Free Hack Attack: How the Truth Caught up with Rupert Murdoch Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Free Hack Attack: How the Truth Caught up with Rupert Murdoch Pdf FREE HACK ATTACK: HOW THE TRUTH CAUGHT UP WITH RUPERT MURDOCH PDF Nick Davies | 448 pages | 27 Aug 2014 | Vintage Publishing | 9780701187309 | English | London, United Kingdom Hack Attack: How the Truth Caught Up with the World's Most Powerful Man by Nick Davies Davies began work on Hack Attack in July at the same time that parliamentarian Tom Watson began work on his work on the phone hacking scandal, Dial M for Murdoch. The book contains sixteen chapters divided into three sections; 'Crime and Concealment', 'The Power Game' and 'Truth'. The book is prefaced by a 'Who's Who' of people mentioned in the book and an author's note. An epilogue ends the book, followed by an appendix that lists 41 private investigators that were used by British newspapers; many of whom have been convicted of various crimes. It is, as well, the story of modern Britain and how its Hack Attack: How the Truth Caught Up with Rupert Murdoch and politics have been degraded by one man's ruthless acquisition of power Davies has laid it all bare in an exciting, clear and honest narrative It is a masterly summary of the hacking affair, as well as the ingenuity and persistence that lead to great journalism. Evidence is destroyed just before he gets his hands on it, the police redact documents so as to denude them of value. Then, just in the nick of time, a confidential source or secret document arrives. In that sense, the book moves right along, from cliffhanger to cliffhanger. True enough, he loves newspapering and has been known to become deeply involved in editorial matters, but no real case is made that he knew the specifics of how his papers were coming up with very private facts about public figures. A lone gunslinger takes on a dishonest town, and in the end the bad guys flee. It is both more complicated and a bit less satisfying in reality, but that would be another book, and probably a less enjoyable one. This book should be compulsory reading in journalism schools and must be read by anyone who wishes to understand Hack Attack: How the Truth Caught Up with Rupert Murdoch British politics actually works. A more critical review came from Will Gore in The Independent who wrote that Davies 'knows how to weave a compelling tale', and that his 'account of how Murdoch and his dysfunctional lieutenants ensnared, enslaved, and frightened generations of politicians is blistering. His unpicking of Scotland Yard's early failure properly to investigate phone-hacking is terrific — and depressing. Two reviewers critiqued Davies's epilogue to Hack Attack that was critical of neo-liberalism. Gore wrote that "Davies may be on the side of the just. But he is as ideologically driven as those he despises. It was announced in September that the American actor and producer George Clooney will direct a film adaption of Hack Attackand co-produce the film with Grant Heslovthrough their company Smoke House Pictures for Sony Pictures Entertainment. The fact that it's true is the best part. From Wikipedia, the free encyclopedia. Hack Attack: How the truth caught up with Rupert Murdoch. Random House. The Bookseller. Retrieved 5 September The Guardian. Retrieved 4 September Financial Times. The New York Times. The Daily Telegraph. The Independent. The Washington Post. The Boston Globe. Kirkus Reviews. Columbia Journalism Review. BBC News Online. Retrieved 13 November Phone Hacking Scandal". Namespaces Article Talk. Views Read Edit View history. Hack Attack: How the Truth Caught Up with Rupert Murdoch Learn to edit Community portal Recent changes Upload file. Download as PDF Printable version. Add links. The cover of the UK first edition. Non-fictionInvestigative journalism. Hack Attack - Wikipedia Read the definitive inside story of the News International Phone Hacking scandal, told by the man who exposed it. At first, it seemed like a small story. The royal correspondent of the News of the World was caught listening in on Buckingham Palace voicemails. He was quietly sent to prison and the case was closed. Davies and a network of rebel lawyers, MPs and celebrities took on Rupert Murdoch, one of the most powerful men in the world, and in bringing him down they uncovered a world of crime and cover-up reaching from the newsroom to Scotland Yard and to Downing Street. This is the story of a network of corruption rooted deep within our society, and how it was dragged into the light. I always hated Rupert Murdoch and his evil empire Fox "News", etcand nothing in this book makes me doubt myself. This is a loooong, detailed, painful dissection of the News of the World phone This is a very good