Police probe into claims of computer hacking by Murdoch's News International

Filed Under: Law & order, Malware

News of the WorldScotland Yard is expanding its investigation into the now defunct The News of the World, and its parent company News International, by investigating possible cases of computer hacking alongside the hacking of mobile phone voicemail systems.

Operation Tuleta will investigate allegations that Trojan horses were used to break into the email systems and computers of individuals, in the hope of gathering information that could be used in newspaper stories.

The investigation follows claims, made by BBC's Panorama earlier this year, that Ian Hurst, a former British army intelligence officer who had served in Northern Ireland, was the target of the computer hack "for a sustained period during 2006".

It's suggested that the News of the World believed that Hurst held information on a high-ranking mole in the IRA.

According to the Panorama report, copies of emails sent from Hurst's computer were stolen by a Trojan horse installed by a hacker.

Panorama

Secretly filmed footage in the BBC Panorama programme saw the unnamed hacker claim that he emailed Hurst a Trojan horse from a bogus email address, in order to gain access to the emails.

The programme went on to claim that copies of the stolen information were faxed to a journalist in the Murdoch empire, the then editor of the News of the World for Ireland, Alex Marunchak.

Marunchak strongly denies the accusation.

And there are other alleged incidents of computer hacking too.

Billie PiperRemember "Belle de Jour", the high class escort played by Billie Piper in the "Secret Diary of a Call Girl" TV show?

In real life, the series was based on the blog of Dr Brooke Magnanti, who wrote about her life as a high class escort.

Magnanti recently suggested that The Sunday Times, another paper in Rupert Murdoch's News International media empire, might have attempted to hack into her computer by sending her a Trojan horse via email.

It's important that everyone remembers that installing a virus or Trojan horse onto someone else's computer without their authorisation is against the law - and can lead to a lengthy jail sentence.

Just because something can be done, doesn't mean that it should be done.

Operation Tuleta's goal is to discover if anyone broke the law in this and associated cases.

, , , , , , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley is an award-winning security blogger, and veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Send Graham an email, subscribe to his updates on Facebook, follow him on Twitter and App.net, and circle him on Google Plus for regular updates.