Category Archive Blog

Genealogy and DNA

DNA and genealogy are two topics that are closely linked. Together, they provide an invaluable resource for those interested in researching their family history.

DNA, or deoxyribonucleic acid, is the genetic material found in all living things. DNA contains the instructions for the development and functioning of all organisms. It is made up of four chemical components known as nucleotides. Each nucleotide contains a specific sequence of genetic code, which is unique to each individual.

Genealogy is the study of family history. It involves researching one’s ancestry to uncover information about their ancestors. Genealogists often use records such as birth, death, marriage, and military records to trace their lineage.

DNA and genealogy have become increasingly intertwined in recent years. DNA testing has made it possible to identify and trace family lines with unprecedented accuracy. Through the use of DNA testing, genealogists can find new information about the origins of their family and its members. This information can be used to confirm or refute traditional genealogical records.

DNA testing can also be used to identify distant relatives and match them to existing family trees. This can be done through a process known as genetic genealogy. Genetic genealogy involves comparing DNA sequences of the tested individual with those in the database e.g. Ancestry.

STOP, THINK & RUN – Stop Innocently Giving Your Information to Cybercrooks on Social Media

Beware; Take Care

STOP, THINK & RUN – Stop Innocently Giving Your Information to Cybercrooks on Social Media

Posted on May 20, 2022

Yes – you. All of us. This article is written for and applies to everyone.

We are all targets for social engineering which is the act of manipulating, influencing or deceiving people into performing actions or divulging confidential information – generally by engaging you or manipulating your emotions.

The most skilled cybercriminals accomplish their goal without you even being aware of what’s going on. You’re relaxed and just enjoying yourself, checking your social media news feed. No Nigerian princes needed anymore. They’ve moved on, taken on new personas, but are still targeting you.

Literally, everyone is a target.

The Bad Guys Kicked It Up a Notch

The bad guys have improved their skills. Attackers find loopholes and opportunities where you least expect them. They gain your trust or take advantage of your defenses being down – and they are very skilled at what they do.

I see people who I would think should know better engaging in risky behavior every single day, probably because they aren’t aware that the nature of the threats has evolved and changed. The bad guys stay one step ahead of us.

Please read this article even if you know what you’re doing. Someone you care about may not and you can help them.

Social Media

We all want to use social media and public platforms for genealogy and communicating with family and friends. We need to realize that because of the open nature of those platforms, they are full of bad actors trying to take advantage of us in seemingly innocent ways.

Not to mention that the platform is free for users, so access to you IS the commodity. Not just through ads, which you can clearly recognize as such, but by manipulating your behavior.

How, by luring you with “free,” “fun” or “missing out.”

Seriously, you do NOT need a new “free” improved profile picture.

Furthermore, some unnamed person or site you don’t know doesn’t really care about the TV show you watched when you got home from school as a kid.

Well, actually they DO care, but it’s not innocent. Scammers and bad actors gather, aggregate, and distill data about us hoping to breach our electronic security – and/or that of our social media friends.

Even if the person or account asking isn’t malicious, if the post is public, cybercriminals can and do gather and compile information about YOU that they find on public postings and pages.

Why?

In an attempt to defraud you, AND your friends who will also fall for these schemes. If your friends see you do something, they are more likely to engage in the behavior themselves. Just the act of answering these seemingly innocent questions conveys information about you.

  • First, you’re vulnerable and don’t understand that “public posts” and resulting answers make you a target. In other words, you’re advertising that you’re a good target.
  • Second, if you don’t have your Facebook (or other social media) account locked down so that only friends of friends can send you friend requests, it’s not unusual to receive a whole raft of friend requests after doing something public.
  • Third, even if your account is locked down tight, your comment or answer to that seemingly innocent public posting may net you a reply something like this:

Note the bad grammar and lack of punctuation. Probably that Nigerian prince again, with a bogus profile picture.

If people can see your “About” information, the message or reply may be more specifically tailored – targeting you with some common interest. Single middle-aged female? You’ll receive a message from a “widowed” male about that same age, maybe wearing a uniform or otherwise looking like a model, holding a puppy. Yea, right.