read, although you will get angry at times as the story unfolds and truths are revealed. Following the story in the papers and on TV was interesting and revealing, but having it He has written six books including White Lies and Dark Heartand the bestselling Flat Earth Newsexposing falsehood and propaganda in news media. Hack Attack is his latest book. Hack Attack : How the truth caught up with Rupert Murdoch. Nick Davies. But Nick Davies felt sure there was a lot more going on. And he was Hack Attack: How the Truth Caught Up with Rupert Murdoch. February to July Inside the News of the World. July to 14 July Crime in Fleet Street. July to November Hack Attack: How the Truth Caught Up with Rupert Murdoch and lies. A wedding in the country. November to March The mogul and his governments. March to 15 December List of Illustrations. He has three children and lives in Sussex. Crime and Concealment. The Power Game. Hack Attack: How the truth caught up with Rupert Murdoch. Hack Attack: How the truth caught up with Rupert Murdoch - Nick Davies - Google книги Review by John Lloyd. What is revealed here, in painful, careful detail, is a journalism that held power in contempt — and, together with power, held in contempt people both famed and Hack Attack: How the Truth Caught Up with Rupert Murdoch, dominant and meek. Those whom the tabloids wished to destroy were swept into the maw of a press that devoured them, all the while proclaiming that it was engaged in the most righteous of tasks, that of uncovering hypocrisy and corruption. Hack Attack is a tale of talented, highly paid and ruthless men and women whose actions at the flaring end of popular newspaper journalism have left a great scar on civic life in Britain. That it was so comprehensively illuminated — by Davies and his colleagues, then by the inquiry conducted by Sir Brian Leveson — is a reassuring signal that great vices can suffer great falls. Their main trade was in sexual scandal, and it was dependable: at one time, writes Davies, they had collected files on secret affairs being conducted by two senior Metropolitan Police officers, the director of public prosecutions and the attorney-general. From the s, the NotW used the technique of hacking into mobile phone messages — simple enough, once you had the number and the pin code. Ironically, this made the stories more accurate: the reporters were plugged in to the real stuff. The engine of mud needed engineers: those here would have delighted Charles Dickens. On trial, with others, Brooks was acquitted of charges of perverting the course of justice; Coulson was given 18 months for conspiracy to intercept voicemails and faces further charges; while a few more who worked at the NotW were given shortish jail sentences. He is presented by Davies as a man with extraordinary Hack Attack: How the Truth Caught Up with Rupert Murdoch of dissimulation, wholly possessed by the company in whose interests he closed down the NotW inthe sacrifice a vain attempt to keep alive his bid to secure full ownership of the hugely profitable BSkyB. The three prime ministers Hack Attack: How the Truth Caught Up with Rupert Murdoch office just before and during the hacking revelations — Tony Blair, Gordon Brown and David Cameron — are drawn well, if with some unwarranted assumptions: Blair was not stopped from joining the euro by Murdoch but by his chancellor and successor. Blair decided that Murdoch could not be opposed, and thus courted but did not obey him except in small things and in rhetoric. Brown, more tortured, did much the same they shared a distrust, rightly as it turned out, of the euro. Cameron went much the furthest, enfolding Brooks into his set in Oxfordshire in addition to hiring Coulson, her former colleague and lover. The phone was hacked but the messages were not deleted. The golden times for the tabloids are over. But more important than any efforts to erect a regulatory mechanism is the blossoming of journalism on the internet. The medium offers the means to break down the elements of the tabloid package — scandal, gossip, sex, sport, polemic — and do each one more fully, more quickly, more interactively. Otherwise, Hack Attack is the book of a very bold reporter about a passage of arms that he won, to our great benefit. Get alerts on Leveson inquiry and phone hacking scandal when a new story is published. Accessibility help Skip to navigation Skip to content Skip to footer Cookies on FT Sites We use cookies opens in new window for a number of reasons, such as keeping FT Sites reliable and secure, personalising content and ads, providing social media features and to analyse how our Sites are used. Manage cookies. Leveson inquiry and phone hacking scandal. Review by John Lloyd August 1, Reuse this content opens in new window.
