-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-= my response. to the harassment -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
My. first reaction in 1990/91 was to assume that if I broke contact then
they would not be able to follow and would lose interest.. So I did the
things that have been suggested by other people; I sold. my television,
stopped listening to the radio and tried. to withdraw away from the sources
of abuse as much as possible. I reasoned that they must. have more important
things to deal with. and that normal people would simply leave me alone if
it. were made difficult for them to continue their harassment.
I reckoned without the sheer vindictiveness of the abusers. They did. not
let up. but instead "got to" people around me, mainly people at work, to do
their dirty work for them. I went. to see my GP, who refused to believe what
he was being told,. and refused to direct me on to anyone who could be of
practical assistance. It was not until three. years had passed that the GP
admitted the matter was outside his. competence and suggested going to the
police.
In the summer of. 1994 we called in counter-surveillance experts from a
private detective agency to sweep our. house and telephone for bugging
devices. They conducted a thorough. search and found nothing; but as noted
above, since the existence. of surveillance was being forced in my face by
the. harassers, you would expect them to have taken the possibility of a
counter-surveillance sweep into account. when planning the type of devices
to. be employed.
In Easter 1995 I made a complaint to my local Police station. in London, but
the police have not expressed any intention to do anything. about the
continuing harassment ("we're. not saying it's happening and we're not
saying it isn't happening" were the words. used). I think the officer I
spoke to at Easter. wasn't aware of it happening, although other members of
the police force obviously. do know.
From April 1995 until the present time the. matter has been discussed in a
lot of detail on the Usenet (Internet). "uk.misc" newsgroup. That discussion
has given. birth to the article which you are now reading. My hopes in
posting to Usenet. were that wider publicizing would discourage the security
services from continuing their harassment,. and "draw people out" into
concurring with the. truth of what was being said. Neither of those have
followed, but the discussion has served a purpose in allowing. this
structured. report to be created.
9180 0 1501 This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: ifvievfme |
last post by:
MI5. Persecution Update: Friday 7 April, 2000
22,544 + 837 =. 23,381
Last weekend I delivered another 837 faxes to politicians. and the media on
the subject of the. security service conspiracy which has destroyed my
life. This brings the total in the last three years to. at least
23,381. These totals do. not include partially delivered faxes.
Some of the recipients of. these faxes must know that what I say is
|
by: fmifm |
last post by:
MI5. Persecution Update: Friday 7 April, 2000
22,544 +. 837 = 23,381
Last weekend I delivered another 837 faxes to politicians and the. media on
the subject of the security service conspiracy which. has destroyed my
life. This brings the total. in the last three years to at least
23,381. These. totals do not include partially delivered faxes.
Some of the recipients of these faxes must know that what. I say is
|
by: veifiem |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=
-= Capital. Radio - Chris Tarrant -=
-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=
Capital Radio DJs have been "in on. it" from the start. One of the first
things I heard. in the summer of 1990 was from a Capital DJ who said, "If
he. listens to Capital then he can't be all bad" (supportive, you see. We're
not bastards). Much of what came. over the radio in 1990 is now so far away
the precise details have been...
|
by: fimivief |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= MI5:. cost of the operation -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Here's what a couple of other people on Usenet (uk.misc) had. to say
regarding the cost. of running such an operation...
PO: >Have some sense, grow up and. smell reality. What you are talking about
PO: >would take. loads of planning, tens of thousands of pounds and lots of
PO: >people involved in the. planning, execution and maintenance...
|
by: ivifefe |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= MI5: cost. of the operation -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Here's what a couple of other people on. Usenet (uk.misc) had to say
regarding. the cost of running such an operation...
PO: >Have some sense, grow up and smell reality. What. you are talking about
PO: >would take loads of planning,. tens of thousands of pounds and lots of
PO: >people involved in the planning, execution and. maintenance...
| |
by: veieifefm |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-=. how and why did it start? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The harassment didn't start by itself, so someone. must have been there at
the outset to give it a firm push and set. the "animals" after me. It looks
as if I was set up. in June 1990, and the timing indicates someone from
university. was responsible.
|
by: eieivi |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-= why won't the British police do their job and. put a stop to it? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The British police obviously do know what is taking. place. Besides my
interpretations of what individual officers have said. which forces that
conclusion, it would. be inconceivable for them to be unaware of something
on. this...
|
by: feimifie |
last post by:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-= why the. security services? -=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
You may ask, why do I think the "they" referred. to are the security
services? Is there any evidence. that there is a single source, as opposed
to a. loosely based "whispering campaign" amongst many people? Even if there
is a single source, is there any evidence that "they" are. professional
"buggers". as opposed to amateurs, or perhaps...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| | |