Blog - Page 77 of 96 - Techbest - Top Tech Reviews In Australia

US Progressives Demand Antitrust Investigation of Nvidia


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Brief Overview

  • Progressive organizations in the US, along with Democratic Senator Elizabeth Warren, have called on the US Department of Justice (DOJ) to investigate Nvidia due to competition issues.
  • Nvidia commands a significant share of the AI chip market, controlling approximately 80% of it.
  • There are worries regarding Nvidia’s practice of bundling software with hardware, which may hinder innovation and create customer lock-in.
  • Due to surging demand for AI-enabled chips, Nvidia’s market capitalization has risen to US$3 trillion ($4.6 trillion).
  • The DOJ has been tasked to monitor possible antitrust investigations concerning Nvidia.
  • Nvidia claims its dedication to compliance and transparency within the marketplace.

Progressives Advocate for Nvidia Antitrust Inquiry

US progressive organizations and Democratic Senator Elizabeth Warren have urged the US Department of Justice (DOJ) to examine Nvidia, citing concerns surrounding the company’s leading role in the AI chip market. Nvidia’s market cap has skyrocketed to US$3 trillion ($4.6 trillion) amidst strong demand for chips capable of powering complex generative AI applications.

Progressives Advocate for Nvidia Antitrust Inquiry

Worries Regarding Market Supremacy

The correspondence, authored by Demand Progress along with nine other organizations, requested DOJ antitrust head Jonathan Kanter to investigate Nvidia’s corporate conduct. The groups have raised concerns about Nvidia’s bundling of software and hardware—a tactic previously identified by French antitrust regulators as potentially anti-competitive. They argue that this strategy can secure customer loyalty and inhibit innovation, which conflicts with industry standards for cooperation and interoperability.

Regulatory Developments

In June, Reuters reported that US authorities had instructed the DOJ to supervise potential antitrust investigations into Nvidia while the Federal Trade Commission (FTC) concentrates on Microsoft and OpenAI. Nvidia has claimed that it has poured billions into developing AI-capable computing technologies and is committed to fostering new markets and avenues for growth.

Nvidia’s Competitive Standing

Nvidia captures approximately 80% of the AI chip sector, including bespoke AI processors developed by cloud service firms like Google, Microsoft, and Amazon. These chips are usually leased through each provider and not sold directly. When considering only cloud providers’ chips, Nvidia’s portion of the market is nearly 100%, enabling the company to record gross margins ranging from 70% to 80%.

Political and Economic Apprehensions

Senator Elizabeth Warren has expressed significant concerns regarding Nvidia’s market dominance, cautioning that permitting an individual firm to control the global AI future entails considerable economic risks. According to Kanter, DOJ antitrust officials are particularly wary of market bottlenecks that could be utilized to exclude competitors.

Conclusion

Progressive groups in the US and Senator Elizabeth Warren are advocating for an antitrust investigation into Nvidia due to its prevailing position in the AI chip industry. Concerns have been raised about Nvidia’s bundling strategies, which critics argue contribute to customer lock-in and inhibit innovation. The DOJ has been assigned to manage possible antitrust investigations, while Nvidia asserts its dedication to an open market and compliance with regulations.

Q: What is the main issue raised by US progressives and Senator Elizabeth Warren?

A: The main issue is Nvidia’s dominant role in the AI chip market and its business strategies, such as combining software and hardware, which may lead to customer lock-in and hinder innovation.

Q: What portion of the AI chip market does Nvidia control?

A: Nvidia controls around 80% of the AI chip market. Without including custom AI processors produced by cloud service companies, Nvidia’s market share nears almost 100%.

Q: What measures have US regulators taken thus far?

A: US regulators have instructed the DOJ to monitor potential antitrust investigations into Nvidia, while the FTC is concentrating on entities like Microsoft and OpenAI.

Q: How has Nvidia responded to these allegations?

A: Nvidia has claimed it has invested billions in advancing AI-capable computing technologies and is dedicated to expanding new markets and growth opportunities, asserting its commitment to legal compliance and market transparency.

