logo
Family of missing Scot Greg Monks who vanished on Portugal stag do send SOS plea

Family of missing Scot Greg Monks who vanished on Portugal stag do send SOS plea

Daily Record4 days ago

Desperate loved ones of Greg Monks are pleading for more resources and experienced boots on the ground to search for him.
The family of a missing Scot who vanished while on a stag do in the Algarve have sent an SOS for national Portuguese cops to get involved in the search.
Desperate loved ones of Greg Monks are pleading for more resources and experienced boots on the ground to search for him - almost a week on since he disappeared after a night out in Albufeira last Tuesday evening, May 27.

The 38-year-old, from Cambuslang near Glasgow, went missing after he became separated from a group of pals who had flown over for a stag trip. Greg was set to be a groomsman at the wedding.

Police in Portugal have told the family they have captured two CCTV clips just 15 minutes apart of Greg in the early hours of Wednesday morning. The clips were taken in a quieter residential area of Cerro de Aguia around four miles from the group's apartment and the party strip.
His desperate family, including his mum, dad and girlfriend Nicole have flown out to the holiday destination to help search for him. But despite exploring numerous avenues, including checking local hospitals - there have still been no further sightings of Greg.
Today they sent an urgent call for help as they revealed local police services the GNR were stretched and under resourced trying to search for him.
They called on the case to be escalated beyond the GNR to Portugal's national force the Polícia de Segurança Pública (PSP).
Greg's cousin, Alison Fraser who is in the Algarve searching for him said: "The family of Greg Monks is actively working with the local GNR in Albufeira to support the ongoing efforts to locate him. We are awaiting formal instructions from the authorities to organise a larger search operation. To this end, we are appealing for the support of people with experience in large-scale search and rescue operations, since, as an ordinary family, we do not have the knowledge or experience necessary to deal with a situation of this nature.

"Given the number of police personnel and resources currently in the region, it is clear that the resources available to the local GNR are insufficient to respond adequately to the complexity of this case. Therefore, we urgently request the intervention of the higher authorities in Portugal, as well as the increased involvement of the British government.
"We also appeal to all people with political connections to exert their influence in order to mobilise institutional support and additional resources. Greater media visibility at a national level could also be crucial to accelerating these efforts.

"If you have any suggestions or contacts that could help advance this cause, please contact us as soon as possible."
Greg's sister Jillian Monk also sent a desperate plea to First Minister John Swinney to help get involved in the hunt for Greg.
She posted to Mr Swinney's account on X: "Please help me get this to Government level! Local Portuguese police doing all they can but no sightings since Wed! Local police resources are stretched we need help! Please share get attention of John Swinney."

Join the Daily Record WhatsApp community!
Get the latest news sent straight to your messages by joining our WhatsApp community today.
You'll receive daily updates on breaking news as well as the top headlines across Scotland.
No one will be able to see who is signed up and no one can send messages except the Daily Record team.
All you have to do is click here if you're on mobile, select 'Join Community' and you're in!
If you're on a desktop, simply scan the QR code above with your phone and click 'Join Community'.
We also treat our community members to special offers, promotions, and adverts from us and our partners. If you don't like our community, you can check out any time you like.
To leave our community click on the name at the top of your screen and choose 'exit group'.
If you're curious, you can read our Privacy Notice.
The Record told how the family had "never known pain like this" as they continued the frantic search for Greg.

Greg had only been in the Algarve for a matter of hours before he vanished from pals. The group checked into the Novochoro Apartments before heading out to the famous strip.
The group visited King's Cross karaoke bar before Greg became separated from them. Yesterday the last known picture of Greg was shared by family on a social media page set up to help find him.
It shows he was wearing navy Nike shorts and a t-shirt by the sports brand.

The family have yet to be shown CCTV footage of Greg with police adamant the clips show it is him. The last camera footage showed Greg walking past the Villa aguia mar at 3.27am on Wednesday morning (May 28).
The Record has contacted the GNR police force, the Foreign Office and the UK and Scottish governments for comment.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

Scottish Sun

time36 minutes ago

  • Scottish Sun

Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed

The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'

Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group
Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group

