logo
New online safety rules spark angry backlash from campaigners who say they will put children and danger and have put the profits of Big Tech firms first

New online safety rules spark angry backlash from campaigners who say they will put children and danger and have put the profits of Big Tech firms first

Daily Mail​24-04-2025

New online safety rules put the profits of Big Tech firms ahead of children's safety, campaigners warned last night.
In an angry backlash, parents and the Children's Commissioner said Ofcom 's long-awaited rules did not go far enough.
The communications regulator insisted that young people would have 'safer online lives' under its final proposals to tackle legal but harmful content on websites, social media and apps.
Ofcom said it had the power to fine technology firms up to £18 million or 10 per cent of their global revenue and can even seek court orders banning access to sites in the UK if they breach their duties under the landmark Online Safety Act.
But children's safety campaigners said the codes of practice will not keep children safe from highly addictive apps and accused the watchdog of letting Big Tech firms off lightly.
In a stinging rebuke, Children's Commissioner for England Dame Rachel de Souza said: 'I made it very clear last year that its proposals were not strong enough to protect children from the multitude of harms they are exposed to online every day.
'I am disappointed to see this code has not been significantly strengthened and seems to prioritise the business interests of technology companies over children's safety.
'I urge Ofcom to ensure online protections mirror what children have told me they want to see. I will be urgently expressing my concerns about the code with Ofcom.'
Ian Russell, father of Molly Russell, who took her own life aged 14 after viewing harmful content online, added: 'I am dismayed by the lack of ambition in yesterday's codes. Instead of moving fast to fix things, the painful reality is that Ofcom's measures will fail to prevent more young deaths like my daughter's.
'Ofcom's risk-averse approach is a bitter pill for bereaved parents to swallow. Their overly cautious codes put the bottom line of reckless tech companies ahead of tackling preventable harm.'
He told Times Radio he had 'pretty much lost trust' with Technology Secretary Peter Kyle, who was last month accused of cosying up to Big Tech chiefs on a trip to California.
Mr Kyle yesterday championed the new rules as a 'watershed moment'. He said US tech firms 'must adhere to British laws' if they are to operate in the UK, before saying he had 'had the pleasure of visiting these companies' in their Silicon Valley bases.
The Technology Secretary has been accused of being too close to the tech industry as Britain's creative industry fights Labour plans to give AI developers a copyright exemption on their works.
It came as a group of British parents who believe social media played a part in the deaths of their children travelled to the US to demand better online safety protections.
Four families flew to New York yesterday to protest with hundreds of others from the US and Canada outside the Manhattan offices of Meta – owner of Facebook and Instagram.
'All we're asking for is can you please help us protect our children,' said Mark Kenevan, father of Isaac who died aged 13 after taking part in a social media challenge.
Children's Commissioner for England Dame Rachel de Souza said: 'I made it very clear last year that its proposals were not strong enough to protect children from the multitude of harms they are exposed to online every day
Under Ofcom's new laws, companies will have to change the powerful algorithms that recommend videos – including pornography and material promoting suicide or eating disorders – to stop smartphone and computer users being sent down a rabbit hole of dangerous content.
They will also have to introduce 'highly effective' checks to block under-18s accessing age-restricted sites and make it easier for children to control what they see and make complaints, in more than 40 measures that must be in place by July.
The NSPCC said private messaging apps such as WhatsApp, where 'unmoderated content can spread like wildfire', continue to pose a 'major risk' under the current plans. And there are growing fears that the rules, which will have a major impact on those based in Silicon Valley, may be watered down still further as ministers desperately seek a US trade deal with Donald Trump.
Liberal Democrat science spokesman Victoria Collins said: 'It's unbelievable that ministers are reportedly considering watering down online safety provisions to secure a bargain-basement Trump trade deal. This would be an unforgivable mis-step by the Labour Government.'
Ofcom said: 'We don't recognise this characterisation of our rules which will be transformational in shaping a safer life online for children in the UK. Ofcom has been tasked with bringing about a safer generation of children online, and if companies fail to act they will face enforcement.'
A No 10 spokesman said: 'We will keep listening and will not hesitate to strengthen the law further to ensure the safety of our children and the British public.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

Scottish Sun

time43 minutes ago

  • Scottish Sun

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'

AP PHOTOS: David Beckham to be awarded a knighthood by King Charles
AP PHOTOS: David Beckham to be awarded a knighthood by King Charles

The Independent

timean hour ago

  • The Independent

AP PHOTOS: David Beckham to be awarded a knighthood by King Charles

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging. At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story. The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it. Your support makes all the difference.

Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group
Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group

Scottish Sun

timean hour ago

  • Scottish Sun

Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group

Art dealer raked in £140,000 from his crimes PRICE TO PAY Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group A BARGAIN Hunt star has been jailed for a terror offence after flogging artwork to the backer of a barbaric militant group. Ochuko Ojiri - real name Oghenochuko Ojiri - was held following an investigation into terrorist financing. Advertisement 8 Ochuko Ojiri sold artwork to a Hezbollah backer Credit: Jon Bond 8 The star is known for his work on Bargain Hunt Credit: BBC 8 He was sentenced today He was the first person to be charged with a specific offence under section 21A of the Terrorism Act 2000. Ojiri has now been jailed for two-and-a-half years after pleading guilty to eight counts of failing to make a disclosure during the course of business within the regulated sector. The TV star, who has also appeared on Antiques Road Trip, faced a maximum five years in prison for the offences, which took place between October 2020 to December 2021. Ojiri sold artwork to Nazem Ahmad, a man designated by US authorities as a "major financial donor" for militant group Hezbollah. Advertisement Prosecutors in America believe Ahmad used high-value art and diamonds to launder money and fund the organisation. At the time, Ojiri knew Ahmad had been sanctioned in the US and read news articles about him. Lyndon Harris, prosecuting, said previously: "There is one discussion where Mr Ojiri is party to a conversation where it is apparent a lot of people have known for years about his terrorism links." Mr Harris said that Ojiri "dealt with Mr Ahmad directly, negotiated the sales of artwork and congratulated him on those sales". Advertisement The total value of the artwork sold was around £140,000, with the art sent to Dubai, the UAE, or Beirut. Receipts released by the Met Police show the art included paintings by Charlie Roberts, Mónika Kárándi and an £8,500 piece by British artist Nigel Howlett. Ojiri also flogged a £12,000 bronze sculpture by the same artist, as well as four pieces by Max Rumbol totalling £15,700. One painting - Patty in Blue by Baldur Helgason - was sold to Ahmad for £20,000. Advertisement 8 Invoices showed a number of deals Ojiri made 8 He flogged a number of Max Rumbol pieces for more than £15,000 8 Ojiri made £140,000 in total from his crimes The court heard new money laundering regulations in January 2020 brought the art market under HMRC supervision. Advertisement Ojiri is said to have discussed the changes with a colleague - indicating awareness of the rules. His charge came following an investigation into terrorist financing by officers from the National Terrorist Financial Investigation Unit (NTFIU), part of the Met's Counter Terrorism Command. The Treasury, HMRC and the Met's Arts & Antiques Unit were all also involved in the probe. Police raided two UK warehouses to seize a number of artwork from Ahmad in May 2023. Advertisement Among the pieces, which were not sold by Ojiri, were two Andy Warhol paintings and a Picasso painting. In total, the Met seized £1million in art, which was sold so the funds can be reinvested back to the police, CPS and Home Office. Ojiri was previously the owner of an art gallery called Pelicans and Parrots that was dubbed "the coolest place in London". He sold a curated selection of contemporary furniture, houseware, and gifts until the store closed in 2021. Advertisement The antiques expert first appeared on screens on BBC show Put Your Money Where Your Mouth Is. He then became a regular on popular daytime show Bargain Hunt, where he lends his expert advice to budding antique buyers. Ojiri has also appeared on Antiques Road Show - travelling across the country as he attempts to make a profit on forgotten items. Commander Dominic Murphy, head of the Met's Counter Terrorism Command, said: 'This case is a great example of the work done by detectives in the National Terrorist Financial Investigation Unit (NTFIU), based in the Met's Counter Terrorism Command. Advertisement 'The prosecution, using specific Terrorism Act legislation is the first of its kind, and should act as a warning to all art dealers that we can, and will, prosecute those who knowingly do business with people identified as funders of terrorist groups. 'Oghenochuko Ojiri wilfully obscured the fact he knew he was selling artwork to Nazem Ahmad, someone who has been sanctioned by the UK and US Treasury and described as a funder of the proscribed terrorist group Hizballah. 'Financial investigation is a crucial part of the counter terrorism effort. A team of specialist investigators, analysts and researchers in the NTFIU work all year round to prevent money from reaching the hands of terrorists or being used to fund terrorist attacks.' 8 Ojiri started his career as an art dealer Advertisement

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store