Feeds

Northern Ireland's top cops 'hacked by NotW' - new claim

NI minister's PC also an alleged target

The Power of One eBook: Top reasons to choose HP BladeSystem

Senior police officers and a Cabinet minister may have been targeted for computer hacking by unscrupulous journalists at News International.

This is according to Sir Hugh Orde, president of the Association of Chief Police Officers (ACPO). At the time of the alleged hack, he was chief constable of the Police Service of Northern Ireland, a position he held until 2009.

He told a newspaper yesterday that he had been warned that computers he used may have been compromised by private investigators hired by the News of the World. Orde said he was furious and in disbelief when officers from The Met – working on Operation Tuleta* – told him he had been targeted, the Irish Independent reports.

The police chief is the latest in a string of senior figures involved in Northern Ireland intelligence who may have been targeted by hacks working for News international.

Police are also investigating leads suggesting the PC of Peter Hain – who was Secretary of State for Northern Ireland between 2005 and 2007 – might have been hacked. Hain was reportedly asked to confirm that sensitive information obtained by investigators might have originated from his computer.

A former British army intelligence officer tasked with handling informants within the IRA in Northern Ireland told the Leveson Inquiry into media ethics of his suspicions that he had also fallen victim to a malware-driven hack attack. Ian Hurst reckons his computer was compromised sometime during 2006. The possible motives for the alleged hacks, which raise obvious national security concerns, remain unclear.

Computer hacking tactics were also allegedly deployed against targets outside the Northern Ireland intelligence community. Actress Sienna Miller last week told the Leveson Inquiry of her suspicions that her email account had been broken into. Miller said her concerns stemmed from the content of notes made by disgraced private detective Glenn Mulcaire and shown to her by police.

Mulcaire was jailed for six months back in 2007 after he was convicted of hacking into the voicemail messages of royal aides at the behest of the News of the World. ®

Bootnote

* Operation Tuleta is a separate inquiry by the Metropolitan Police into alleged computer hacking by the press. It is running parallel to the more high-profile inquiries into mobile phone voicemail hacking and payments from the media to police. A 52-year-old man from Milton Keynes was arrested and questioned by officers working on Operation Tuleta late last month.

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.