logo
Leaked document shows boat slashing failed to stop migrants reaching UK

Leaked document shows boat slashing failed to stop migrants reaching UK

The Guardian20-07-2025
New concerns about the safety and viability of the flagship UK-French policy to intercept migrant dinghies at sea have emerged after a coastguard log leaked to the Guardian revealed a recent boat-slashing incident that failed to stop people reaching the UK.
Despite the government's pledge to stop overcrowded dinghies crossing the Channel, the number of people arriving in the UK on small boats this year has increased by about 50% compared with the same period last year, with more than 21,000 crossing so far in 2025.
The prime minister, Keir Starmer, and the French president, Emmanuel Macron, announced a 'one in, one out' deal at their recent meeting under which one person would be allowed to travel legally to the UK to claim asylum in exchange for another who arrived irregularly being returned to France.
A second part of the deal is the interception of overcrowded dinghies up to 300 metres out to sea. The practice has been happening since at least 2022, according to an investigation last year by Lighthouse Reports, Le Monde, the Observer and Der Spiegel.
The incident, revealed to the Guardian in a log known as a situation report or Sitrep from the Gris-Nez maritime rescue coordination centre, happened overnight on 9/10 July just hours before the Starmer-Macron announcement.
The home secretary, Yvette Cooper, said in media interviews last week that France was reviewing tactics that might produce change based on the principle of intervening in French waters and that it would take forward the conclusions of that review.
According to the log, the incident began at 11.21pm on the night of 9 July when the gendarmerie intervened in the departure of a dinghy from Cayeux-sur-Mer by puncturing it. Then they lost sight of the boat and at 11.22 the coastguard was asked to search with air and sea resources.
The coastguard identified the dinghy in the early hours of 10 July. Despite having been slashed it picked up more passengers along the coast and arrived in the UK with 55 passengers the same day after it was rescued by an RNLI lifeboat. Home Office data shows that 10 boats arrived that day carrying 573 passengers.
French coastguard sources said the incident was evidence that even when the gendarmarie had slashed a dinghy, if it remains afloat those on board would not be deterred from trying to reach the UK. It also highlights that the boat-slashing tactic requires extra sea rescue resources.
In an open letter to its director published in French media on 25 June from the French coastguard union, Solidaires Douannes, concerns were raised about 'increasing institutional mistreatment of people in exile' as part of stop-the-boats policies.
Separately it has emerged that the Brook House immigration removal centre near Gatwick Airport has been earmarked to detain people who arrive in small boats before their return to France. It is not known how the Home Office will select those for return, nor for how long they will be detained. Brook House was previously the subject of a public inquiry after damning undercover footage of mistreatment of detainees obtained by BBC's Panorama.
Sign up to First Edition
Our morning email breaks down the key stories of the day, telling you what's happening and why it matters
after newsletter promotion
The head of advocacy and public affairs at Care4Calais, Charlotte Khan, condemned the evidence contained in the coastguard log. 'We have become accustomed to police brutality being used against the refugee community in northern France over many years, but what we are witnessing just now is a rapid increase in this state-funded violence,' she said.
'Slashing boats in the water will put lives at risk, but as these disturbing logs show, it won't stop people making dangerous journeys to seek safety in the UK. Not when they have already fled war and persecution at home, and survived unimaginable dangers on their journey.
'The fact people are willing to risk their lives to seek safety in the UK in the first place should be enough evidence that so-called deterrents, regardless of how brutal they are, do not work. They only make people take ever more dangerous journeys. The only way to stop crossings is to offer safe routes to claim asylum.'
Home Office sources said the French government had not yet announced the outcome of their review, but that officials hoped maritime operational teams would soon be able to intervene to stop boats in the water.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Poll of the day: Should England's Euro 2025 win be marked with a bank holiday?
Poll of the day: Should England's Euro 2025 win be marked with a bank holiday?

The Independent

time17 minutes ago

  • The Independent

Poll of the day: Should England's Euro 2025 win be marked with a bank holiday?

The Lionesses' dramatic penalty shootout victory over Spain in the Euro 2025 final has sparked nationwide celebrations – and renewed calls for a bank holiday to celebrate the historic win. Prime Minister Sir Keir Starmer made a surprise appearance at the stadium in Basel alongside his wife Victoria, describing the Lionesses as 'history makers' after watching them defend their European title. Their victory has been hailed not just as a footballing triumph but also as a cultural milestone in the ongoing fight for equality and recognition in sport. Sir Keir previously backed calls for a 'proper day of celebration' when England reached the Euro 2022 final, saying the team's success should be honoured with a nationwide event to promote women's and girls' participation in football. Now, many are asking whether this latest win should spark the same conversation. The FA confirmed there will be an open-top bus parade along the Mall before the ceremony at the Queen Victoria Memorial. However, an official bank holiday has not been announced. So – should the Lionesses' Euro 2025 win be marked with a bank holiday, or are there better ways to honour their legacy? Vote in our poll and tell us what you think in the comments below.

