473,327 Members | 1,919 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,327 software developers and data experts.

M'I`5,Persec ution , wh y the s ecurity se rvices?

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= why. the security services? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

You may ask, why. do I think the "they" referred to are the security
services? Is there any evidence. that there is a single source, as opposed
to a loosely based "whispering campaign" amongst. many people? Even if there
is a single source, is there any evidence that "they" are. professional
"buggers" as opposed to amateurs, or perhaps. people working for a privately
funded. organization?

a) As to the question of. a single source versus something more fragmented;
it is quite obvious that. there is a single source from the way the campaign
has been. carried out. Since things have been repeated verbatim which were
said in my home, there must be one group which. does the watching and
listening. Since on several occasions (mainly during travel) people. have
been planted in close proximity and rehearsed in what they were to. say, it
follows that someone must. have done the planning for that, and again a
single source is. indicated.

b) So why couldn't it be. amateurs? Why couldn't it be a private
organisation, for example a private detective agency paid to. manage the
campaign and undertake. the technical aspects? Some detective agencies are
unscrupulous as has been proved. on the occasions in the past when they've
been exposed. or caught; they too can have access to the bugging technology
deployed; and there are reported cases of MI5 paying private eyes. to do
their dirty. work (against peace campaigners and similar enemies of the
state) on the understanding that if they were caught. then they could deny
all knowledge. Why couldn't that. be the case?

The main factor. pointing to direct security service involvement (as opposed
to amateurs. or MI5 proxies) is the breadth of their access to the media in
particular, and the fact that the television companies. are so involved in
the campaign. The BBC would not directly invade. someone's home themselves,
since it would not be within their. remit to allocate personnel or financial
resources to do so. An organisation of their stature would not. take part in
a. campaign set up by private sources. The only people they would take
material from would be the security. services, presumably on the assumption
that if the cat ever flew out. of the bag yowling it would be MI5 who would
take the. consequences.

State sponsorship. for these acts of psychological terrorism is also
indicated by duration; support for over six years for a. team of three or
four people would be beyond the means. and will of most private sources.
The viciousness. of the slanders and personal denigration also points to
MI5; they traditionally "protect" the British state. from politicians of the
wrong hue by character assassination, and in. this case are using their
tried and tested methods to murder with words an enemy they. have invented
for. themselves.

And there are precedents. Diana and Hewitt were alleged. to have been filmed
"at it" by an Army intelligence team. which had operated in Northern
Ireland, these. allegations were made by someone called Jones who had been
on the team. His statements were. denied by the defence establishment who
tried to character-assassinate by. describing him as the "Jones twins".
Funny how if you. tell the truth, then you must be ill, isn't it? Thought
only communists behaved. like that?

Hewitt later said that he'd been spoken to by someone in the army. who
revealed the existence of videotapes of him and Diana,. and that the tapes
would be published if any attempt was made by them. to resume their
association.

327

Jan 2 '08 #1
0 1020

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: serge calderara | last post by:
Dear all, I need to make a strategic decision on an application where data security is important. Collected data must be stored in a database and I need to creat an application uins vb.NET to...
0
by: Carlos Wong | last post by:
I have a problem... I need to do a SQL script runner. Somenthing like the query analizer, but hidding the code. I try with the sqlCommand, but doesn't work. The scripts have: "go"es,...
8
by: andrewcw | last post by:
In this case I would like my application to be able to use exisiting registered COM components. I dont want to re-register them. While I am copying the interop DLL with the exe to the same...
0
by: Henry | last post by:
Using ideas provided by some of you I was able to figure out how to get the names of the parameters fields of a crystal report specified at run time. The code below just basically puts the...
4
by: Gaijinco | last post by:
I made this function which given two strings c1 and c2 test if with the letters of both you can exactly form the string c3, so for exaple c1 = "evol" c2= "ution" and c3 = "evolution" will yield...
5
by: Mitchell Vincent | last post by:
I've recently started signing all EXEs that come out of here. I would like to verify the signature at startup to detect any changes to the EXE itself. Is something like that possible? I'm using...
3
by: jonathan184 | last post by:
basically i am trying to get to some log files from the windows servers. The servers ftp s disabled and telnet is disabled, only way i could login is through rdp, is there a way php could login...
0
by: bill gates | last post by:
I was trying to use msbee to build an old project. I don't want to upgrade to dotnet2.0. Is there any way to get this to compile using DevStudio 2005 using dotnet1.1. ? Build FAILED....
0
by: feimifie | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -= why the. security services? -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= You may ask, why do I think the "they" referred. to are the security services? Is there any...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
1
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.