainder were evenly split by either responding to requests for contact, but expressing scepticism at the authenticity of the USRPTF, or by responding and engaging with the request for information.  </p> <p>Those who were engaged with the request for information, but expressed doubts, were also those with the highest cognitive performance, and lowest proportion of dementia. They were also the most financially literate participants, while those who provided their details had the lowest literacy. </p> <p>Those who provided details were also found to have the lowest scam awareness of all participants.  </p> <p>Among this group, 1 in 10 willingly provided personal information and 1 in 5 provided details of their social security number.  </p> <p>“If extrapolated to a population level, these numbers are astounding and suggest that a very large number of older adults are at risk of victimisation,” the authors say. </p> <p>They also note that, given the use of a fictitious US government organisation name, the number of people vulnerable to well-organised scams is likely much higher.  </p> <p>Last year, the US National Council on Aging reported 92,371 older Americans were defrauded of a total of US$1.7 billion. Most were victims of government department impersonation, sweepstakes and robocall scams. Often such scams will simply demand payment while ‘spoofing’ the phone number of a government agency to add the veil of legitimacy. </p> <p>It’s a similar story around the world. This year, the Australian Competition and Consumer Commission found Australians lost a record $3.1 billion last year, mostly via phone scams. Australians over 65 years of age accounted for a quarter of losses and reports.  </p> <p>The UK’s Action Fraud initiative found Britons lost about ₤2.35 billion in the 2020/21 financial year, with those aged 50-69 most susceptible to falling victim.  </p> <div> <p align="center"> </p> <p><em>Image credits: Getty Images</em></p> <p><em><a href="https://cosmosmagazine.com/people/society/1-in-6-older-adults-fall-victim-to-impersonation-scams/">This article</a> was originally published on <a href="https://cosmosmagazine.com">Cosmos Magazine</a> and was written by <a href="null">Cosmos</a>. </em></p> </div> </div>

Legal

Placeholder Content Image

Hilarious reason dad couldn't be fooled by online scam

<p>One savvy dad has outwitted a scammer who posed as his daughter, after the scammer made one hilarious error. </p> <p>Ian Whitworth, a dad from Sydney, took to his LinkedIn page to share the message a scammer texted him in a classic phishing scam that targets parents. </p> <p>He shared the photo of what he thought was the "funniest phishing text any parent has ever received".</p> <p>The text read, "Hey dad, dropped my phone in the sink while doing the dishes. Its unresponsive this is my new number for now just text me here x."</p> <p>Despite the terrible grammar and punctuation that would immediately alert anyone to the possibility of a scam, it was something else that caught the dad's attention. </p> <p>Instead, Whitworth said it was the fact his daughter would never do the chore mentioned by the scammers.</p> <p>Still, he thought it was worth sharing a photo of the text in a bid to warn others, which he uploaded along with the comment, "Cybersecurity update. I just got this."</p> <p>"Perhaps the funniest phishing txt any parent has ever received. 'Doing the dishes', yeah, for sure."</p> <p>In a reply to one of the people who commented on his post, Whitworth joked that his daughter "at age four emerged from my parents' kitchen with a shocked look on her face. 'What's pop doing?'. He was washing up in the sink."</p> <p>Another commenter wrote, "Haha! There is NO WAY this is from my son or daughter, that's for sure."</p> <p>Another commenter said the giveaway that it wasn't from his own child was that they didn't immediately ask for money, to which Whitworth replied, "Ha, yeah, the phishers are like the seven step ladder of confidence before the money issue gets raised. Actual kids: MONEY NOW."</p> <p>According to the federal government's Scamwatch website run by the Australian Competition and Consumer Commission (ACCC), the "Friends/Family Hi Mum" impersonation scam was common.</p> <p>"Scammers send messages pretending to be a family member or a friend desperate for money," it said.</p> <p>"They say they have a new phone and they need you to pay money to help them out of a crisis."</p> <p>Scamwatch warns: "Don't assume a person you are dealing with is who they say they are" and offers the following advice.</p> <p>"If someone you know sends a message to say they have a new phone number, try to call them on the existing number you have for them, or message them on the new number with a question only they would know the answer to," it said.</p> <p>"That way you will know if they are who they say they are."</p> <p><em>Image credits: Getty Images / LinkedIn</em></p>

Legal

Placeholder Content Image

Why you need to stop charging your phone overnight

<p><strong>You charge your phone all night </strong></p> <p>Waking up to a fully charged phone may seem like a great way to start the day, but leaving your device plugged in overnight is a bad idea. When a phone has reached 100 per cent charge, it will continue to get trickle charges to keep it topped up at 100 percent. </p> <p>These extra charges keep the battery working non-stop. In fact, it’s better not to fully charge lithium-ion batteries because high voltage stresses the battery and wears it out over time, according to technology company Cadex.</p> <p><strong>You use vibrations for notifications</strong></p> <p>Your phone, like any other tool or device, ages and loses effectiveness the more you use it, says David Steele, the Director of Business Development for EverydayPhone. So little extras, like vibrating notifications, are habits that make your phone’s job harder. </p> <p>“The issue with these habits essentially boils down to having your phone constantly running at full capacity when it’s unnecessary,” Steele says. “Just like us, a phone needs a break to avoid burning out.”</p> <p><strong>You keep apps open that you're not using</strong></p> <p>Unused apps can eat up the battery life of smartphones, according to Andrew Moore-Crispin, the Director of Content at Ting Mobile. “If you open an app once and never use it again, the app might still run in the background,” he says.</p> <p>Swiping out of apps you aren’t using or no longer need is an easy solution. Moore-Crispin says doing so extends the battery life of your phone while also freeing up valuable storage space, too.</p> <p><strong>You allow unnecessary permissions</strong></p> <p>Ride-sharing apps need your location to pick you up, but other apps might not need this permission. Moore-Crispin suggests you be picky about which apps you grant such permissions to and take away permissions you deem unnecessary.</p> <p><strong>You have one of these apps</strong></p> <p>The apps that drain your battery the most are Snapchat, Google Maps, Netflix, Amazon, and Facebook, according to AdWeek. The Guardian found that uninstalling the Facebook mobile app from Android phones saves people up to 20 percent of their battery life. </p> <p>If you also get rid of the FB Messenger app, other app load times could speed up by 15 per cent, per the Guardian. The reason Facebook particularly kills battery life is because it keeps running in the background – even when you’re not using it, Business Insider reports.</p> <p><strong>Your screen is always extremely bright </strong></p> <p>Gone are the days of tiny phone screens, but before you give the thumbs up emoji, understand how the bigger screens of today can be a phone battery’s worst enemy, according to Moore-Crispin. Make sure you turn on adaptive brightness in the display menu. </p> <p>This change means your phone will automatically adjust the screen brightness to match your environment. As a bonus, set the brightness level to the lowest possible and lower your screen’s timeout, which is what determines how long it stays lit before fading when it goes idle.</p> <p><strong>You keep your phone out at the beach</strong></p> <p>Extreme heat or extreme cold temperatures and other weather conditions can shorten the life of your phone. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. Cold weather presents just as many issues. In cold temperatures, some smartphones shut off, have display problems, or run out of battery; in rare cases screens may shatter.</p> <p><strong>You keep your phone in your bed or under your pillow </strong></p> <p>Tucking your phone under your pillow when you sleep is another way to shorten its life, thanks to heat build-up.</p> <p><strong>You don't keep your software up to date</strong></p> <p>utting off device updates does more harm than good for your phone. iPhone and Android makers push updates to make your user experience better and so that your phone functions properly. These updates come with extra benefits, too. In fact, if your device has a weak battery or other issues, these software updates could remedy them, Popular Science reports. Make sure to keep up with app-specific updates as well.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/home-tipsscience-technology/why-you-need-to-stop-charging-your-phone-overnight" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

Why can’t I use my phone or take photos on the airport tarmac? Is it against the law?