Q: What economic dangers has Senator Warren highlighted?

A: Senator Warren pointed out that if a single company serves as the gatekeeper to the global AI future, it could present significant economic dangers, potentially suppressing competition and innovation.

Q: What might result from an antitrust inquiry into Nvidia?

A: Possible results could include regulatory actions aimed at enhancing market competition, enforcing adherence to antitrust regulations, and ensuring equitable business practices.

“`

Nokia Wireless Bluetooth Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Nokia Wireless Bluetooth Earbuds, Earphones in Ear with Dual ENC Noise Cancelling Mic, Touch Control, Have Earbuds Deep Bass Stereo Sound, 16H Playtime Wireless Headphones, White E3106

Telstra and Optus Pressured to Delay 3G Network Closures


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Telstra and Optus Called to Delay 3G Network Shutdowns

Telstra and Optus Called to Delay 3G Network Shutdowns

Telstra and Optus called to delay 3G shutdowns

Quick Overview

  • Parliamentary inquiry requests Telstra and Optus to postpone their 3G shutdowns.
  • Inquiry chair Matt Canavan suggests a voluntary delay; government action may follow if ignored.
  • More than 100,000 customers could be affected by the 3G shutdown.
  • Telecoms are offering complimentary handsets to aid in the transition.
  • Optus and Telstra are dedicated to moving customers to 4G and 5G networks.
  • 3G shutdowns are scheduled to take place around September of this year.

Inquiry Background

A last-minute parliamentary inquiry has prompted Telstra and Optus to “voluntarily” reconsider their 3G network shutdown strategies. Nevertheless, it appears the telecommunications leaders remain committed to their original timelines. The inquiry, led by Nationals Senator Matt Canavan, raises crucial concerns regarding customer preparedness for transitioning to advanced technologies.

Initiatives to Transition Customers

Both Telstra and Optus are making significant efforts to shift customers to 4G and 5G networks. These initiatives include providing free handsets to individuals still using 3G devices. However, it has come to light that over 100,000 customers might not take action prior to the anticipated shutdowns in September.

Potential for Government Intervention

Senator Canavan has reached out to both firms, advocating for a voluntary delay. Should this request be overlooked, the inquiry has suggested that the government could negotiate a postponement or impose a final carrier license condition to compel action.

Responses from Telecoms

Optus’ Perspective

Optus Vice President of Government and Regulatory Affairs, Andrew Sheridan, acknowledged the inquiry’s insights. He underlined the public interest in enabling a seamless transition and reducing risks to public safety. Sheridan expressed, “Decommissioning 3G is essential for Optus to reallocate spectrum, enhancing the quality of 4G and extending 5G coverage.”

Telstra’s Perspective

While a spokesperson for Telstra was unavailable for comment, sources suggest that Telstra also supports its shutdown agenda and timelines. Both companies are actively working to minimize negative impacts on customers and assist in the transition from 3G to more advanced technologies.

Consumer Implications

Government input over the last week has advised consumers to take action ahead of the impending 3G network shutdowns. These shutdowns have been planned for years, but the urgency has intensified as the deadline looms closer.

Conclusion

The parliamentary inquiry has brought forth significant worries regarding customer readiness to shift from 3G to modern networks. Although Telstra and Optus have made strides to facilitate this transition, the potential consequences for over 100,000 customers remain a pressing concern. Upcoming government actions could involve negotiations or regulatory interventions to promote a smoother transition.

Q: Why are Telstra and Optus planning to discontinue their 3G networks?

A:

The discontinuation of 3G networks allows Telstra and Optus to redeploy the spectrum for enhanced 4G services and comprehensive 5G coverage. This shift is vital for improving network performance and meeting the rising demand for data.

Q: What initiatives have Telstra and Optus implemented to assist customers in transitioning from 3G?

A:

Both telecommunications companies have distributed free devices and set up dedicated support teams to help customers migrate to 4G and 5G networks. They have also ensured device offers remain available to facilitate the transition.

Q: What consequences will arise if Telstra and Optus do not choose to delay the 3G shutdown voluntarily?

