UK Relents on Demand for Access to Apple User Data, Reports Spy Chief

The UK government has dismissed claims made by Donald Trump’s intelligence chief, Tulsi Gabbard, that Apple permits law enforcement to “backdoor” access to U.S. customer data.

Gabbard shared her assertion on X, following months of tension involving Apple, the UK government, and the U.S. presidency. Trump accused the UK of acting like China and warned Prime Minister Kiel Starmer, “You can’t do this.”

Neither the Home Office nor Apple has commented on the supposed agreement. Gabbard stated that this indicates the UK does not mandate Apple to provide access to secured, encrypted information related to American citizens, thus preventing backdoors that infringe on civil liberties.

The international dispute intensified when the Department of the Interior issued a “Technical Capacity Notice” to Apple under its statutory authority. Apple responded by initiating a legal challenge, but the Home Office insisted on confidentiality, although the instructed judge’s decision was later made public.

U.S. Vice President JD Vance remarked, “American citizens don’t want to be spied on.” He added that “we’re creating backdoors in our own tech networks that our adversaries are already exploiting,” labeling the situation as “crazy.”

Civil liberties advocates cautioned that backdoors could pose risks to politicians, activists, and minority groups.

In February, Apple retracted an option to enable advanced data protection features, prompting new UK customers to express their “deep disappointment” and declare they would never create a backdoor for their products. Consequently, many UK users remain vulnerable to data breaches and lack access to end-to-end encryption for services like iCloud drives, photos, notes, and reminders.

Gabbard noted, “In recent months, we have collaborated closely with our UK partners and President Trump to safeguard private data belonging to Americans and uphold constitutional rights and civil liberties.”

It’s uncertain if the notification requiring data access will be entirely retracted or modified. Theoretically, it may be restricted to allowing data access solely for UK citizens, but experts caution that this may be technically unfeasible. Additionally, there remains a risk that foreign governments could exploit any established backdoor.

Quick Guide

Please contact us about this story

show

The best public interest journalism depends on direct accounts from informed individuals.

If you have relevant information, please reach out to us confidentially using the following methods:

Secure Messaging in Guardian App

The Guardian app has a feature for sending story tips. Messages are encrypted end-to-end and are camouflaged within normal activities of the Guardian mobile app, preventing any observer from knowing that you are in communication with us.

If you haven’t already, download the Guardian app (iOS/Android) and select ‘Secure Messaging’ from the menu.

SecureDrop, Instant Messenger, Email, Phone, and Mail

If you can safely utilize the TOR network without being observed, you can send us messages and documents through our <a href=\"https://www.theguardian.com/securedrop\">SecureDrop platform</a>.

Lastly, our guide at <a href=\"https://www.theguardian.com/tips\">theguardian.com/tips</a> lists various secure contact methods, including the pros and cons of each.

Illustration: Guardian Design / Rich Cousins

Thank you for your feedback.


It remains unclear whether Apple will regain access to the highest level of data protection for new UK customers.

The Home Office declined to confirm Gabbard’s statements, stating that it “does not comment on operational matters, including whether such notices exist.” They emphasized their long-standing joint security and intelligence agreement with the United States aimed at addressing the most serious threats, including terrorism and child sexual abuse, which involves the role of advanced technologies in exacerbating these issues.

“These agreements have consistently included safeguards to uphold privacy and sovereignty. For example, Data Access Agreements incorporate crucial protections to prevent the UK and the US from targeting each other’s citizens’ data. We are committed to enhancing these frameworks while maintaining a robust security structure that can effectively combat terrorism and ensure safety in the UK,” they added.

The UK Data Access Agreement permits UK agencies to directly request telecommunications content from service providers, including U.S. social media platforms and messaging services, but solely for the investigation, prevention, detection, and prosecution of serious crimes.

Apple was contacted for a statement.

Source: www.theguardian.com

Spy Ships, Cyber Attacks, and the Shadow Fleet: Global Security Teams Respond to Maritime Threats

Scenario crafted in Hollywood now reflects a genuine threat: the potential for hackers to seize control of vessels remotely and instigate crashes. Yet, in the security operations hub in Oslo, maritime cyber specialists situated mere meters from the luminous fjords and their tourist boats, floating saunas, and wet bathers assert that such occurrences are not only feasible, but imminent.

