Tech Firms Collaborate with UK Child Safety Agency to Evaluate AI Tool for Generating Abuse Images

Under a new UK law, tech companies and child protection agencies will be granted the authority to test if artificial intelligence tools can create images of child abuse.

This announcement follows reports from a safety watchdog highlighting instances of child sexual abuse generated by AI. The number of cases surged from 199 in 2024 to 426 in 2025.

With these changes, the government will empower selected AI firms and child safety organizations to analyze AI models, including the tech behind chatbots like ChatGPT and image-generating devices such as Google’s Veo 3, to ensure measures are in place to prevent the creation of child sexual abuse images.

Kanishka Narayan, the Minister of State for AI and Online Safety, emphasized that this initiative is “ultimately to deter abuse before it happens,” stating, “Experts can now identify risks in AI models sooner, under stringent conditions.”

This alteration was made due to the illegality of creating and possessing CSAM. Consequently, AI developers and others will be prevented from producing such images during testing. Previously, authorities could only respond after AI-generated CSAM was uploaded online, but this law seeks to eliminate that issue by stopping the images from being generated at all.

The amendments are part of the Crime and Policing Bill, which also establishes a prohibition on the possession, creation, and distribution of AI models intended to generate child sexual abuse material.

During a recent visit to Childline’s London headquarters, Narayan listened to a simulated call featuring an AI-generated report of abuse, depicting a teenager seeking assistance after being blackmailed with a sexual deepfake of herself created with AI.

“Hearing about children receiving online threats provokes intense anger in me, and parents feel justified in their outrage,” he remarked.

The Internet Watch Foundation, which oversees CSAM online, reported that incidents of AI-generated abusive content have more than doubled this year. Reports of Category A material, the most severe type of abuse, increased from 2,621 images or videos to 3,086.

Girls are predominantly targeted, making up 94% of illegal AI images by 2025, with the portrayal of newborns to two-year-olds rising significantly from five in 2024 to 92 in 2025.

Kelly Smith, CEO of the Internet Watch Foundation, stated that these legal modifications could be “a crucial step in ensuring the safety of AI products before their launch.”

“AI tools enable survivors to be victimized again with just a few clicks, allowing criminals to create an unlimited supply of sophisticated, photorealistic child sexual abuse material,” she noted. “Such material commodifies the suffering of victims and increases risks for children, particularly girls, both online and offline.”

Childline also revealed insights from counseling sessions where AI was referenced. The concerns discussed included using AI to evaluate weight, body image, and appearance; chatbots discouraging children from confiding in safe adults about abuse; online harassment with AI-generated content; and blackmail involving AI-created images.

From April to September this year, Childline reported 367 counseling sessions where AI, chatbots, and related topics were mentioned, a fourfold increase compared to the same period last year. Half of these references in the 2025 sessions pertained to mental health and wellness, including the use of chatbots for support and AI therapy applications.

Source: www.theguardian.com

AI Firm Secures High Court Victory in Copyright Dispute with Photo Agency

An artificial intelligence company based in London has achieved a significant victory in a High Court case that scrutinized the legality of an AI model using extensive copyrighted data without authorization.

Stability AI, led by Oscar-winning Avatar director James Cameron, successfully defended itself against allegations from Getty Images, claiming that it infringed on the international photography agency’s copyright.

This ruling is seen as a setback for copyright holders’ exclusive rights to benefit from their creations. Rebecca Newman, a legal director at Addleshaw Goddard, cautioned that it suggests “the UK derivative copyright system is inadequate to protect creators”.

There was evidence indicating that Getty Images were utilized in training Stability’s model, which enables users to generate images via text prompts. In certain instances, Stability was also found to violate Getty’s trademarks.

Judge Joanna Smith remarked that determining the balance between the interests of the creative industries and AI sectors holds “real social significance.” However, she could only address relatively limited claims as Getty had to withdraw parts of its case during the trial this summer.

Getty Images initiated legal action against Stability AI for violations of its intellectual property rights, claiming the AI company scraped and replicated millions of images with “complete indifference to the content of the training data.”


This ruling comes amid ongoing debates about how the Labour government should legislate on copyright and AI matters, with artists and authors like Elton John, Kate Bush, Dua Lipa, and Kazuo Ishiguro advocating for protections. In contrast, tech firms are seeking broader access to copyrighted material to develop more powerful generative AI systems.

The government is conducting a consultation regarding copyright and AI, stating: “The uncertainty surrounding the copyright framework is hindering the growth of both the AI and creative sectors. This situation must not persist.”