A:

If Telstra and Optus do not voluntarily postpone the shutdown, the government may pursue negotiations for a delay or impose a carrier license condition to enforce compliance. This action could help ensure a more seamless transition for affected users.

Q: How many customers are projected to be affected by the 3G network shutdown?

A:

It is anticipated that over 100,000 customers may not respond before the 3G networks are decommissioned. These individuals could encounter connectivity challenges without transitioning to updated devices and networks.

Q: When is the planned date for the 3G network shutdown?

A:

The scheduled shutdowns for the 3G network are set to occur around September this year. Customers are encouraged to take action before this deadline to prevent any service interruption.

Skullcandy Jib True 2 Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Skullcandy Jib True 2 in-Ear Wireless Earbuds, 32 Hr Battery, Microphone, Works with iPhone Android and Bluetooth Devices – Light Grey/Blue

California DMV Revamps 42 Million Vehicle Titles Using Blockchain Technology


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

California DMV Implements Blockchain Technology for 42 Million Vehicle Titles | TechBest

California DMV Implements Blockchain Technology for 42 Million Vehicle Titles

Quick Read

  • California DMV digitises 42 million vehicle titles using blockchain technology.
  • The initiative is in partnership with Oxhead Alpha and Ava Labs’ Avalanche blockchain.
  • This new system aims to diminish fraud and enhance the title transfer process.
  • Residents will soon access their digital titles via a mobile application, launching early next year.
  • Deloitte and Ava Labs are upgrading the US disaster recovery platform.
California DMV implements blockchain technology for digitising 42 million vehicle titles

California’s Transition to Blockchain for Vehicle Titles

The California Department of Motor Vehicles (DMV) has launched a pioneering project to digitise 42 million vehicle titles through blockchain technology. This initiative, in cooperation with tech firm Oxhead Alpha and Ava Labs’ Avalanche blockchain, represents the first effort of its kind in the United States.

The Significance of Blockchain Technology

Utilising blockchain technology, the California DMV aims to establish a clear and immutable record of ownership. This transformation is expected to greatly mitigate cases of lien fraud, which often evade detection in conventional systems. The unchangeable framework of blockchain guarantees that every transaction is logged securely and can be verified.

Streamlining Access via Mobile Features

Residents of California, home to over 39 million individuals, will soon gain access to their vehicle titles through a mobile application. This app, currently under development, is anticipated to be released early next year. By digitising vehicle titles, the DMV also eliminates the requirement for physical appointments, facilitating a more user-friendly experience for vehicle owners.

Professional Perspectives

“The initial phase involved creating 42 million titles as tokens on the Avalanche blockchain,” commented John Wu, president of Ava Labs. “Now, the DMV is in the process of developing a wallet application that residents can easily download on their smartphones.”

Expanding Use Cases: Improving Disaster Recovery

Deloitte has teamed up with Ava Labs to construct a new disaster recovery platform. This platform seeks to streamline disaster reimbursement requests to the Federal Emergency Management Agency (FEMA), illustrating the wider range of possibilities blockchain technology can offer to government functions.

Looking Ahead

As technology evolves at a rapid pace, other governmental sectors are likely to investigate the advantages of blockchain technology. The triumph of the California DMV’s initiative could pave the way for similar projects around the globe, including in Australia.

Summary

The California DMV’s forward-thinking project to digitise 42 million vehicle titles via blockchain technology aims to combat fraud and simplify the title transfer procedure. Through collaboration with Oxhead Alpha and Ava Labs, the DMV is preparing to launch a mobile application for residents to access their digital titles early next year. This effort highlights the potential of blockchain technology to streamline government processes and bolster security.

Q: What is the primary objective of digitising vehicle titles using blockchain?

A: The main objectives are to identify and prevent fraud and to simplify the title transfer process for vehicle owners.

Q: When will California residents be able to utilize their digital vehicle titles?

A: Residents will be able to access their digital vehicle titles through a mobile app starting early next year.

Q: How does blockchain technology contribute to fraud prevention?

