Feeds

NotW 'targeted' phone of Sarah Payne's mum

Bent PI had number of Brooks-given blower, says report

High performance access to file storage

The mother of murdered eight-year-old girl Sarah Payne reportedly had her mobile phone targeted by the News of the World's private investigator Glen Mulcaire.

Ex-News International boss Rebekah Brooks, who edited the Sunday tabloid between 2000 and 2003, has repeatedly championed Sarah's Law, a scheme that allows parents to check if someone with regular access to their children has a history of child sex offences.

Since illegal voicemail interception allegations against the News Corp-owned company re-appeared to eventually engulf the NotW, which was shuttered earlier this month, Brooks has repeatedly stood by the paper's campaign on Sarah's Law and counts it as a personal achievement during her editorship at the tabloid.

According to the Guardian, police officers working on Scotland Yard's Operation Weeting investigation uncovered Mulcaire's notes containing personal details about Sara Payne, bereaved mother of Sarah Payne, the girl who was abducted and later killed in 2000.

It's understood Payne learned of the discovery on Tuesday. Friends of hers told the Guardian that she was "absolutely devastated and deeply disappointed" by the revelation.

Payne originally thought her phone had not been hacked by anyone working at the now-defunct tabloid and wrote a farewell column for the final edition of the NotW, thanking the staff there for their support.

A phone said to have been given to Payne by Brooks as a gift to help her stay in touch with supporters of Sarah's Law is understood to be the one targeted by Mulcaire.

Labour MP Tom Watson, who recently grilled Murdoch, his son James and Brooks at a select committee hearing into the phone-hacking scandal, described the latest disclosure as "a new low."

The discovery by police investigating illegal voicemail allegations at the NotW follows shocking revelations about murder victim Milly Dowler, whose phone was allegedly hacked and messages deleted while police were still searching for the teenager. The erasure of the messages gave Milly's family false hope that she might still be alive. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.