Lawyers at Mishcon de Reya, pursuing this matter, are contemplating introducing a “text and data mining exception” to the UK copyright law, which would enable copyrighted works to be utilized for training AI models unless rights holders opt-out.

Due to a lack of evidence indicating that the training took place in the UK, Getty was compelled to retract its original copyright claim. Nevertheless, the company proceeded with its lawsuit, asserting that Stability continues to use copies of visual assets, which it describes as the “lifeblood” of its business. The lawsuit alleges trademark infringement and “spoofing,” as some generated images bore Getty’s watermark.

Highlighting the complexities of AI copyright litigation, the group essentially argued that Stability’s image generation model, known as Stable Diffusion, constitutes an infringing copy, as its creation would represent copyright infringement if produced in the UK.

The judge determined that “AI models like Stable Diffusion that do not (and never have) stored or reproduced copyrighted works are not ‘infringing copies.'” She declined to adjudicate on the misrepresentation claims but ruled in favor of some of Getty’s trademark infringement claims regarding the watermark.

In a statement, Getty Images remarked: “We are profoundly worried that even well-resourced organizations like Getty Images face considerable challenges in safeguarding creative works due to the absence of transparency requirements. We have invested millions with one provider alone, but we must continue our pursuit elsewhere.”

“We urge governments, including the UK, to establish more robust transparency regulations. This is crucial to avoid expensive legal disputes and ensure creators can uphold their rights.”

Stability AI’s General Counsel, Christian Dowell, stated, “We are pleased with the court’s ruling on the remaining claims in this case. Although Getty’s decision to voluntarily withdraw most of the copyright claims at the trial’s conclusion left the court with only a fraction of the claims, this final decision addresses the core copyright issues. We appreciate the time and effort the court has dedicated to resolving the significant matters in this case.”

Source: www.theguardian.com

All-Star Collection: Games Developed in Partnership with Aphelion and the European Space Agency

WThe hat sets the tone for the game “Aphelion” by Don’t Nod, the French studio recognized for its engaging narrative-driven experiences. Dmitri Weideli, the executive producer, takes a moment to respond to the pivotal question and ultimately provides a rather expansive perspective. “We aim to craft a game that holds significance, offering players a rich storyline that allows them to experience a wide range of emotions,” he explains. “We strive to diversify our game types while still preserving our core essence.”

The concept of diversification certainly stands out. Since its inception in 2008, Don’t Nod has developed action-adventure games exploring memories, narrative-driven tales featuring magical students, and RPGs set in Georgia with vampires. Recently, the studio launched “Juzant,” an ecological sci-fi fable, which provides a refreshing and realistic approach to rock climbing.

Their latest project, “Aphelion,” shares at least some thematic similarities with “Juzant.” This new science fiction title portrays a journey to the fringe of the solar system, where an icy planet named Persephone is uncovered. Inevitably, the crew crash-lands, leading to a quest for exploration, survival, and stealth in this unforgiving environment.




A long journey from Juzant… Aphelion. Photo: Don’t Nod

The trailer showcases grappling hooks and climbable ice formations, which Weideli confirms are integral to the gameplay. The team involved in this project transitioned directly from another episodic supernatural game.

The focus of “Aphelion” differs from “Juzant,” with climbing being more straightforward. While it can still be quite technical, this time, it isn’t the primary focus. Several developers from the “Juzant” team have recently joined the “Aphelion” crew, bringing their expertise in rope physics and vertical level design along.

Cinematic influences for “Aphelion” predominantly stem from films like “Interstellar,” “The Martian,” “Ad Astra,” and “Arrival.” “We sought to create a compelling, story-driven game,” Weideli notes. “Yet we wanted to explore a different genre, guiding us towards a more action-adventure format.”




Vertical level… Aphelion. Photo: Don’t Nod

Notably, the scientific aspect is deeply woven into “Aphelion.” The planet Persephone draws inspiration from the hypothetical Planet Nine, a large celestial body theorized to exist far beyond Neptune.

However, Planet Nine serves merely as a springboard for the narrative. “It was a critical source of inspiration,” Weideli adds, “but we infused our own lore, creativity, and most importantly, human drama.”

“Aphelion” is in collaboration with the European Space Agency. “The ESA team provided access to space experts and scientists who contributed ideas and challenged our narrative concepts,” Weideli explains. “Our story team collaborates on scientific elements related to space and extraterrestrial missions, discussing terminology used by astronauts during operations.”

Nonetheless, the design team doesn’t adhere strictly to convention. In addition to exploration and survival, the game incorporates a vital stealth element. Weideli remains tight-lipped on specifics, but hints at a lurking presence within the ice of Persephone that is not entirely friendly.