A: Blockchain technology provides a transparent and unalterable record of ownership, making it challenging for fraudulent activities to go undetected.

Q: Who are the main technology collaborators involved in this initiative?

A: The primary technology collaborators are Oxhead Alpha and Ava Labs, the entity responsible for the Avalanche blockchain.

Q: What advantages will this initiative offer to California residents?

A: This initiative will lessen the necessity for physical DMV visits and offer a more secure and convenient method for residents to manage their vehicle titles.

Q: What other uses of blockchain technology are being investigated by the US government?

A: Deloitte and Ava Labs are collaboratively developing a disaster recovery platform to simplify disaster reimbursements to FEMA, highlighting the broader potential uses of blockchain technology.

Technics AZ40M2 True Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Technics AZ40M2 True Wireless Bluetooth Earbuds with Active Noise Cancellation, Multipoint Connection, Mic, and up to 5.5 Hours Play Time, Rose Gold (EAH-AZ40M2EN)

Logitech G MIXLINE: Seamless Audio Mixing for Gamers


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Logitech G MIXLINE: Seamless Audio Mixing for Gamers

Quick Overview

  • Logitech G unveils MIXLINE on July 16, 2024.
  • Free of charge for Windows 10 (21H2 or later) and Windows 11.
  • Available in 22 languages.
  • Perfect for gamers and streamers who handle various audio inputs.
  • Offers a sleek interface with drag-and-drop functionality, separate volume controls, and customization features.
  • Only needs a single audio driver, optimizing system efficiency.

Overview

On July 16, 2024, Logitech G launched the full version of MIXLINE. This complimentary software supports Windows 10 (21H2 or later) and Windows 11, offering support in 22 languages. Created to assist gamers and streamers in effortlessly managing numerous audio sources, MIXLINE represents the newest development within the Logitech G ecosystem.

Simple Audio Oversight

“For anyone dealing with multiple audio inputs while streaming, gaming, or just using headphones, MIXLINE is the solution for you,” states Daniel Bowen, Senior Global Product Manager for MIXLINE.

Simple audio mixing for gamers

MIXLINE tackles the persistent challenge of managing various audio inputs, mixing, routing, and monitoring, all while consuming minimal system resources. This aspect is vital for gamers and streamers utilizing a single PC setup, allowing for more resources to be dedicated to other necessary applications like Streamlabs Desktop.

Notable Features

Drag, Drop, Supervise

With a user-friendly and clear interface, users can seamlessly drag and arrange audio paths, monitor sounds with a single click, and link inputs to various outputs.

Streamline Mixing and Recording

MIXLINE enables users to interconnect, route, and mix high-quality audio all within a unified application. Its intuitive interface guarantees swift setup and effective audio supervision.

Separate Volume Management

Modify the input levels for each submix separately and manage the sound for each input and output individually, providing a highly tailored audio experience.

Customize Professional Audio

Clear up your workspace without the need for external hardware mixers. MIXLINE enhances streaming performance and facilitates real-time audio customization.

Maximum Efficiency

Requiring just one audio driver, MIXLINE minimizes clutter during your mixing sessions and enhances computer performance, ensuring superior audio quality is never compromised.

Audio mixing simplified for gamers

Conclusion

MIXLINE from Logitech G revolutionizes the experience for gamers and streamers by simplifying the management of multiple audio sources. Its intuitive layout and low system resource utilization guarantee a smooth and pleasurable experience without sacrificing quality. For additional information, visit the Logitech G website.

FAQ

Q: Which operating systems can run MIXLINE?

A: MIXLINE works with Windows 10 (21H2 or later) and Windows 11.

Q: Is there a cost associated with using MIXLINE?

A: No, MIXLINE is available free of charge.

Q: How many languages does MIXLINE accommodate?

A: MIXLINE accommodates 22 languages.

Q: Are multiple audio drivers needed for MIXLINE?

A: No, MIXLINE only needs one audio driver, which helps conserve system resources.

Q: Can I independently adjust the volume for each audio source?

A: Yes, MIXLINE offers independent volume control for each audio input.