<p><em><a href="https://theconversation.com/profiles/doug-drury-1277871">Doug Drury</a>, <a href="https://theconversation.com/institutions/cquniversity-australia-2140">CQUniversity Australia</a></em></p> <p>Mobile phones are not allowed to be used while on a plane because they can interfere with the aeroplane’s navigation instruments and <a href="https://theconversation.com/heres-the-real-reason-to-turn-on-aeroplane-mode-when-you-fly-188585">cause various safety and social issues</a>.</p> <p>As soon as the plane lands, we’re permitted to turn off flight mode, but at some airports we can’t get much of a signal. That’s because airports are known as mobile signal “<a href="https://thepointsguy.com/news/slow-connection-airport-tarmacs/">dead zones</a>” due to a lack of mobile towers – they can’t be placed at the airport itself due to height restrictions.</p> <p>Any nearby mobile towers would be located away from the airport’s runway systems to avoid interfering with the aeroplane’s flight path, especially take-off and landing direction. Most airports put up indoor repeater antennas within the airport terminal; these help increase the mobile signal strength coming from the nearest mobile tower somewhere near the airport.</p> <p>But you won’t be allowed to make calls while walking away from the plane, anyway.</p> <h2>Why can’t I use my phone on the tarmac?</h2> <p>As we are taxiing in, the <a href="https://www.qantas.com/au/en/qantas-experience/onboard/communication.html">cabin crew</a> remind us not to smoke outside of designated areas at the terminal and not to use our mobile phones until we are inside the terminal building.</p> <p>If you exit the plane down the rear stairs, why aren’t you allowed to use your phone once away from the aeroplane, if you can get a signal? Surely it won’t affect navigation.</p> <p>The answer is manifold, and regulations aren’t the same across the world.</p> <p>In Australia, a <a href="https://www.casa.gov.au/operations-safety-and-travel/travel-and-passengers/onboard-safety-and-behaviour/using-your-electronic-devices-flights">government regulation</a> prohibits the use of mobile phones on the tarmac – the aeroplane movement and parking area of the airport.</p> <p>You won’t be fined if you whip your phone out while walking to the terminal, but the airline may admonish you for not following the rules. However, if you decide to (<a href="https://www.smh.com.au/national/victoria/woman-arrested-after-running-onto-tarmac-at-melbourne-airport-20151125-gl7bkq.html">run around on the tarmac</a>, you could get arrested by federal police.</p> <p>The airport tarmac is very busy not just with aircraft, but also baggage carts, catering trucks, aeroplane waste removal trucks, and fuel trucks. Getting passengers off the tarmac and into the terminal building quickly and safely is a priority for the staff.</p> <p>If you are distracted while walking to the terminal building because you’re talking on your phone, it can be <a href="https://www.theguardian.com/us-news/2023/jan/25/alabama-airport-worker-killed-jet-engine-safety-warnings">highly dangerous and even deadly</a> if you end up too close to an operating plane. An operating jet engine is extremely hot and has a strong exhaust. Additionally, the front of the engine has a low-pressure area called an <a href="https://www.ukfrs.com/guidance/search/aircraft-systems-and-construction">ingestion zone</a> that can suck in a person. Ground staff are trained to stay at least ten metres away from this area. However, this information is not shared with the passengers.</p> <h2>A myth about fuel</h2> <p>You may have heard that mobile phones are a fire hazard near fuel, and aeroplanes are, of course, refuelled on the tarmac.</p> <p>However, the chances of fuel catching fire during this process are extremely low, because the refuelling truck is <a href="https://safetyfirst.airbus.com/safe-aircraft-refuelling/">bonded and “grounded” to the plane</a>: the operator attaches a wire to the aircraft to move built-up static electricity to the ground to prevent any chance of a spark.</p> <figure class="align-right zoomable"><figcaption></figcaption></figure> <p>There have been stories in the press about mobile phones sparking <a href="https://www.verizon.com/about/news/vzw/2014/12/fact-or-fiction-using-a-cell-phone-at-the-gas-station-can-cause-a-fire">fires at petrol stations in Indonesia and Australia</a>, but these turned out to be inaccurate. There is <a href="https://www.nfpa.org/assets/files/AboutTheCodes/30A/FI%20-%20NFPA%2030A-2015%20Para%208.3.1%20-%20Attachments%2014-19.2017-04-04.pdf">no evidence a phone can spark a fire at a fuel pump</a>, despite the warning labels you might see.</p> <p>Either way, the chances of a mobile phone causing this on the tarmac with a refuelling truck that is grounded to the aeroplane are extremely low, not least because the passenger permitted areas and refuelling areas are completely separated.</p> <h2>Why are we told not to take photos on the tarmac?</h2> <p>This rule varies from airport to airport depending on their <a href="https://www.tsa.gov/travel/frequently-asked-questions/can-i-film-and-take-photos-security-checkpoint">security processes</a>.</p> <p>Such restrictions are carryovers from the changes to airport security following the <a href="https://heinonline.org/HOL/P?h=hein.journals/jlecono50&amp;i=739">September 11 2001 terrorist attacks</a>. The now federalised security teams, TSA (Transportation Security Administration) in the United States and the Department of Home Affairs in Australia, change their processes frequently to prevent having any identifiable patterns that could be used to create a security breach.</p> <p>The increased security measures also mean new technologies were introduced; airport security sections do not want photos taken of how they operate.</p> <p>The airport security process is a major choke point in the flow of passenger movement due to the screening process. If a passenger is perceived to be slowing the process down by taking photos or talking on their phone, they will be reminded to turn off their device and/or stop taking photos of security personnel and equipment.</p> <p>If you refuse to follow the rules of the screening process, you will be <a href="https://www.homeaffairs.gov.au/about-us/what-we-do/travelsecure/passenger-screening">denied entry</a> into the airport terminal gate area and miss your flight. Can you also get arrested for using your phone? Depends on the airport and country. I, for one, do not want to find out.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/207926/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/doug-drury-1277871">Doug Drury</a>, Professor/Head of Aviation, <a href="https://theconversation.com/institutions/cquniversity-australia-2140">CQUniversity Australia</a></em></p> <p><em>Image credits: Getty </em><em>Images </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-cant-i-use-my-phone-or-take-photos-on-the-airport-tarmac-is-it-against-the-law-207926">original article</a>.</em></p>

