Century-old home facing demolition fell off Perth heritage list in move that divided council
In a statement to this masthead, the City of Perth revealed the property had been identified as part of a two-year-long survey of culturally significant places for its database between 2021 and 2022.
The expansive 4000-page review, mandated under the state's heritage laws, canvassed more than 700 properties the city's officers recommended be added or updated in its records.
City officers inspecting the property found the single-storey Federation-style home at 27 Outram Street in West Perth was substantially intact — having retained the original timber porch, doors, fireplace and tiles — and ruled it worthy of inclusion due to its historical significance.
Perth-based consultants Planning Solutions, engaged by Hancock Prospecting – which had purchased the property for $4.23 million in 2021 – penned a strongly worded letter to the city on November 30, 2022.
In it, the consultants acknowledged the 1904 home built had 'moderate significance', but demanded assurances its status would not be elevated in a way that saw it subject to development constraints.
The consultants, which were among 21 to write a letter of objection to the city's plans, then gave a public deputation against the inclusion of the home and Hancock Prospecting's 1980s headquarters, which had been identified for its association with mining pioneer Lang Hancock.
The city's officers stared down those who objected to the inclusion of 16 properties, including 27 Outram Street, recommending the council adopt the survey in its original form.
But when it came time for council to endorse the survey at a meeting on March 28, 2023, Zempilas stepped in, moving an alternate motion that scrubbed the properties from the list.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

ABC News
9 hours ago
- ABC News
Agriculture Minister Julie Collins denies 'flying under the radar' with live export transition announcement
The federal agriculture minister has rejected suggestions she is avoiding sheep farmers and industry representatives during a lightning visit to Western Australia. Julie Collins was in the state on Tuesday to reveal more details of the transition assistance package underpinning the ban of live sheep exports by sea. Ms Collins travelled to the saleyards at Muchea, 50 kilometres north of Perth, to reveal a $139.7-million package minimally changed from a draft leaked in April this year. The package includes $40m for WA's processing supply chain capacity, $30m for farmers transitioning away from sheep, $2.2m to assist shearers looking for different work and $1.5m for the transport industry. The announcement, made alongside WA Agriculture Minister Jackie Jarvis, was immediately criticised by farmers and industry representatives who suggested Ms Collins was trying to "fly under the radar". After the announcement Ms Collins told the WA Country Hour the industry had been fully informed ahead of the visit. "We've now engaged with over 300 people in 16 workshops to map out the best way forward for the Western Australian sheep industry," she said. Ms Collins said the package highlighted the government's commitment to farmers affected by the ban. "This package has always been about ensuring there is a sheep industry in Western Australia," she said. "We think $139.7 million is significant and we have a transition advocate who will continue to play a role on the implementation to make sure this money goes to where it needs." WAFarmers chief executive Trevor Whittington said Ms Collins had "taken the lead from the prime minister" in "running scared from dealing with 'difficult people". He said WAFarmers had not been made aware of the minister's announcement, but decided to drive to the saleyards uninvited to hear the details first-hand. "There was no detail today — we got more out of that leaked document," Mr Whittington said. "This is a failed roll out, it's going to be a failed transition — it would have been nice to get an invitation." Livestock and Rural Transport Association executive officer Jan Cooper said she found out about the visit early on Tuesday morning and that the organisations suggestions for the transition had been ignored. "The department said this morning they would be prepared to talk further about our ideas," she said. But the WA Shearing Industry Association welcomed elements of the plan. "This is not a position we wanted to be in, but it's where we are," President Darren Spencer said. "If we can't keep our shearing teams employed then we will lose a lot of people out of our industry and our local towns — no-one wants that. "The answer we settled on was by them having other work that aligns around the shearing seasons." Details are still being finalised, but the $2.2m provided for shearers is expected to allow them to get trained in other high-demand agricultural skills. Katanning Shire President Kristy D'Aprile said the council had been working with the community to work out how best to work through the transition. The shire is home to the largest undercover sheep saleyards in the southern hemisphere. "We have land behind our saleyards, we are thinking outside the box and looking for every opportunity that we can," Ms D'Aprile said. "There has been suggestion around maybe a feedlot and how we can further develop some opportunity between growers and processors." She had already noticed a "rapid change" in Katanning as producers moved away from sheep. "This is happening a lot quicker than anticipated, so we just need to know how to support our farmers going forward," Ms D'Aprile said.

AU Financial Review
11 hours ago
- AU Financial Review
Hedge fund Totus Capital hit by Santos short and CBA rally
It's been a tough year for hedge fund manager Totus Capital after missing out on the rally in ASX blue chips like Commonwealth Bank and Wesfarmers and then being caught on the wrong side of a surging Santos share price. In the Sydney-based short seller's latest update to investors, portfolio manager Ben McGarry said not owning index heavyweights including Telstra – which has accounted for most of the ASX's rally this year – had hit performance.


The Advertiser
13 hours ago
- The Advertiser
Direct route for scammers as Qantas hack scale revealed
Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data.