Friday, 29 July 2011

'Phone Hacking: Think Laterally

At each stage in the 'phone hacking avalanche of the past month, people have asked: what's next ? If that's happening, what else ? The 'authorities' are now musing that perhaps computer hacking should be brought into the frame.

And the rest !
Given that newspaper men (and women) are in frequent and personal contact with all manner of other furtive fellows, and that they doubtless compare notes on methods etc, here's a couple of other suggestions for expanding
the scope of enquiries.

- what do we imagine certain unscrupulous former journalists that were in the employ of Blair and Brown in government, used to get up to when the full resources of MI5 were at their disposal ?

- ditto the respective Whips offices

As for the police ... let's simply note that everyone's worst fears about the impossibility of ID card data being kept secure have been realised in full.

There is so much more to come tumbling out of the closet on this issue - it may even distract us from the forthcoming meltdown of the financial system !

ND

9 comments:

Steven_L said...

When have you got the 'meltdown' pencilled in for then Nick? 2012? 2013?

measured said...

Investigating the practices of the Whips and their relationship with MPs' expenses is well overdue. I wish some would speak out, but I doubt they will.

Philipa said...

Indeed! I think the problem is one of so much of it that we get immune from disgust.

Budgie said...

Good point, ND. I have not seen this elsewhere. To add to it: CamClegg have broken their cast iron pledge to remove innocent people from the police DNA register.

Anonymous said...

I live in the (probably deluded) hope that MI5 resisted Blair and his cronies and have a nice, fat file to place before the Court when Blair, Clown, Campbell et al are finally in the dock at the Hague.

Nick Drew said...

Steven - put it this way, I am back into silver again (and can't quite agree with CU that 1,600 is high for gold)

timing is everything, n'est-ce pas?, but I don't have a precise date in mind: read Too Big To Fail to see how erratic and unpredictable the processes are

nearest I can get: it will be a rolling breakdown, starting soon - and 'rolling' is important ...

measured, Philipa - yes, I think this one had got, as close as it's possible to imagine, to the point where so much of the establishment was involved, the story could never come out

never thought I'd hear myself saying this, but thank God for the Grauniad, and they're no saints - it's usually left to Private Eye to carry the burden

Budgie - thanks: neither have I

anon - well sorry to disabuse you: but generally speaking the machine works as one ...

Peter said...

Nick, you plainly don't have a clue about how MI5 (or Secutity Service as it's correctly called) operates.

rogerh said...

Just suppose the coppers found that journos had been hacking cellphones in real-time. I think this would not be made public - damage confidence at home and damage the effectiveness of an expensive worldwide listening infrastructure. So, just how many people do you know who regularly use voicemail? Too good to be true?

diogenes said...

so why not just delete voicemails when listened to?