Buy

Books
Click images for more details

Twitter
Support

 

Recent comments
Recent posts
Links

A few sites I've stumbled across recently....

Powered by Squarespace
« Climate cuttings 57 | Main | Mashive attack »
Saturday
Aug062011

More on phone hackers

It's always interesting when someone you have met is in the news, particularly if it is in relation to a major scandal. We have discussed the links between UEA's media management team and the phone hackers, but another odd connection between Climategate and illegal accessing of voicemails has recently emerged.

In the early days of the Climategate story, I was visited by David Leigh, the investigations editor of the Guardian. I discussed the resulting article here. At the time I thought it odd that such a senior journalist would be visiting me, particularly since the Guardian's coverage of Climategate had been the exclusive preserve of the usual suspects from its environment team. However, Leigh had told me that he had a holiday cottage in Scotland and had been assigned to visit me because he was going to be in the area anyway.

Leigh's name has come to prominence in recent days, with the UK's premier political blogger, Guido Fawkes, accusing the Guardian man of being involved in phone hacking. The evidence seems pretty incontrovertible, and Leigh appears to be highly unamused to have it broadcast to all and sundry. All good clean family fun.

In answer to the obvious questions, I doubt my own phone was hacked, simply because I didn't actually have a mobile at the time - I got my first one last summer.  Mrs Hill does wonder, however, if somebody from the Guardian could show me how to access voicemails on it.

 

PrintView Printer Friendly Version

References (1)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Response
    Response: Look At This
    - Bishop Hill blog - More on phone hackers

Reader Comments (51)

Protecting your phone from hacking is crucial in today's digital age, as our smartphones contain a wealth of personal and sensitive information.

Sep 26, 2023 at 4:25 PM | Unregistered CommenterHackerslist

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>