473,796 Members | 2,544 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

M'I`5,Pers ecution , why the s ecurity serv ices?

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= why the. security services? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

You may ask, why do I think the "they" referred. to are the security
services? Is there any evidence. that there is a single source, as opposed
to a. loosely based "whispering campaign" amongst many people? Even if there
is a single source, is there any evidence that "they" are. professional
"buggers". as opposed to amateurs, or perhaps people working for a privately
funded. organization?

a) As. to the question of a single source versus something more fragmented;
it is quite obvious that there is a single source from. the way the campaign
has been carried. out. Since things have been repeated verbatim which were
said in my home, there must be one group which does. the watching and
listening.. Since on several occasions (mainly during travel) people have
been planted in close proximity and rehearsed in what. they were to say, it
follows that someone must have done the planning for that, and again. a
single source is. indicated.

b) So why couldn't it be amateurs? Why couldn't it. be a private
organisation, for example a private detective agency paid to. manage the
campaign and undertake the technical aspects? Some detective. agencies are
unscrupulous as has been proved. on the occasions in the past when they've
been exposed or caught; they too. can have access to the bugging technology
deployed; and there are reported cases of. MI5 paying private eyes to do
their dirty work (against. peace campaigners and similar enemies of the
state) on the understanding that. if they were caught then they could deny
all knowledge. Why couldn't that be the. case?

The main factor. pointing to direct security service involvement (as opposed
to amateurs or MI5 proxies) is the breadth. of their access to the media in
particular, and the fact that the. television companies are so involved in
the campaign. The BBC would not. directly invade someone's home themselves,
since it would not be within their. remit to allocate personnel or financial
resources to do so. An. organisation of their stature would not take part in
a campaign set up by. private sources. The only people they would take
material from. would be the security services, presumably on the assumption
that if the cat ever flew out of the bag yowling it would be MI5. who would
take the. consequences.

State sponsorship for these acts of psychological terrorism. is also
indicated by duration; support for over. six years for a team of three or
four people would be beyond the means. and will of most private sources.
The viciousness of the. slanders and personal denigration also points to
MI5; they traditionally "protect" the British state from politicians. of the
wrong hue by character. assassination, and in this case are using their
tried and tested methods to murder with. words an enemy they have invented
for. themselves.

And there are precedents. Diana. and Hewitt were alleged to have been filmed
"at it" by an Army intelligence team which had operated in. Northern
Ireland, these allegations were made by someone called Jones. who had been
on the team. His statements were. denied by the defence establishment who
tried to character-assassinate. by describing him as the "Jones twins".
Funny how if you. tell the truth, then you must be ill, isn't it? Thought
only communists behaved. like that?

Hewitt later said that he'd been spoken. to by someone in the army who
revealed the existence of videotapes of him and Diana,. and that the tapes
would be published if any attempt was made by them. to resume their
association.

335

Jan 2 '08 #1
0 1507

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
2098
by: Mike Thomas | last post by:
This one must be very simple. I am trying to run an SQL Serv 7.0 stored proc from a VBA module in an Access 2000 app. This stored proc runs fine when I remove the parameters from the stored proc and from the CommandText string below, but when I run it as is I get the error SQL Serv Syntax Error or Access Violation on the "Execute" line. _ContactFetchLike 'Thom%' also works when I run it from the Query Analyser.
0
1095
by: ifvievfme | last post by:
MI5. Persecution Update: Friday 7 April, 2000 22,544 + 837 =. 23,381 Last weekend I delivered another 837 faxes to politicians. and the media on the subject of the. security service conspiracy which has destroyed my life. This brings the total in the last three years to. at least 23,381. These totals do. not include partially delivered faxes. Some of the recipients of. these faxes must know that what I say is
0
1054
by: fmifm | last post by:
MI5. Persecution Update: Friday 7 April, 2000 22,544 +. 837 = 23,381 Last weekend I delivered another 837 faxes to politicians and the. media on the subject of the security service conspiracy which. has destroyed my life. This brings the total. in the last three years to at least 23,381. These. totals do not include partially delivered faxes. Some of the recipients of these faxes must know that what. I say is
0
1457
by: veifiem | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-= -= Capital. Radio - Chris Tarrant -= -=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-= Capital Radio DJs have been "in on. it" from the start. One of the first things I heard. in the summer of 1990 was from a Capital DJ who said, "If he. listens to Capital then he can't be all bad" (supportive, you see. We're not bastards). Much of what came. over the radio in 1990 is now so far away the precise details have been...
0
1019
by: fimivief | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -= MI5:. cost of the operation -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Here's what a couple of other people on Usenet (uk.misc) had. to say regarding the cost. of running such an operation... PO: >Have some sense, grow up and. smell reality. What you are talking about PO: >would take. loads of planning, tens of thousands of pounds and lots of PO: >people involved in the. planning, execution and maintenance...
0
961
by: ivifefe | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -= MI5: cost. of the operation -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Here's what a couple of other people on. Usenet (uk.misc) had to say regarding. the cost of running such an operation... PO: >Have some sense, grow up and smell reality. What. you are talking about PO: >would take loads of planning,. tens of thousands of pounds and lots of PO: >people involved in the planning, execution and. maintenance...
0
1038
by: veieifefm | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -=. how and why did it start? -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The harassment didn't start by itself, so someone. must have been there at the outset to give it a firm push and set. the "animals" after me. It looks as if I was set up. in June 1990, and the timing indicates someone from university. was responsible.
0
986
by: eieivi | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= why won't the British police do their job and. put a stop to it? -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The British police obviously do know what is taking. place. Besides my interpretations of what individual officers have said. which forces that conclusion, it would. be inconceivable for them to be unaware of something on. this...
0
1501
by: fvemifve | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= my response. to the harassment -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My. first reaction in 1990/91 was to assume that if I broke contact then they would not be able to follow and would lose interest.. So I did the things that have been suggested by other people; I sold. my television, stopped listening to the radio and tried. to withdraw away from the sources of abuse as much as possible. I...
0
9680
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9528
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10456
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9052
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7548
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6788
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5442
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4118
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3731
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.