
OAP, 80, kept tabs on 27-year-old woman in Glasgow
Dennis Hislop, 80, spent time behind bars after he kept tabs on the then 27-year-old in Glasgow's Parkhead and Dalmarnock.
Hislop tailed her several times a day as she walked her dog.
READ NEXT: Three jailed after 'large cannabis farm' found in Greenock
READ NEXT: Manhunt after killer with links to Glasgow escapes prison
The retired metal worker told police that he hid in bushes with binoculars looking in the direction of her house.
Hislop also concealed himself in bushes at Celtic Park to leer at her and fled after being pointed out to the police.
Hislop was convicted of stalking between February 2020 and June 2022 at Glasgow Sheriff Court.
Hislop was released from prison after trial and put on a tag for 12 months and ordered to stay 200 metres from the woman and not to enter her street.
However, Hislop was back in the dock for breaching his non-harassment order (NHO) against the woman.
He was also convicted of a further charge of behaving in a threatening or abusive manner against a teenage girl and a man.
Jurors heard Hislop first flouted the NHO and a court undertaking in September 2023.
Prosecutor Danielle McGuinness put to Hislop: "Why did she see you a couple of months after the NHO was put in place in bushes at the bottom of her street?"
He replied: "She has an iPhone. I pass her regularly walking her dog in my car - she watches me go up to Bridgeton where I stay.
"Why did she not take a picture if she saw me there?"
The trial earlier heard from an 18-year-old girl who also came across Hislop in the area in 2023.
She first became aware of him amid claims he put a note on her mum's windscreen at the Emirates Arena when she came to pick up her daughter.
The girl stated: "The note said she was a paedo and that I felt unsafe around my mum and that I came to him and told him this."
An allegation that he put a note on the car was found not proven by the jury.
The girl denied ever speaking to Hislop and claimed that he was a stranger to her.
She also recalled times Hislop confronted her and her boyfriend in the streets around Parkhead.
The girl stated that Hislop told them that he was "quite famous" with "young boys" in the area as he managed to get them a signed Rangers football.
His previous trial heard Hislop claimed he had a contact at Rangers who got him a signed ball from ex-player Ryan Kent for a boy he knew.
The girl stated that Hislop would "watch us" walk up a street in Parkhead while he was pulled up in his car.
The witness recalled a time when she saw Hislop knelt down in bushes near the Emirates Arena.
She said: "He got caught up in twigs...I was quite shocked. I honestly didn't think he was waiting on me and I think he was shocked that someone had noticed him."
The girl stated in another encounter that Hislop told her boyfriend that she was "not to be scared" of him.
She added that she would see Hislop driving round the street three times a day at the time.
Hislop was also convicted of repeatedly following a John Carletto in his car which included following him home.
Mr Carletto told the court that Hislop "made my life a misery" and he had to sell his car because of him.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NBC News
5 hours ago
- NBC News
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.


Scottish Sun
6 hours ago
- Scottish Sun
Cops hunt football fans after disorder at Rangers' Europa League clash
Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) POLICE are hunting three men after chaos broke out before a high-stakes Rangers game. An incident took place on Harrison Drive near Ibrox Stadium in the lead up to the Light Blues' Europa League clash with Athletic Bilbao on April 10. 4 Police are hunting three men over an incident before a Rangers match Credit: Police Scotland 4 Unrest broke out before the club's clash with Athletic Bilbao on April 10 Credit: Police Scotland 4 Cops are appealing to the public for help with their enquiries Credit: Police Scotland 4 Anyone who was in the Harrison Drive area around the time of the incident have been told to get in contact Credit: Police Scotland Before the first-leg match, a supporters' march was held, with fans partying near the stadium before kick-off. Officers are carrying out enquiries and as part of the investigation they are looking to track down three individuals. The first man is described as being around 5'10, with short light-coloured hair. He was spotted wearing a red and navy t-shirt, with a scarf around his neck. The second man is described as having dark hair, which is shaved at the sides. He was seen wearing a dark-coloured jacket and appeared to be missing a front tooth. The third man is described as being of medium build with dark hair and facial hair. He was spotted wearing a black t-shirt and grey shorts. He also had a black and grey tattoo on his arm. Cops are appealing to the public to get in touch with officers if they recognise any of the men, Lyons family insist rival Daniel crew had NOTHING to do with Spain shootings Constable Ryan Beveridge of the Greater Glasgow Football Enquiry Unit said: 'I would urge the men, or anyone who has information relating to them, depicted in the images to contact police. 'I would also urge members of the public who were in the vicinity at the time to get in touch. 'Members of the public can contact Police Scotland via 101 quoting incident number 1510 of 15 April, 2025, or call Crimestoppers anonymously on 0800 555 111.'


