Politics, parapolitics, history

Lobster Issues

Home  | Back Issues | Lobster Online


Search all issues:
All words (AND) Any words (OR)

Suggested search words:

BT EC 007 103 BBC BND BBC BNP CIA DEA DGS EEC ELF FBI IRA IRD JFK KGB KYP LBJ LSD MI5 MI6 MOD NSA SAS SIS UFO WPC Blair Brown Churchill Thatcher Wilson Clinton Kennedy Nixon Reagan Echelon Menwith Pentagon Cuba Egypt Iran Iraq Israel Libya Hess Hitler Murrell Fletcher Oyston MKULTRA disinformation espionage propaganda security surveillance mind Burgess Maclean Philby Diana Pope Vatican Oswald Ruby Bilderberg Pinay Communist Conservative Labour Liberal Tory Contras Irangate Watergate Spook BOSS Mossad assassinate conspiracy coup drugs intelligence murder propaganda secret spy suppressed Crozier Hollis Holroyd McWhirter Profumo Rothschild Shayler Stalker Tomlinson Wallace Wright Senator Kill Vote Fraud Embassy Fraud missile hidden gold nazi agent Cocaine MP Lockerbie bug Cameron Clegg Cable

Other Good Web Sites

Science Frontiers Digest of Anomalies
Catastrophism
The Velikovsky Encyclopedia
Plasma Universe
Electric Universe theory

More links

© 2001-2016 Lobster



Search results for: bug in all categories

83 results found.

