Feeds

NotW 'targeted' phone of Sarah Payne's mum

Bent PI had number of Brooks-given blower, says report

Security for virtualized datacentres

The mother of murdered eight-year-old girl Sarah Payne reportedly had her mobile phone targeted by the News of the World's private investigator Glen Mulcaire.

Ex-News International boss Rebekah Brooks, who edited the Sunday tabloid between 2000 and 2003, has repeatedly championed Sarah's Law, a scheme that allows parents to check if someone with regular access to their children has a history of child sex offences.

Since illegal voicemail interception allegations against the News Corp-owned company re-appeared to eventually engulf the NotW, which was shuttered earlier this month, Brooks has repeatedly stood by the paper's campaign on Sarah's Law and counts it as a personal achievement during her editorship at the tabloid.

According to the Guardian, police officers working on Scotland Yard's Operation Weeting investigation uncovered Mulcaire's notes containing personal details about Sara Payne, bereaved mother of Sarah Payne, the girl who was abducted and later killed in 2000.

It's understood Payne learned of the discovery on Tuesday. Friends of hers told the Guardian that she was "absolutely devastated and deeply disappointed" by the revelation.

Payne originally thought her phone had not been hacked by anyone working at the now-defunct tabloid and wrote a farewell column for the final edition of the NotW, thanking the staff there for their support.

A phone said to have been given to Payne by Brooks as a gift to help her stay in touch with supporters of Sarah's Law is understood to be the one targeted by Mulcaire.

Labour MP Tom Watson, who recently grilled Murdoch, his son James and Brooks at a select committee hearing into the phone-hacking scandal, described the latest disclosure as "a new low."

The discovery by police investigating illegal voicemail allegations at the NotW follows shocking revelations about murder victim Milly Dowler, whose phone was allegedly hacked and messages deleted while police were still searching for the teenager. The erasure of the messages gave Milly's family false hope that she might still be alive. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.