A SECURITY guard who was attacked while on duty suffers from migraines every day as a result of his injuries, a court heard.
Andrew Goldstraw, 42, and Christa Stevenson, known as Stacey Coleman, 40, both of Junction Road in Poole, pleaded guilty to assault by beating at Poole Magistrates Court yesterday.
The pair had originally denied the charges.
Police officers were called to the shopping centre on Sunday, December 18 at 5.05pm after a row broke out between a man, a woman and members of security staff.
During proceedings yesterday CCTV footage of the incident was shown to the court.
Goldstraw, who is already in custody serving another prison sentence, could be seen grappling with Mr King on the floor of Poole bus station.
Coleman then appears and is seen to kick Mr King more than once in the leg while he is still on the floor.
Miss Nicola Bowker, prosecuting, told the court that Mr King sustained a cut under his eye as well as bruising and swelling to the head.
She added: As a result of the injuries to his head Mr King now suffers with migraines which can occur two or three times a day.
This also means that he suffers with a lot of pain.
The court heard that Goldstraw apologised for his behaviour on the night in question.
Handing down his sentence District Judge Snow said: The offence is so serious that only custody can be justified.
A security guard is vulnerable to this type of behaviour and this was a nasty injury which has taken a significant amount of time to recover from, he added.
Goldstraw was sentenced to 16 weeks in prison .
Coleman s sentencing was adjourned to later in the day following a pre-sentence report but was told that she was unlikely to face any prison time.
Last Updated: 23/05/17 2:27pm
Wembley will have enhanced security for Saturday’s FA Cup final between Arsenal and Chelsea
The Football Association says “enhanced security” will be in place at the FA Cup final in the wake of Monday’s Manchester attack. A terrorist attack at the end of a concert at the Manchester Arena on Monday night left 22 people dead and 59 injured. And sporting organisations including the FA, the EFL and the International Cricket Council have sought to reassure supporters due to attend upcoming games. The victims of the attack will be remembered at Saturday’s final between Arsenal and Chelsea, and fans have been told to expect extra security checks at Wembley.
“Fan safety is of paramount importance and we have robust security measures in place at Wembley Stadium,” an FA statement read. “In collaboration with the Metropolitan Police and the local authorities there will be an enhanced security operation for all upcoming events. “All supporters are encouraged to arrive for events at Wembley Stadium as early as possible for security checks and to avoid any delays in entering the stadium.”
Wembley also hosts the League Two and Championship play-off finals on Sunday and Monday, and an EFL statement read: “Whilst there have been no specific threats in this country, our Security Advisor will be liaising with Wembley Stadium, the National Counter Terrorism Security Office (NaCTSO) and the Metropolitan Police to ensure the arrangements in place provide a safe and secure environment for all supporters attending this weekend’s play-off matches. “The safety of fans remains our highest priority . The EFL takes security issues extremely seriously and we would urge all supporters planning to be at Wembley Stadium to be vigilant of their surroundings at all times, stay alert and not be alarmed.”
Manchester United held a minute’s silence for the victims and those injured in the Manchester attacks
Manchester United held a minute’s silence for the victims as they prepared to fly out for Wednesday’s Europa League final in Stockholm, where stringent security measures are in place1. The ICC, meanwhile, says security is the “highest priority” ahead of its Champions Trophy and Women’s World Cup tournaments in England. “We operate on advice from our Tournament Security Directorate – in conjunction with the ECB and relevant authorities – to ensure that we have a robust safety and security plan for both tournaments,” a statement read. “We will continue to work with authorities over the coming hours and days and review our security in line with the threat levels.
“The security situation has been very much front and centre of our preparations and we constantly review our procedures to guarantee they are as effective as possible to keep everyone safe.”
Getty Images / UniversalImagesGroup / Contributor The NHS cyberattack that hit hospitals across the UK is said to have been part of the biggest ransomware outbreak in history, according to Mikko Hypponen from F-Secure. Viruses, trojans, malware, worms – what’s the difference?1
Viruses, trojans, malware, worms – what’s the difference?
Commenting on the news, Hypponen said the Wanna Decryptor attack was unprecedented, while cyber security expert Varun Badwhar said it gave a glimpse of what a “cyber-apocalypse” would look like.
