Connect with us

Tech

Trade-ins returned $6.4bn to US mobile consumers in 2025 | Computer Weekly

Published

on

Trade-ins returned .4bn to US mobile consumers in 2025 | Computer Weekly


Last year saw US smartphone trade-in programmes consistently surging, with buyers rapidly embracing devices with more personalised artificial intelligence (AI) capabilities and 5G leading to a year of record-breaking quarters for revenues, according to the latest mobile trade-in and upgrade study by Assurant.

Specifically, the standouts of the Mobile trade‑in and upgrade industry trends report for Q4 2025 and the full year found sustained momentum through the end of the year, with trade-in device ages shifting around launch windows, and premium 5G devices dominating the secondary market as supply continues to skew newer.

The study showed that in all, US consumers received more than $6.4bn in value through mobile trade‑in programmes in 2025, a 42% year-on-year increase, and the largest annual total since Assurant began tracking the data in 2015.

Looking at market drivers, the global protection company noted that this yearly growth reflected a combination of newer and higher-quality devices entering into trade-in programmes through consumer trade-ins. While consumers held onto devices longer overall, the 2025 data showed they were also being more deliberate about when they upgraded, often aligning to major device launches, capability advancements such as AI-enabled features, and what were seen as competitive trade-in offers.

“What stood out in 2025 was how clearly value showed up at the moment consumers were ready to act,” said Biju Nair, executive vice-president and president of global connected living at Assurant. “New features continue to spark interest, but trade‑in programmes play a critical role in turning that interest into action by making value easier to understand and access. At the same time, repair and protection programmes are helping devices retain value longer, bringing newer, higher-quality phones back into the ecosystem. Together, these dynamics drove the largest annual increase in value returned to consumers we’ve ever recorded.”

In the fourth quarter of 2025, trade‑in activity remained strong during the promotion‑heavy fourth quarter, with consumers receiving $2.2bn in value during that time period alone – the highest fourth-quarter total on record. This total, said Assurant, reinforced trade‑in as a consistent component of the upgrade experience rather than a purely seasonal event.

In the quarter, the average age of iPhones turned in through trade-in and upgrade programmes declined slightly to 3.76 years, coinciding with new flagship launches and associated promotions. Over the same period, Android devices surpassed four years on average at trade‑in.

The study also showed that devices entering the secondary market increasingly trend newer, supporting stronger resale potential and expanding access to newer-generation, high‑performance 5G smartphones. The data is said to reflect a market where phones are designed, protected and maintained to remain viable well beyond their first ownership cycle.

For the first time on an annual basis, the most commonly turned‑in devices were all premium 5G models, including iPhone 13 and iPhone 14 variants. On the Android side, the Galaxy S22 Ultra 5G remained the most frequently turned-in model. This shift, said the study, underscored how recent‑generation devices are increasingly entering the secondary market.

Beyond financial benefits, the report also found that trade‑in and upgrade programmes were playing an increasingly important role in supporting a more circular and sustainable device ecosystem. It added that devices turned in through these programmes retain latent value, strengthening the secondary market, helping reduce e‑waste and broadening access to newer technology.

Assurant observed that through its supported trade‑in and upgrade programmes, more than 39,600 metric tonnes of electronic waste have been diverted from landfills and 10.3 million metric tonnes of CO₂ emissions have been avoided since 2009.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

A Mysterious Numbers Station Is Broadcasting Through the Iran War

Published

on


“Tavajoh! Tavajoh! Tavajoh!” a man’s voice announces, before going on to narrate a string of numbers in no apparent order, slowly and rhythmically. After nearly two hours, the calls of “Attention!” in Persian stop, only to resume again hours later.

The broadcast has been playing twice a day on a shortwave frequency since the start of the US-Israel attack on Iran on February 28.

According to Priyom, an organization which tracks and analyses global military and intelligence use of shortwave radio, using established radio-location techniques, the broadcast was first heard as the US bombing of Iran began. It has since played on the 7910 kHz shortwave frequency like clockwork—at 02.00 UTC and again at 18.00 UTC.

Over the weekend, Priyom said it had identified the likely origin of the broadcast. Using multilateration and triangulation techniques, the group traced the signal to a shortwave transmission facility inside a US military base in Böblingen, southwest of Stuttgart, Germany.

The site lies within a restricted training area between Panzer Kaserne and Patch Barracks, with technical operations possibly linked to the US army’s 52nd Strategic Signal Battalion, headquartered nearby.

That identification narrows the field, but it does not reveal who is behind the transmissions or who they are meant for.