Recommended publications
  • A Quiet Revolution
    A quiet revolution The moral economies shaping journalists’ use of NGO-provided multimedia in mainstream news about Africa Katherine Wright Goldsmiths, University of London A thesis submitted for the degree of PhD in Media and Communications 2014 1 Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person, nor material which has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgement has been made in the text. 2 Acknowledgements With grateful thanks to my study participants for their time, trust and candour - without you there would be no study. I also want to thank my supervisor, Natalie Fenton, who manages to combine the sharpest of minds with the warmest of hearts. Your support has meant so much to me over the past few years. The encouragement and constructive criticism of others at Goldsmiths has also been invaluable, especially Aeron Davis, Des Freedman and Gholam Khiabany, who all kindly read drafts of chapters for me. Next, I want to note my debt to my dear colleagues in Journalism at the University of Roehampton. I especially want to thank Ros Coward, whose passionate belief that practitioners should ‘get into’ research started me off down this route in the first place. In addition, the words of advice and support from colleagues at other institutions have been really helpful, especially those of Mel Bunce, Lilie Chouliaraki, Glenda Cooper, Nick Couldry, Shani Orgad, Chris Paterson, Martin Scott, Helen Yanacopulos and Silvio Waisbord.
    [Show full text]
  • Cyberattack Attribution
    CYBERATTACK ATTRIBUTION A BLUEPRINT FOR PRIVATE SECTOR LEADERSHIP RESEARCH FELLOWS SENIOR RESEARCH FELLOWS Justin Collins Allison Anderson Cameron Evans Stacia Lee Chris Kim Kayley Knopf FACULTY LEAD Selma Sadzak Jessica Beyer Nicholas Steele Julia Summers Alison Wendler This report is a product of the Applied Research Program in the Henry M. Jackson School of International Studies at the University of Washington. The Applied Research Program matches teams of top-achieving Jackson School students with private and public sector organizations seeking dynamic, impactful, and internationally-minded analyses to support their strategic and operational objectives. For more information about the Applied Research Program please contact us at [email protected]. Executive Summary After three decades of development, adoption, and innovation, the Internet stands at the core of modern society. The same network that connects family and friends across the world similarly ties together all aspects of daily life, from the functioning of the global economy to the operation of governments. The digitization of daily life is the defining feature of the 21st century. While the pervasiveness of Internet-enabled technology brings significant benefits, it also brings serious threats—not only to our economy and safety, but also to our trust in computer systems.1 The Internet is central to modern life, yet major state-sponsored cyberattacks persist in disrupting Internet access and function. These attacks undermine faith in government and public trust in democratic institutions. Attribution attempts to date have been unable to deter states from building malicious code for even greater destructive capabilities. In response, we propose the formation of an attribution organization based on international private sector coordination.
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • The Puzzle of Media Power: Notes Toward a Materialist Approach
    International Journal of Communication 8 (2014), 319–334 1932–8036/20140005 The Puzzle of Media Power: Notes Toward a Materialist Approach DES FREEDMAN Goldsmiths, University of London In any consideration of the relationship between communication and global power shifts and of the ways in which the media are implicated in new dynamics of power, the concept of media power is frequently invoked as a vital agent of social and communicative change. This article sets out to develop a materialist approach to media power that acknowledges its role in social reproduction through the circulation of symbolic goods but suggests that we also need an understanding of media power that focuses on the relationships between actors, institutions, and contexts that organize the allocation of material resources concentrated in the media. It is hardly controversial to suggest that the media are powerful social actors, but what is the nature of this power? Does it refer to people, institutions, processes, or capacities? If we are to understand the role of communication as it relates to contemporary circumstances of neoliberalism, globalization, cosmopolitanism, and digitalization (which this special section sets out to consider), then we need a definition of media power that is sufficiently complex and robust to evaluate its channels, networks, participants, and implications. This article suggests that, just as power is not a tangible property visible only in its exercise, media power is best conceived as a relationship between different interests engaged in struggles for a range of objectives that include legitimation, influence, control, status, and, increasingly, profit. Strangely, one of the clearest metaphors for media power in recent years involves a horse.
