Monday, January 27, 2014
Monday, January 13, 2014
News Corp executives ordered daily sweeps for bugs at its London offices over fears rivals were eavesdropping on its BSkyB takeover plans, the hacking trial heard today.
Head of security Mark Hanna, a Gulf war Veteran, was in charge of hunting for covert listening devices in the executive offices and suites.
The routine searches of the News International headquarters were increased to daily sweeps when Rupert Murdoch's News Corp was plotting its BSkyB takeover, the court heard.
"Offices were swept on various occasions to ensure no listening devices were in the executive offices or suites, which was perfectly normal and routine", said William Clegg QC, defending Hanna.
Mrs Viner replied: "It was normal and routine, as in other news organisations I have worked in."
Mr Clegg explained: "There were a number of reasons for that; one obviously was newspapers are very competitive with each other, and some journalists may be anxious to try to steal a scoop from a rival.
"One of the reasons for the sweeps was to avoid that possibility.
"In 2011, News Corp was trying to increase its shareholding in BSkyB, I think with the objective of becoming the majority shareholder.
"It was a sensitive topic at News Corp, and another reason why you would want to be sure discussions about such a matter were not broadcast to people who were potential competitors."
The court heard executives from News Corp Europe and Asia had offices in Wapping, and were part of the sweeps carried out by Mr Hanna, through a contracted company called White Rock.
Thursday, January 9, 2014
Friday, January 3, 2014
Note: Click on the interactive graphic.
When agents with the NSA's Tailored Access Operations (TAO) division want to infiltrate a network or a computer, they turn to their technical experts. This particular unit of the United States intelligence service is known internally as ANT. The acronym presumably stands for Advanced Network Technology, because that's what the division produces -- tools for penetrating network equipment and monitoring mobile phones and computers. ANT's products help TAO agents infiltrate networks and divert or even modify data wherever the NSA's usual methods won't suffice. You can read more about the TAO division, its strengths and tricks in a SPIEGEL feature that was published in English on Sunday.
SPIEGEL has obtained an internal NSA catalog describing ANT's various products, along with their prices. A rigged monitor cable, for example, which allows "TAO personnel to see what is displayed on the targeted monitor," goes for $30 (€22). An "active GSM base station" that makes it possible to mimic the cell phone tower of a target network and thus monitor mobile phones, is available for $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data undetected via radio link, are available in packs of 50, for over $1 million.