Travel Tips

Placeholder Content Image

How to avoid mobile phone bill horror stories when travelling

<p>"I'm sorry, calls to this number are not allowed, please try again later". This. Again. At 1am standing outside what I thought was our Galway Airbnb, but instead was a popular alley for Irish revellers to relieve themselves. Brilliant.</p> <p>After begging a convenience store manager, borrowing a phone and stealing some local wi-fi, we made it to bed before 3am (one-star rating for the Airbnb host, naturally). Such was the power of the phone company when you're on holiday, I still got pinged far-too-high amounts for calls and data used to attempt a check-in at the Irish abode.</p> <p>A reader recently contacted me wanting to avoid such a conundrum by asking for the best SIM cards available in Europe. Thankfully, EU law has recently shielded travellers from harsh cross-border roaming charges by ruling that providers cannot charge excessively for access to rival networks in fellow EU nations.</p> <p>You'll see the kiosks hawking pre-paid SIM packages at many major airports. If you want the dependability a SIM provides, assess your needs and shop around. </p> <p>Better yet, get to know your smartphone better and use the whole range of mobile apps that will soon make international call and text roaming redundant. Organising hotels, taxis, tours, dinner reservations as well as calling home and making your friends and colleagues jealous with holiday snaps can all be done with a wi-fi connections, which are readily available and far cheaper (if not free).</p> <p><strong>Avoid phone bill shock when you're away</strong></p> <ul> <li>Contact your mobile phone company rep about your destination and length of stay to see what add-ons and spending caps may be best.</li> <li>Only purchase local SIMs if you're in the country more than a week, have an unplanned itinerary or will have no free wi-fi at your accommodation.</li> <li>If you're on a per-day bundle, choose a few days to be on-the-grid and turn off your mobile data on other days.</li> <li>Go wi-fi only, in North American, Asian and European cities it's readily available.</li> <li>Embrace apps like Uber, Gett, WhatsApp, OpenTable and TripAdvisor to book taxis, call home and book restaurants and tours using hotel wi-fi and thus limiting calls.</li> </ul> <p><em>Image credit: Shutterstock</em></p> <p><em>Written by Josh Martin. Republished with permission of <a href="http://www.stuff.co.nz/" target="_blank" rel="noopener"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Travel Tips

Placeholder Content Image

6 amazing things you didn’t know your phone could do

<p>Nobody ever bought a shiny brand new smartphone and then studiously read the manual! Maybe it’s just us but unfortunately it means we’ve missed out on the secret but amazing things your smartphone can do. You don't even need to download any apps to do these nifty tricks. Here are some of our favourite ones that we’re sure will impress next time you need them.</p> <p><strong>Taking a screenshot</strong></p> <p>A great trick if you want to share a hilarious text, picture or Facebook post with friends or family.</p> <p><span style="text-decoration: underline;">iPhones</span> – SImultaneously press (but not hold) the Home button and the Sleep/Wake button (top right of phone). You should hear a shutter click as well as see a white flash. The screenshot will be located on your Camera Roll in photos.</p> <p><span style="text-decoration: underline;">Androids</span> - Hold down the Power button and Volume -down button at the same time for a couple of seconds. Or hold down power button and home icon at the same time. If this doesn’t work, you can hold down the power button until the option to take a screen shot appears.</p> <p><strong>Taking multiple photos at once</strong></p> <p>A life-saver if you are taking pictures of wriggling kids or people who blink exactly when you take the picture (there’s always someone in the group isn’t there?). This little trick lets you take multiple pictures with a single click.</p> <p><span style="text-decoration: underline;">iPhones</span> – In the camera app, rather than tapping capture button to take photos, hold it down. Your camera will automatically take multiple picture (around 10 pictures a second) until you release the button.</p> <p><span style="text-decoration: underline;">Androids</span> - In the camera app, tap the gear icon and turn on “Burst Shot” settings. Return to your camera app and hold onto the capture button. Or go to camera, select mode, auto and click on burst shots.</p> <p><strong>Change text size</strong></p> <p>If the tiny text on the smartphone is giving you a headache, there’s an easily solution. You can change the settings so all text on your phone is large.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Larger Text.”</p> <p><span style="text-decoration: underline;">Androids</span> - Go to Settings > Accessibility > Vision and tap font size and set it to Large.</p> <p><strong>Read to you</strong></p> <p>It really seems like technology can do anything, including programming your smartphone to read to you.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Speak Selection.” You can even customise the voice that speaks to you choosing from a wide range of accent including Australian. To get your phone to speak to you, highlight text (double-tapping or tapping and holding on to it) and then tap Speak button in the pop-up menu.</p> <p><strong>Turn off music automatically</strong></p> <p>If you are one to listen to music or audiobooks as you drift off to sleep, you can use a timer to turn it off so it doesn’t drain your battery life.  </p> <p><span style="text-decoration: underline;">iPhones</span> - Go to the Clock app and tap on "Timer," then "When Timer Ends." From here, scroll all the way down to the bottom of the screen and select "Stop Playing."</p> <p><span style="text-decoration: underline;">Androids</span> - Open the music player and go to Settings. Look for "Music auto off" and set it to however long you want the music to play.</p> <p><strong>Search text messages</strong></p> <p>Searching for messages is handy if you are looking for a specific text containing details like addresses, emails or dates.</p> <p><span style="text-decoration: underline;">iPhones</span> – When you open your Message app, scroll up and a search bar should pop up at the top of all your messages. Type in the phrase you are looking for.</p> <p><span style="text-decoration: underline;">Androids</span> – Open the Message app and then tap on the Menu. A few options will appear and click search. </p> <p><em>Image: Shutterstock</em></p>