“We’re certain this will eventually happen, hence our vigilance,” states Øystein Brekke-Sanderud, Senior Analyst at the Nordic Maritime Cyber Resilience Centre (Norma Cyber). Behind him, a dynamic map displays the fleet they monitor, accompanied by a screen brimming with graphs and codes. Two small rubber ducks observe the passing minutes.

In an unstable global landscape, transportation networks, ports, and terminals have garnered heightened strategic significance as potential targets for infrastructure disruption and espionage—especially pertinent in Scandinavian nations that share maritime boundaries with Russia.

Finland and Sweden are NATO members now, with all countries enhancing their defensive postures amid escalating concerns over hybrid threats and warfare.




A digital map that tracks ship locations globally via Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

As ships become increasingly digitalized, the opportunities for cyber breaches expand, indicating an urgent need to mitigate the complexities of AI tools and intricate systems.




Oslo Harbor serves as the command center where maritime cyber specialists assess global ship threats. Photo: Carl Hendon/Getty Images

“These vessel systems are incredibly intricate, making them tough to manipulate. However, AI accelerates everything,” explains Brekke-Sanderud. “How does this part function? Can I locate a password amidst this dense manual?”

Stationed at the Norwegian Shipowner Association’s headquarters along the quay of the Norwegian capital, Norma Cyber collaborates with the Norwegian Shipowner’s Risk Insurance Association (DNK).

Two years ago, these organizations united to create a Maritime Security and Resilience Centre, which surveys global threats ranging from warfare and terrorism to intellectual property violations—both physical and digital. They also conduct this work on behalf of the Norwegian government.




Norma Cyber Staff, featuring Managing Director Lars Benjamin Vold, Analyst Øystein Brekke-Sanderud, and Chief Technology Officer Øyvind Berget. Photo: Sara Aarøen Lien/The Guardian

While it is technically feasible to crash a vessel from afar, hackers aiming to sow chaos don’t necessarily need such extreme measures. According to Norma Cyber Managing Director Lars Benjamin Vold, merely halting the vessel’s operations could result in significant system failures.

Emerging evidence suggests that nations may exploit these vulnerabilities against maritime adversaries.




Oil tanker discharging ballast water is one of the vulnerabilities targeted in cyber attacks. Photo: Island Stock/Aramie

Reports indicate that Iran is investigating methods to deploy cyber assaults to disrupt ballast systems—a threat to both ships and satellite networks. An unprecedented hack occurred in April, targeting 116 Iranian VSAT modems used for satellite communications across vessels.

“When discussing nation-states, it is about their willingness to act,” Vold states. Potential “threat actors” such as Russia and China possess substantial capabilities, though these depend on their strategic objectives, which may shift rapidly.

Consequently, while threat levels remain relatively stable, maritime vulnerabilities are on the rise. “The avenues for potential exploitation are multiplying as the sector grows more digital,” Vold remarks.

Norma Cyber has also pinpointed civilian vessels, including fishing boats, research ships, and cargo carriers, used for espionage within the Baltic, North Atlantic, and Arctic regions. China-linked threat actors are reportedly using USB devices to infiltrate maritime systems, such as those from Mustang Panda.

Last year, Norma Cyber documented 239 significant cyber attacks within the maritime sector, attributing the majority to the pro-Russian group NonAME057 (16).

Skip past newsletter promotions



Svein Ringbakken, managing director of DNK’s Oslo office. Photo: Sara Aarøen Lien/The Guardian

Curiously, the rising dependence on digital technology creates a greater demand for traditional navigation skills. Following disruptions to the Baltic satellite navigation system, Finland accused Russia of being the instigator. “An experienced sailor serves as the best protection,” Vold asserts.

Yet, alongside the unseen threats of the digital realm, the maritime industry grapples with unprecedented physical challenges. Vladimir Putin’s shadow fleet, comprised of hundreds of unregulated vessels, poses a growing risk to environmental safety and the global shipping framework as it transports sanctioned crude oil primarily to China and India.

This Shadow Fleet consists of aging oil tankers obscuring their identities to evade Western sanctions. Estimates of its size range between 600 to 900 vessels according to various sources.




