473,320 Members | 1,865 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,320 software developers and data experts.

M'I`5,Pers ecution , why the s ecurity serv ices?

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= why the. security services? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

You may ask, why do I think the "they" referred. to are the security
services? Is there any evidence. that there is a single source, as opposed
to a. loosely based "whispering campaign" amongst many people? Even if there
is a single source, is there any evidence that "they" are. professional
"buggers". as opposed to amateurs, or perhaps people working for a privately
funded. organization?

a) As. to the question of a single source versus something more fragmented;
it is quite obvious that there is a single source from. the way the campaign
has been carried. out. Since things have been repeated verbatim which were
said in my home, there must be one group which does. the watching and
listening.. Since on several occasions (mainly during travel) people have
been planted in close proximity and rehearsed in what. they were to say, it
follows that someone must have done the planning for that, and again. a
single source is. indicated.

b) So why couldn't it be amateurs? Why couldn't it. be a private
organisation, for example a private detective agency paid to. manage the
campaign and undertake the technical aspects? Some detective. agencies are
unscrupulous as has been proved. on the occasions in the past when they've
been exposed or caught; they too. can have access to the bugging technology
deployed; and there are reported cases of. MI5 paying private eyes to do
their dirty work (against. peace campaigners and similar enemies of the
state) on the understanding that. if they were caught then they could deny
all knowledge. Why couldn't that be the. case?

The main factor. pointing to direct security service involvement (as opposed
to amateurs or MI5 proxies) is the breadth. of their access to the media in
particular, and the fact that the. television companies are so involved in
the campaign. The BBC would not. directly invade someone's home themselves,
since it would not be within their. remit to allocate personnel or financial
resources to do so. An. organisation of their stature would not take part in
a campaign set up by. private sources. The only people they would take
material from. would be the security services, presumably on the assumption
that if the cat ever flew out of the bag yowling it would be MI5. who would
take the. consequences.

State sponsorship for these acts of psychological terrorism. is also
indicated by duration; support for over. six years for a team of three or
four people would be beyond the means. and will of most private sources.
The viciousness of the. slanders and personal denigration also points to
MI5; they traditionally "protect" the British state from politicians. of the
wrong hue by character. assassination, and in this case are using their
tried and tested methods to murder with. words an enemy they have invented
for. themselves.

And there are precedents. Diana. and Hewitt were alleged to have been filmed
"at it" by an Army intelligence team which had operated in. Northern
Ireland, these allegations were made by someone called Jones. who had been
on the team. His statements were. denied by the defence establishment who
tried to character-assassinate. by describing him as the "Jones twins".
Funny how if you. tell the truth, then you must be ill, isn't it? Thought
only communists behaved. like that?

Hewitt later said that he'd been spoken. to by someone in the army who
revealed the existence of videotapes of him and Diana,. and that the tapes
would be published if any attempt was made by them. to resume their
association.

335

Jan 2 '08 #1
0 1484

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Mike Thomas | last post by:
This one must be very simple. I am trying to run an SQL Serv 7.0 stored proc from a VBA module in an Access 2000 app. This stored proc runs fine when I remove the parameters from the stored proc...
0
by: ifvievfme | last post by:
MI5. Persecution Update: Friday 7 April, 2000 22,544 + 837 =. 23,381 Last weekend I delivered another 837 faxes to politicians. and the media on the subject of the. security service conspiracy...
0
by: fmifm | last post by:
MI5. Persecution Update: Friday 7 April, 2000 22,544 +. 837 = 23,381 Last weekend I delivered another 837 faxes to politicians and the. media on the subject of the security service conspiracy...
0
by: veifiem | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-= -= Capital. Radio - Chris Tarrant -= -=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-= Capital Radio DJs have been "in on. it" from the start. One of the first things I...
0
by: fimivief | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -= MI5:. cost of the operation -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Here's what a couple of other people on Usenet (uk.misc) had. to say regarding the cost. of...
0
by: ivifefe | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -= MI5: cost. of the operation -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Here's what a couple of other people on. Usenet (uk.misc) had to say regarding. the cost of...
0
by: veieifefm | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -=. how and why did it start? -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- The harassment didn't start by itself, so someone. must have been there at the outset to give it...
0
by: eieivi | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= why won't the British police do their job and. put a stop to it? -=...
0
by: fvemifve | last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= my response. to the harassment -= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My. first reaction in 1990/91 was to assume that if I broke contact then they would...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
0
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
0
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.