Now, holding the 1890 census – that might be an effective scheme to target genealogists

Let’s talk about how to stay safe and still be able to benefit from and enjoy social media.

We will begin with a big red flag.

NewProfilePic

The current rage is an artificial intelligence oil painting profile picture that’s “free.”

Right off the bat, you need to always be suspicious of anything “free” because it often means “they,” whoever they are, want your information and are willing to give you something to get it – under the guise of free. Speaking of them, just who are “they” anyway? That’s the first question you need to ask and answer before engaging.

Free almost always never benefits you.

Why would anyone want to give you a cool new profile picture for free? It may only take a few computer cycles, but it’s not free for them to produce, just the same, especially not when multiplied by the tens of thousands. What are they getting out of all those free photos they are producing?

I’ll tell you what. To gain access to your data – including the data on your phone.

Hmmm, I want you to think about something for a minute.

Do you have your phone set or apps set to scan your face and automatically open? Is that your security? For your bank account maybe too?

And you just sent a photo of your FACE to some unknown person or group in some unknown place?

Really?

You can change a lot of things, but you cannot change your face and facial recognition software is powerful.

Snopes says the NewProfilePic app really isn’t any worse than many other apps – which isn’t saying much.

Aside from the fact that NewProfilePic was initially registered in Moscow, which should be a HUGE red flag by itself, especially right now, what can the app do on your phone?

Here’s the list.

In essence, you just gave someone the keys to the candy store.

In perpetuity.

Is your blood running cold? It should be.

Still think this fun new app is “free?” You’re paying for it dearly, and may yet pay for it even more dearly.

Here’s a warning from a state Attorney General and here’s an article from MLive that interviewed a cybersecurity expert who notes that this app scrapes your Facebook data.

However, so do other people and apps.

Public is Public 

When you see anything on Facebook with the little globe, that means that anyone anyplace can see this posting AND all replies, including your answers. Everything is fully public.

In this case, more than 80,000 people answered this question from an entirely unknown person or website.

Just a couple of days later, this same posting had 54K likes, more than half a million comments, and more than 6,100 shares. That’s how effective this type of seemingly innocent question can be.

Several of my friends answered.

What does this question tell anyone looking? Your approximate age, for beginners.

Maybe an answer to a security question. Just google “top security questions for gaining access to forgotten passwords.”

Engaging with a web page also means the Facebook algorithm will send you more postings from that website in your feed. So maybe if this post doesn’t yield anything useful about you, the next one might.

Cumulatively, many answers to many postings will reveal a lot.

Never answer these.

But There’s More

Because this posting is public, I can click on the name of ANY person who has answered that public question and see every other public thing they’ve shared on their timeline.

As an example, I randomly selected Charlotte, someone that I don’t know and am not friends with who replied to that question. (You can do this same experiment.)

I clicked on her name and scanned down Charlotte’s postings. I can immediately see that she’s a good target and has fallen for several other things like this.

Here’s one from her page.

That scammer, James, latched onto her immediately. Again. Note the grammar.

Here’s another seemingly innocent game that Charlotte played to get a new Facebook profile picture and “secret” info about herself. That “4 Truths” app told Charlotte that she was very mysterious and promised to “show what’s hidden in you.” Of course, she had to provide her photo, give permission for this app to post on her timeline, publicly, and access her Facebook account. Charlotte probably didn’t even realize that was happening, or what it meant was happening behind the scenes to her data.

But now Charlotte has the new NewProfilePic oil portrait, so this one isn’t in use anymore. Maybe Charlotte’s friends wanted some nice things said about them too so they might have clicked on this same link. Just for fun, right? That’s how these scams work.

These unfortunate choices on Charlotte’s timeline were accompanied by many more that were similar in nature. Those were interspersed with notices on her Facebook page that she has been hacked and not to accept any new friend requests or messages from her. The effects are evident.

