Reference Library – Wales
Russia is using Champions League matches involving English clubs to prepare it for hosting next summer’s World Cup. Organisers say the 2018 tournament will be one of the “most protected” ever – as the country faces threats from terror and hooligans. Some 2,000 British fans are in Moscow as Liverpool play Spartak Moscow and Manchester United face CSKA Moscow on Tuesday and Wednesday respectively.
Authorities are using the fixtures as dummy runs for security ahead of the World Cup. Hooliganism in Russian football has been a matter of growing concern over recent years. So-called Russia “ultras” were involved in clashes with England fans during the 2016 Euro Championships in Marseilles.1
Many Russians were believed to have come trained, equipped and determined to cause carnage in the French port.
But Russia’s president Vladimir Putin has introduced a string of tough measures targeting sports hooligans in the past six months. These included tough new sentencing for people who cause trouble – both Russian and foreign. Russia’s role in the conflict in Syria means the threat from terror is continuing to grow.
But organisers predict the 2018 World Cup will be one of the “safest” and “most protected” yet. This will entail levels of security never seen before. Fans travelling to Russia for the tournament can expect to go through several layers of security before even entering a stadium.
Once inside, police will monitor activity inside the grounds from a central control room, using hundreds of individual cameras attached to seats.
Organisers also say that spectators will know exactly where the line is when it comes to behaviour.
A gun-toting gang 1ambushed security guards in a terrifying 100,000 bank raid in the early hours of the morning. The three masked raiders 2targeted the G4S team as they were parked at a branch of Santander in Walkden, Salford, Greater Manchester. Disguised in a Mini Cooper, the gang arrived as the security van was parked in an alley and an innocent female passerby walks past.
One of two guards then gets out from the van and starts to walk towards the entrance of the bank. The Mini pulls up at speed next to bollards near the pavement and the guard hurries towards the door of the bank, but one of gang springs from the car and tailgates him into the building.
(Image: MEN WS) (Image: MEN WS)
The robber is then quickly followed by two others. Once inside the building at the Ellesmere Shopping Centre in Bolton Road, one of the gang pressed a pistol into the guard s back after forcing him to lie on the floor.
Within 30 seconds the gang emerge from the bank and drive off. One line of inquiry is that the gang had inside information. As well as a handgun the gang were also armed with a machete.
(Image: MEN WS)
Their red Mini was later found abandoned behind a row of shopse. The raid took place at around 1.20am on September 7 . Neither of the cash couriers were injured but were left shocked by the ordeal.
In recent weeks, Salford has also suffered another similar bank raid. Twelve days later – on Tuesday last week – two men escaped with 30,000 in another early morning bank raid in Salford. A guard was attacked outside the Royal Bank of Scotland in Mather Way, Pendleton, at the city s shopping centre.
The pair struck at 7.10am on September 19th and were armed with a crow bar.
Thankfully no-one was injured, but that doesn t excuse the terrifying ordeal that the victims had to endure at the hands of these violent men.
I would urge anyone that was in the area at the time of the robbery that thinks they might have seen anything that could help our investigation to please get in touch.
Security breach exposes data from half a million vehicle tracking devices
SECURITY RESEARCHERS have uncovered a security breach exposing half a million vehicle tracking accounts and details.
Discovered by Kromtech security1, the breach reveals information about the customers of US vehicle recovery device and monitoring company SVR Tracking2, as well as the physical devices that are attached to the cars.
The exposed data, which includes customer credentials, was unearthed through a misconfigured Amazon AWS S3 bucket that was left publically available, and because it wasn’t protected by a password, could allow anyone to pinpoint locations visited by customers of the vehicle tracking firm.
“The repository contained over a half of a million records with logins, passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships,” said Bob Diachenko, Kromtech’s Chief Communication Officer3.
“Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden.
In a Backup Folder called “accounts”, the data contained 540,642 ID numbers, account information that included many plate & vin numbers, emails, hashed passwords, IMEI numbers and more.
Kromtech noted that the car tracking software monitors everywhere the car has been back as far as 120 days, including a somewhat terrifying feature that pinpoints on the map all of the places a driver has visited.
Diachenko added that the actual number of vehicles exposed by the incident may have been far more than half a million, since many of the accounts, which were used by SVR’s resellers and clients, include large numbers of tracking devices.
The tracking devices installed by SVR indicate the vehicle’s location around the clock, even if it hasn’t been reported as missing or stolen, according to the company.
“There is even an option that will show anyone with login credentials the top stops or locations where the vehicle has been,” added Diachenko. “There is a recovery mode’ that can pinpoint every 2min or create zone notifications .
They claim to have a 99% success rate on recovery but what about when the customer logins and passwords for thousands of unsuspecting drivers are leaked online?”
Shortly after sending responsible disclosure note, the bucket was secured, however, with no word from the company.