Daily Record
6 hours ago
- Daily Record
Missing UK tourist found dead at bottom of lift shaft in Malaysia
Brit backpacker Jordan Johnson-Doyle, 25, disappeared on May 27 in the Malaysian capital of Kuala Lumpur. He was last seen at a bar in a suburb. The body of a missing tourist who vanished in Malaysia has been found in a lift shaft a week after he vanished. Brit backpacker Jordan Johnson-Doyle, 25, disappeared on May 27 in the Malaysian capital of Kuala Lumpur after he was last seen at a bar in a suburb. As the Mirror reports, a major search was launched by police after he was reported missing. Tragically the search has ended after he was found dead in a lift shaft at the ground floor of a construction site. A post-mortem found the cause of death was a horror "chest injury sustained from fall from height", according to police chief Rusdi Mohd. Police have ruled out any foul play. The police chief added: "No criminal elements were found at the scene and the case has been classified as a sudden death report." Jordan was last seen at Healey Mac's Irish Bar in the Bangsar area of the city. He had sent his friend a photo of the pub's quiz poster before he is believed to have gone to a nearby bar called The Social. His devastated mum Leanna Burnett previously told how she felt"sick" and "numb" over his shock disappearance. Leanna used a tracking device 'find my iPhone' to trace her son's phone in a desperate search for him. The tracker showed the mobile was at a residential block close to the bar in the Kuala Lumpur suburb where Jordan had been. Leanna said she last spoke to her son on May 26 just a day before he disappeared. She previously said: "He seemed absolutely fine and normal. Nothing stood out whatsoever. Join the Daily Record WhatsApp community! Get the latest news sent straight to your messages by joining our WhatsApp community today. You'll receive daily updates on breaking news as well as the top headlines across Scotland. No one will be able to see who is signed up and no one can send messages except the Daily Record team. All you have to do is click here if you're on mobile, select 'Join Community' and you're in! If you're on a desktop, simply scan the QR code above with your phone and click 'Join Community'. We also treat our community members to special offers, promotions, and adverts from us and our partners. If you don't like our community, you can check out any time you like. To leave our community click on the name at the top of your screen and choose 'exit group'. If you're curious, you can read our Privacy Notice. "We always end the phone call with 'love long time' and that was the very last thing we said to each other." Jordan had been backpacking around South East Asia at the time and had recently visited nearby country Vietnam on his travels. It is understood he arrived in Malaysia on May 17 and was staying at the Robertson Residences at Bukit, in Kuala Lumpur. Tributes have poured in for the software engineer. One social media user wrote to the family, they said: "So sorry for your his soul rest in peace, may God comfort n give strength to you n family in this difficult times. Sending love & hugs from Ipoh, Malaysia." Another added: "Deepest condolences and heartfelt sympathy to the family." Jordan Johnson-Doyle's death shares some similarities to that of Brit tourist Tyler Kerry, 20, who was found dead in a lift shaft in Turkey. Tyler was found unresponsive inside a lift shaft at the Trendy Lara Hotel in Antalya last year. It was believed Tyler opened the door believing the lift had arrived and walked through and into the empty shaft.