Quotidien Hebdomadaire Mensuel

Quotidien Shaarli

Tous les liens d'un jour sur une page.

Aujourd'hui - September 26, 2025

Record fraud crackdown saves half a billion for public services
  • GOV.UK
    From:
    Cabinet Office, Public Sector Fraud Authority and Josh Simons MP
    Published
    24 September 2025

Government stops over £480 million ending up in the pockets of fraudsters over twelve months since April 2024 - more money than ever before.

Government stops over £480 million ending up in the pockets of fraudsters over twelve months since April 2024 - more money than ever before.
New technology and artificial intelligence turns the tide in the fight against public sector fraud, with new tech to prevent repeat of Covid loan fraud.
Over a third of the money saved relates to fraud committed by companies and people during the pandemic.
Crackdown means more funding for schools, hospitals and vital public services to deliver the Plan for Change.
Fraudsters have been stopped from stealing a record £480 million from the taxpayer in the government’s biggest ever fraud crackdown, meaning more money can be used to recruit nurses, teachers and police officers as part of the Plan for Change.

Over a third of the money saved (£186 million) comes from identifying and recovering fraud committed during the Covid-19 pandemic. Government efforts to date have blocked hundreds of thousands of companies with outstanding or potentially fraudulent Bounce Back Loans from dissolving before they would have to pay anything back. We have also clawed back millions of pounds from companies that took out Covid loans they were not entitled to, or took out multiple loans when only entitled to one.

This builds on successful convictions in recent months to crack down on opportunists who exploited the Bounce Back Loan Scheme for their own gain, including a woman who invented a company and then sent the loan money to Poland.

Alongside Covid fraud, the record savings reached in the year to April 2025 include clamping down on people unlawfully claiming single persons council tax discount and removing people from social housing waitlists who wanted to illegally sublet their discounted homes at the taxpayers’ expense.

Announcing the record figures at an anti-fraud Five Eyes summit in London, Cabinet Office Minister Josh Simons said:

Working people expect their taxes to go towards schools, hospitals, roads and the services they and their families use. That money going into the hands of fraudsters is a betrayal of their hard work and the system of paying your fair share. It has to stop.

That’s why this government has delivered the toughest ever crackdown on fraud, protecting almost half a billion pounds in under 12 months.

We’re using cutting-edge AI and data tools to stay one step ahead of fraudsters, making sure public funds are protected and used to deliver public services for those who need them most - not line the pockets of scammers and swindlers.

The savings have been driven by comparing different information the government holds to stop people falsely claiming benefits and discounts that they’re clearly not eligible for.

The high-tech push brought around £110m back to the exchequer more than the year before, and comes as the government pushes to save £45 billion by using tech to make the public sector more productive, saving money for the NHS and police forces to deliver the Plan for Change.

The Minister will also unveil a new AI fraud prevention tool that has been built by the government and will be used across all departments after successful tests.

The AI system scans new policies and procedures for weaknesses before they can be exploited, helping make new policies fraud-proof when they are drafting them. The tool could be essential in stopping fraudsters from taking advantage of government efforts to help people in need amid future emergencies.

It has been designed to prevent the scale of criminality seen through the Covid pandemic, where millions were lost to people falsely taking advantage of furlough, Covid Grants and Bounce Back Loans.

Results from early tests show it could save thousands of hours and help prevent millions in potential losses, slashing the time to identify fraud risks by 80% while preserving human oversight.

The UK will also licence the technology internationally, with Five Eyes partners at the summit considering adoption as part of strengthening global efforts to stop fraud and demonstrating Britain’s role at the forefront of innovation.

The summit will bring together key allies and showcase the government’s unprecedented use of artificial intelligence, data-matching and specialist investigators to target fraud across more than a thousand different schemes.

At the summit, Cabinet Office Minister Josh Simons will describe how the record crackdown has been achieved:

Over £68 million of wrongful pension payments were prevented across major public sector pension schemes, including the Local Government Pension Scheme, NHS Pension Scheme, Civil Service Pensions and Armed Forces pension schemes. These savings were achieved by identifying cases where pension payments continued after the individual had died, often with relatives continuing to claim benefits they were not entitled to.
More than 2,600 people were removed from housing waiting lists they weren’t entitled to be on, including individuals who were subletting or had multiple tenancies unlawfully.
Over 37,000 fraudulent single-person council tax discount claims were stopped, saving £36 million for local councils and taxpayers. These false claims, often made by individuals misrepresenting their household size to secure a 25% discount, were uncovered using advanced data-matching.
Today’s announcement follows extensive progress on fraud in the last 12 months, including the appointment of a Covid Counter-Fraud Commissioner, introduced the Public Authorities Fraud, Error and Recovery Bill, and boosted AI-driven detection, saving hundreds of millions and strengthening public sector fraud prevention – driven by the Public Sector Fraud Authority.