“We’ve never seen something spread this quickly in a 24-hour period across this many countries and continents,” explained Badwhar. “So it’s definitely one of those things we’ve always heard about that could happen and now we’re seeing it play out.” The NHS hack is said to be creeping across the UK with reports of the ransomware attack hitting a range of other organisations in as many as 99 countries . In a statement, NHS Digital2 confirmed a number of NHS organisations had been affected by a ransomware attack . The investigation is at an early stage but we believe the malware variant is Wanna Decryptor3, a spokesperson said. Subscribe to WIRED4 At this stage, we do not have any evidence that patient data has been accessed . We will continue to work with affected organisations to confirm this.
Hackers use ransomware5 to infect a computer or system before holding files hostage until a ransom is paid . It can infect a computer via a trojan, virus or worm. Wanna Decryptor encrypts users files using AES and RSA encryption ciphers meaning the hackers can directly decrypt system files using a unique decryption key . Victims may be sent ransom notes with instructions in the form of !Please Read Me!.txt files, linking to ways of contacting the cybercriminals . Wanna Decryptor changes the computer’s wallpaper with messages (as seen in tweets from affected NHS sites) asking the victim to download a decryptor from Dropbox . This decryptor demands hundreds in bitcoin6 to work. Affected machines are said to have six hours to pay, and every few hours the ransom goes up. “Most folks that have paid up appear to have paid the initial $300 in the first few hours,” said Kurt Baumgartner, principal security researcher at Kaspersky Lab.
They added that the attack was not specifically targeted at the NHS because it is affecting “organisations from across a range of sectors” and NHS Digital is working with the National Cyber Security Centre, the Department of Health and NHS England to support affected organisations. The NHS incident appears to be part of a global cybersecurity incident with malware spreading to multiple organisations around the world . Security firm Check Point and Avast have said there have been 75,000 attacks in 99 countries . Telefonica in Spain has been the biggest confirmed incident outside of the UK but it also reports issues in Russia, Turkey, Indonesia, Vietnam, Japan, and Germany.
A spokesman for the National Cyber Security Centre7 and National Crime Agency said they were responding to an “ongoing international cyber incident” and confirmed there was no indication medical data or personal information has been compromised.” The specialist cyber crime officers from the NCA and police forces are now working with hospitals to respond to the attack preserve evidence . Read their advice on protecting yourself from ransomware8. A live map9 tracking the malware has plotted thousands of incidents around the world . Although, it is not confirmed these are all the latest version of the malware . This map tracks incidents of wcrypt and reveals how many of the botnets are online, and offline, in real-time .
A Unique IP chart below the map reveals the number of new botnets coming online, and the total . As of 7.17pm BST, there were 189 new, and 1,821 total botnets (up from nine just an hour earlier.) It is said that 24 NHS organisations have been hit .
The full list is below:
- Mid Essex Clinical Commissioning Group
- Wingate Medical Centre
- NHS Liverpool Community Health NHS Trust
- East Lancashire Hospitals NHS Trust
- George Eliot Hospital NHS Trust in Nuneaton, Warwickshire
- Blackpool Teaching Hospitals NHS Trust
- St Barts Health NHS Trust
- Derbyshire Community Health Services
- East and North Hertfordshire Clinical Commissioning Group
- East and North Hertfordshire Hospitals NHS Trust
- Sherwood Forest NHS Trust
- Nottinghamshire Healthcare
- Burton Hospitals NHS Foundation Trust
- United Lincolnshire Hospitals NHS Trust
- Colchester General Hospital
- Cheshire and Wirral Partnership NHS Foundation Trust
- Northern Lincolnshire and Goole NHS Foundation Trust
- North Staffordshire Combined Healthcare NHS Trust
- Cumbria Partnership NHS Foundation Trust
- Morecombe Bay NHS Trust
- University Hospitals of North Midlands NHS Trust
- NHS Hampshire Hospitals
- Kent Community Health NHS Foundation Trust
- Plymouth Hospitals NHS Trust
- ^ Viruses, trojans, malware, worms – what’s the difference? (www.wired.co.uk)
- ^ NHS Digital (digital.nhs.uk)
- ^ Wanna Decryptor (www.wired.co.uk)
- ^ Subscribe to WIRED (www.wired.co.uk)
- ^ ransomware (wired.uk)
- ^ bitcoin (www.wired.co.uk)
- ^ National Cyber Security Centre (www.wired.co.uk)
- ^ protecting yourself from ransomware (www.ncsc.gov.uk)
- ^ live map (intel.malwaretech.com)