Q: Is MIXLINE appropriate for both gamers and streamers?

A: Certainly, MIXLINE is crafted to ease audio management for both gamers and streamers.

Microsoft’s DDoS Defense Misstep Intensifies Azure Service Outages


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

A recent error in Microsoft’s DDoS defence has led to major disruptions within Azure and Microsoft 365 services. Below is an analysis of what happened and its implications for Australian companies depending on these services.

Microsoft DDoS defence error intensifies attack effects on Azure services

Quick Overview

  • Microsoft encountered a DDoS attack impacting Azure Front Door and Azure CDN services.
  • An error in the DDoS defence setup magnified the effects of the attack.
  • Services impacted included Microsoft 365, Purview, App Services, among others.
  • Problems lasted from 9:45pm AEST to 5:43am AEST.
  • A detailed preliminary report on the incident is expected to be published by Microsoft soon.

Insights into the DDoS Attack

A DDoS attack aims to disrupt a service by inundating it with excessive traffic. In this case, it targeted Microsoft’s content delivery frameworks, Azure Front Door, and Azure CDN. DDoS attacks can dramatically affect service availability, causing outages and interruptions.

Flaw in DDoS Defence Execution

Microsoft’s DDoS protection features activated as anticipated due to the assault. However, a flaw in the setup of these defences unintentionally increased the attack’s effects instead of lessening them. This flaw resulted in broader service outages than were initially expected.

Service Issues and Resolution

Problems commenced at 11:45 UTC (9:45pm AEST) and were rectified by 19:43 UTC (5:43am AEST). Services impacted included a portion of Microsoft 365, Purview, App Services, Application Insights, and the Azure portal itself. Microsoft addressed the issue by modifying network configurations and executing failovers to alternative networking routes.

Next Steps and Detailed Analysis

Microsoft has pledged to issue a more in-depth preliminary post-incident report later in the week. This report is expected to provide further insights into the cause of the error and outline the steps taken to avert similar incidents in the future.

Recap

An error in Microsoft’s implementation of its DDoS defences during a recent attack led to intensified service disruptions across Azure and Microsoft 365 services. Although the issues have been resolved, a comprehensive report is anticipated to clarify the incident and suggest future preventive actions.

Q&A

Q: What constitutes a DDoS attack?

A:

A DDoS (Distributed Denial-of-Service) attack refers to overwhelming a network or service with a surge of internet traffic, rendering it inaccessible to legitimate users.

Q: Which Microsoft services were impacted by the recent DDoS attack?

A:

The impacted services encompassed Azure Front Door, Azure CDN, a portion of Microsoft 365 offerings, Purview services, App Services, Application Insights, and the Azure portal.

Q: How long did the service disruptions persist?

A:

The disruptions began at 11:45 UTC (9:45pm AEST) and concluded by 19:43 UTC (5:43am AEST).

Q: What measures did Microsoft take to resolve the problem?

A:

Microsoft implemented network configuration amendments to bolster DDoS protection efforts and initiated failovers to alternative networking routes for relief.

Q: Will Microsoft share additional details about the incident?

A:

Indeed, Microsoft is expected to issue a detailed preliminary post-incident report later in the week.

Q: How can businesses safeguard themselves against DDoS attacks?

A:

Businesses can enhance protection by deploying strong DDoS protection systems, sustaining redundant network pathways, and using comprehensive monitoring tools to identify and mitigate attacks promptly.

HUAWEI FreeBuds 5i Wireless Earphone Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

HUAWEI FreeBuds 5i Wireless Earphone, Bluetooth Earbuds, Hi-Res sound, 42dB multi-mode noise cancellation, 28hr battery life, Dual device connect, Water resistance, Nebula Black (Official AU Store)

Cyber Intruders Infiltrate Western Sydney Uni: Isilon Storage Affected for Eight Months


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Data Compromise at Western Sydney University: Isilon Storage Affected

Data Compromise at Western Sydney University: Isilon Storage Affected

Quick Overview

  • Western Sydney University faced a breach lasting more than eight months.
  • Intruders gained access to 83 out of the 400 Isilon storage directories.
  • A total of 580TB of data was compromised, including personal and confidential information.
  • The breach originated from an initial attack on the Microsoft 365 platform.
  • Investigations are actively being conducted by federal and state bodies.
Western Sydney Uni intruders accessed Isilon storage directories over eight months

Western Sydney University has disclosed a substantial data compromise that persisted for over eight months, impacting 580TB of data within its Isilon storage framework. The incident led to the exposure of personally identifiable and sensitive details from 83 of the 400 directories contained in the Isilon system.