Technology

Placeholder Content Image

Don't get caught out: 6 holiday scams ripping off travellers

<p>If you’re planning to take a trip across the world soon, then be warned, as there is an influx of new holiday scams affecting tourists as they travel to their dream break.</p> <p>Holiday-makers have money to spend and relaxation on their minds, which is why they are seen as easy targets for con artists.</p> <p>UK-based consumer group <a href="https://www.which.co.uk/" target="_blank" rel="noopener">Which?</a> has listed the six most common frauds travellers need to be aware of, along with tips on how to avoid getting scammed, <em><a href="https://www.thesun.co.uk/" target="_blank" rel="noopener">The Sun</a></em> reported.</p> <p>So, if you’re planning a trip abroad, here are the things you need to watch out for:</p> <p><strong>1. Accommodation booking scams</strong></p> <p>While the introduction of the internet has been a blessing in terms of ease, it’s also made it easier for scammers to lure you into their traps. With the growth of online holiday bookings, fraudsters often need nothing more than a few fake pictures to lure their victims.</p> <p>A common scam is one that includes picturesque photographs of holiday rentals that don’t seem to exist, advertised at affordable price points. The deals were often advertised on mainstream websites but asked those who were interested in booking to contact them via email, rather than use the site’s own booking system.</p> <p>Bookers were then sent a link to a convincing payment page, which suggested the payment hadn’t cleared. They then ask for a bank transfer instead.</p> <p><strong>How to protect yourself: </strong>Do your research. Google the property to see if it shows up on other reputable websites to check its authenticity. You could use Google Maps and Street View to see if the accommodation actually exists. Also, never pay by bank transfer.</p> <p><strong>2. Dodgy flight deals</strong></p> <p>Con artists have created fake airline websites that advertise budget deals on long haul flights that leave their victims high and dry.</p> <p>The UK government’s fraud agency has reported a recent surge of scams targeting those who are travelling to Asia, Africa and the Middle East.</p> <p>In many instances, tickets were purchased with stolen credit cards and then sold to unsuspecting victims, complete with a reference number.</p> <p>But tickets were then cancelled after the credit card was reported as stolen, leaving the victims out of pocket and nothing to show for it.</p> <p><strong>How to protect yourself:</strong> Book tickets through trusted agencies.</p> <p><strong>3. Wi-Fi hacks</strong></p> <p>It’s become human instinct to try and find Wi-Fi wherever you go, and the same applies when travellers land at airports.</p> <p>While it’s important to stay connected in order to get in touch with friends and family, there is a risk involved. Fraudsters have set up their own free networks in airports and use them to gain free information about anyone that logs on.</p> <p>Many passengers have been tricked into entering their credit card details before logging on.</p> <p><strong>How to protect yourself:</strong> Ask airport staff about the real Wi-Fi connection to make sure it’s the real deal and be on the lookout for connections that don’t ask for passwords straight away. Also, if you are asked for confidential information then provide fake details where possible.</p> <p><strong>4. “Free” holidays</strong></p> <p>This decade-long scam has been one that con artists have perfected throughout the years. Back in the day, people would be pressured into buying timeshares after accepting a complimentary break.</p> <p>Now, the con is conducted through scratch cards and other fake competitions.</p> <p>In one example of the scam, around 500 British travellers in Spain’s Costa del Sol have been scammed of around $27.5 million in the last year alone.</p> <p><strong>How to protect yourself:</strong> Refuse all offers of free holidays because if it’s too good to be true, then it probably is.</p> <p>Do you know of any other travel scams? Let us know in the comments below.</p> <p><strong>5. Document fraud</strong></p> <p>Over the years, the internet has seen a growth in websites selling fake travel visas and other important documents needed to visit foreign countries.</p> <p>A few cases were found to not be conducting illegal activity but were responsible for reselling documents at a huge premium compared to official channels.</p> <p>Some common examples included websites selling the European Health Insurance Card and US visa (Electronic System for Travel Authorisation, or ESTA) documents.</p> <p>While the sites looked extremely convincing, they had nothing to do with the governments of the countries they claimed to represent.</p> <p>According to Which?, out of the top 20 search results for “ESTA visa” over half were unofficial.</p> <p><strong>How to protect yourself:</strong> Follow links to official government websites through the Department of Foreign Affairs website.</p> <p><strong>6. Fake tickets</strong></p> <p>It’s no secret that music concerts and major sporting events are on top of the list of potential scams, but travellers are now falling victim to fake packages to international events and are only finding out the true worth of their ticket once they arrive in the country.</p> <p>The FIFA World Cup in Russia was one example where countless websites offered travel packages including tickets when the only tickets that were considered valid and authentic were the ones purchased directly from FIFA themselves.</p> <p>Scammers love to lure desperate fans with fake tickets, as they know the demand is high and it’s easy to trap people who are willing to go the extra mile for a ticket to their chosen event.</p> <p><strong>How to protect yourself:</strong> Make sure the tickets you are purchasing are from legitimate websites and web pages that start with “https” and have the padlock symbol in the URL bar. And if you’re on the hunt for second-hand tickets, then do a quick check if whether or not resale is allowed, as some tickets are only valid for the original buyer.</p> <p>“Criminals are finding ever more sophisticated ways to dupe holiday-makers, both in the booking process and when they’re on the holiday itself,” Which? Travel editor Rory Boland said.</p> <p>“If something seems too good to be true, it almost certainly is. Don’t hand your money over until you can be sure it’s the real deal.”</p> <p><em>Images: Getty</em></p>