The two-hour-long transmission is divided into five to six segments, each lasting up to 20 minutes. Each opens with “Tavajoh!” before shifting into a string of numbers in Persian, sometimes punctuated with an English word or two. Five days into the broadcast, radio jammers were heard attempting to block the frequency. The following day, the transmission shifted to a different frequency—7842 kHz.

Radio communication experts believe the broadcast is likely part of a Cold War–era system known as number stations.

The Return of the Numbers

Number stations are shortwave radio broadcasts that play strings of numbers or codes that sound random—like the one now heard in Iran. “It is an encrypted radio message used by foreign intelligence services, often as part of a complex operation by intelligence agencies and militaries,” says Maris Goldmanis, a Latvian historian and avid numbers stations researcher.

Number stations are most commonly associated with espionage. “For intelligence agencies, it is important to communicate with their spies to gather intelligence,” says John Sipher, a former US intelligence officer who served 28 years in the CIA’s National Clandestine Service. “This is not always possible in person due to political constraints or conflict. This is where number stations come in.”

While the use of number stations can be traced back to the First World War, they gained prominence during the US-Soviet Cold War. As espionage grew more sophisticated, governments used automated voice transmissions of coded numbers to communicate with agents, Goldmanis says. Citing declassified KGB and CIA documents, he adds that number stations were widely used during this period, often as Morse code transmissions and, in many cases, as two-way communications, with agents reporting back using their own shortwave transmitters.

“Nowadays, you have various satellite and encrypted communications technologies,” Sipher says. “But during the Cold War and even before that, governments had to find ways to do this without being noticed, and broadcasting coded messages was one way to communicate with your assets discreetly.”

The apparent randomness of the numbers means they can be understood only with a codebook, Sipher adds. “Nobody can make heads or tails of it or understand what it says unless you have the codebook that can give you hints to decrypt the code,” he says, noting that such systems must be set up and coordinated in advance.

A Signal Without a Sender

While the likely origin of the signal may now be clearer, its purpose and intended recipient remain unknown.

Because the broadcasts are encrypted and designed to be covert, those details may remain unclear for years, Goldmanis says. The structured nature of the transmission—its fixed schedule and consistent use of frequencies—further suggests it is part of a planned operation.



Source link

Continue Reading

Tech

ICE Invades Airports Across the US

Published

on

ICE Invades Airports Across the US


Over the last 24 hours, Immigration and Customs Enforcement (ICE) agents have invaded airports across the United States.

At Atlanta’s Hartsfield-Jackson, the world’s busiest airport, videos and photographs show ICE agents standing next to security screening lines. At Chicago’s O’Hare airport, ICE agents are scattered around check-in counters, according to videos shared online. At Newark Liberty International Airport in New Jersey, ICE officers were seen walking through the main United Airlines terminal, wearing vests that said “ICE.” And at San Francisco International Airport, multiple videos show what appear to be plainclothes law enforcement officers forcibly detaining a young woman as dozens of onlookers watch and film.

According to reporting from The New York Times, ICE is being deployed to 14 airports across the country, including John F. Kennedy airport and LaGuardia airport in New York, as well as airports in Houston, New Orleans, Philadelphia, and Phoenix.

One of the eyewitnesses who captured the incident at San Francisco’s airport tells WIRED she began filming after hearing a “horrible” scream while walking to her gate. The woman, who did not want to be named due to privacy concerns, said it appeared that “two unidentified men” were grabbing “a woman trying to hold onto her child.”

“I ran up and asked who they are with and if they are agents and for proof of who they are,” the witness said. She said they never let her see their badge numbers, and she eventually called the police. “When [the San Francisco Police Department] arrived they surrounded the men detaining the woman and [wouldn’t] speak to anyone in the crowd asking for answers—just stared blankly ahead. SFPD all had visible badge numbers so I asked them why can I see their badge numbers and what agency they are with but not these two unidentified men. They never identified themselves and eventually police pushed the crowds away and I left to catch my flight.”

In other videos of the incident, the officers appear to create a blockade between the individuals arresting the woman and the onlookers. “People around were visibly upset and shaken. Yelling at agents, calling them Nazis,” she said.

“It was absolutely horrifying to witness and I felt sick to my stomach,” the eyewitness told WIRED. “I didn’t sleep last night once I got home.”

A spokesperson for San Francisco International Airport confirmed to NBC San Francisco that federal agents detained a woman at the airport on Sunday, but said it was unrelated to the wider deployment of ICE agents to airports. SFPD did not respond to a request for comment.

The ICE agents are ostensibly at these airports to assist with long security lines caused by the partial government shutdown. Thousands of Transportation Security Administration (TSA) agents have gone without pay since the end of January, and many have stopped showing up to work or quit as a result.