Finnish authorities scrutinized the Russian Shadow Fleet Oil Tanker Eagle in December 2024 due to suspected interference with power cables. Photo: Finland Border Guard/AFP/Getty

Internal threats to ships can also arise from within. Engines, elevators, and water purification systems are all vulnerable targets on board vessels. Moreover, 15% of the global crew consist of either Ukrainian or Russian members. The composition of both crews has taken on new significance since the onset of Russia’s invasion of Ukraine.

“The presence of a Russian captain on a ship delivering aid to Ukraine certainly raises concerns,” says Svein Ringbakken, managing director of DNK. “These are sensitive issues that the industry is currently addressing.”




Rhine Falkenberg Orstad, an advisor to the Norwegian Shipowner Association and an expert on the Russian Shadow Fleet. Photo: Sara Aarøen Lien/The Guardian

Rhine Falkenberg Orstad expresses concern that the increasing presence of the Shadow Fleet could foster a “parallel fleet” comprised of crew members uninformed about the intentions at sea.

If one of these vessels experiences an environmental mishap, it poses a risk to Norway’s coastline, she warns. Some ships noted as sanctioned by the US remain operational, with many being at least 15 years old. “Our apprehension is that the situation is deteriorating.”


Another significant query remains: has the entire situation permanently shifted?

“Is the shadow fleet operating outside of Western jurisdiction a new norm? Or can this trend be reversed?” Ollestad ponders. “The answer remains elusive.”




The rubber ducks maintain a vigilant watch over the security operations room at Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

Source: www.theguardian.com

Monster Hunter Wiles: Unveiling a New World Through Nature Documentary, Pet Lizards, and Spy Players

m
A favorite thing about Monster Hunter is that despite its name, it often feels more like a prey than a predator. Armed with swords several times with your own size and weight, you often go beyond time to become an incredible creature in this action game. The weather will often beat you at Monster Hunter Wild next week. As storm clouds gather, the daily hunt of relatively unthreatened creatures brings you a scary lightning dragon that will eat you for breakfast. The monsters intertwined with each other, tearing them with their teeth and claws as they turn their tails towards the hill.

Over the past few weekends, players have practiced Wilds in the Beta Test, trying out exquisite character creators and several hunts against the scary lions (doshaguma) and overgrown poisonous chickens (gypseros). As someone old enough to play these games on the PlayStation 2, I’ve been distorted uncomfortably with my fingers with my fingers as the PlayStation appeared in portable during the overseas grades of Japan. Ta. What was once a hard, dense game that hid all the thrills behind the barricades of a Mushroom Rally Quest, is now fluid, charming and globally popular. The 2018 entry, Monster Hunter World, broke Capcom records, reaching sales of 203 million people.

Skip past newsletter promotions

Ryozo Tsujimoto, the series producer and son of Capcom founder Kenzo Tsujimoto, has been with Monster Hunter since the early 00s, when Capcom’s online gaming designer. Obviously it still excites him. He is in front and center of many Wild promotions. “It’s really good to see our team play so many people playing games at the same time,” he told me at a recent Tokyo Game Show. “There are many things we can discover by watching players pick up and try out the game. It’s something we don’t see in our own tests. So we can see how players are responding. And we have some masks of the developer team at the booth.”

The main innovation in Wild is how monsters interact with each other. Previously, herbivores were Potter about herd grazing, but only the addition of the current generation consoles has been able to create a seamless ecosystem where teams meet each other and get caught up in the war on the grass. “To have the creatures travel together realistically is challenging in terms of making it look plausible,” says Wiles manager Yuya Tokuda. “If they all moved perfectly in sync, it would be a bit creepy and unconvincing as animal behavior in the pack. But if each monster was a complete wildcard like before, then it would be. It would be unacceptable to keep everything together. While each creature has personality, hitting the balance between herd and puck actions is a lot of work, and we do nothing I had to make sure not to do that.”
www.theguardian.com

Canada’s spy agency alleges that India is using cyber technology to monitor Sikh separatists

Canada’s spy agency claims that India is using cyber technology to monitor separatists abroad, following accusations from the Indian government that senior Indian officials authorized violent acts, including the killing of a Sikh activist in Vancouver.

The Canada Communications Security Establishment (CSE) reported that India is utilizing cyber capabilities to surveil activists and dissidents living overseas, including increasing cyberattacks on Canadian government networks.