Travel Trouble

Placeholder Content Image

Get-rich-quick schemes, pyramids and ponzis: five signs you’re being scammed

<p><a href="https://theconversation.com/profiles/bomikazi-zeka-680577">Bomikazi Ze<em>ka</em></a><em>, <a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a> and <a href="https://theconversation.com/profiles/abdul-latif-alhassan-1390159">Abdul Latif Alhassan</a>, <a href="https://theconversation.com/institutions/university-of-cape-town-691">University of Cape Town</a></em></p> <p>Consumers are under a lot of financial strain. The <a href="https://www.weforum.org/agenda/2022/09/cost-of-living-crisis-global-impact/">World Economic Forum</a> reports that the cost-of-living crisis is affecting people across the globe. With food and fuel prices rising, it’s becoming increasingly difficult to keep financially afloat. On top of that, salaries <a href="https://www.wsj.com/articles/workers-pay-globally-hasnt-kept-up-with-inflation-e6df92d">aren’t keeping up with inflation</a>, making it more difficult to save and build wealth.</p> <p>It’s during such times of economic difficulty and uncertainty that fraudsters lure unsuspecting consumers into “<a href="https://www.sabric.co.za/">get-rich-quick</a>” schemes, offering <a href="https://www.sabric.co.za/stay-safe/ponzi-pyramid-schemes/">an avenue to make easy money</a> by investing in a “lucrative” financial opportunity.</p> <p>Nothing beats the prospect of making easy money, and every now and again there seems to be a “get-rich-quick” scheme circulating on WhatsApp or on social media that seems legitimate. But it’s not.</p> <p>Our research interests centre on financial systems in emerging economies, and we advocate for financial inclusion and empowering marginalised communities through financial literacy and financial planning. We use our academic platform to share our expertise on finance, including common financial traps people should steer clear of.</p> <p>“Get-rich-quick” schemes are one such trap. They’re also sometimes called ponzi or pyramid schemes. The schemes are a form of <a href="https://www.lawinsider.com/dictionary/financial-fraud">financial fraud</a>. The people running them take money through deception: the misrepresentation of information and identity. They promise financial benefits that don’t exist.</p> <p>You should avoid them because, more often than not, they are bogus and fraudulent business ventures.</p> <p>There have been some massive fraud schemes over the past 30 years. In the early 1990s, <a href="https://www.independent.co.uk/news/world/africa/mmm-global-russian-ponzi-scheme-from-1990s-reborn-and-now-spreading-like-wildfire-in-africa-a7333366.html">MMM Global</a> - one of the world’s largest and most notorious ponzi schemes - defrauded up to 40 million people, who lost an estimated $10 billion. Ponzi schemes have since resurfaced in different forms in <a href="https://www.iol.co.za/weekend-argus/news/ponzi-scheme-investigated-as-some-victims-lost-as-much-as-r200-000-c3c3633c-2abb-4dd4-b668-a5ea608deb41">South Africa</a>, <a href="https://guardian.ng/business-services/nigerians-lose-over-n911b-to-ponzi-schemes-related-fraud-in-23-years/">Nigeria</a>, <a href="https://www.voazimbabwe.com/a/zimbabwe-money-pyramids-ponzi-schemes/6305100.html">Zimbabwe</a>, <a href="https://allafrica.com/stories/202105170964.html">Kenya</a>, <a href="https://doi.org/10.1108/JFC-09-2020-0177">Ghana</a> and several other African countries.</p> <p>There are five tell-tale signs of a “get-rich-quick” scheme. Watch out for them.</p> <h2>The five tell-tale signs</h2> <p><strong>Firstly</strong>, they offer exaggerated and above-market returns within a short period of time, with the promise of little to no risk.</p> <p>There are two golden rules when it comes to investing. The first is that it takes time to make money. Amassing a small fortune within a short space of time should raise questions about the scheme.</p> <p>The second rule is: the higher the risk, the higher the return. In other words, no investment is risk free or can guarantee significant returns. There is always some risk involved. An investment that promises substantial returns tends to be quite risky, which repels most people with a low appetite for risk.</p> <p><strong>Secondly</strong>, new members are constantly recruited to join the scheme.</p> <p>Typically, such schemes are sustained by relying on the investments of new members to pay existing members. Once the number of existing members exceeds new members, the scheme goes “belly-up”. At best you lose out on the returns you were promised. At worst you lose all the money you’ve invested.</p> <p>When the scheme collapses, it is almost impossible to recover the money you’ve lost because you’ve technically given it to a stranger (remember, the definition of financial fraud encompasses the misrepresentation of identity).</p> <p><strong>Thirdly</strong>, there is urgency to join the scheme and no clarity on how the scheme works.</p> <p>This is a classic characteristic of a “get-rich-quick” scheme. There is usually no clear answer about the nature of the scheme, what it invests in, how it generates its returns or the credentials of the organisation.</p> <p>Legitimate investments are transparent and can provide investors with all the information they need to help them decide whether to invest. Unsurprisingly, a proper check of “get-rich-quick” schemes will unmask their fraudulent nature. This is why there’s always the urgency and coercion to make an immediate financial commitment under the guise of missing a once-in-a-lifetime opportunity to get rich.</p> <p><strong>Fourthly</strong>, the scheme is not registered with or regulated by any recognised authority.</p> <p>Regulatory authorities are important because they monitor the conduct of financial service providers and protect consumers by keeping their best interests in mind. The protection provided by financial regulators also instils confidence in financial systems.</p> <p>“Get-rich-quick” schemes are not registered and operate outside the framework of regulatory bodies. This makes investors more vulnerable to loss and makes it more difficult to seek legal recourse when the loss occurs.</p> <p>Legitimate investments in South Africa are offered by authorised financial service providers and regulated by the <a href="https://www.fsca.co.za/Pages/Default.aspx">Financial Sector Conduct Authority</a>. You can search for any authorised financial service provider on the authority’s <a href="https://www.fsca.co.za/Fais/Search_FSP.htm">website</a>.</p> <p><strong>Fifthly</strong>, they use the testimonies from existing members who’ve earned big bucks to promote the scheme.</p> <p>At the initial stages, the scheme tends to pay out to those who have invested early, and these members are encouraged to share the news of their wealth (which travels fast and far) to promote the scheme.</p> <p>But this is a tactic used to create the impression that you too can earn returns in the double digits. These schemes are both unsustainable and unethical as one person gets wealthy through someone else being deceived.</p> <h2>Too good to be true</h2> <p>It’s worth repeating that if it sounds too good to be true, then it probably is.</p> <p>Wealth comes from a sound investment strategy and decisions made over time. Any promise to “get rich quick” should be treated with the cynicism it deserves. It will ultimately reveal its fraudulent nature. Recognising the signs of “get-rich-quick” schemes can save you from unnecessary financial distress.</p> <p>It’s always a good idea to do your own investigation before committing your finances into any investment. You can find more information on the various types of scams through the <a href="https://www.sabric.co.za/">South African Banking Risk Information Centre</a>’s website and report them to the <a href="https://www.safps.org.za/Home/Contact">South African Fraud Prevention Service</a>.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/205798/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/bomikazi-zeka-680577">Bomikazi Zeka</a>, Assistant Professor in Finance and Financial Planning, <a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a> and <a href="https://theconversation.com/profiles/abdul-latif-alhassan-1390159">Abdul Latif Alhassan</a>, Associate Professor in Development Finance & Insurance, <a href="https://theconversation.com/institutions/university-of-cape-town-691">University of Cape Town</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/get-rich-quick-schemes-pyramids-and-ponzis-five-signs-youre-being-scammed-205798">original article</a></em>.</p>

Money & Banking

Placeholder Content Image

"I am not a monster": Disturbing reason police have seized phone of woman claiming to be Madeleine McCann

<p>Polish woman Julia Faustyna who went viral over <a href="https://www.oversixty.co.nz/news/news/woman-shares-evidence-that-she-is-madeleine-mccann" target="_blank" rel="noopener">claims she could be Madeleine McCann </a>has had her phone seized by US police over claims it contains explicit images of children.</p> <p>The phone was given to authorities by a former spokesperson for Faustyna and psychic private investigator Fia Johansson.</p> <p>The phone was reportedly left with Johansson when she brought Faustyna, 21, to the US for <a href="https://www.oversixty.co.nz/news/news/julia-faustyna-takes-dna-test-to-prove-wild-identity-claims" target="_blank" rel="noopener">DNA and family ancestry test results</a> over her claiming to be the missing toddler.</p> <p>The results confirmed that Faustyna was “absolutely, 100 per cent from Poland".</p> <p>Johansson handed the phone over to police during a search and seizure as part of an investigation, but the reason behind what prompted the pursuit remains unknown, according to the <em>New York Post</em>.</p> <p>Wroclaw police in Poland were contacted by the Orange County Sheriff’s Department and were informed that they were in possession of a phone thought to belong to Faustyna, according to a <em>RadarOnline.com</em> report.</p> <p>“Our investigation is taking a deep look into it and we’re going to let them do their investigative duties and then from that point let the judicial system take over – if it needs to,” department spokesman Sergeant Mike Woodroof said.</p> <p>Johansson reportedly added, “I’m told an investigator from the Sheriff’s Department is personally taking the device to Poland to make sure it doesn’t get lost or misplaced.”</p> <p>She also shared an image of a denied release of case information form from the Orange County Sheriff’s Department on social media, including a statement regarding the investigation.</p> <blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/CrJh_DVvl3i/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14"> <div style="padding: 16px;"> <div style="display: flex; flex-direction: row; align-items: center;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"> </div> </div> </div> <div style="padding: 19% 0;"> </div> <div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"> </div> <div style="padding-top: 8px;"> <div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div> </div> <div style="padding: 12.5% 0;"> </div> <div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"> <div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"> </div> <div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"> </div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"> </div> </div> <div style="margin-left: 8px;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"> </div> <div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"> </div> </div> <div style="margin-left: auto;"> <div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"> </div> <div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"> </div> <div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"> </div> </div> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"> </div> </div> <p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/p/CrJh_DVvl3i/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by Dr. Fia Johansson (@persianmedium)</a></p> </div> </blockquote> <p>“There will be no comment or discussion at this time or moving forward concerning the active ongoing investigation with Orange County Sheriff’s Department and special public affairs division due to protocol and the sensitivity and nature of the intelligence that has been gathered and rendered,” she said.</p> <p>“It’s an active investigation and DA will not comment out of concern for the safety of the victims.”</p> <p>After Faustyna received her DNA test results and appeared on Dr Phil, Johannson revealed she travelled back to Poland to live with her father.</p> <p>The DNA results prompted <a href="https://www.oversixty.co.nz/news/news/madeleine-mccann-s-parents-speak-out-after-dna-test-results" target="_blank" rel="noopener">Madeleine McCann’s parents to break their silence</a> after months of emotional turmoil.</p> <p>Faustyna now denies all the allegations against her to reporters.</p> <p>“I didn’t have child pornography on my phone. I am not a paedo and I never tried to encourage any teenagers to do anything illegal and bad and disgusting,” she told <em>The Sun</em>.</p> <p>“Just think carefully, if someone is a paedo, I believe this person would never go by himself to a police station or this person would never talk about what I was talking in public to the whole world because it would be very dangerous for this person.</p> <p>“It is not logical ... I am saying the truth and I will make my name clean because I am not a monster.”</p> <p>She told <em>The Sun</em> she had purchased the phone from an unknown person, saying that if there were explicit images on her phone they were put there by someone else.</p> <p><em>Image credit: Instagram</em></p>