It’s worth noting that some people do have their profiles cloned and haven’t engaged in any risky behavior like this, However, you dramatically increase your odds of being compromised when you engage in risky online behaviors. Every time someone clones your profile and sends messages to all of your friends with malware links, it increases the cyberthief’s harvest of you and your friends. Cha-ching!

Eventually, the bad actors will find people who they can scam, either by:

  • Talking your friend, their target, into doing something bad for them, maybe thinking they are helping you or responding to you
  • By sending malware links that people click on thinking the message with the link is actually from you.
  • Gathering enough information to breach you or your friends’ security questions and clean out bank accounts.

No, I’m not fearmongering or being overly dramatic.

I utilize KnowBe4, a security and vulnerability consulting and training company to keep abreast of threats. You can follow their blog articles, here.

How Do Cybercrooks Access Your Friends?

Looking at Charlotte’s Facebook page, all of her friends are exposed too because they are publicly visible. Everyone can view the entire list of Charlotte’s friends.

Now, all of those scammers have access to Charlotte’s friends. Hence, the scammers can clone Charlotte’s account by stealing her photo, setting up a new account, and sending messages to Charlotte’s friends who think the message is from Charlotte. Something like “Try this new photo app, I did,” or, “Can you pick up an Apple gift card and send it to my friend for me?” You get the drift.

If Charlotte’s friends have their security set to only accept friend requests from someone that also shares a friend, and Charlotte accepts a bogus friend request – then the scammer can send her friends a friend request too and they think it’s Charlotte’s friend.

In other words, seeing a common friend causes Charlotte’s friends to let their guard down. I look at it this way – only one of my friends has to accept a bogus friend request to make me vulnerable too.

Charlotte also told people in a public posting that she was visiting someone on a specific day in another city. How do I know it’s another city? Because Charlotte has posted where she is from, where she lives, works, and the high school she attended in her “About” information.

Hmmm, those are security questions too.

That same website where I found Charlotte answering that question has also posted questions about your pet names.

What is one of the security questions if you lose your password?

Yep, pet names.

Nope, those seemingly cute sites aren’t. They are data-mining and gathering information.

Predatory Sites

First, I need to say that there are three security threats involved with these postings and websites:

  1. Any link you click which may take you to who-knows-where.
  2. That the site itself is data mining. However, this is not always the case. Some very legitimate companies ask questions to get you to engage in their subject topic. However, if the post is public, that’s an open door to the next threat.
  3. “People” or bots who harvest information about people who answer those public posts and then data-mine their accounts.

Let’s look at a few examples.

No person you don’t know cares at all about what you drank last. However, that might be valuable data for other reasons.

Facebook makes these things even more attractive to you by showing you answers from people on your friends list. I’m not going to embarrass my friends and family by showing their identity, even though it is completely public, but please, FOR THE LOVE OF ALL THAT’S HOLY, stop doing this.

Just look at that – 14 million comments and 193 thousand shares. For a data miner, this has been extremely successful.

To make matters worse, if you engage with a site on Facebook, they show you more from that site in your feed in the future. Since I clicked on these to write this article, my feed is going to be flooded with smarmy questions from these sites for days or weeks.

Let’s take a look at a few more examples.

Look at this one. 200,000 people and almost 3000 shares in two months. That means that this question appears on 3000 people’s timelines. It’s like a huge data-gathering pyramid scheme.

You’re likely to be wearing your favorite color and eat your favorite food.

How could this be used against you?

Yep, security, password, or account recovery questions again.

When I went to the page that made this posting, the next posting was a question – “In 1980, you were…” and the first person to answer said, “2 years old.” That person just told the world they were born in 1978.

Did you really want to do that?

Private Groups

You are safer in a private group, meaning only group members can see your posts.

You can tell if a Facebook group is private based on the lock and the words, “Private Group.” You can also see a list of your friends who are members of that group as well. Remember that the criterion for joining a private group differs widely and there are still lots of people you don’t know. Some private groups that I’m a member of have more than a quarter-million subscribers.

