Feeds

'Unconvincing' Met top cop Yates: My phone was hacked

But I didn't think it was worth investigating

Choosing a cloud hosting partner with confidence

John Yates, Metropolitan Police Assistant Commissioner, claimed today at a parliamentary hearing into the ongoing phone-tapping allegations against News International publications that his voicemail had been illegally intercepted too.

He told the Home Affairs select committee, chaired by Labour MP Keith Vaz, that he was "99 per cent certain" his phone messages had been hacked into by unknown individuals in 2005-06.

"Who by, I don't know. The records don't exist any more."

Yates admitted that he regretted not re-opening the Met's original investigation into phone-hacking claims in 2009. However, he said he would not be stepping down from his role, despite political pressure urging him to resign.

"I felt the evidence had been followed," he said.

He spent one day in 2009 looking at the initial investigation into phone-hacking, but concluded that there was nothing worth pursuing further.

Yates blamed News International, the sister company of Rupert Murdoch-owned News Corp, for failing to provide evidence sooner about whose voicemails had been intercepted.

He said it was "unfair", based on the lack of action by NI, for people to be calling for the assistant commissioner to stand down from his job.

Labour MP Tom Watson, who repeatedly tried over the years to to get a new investigation into phone-hacking allegations at News International underway, said on the BBC's Newsnight programme last night that he felt Yates's position was now "untenable".

At the the conclusion of the assistant commissioner's grilling by MPs today, Vaz told Yates: "Your evidence is unconvincing ... you may be hearing from us again."

Deputy assistant commissioner Sue Akers is leading the current Met probe into the hacking scandal, which has already led to the sudden closure of sullied Sunday tabloid News of the World – the newspaper at the centre of many of the damning allegations that continue to unravel.

Akers will be speaking to the Home Affairs committee later today. ®

Business security measures using SSL

More from The Register

next story
Hey, Scots. Microsoft's Bing thinks you'll vote NO to independence
World's top Google-finding website calls it for the UK
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.