White House border czar Tom Homan said the deployment of ICE to US airports would assist with filling these gaps, though in a Truth Social post on March 21, President Donald Trump said that ICE agents would be doing “security like no one has ever seen before, including the immediate arrest of all Illegal Immigrants who have come into our Country, with heavy emphasis on those from Somalia.” The Trump administration has targeted the Somali American community, particularly in Minnesota, after allegations of fraud in some of the state’s childcare centers led the administration to deploy some 3,000 immigration agents to the state.



Source link

Continue Reading

Tech

Irish government launches CNI resilience plan | Computer Weekly

Published

on

Irish government launches CNI resilience plan | Computer Weekly


The Irish government has released a National Strategy on the Resilience of Critical Entities, a comprehensive framework designed to protect essential public services – including digital and web infrastructure and datacentres – and critical national infrastructure (CNI) from cyber attacks and other disruptions.

Owned by Ireland’s Department of Defence (An Roinn Cosanta) and Office of Emergency Planning, the document sets out an overarching vision and a set of strategic objectives aimed at strengthening resilience across Ireland.

It was devised to comply with the European Union’s (EU’s) Critical Entities Resilience (CER) Directive, which obliges Member States to take specific measures to ensure essential services for economic and social functions are protected. The provisions laid down in CER are to be transferred into national law across the EU by the middle of October 2026.

“A resilient society is essential for our national security, as well as our economic and social well-being,” said Helen McEntee, Ireland’s minister for defence.

“This resilience relies on the continuous availability of a wide range of essential services including the water we drink, the food we eat, the energy that lights and heats our homes, the transport we depend on, and the health services that keep us healthy. Certain entities that provide these services are vital to the functioning of our society and are therefore classified as critical.

“These Critical Entities are significant, and they are increasingly interconnected and interdependent,” she said. “Many of them are provided by private industry in partnership with the State. While the resilience of critical infrastructure has always been part of our emergency strategy in Ireland, we now recognise the need for a more strategic approach to enhance this area.”

At the core of the strategy lie five strategic goals: to enhance the national risk assessment methodology to identify essential services; to embed a governance and coordination framework for critical entity resilience; to drive appropriate improvements in the resilience of critical entities; to enhance the Department of Defence’s strategic oversight of critical infrastructure dependencies across all sectors; and to ensure consistency with cyber security, maintaining an approach to resilience that aligns with Ireland’s national cyber objectives, and its obligations under EU laws such as NIS 2, Dora and so on.

Dublin hopes that besides improving public service resilience based on a better understanding of the risks such bodies face, the framework will also ensure a national and sector-wide perspective on risk, and support critical entities in meeting their obligations.

People across Ireland experienced the devastation of a successful cyber attack on an essential public service in May 2021, when the Health Service Executive (HSE) infamously fell victim to a Conti ransomware attack causing significant disruption.

The incident forced frontline clinical staff to fall back on pen and paper amid cancelled appointments and, significantly, downed Ireland’s Covid-19 testing referral system.

It took months for Ireland’s health system to recover, with millions of Euros spent on response and remediation efforts.

Clarity on CNI is welcome

David Ferbrache, managing director at Beyond Blue, an Edinburgh-based cyber risk and resilience consultancy, said it was encouraging for Ireland to establish a clear plan for CER compliance, and the document demonstrated its commitment to protecting both CNI and citizens. Clarity on intent, he added, would be valuable for the government, regulators and service operators.

“The CER Directive is widely regarded as the sister regulation to NIS2,” he said. “However, it takes a broader, all-hazards approach to resilience, extending beyond cyber threats to also address physical risks and third parties supporting critical industries. This ultimately helps safeguard essential services against outages and disruption, regardless of how an incident occurs or who it is targeted at.

“This is a positive step, particularly as recent disruptions to critical national infrastructure have been varied in cause, spanning malicious action, technology failures and natural hazards.”

Holistic

While the EU’s CER Directive does not apply to the UK, Ferbrache said it raised an important question as to whether the UK should adopt a similar approach reflecting the reality of today’s interconnected world and recognising that disruption takes many forms, not just cyber.

“While the Cyber Security and Resilience Bill (CSRB) is currently progressing through Parliament, it places a strong emphasis on cyber security, but gives less attention to broader resilience concerns,” he said. “These concerns cannot be ignored, protecting the availability of critical infrastructure cannot be achieved by only looking through the cyber lens. A more holistic approach is needed which bridges the cyber security and operational resilience disciplines.

“This all-hazards approach may require broader legislation and alignment of regulatory expectations on operators of essential services and their suppliers,” said Ferbrache. “While it’s unlikely that such provisions will be incorporated into the CSRB at this late stage, the UK government cannot afford to overlook this challenge in future.”



Source link

Continue Reading

Trending