Canada is home to a large Sikh community outside of India, which includes advocates for an independent Sikh nation.

Ottawa is currently investigating the case of Hardeep Singh Nijjar, a Canadian citizen and prominent campaigner for Khalistan, a separatist movement seeking independence for Sikhs in India’s Punjab province. The murder of Nijjar in Vancouver in 2023 is believed to have been orchestrated by India.

CSE Commissioner Caroline Xavier stated, “India poses a growing cyber threat to Canada,” during a press conference.

The report attributes the strain in Canada-India relations to India’s surveillance activities and cyberattacks.

Following Canada’s accusations, a pro-Indian hacktivist group launched DDoS attacks on Canadian websites, disrupting their operations.

Officials revealed that Canada was monitoring a campaign targeting Khalistani activists, linking it to senior Indian government officials, including Home Affairs Minister Amit Shah.

Canadian Prime Minister Scott Morrison confirmed Shah’s involvement in intelligence gathering and violent attacks, including Nijjar’s murder in 2023.

Prime Minister Justin Trudeau and the national police suspect India’s involvement in the killing and other forms of intimidation against Khalistani activists.

India denied the allegations, leading to the expulsion of ambassadors and diplomats between Delhi and Ottawa.

Four Indian nationals have been arrested in connection with Nijjar’s murder.

Source: www.theguardian.com

Top 7 Spy Toys and Gear for Kids in 2024

If your child is fascinated with spies, you’re in luck – there are many spy toy sets available. A love for secret agents indicates that your child is inquisitive and starting to show interest in exploration and technology. There are various toy sets on the market that can aid in developing these skills while providing entertainment and nurturing imagination.

Here are some recommended spy toys for curious kids.

The best spy toys and gear for inquisitive kids

KidzLabs Spy Science Secret Message Kit

This comprehensive toy kit from 4M is packed with everything needed to send secret messages. Kids can hone their spy skills with various items included, such as an invisible message writer, a Morse code torch, and materials to create a 20-page spy journal.

The kit also includes a developer, stick code, and message capsule for discovering secret messages, while the cipher wheel and secret code library aid in learning essential skills. A Super Spy ID card is also part of the package for kids to enjoy. It’s an interactive and educational way for kids to engage in a new interest.

Long Range LCD Screen Walkie Talkie

No spy kit is complete without communication devices. Walkie-talkies are ideal for accompanying your child on their adventures. They allow you to stay connected as they uncover secrets and even role-play a spy headquarters.

Toy Zee walkie talkies are designed with kids in mind, featuring a simple and lightweight design suitable for little hands. With a VOX feature for hands-free calling, these walkie talkies have 9 main channels for private communication, reducing the risk of eavesdropping by others on the same channel.

Thames & Cosmos Master Detective Toolkit

BrightMinds kids’ toys aim to make learning fun and accessible, and this kit from Thames & Kosmos introduces children to science and lab work. The detective toolkit includes tools and documentation for learning about crime scene investigation and analyzing evidence like fingerprints, footprints, and tire tracks.

SpyX MicroSpy Gear Set

This spy gear kit encourages kids to explore their surroundings. It includes a utility belt with 4 micro tools – a spy light, invisible ink pen, motion alarm, and micro listener – to elevate kids’ imaginations. Prepare to venture into the outside world with your child using their new gear.

LOGIBLOCS Secret Recorder Kit

The Secret Recorder kit from LOGIBLOCS helps children explore while developing STEM skills. This gadget allows kids to build 7 innovative systems, featuring a voice recorder, message box, light sensor, Morse code, and more to kickstart their tech projects.

A to Z 9300 Spy Set

This A to Z secret mission set brings kids as close as possible to being real-life spies. They can observe their family using spy glasses, binoculars, and periscopes while sending secret messages using a special transmitter. Suitable for children aged 5 and above.

Kasachoy Night Vision Goggles

These spy goggles feature two pop-out LED lights, allowing kids to see in the dark up to 25 feet away. The battery-powered lights emit a cool blue glow, providing a realistic night vision experience and igniting your child’s imagination.

Check availability Amazon.

Squirrel_text_13075207

Read on to discover more about the best night vision goggles and binoculars.

read more:

Source: www.sciencefocus.com