    [Show full text]
  • Before the Murdoch Takeover: New Evidence Indicating the Need for a Further “Fit and Proper” Review
    Before the Murdoch takeover: new evidence indicating the need for a further “Fit and Proper” review AVAAZ, 8th March 2017. Submission for Karen Bradley, Secretary of State for Culture Media and Sport Introduction An acquisition of Sky Plc. by 21st Century Fox (21CF) would result in a major expansion of the influence of the Murdoch Family Trust (MFT) over Sky. In 2012 Ofcom was highly critical of the role of James Murdoch who was CEO and Chairman of News International during the period of criminal and other reprehensible conduct at that organisation. This submission details a long list of wrongdoings and criminal misgovernance that has emerged since Ofcom reviewed the licenses held by BSkyB in 2012. It also draws attention to an unfolding sexual harassment epidemic being unearthed at Fox News in the US. The Secretary of State notes in her 6th March 2017 letter1 to 21CF and Sky that 21CF’s record of compliance with the broadcasting code might reflect on the culture or corporate governance at 21CF. The “huge failings of corporate governance” at News Corporation, the precursor company to 21CF were noted in the Culture, Media and Sport Committee on News International and Phone Hacking and the Secretary of State herself acknowledges that James Murdoch’s actions during this time was a “failure of corporate governance.” The shocking scale of corporate misgovernance and criminal conduct make it incumbent upon the Secretary of State to exercise her powers under Section 58(3) of the Communications Act 2003, to refer the Sky bid on broader public interest grounds than those she currently says she is minded to exercise.
    [Show full text]
  • Linguistic Means of Expressing Gender in British Quality Newspapers
    Jihočeská univerzita v Českých Budějovicích Pedagogická fakulta Katedra anglistiky Diplomová práce Linguistic Means of Expressing Gender in British Quality Newspapers Jazykové prostředky vyjadřující rodovou neutralitu v britském seriózním tisku Vypracovala: Radka Mrňová Vedoucí práce: Mgr. Jana Kozubíková Šandová, Ph.D. České Budějovice 2013 Acknowledgements First and foremost, I would like to thank my supervisor, Mgr. Jana Kozubíková Šandová, Ph.D, for her generous guidance, invaluable advice, constant encouragement and support. I am also very grateful to Sheldon Bassett, M.A., for his language supervision and editorial comments. Prohlášení Prohlašuji, že jsem diplomovou práci na téma Linguistic Means of Expressing Gender in British Quality Newspapers vypracovala samostatně pouze s použitím pramenů uvedených v seznamu citované literatury. Prohlašuji, že v souladu s § 47b zákona č. 111/1998 Sb. v platném znění souhlasím se zveřejněním své diplomové práce, a to v nezkrácené podobě elektronickou cestou ve veřejně přístupné části databáze STAG provozované Jihočeskou univerzitou v Českých Budějovicích na jejích internetových stránkách, a to se zachováním mého autorského práva k odevzdanému textu této kvalifikační práce. Souhlasím dále s tím, aby toutéž elektronickou cestou byly vsouladu s uvedeným ustanovením zákona č. 111/1998 Sb. zveřejněny posudky školitele a oponentů práce i záznam o průběhu a výsledku obhajoby kvalifikační práce. Rovněž souhlasím s porovnáním textu mé kvalifikační práce s databází kvalifikačních prací Theses.cz provozovanou Národním registrem vysokoškolských kvalifikačních prací a systémem na odhalování plagiátů. V Českých Budějovicích 24. června 2013 …………………………. ABSTRACT This diploma thesis analyses various ways of expressing gender neutrality in present- day English. This is a highly contemporary issue to be traced in both written and spoken language.