Legal

Placeholder Content Image

Screwed over: how Apple and others are making it impossible to get a cheap and easy phone repair

<p>If Apple and other tech companies have their way, it will only become harder to have our phones and other devices repaired by third-party businesses.</p> <p>Smartphones and many other tech devices are increasingly being designed in ways that make it challenging to repair or replace individual components.</p> <p>This might involve soldering the processor and flash memory to the motherboard, gluing components together unnecessarily, or using non-standard <a href="https://www.ifixit.com/News/14279/apples-diabolical-plan-to-screw-your-iphone">pentalobe screws</a> which make replacements problematic.</p> <p>Many submissions to an Australian “right to repair” <a href="https://www.pc.gov.au/inquiries/current/repair/submissions#initial">inquiry</a> have called on tech manufacturers to provide a fair and competitive market for repairs, and produce products that are easily repairable. </p> <p>The <a href="https://www.pc.gov.au/inquiries/current/repair/issues/repair-issues.pdf">right to repair</a> refers to consumers’ ability to have their products repaired at a competitive price. This includes being able to choose a repairer, rather than being forced by default to use the device manufacturer’s services. </p> <p>But it seems Apple doesn’t want its customers to fix their <a href="https://www.vice.com/en/article/evmeya/apple-iphone-right-to-repair-california">iPhones</a>or <a href="https://www.inputmag.com/culture/apples-repair-policies-are-utterly-shameful-and-shouldnt-be-allowed-e-waste-recycling-macbooks-t2">Macbooks</a> themselves. The company has <a href="https://www.vice.com/en/article/nz85y7/apple-is-lobbying-against-your-right-to-repair-iphones-new-york-state-records-confirm">lobbied against</a> the right to repair in the United States and has <a href="https://www.npr.org/2020/11/18/936268845/apple-agrees-to-pay-113-million-to-settle-batterygate-case-over-iphone-slowdowns">been accused of deliberately slowing down</a> iPhones with older batteries.</p> <p><a href="https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2019/10/16/tech-giants-fight-digital-right-to-repair-bills">Opposition</a> against the right to repair from tech companies is to be expected. Cornering consumers into using their service centres increases their revenue and extends their market domination.</p> <p>In its defence, Apple has said <a href="https://time.com/4828099/farmers-and-apple-fight-over-the-toolbox/">third-party repairers</a> could use lower quality parts and also make devices vulnerable to hackers. </p> <p>It also defended its <a href="https://venturebeat.com/2019/08/14/apple-defends-iphone-unauthorized-battery-warning-as-a-safety-feature/">battery warning indication</a> as a “safety” feature, wherein it started to alert users if their phone’s replacement battery hadn’t come from a certified Apple repairer. </p> <p>In the US, Apple’s <a href="https://support.apple.com/irp-program">independent repair provider program</a> grants certain providers access to the parts and resources needed to fix its devices. Independent repair shops in <a href="https://www.apple.com/newsroom/2020/07/apple-expands-iphone-repair-services-to-hundreds-of-new-locations-across-the-us/">32 countries</a> can now apply, but the scheme has yet to extend outside the US.</p> <h2>Impact on users</h2> <p>With the iPhone 12 — the latest iPhone offering — Apple has <a href="https://www.ifixit.com/News/45921/is-this-the-end-of-the-repairable-iphone">made it even harder</a> for third-party repairers to fix the device, thereby increasing users’ reliance on its own services. </p> <p>Apple has hiked its <a href="https://support.apple.com/en-au/iphone/repair/service/screen-replacement">repair charges</a> for iPhone 12 by more than 40%, compared with the iPhone 11. It is <a href="https://support.apple.com/en-au/iphone/repair/service/screen-replacement">charging</a> more than A$359 to fix an iPhone 12 screen outside of warranty and A$109 to replace the battery. </p> <p>Historically, third-party repairers have been a cheaper option. But using a third-party repairer for an iPhone 12 could render some phone features, such as the camera, <a href="https://www.theverge.com/2020/10/30/21542242/apple-iphone-12-third-party-repairs-ifixit-camera-module-replacement">almost inoperable</a>.</p> <p>According to reports, fixing the iPhone 12’s camera requires <a href="https://9to5mac.com/2020/10/30/iphone-12-camera-repair/">Apple’s proprietary</a> system configuration app, available only to the company’s own authorised technicians. </p> <p>It’s not just Apple, either. <a href="https://www.techradar.com/au/news/samsungs-galaxy-s20-ultra-is-unsurprisingly-difficult-to-repair">Samsung’s</a> flagship phones are also quite tricky for third-party repairers to fix.</p> <h2>Impact on environment</h2> <p>When certain parts for repairs aren’t available, manufacturers will produce new phones instead, consuming <a href="https://www.envirotech-online.com/news/environmental-laboratory/7/breaking-news/how-do-smartphones-affect-the-environment/48339">more energy and resources</a>. In fact, manufacturing one smartphone <a href="https://www-sciencedirect-com.ezproxy.cqu.edu.au/science/article/pii/S095965261733233X">consumes</a> as much energy as using it for ten years.</p> <p>As smartphones become harder to repair, electronic waste will grow. Apple and Samsung both cited environmental benefits when they announced they would no longer ship <a href="https://theconversation.com/apples-iphone-12-comes-without-a-charger-a-smart-waste-reduction-move-or-clever-cash-grab-148189">chargers</a> with their phones. </p> <p>Yet, they’ve turned a blind eye to the environmental damage that would arise from completely cornering the repair market.</p> <p>The average Australian home has <a href="https://thinktv.com.au/facts-and-stats/australian-homes-are-experiencing-a-screen-explosion/">6.7 devices</a>, including televisions, personal computers, laptops, tablets and smartphones. With diminishing opportunities for repair, the environmental burden from disposing of these devices will increase.</p> <h2>What is being done?</h2> <p>Phone giants make it tough for third-party repairers to do their job in a variety of ways. This includes constantly changing designs, adding hurdles to the repair process, and restricting access to parts, diagnostic software and repair documentation. </p> <p>Meanwhile, consumers are left with broken phones and huge repair bills — and repairers are left with less business.</p> <p>The fight to remove barriers to repair is gaining momentum outside Australia, too, in countries including <a href="https://www.policyalternatives.ca/publications/monitor/when-will-canadians-have-right-repair">Canada</a>, the <a href="https://www.thetimes.co.uk/article/right-to-repair-means-spare-parts-for-household-appliances-mr5gmkjxr">United Kingdom</a> and the <a href="https://www.repair.org/legislation">United States</a>. Legislative reforms have been introduced in the <a href="https://repair.eu/news/european-parliament-calls-for-ambitious-right-to-repair/">European Union</a> and <a href="https://www.vice.com/en/article/93wy8v/newly-passed-right-to-repair-law-will-fundamentally-change-tesla-repair">Massachusetts</a>.</p> <p>France has introduced a <a href="https://www.ecologie.gouv.fr/indice-reparabilite">Repairability Index</a> requiring electrical and electronic equipment companies to inform consumers about their products’ repairability on a scale of one to ten. </p> <p>This takes into account the ease of repairability, availability and price of spare parts and availability of technical repair documents.</p> <h2>The path moving forward</h2> <p>Until the push for right to repair legislative reform gathers pace globally, consumers will have little choice but to pay up to big companies to access their authorised repair services. </p> <p>If they don’t, they may risk losing their warranty, ending up with a non-functional device and even <a href="https://static1.squarespace.com/static/5e449c8c3ef68d752f3e70dc/t/5ea8a6d93b485d0feb9b5d6b/1588111098207/Report_RightToRepair_HanleyKellowayVaheesan-1.pdf">infringing</a> upon the manufacturers’ software copyrights.</p> <p>Ideally, phone companies (and others) would assist users with the repair process by providing replacement parts, repair documentation and diagnostic tools to third-party repairers. </p> <p>This would also help <a href="https://www.apple.com/au/newsroom/2020/07/apple-commits-to-be-100-percent-carbon-neutral-for-its-supply-chain-and-products-by-2030/">Apple</a> and <a href="https://www.samsung.com/us/aboutsamsung/sustainability/environment/">Samsung</a> reduce their carbon footprint and achieve their environmental goals.</p> <p>Although the way things are going, it’s unlikely tech companies will be able to escape their self-inflicted repair obligations. In the past, Apple CEO Jeff Williams has <a href="https://www.apple.com/newsroom/2019/08/apple-offers-customers-even-more-options-for-safe-reliable-repairs/">said, "</a>we believe the safest and most reliable repair is one handled by a trained technician using genuine parts that have been properly engineered and rigorously tested."</p> <p>But with only so much workforce available even to Apple, sharing the load with smaller repairers will help. </p> <p>And for consumers’ benefit, the right to repair legislation must be taken seriously, with consistent repairability scores developed across the globe.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/screwed-over-how-apple-and-others-are-making-it-impossible-to-get-a-cheap-and-easy-phone-repair-156871" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Technology

