Feeds

Max Clifford takes £1m to drop hack probe

Kiss and don't tell

The Power of One eBook: Top reasons to choose HP BladeSystem

Celebrity publicist Max Clifford has agreed to accept a £1m plus payoff in exchange for dropping phone hacking allegations against the News of the World.

Clifford's settlement over allegations that the paper intercepted his voicemail messages, means the case will not proceed to court, and that News of the World publisher News International admits no wrongdoing The Guardian reports. Gordon Taylor, chief executive of the Professional Footballers' Association and two others footballers' union execs agreed to a £1m settlement on much the same terms last year.

The privacy violation lawsuits brought by both Clifford and Taylor arise from the activities of disgraced former News of World royal correspondent Clive Goodman and a private eye associate, Glenn Mulcaire. Goodman and Mulcaire were jailed in 2007 after they were convicted of hacking into the voice mail messages of royal aides. Mulcaire also admitted to hacking into the voicemail boxes of Clifford, Taylor, Liberal Democrat MP Simon Hughes, supermodel Elle Macpherson and football agent Andrew Skylet.

News International has consistently maintained that only a handful of public figures were bugged by a rogue reporter who acted without the permission or knowledge of his editorial bosses. The police declined to re-open the case after news of the Taylor payoff was broken by The Guardian last July.

The paper has been doggedly investigating the case since last summer, seeking to uncover evidence that phone tapping of celebrities and public figures was a routine tactic at the News of the World during the time when Andy Coulson, current Tory communications director, edited the paper. The Guardian said other victims of the snooping included Prince William, Prince Harry, former Culture Secretary Tessa Jowell, Mayor of London Boris Johnson, George Galloway MP and the former Executive Director of the Football Association, David Davies.

A Press Complaints Commission inquiry last November sided with News International and concluded there was "no evidence that it was materially misled by the News of the World, and no evidence that phone message hacking is ongoing".

However, another inquiry from the Commons Culture, Media and Sport Select Committee was less convinced by testimony from News International execs and accused them of "obfuscation" and "collective amnesia". ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.