logo
Moment armed police chainsaw their way through cocky gang leader's front door after he flooded the streets with £2m of drugs in just three months

Moment armed police chainsaw their way through cocky gang leader's front door after he flooded the streets with £2m of drugs in just three months

Daily Mail​13-05-2025

Armed police ripped through the front door of a gang leader's house after he flooded the streets with £2million worth of drugs in just three months.
Officers arrested Asrar Rafiq, 35, after they cracked the secretive EncroChat messaging service used by organised criminals.
He used the encrypted systems to boast about his wealth, under the name 'Wisehorse', to discuss drug deals and offer weapons including including AK47S and Uzis, to other criminals.
Rafiq continued to sell drugs and weapons despite being one of 12 gang members given an injunction in 2014 after being described as a leading member of the Bordesley Green gang in Birmingham.
A court heard he had supplied 28kg of heroin and cocaine, worth around £2million, over three months.
He was finally caught when he was arrested at his home in Aston, Birmingham, in June 2020.
Incredible footage shows the moment police officers raided the house using a chainsaw to smash through his front door in the early morning raid.
Bodycam shows the moment a stunned Rafiq emerged half-naked and bleary-eyed from the bedroom as officers swarmed the property.
Bodycam shows the moment a stunned Rafiq emerged half-naked and bleary-eyed from the bedroom
When he was arrested Rafiq claimed he was maliciously targeted by police until he was confronted by the damning EncroChat messages.
He admitted encouraging or assisting with the sourcing, advertising and sale of prohibited weapons and ammunition.
He also pleaded guilty to being concerned in the supply of cocaine and heroin.
Rafiq, of no fixed address, was jailed for 18-and-a-half years at Birmingham Crown Court last week.
Officers discovered he used EncroChat to share a list of weapons including AK47s and Uzis, which he told associates he would be able to secure for them.
The Regional Organised Crime Unit for the West Midlands (ROCUWM) discovered he used 13 different phone numbers in a bid to evade detection.
CCTV caught him using his phone while working out at a local gym.
But he was caught after police cracked the bespoke encrypted global communication service EncroChat, which was used exclusively by criminals.
Marketed as the 'world's most secure handset', the device was popular among hitmen, drug lords and other major criminals.
There were 60,000 users worldwide and around 10,000 users in the UK.
Police discovered Rafiq, using the nickname 'Wisehorse', had conversations with other gangsters about supplying drugs.
Detective Chief Inspector Peter Cooke, from ROCUWM, said: 'Rafiq tried to claim the messages were just bravado and that he was trying to big himself up to other drug dealers.
'The claim was described as 'fanciful'.
'He was clearly a significant player in the criminal underworld of firearms and drug dealing, which causes so much misery on the streets of the West Midlands and beyond.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Diner wearing high heels wanted £100k after ‘slipping on chocolate truffle'
Diner wearing high heels wanted £100k after ‘slipping on chocolate truffle'

Telegraph

time37 minutes ago

  • Telegraph

Diner wearing high heels wanted £100k after ‘slipping on chocolate truffle'

A high-heeled diner who claimed she slipped on a 'runaway truffle' while exiting a restaurant has lost her fight for £100,000 compensation. Rosina Malik, 62, twisted her ankle and broke her right wrist when she fell at Chapter One, a fine-dining restaurant in Farnborough Common, Kent. The fall happened after she stood to adjust her dress at the end of a three-course dinner with two friends. She blamed her accident on stepping on a 'runaway' caramel-filled chocolate truffle – which had been 'dropped but not retrieved' by a waiter during dessert. Mrs Malik sued the restaurant's owners, Simply Chapters Ltd, for up to £100,000 in damages. The restaurant denied liability and while not disputing that a truffle was dropped onto the floor, the restaurant's managers insisted Mrs Malik did not step on it before the accident. In a judgment at Central London county court this week, Judge Nigel Gerald ruled against Mrs Malik, finding that her right shoe had 'no contact' with the truffle. The 62-year-old told the court she was left 'in shock' after her fall, which left her with injuries to her ankle and wrist. The offending truffle was among a selection offered by the waiter which she and her friends decided to have boxed up. But the truffle fell from its dish while being transferred to the box, explained Mrs Malik, rolling off the edge of the table, where, she claimed, she subsequently trod on it, or its residue. The judge said that immediately after the accident everyone assumed the truffle was the culprit as it was found on the floor, while some of the chocolate remains were also on the sole of her shoe. A trawl through the restaurant's CCTV showed a more complex picture, the restaurant maintaining there was no point where Mrs Malik was in fact seen to stand on the caramel choc. Judge Gerald in his ruling said the traces of sticky caramel on her shoe probably ended up on the sole 'after the accident and before her shoes were removed'. Defence lawyers acting for the restaurant claimed Mrs Malik ended up on the floor after her right ankle 'inverted' and she tripped over, insisting that the 'runaway truffle' had nothing to do with the accident.

Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer
Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer

Daily Mail​

time38 minutes ago

  • Daily Mail​

Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer

Hackers who crippled Marks & Spencer during a devastating cyber-attack sent the retailer's boss an abusive email gloating about what they had done. Shameless digital fraudsters from the DragonForce hacking group reportedly sent the message to M&S chief executive, Stuart Machin using an employee email account. The email, sent in broken English on April 23, appears to confirm for the first time that M&S was hacked by the notorious ransomware group - something the retailer has so far refused to acknowledge. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, the BBC reported. 'The dragon wants to speak to you so please head over to [our darknet website].' A darknet link shared in the email connected to a portal for DragonForce victims to negotiate a ransom fee. The crime syndicate added: 'Let's get the party started. Message us, we will make this fast and easy for us.' The cyber hack over the Easter break has been hugely damaging for British high street staple, M&S, costing an estimated £300million. Six months on from the digital blitz, and the retailer is still unable to take online orders. The hack has cause mayhem for Marks & Spencer meaning it was unable to process online orders. The retailer later warned some customers' personal details had been stolen According to the BBC, the extortion email was sent to Mr Machin and seven other top executives. The blackmail message reportedly included a racist term. It was reportedly ended with an image of a fire-breathing dragon. As well as boasting about installing ransomware to cripple M&S's IT systems, the hackers said they had also stolen the private data of millions of customers. M&S informed customers three weeks later that contact details and dates of births from some shoppers had been snatched by a suspected cyber cartel. And the retailer also admitted other personal details had also been pilfered by digital crooks, including customers' order histories. However, bosses at the chain have insisted no data relating to shoppers' payment or card details, or account passwords, had been taken. It's unclear exactly how many shoppers have been affected by the major data breach. However, the group had 9.4 million active online customers in the year to March 30, according to its last full-year results. DragonForce's bragging email was apparently sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to M&S for over a decade. What is DragonForce? DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's thought the group operates globally, with hackers operating out of China. Researchers also believe the group also has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. The Indian IT worker had an M&S email address, but is a paid TCS employee and based in London. It is believed that he was among the victims hacked during the devastating digital blitzkrieg that has ravaged M&S online systems. The IT company has previously said it is investigating whether it was a gateway for the cyberattack. It has since told the BBC the email was not sent from its system and has nothing to do with the breach. M&S has declined to comment on the latest revelations in the hacking crisis. As well as claiming responsibility for the M&S hack, DragonForce also says it is behind the ongoing cyber-attack against the Co-op. The two hacks took place in April and have wrought chaos for both retailers. Empty shelves in some stores were reported by customers of both businesses, while M&S fears disruption to its services will continue into next month. However, experts believe it could take 'months' for M&S to fully recover from the hack, which wiped a staggering £1billion off the retailer's market value in the weeks after the mayhem. Matt Hull, head of threat intelligence at global cyber security company NCC Group, said the M&S meltdown could potentially have massive ramifications for shoppers. Warning of the impact, Mr Hull told MailOnline: 'The data breach at M&S is a stark reminder that no organisation is completely immune from cyber threats, and that all forms of customer data requires stringent protection.' He added cyber crooks could seek to use the data they have allegedly obtained to launch a fresh wave of attack on countless unsuspecting victims. 'Despite the absence of financial data or passwords, threat actors could potentially use the stolen information to launch targeted social engineering attacks,' he warned. It is unclear who the actual hackers involved in the DragonForce's alleged cyber assault actually are. The incident is being probed digital experts from Britain's own 'FBI', the National Crime Agency. DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's believed the group operates worldwide, with connections to countries across Asia, with some operating in China. Researchers believe the group has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. Members are known to include teenagers and young adults from the UK and US. A spokeswoman for M&S told MailOnline: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'

St Albans PE teacher banned for ‘sex with pupil' on night out
St Albans PE teacher banned for ‘sex with pupil' on night out

BBC News

timean hour ago

  • BBC News

St Albans PE teacher banned for ‘sex with pupil' on night out

A PE teacher has been banned from the profession after a panel ruled he had sex with a sixth form pupil while on a drunken night Green, now 33, said he was "adamant" the person he met outside a nightclub was a former student and 18 or over at the student, known as Pupil A, said the incident happened in 2017 when Mr Green worked at Nicholas Breakspear Catholic School in St Albans, Hertfordshire.A Teaching Regulation Agency (TRA) panel noted that Pupil A did not wish to press charges against Mr Green, but they found him guilty of unacceptable professional conduct. Mr Green had worked at Nicholas Breakspear between September 2016 and August 2019 before moving to St Columba's College in 2019, the panel college received an anonymous email in May 2022 claiming that Mr Green had had a sexual encounter with a pupil from Nicholas Breakspear while teaching was suspended while an investigation was carried out. 'Drunken state' In a statement to the college, included in the TRA ruling, Mr Green said: "All I remember is being in my friend's car outside (a) nightclub."I remember feeling very intoxicated whilst he was chatting to two girls through the window, and I think he offered them a lift home."All I remember from then is us suddenly being in a small field or park with my friend and the two girls and somehow four of us engaged in a sexual encounter," he said due to his "drunken state", he did not register who the two girls were – "only that I had a slight recognition of one of the girls".Mr Green continued: "When I woke up the following morning, it dawned on me why I may have recognised one of the girls."I assumed she may have been an ex-sixth-form student at Nicholas Breakspear School."I have no recollection of seeing her at school in my teaching role. I had never spoken to her or taught her."He said he did not notify the school as he had "no reason to believe she was a current student". 'Immensely sorry' The panel heard that in a police report from July 2022, Pupil A told an officer she had had sex with Mr Green while she was at the police decided that it was "more likely than not that Mr Green had sex with Pupil A when she was a pupil at the school".It accepted that Mr Green "may not have realised" she was a student where he worked, but that he "did have some recognition" of TRA banned Mr Green from teaching indefinitely, subject to a five-year review concluded that "Mr Green, while intoxicated, made a deliberate decision to engage in sexual intercourse with Pupil A", but noted there was "no solid evidence to demonstrate he was aware she was a pupil at the school where he worked".In a written statement to the TRA, Mr Green said: "I am not the person I was in my early 20s."It was a shameful and embarrassing mistake that I hid from my friends, family and partner."As a result, I have focused on being the best person I can be in my career and in my relationships."He added: "I completely regret my past behaviour and I am immensely sorry." Follow Beds, Herts and Bucks news on BBC Sounds, Facebook, Instagram and X.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store