The majority of the £480 million saved is taxpayer money, with a portion from private sector partners, such as insurance and utilities companies, helping lower consumer costs and support UK business growth.

L’ANTS dément le piratage de 12 millions de données : on fait le point sur l’affaire

Les Numériques
Par
Juliette Sbranna
Publié le 22/09/25 à 19h45

Un fichier prétendument volé à l’ANTS circulerait sur le dark web. Entre rumeurs, échantillons douteux et annonces répétées, on fait le point sur cette affaire et sur ce qui est avéré.

L’ANTS dément le piratage de 12 millions de données : on fait le point sur l’affaire
3
Un fichier prétendument volé à l’ANTS circulerait sur le dark web. Entre rumeurs, échantillons douteux et annonces répétées, on fait le point sur cette affaire et sur ce qui est avéré.

L'ants aurait été volée de 12 millions de données, mais la rumeur serait fausse

Depuis ce week-end, des rumeurs concernant un vol de données de l’ANTS ont circulé. Sauf que ’affaire a pris une tournure inattendue lorsque l’agence a finalement démenti ces rumeurs, tout en laissant la porte ouverte à la possibilité de la perte de quelques informations. Voici un point sur cette situation.

Pour rappel l'Agence Nationale des Titres Sécurisés devenue France Titres, est l'organisme public créé par l’État, qui s’occupe de fabriquer et de délivrer les documents officiels, comme les cartes d’identité, les passeports ou les permis de conduire. Lorsqu’une demande est faite en mairie ou en ligne, c’est elle qui centralise et produit le titre, ce qui poserait un réel problème en cas de fuite.

L'ANTS n'aurait pas été volé
Il serait question d’environ 12 millions de données de l'ANTS circulant sur le dark web et d’un échantillon en libre accès, prétenduemment volés. Cependant, l’affaire a pris une tournure particulière lorsque l’agence a démenti ces rumeurs.

Selon l’ANTS, aucune intrusion n’a été détectée jusqu’à présent. Le groupe précise qu’il, qui dépend du ministère de l’Intérieur et gère des données sensibles, est soumis à des mesures de sécurité strictes et à une surveillance constante des services de l’État.

Aucune intrusion n’a été identifiée au sein des systèmes d’information de l’ANTS, que ce soit par les services de l’agence ou par ceux du ministère de l’Intérieur.

L’échantillon disponible sur le dark web,contient de nombreuses incohérences

Quant à ce fameux échantillon en libre accès, c’est là que l’affaire devient intéressante, car le média ZATAZ a découvert que ce fichier, prétendument de l’ANTS était déjà en vente depuis des mois.

Publicité, votre contenu continue ci-dessous
Publicité
Le même fichier de plus de 10 millions de fiches d’état civil géré par l’ANTS a été exfiltré en mars 2025 via un entrée compromise et a circulé sur le dark web à plusieurs reprises, avec des annonces repérées en juin et relancées mi-septembre 2025. Les pseudos des vendeurs et les plateformes changent, mais il s’agirait bien de la même fuite.

Cependant, ici aussi l’ANTS rassure ses utilisateurs, car ces données seraient non conformes aux formats de l’agence et présenteraient beaucoup trop d’incohérences pour être véridiques.

L’échantillon disponible sur le dark web, présenté comme « produit d’appel », contient de nombreuses incohérences et des formats qui ne correspondent pas à ceux de l’ANTS.

Un pirate à la méthode déjà connue ?
Toutefois, même avec des informations fausses, le pirate pourrait ressortir gagnant : le schéma est simple,il publie, les influenceurs relaient, et les internautes amplifient, renforçant la visibilité et la valeur commerciale des annonces. Bref, un arnaqueur qui en plume d’autres en vendant des données trompeuses.

Pour l’instant, l’affaire est à suivre, mais l’ANTS a porté plainte contre X et poursuivra le dossier devant la justice. L’Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI) est aussi mobilisée pour identifier l’origine de ces données et les auteurs de leur diffusion.

Au final, si l’ANTS rassure sur l’absence d’intrusion dans ses systèmes, la circulation éventuelle de certaines données reste une possibilité à surveiller.

Netherlands: Two teenagers arrested in spying case linked to Russia

bbc.com/ Jacqueline Howard

The pair were allegedly recruited by pro-Russian hackers and used a "wi-fi sniffer" on the Europol headquarters.

Two 17-year-old boys have been arrested on suspicion of "state interference" in the Netherlands, prosecutors say, in a case with reported links to Russian spying.