    [Show full text]
  • A Better Death in a Digital Age: Post
    Publishing Office Aims and scope Abramis Academic ASK House Communication ethics is a discipline that supports communication Northgate Avenue practitioners by offering tools and analyses for the understanding of Bury St. Edmunds ethical issues. Moreover, the speed of change in the dynamic information Suffolk environment presents new challenges, especially for communication IP32 6BB practitioners. UK Tel: +44 (0)1284 700321 Ethics used to be a specialist subject situated within schools of philosophy. Fax: +44 (0)1284 717889 Today it is viewed as a language and systematic thought process available Email: [email protected] to everyone. It encompasses issues of care and trust, social responsibility and Web: www.abramis.co.uk environmental concern and identifies the values necessary to balance the demands of performance today with responsibilities tomorrow. Copyright All rights reserved. No part For busy professionals, CE is a powerful learning and teaching approach that of this publication may be reproduced in any mate- encourages analysis and engagement with many constituencies, enhancing rial form (including pho- relationships through open-thinking. It can be used to improve organization tocopying or storing it in performance as well as to protect individual well-being. any medium by electronic means, and whether or not transiently or incidentally Submissions to some other use of this Papers should be submitted to the Editor via email. Full details on submission – publication) without the along with detailed notes for authors – are available online in PDF format: written permission of the www.communication-ethics.net copyright owner, except in accordance with the provisions of the Copyright, Subscription Information Designs and Patents Act Each volume contains 4 issues, issued quarterly.
    [Show full text]
  • Opening Remarks CBA: Live in Kingston Kay Osborne, Board Member, CBA and General Manager, TV Jamaica Monday July 18Th 2011
    Opening Remarks CBA: Live in Kingston Kay Osborne, Board Member, CBA and General Manager, TV Jamaica Monday July 18th 2011 My name is Kay Osborne and I welcome you this evening, not in my usual TVJ role, but as a CBA board member, welcoming you on behalf of the Commonwealth Broadcasting Association. The CBA is the largest global association of broadcasters with a UK based Secretariat. With more than 100 members in over 50 countries, the CBA promotes media freedom and broadcast excellence, and supports members by providing a forum for knowledge exchange and learning, offering training opportunities and bursaries to the employees of member organizations. CBA members in Jamaica are RJR Communications Group and CVM. Associate members are CPTC and the Broadcasting Commission. This reception is part of a 3 event CBA engagement with Caribbean broadcast journalists. Information on the other 2 events, a training workshop for journalists and producers, and the production of a television programme, will be forthcoming momentarily. This CBA engagement on media and democracy, media and politics, media and corruption and media bias is well timed. Nothing rachets up debate on these issues like a general election and elections are due in Jamaica and in 2 other Caribbean countries next year. In addition, the Manatt enquiry that was broadcast live on television and the publication of Wikileaks stories by one then two newspapers have stimulated debate on media’s role in a democracy. Debate on these issues rages elsewhere. The use of Social Media in the Middle East and North Africa has led to unprecedented change towards democracy in some Arab countries.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • References for L'affaire Wakefield: Shades Of
    REFERENCES FOR L’AFFAIRE WAKEFIELD: SHADES OF DREYFUS 1 Alpha-1-Antitrypsin, Autism, And Coeliac Disease, John Walker-Smith and Judith Andrews, The Lancet, 1972; cited by Professor Walker-Smith in his autobiography, Enduring Memories, 2012, p. 211-3; Perinatal Measles Infection And Subsequent Crohn’s Disease. Ekbom A, Wakefield AJ, Zack M, Adami HO. Lancet 1994; Detection Of Immunoreactive Antigen, With A Monoclonal Antibody To Measles Virus, In Tissue From A Patient With Crohn's Disease, Hiroyuki Miyamoto, Tomoyuki Tanaka, Noritoshi Kitamoto, Yoshihiro Fukuda, Takashi Shimoyama, Journal of Gastroenterology, 1995 2 Closed Financial Loops, Kevin De Jesus-Morales and Vinay Prasad , The Hastings Center, 2017 3 Of Measles and Flu, Editor’s Choice, Fiona Godlee, October 2006 4 The Tamiflu Trials, Editorial by Elizabeth Loder, David Tovey, and Fiona Godlee, BMJ, 2014 5 The Next MMR – Could We Do Better? Fiona Godlee, Head of BMJ Knowledge, power point presentation, British National Formulary, 2004 6 Reflections on Investigating Wakefield, Brian Deer, BMJ, February 2, 2010 7 Deposition of Jane Smith, BMJ Deputy Editor June 28, 2012, Wakefield vs. BMJ (Texas litigation) BMJ 8523, p. 45-46 8 How The Case Against The MMR Vaccine Was Fixed, BMJ, January 6, 2011; How The Vaccine Crisis Was Meant To Make Money, BMJ, January 11, 2011; The Lancet’s Two Days To Bury Bad News, BMJ, January 18, 2011 9 Wakefield’s Article Linking MMR Vaccine And Autism Was Fraudulent , Editorial by Fiona Godlee, Editor-in-Chief; Jane Smith, Deputy Editor; Harvey Marcovitz, Associate Editor, BMJ, January 5, 2011 10 CNN, Anderson Cooper 360 Degrees, January 5, 2011 92 11 Merck’s MMR is the only one used in the U.S.