Pershore missing mother and daughter found
Pershore missing mother and daughter found

BBC News

time18 minutes ago

  • BBC News

Pershore missing mother and daughter found

A mother and daughter who were missing from their home for nine days have been Mercia Police had appealed for help in finding Hannah Sheehan, 45, and Lydia Sheehan, 14, who were last seen in Pershore, Worcestershire, before disappearing on 18 search spread further afield as the pair had links to Redditch, Stratford, Leamington Spa and Wellesbourne in Warwickshire, with people urged to call they were "found safe and well" on Monday, the force confirmed. Officers thanked everyone who shared information about the police appeal. Follow BBC Hereford & Worcester on BBC Sounds, Facebook, X and Instagram.

Chinese hackers have seized control. How did we let this happen?
Chinese hackers have seized control. How did we let this happen?

Telegraph

time18 minutes ago

  • Telegraph

Chinese hackers have seized control. How did we let this happen?

A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can. An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. What it means is that no system connected to the internet can be defended. Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn't been bigger news is that we've become fatalistic and weary, as one cybersecurity attack follows another. So when we discovered in early July that Chinese hackers had gained control of Microsoft servers at hundreds of US government agencies – including the US nuclear weapons agency – it was just another hacking story. What made this one noteworthy was that there wasn't immediately a fix or a patch, Microsoft admitted last Tuesday. Incredibly, confirmation of the US military's 'assume breach' alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People. These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening. The latest phases, Salt Typhoon and now Volt Typhoon, are meticulous and sophisticated. They target not just government agencies like the National Guard, and China-critical MPs like Sir Iain Duncan Smith, but also private sector companies in the energy, telecoms, transport and water sectors. Ciaran Martin, former head of NCSC, the cybersecurity centre based at GCHQ, says that China's capabilities have been transformed. 'Now think of dozens or even hundreds of [individual] hacks at the same time – 'everything, everywhere, all at once' in the words of Jen Easterly, recently departed head of the US Cybersecurity and Infrastructure Security Agency.' Software attacks on our computer systems can create unique damage in ways that conventional warfare cannot. Let's consider two. While aerial bombing can produce spectacular instant results, targets can be disassembled prior to attack, and can be quickly rebuilt after the attack. Both happened with the recent attack on Iraq's nuclear facilities. But recovering from cyber attacks is much harder. Ask the British Library, which has still not restored all of its services. 'Printed catalogues and handlists are available in our Reading Rooms', it still advises visitors to its website. The attack took place in October 2023. A second way in which cyber attacks now present a unique challenge is the ability of Chinese hackers to 'live off the land' after they break through. Rather like special forces embedded behind enemy lines, hackers conceal themselves undetected for months or years. To the guardians of the network, they are just another innocent user. 'Both Salt and Volt Typhoon were in play for years before being detected,' writes Martin. 'And they are strategic compromises of the West on a scale hitherto unseen by any other cyber power.' Not only do we not know when the attack is over, we don't even know when it has begun. How did this happen? If I haven't depressed you enough, this is where it gets particularly troubling. Cybersecurity is a gnarly failure of accountability and regulation that spans decades of indifference, and implicates business complacency and government apathy. The internet protocols (IP) we use today are completely rotten. The great and the good of the IT and telecommunications industries spent the entire 1980s in international committees devising complex secure networking protocols, only to be met with mistrust and specifications no one really wanted. Fed up with waiting, we adopted today's protocols, which were cheap and simple to implement, but not secure. Now, the international standards bodies that might devise a successor to IP are dominated by China. When they fail, suppliers can hide behind licensing agreements and expensive lawyers. No one goes to prison for bad security design. Their customers – us – are guilty of negligence too. Salt Typhoon took advantage of a bug in Cisco routers that users had not bothered to fix for seven years. As a society, we rush to implement technologies without thinking too hard about externalities. Generative artificial intelligence (AI) opens up lots of new holes, and also lowers the bar so that even the technically unskilled can plant hacks. All in all, then, this may not seem a good time to force Britons to use a new government identity service. Especially when you know that 'red team' penetration testing proved in March that this could be penetrated by hostile foreign agents without them being detected. This is what Baroness Neville Jones calls 'a piece of critical infrastructure'. Chinese agents may already be 'living off the land' inside the One Login system, on which your government wallet has been built, and soon perhaps, your digital ID. But don't expect Peter Kyle, the Science and Technology Minister, to put the brakes on the One Login project when he's its biggest fan. To survive and prosper, we need serious and technically aware people in his position, who listen to the security professionals. Kyle appeared on Newsnight last week wearing jeans and a T-shirt and trainers, all of which were intended to signal to viewers his youthful love of digital technology. He is 54.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store