Most private groups are focused on a specific topic. Some private groups require answering application questions to join, and others don’t.

You’re safest in a group that does require questions to be answered which allows administrators who are familiar with the topic to craft questions that (hopefully) weed out most of the trolls, bots, and shady characters. That’s the choice I’ve made for the groups I co-administer, but it does require more attention from the administrators, which is why large groups often don’t implement membership questions.

Determining Privacy Settings

When you’re looking at the privacy settings on groups, posts on your friends’ timelines, or your own, you can mouse over the privacy icon. Facebook will tell you exactly who can see this post.

You’re never entirely safe. In addition to behaving safely as noted above, there are steps you can take to educate yourself and configure your social media accounts securely.

How to Stay Safe

Every social media platform is different, but I’m using Facebook as an example. Every platform will have a similar privacy function. Learn how it works.

Go to the Facebook help center, here and do a security checkup, here.

However, neither of those really address privacy, which I feel is actually the biggest security threat – the trapdoor or slippery slope.

Here’s how to access and review your privacy settings.

Click on the down arrow beside your name.

Click on Settings and Privacy, then both the Privacy Checkup and the Privacy Center.

Next, you’ll see several short articles. Be sure to step through each one

Take a few minutes to lock your account down.

The ONLY thing that is automatically public is your profile photo and any photo you use for your cover photo. Anything else can and should be restricted.

Facebook owns Instagram so you can set your Instagram security here too.

You’re not quite finished yet!

Monitoring and Controlling Apps

Next, we’re going to see what apps are installed and interacting with Facebook. Have you authorized apps you weren’t aware of?

In the dropdown arrow to the right of your name in the upper right-hand corner, click on the down arrow again.

You’ll see the Settings gear under “Settings and Privacy.” Click there to see all of the setting categories in the panel on the left side of your screen.

Review everything, of course, but pay special attention to “Apps and Websites” and “Games.”

Predatory operators will fool you into doing something fun, like a profile photo app, or a little game that provides you with your Fantasy Name or something else cute and enticing. That “free” game or app installs software. If you find software during your review, especially from something like we’ve been discussing, I recommend deleting it immediately.

Be sure you only have things you’ve intentionally installed or authorized.

THINK – Stop, Think and Run

When you see “someone” asking a question on Facebook, STOP!

You’ve heard of stop, drop and roll if your clothes are on fire?

Someone trying to breach your privacy is a digital fire, so this is stop, think and run.

Think about who is actually asking and why. “Who” is asking is NOT that cousin who shared the question from that public site. The “who” that is asking is that original site.  They are simply taking advantage of and using your cousin. I hate to put it this way, but always assume the worst and remember that even if the site itself is innocent, all of the people who can harvest your data and try to compromise your security assuredly are not.

Those “fun” sites asking those questions are either actively recruiting you or best case, leaving the door wide open for cyberthieves.

Don’t answer. No matter how much you’re tempted to share some nostalgic information or the name of your deceased pet you’re still grieving. No matter if you notice that your cousin or friend has replied already. Just don’t.

Stop, think, run. It’s that simple.

And speaking of your cousins or friends – if they have shared something that could compromise their security and privacy, not to mention their friends (including you), feel free to share this article or others, such as KrebsonSecurity. Take a look at Krebs’ examples of baiting you with childhood and puppy photos with corresponding questions. Do they evoke an emotional response from you? They are meant to. I mean, how bad can it actually be to enter the name of your beloved childhood pet?

By now, you should be screaming the answer to “how bad”!

Here’s an article from Tulane University. Yes, they are advertising their degree in cybersecurity management, but they do so by summarizing the things that social media users need to be concerned about.

I also follow a company called Facecrooks which monitors and writes about Facebook privacy, fraudsters, other scams, and such. They have a Facebook page here and a Scam Watch page here.