    [Show full text]
  • Feral Beast": Cautionary Lessons from British Press Reform Lili Levi University of Miami School of Law, [email protected]
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2015 Taming the "Feral Beast": Cautionary Lessons From British Press Reform Lili Levi University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Communications Law Commons, and the Comparative and Foreign Law Commons Recommended Citation Lili Levi, Taming the "Feral Beast": Cautionary Lessons From British Press Reform, 55 Santa Clara L. Rev. 323 (2015). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. TAMING THE "FERAL BEAST"1 : CAUTIONARY LESSONS FROM BRITISH PRESS REFORM Lili Levi* TABLE OF CONTENTS Introdu ction ............................................................................ 324 I. British Press Reform, in Context ....................................... 328 A. Overview of the British Press Sector .................... 328 B. The British Approach to Newspaper Regulation.. 330 C. Phone-Hacking and the Leveson Inquiry Into the Culture, Practices and Ethics of the Press ..... 331 D. Where Things Stand Now ...................................... 337 1. The Royal Charter ............................................. 339 2. IPSO and IM
    [Show full text]
  • Download a PDF File of the Index for Volume 34
    A index to volume 34 – 2012 compiled by h.e. knox Z INDEX Index of Authors: books reviewed are listed by author, with the title in italics and the reviewer’s name in brackets, followed by the issue number. Index of Reviewers: books reviewed are listed by reviewer, with the author’s name after the title. Subject Index: the subject is followed by the name of the author of the book discussed, with the reviewer’s name in brackets. Corres. refers to letters sent to the editor in response to the article listed, and printed in subsequent issues. Index of Original Contributions: all articles which are not strictly book reviews (features, diaries, poems, short stories) are listed here, as well as appearing in the index of authors. Index of Authors Abulafia, D.: The Great Sea: A Human History of the Bianchini, P.: Suret-Canale de la Résistance à l’anticolonialisme. Cockburn, P.: A Prehistory of Extraordinary Rendition. Mediterranean. (McGilchrist, N.) 34.6 (Johnson, R.W.) 34.18 (Feature) 34.17 Achebe, C.: There Was a Country: A Personal History of Biafra. Biggs, J.: Among the Writers. (Feature) 34.9 Coggan, P.: Paper Promises: Money, Debt and the New World (Adichie, C.) 34.19 Binet, L.: Translator Taylor, S. HHhH. (Newton, M.) 34.21 Order. (Kunkel, B.) 34.9 Acosta-Hughes, B. and Stephens, S.: Callimachus in Bloomer, M.: The School of Rome: Latin Studies and the Cohen, L.: All We Know: Three Lives. (Castle, T.) 34.18 Context. (Green, P.) 34.24 Origins of Liberal Education. (Whitmarsh, T.) 34.11 Coll, S.: Private Empire: ExxonMobil and American Power.
    [Show full text]