Regardless of the threats it may unveil, it’s refreshing to see a commitment to crafting intricate, genre-blending video games amidst the chaos of recent industry setbacks. While many shift towards survival-focused narratives, it’s exhilarating to witness the team aspiring to reach for the stars.

“Aphelion” is set to launch on PC, PS5, and Xbox next year.

Source: www.theguardian.com

U.S. Nuclear Weapons Agency Among 400 Organizations Targeted by Chinese Hackers, Reports Microsoft

Microsoft has revealed that investigations are underway indicating that Chinese “threat actors,” including state-sponsored hackers, are taking advantage of security flaws in SharePoint’s document sharing servers, impacting numerous government agencies and organizations.

Eye Security, a Dutch cybersecurity firm, reported that hackers have compromised around 400 institutions, businesses, and other entities, stating, “We anticipate an increase as the investigation continues.”

The majority of the affected parties are located in the United States. Bloomberg noted that one of the victims was a US agency responsible for overseeing the National Nuclear Security Agency, which manages nuclear weapons. This agency was among those affected.

According to Microsoft, three groups have been identified utilizing Chinese state-backed techniques, with a focus on exploiting newly disclosed vulnerabilities in internet-facing servers hosting the platform.

This announcement coincides with reports from the financial sector that Amazon has halted artificial intelligence labs in Shanghai. Additionally, consultancy firm McKinsey reported that Chinese companies are withdrawing from AI-related projects as geopolitical tensions between Washington and Beijing escalate.

Recently, Microsoft and IBM have scaled back their research and development initiatives in China, with US officials intensifying scrutiny on American companies involved in AI within the country.

In a blog post, Microsoft stated that the vulnerability is associated with an on-premises SharePoint server commonly utilized by businesses, not a cloud-based service.

Numerous large organizations employ SharePoint as a platform for document storage and collaboration, integrating seamlessly with other Microsoft products like Office and Outlook.

Microsoft indicated that the attacks commenced as early as July 7th, with hackers attempting to leverage the vulnerability for “early access to the target organization.”

This vulnerability permits an attacker to spoof authentication credentials and remotely execute malicious code on the server. Microsoft observed an attack that sent requests to a SharePoint server, potentially “enabling the theft of key material.”

In response, Microsoft has released a security update and recommended that all users of on-premises SharePoint systems apply it. They cautioned that hacking groups are continuing to target these systems, which they rated as having “high confidence” in terms of vulnerability.

Skip past newsletter promotions

Eye Security reported in a press release that “anomalous activity” was detected on a client’s on-premises SharePoint Server on the evening of July 18th. They subsequently scanned over 8,000 publicly accessible SharePoint servers across the globe, discovering numerous compromised systems and confirming that attackers were executing a coordinated mass exploitation campaign.

Microsoft stated that the linen typhoon has been focused on “intellectual property theft” since 2012, with primary targets including government, defense, strategic planning, and human rights-related organizations.

Since 2015, the Violet Typhoon has predominantly targeted former government and military personnel, NGOs, think tanks, academia, digital and print media, and sectors related to finance and health in the US, Europe, and East Asia.

Microsoft mentioned a third group, Storm-2603, which is situated in China, though no direct connection has been established between this group and other Chinese threat actors. They warned that “additional actors” could exploit the vulnerability to target on-premises SharePoint systems unless security updates are installed.

Source: www.theguardian.com

Less than 1% of agency spending goes to federal health workers

Recently, Health Secretary Robert F. Kennedy Jr. made headlines by defending his decision to terminate thousands of employees in his department.

Last week, he announced plans to eliminate 10,000 jobs, in addition to the 10,000 positions cut during the early days of the Trump administration.

Kennedy referred to the Department of Health and Human Services as “the largest agency in the government, twice the size of the Pentagon, with a budget of $1.9 trillion.” News Nation. He suggested that the department does little to enhance the health of Americans.

Despite having a discretionary budget of around $850 billion, HHS spends more than the Department of Defense. However, experts argue that the majority of the HHS budget is not allocated to staff expenses.

According to three budget experts, a small fraction of the federal health agency budget goes towards officials’ salaries. This includes FDA staff, CDC, and NIH.

The majority of funds are spent on Medicare and Medicaid for elderly and low-income individuals, respectively. These funds support private insurance plans, hospitals, clinics, pharmaceutical companies, and more.

Melinda Bunting, a health policy professor, stated that HHS staff costs represent less than 1% of the department’s budget, despite overall spending increases.