The Baker’s Dozen Messages

The messages I want to leave you with, aside from stop, think and run, are this:

  1. Nothing is free
  2. Think before you engage or answer
  3. Remind yourself that a stranger really doesn’t care about your first-grade teacher’s name, but a crook does
  4. Just because someone you know answered or engaged doesn’t mean it’s safe
  5. Consider potential consequences
  6. Can something you are about to share be used to compromise either you, your family, friends’, or employer’s privacy or safety?
  7. Don’t overshare – only say what’s necessary
  8. Notice what is public and what is not – look for that globe and behave accordingly
  9. Don’t download or play free games, or send anything to a “free” website
  10. Don’t click on links to unknown places
  11. Don’t accept friend requests from people you really don’t know.
  12. Learn the warning signs of a fake profile and report them by clicking on the three dots to the right of the profile
  13. Don’t click on links in private messages and beware of suddenly receiving an “odd” message from someone you haven’t heard from in a while

I’ve written other articles about online privacy, security, and safety too.

Remember…

Stop. Think. Run.

Roberta Estes – GEDMatch

The Sounds of the Blue Mountains


The dominant sound in our beautiful city in a National Park especially in Hazelbrook today and almost every day is the roar of the chain-saw, the grinding of the chipper as yet more of our emblematic trees is reduced to chips. Bad luck for the possums, miniature bats, koalas and birds – their homes and roosts gone. Let’s not forget these same trees are carbon storage and carbon sinks releasing precious oxygen. Dead and ground into mulch all they can do is rot and release methane. Where are the climate champions, the greenies as these magnificent trees are lost. In the 20 years I’ve lived in Hazelbrook so many trees have gone just in my near neighbourhood. We are set for hotter summers with less cooling trees. The sound of chain-saws will be replaced by the hum of air conditioners powered by coal and gas as our town becomes just another suburbia bereft of its natural beauty, its trees.

Family History Academy

December Newsletter 2021

www.familyhistoryacademy.com.au

Cybercriminals Like Online Shopping Too

Compulsory Vaccinations

Members of the wider community are discussing the need for workers and customers of various business to be double vaccinated, some discussions are more confronting than others with street protests and individuals behaving very badly.

Our Society is founded on the need for some individual restrictions for the safety of all. Workers at a construction site are required to wear fluoro vests, hard hats and steel-toed boots and wear long sleeve shirts. They are also required not to drink alcohol, take drugs or smoke in work areas. These restrictions are for the safety of all. Workers who work with children are required to have a “Working with Children Check” by Police for the safety of the children. Nurses and doctors working in hospitals and operating theatres are required to scrub up, wear fresh garments each day and wear appropriate personal protection equipment.

When we drive a vehicle on a public road we are required to wear a seat-belt, have passed a licence test, to not drink alcohol or drugs (ie under the influence of these) and obey the speed limit. Drivers also are restricted to designated parking spaces (you can’t park in the middle of a freeway) or drive through a shopping mall.

There are a myriad of examples where individual restrictions occur in society and we generally do not abuse these as they are always for the safety of the individual and those around us.

Science has shown over 200 years that vaccinations are effective against many, many diseases. The Covid pandemic has shown the safety of covid vaccinations in that almost 5 billion people have been vaccinated and relatively few have had major problems.

Those ending up in ICUs around the world are generally those who are now unvaccinated or those who have serious underlying medical conditions or are of an older age. If more people were vaccinated then even those with such co-morbidities, would be less likely to contract the disease.

Having a vaccination once or twice a year is far less onerous than having to gear-up every day to work on a construction site.

Yes, people in this society do have freedom of choice. If you choose not to get a driver’s licence then you can’t drive a vehicle; if you choose not to wear protective clothing on a construction site then you have made the choice to not work there. If you choose not to be vaccinated for whatever reason, then you choose not to work with me, not to attend the football with me, not eat with me in a restaurant and not travel on public transport with me.

Every choice we make in life has consequences. Make the choice and live with the consequences. As Jacquie Lambie, the Senator from Tasmania said, “Be a bloody adult!”

CANCEL CULTURE

Please read the article in The Good Weekend, the Saturday magazine of the Sydney Morning Herald of Saturday, 20th November 2021 on “Cancel Culture: It’s complicated” by James Button.

