Feeds

Ex–News International boss Brooks denies bribing cops

Says she only recently learned of Milly Dowler phone hacking

Choosing a cloud hosting partner with confidence

News Corp boss Rupert Murdoch stood by Rebekah Brooks this afternoon at a parliamentary hearing about the phone-hacking scandal at his sister company News International.

Brooks, of course, resigned from her job as NI CEO on 15 July. Two days later she was arrested on suspicion of conspiring to intercept communications and of corruption allegations relating to illegal police payments.

Murdoch told MPs that he "believed her and trusted her, and I do trust her," when asked about Brooks' exit from News International.

He explained that she "insisted" on leaving the company and claimed her initial survival had nothing to do with the closure of NI's tabloid newspaper the News of the World.

Murdoch said he couldn't comment on the possibility of editors not knowing about phone-hacking methods taking place at the newspaper, given the ongoing police investigations.

"It was my understanding that [Colin] Myler [the tabloid's final editor] was appointed by [Les] Hinton [Murdoch's right-hand man for 52 years until last Friday when he submitted his resignation, hours after Brooks' exit was confirmed] to find out what the hell was going on. That is my understanding of it. I cannot swear to the accuracy of it," he said.

Brooks, who is currently being grilled by MPs, said she "never paid a police officer or knowingly sanctioned payment to a police officer".

She said that the "News of the World employed private investigators like most papers in Fleet Street" in the late 90s and early 2000s.

However, Brooks – who edited the Sunday tabloid from 2000 to 2003 – claimed that she didn't typically authorise payments to such individuals, even though she did acquire a budget from senior management for the running of the paper.

"The managing editor authorises final payments," she said,"unless there is a particularly big item ... then the editor will be brought in."

She claimed she had no knowledge at the time that a phone belonging to Milly Dowler, who was murdered in 2002, had been hacked by an employee working on the NotW.

"When I first heard of it was two weeks ago. Sorry, but that's how it is." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Microsoft EU warns: If you have ties to the US, Feds can get your data
European corps can't afford to get complacent while American Big Biz battles Uncle Sam
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.