Bobby Cogan, from the Center for Progress in America, criticized Kennedy’s depiction of HHS budgeting as “misleading.”

Kogan argued that the focus should be on the aging population, not misleading budget claims. HHS seeks to reduce federal spending by $1.8 billion annually through workforce cuts.

Another HHS institution, the administration for children and families, allocates billions to programs like Head Start and welfare support.

Christounner, from the Responsible Federal Budget Committee, estimated HHS staff costs to be less than 1% of spending, accounting for highly qualified health professionals.

While the Trump administration has focused on Medicare fraud, Congress is exploring potential fraud within Medicare Advantage Plans, involving hundreds of billions of dollars annually. Hundreds of Billions Annual dollars.

Source: www.nytimes.com

British Cybersecurity Agency Issues Warning About Quantum Hacker Threats In Relation to Cybercrime

By 2035, the UK cybersecurity agency is urging organizations to protect their systems from quantum hackers, as the prospects for a strong computing breakthrough threaten digital encryption.

The National Cyber Security Center (NCSC) has issued new guidance recommending large entities, including energy and transport providers, to introduce “post-Quantum encryption” to prevent quantum technology from infiltrating their systems.

NCSC warned that quantum computers, although still in development, pose a serious threat to encryption as they can solve complex mathematical problems that underpin public key cryptography. Quantum Computing’s ability to compute at incredible speeds is a major concern for encryption.

“Today’s encryption methods are used to protect everything from banking communication, but rely on mathematical problems that quantum computers could solve much faster, posing a threat to current encryption methods,” the agency stated.

NCSC recommends that large organizations, critical national infrastructure operators, and businesses with bespoke IT systems implement post-Quantum encryption to combat this threat.

Organizations must identify services that require upgrades by the 2028 deadline, undergo essential overhauls by 2031, and complete migration to a new cryptographic system by 2035 according to the guidance provided.

Skip past newsletter promotions

Traditional computers use bits to represent information as 0 or 1, but quantum computers can simultaneously encode various combinations of 1 and 0, enabling them to perform much larger calculations at incredible speeds.

However, qubits, the building blocks of quantum computing, are highly sensitive to interference such as temperature changes and cosmic rays, hindering the development of large quantum computers despite significant investments. NCSC hopes its guidance will give organizations ample preparation for the future arrival of quantum computers.

“There is now a new way to encrypt public keys, making it prudent to act now rather than wait for the threat to materialize,” said Alan Woodward, a cybersecurity professor at the University of Surrey.

Source: www.theguardian.com

Canada’s spy agency alleges that India is using cyber technology to monitor Sikh separatists

Canada’s spy agency claims that India is using cyber technology to monitor separatists abroad, following accusations from the Indian government that senior Indian officials authorized violent acts, including the killing of a Sikh activist in Vancouver.

The Canada Communications Security Establishment (CSE) reported that India is utilizing cyber capabilities to surveil activists and dissidents living overseas, including increasing cyberattacks on Canadian government networks.

Canada is home to a large Sikh community outside of India, which includes advocates for an independent Sikh nation.

Ottawa is currently investigating the case of Hardeep Singh Nijjar, a Canadian citizen and prominent campaigner for Khalistan, a separatist movement seeking independence for Sikhs in India’s Punjab province. The murder of Nijjar in Vancouver in 2023 is believed to have been orchestrated by India.

CSE Commissioner Caroline Xavier stated, “India poses a growing cyber threat to Canada,” during a press conference.

The report attributes the strain in Canada-India relations to India’s surveillance activities and cyberattacks.

Following Canada’s accusations, a pro-Indian hacktivist group launched DDoS attacks on Canadian websites, disrupting their operations.

Officials revealed that Canada was monitoring a campaign targeting Khalistani activists, linking it to senior Indian government officials, including Home Affairs Minister Amit Shah.

Canadian Prime Minister Scott Morrison confirmed Shah’s involvement in intelligence gathering and violent attacks, including Nijjar’s murder in 2023.

Prime Minister Justin Trudeau and the national police suspect India’s involvement in the killing and other forms of intimidation against Khalistani activists.

India denied the allegations, leading to the expulsion of ambassadors and diplomats between Delhi and Ottawa.

Four Indian nationals have been arrested in connection with Nijjar’s murder.

Source: www.theguardian.com

European Space Agency predicts a dramatic crash landing for satellite on Earth

A European satellite that is malfunctioning is expected to fall to Earth and plunge uncontrollably through the atmosphere on Wednesday.

