Feeds

Ex–News International boss Brooks denies bribing cops

Says she only recently learned of Milly Dowler phone hacking

5 things you didn’t know about cloud backup

News Corp boss Rupert Murdoch stood by Rebekah Brooks this afternoon at a parliamentary hearing about the phone-hacking scandal at his sister company News International.

Brooks, of course, resigned from her job as NI CEO on 15 July. Two days later she was arrested on suspicion of conspiring to intercept communications and of corruption allegations relating to illegal police payments.

Murdoch told MPs that he "believed her and trusted her, and I do trust her," when asked about Brooks' exit from News International.

He explained that she "insisted" on leaving the company and claimed her initial survival had nothing to do with the closure of NI's tabloid newspaper the News of the World.

Murdoch said he couldn't comment on the possibility of editors not knowing about phone-hacking methods taking place at the newspaper, given the ongoing police investigations.

"It was my understanding that [Colin] Myler [the tabloid's final editor] was appointed by [Les] Hinton [Murdoch's right-hand man for 52 years until last Friday when he submitted his resignation, hours after Brooks' exit was confirmed] to find out what the hell was going on. That is my understanding of it. I cannot swear to the accuracy of it," he said.

Brooks, who is currently being grilled by MPs, said she "never paid a police officer or knowingly sanctioned payment to a police officer".

She said that the "News of the World employed private investigators like most papers in Fleet Street" in the late 90s and early 2000s.

However, Brooks – who edited the Sunday tabloid from 2000 to 2003 – claimed that she didn't typically authorise payments to such individuals, even though she did acquire a budget from senior management for the running of the paper.

"The managing editor authorises final payments," she said,"unless there is a particularly big item ... then the editor will be brought in."

She claimed she had no knowledge at the time that a phone belonging to Milly Dowler, who was murdered in 2002, had been hacked by an employee working on the NotW.

"When I first heard of it was two weeks ago. Sorry, but that's how it is." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.