Labour MSP calls for Murrell ‘perjury’ investigation over Salmond texts

The Scottish Labour interim leader wrote to the high court Procurator Fiscal on Monday.

Labour MSP calls for Murrell ‘perjury’ investigation over Salmond texts

Jackie Baillie has urged the Crown Office to investigate whether or not the SNP’s chief executive has “committed perjury”.

Peter Murrell appeared before the committee set up to scrutinise the botched handling of complaints against Alex Salmond in December.

Previously, text messages had come to light from him regarding the Alex Salmond allegations but Mr Murrell, husband of First Minister Nicola Sturgeon, said no other messages in the same vein existed.

Jackie Baillie
Jackie Baillie wrote to the high court Procurator Fiscal (Fraser Bremner/Scottish Daily Mail/PA)

Scottish Labour interim leader Jackie Baillie said on Monday: “The Crown Office has indicated to the committee that they have text and WhatsApp messages.

“This was raised by Gordon Jackson QC at the preliminary hearing of the criminal trial of Alex Salmond, and Nicola Sturgeon said in an interview yesterday with Andrew Marr that there were no more relevant messages, suggesting that there are other messages.

“However, it is not her place to decide this – it is for the committee to make that call.

“The committee is also aware of information placed in the public domain that text and WhatsApp messages exist – just not the content of those messages.”

In a letter to high court Procurator Fiscal Kenny Donnelly, Ms Baillie said an “urgent” investigation into Mr Murrell’s statements should be launched.

She wrote: “Given that his evidence was taken under oath, I regard this as a very serious matter and I understand from parliamentary lawyers that committing perjury is considered to be a criminal offence.

“As the Crown Office have all the text and Whatsapp messages secured during the evidence-gathering phase of the criminal trial against Alex Salmond, you will be in a position to know whether any more exist than the two already in the public domain.

“I would therefore be very grateful if you would confirm that you will undertake an urgent investigation into whether Peter Murrell has committed perjury.”

The Crown Office said it would respond to Ms Baillie “in due course”.

The Scottish Tories have backed calls for the investigation, with Murdo Fraser – a member of the committee – saying: “The SNP’s story changes every time they or their civil servants appear in front of the Salmond inquiry.

“What is clear is that Peter Murrell’s story simply does not add up and he has serious questions to answer.

“It is time we got to the truth of the matter about what senior SNP figures knew and when, rather than them trying to decide what is relevant information.

“The Crown Office must urgently investigate the SNP chief executive’s evidence in order to guarantee that this committee was presented with a true version of events.”

Sorry, we are not accepting comments on this article.

Top Stories

More From The Guernsey Press

Business

Sam Field - Sure's Enterprise Solutions Product Manager discusses how the global pandemic and restrictions on movement have led to an increased dependency on digital services for both businesses and consumers, and to a large extent, pretty much everyone has had to adapt to new ways of working. Enforced lockdown has seen a massive rise in the use of collaboration services, and workforce transformations have taken place before our very eyes. Digital communications in whatever format have massively increased the amount of business data in circulation. Cybercriminals quickly identified dispersed working as a major opportunity, and have responded with pandemic themed scams and attacks to steal information and data. Whilst cyberattacks on individuals are very upsetting, they are generally easier to spot and deal with. A ‘take no action’ approach to any form of contact outside the norm is the key learning point on a personal level, and nobody can claim to be so smart they are not vulnerable. The workplace however is a much more complex environment with hierarchical relationships, managerial directives and business systems that aren’t always the simplest to operate. There’s a greater scope for cybercrime in organisations with operational complexity, and the value of data and information that can be stolen or extorted tends to be higher. Furthermore, it isn’t just criminals who are interested in business data. There are many business information platforms and other data centric organisations who are benefitting from the wealth of information flowing around the digital economy. And for many island organisations, protecting intellectual property (IP) from cybercriminals and other interested parties is vital. The arms race between data protection, criminals and legal data hunters is here for the long-haul as organisations strive to protect their businesses, customers, revenues and reputation. The focus still remains on cybercrime though, and the five overriding threats that are targeting hybrid working environments are: Email Phishing Defined as the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity. Covid phishing activity often impersonates government and health authorities to deceive users into sharing confidential information such as payment and account credentials. When hackers break into corporate networks, they often take their time monitoring emails and activity, to maximise the impact of their attack. Criminals then mimic existing accounts and send emails instructing people to take action … do this, click here, update that, … all in an attempt to obtain the information and the access to funds they are looking for. SMS Phishing Also known as ‘Smishing’, is text messaging fraud that tries to lure victims into taking action. Clicking on links in texts can activate the downloading of malware that will reveal and extract sensitive account information. The increased use of smartphones for so much business activity exposes organisations to an extended perimeter, through a non-PC based zone of extended vulnerability. Fraudulent Domains Or domain spoofing, is also associated with phishing. Attackers use a ‘bogus domains’ to impersonate a company or its employees. This can be done by sending emails with false domain names which appear legitimate, or by setting up websites with slightly altered characters that look authentic, and asking you to take action that will compromise your security. Counterfeit Apps A counterfeit app is an app that claims to do something, but is actually fake, ineffective, or harmful to a user's device and information. They have been found on legitimate app stores including Apple and Google Play, where they have not yet been detected or reported. They aim to defraud users by offering fake functionality, and stealing data. Malware Malware is software that has been intentionally designed to cause damage or harm to a computer, server, client, or computer network - often for the purposes of extorting money. A wide variety of malware exist, including viruses, worms, trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. Malware exists for a number of reasons: such as causing malicious damage, and stealing financial details and sensitive information. Ransomware is a form of malware where attacks are designed to block access or take down sites until a sum of money is paid. Clear and Present Danger The average cost of a business cyberattack is estimated to be £3million, and around half of the cyberattacks involve email phishing, a figure that’s 20% higher than the global average. We partner with Mimecast, a ‘Gartner Magic Quadrant’ global cyber security leader, to provide a unique range of on and off-shore services. Cloud based, layered security provides advanced safeguarding and business continuity, protecting email and messaging services, along with access to your securely archived information. Download Sure's 'Creating your Digital Workplace’ here: https://business.sure.com/assets/Uploads/Brochures/08f06cfb91/Sure_digital_workplace.pdf Download 'Unified Communications' brochure: https://business.sure.com/assets/Uploads/News-downloads/2a8fc619e6/Sure_Unified-Communications-Article.pdf Find more information about Sure's portfolio of flexible working solutions: https://business.sure.com/products-and-services/flexible-working-solutions/ Sponsored content

UK & International News