IT HAS been confirmed that a new contractor will be taking over the 2017’s Royal Highland Show security operation. SHOWSEC has been named as the new organisation a company that claims to be an “award winning event and venue security specialist dedicated to achieving excellence in crowd management”. In business for more than 30 years, SHOWSEC has serviced thousands of events at over 450 venues, managing the safety of over 25 million people at sports, concerts, festivals and public events each year. Following last year’s Highland Show, claims were made on social media that a number of items of properly were stolen from the Young Farmers campsite, and it was alleged that it was the security team, Streamline Security, that had taken them. Some of these allegations included: One young farmer had her phone charging in the cabin next to the security booth . When she returned, her phone and charger had gone . She was told nothing had been handed in and that the lost property box was empty . A guard then rang her phone and she could hear it ringing .
She then saw her phone flash under piles of paper on a desk . Only then, reportedly, was she told that it had been handed in. Laura Cochrane, from central Scotland, dropped her purse on Saturday night at the paint party dance . She checked at the security booth . Five minutes later, a friend got the purse from a guard . It had no cash in it, and when she asked who handed it in, was told it was confidential information . A Lanarkshire young farmer s wallet went missing . It was handed back by a security guard, minus the cash. It was reported on Facebook that while a young farmer was lying in a room within a caravan, a security guard let himself into the caravan and, when challenged, left immediately .
This was reported to the head security guard. At the time, Streamline s managing director, William Hunter, said: I can confirm that a mobile phone was found in the possession of one of Streamline s bar staff . Following an investigation, the staff member was fired and the phone is being returned to the owner . We have passed details of the incident to the police . This is the only incident reported to either ourselves or Police Scotland.” Royal Highland Show manager, David Jackson, also commented in the 2016 show aftermath: These are concerning allegations and we will work with Police Scotland and Streamline Leisure to investigate and take appropriate action. This week, The Scottish Farmer asked the Royal Highland Show’s public relations spokesman if last year’s row was the reason for the change of security provider, but had received no reply at time of going to press.
An international hacking group targeted the Foreign Office in a campaign lasting several months, cyber security experts have revealed. The Callisto Group are highly motivated and well resourced and thought to be involved in intelligence gathering about foreign and security policy. Cyber security firm F-Secure claimed the group s infrastructure has links with Russia, China and Ukraine, but did not offer any definitive conclusions about who was behind Callisto. The Foreign Office (FCO) was one of the organisations targeted by Callisto in 2016, with other targets including military personnel, government officials, think tanks and journalists in Eastern Europe and the South Caucasus. Erka Koivunen, chief information security officer at F-Secure said: We do not have enough data to determine what exactly the Callisto Group were doing with the FCO, or whether any activity concerning them was successfully executed. However, we do have indicators that the FCO were targeted by the Callisto Group.
The Government faces tens of thousands of cyber attacks every month and is aware of several established, capable state and state-sponsored groups seeking to penetrate UK networks. The active cyber defence (ACD) programme developed by the Government is aimed at blocking attacks before they reach their intended recipient. In a report on Callisto s activities, F-Secure said that in October 2015 the group used phishing techniques sending emails purporting to come from Google suggesting that their Gmail accounts were about to be closed to harvest security credentials. In early 2016 spear phishing emails with malicious attachments appearing to be from people known to the recipient were sent in highly targeted attacks aimed at government officials, military targets, think tanks and journalists.
The malware contained in the attacks would have enabled Callisto to gather basic information and screenshots but also install further software which could have given the group full remote access to the machine and its data. While the targeting would suggest that the main benefactor of the Callisto Group s activity is a nation state with specific interest in the Eastern Europe and South Caucasus regions, the link to infrastructure used for the sale of controlled substances hints at the involvement of a criminal element, the report said. One potential explanation was that Callisto is a cyber crime group with ties to a nation state, such as acting on behalf of or for the benefit of a government agency but it was not possible to make any definitive assertions , F-Secure concluded.
Cyber security firm F-Secure claimed the Callisto Group s infrastructure has links with Russia, China and Ukraine (PA) A National Cyber Security Centre spokesman said: The first duty of Government is to safeguard the nation and as the technical authority on cyber security, the NCSC is delivering ground breaking innovations to make the UK the toughest online target in the world. Emails are the main path for most attacks and usually rely on an abuse of trust by spoofing well-known brands .
The Government s ACD programme is developing services to block, prevent and neutralise attacks before they reach inboxes.
These measures are being trialled on government systems to prove effectiveness before we ask industry to implement them.
TECHNOLOGY companies must allow the security services access to messages in times of emergency, Home Secretary Amber Rudd has said. It follows reports that Khalid Masood, the man responsible for the terrorist attack in London on Wednesday, used the WhatsApp service to send someone a message just three minutes before he mowed down 40 people on Westminster Bridge. The inbuilt encryption of WhatsApp means police and MI5 have reportedly not seen the contents of that message.
Doing the rounds on the Sunday morning political TV shows, the Home Secretary said technology firms must build in back doors to allow security services to eavesdrop.
Rudd also insisted WordPress, and Google, who run YouTube, must realise that they are now publishers rather than simply technology companies, and so should do more to tackle extremist videos and blogs.
Although the Home Secretary said she would like companies to do this voluntarily and independently, she refused to rule out changing the law to force their hand.
Rudd told BBC One s Andrew Marr Show: It is completely unacceptable, there should be no place for terrorists to hide.
We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don t provide a secret place for terrorists to communicate with each other.
It used to be that people would steam-open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warrantry.
But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.
Asked if she opposed end-to-end encryption on Sky News s Sophy Ridge on Sunday, Rudd said: End-to-end encryption has a place, cyber security is really important and getting it wrong costs the economy and costs people money.
So I support end-to-end encryption, it has its place to play.
But we also need to have a system whereby when the police have an investigation, where the security services have put forward a warrant signed off by the Home Secretary, we can get that information when a terrorist is involved.
She denied what she was describing was incompatible with end-to-end encryption, adding: You can have a system whereby they can build it so that we can have access to it when it is absolutely necessary.
Rudd said she was calling in a fairly long list of relevant organisations for a meeting on the issue on Thursday, including social media platforms.
I would rather get a situation where we get all these people around the table agreeing to do it, she told Marr.
I know it sounds a bit like we re stepping away from legislation but we re not.
What I m saying is the best people who understand the technology, who understand the necessary hashtags to stop this stuff even being put up, not just taking it down, but stopping it being put up in the first place are going to be them.