The article, to be presented over three issues of the Sydney Morning Herald viz Sat 20 November, Sun 21 November, Mon 22 November 2021, is the most definitive and best written exposé of this recent affliction to our society.

In my opinion, ‘Cancel Culture’ is not designed to change or remove ‘culture’ but instead to destroy any person, celebrity or not, who expresses an opinion that could cause hurt to someone, in many cases only the hurt of those who are the self-professed victims.

For hundreds of years, in our western culture the debate of ideas and opinions has led our institutions of learning and our governments and organisations. Debate where those involved listened to the ideas of others, put forward their own ideas and opinions and perhaps, but not always, came to an agreement or compromise. The debate was of the ideas not of the personal and people were prepared to allow all to profess their own opinions and thoughts as part of wider discourse.

But with the rising of social media, the anonymity of such avenues for expression of opinions has led to so much vitriol, such threats of violence, such cowardice that people so attacked have committed suicide or attempted suicide and at the very least have had their mental health severely compromised.

Please read the article with an open mind, be prepared to express your own opinions but DO NOT attack the author for his opinions.

Cancel culture abstract concept vector illustration. Cancel person or community, social media platform, internet criticism, public figure, celebrity, group shaming, boycott abstract metaphor.

Cartoon vector created by vectorjuice – www.freepik.com

Scam Text Messages

That “delivery” you just got a text message about is probably a scam.

What’s behind the barrage of scam text messages and calls over the past few months?

Over the past few months, many Australians have received a large amount of scam text messages and calls.

The bottom line – don’t click any of the links and don’t give your details away.

One of the many texts I have received over the past month were from ‘Australian Post’. This immediately rang alarm bells. Scam messages typically have spelling or grammatical errors (not all!) but these should at least have said ‘aus post’ or ‘Australia Post’. Scammers seem to rely on you not paying attention to the header and only reading the content. As to why anyone would click on a strange link, especially a php link is beyond me.

And as for the text messages from Craig Kelly, deluded Federal politician, are a disgrace. When I block the number, another comes from a seperate number.

Don’t get me started on the “robot calls” threatening police action if I don’t respond or the calls threatening to cut off my NBN. If I catch up to them, it won’t be their NBN I cut off!

Here’s a text message I recently got:

This is but one of the dozens I have received over the past month, all spoofing a different phone number and different link but all with much the same message. I deleted them all after first blocking the number. Probably not necessary to block the number as the scammers always spoof a new number.

Scamwatch are getting reports about text malware scams – if you receive a message like this DO NOT click the link! It is a #scam designed to download malware to your device. Delete the message immediately to #stopthescam Image and information via Scamwatch.

AUSSIES BEING INUNDATED WITH SPAM CALLS AND MESSAGES

Android malware called “FluBot” is infecting phones across Australia and clogging up our text and voicemail banks. FluBot is installed on Android devices by clicking a malicious link sent in a text message. Once it is installed, it has access to everything on your device, including bank details and passwords.

FluBot then uses your contact list to bombard your friends with similar scam links. These direct you to a web page posing as a trusted brand and encourages you to download an app.

The scam only affects Android users and only those who have enabled “side-loading”, where apps can be installed from outside of the Google Play Store. If you do not click text message links then you will not be affected.

To learn if your phone is infected, search for a new app called “Voicemail” with a blue cassette in a yellow envelope. If you attempt to uninstall this app, an error message will pop up – ignore it and delete the app.

Telstra may also contact members it identifies as sending exceptionally high volumes of text messages. Changing your passwords on a device you don’t believe has the malware will greatly enhance your security.

A factory reset can also be done if you do not believe your phone contained FluBot before your last backup.

