
Aberdeenshire councillor Geva Blackett vows 'never to shop in Aberdeen city centre again' after bus gate fine
A Deeside councillor has vowed never to shop in Aberdeen city centre again after being slapped with a fine for accidentally driving through a bus gate.
Geva Blackett recently found herself 'entangled in blue paint' as she tried to cross from the Bon Accord Centre to Union Square.
The independent councillor, who lives in Braemar, comes to Aberdeen every two months to get her hair done at Linton and Mac on Netherkirkgate.
This trip, she tells The P&J, would usually be combined with some grocery shopping at the former Marks and Spencer a short walk away at St Nicholas Square.
The flagship store closed earlier this month as retail bosses focus on the £15 million expansion of their Union Square branch.
And Mrs Blackett thought this would be a great opportunity to check out the revamp, buy some strawberries for her grandchildren and make a day of her visit to the city.
This was until she suddenly found herself 'trapped' in the Guild Street bus gate…
Speaking to The Press and Journal, Mrs Blackett admits that as an Aberdeenshire resident she didn't really know what the bus gates were or how to navigate them.
So when it came to her first attempt at crossing through the city centre, she thought 'the responsible thing to do' would be to seek advice from Google Maps.
However, the app suggested that the quickest way to Union Square would be through Guild Street, which is now strictly for buses and taxis.
It wasn't until Mrs Blackett saw the big blue patch with the words BUS GATE that she realised what she had done.
'I just knew…,' she said.
'I went home and told my husband that I've been through the bus gates, but I was just doing what Google Maps was telling me to do…
'I've read about the bus gates but I hadn't really thought about it much. Living in Braemar, they don't really affect you, do they? Until you get caught that is.'
A few days later, Mrs Blackett was served the 'very threatening' bus gate fine for £100, allowing her to pay £50 then and there, or £150 later on if she ignored it.
She paid it, but is now adamant to never risk ending up in this situation again.
Business leaders in Aberdeen have previously warned the 'anti-car' rejig of the city centre is a deterrent for Aberdeenshire shoppers, who now prefer to go elsewhere.
And Mrs Blackett agrees with that, stressing that the bus gates put off particularly those – like herself – who are not necessarily confident with driving in the big city.
She adds: 'You're watching what other cars are doing, you're concentrating in traffic, thinking of where you're trying to go, and then suddenly – BLUE PAINT! What is that?
'And then, I couldn't do anything when I realised I was in the middle of it… I was so confused that I gave up the idea of going to M&S altogether and just carried on.
'So instead of making a day of it – perhaps going to Union Square after my hairdresser, seeing a film, having a meal, doing some shopping – I did nothing and got a fine for it.'
Mrs Blackett has now vowed never to attempt driving through Aberdeen city centre and go for her shopping to Westhill instead.
The 'worst of it all', she adds, is that it is the high street retailers that will bear the brunt of it all.
And she says that she fully backs them in their battle against the traffic restrictions, which they are now on the verge of taking to court.
Council data shows that city leaders will be forced to refund £1m worth of bus gate fines to drivers if traders succeed in their crusade to get the system scrapped.
'I feel very sorry for the retailers, and I'm definitely on side with them,' Mrs Blackett adds.
'I can't see myself going back to that part of Aberdeen so that's another potential shopper the city has lost.
'Unless you really understood the bus gates, why would you risk a £100 fine?
'From now on, I'm just going to go to my hairdresser, then turn around and go to Westhill.'

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Telegraph
3 hours ago
- Telegraph
M&S food sales growth collapses after cyber attack
Rapid growth at Marks & Spencer's food business has ground to a halt after the retailer was struck by a devastating cyber attack that left shelves empty. New figures seen by The Telegraph show that spending in M&S's food halls rose by 0.8pc in the four weeks to May 17 compared with a year earlier. The data covered a period when the retailer was in the initial throes of the hack. It marks a major slowdown from the rampant growth experienced by the retailer over the past year. According to the unpublished figures from analysts at NIQ, grocery spending at M&S had been up by 11pc in the 12 months to May 17. It has consistently ranked among the fastest-growing supermarkets in recent months. The NIQ data showed M&S sold fewer items in the four weeks to May 17 compared with the same period last year and its market share slipped to 3.3pc, compared with 3.6pc in the year as a whole. M&S slipped below Waitrose in the ranks of the largest grocers as a result, having overtaken the retailer for the first time in November. Previous figures had suggested M&S had escaped a major hit from the cyber attack. Separate data from Kantar recently suggested that M&S grocery sales rose by 8pc in the four weeks to May 18 and by 12.3pc in the 12 weeks to the same date. Kantar uses a different methodology, which does not include grocery sales from delivery apps such as Deliveroo. The NIQ survey data shed fresh light on the effect of the cyber attack that has crippled M&S. M&S was forced to halt online orders in mid-April after being struck by a cyber incident, which also disrupted food deliveries into stores. It led to gaps on shelves and forced the retailer to pause some offers in some stores. The attack has been blamed on criminal gang Scattered Spider. Stuart Machin, M&S's chief executive, was reportedly directly contacted by the hackers, with an abuse-filled email seen by the BBC allegedly showing hackers gloated about the attack. M&S declined to comment on the report. Seven weeks after the company disclosed the attack, it is still battling to bring its IT systems back online. M&S has not yet brought back online orders, with disruption expected to continue until July. The retailer has already admitted that the attack will knock an estimated £300m off its profits this year, dealing a setback to Mr Machin's efforts to rapidly grow the retailer. Clive Black, an analyst at Shore Capital, said the hit to food sales was to be 'wholly expected post the cyber incident, when considerable disruption to store operations was evident, meaning lots of gaps at time, famine and feast in terms of product coming into stores managed by manual rather than automated processes'. However, he suggested M&S was likely to experience a 'robust bounce back' once the IT issues were resolved. Richard Hyman, a partner at Aria Intelligent Solutions, added: 'If there was ever a good time for this to happen to M&S, it's now when they're in a position of strength. If this had happened several years ago, I think that one would be much more worried about them.' A spokesman for M&S said: 'We have made good progress in growing our food business and gaining market share over the long term. The most recent Kantar report shows market share growth of over 12pc, which is ahead of the market and underlines our resilience. 'Our stores are back to normal for our customers and have been for some time. We are getting on with providing the best quality products and service for our customers. In fact, just this week, we have launched 100 new or upgraded M&S Food products for summer.'


