How widespread was phone hacking in high-profile investigations?

When ex-News of the World journalist Paul McMullan discussed the Milly Dowler case with Hugh Grant.

The following one exchange in the conversation which Hugh Grant recorded with Paul McMullan for the New Statesman now looks very interesting:

Me Ah . . . I think that was one of the questions asked last week at one of the parliamentary committees. They asked Yates [John Yates, acting deputy commissioner of the Metropolitan Police] if it was true that he thought that the NoW had been hacking the phones of friends and family of those girls who were murdered . . . the Soham murder and the Milly girl [Milly Dowler].
Him Yeah. Yeah. It's more than likely. Yeah . . . It was quite routine. Yeah - friends and family is something that's not as easy to justify as the other things.

Was phone hacking in high-profile police investigations really "quite routine"?

It would seem so. According to Channel 4 News Tom Watson MP has now raised serious concerns:

[Watson] said there was "a lot more to come out", including, he believed, allegations involving phone-hacking in the case of the Soham murders of schoolgirls Holly Wells and Jessica Chapman.
"Since I have been involved in this inquiry, there are a number of whistleblowers that I have spoken to and I believe there is a strong suspicion that one of the Soham parents was targeted by Glenn Mulcaire," he added.

When it first became clear that the Royal Household phones had been hacked, there was no logical reason why the phones of other public figures had not also been hacked. And so it turned out.

Similarly, if the tabloids could hack phones in the investigation into the disappearance of Milly Dowler, there is no logical reason why they were not routinely hacking the phones of victims and their friends and families during other high-profile investigations.

Someone should now look at tabloid reportage of all recent murder investigations for stories which could only be from phone hacking. It was probably a commonplace.

Indeed, it would be very interesting to see if any coverage of past murder investigations quietly disappears off tabloid websites tonight.

David Allen Green is legal correspondent of the New Statesman

David Allen Green is legal correspondent of the New Statesman and author of the Jack of Kent blog.

His legal journalism has included popularising the Simon Singh libel case and discrediting the Julian Assange myths about his extradition case.  His uncovering of the Nightjack email hack by the Times was described as "masterly analysis" by Lord Justice Leveson.

David is also a solicitor and was successful in the "Twitterjoketrial" appeal at the High Court.

(Nothing on this blog constitutes legal advice.)

Photo: Getty
Show Hide image

Cambridge Analytica and the digital war in Africa

Across the continent, UK expertise is being deployed online to sway elections and target dissidents.

Cambridge Analytica, the British political consultancy caught up in a huge scandal over its use of Facebook data, has boasted that they ran the successful campaigns of President Uhuru Kenyatta in the 2013 and 2017 Kenyan elections. In a secretly filmed video, Mark Turnbull, a managing director for Cambridge Analytica and sister company SCL Elections, told a Channel 4 News’ undercover investigative reporting team that his firm secretly stage-managed Kenyatta’s hotly contested campaigns.

“We have rebranded the entire party twice, written the manifesto, done research, analysis, messaging. I think we wrote all the speeches and we staged the whole thing – so just about every element of this candidate,” Turnbull said of his firm’s work for Kenyatta’s party.

Cambridge Analytica boasts of manipulating voters’ deepest fears and worries. Last year’s Kenyan election was dogged by vicious online propaganda targeting opposition leader Raila Odinga, with images and films playing on people’s concerns about everything from terrorism to spiralling disease. No-one knows who produced the material. Cambridge Analytica denies involvement with these toxic videos – a claim that is hard to square with the company’s boast that they “staged the whole thing.” 

In any event, Kenyatta came to power in 2013 and won a second and final term last August, defeating Odinga by 1.4 million votes.

The work of this British company is only the tip of the iceberg. Another company, the public relations firm, Bell Pottinger, has apologised for stirring up racial hostility in South Africa on behalf of former President Jacob Zuma’s alleged financiers – the Gupta family. Bell Pottinger has since gone out of business.

Some electoral manipulation has been home grown. During the 2016 South African municipal elections the African National Congress established its own media manipulations operation.

Called the “war room” it was the ANC’s own “black ops” centre. The operation ranged from producing fake posters, apparently on behalf of opposition parties, to establishing 200 fake social media “influencers”. The team launched a news site, The New South African, which claimed to be a “platform for new voices offering a different perspective of South Africa”. The propaganda branded opposition parties as vehicles for the rich and not caring for the poor.

While the ANC denied any involvement, the matter became public when the public relations consultant hired by the party went to court for the non-payment of her bill. Among the court papers was an agreement between the claimant and the ANC general manager, Ignatius Jacobs. According to the email, the war room “will require input from the GM [ANC general manager Jacobs] and Cde Nkadimeng [an ANC linked businessman] on a daily basis. The ANC must appoint a political champion who has access to approval, as this is one of the key objectives of the war room.”

Such home-grown digital dirty wars appear to be the exception, rather than the rule, in the rest of Africa. Most activities are run by foreign firms.

Ethiopia, which is now in a political ferment, has turned to an Israeli software company to attack opponents of the government. A Canadian research group, Citizens Lab, reported that Ethiopian dissidents in the US, UK, and other countries were targeted with emails containing sophisticated commercial spyware posing as Adobe Flash updates and PDF plugins.

Citizens Lab says it identified the spyware as a product known as “PC Surveillance System (PSS)”. This is a described as a “commercial spyware product offered by Cyberbit —  an Israel-based cyber security company— and marketed to intelligence and law enforcement agencies.”

This is not the first time Ethiopia has been accused of turning to foreign companies for its cyber-operations. According to Human Rights Watch, this is at least the third spyware vendor that Ethiopia has used to target dissidents, journalists and activists since 2013.

Much of the early surveillance work was reportedly carried out by the Chinese telecom giant, ZTE. More recently it has turned for more advanced surveillance technology from British, German and Italian companies. “Ethiopia appears to have acquired and used United Kingdom and Germany-based Gamma International’s FinFisher and Italy-based Hacking Team’s Remote Control System,” wrote Human Rights Watch in 2014.

Britain’s international development ministry – DFID – boasts that it not only supports good governance but provides funding to back it up. In 2017 the good governance programme had £20 million at its disposal, with an aim is to “help countries as they carry out political and economic reforms.” Perhaps the government should direct some of this funding to investigate just what British companies are up to in Africa, and the wider developing world.

Martin Plaut is a fellow at the Institute of Commonwealth Studies, University of London. He is the author of Understanding Eritrea and, with Paul Holden, the author of Who Rules South Africa?