Feeds

NotW bosses fight back over hacking claims

Never done nothin' or nothin'

Protecting users from Firesheep and other Sidejacking attacks with SSL

Tory communications boss Andy Coulson has assured MPs that he played no part in either condoning or facilitating phone hacking while editor of the News of the World.

Coulson quit as NoTW editor in 2007 after the paper's royal correspondent, Clive Goodman, and a private investigator accomplice, Glen Mulcaire, were jailed for hacking into the voicemail inboxes of Royal aides. Coulson told the Commons' Culture and Media Committee of MPs on Tuesday that he resigned even though he didn't know about Goodman's illegal action, because as editor he bore "ultimate responsibility" for what his staff did.

"My instructions to the staff were clear - we did not use subterfuge of any kind unless there was a clear public interest in doing so," Coulson said. "They were to work within the PCC [Press Complaints Commission] code at all times."

He said he gave reporters freedom and resources to do their job and that he didn't micro-manage stories. Coulson further stated he never met Mulcaire and that payments made to the disgraced private eye, although large, didn't stand out as exceptional.

The Goodman mobile phone hacking scandal was reopened late last month after The Guardian reported that News International made payouts of £1m after getting sued by Gordon Taylor, head of the Professional Footballers' Association, and two others, since identified as PFA lawyers. The Guardian further alleged in a series of articles that 3,000 celebrities and sportspeople had their phones hacked, and that many journalists used private eyes to hunt for gossip by obtaining illegal access to driving records, police and tax databases.

Coulson denied knowing anything about either the paper's botched investigation into Taylor or the subsequent privacy breach settlement, which it emerged on Tuesday was approved by James Murdoch, News International's executive chairman. Proceedings took an odd turn when the former editor turned Tory spindoctor claimed that police warned his own mobile phone might have been hacked into earlier this month. Coulson told MPs there was more evidence that he'd been the victim of phone hacking than former deputy prime minster John Prescott, who complained loudly about alleged invasion of his privacy by NotW reporters when the story re-emerged earlier this month.

The Guardian produced copies of a contract between the NotW and private investigator Glen Mulcaire, as well as copies of emails containing transcripts of hacked voicemails when its journalists appeared before MPs last week.

However, current News of the World editor Colin Myler maintained there was no evidence of "systematic illegality" at the paper, sticking to the company line that Goodman was a rogue reporter acting illegally without the knowledge of management at Wapping. Myler said new safeguards had been established since the Goodman case to prevent further illegality.

"These [safeguards] include the introduction of strict protocols on cash payments, and on the level of justification, authorisation and auditing of cash payments," Myler said, the BBC reports. "Since I took over as editor, cash payments for stories and tip-offs have been reduced by between 82 per cent and 89 per cent," he added.

During a combative committee session, News International lawyer Tom Crone questioned whether Labour MP Tom Watson ought to be permitted to ask questions.

Watson is suing The Sun, which like the NotW is published by News International, for alleged libel. Committee chairman, Tory MP John Whittingdale, said he'd taken legal advise from the Speaker's office which cleared Watson's attendance.

News of the World managing editor Stuart Kuttner called foul on the presence of Tory MP Philip Davies on the committee over commentary he was made to the media on the case, arguing he'd pre-judged matters. Whittingdale said the Commons committee wasn't a court of law, where stricter rules on alleged bias apply, in allowing his colleague Davies to remain at the hearing.

Live updates from the hearing can be found in a Guardian story here. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.