Feeds

Brooks, Coulson to be CHARGED over phone-hacking

Eight suspects face 'realistic prospect of conviction', says CPS

Internet Security Threat Report 2014

Rupert Murdoch's one-time right-hand woman Rebekah Brooks, and Prime Minister David Cameron's ex-spin chief Andy Coulson, face "a realistic prospect of conviction" of alleged phone-hacking offences, the Crown Prosecution Service said this morning.

Erstwhile News International boss Brooks, who had edited the Sun and the now-defunct News of the World - which was the Sunday redtop at the centre of the phone-hacking scandal that rocked Murdoch's media empire - will be charged with conspiring to intercept communications without lawful authority.

The CPS added that this charge applies to six other suspects - including Coulson who also held an editor tenure at the NotW. The allegations cover a period between 3 October, 2000 and 9 August, 2006.

The full list of suspects facing prosecution are journalists named by the CPS as: Brooks, Coulson, Stuart Kuttner, Greg Miskiw, Ian Edmondson, Neville Thurlbeck and James Weatherup.

Private detective Glenn Mulcaire will be charged with unlawfully intercepting communications, rather than conspiring to intercept, the CPS said. It added that a total of 19 charges have been brought against the suspects.

"The communications in question are the voicemail messages of well-known people and/or those associated with them," said Alison Levitt QC, who is the principal legal advisor to the director of public prosecutions.

"There is a schedule containing the names of over 600 people whom the prosecution will say are the victims of this offence," she added.

All of the suspects face additional conspiracy charges relating to phone hacking.

Levitt then pointed to a long list of victims that included murdered schoolgirl Milly Dowler, MPs such as David Blunkett and Charles Clarke, and celebrities including Angelina Jolie, Brad Pitt, Jude Law and Delia Smith.

Prosecutors had mulled over bringing charges against 11 suspects in the phone-hacking saga under Scotland Yard's Operation Weeting investigation.

However, Levitt concluded that there was "insufficient evidence" against three of those individuals, meaning that there was no "realistic prospect of conviction".

She said: "It follows that no further action will be taken in relation to them."

Two other suspects are being investigated by detectives, who have asked Levitt to defer making her decision while further enquiries are made. ®

Click to the next page to see the full charge sheet released by the CPS.

Remote control for virtualized desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.