The pair were allegedly contacted by pro-Russian hackers on the messaging app Telegram, Dutch media reported.

One of the boys allegedly walked past the offices of Europol, Eurojust and the Canadian embassy in The Hague carrying a "wi-fi sniffer" - a device designed to identify and intercept wi-fi networks.

The teenagers appeared before a judge on Thursday, who ordered one boy be remanded in custody and the other placed on strict home bail conditions until a hearing, which is due to take place in the next two weeks.

The National Office of the Netherlands Public Prosecution Service confirmed court appearance, but told the BBC it could not provide details on the case due to the suspects' age and in "the interest of the investigation", which is ongoing.

One of the boy's father told Dutch newspaper De Telegraaf that police had arrested his son on Monday afternoon while he was doing his homework.

He said police told him that the arrest related to espionage and rendering services to a foreign country, the paper reports.

The teenager was described as being computer savvy and having a fascination for hacking, while holding a part-time job at a supermarket.

The Netherlands' domestic intelligence and security agency declined to comment on the case when approached by the BBC.

Viral call-recording app Neon goes dark after exposing users' phone numbers, call recordings, and transcripts

| TechCrunch techcrunch.com
Zack Whittaker
Sarah Perez
2:10 PM PDT · September 25, 2025

Call recording app Neon was one of the top-ranked iPhone apps, but was pulled offline after a security bug allowed any logged-in user to access the call recordings and transcripts of any other user.

A viral app called Neon, which offers to record your phone calls and pay you for the audio so it can sell that data to AI companies, has rapidly risen to the ranks of the top-five free iPhone apps since its launch last week.

The app already has thousands of users and was downloaded 75,000 times yesterday alone, according to app intelligence provider Appfigures. Neon pitches itself as a way for users to make money by providing call recordings that help train, improve, and test AI models.

But Neon has gone offline, at least for now, after a security flaw allowed anyone to access the phone numbers, call recordings, and transcripts of any other user, TechCrunch can now report.

TechCrunch discovered the security flaw during a short test of the app on Thursday. We alerted the app’s founder, Alex Kiam (who previously did not respond to a request for comment about the app), to the flaw soon after our discovery.

Kiam told TechCrunch later Thursday that he took down the app’s servers and began notifying users about pausing the app, but fell short of informing his users about the security lapse.

The Neon app stopped functioning soon after we contacted Kiam.

Call recordings and transcripts exposed
At fault was the fact that the Neon app’s servers were not preventing any logged-in user from accessing someone else’s data.

TechCrunch created a new user account on a dedicated iPhone and verified a phone number as part of the sign-up process. We used a network traffic analysis tool called Burp Suite to inspect the network data flowing in and out of the Neon app, allowing us to understand how the app works at a technical level, such as how the app communicates with its back-end servers.

After making some test phone calls, the app showed us a list of our most recent calls and how much money each call earned. But our network analysis tool revealed details that were not visible to regular users in the Neon app. These details included the text-based transcript of the call and a web address to the audio files, which anyone could publicly access as long as they had the link.

For example, here you can see the transcript from our test call between two TechCrunch reporters confirming that the recording worked properly.

a JSON response from Neon Mobile's server, which reads as transcript text from a call between two TC reporters, which says: "Uh, it worked. Hooray. Okay. Thanks, mate."
Image Credits:TechCrunch
But the back-end servers were also capable of spitting out reams of other people’s call recordings and their transcripts.

In one case, TechCrunch found that the Neon servers could produce data about the most recent calls made by the app’s users, as well as providing public web links to their raw audio files and the transcript text of what was said on the call. (The audio files contain recordings of just those who installed Neon, not those they contacted.)

Similarly, the Neon servers could be manipulated to reveal the most recent call records (also known as metadata) from any of its users. This metadata contained the user’s phone number and the phone number of the person they’re calling, when the call was made, its duration, and how much money each call earned.

A review of a handful of transcripts and audio files suggests some users may be using the app to make lengthy calls that covertly record real-world conversations with other people in order to generate money through the app.

App shuts down, for now
Soon after we alerted Neon to the flaw on Thursday, the company’s founder, Kiam, sent out an email to customers alerting them to the app’s shutdown.

“Your data privacy is our number one priority, and we want to make sure it is fully secure even during this period of rapid growth. Because of this, we are temporarily taking the app down to add extra layers of security,” the email, shared with TechCrunch, reads.

Notably, the email makes no mention of a security lapse or that it exposed users’ phone numbers, call recordings, and call transcripts to any other user who knew where to look.

It’s unclear when Neon will come back online or whether this security lapse will gain the attention of the app stores.

Apple and Google have not yet commented following TechCrunch’s outreach about whether or not Neon was compliant with their respective developer guidelines.