Placeholder Content Image

What the “father of the cell phone” wants you to know

<p dir="ltr">The inventor of the mobile phone has shared his candid opinion about the obsession with smart devices. </p> <p dir="ltr">Martin Cooper, an American engineer dubbed the “father of the cell phone”, invented the very first mobile phone 50 years ago in 1973. </p> <p dir="ltr">Back then, the weighty block of wires and circuits were only used to make calls, a far cry from having the world at your fingertips with smartphones today. </p> <p dir="ltr">Cooper believes that despite all the good that can come from modern technology, the world has become a little obsessed with smart devices. </p> <p dir="ltr">“I am devastated when I see somebody crossing the street and looking at their cell phone. They are out of their minds,” the 94-year-old told AFP from his office in Del Mar, California.</p> <p dir="ltr">“But after a few people get run over by cars, they’ll figure it out,” he joked.</p> <p dir="ltr">Mr Cooper also indulges in the latest gadgets, as he wears an Apple Watch and uses a top-end iPhone, flicking intuitively between his email, photos, YouTube and the controls for his hearing aid.</p> <p dir="ltr">Despite keeping up with all the latest apps, updates and upgrades, he confessed that sometimes it can all seem a little overwhelming. </p> <p dir="ltr">“I will never, ever understand how to use the cell phone the way my grandchildren and great grandchildren do,” he said.</p> <p dir="ltr">“Each generation is going to be smarter … they will learn how to use the cell phone more effectively,” he said.</p> <p dir="ltr">“Humans sooner or later figure it out.”</p> <p dir="ltr"><em>Image credits: Getty Images</em></p>

Technology

Placeholder Content Image

3 reasons you should never view or share videos showing children being assaulted – even if you think it helps ‘raise awareness’