Nine Perfect Strangers

  • TV Mini Series
  • 2021
  • TV-MA
  • Created by: John-Henry Butterworth
  • Directed by: Jonathan Levine
  • Based on the book by: Liane Moriarty
  • Executive Producer/Showrunner: David E. Kelley
Nine Perfect Strangers (2021)

Starring:

Nicole Kidman, Bobby Cannavale, Regina Hall, Asher Keddie, Melissa McCarthy, Michael Shannon, Luke Evans, Tiffany Boone, Grace Van Patten, Samara Weaving, Manny Jacinto, and Melvin Gregg.

Nicole Kidman stars as Masha Dmitricher, owner and operator of a luxurious spa.

Could ten days at a health resort really change you forever? These nine perfect strangers are about to find out… Nine people gather at a remote health resort. Some are here to lose weight, some are here to get a reboot on life, some are here for reasons they can’t even admit to themselves. Amidst all of the luxury and pampering, the mindfulness and meditation, they know these ten days might involve some real work. But none of them could imagine just how challenging the next ten days are going to be. Can you stand to be in a room with nine people you don’t know?—augustdnl

Produced by Hulu, set in the USA but filmed in the hinterland of northern NSW in Australia and available as an 8-week series on Amazon Prime, the natural beauty of this Australian countryside is beautifully displayed.

Byron Bay in the distance.

There is a lot going on with these strangers as their past lives come alive over the series to show how each of them is in some way just a bit damaged, and in the same way, so is the staff headed by Masha. Her methods are unusual but the guests are quick to realise the tricks she uses and as her own past is revealed the drama intensifies.

I have enjoyed watching the first five episodes and look forward to the final three. The acting is very good and not overly ‘hammed up’ but Nicole’s fake Russian accent is a bit much. Intrigue, humour, drama…. It’s like a discovery voyage into the lives of the 9 strangers and the staff. Layers being peeled each time.

Melissa McCarthy and Manny Jacinto

The Newsreader

The Newsreader provides an insight into the smoky Australian newsrooms of the 1980s and the people who brought us our nightly news.

This drama series premiered on Australian free-to-air channel, ABC on 15th August 2021. The series was created by Michael Lucas and stars Anna Torv, Sam Reid and Chai Hansen. It has six episodes and is set in 1986 in Melbourne.

The series blends together major news stories of the era with the lives and struggles, ambitions and careers and emotions and relationships of the cast.

Anna Torv play Helen Norville, the female co-anchor and newsreader of the Six O’Clock News. She is an emotional wreck, relying on prescription pain-killers and sleeping pills but once the camera starts she is the perfect newsreader. Her senior co-anchor/host is the ageing, heart-attack candidate (smoking and drinking) Geoff Walters, played by Robert Taylor, a seasoned journo who made his name in the field of wars (Vietnam) and conflict (The Dingo Took My Baby). The inference is that “glamour” and Helen’s brand of more “emotional” news coverage is replacing a more staid kind of impartial journalism.

The young, ambitious field reporter, Dale Jennings, played by Sam Reid, finds himself in a relationship with Helen Norville when she has a breakdown and takes an overdose. Jennings has his eyes set on being a news host bumbling his way through until a lucky chance places him near the terrorist bomb blast in Melbourne in 1986 and he is able to show his raw talent.

But not all is going his way when he has an encounter with his gay cameraman, Tim Ahern (Chai Hansen) and doubts his own sexuality. He says he choses Helen because he cares for her but in reality he is most likely denying his true self in an era when being gay was not only illegal but also career ending.

Jennings & Rickards

Stephen Peacocke plays a stereotypical sports reporter, Rob Rickards and also stereotypical is the blustering news boss Lindsay Cunningham played to excess by WillIam McInnes. The newsroom is more racially diverse than any newsroom of the time with Michelle Lim Davidso playing Noelene and Chum Ehelepola as Dennis.

Great cast, script, direction, cinematography, editing etc. Plus the bonus of major world news events from 1986. The newsroom is a ruthless arena and only the strongest gladiators will survive.

It’s showing the changing of the guard from the old style of news reading to today’s double header desks with sports and updates, of heavily repeated footage and the drama.

Helen Norville & Geoff Walters

Available to watch Sunday nights live and streaming on iView. Well worth it!