Scottish Sun

timean hour ago

  • Scottish Sun

Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group

Art dealer raked in £140,000 from his crimes PRICE TO PAY Bargain Hunt star is JAILED for terror offence over plot involving priceless artwork and barbaric militant group A BARGAIN Hunt star has been jailed for a terror offence after flogging artwork to the backer of a barbaric militant group. Ochuko Ojiri - real name Oghenochuko Ojiri - was held following an investigation into terrorist financing. Advertisement 8 Ochuko Ojiri sold artwork to a Hezbollah backer Credit: Jon Bond 8 The star is known for his work on Bargain Hunt Credit: BBC 8 He was sentenced today He was the first person to be charged with a specific offence under section 21A of the Terrorism Act 2000. Ojiri has now been jailed for two-and-a-half years after pleading guilty to eight counts of failing to make a disclosure during the course of business within the regulated sector. The TV star, who has also appeared on Antiques Road Trip, faced a maximum five years in prison for the offences, which took place between October 2020 to December 2021. Ojiri sold artwork to Nazem Ahmad, a man designated by US authorities as a "major financial donor" for militant group Hezbollah. Advertisement Prosecutors in America believe Ahmad used high-value art and diamonds to launder money and fund the organisation. At the time, Ojiri knew Ahmad had been sanctioned in the US and read news articles about him. Lyndon Harris, prosecuting, said previously: "There is one discussion where Mr Ojiri is party to a conversation where it is apparent a lot of people have known for years about his terrorism links." Mr Harris said that Ojiri "dealt with Mr Ahmad directly, negotiated the sales of artwork and congratulated him on those sales". Advertisement The total value of the artwork sold was around £140,000, with the art sent to Dubai, the UAE, or Beirut. Receipts released by the Met Police show the art included paintings by Charlie Roberts, Mónika Kárándi and an £8,500 piece by British artist Nigel Howlett. Ojiri also flogged a £12,000 bronze sculpture by the same artist, as well as four pieces by Max Rumbol totalling £15,700. One painting - Patty in Blue by Baldur Helgason - was sold to Ahmad for £20,000. Advertisement 8 Invoices showed a number of deals Ojiri made 8 He flogged a number of Max Rumbol pieces for more than £15,000 8 Ojiri made £140,000 in total from his crimes The court heard new money laundering regulations in January 2020 brought the art market under HMRC supervision. Advertisement Ojiri is said to have discussed the changes with a colleague - indicating awareness of the rules. His charge came following an investigation into terrorist financing by officers from the National Terrorist Financial Investigation Unit (NTFIU), part of the Met's Counter Terrorism Command. The Treasury, HMRC and the Met's Arts & Antiques Unit were all also involved in the probe. Police raided two UK warehouses to seize a number of artwork from Ahmad in May 2023. Advertisement Among the pieces, which were not sold by Ojiri, were two Andy Warhol paintings and a Picasso painting. In total, the Met seized £1million in art, which was sold so the funds can be reinvested back to the police, CPS and Home Office. Ojiri was previously the owner of an art gallery called Pelicans and Parrots that was dubbed "the coolest place in London". He sold a curated selection of contemporary furniture, houseware, and gifts until the store closed in 2021. Advertisement The antiques expert first appeared on screens on BBC show Put Your Money Where Your Mouth Is. He then became a regular on popular daytime show Bargain Hunt, where he lends his expert advice to budding antique buyers. Ojiri has also appeared on Antiques Road Show - travelling across the country as he attempts to make a profit on forgotten items. Commander Dominic Murphy, head of the Met's Counter Terrorism Command, said: 'This case is a great example of the work done by detectives in the National Terrorist Financial Investigation Unit (NTFIU), based in the Met's Counter Terrorism Command. Advertisement 'The prosecution, using specific Terrorism Act legislation is the first of its kind, and should act as a warning to all art dealers that we can, and will, prosecute those who knowingly do business with people identified as funders of terrorist groups. 'Oghenochuko Ojiri wilfully obscured the fact he knew he was selling artwork to Nazem Ahmad, someone who has been sanctioned by the UK and US Treasury and described as a funder of the proscribed terrorist group Hizballah. 'Financial investigation is a crucial part of the counter terrorism effort. A team of specialist investigators, analysts and researchers in the NTFIU work all year round to prevent money from reaching the hands of terrorists or being used to fund terrorist attacks.' 8 Ojiri started his career as an art dealer Advertisement

Police investigating 'online threat' to paratroopers at Colchester Garrison
Police investigating 'online threat' to paratroopers at Colchester Garrison

ITV News

timean hour ago

  • ITV News

Police investigating 'online threat' to paratroopers at Colchester Garrison

A threat to kill a British paratrooper in a "Lee Rigby-style attack" has reportedly been intercepted by police. The Ministry of Defence confirmed an "online threat" was being investigated by Nottinghamshire Police after messages concerning a paratrooper at Colchester Garrison were uncovered. MailOnline reported that security has been upped at the Essex barracks, where two Parachute Regiments are based. The newspaper reported that a message had been sent to the soldiers responsible for security at the base, reading: 'Urgent. All, please disseminate to all your people in camp. We have received warning that a man has made threats against members of the Para Regt and wants to carry out a 'Lee Rigby' style attack. 'The SCC [Security Control Centre] and main gate have been informed but ensure no Para Regt/military clothing is worn outside camp and remain vigilant.' It added that messages specifically named the suspect and included other identifying details. The Ministry of Defence has confirmed it is aware of an online threat, which it said is being investigated by civilian police. An army spokesperson at the Ministry of Defence said: "The safety and wellbeing of our personnel is our top priority. "We are aware of an online threat, which is being investigated by the civilian police. "Personnel are always advised to remain vigilant and report anything suspicious to the Royal Military Police." Nottinghamshire Police said it was aware of the investigation and has been contacted for comment. Fusilier Lee Rigby was killed on the streets of Woolwich, south-east London, in May 2013. Michael Adebowale and Michael Adebolajo ran the 25-year-old soldier over close to Woolwich Barracks before stabbing him to death in broad daylight.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store