The European Space Agency said that most of the dead satellite is anticipated to burn up in the atmosphere and any surviving debris is unlikely to cause harm. However, it is challenging to determine the exact time and location of the spacecraft’s fall.

According to the Latest blog posts, the space agency estimated that the re-entry time will be around 10:41 a.m. ET on Wednesday, which would take approximately two hours. Based on the satellite’s orbit, the spacecraft was expected to be somewhere off the coast of North America in the Pacific Ocean during that period.

The space agency explained that much of the uncertainty about the re-entry of satellites is due to the challenge of predicting atmospheric density. Changes in air density, influenced by solar activity, impact the drag experienced by objects passing through Earth’s atmosphere.

The space agency stated that although there is uncertainty about the re-entry point of the dead satellite, it is unlikely to pose a threat to populated areas.

“Most of the satellites will burn out, and the surviving debris will be scattered somewhat randomly over a ground orbit averaging hundreds of kilometers long and tens of kilometers wide (this is why the risks involved are so great). “The reason for this is low),” said an expert from the agency’s Space Debris Countermeasures Office. I wrote it in a blog post.

The spacecraft, known as European Remote Sensing 2 or ERS-2, was an Earth observation satellite that collected data about Earth’s oceans, polar caps, and surface. The space agency said the satellite, launched in April 1995, was also used to monitor severe floods, earthquakes and other natural disasters in remote areas of the world.

Source: www.nbcnews.com

Cybercrime: Credit Agency Warns of Growing Threat to UK Drinking Water from Hackers

Credit rating agency Moody's has warned that water companies face a “high” risk from cyber-attacks targeting drinking water as they await approval from industry regulators to increase spending on digital security.

Hackers are increasingly targeting infrastructure companies such as water and wastewater treatment companies, and the use of artificial intelligence (AI) could accelerate this trend, Moody's said in a note to investors.

Southern Water, which serves 4.6 million customers in the south of England, claimed last month that the Black Basta ransomware group had accessed its systems and posted a “limited amount” of data to the dark web. announced. The same group hacked outsourcing company Capita last year.

Separately, South Staffordshire Water I apologized In 2022, after hackers steal customers' personal data.

Moody's warned that the increasing use of data logging equipment and digital smart meters to monitor water consumption is making businesses more vulnerable to attacks. Systems used at water treatment facilities are typically separated from a company’s other IT departments, including customer databases, but some systems are more closely integrated to improve efficiency, he said.

After a hack, companies typically have to hire specialized cybersecurity firms to repair systems and communicate with customers, and they can also face penalties from regulators. The UK's Information Commissioner's Office can fine companies up to 4% of group turnover or €20m (£17m), whichever is higher.

Moody's said the cost of system remediation, including re-securing and strengthening existing cyber defenses and paying potential fines, would typically result in only a “modest increase” in debt levels if the incident is short-lived.

But Moody's warned that “the greater risk to our industry and society is if malicious actors were able to gain access to operational technology systems and harm drinking water or wastewater treatment facilities.”

The agency said water suppliers, governments and regulators need to strengthen their cyber defenses “as attacks against critical infrastructure become more sophisticated and state-aligned actors are now increasingly becoming cyber attackers.” He said he was aware of his gender.

More about the digital security of Britain's infrastructure assets, including the £50bn project to build vast underground nuclear waste repositories and the Sellafield nuclear facility in Cumbria, where the Guardian revealed a series of cybersecurity issues. There is widespread concern.

Moody's report comes as water companies in England and Wales hope to receive allowances from Ofwat to increase spending on cyber defense. The regulator is assessing plans to raise the bill from 2025 to 2030 to cover investments.

Ofwat's decision, to be announced later this year, comes at a critical juncture for an industry that has come under fire for sewage dumping, inadequate leak records and high executive pay.

Skip past newsletter promotions

In October last year, companies announced that they would be required to fund a record £96bn investment in fixing raw sewage leaks, reducing leaks and building reservoirs. submitted a five-year business plan detailing price increases.

Moody's analysis shows that businesses want to increase their total spending on security from less than £100m to nearly £700m over the next five years. Increased scrutiny of the industry and the hack into Southern Water could strengthen its case, the credit agency said.

The department said costs to South Staffordshire Water related to the hack could reach £10 million, including potential civil action.

Moody's warning about the potential impact on water companies’ debt comes amid growing concerns over leverage in the water sector, where up to 28% of bill payments are used for debt servicing in regions of England. .

Industry body Water UK announced last week that average annual bills have risen by 6% since April, outpacing the current rate of inflation.

Source: www.theguardian.com