Insights into the Breach

Isilon, a network-attached storage solution originally created by a company bearing the same name and later taken over by EMC (currently a part of Dell), was the core target. The breached storage included My Documents entries, departmental shared directories, and various forms of backup and archived files.

The university indicated that students and staff utilize centralized network storage to access their personal My Documents, which includes desktop content, downloads, favorites, and internet browsing history. This allows for an individual’s My Documents to be retrievable on any computer connected to the Western network.

Chronology and Extent of the Breach

Investigative findings suggest that unauthorized entry into the Isilon storage took place from July 9, 2023, until March 16, 2024. The preliminary analysis uncovered that sensitive data such as names, contact information, birth dates, health data, workplace behavior data, and financial information had been accessed.

Fortunately, since remediation efforts began on March 16, the university has not observed any additional unauthorized access. Furthermore, there have been no threats regarding the disclosing or publishing of the compromised data, nor has any information surfaced on the dark web.

Initial Breach and Ongoing Investigations

The security vulnerabilities at Western Sydney University trace back to an initial breach of its Microsoft 365 environment in May of the previous year. While there is no evidence of intruder access beyond the Microsoft Office 365 and Isilon environments, the specifics regarding how lateral movement transpired have not been made public.

Authorities at both federal and state levels, including the Cybercrime Squad of the NSW Police Force operating under Strike Force GIRRAKOOL, are currently investigating the matter.

University’s Reaction and Alerts

Western Sydney University has pledged to inform all individuals affected by the Isilon breach. However, it has noted that it may not be feasible to identify every individual impacted.

The university stated that the attackers gained access to “83 of the 400 directories in Isilon,” along with a cache of personally identifiable and sensitive information.

Conclusion

The data compromise at Western Sydney University underscores the essential necessity for robust cybersecurity practices. The extended breach of the Isilon storage system has exposed significant volumes of personal and confidential information, highlighting the urgency for heightened vigilance and advanced security measures. The university is collaborating with authorities to investigate and alleviate the situation, ensuring that similar incidents are prevented in the future.

FAQ: Essential Questions Addressed

Q: What type of data was compromised during the breach?

A:

The breach revealed personally identifiable information, including names, contact details, birth dates, health-related information, workplace behavior data, government identification numbers, tax file IDs, superannuation information, and bank account details.

Q: How long did the intruders have access to the Isilon storage?

A:

Intruders had unauthorized access to the Isilon storage system for a duration exceeding eight months, from July 9, 2023, to March 16, 2024.

Q: What measures has the university taken since the breach was identified?

A:

Following the detection of the breach, the university implemented remediation measures on March 16, and no further unauthorized access has since been recorded. They are also making efforts to notify all affected individuals and are cooperating with authorities for a comprehensive investigation.

Q: Has any of the compromised data been leaked or threatened with release?

A:

To date, there have been no threats to disclose or publish the compromised data, nor has any of the information appeared on the dark web.

Q: What was the initial cause of the data breach?

A:

The data breach originates from an initial compromise within the university’s Microsoft 365 environment in May of the previous year.

Q: Which storage system was the target of the breach?

A:

The compromised system was Isilon, a network-attached storage solution originally developed by Isilon Systems, later acquired by EMC and now part of Dell.

Q: Are any investigations still in progress?

A:

Yes, both federal and state authorities, including the Cybercrime Squad of the NSW Police Force, are conducting an inquiry under Strike Force GIRRAKOOL.

“`