However, this would not be the first time that an app with serious security issues has made it onto these app marketplaces. Recently, a popular mobile dating companion app, Tea, experienced a data breach, which exposed its users’ personal information and government-issued identity documents. Popular apps like Bumble and Hinge were caught in 2024 exposing their users’ locations. Both stores also have to regularly purge malicious apps that slip past their app review processes.

When asked, Kiam did not immediately say if the app had undergone any security review ahead of its launch, and if so, who performed the review. Kiam also did not say, when asked, if the company has the technical means, such as logs, to determine if anyone else found the flaw before us or if any user data was stolen.

TechCrunch additionally reached out to Upfront Ventures and Xfund, which Kiam claims in a LinkedIn post have invested in his app. Neither firm has responded to our requests for comment as of publication.

Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians | Israel | The Guardian

Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy project

Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians

Exclusive: Tech firm ends military unit’s access to AI and data services after Guardian reveals secret spy project

Microsoft has terminated the Israeli military’s access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, the Guardian can reveal.

Microsoft told Israeli officials late last week that Unit 8200, the military’s elite spy agency, had violated the company’s terms of service by storing the vast trove of surveillance data in its Azure cloud platform, sources familiar with the situation said.

The decision to cut off Unit 8200’s ability to use some of its technology results directly from an investigation published by the Guardian last month. It revealed how Azure was being used to store and process the trove of Palestinian communications in a mass surveillance programme.

In a joint investigation with the Israeli-Palestinian publication +972 Magazine and the Hebrew-language outlet Local Call, the Guardian revealed how Microsoft and Unit 8200 had worked together on a plan to move large volumes of sensitive intelligence material into Azure.

The project began after a meeting in 2021 between Microsoft’s chief executive, Satya Nadella, and the unit’s then commander, Yossi Sariel.

In response to the investigation, Microsoft ordered an urgent external inquiry to review its relationship with Unit 8200. Its initial findings have now led the company to cancel the unit’s access to some of its cloud storage and AI services.

Equipped with Azure’s near-limitless storage capacity and computing power, Unit 8200 had built an indiscriminate new system allowing its intelligence officers to collect, play back and analyse the content of cellular calls of an entire population.

The project was so expansive that, according to sources from Unit 8200 – which is equivalent in its remit to the US National Security Agency – a mantra emerged internally that captured its scale and ambition: “A million calls an hour.”

According to several sources, the enormous repository of intercepted calls – which amounted to as much as 8,000 terabytes of data – was held in a Microsoft datacentre in the Netherlands. Within days of the Guardian publishing the investigation, Unit 8200 appears to have swiftly moved the surveillance data out of the country.

According to sources familiar with the huge data transfer outside of the EU country, it occurred in early August. Intelligence sources said Unit 8200 planned to transfer the data to the Amazon Web Services cloud platform. Neither the Israel Defense Forces (IDF) nor Amazon responded to a request for comment.

The extraordinary decision by Microsoft to end the spy agency’s access to key technology was made amid pressure from employees and investors over its work for Israel’s military and the role its technology has played in the almost two-year offensive in Gaza.

A United Nations commission of inquiry recently concluded that Israel had committed genocide in Gaza, a charge denied by Israel but supported by many experts in international law.

The Guardian’s joint investigation prompted protests at Microsoft’s US headquarters and one of its European datacentres, as well as demands by a worker-led campaign group, No Azure for Apartheid, to end all ties to the Israeli military.

No Azure for Apartheid demonstrators
On Thursday, Microsoft’s vice-chair and president, Brad Smith, informed staff of the decision. In an email seen by the Guardian, he said the company had “ceased and disabled a set of services to a unit within the Israel ministry of defense”, including cloud storage and AI services.

Smith wrote: “We do not provide technology to facilitate mass surveillance of civilians. We have applied this principle in every country around the world, and we have insisted on it repeatedly for more than two decades.”

The decision brings to an abrupt end a three-year period in which the spy agency operated its surveillance programme using Microsoft’s technology.

Unit 8200 used its own expansive surveillance capabilities to intercept and collect the calls. The spy agency then used a customised and segregated area within the Azure platform, allowing for the data to be retained for extended periods of time and analysed using AI-driven techniques.

Although the initial focus of the surveillance system was the West Bank, where an estimated 3 million Palestinians live under Israeli military occupation, intelligence sources said the cloud-based storage platform had been used in the Gaza offensive to facilitate the preparation of deadly airstrikes.

The revelations highlighted how Israel has relied on the services and infrastructure of major US technology companies to support its bombardment of Gaza, which has killed more than 65,000 Palestinians, mostly civilians, and created a profound humanitarian and starvation crisis.