The Sun
4 hours ago
- The Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. 2 2 The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations.


Daily Mail
10 hours ago
- Daily Mail
Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer
Hackers who crippled Marks & Spencer during a devastating cyber-attack sent the retailer's boss an abusive email gloating about what they had done. Shameless digital fraudsters from the DragonForce hacking group reportedly sent the message to M&S chief executive, Stuart Machin using an employee email account. The email, sent in broken English on April 23, appears to confirm for the first time that M&S was hacked by the notorious ransomware group - something the retailer has so far refused to acknowledge. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, the BBC reported. 'The dragon wants to speak to you so please head over to [our darknet website].' A darknet link shared in the email connected to a portal for DragonForce victims to negotiate a ransom fee. The crime syndicate added: 'Let's get the party started. Message us, we will make this fast and easy for us.' The cyber hack over the Easter break has been hugely damaging for British high street staple, M&S, costing an estimated £300million. Six months on from the digital blitz, and the retailer is still unable to take online orders. The hack has cause mayhem for Marks & Spencer meaning it was unable to process online orders. The retailer later warned some customers' personal details had been stolen According to the BBC, the extortion email was sent to Mr Machin and seven other top executives. The blackmail message reportedly included a racist term. It was reportedly ended with an image of a fire-breathing dragon. As well as boasting about installing ransomware to cripple M&S's IT systems, the hackers said they had also stolen the private data of millions of customers. M&S informed customers three weeks later that contact details and dates of births from some shoppers had been snatched by a suspected cyber cartel. And the retailer also admitted other personal details had also been pilfered by digital crooks, including customers' order histories. However, bosses at the chain have insisted no data relating to shoppers' payment or card details, or account passwords, had been taken. It's unclear exactly how many shoppers have been affected by the major data breach. However, the group had 9.4 million active online customers in the year to March 30, according to its last full-year results. DragonForce's bragging email was apparently sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to M&S for over a decade. What is DragonForce? DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's thought the group operates globally, with hackers operating out of China. Researchers also believe the group also has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. The Indian IT worker had an M&S email address, but is a paid TCS employee and based in London. It is believed that he was among the victims hacked during the devastating digital blitzkrieg that has ravaged M&S online systems. The IT company has previously said it is investigating whether it was a gateway for the cyberattack. It has since told the BBC the email was not sent from its system and has nothing to do with the breach. M&S has declined to comment on the latest revelations in the hacking crisis. As well as claiming responsibility for the M&S hack, DragonForce also says it is behind the ongoing cyber-attack against the Co-op. The two hacks took place in April and have wrought chaos for both retailers. Empty shelves in some stores were reported by customers of both businesses, while M&S fears disruption to its services will continue into next month. However, experts believe it could take 'months' for M&S to fully recover from the hack, which wiped a staggering £1billion off the retailer's market value in the weeks after the mayhem. Matt Hull, head of threat intelligence at global cyber security company NCC Group, said the M&S meltdown could potentially have massive ramifications for shoppers. Warning of the impact, Mr Hull told MailOnline: 'The data breach at M&S is a stark reminder that no organisation is completely immune from cyber threats, and that all forms of customer data requires stringent protection.' He added cyber crooks could seek to use the data they have allegedly obtained to launch a fresh wave of attack on countless unsuspecting victims. 'Despite the absence of financial data or passwords, threat actors could potentially use the stolen information to launch targeted social engineering attacks,' he warned. It is unclear who the actual hackers involved in the DragonForce's alleged cyber assault actually are. The incident is being probed digital experts from Britain's own 'FBI', the National Crime Agency. DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's believed the group operates worldwide, with connections to countries across Asia, with some operating in China. Researchers believe the group has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. Members are known to include teenagers and young adults from the UK and US. A spokeswoman for M&S told MailOnline: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'