Feeds

Berlusconi snoops on G8

'Don't tell anyone, or they will all want it'

Internet Security Threat Report 2014

The G8 summit is meant to be an informal and secret meeting between heads of states assisted by one official known as a sherpa.

Throughout the event's history this privacy has been respected - no notes are taken and proceedings are not recorded. Except this year.

A secret audio link is relaying the conversations between the G8 leaders to a room filled with Italian officials. The purpose of this bug is apparently to improve the advice given to G8 chairman and Italian president Silvio Berlusconi, according to the FT.

A memo from one of the organisers of the conference, and obtained by the pink paper, said: "Pay attention not to tell the other delegations about our facility, otherwise they will all want it and that is not possible." Some organisers were concerned that this amounted to spying.

A spokesman for the scandal-struck Italian PM denied there were any listening devices installed. He said the only form of communication was the digital pens used by the sherpas. He also denied that an Italian TV host favoured by Berlusconi as his preferred way to explain his model-filled private life was also listening to discussions via the link.

The group, initially made up of France, Germany, Italy, Japan, the US, the UK first met in response to the economic crisis in 1975. Canada joined two years later and the Soviet Union got involved in 1991. The European Union is also represented, meaning it should really be called the G9. ®

Intelligent flash storage arrays

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.