<p>Australians have been shocked by an <a href="https://www.theguardian.com/australia-news/2023/mar/22/queensland-children-aged-between-12-and-14-charged-after-allegedly-assaulting-girl-over-several-hours">incident</a> on the Sunshine Coast this month in which a 13-year-old girl was imprisoned, assaulted and tortured over many hours, allegedly by three girls aged 12, 13 and 14.</p> <p>The alleged perpetrators also filmed the abuse, which went <a href="https://www.news.com.au/national/queensland/crime/three-girls-charged-after-13yearold-allegedly-lured-to-home-and-tortured/news-story/c08af6c838e54fc0d39c449e57f9719a">viral online</a> with photos and videos being shared across news outlets and social media profiles.</p> <p>Some people may think they’re supporting victims by watching the videos and then expressing their outrage at their treatment. Morbid curiosity about the event might also prompt people to view the photos or videos.</p> <p>But there are three key reasons why you should never view, download or share photos or videos of children being assaulted.</p> <h2>1. You may be committing a criminal offence</h2> <p>Photos and videos showing this 13-year-old girl allegedly being assaulted and tortured are unlawful. Content such as this is called child sexual abuse material (CSAM), which has <a href="https://theconversation.com/whats-in-a-name-online-child-abuse-material-is-not-pornography-45840">previously been called child pornography</a>.</p> <p>Child sexual abuse material is <a href="https://theconversation.com/virtual-child-sexual-abuse-material-depicts-fictitious-children-but-can-be-used-to-disguise-real-abuse-180248">offensive or sexual online material</a> depicting children. It’s a criminal offence to possess, view, share or create it.</p> <p>It isn’t just pornographic material. These laws extend to material that depicts children being assaulted and tortured, even without a sexual element.</p> <p>Criminal offences exist for possessing, viewing, sharing or creating such material. Each state and territory jurisdiction, and the Commonwealth, has their own legislation which may have a slightly <a href="https://bridges.monash.edu/articles/journal_contribution/Lawful_Acts_Unlawful_Images_The_Problematic_Definition_of_Child_Pornography/10064963/1">different perspective</a> on whether a person has committed an offence.</p> <p>Criminal offences can be committed in the following circumstances:</p> <ol> <li> <p>if someone <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2277239">downloads</a> a child assault photo or video, they are “possessing” child sexual abuse material</p> </li> <li> <p>where someone posts it to their social media page or <a href="https://heinonline.org/HOL/LandingPage?handle=hein.journals/utasman40&amp;div=14&amp;id=&amp;page=">sends it</a> via email to others, they are “distributing” or “disseminating” child sexual abuse material</p> </li> <li> <p>when someone <a href="https://www.cdpp.gov.au/crimes-we-prosecute/child-exploitation">watches</a> a child assault video online without downloading, or looks at a photo, they are still “accessing” (viewing) such material, which can be an offence.</p> </li> </ol> <p>It doesn’t matter if the child victim indicates their approval for the material to be promulgated. Children are <a href="https://www.aic.gov.au/sites/default/files/2020-05/58-1213-FinalReport.pdf">unable to consent</a> to material depicting their own assault being shared or viewed by others.</p> <h2>2. You are perpetuating the abuse suffered by the victim</h2> <p>Watching and sharing child abuse photos or videos does not support the victim. Every photo and video depicting child abuse <a href="https://theconversation.com/it-is-not-child-pornography-it-is-a-crime-scene-photo-12465">shows a crime scene</a>.</p> <p>A victim’s abuse being captured and shared as a video is a <a href="https://www.sciencedirect.com/science/article/abs/pii/S0145213419303667">regular reminder</a> of their abuse. The photos or videos can cause <a href="https://www.aic.gov.au/publications/tandi/tandi653">ongoing harm to a child victim</a>, beyond any physical harm they may have recovered from.</p> <p>US researchers conducted <a href="https://www.sciencedirect.com/science/article/abs/pii/S0145213418301510?via%3Dihub">a study</a>, published in 2018, to analyse the complex experiences of survivors (adults who, as children, had material of their abuse shared online).</p> <p>The participants described ongoing feelings of guilt and shame, and a feeling of enduring vulnerability because their records of abuse will always be online for others to see.</p> <p>As one survivor, not part of this study, <a href="https://www.emerald.com/insight/content/doi/10.1108/978-1-83982-848-520211053/full/html">said</a> "I have to live with the knowledge that my abuse will never end, and that every second of every day, someone could be – almost certainly is – watching my torture and abuse. Even once I’m dead, my degradation will continue. I will never be able to escape it. This trauma is infinite.</p> <p>Some also described an empowering dimension because the material provided validation of the abuse they suffered, or could be used as evidence in court.</p> <p>While victims may all process their experiences in different ways, it’s important to be mindful of the detrimental and ongoing effects on a child victim of an assault being captured and shared online.</p> <p>As a community, we must do everything we can to support those children, including refusing to watch or share photos or videos of their abuse.</p> <h2>3. You are giving undeserved notoriety to the perpetrators</h2> <p>Some perpetrators use records of their offending to create social media content for notoriety.</p> <p>“Performance crimes” allow perpetrators to use their online platform <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/journals/CICrimJust/2015/21.html">for attention</a>.</p> <p>Terrorism is another example, where terror attacks have been <a href="https://theconversation.com/social-media-create-a-spectacle-society-that-makes-it-easier-for-terrorists-to-achieve-notoriety-113715">livestreamed</a> and media outlets have responded by refusing to name the perpetrators.</p> <p>Do not reward the perpetrators by giving them a platform.</p> <h2>How should we respond?</h2> <p>It’s important we, as a community, acknowledge that children whose assaults are captured in photos and videos have been through a traumatic experience and need support.</p> <p>Watching or sharing their assault only perpetuates the abuse.</p> <p>We must refuse to watch videos of child abuse, and delete them if they’re sent to us.</p> <p>We then need to trust that police will conduct thorough investigations that will result in an appropriate outcome.</p> <p><em>This article originally appeared on <a href="https://theconversation.com/3-reasons-you-should-never-view-or-share-videos-showing-children-being-assaulted-even-if-you-think-it-helps-raise-awareness-202610" target="_blank" rel="noopener">The Conversation</a>.</em></p> <p><em>Images: Shutterstock</em></p>

Technology

Placeholder Content Image

Prince Harry accuses royal family of conditioning

<p>Prince Harry has revealed new detail into his experience with royal life while giving testimony in a surprise court appearance at London’s High Court. </p> <p>Harry was there for the second day of a preliminary hearing along with other high-profile individuals - who were alleged victims of phone hacking, privacy breaches, and the misuse of their private information - as they sought to sue Associated Newspapers Ltd [ANL].</p> <p>However, ANL want to discuss the claims without trial, having described them to be “preposterous smears.” </p> <p>And during his witness statement, the Duke of Sussex has taken aim at the royal family over where the blame lies for taking legal action against ANL, explaining that he has had “an uneasy relationship with the press” in the years after his mother Diana’s death. He went on to add that it was policy to “never complain, [and] never explain”, and this was exactly what he’d been taught.</p> <p>“Following the death of my mother in 1997 when I was 12 years old and her treatment at the hands of the press, I have always had an uneasy relationship with the press,” his witness statement read.</p> <p>“However, as a member of the Institution the policy was to ‘never complain, never explain.’</p> <p>“There was no alternative; I was conditioned to accept it. For the most part, I accepted the interest in my performing [of] my public functions.”</p> <p>According to Harry, the difficulties intensified when he began his relationship with now-wife Meghan Markle. The 38-year-old prince’s concerns over his family’s lack of action only grew, with Harry even telling the court he became “increasingly troubled by the approach of not taking action against the press in the wake of persistent attacks on, harassment of and intrusive, sometimes racist articles concerning Meghan.” </p> <p>He then explained that things had only gotten worse when the couple were expecting their first child, Prince Archie. </p> <p>And when it came to the News of the World phone hacking scandal, Harry claimed he was never so much as invited to a royal meeting. </p> <p>The Institution, he said, had “without a doubt [been] withholding information”, while making it “clear that we did not need to know anything about phone hacking”. He added that it had become clear to him that “the royal family did not sit in the witness box because that could open up a can of worms”, and that through pursuing his own legal advice, the “bubble had burst in terms of what I knew in 2020 when I moved out of the United Kingdom.” </p> <p>“There is this misconception,” he noted, “that we are all in constant communication with one another. </p> <p>“But that is not true.” </p> <p>As for why Harry was bringing his claims forward - including those that ANL even hired a private investigator to hack his friends’ phones and dig up information on his then-partner - he said that it was out of love for his country, and his mounting concerns over “the unchecked power, influence and criminality of Associated.</p> <p>“The evidence I have seen shows that Associated’s journalists are criminals with journalistic powers which should concern every single one of us. </p> <p>“The British public deserve to know the full extent of this cover up and I feel it is my duty to expose it.”</p> <p><em>Images: Getty</em></p>

Legal