9 pages of results.
21. The covert origins of the Biafran War [Lobster #25 (Jun 1993)]
... legislation. His memoir is a fascinating insight into the underbelly of British colonial administration. Smith not only describes the sexual and political exploitation of the black Africans, his is the first such memoir I have seen in which the covert world is shown to play a significant part in colonial life. Smith portrays MI5 working with the Colonial Office, bugging, tapping, intercepting mail -- as well as producing inept anti-communist propaganda. Then as independence loomed, the Colonial Office/MI5 team were replaced by the Foreign Office/MI6 people. Smith's encounter with colonial corruption climaxes with his discovery that among his duties was election rigging for the British. 'I had been ordered during ...
Terms matched: 1  -  Score: 15  -  01 Jun 1993  -  URL: http://www.lobster-magazine.co.uk/online/issue25/lob25-02.htm
... the Carter administration admitted that the Soviets were tapping into microwave links in New York, Washington, and San Francisco; microwave was like a sieve compared to the old underground intercity telephone cables. That was only a minor irritant compared to January 15, 1990, when half of the entire AT&T network crashed due to a single software bug. The technicians in the hardware lab where I worked used to kid the software engineers, saying that if civilization had developed the way programmers write programs, one woodpecker could come along and bring it all down. Also in 1978 the NSA began harassing certain mathematicians in the private sector, claiming 'sole authority to fund research in cryptography. ...
Terms matched: 1  -  Score: 7  -  01 Dec 1993  -  URL: http://www.lobster-magazine.co.uk/online/issue26/lob26-01.htm
... during the Rhodesian crisis in the sixties. At its heart is a long account of the negotiations leading up to the Rhodesia-Zimbabwe deal between the Patriotic Front and the Thatcher government in 1979. Predictably, Dickie fails to tell the reader that, according to Peter Wright, the British government's negotiating position was facilitated more than somewhat by MI5 bugging all the rooms used by the various African delegations. Apostasy!In Lobster 24 , prolific Canadian writer on the JFK thing, Scott Van Wynsberghe, delivered himself of a large blast of discontent with the shoddy nature of much of the JFK assassination research. Since when his intellectual journey has continued, leading him, finally, to conclude ...
Terms matched: 1  -  Score: 13  -  01 Jun 1994  -  URL: http://www.lobster-magazine.co.uk/online/issue27/lob27-05.htm
24. More Book Reviews [Lobster #28 (Dec 1994)]
... that ambitious and impressive. The authors are senior British legal academics, and in this they survey the construction - and propose the reconstruction - of the British secret state. After an opening discussion of the philosophical basis of their analysis, they methodically work through the historical and legal background to the extant legislation on surveillance, vetting, secrecy, bugging, the status and (non) accountability of the security and intelligence services, and so forth. While the descriptive detail is overwhelming in itself, the authors' critique is given particular bite by their knowledge of the comparable - and reformed - systems in Australia and Canada. The polite, academic disdain with which they treat our system ...
Terms matched: 1  -  Score: 14  -  01 Dec 1994  -  URL: http://www.lobster-magazine.co.uk/online/issue28/lob28-16.htm
... conceal. ' (Guardian, 4 November, 1994) 'Those whom we investigate are at pains to conceal' is terribly correct English, but the rest of it is an attempted sleight of hand. MI5 may have secret sources - but so do the police and Special Branch. Nor do MI5 have any 'secret techniques': other agencies bug, spy, bribe, recruit and subvert. MI5's special little number was the ability of its personnel to remain unidentified: when they do have to appear in courts of law, MI5 officers do so behind screens, with names like 'Officer A'. Their mystique is their secrecy. But this mystique is a handicap as far as ...
Terms matched: 1  -  Score: 5  -  01 Dec 1994  -  URL: http://www.lobster-magazine.co.uk/online/issue28/lob28-07.htm
... 25/4 /60 and 14/7 /94 dishonestly induced BT PLC to forgo payment of 3762.18 by deception'. (Letter from the Crown Prosecution Service of Nottingham, 10 January 1995.) In 1960 Armen was 9 years old, had never visited the UK, and British Telecom PLC did not exist! The bug pictured on the front cover was found in Armen's house on 24 February 1995 after it was 'swept' by an operative from the Ellis Swain Group, private detectives. The identity of those responsible for this campaign is still unknown, but it seems very likely that it has been the result of Armen's interest in the American, former Colonel ...
Terms matched: 1  -  Score: 15  -  01 Jun 1995  -  URL: http://www.lobster-magazine.co.uk/online/issue29/lob29-01.htm
27. Surf's up! Internet sites of interest [Lobster #31 (Jun 1996)]
... MRI scans of implants, US military/ intelligence in abductions, mind control, mindnet journal, hypnosis, 'new world order'. Cryptography/surveillance Counterintelligence and Technical Surveillance Counter-measures homepage http://www.tscm.com/ Site set up by James M Atkinson, Communications Engineer. A lot of information about TSCM and bugging, wiretapping activities, including photos, how to tell if you're being bugged, and what to do about it. Links to other intelligence sites, including NSA, CIA, FBI, and suppliers of intelligence equipment (Raytheon, Boeing, Rockwell, etc), plus a lot of other useful information related to surveillance. NSA and ...
Terms matched: 1  -  Score: 24  -  01 Jun 1996  -  URL: http://www.lobster-magazine.co.uk/online/issue31/lob31-24.htm
28. Sources. Publications etc [Lobster #31 (Jun 1996)]
... the Geneva Group.... an informal international network concerned with European harmonisation in the fields of international security, policing, justice, data protection, immigration and asylum and its effects on fundamental rights and liberties'. The February 1996 issue, no. 41, for example, contains material on an Austrian organised crime bill authorising widespread bugging, reports France's recent anti-terrorism measures; the Schengen agreement, the treatment of Irish prisoners in the UK etc. Nicely desk-topped, sober and comprehensively documented, Fortress Europe is edited by Nicholas Busch at Blomstervagen 7, S-791, 33 Falun, Sweden, tel/fax 46 23 26777; email nbusch@ ...
Terms matched: 1  -  Score: 13  -  01 Jun 1996  -  URL: http://www.lobster-magazine.co.uk/online/issue31/lob31-22.htm
... have known? If there had been a Libyan embassy plan to fire at the anti-Gaddafi demonstrators on that fateful day on 17 April 1984, wouldn't this have been discovered by the authorities? After all, surveillance operations on the embassies of unfriendly states were common practice long before the early 1980s. A combination of phone taps, electronic bugs, decoded telegrams, photographs of all entrants to the building and sources within should have alerted the authorities to impending danger. Surely the Libyan gunman would have been under strict orders to avoid at all costs any possibility of hitting a police officer with the predictable and very costly consequences for the Libyan regime and economy? And why did the ...
Terms matched: 1  -  Score: 15  -  01 Dec 1996  -  URL: http://www.lobster-magazine.co.uk/online/issue32/lob32-08.htm
... the 1940s, they had been surveilling the Norwegian left, often in cahoots with the Norwegian Labour Party. The recently published in-house history of the Netherlands' internal security service, BVD, from 1949 to 1969, describes hundreds of 'black bag' jobs against the CPN (Communist Party of the Netherlands), multiple long-term buggings of CPN leaders and the creation of a fake Socialist Workers Party to stir up factional conflicts which eventually split the CPN in 1958 - much of this undertaken at the behest of the CIA.(14) We have reached the point, I suggest, where the onus is on those who want to claim that the spooks have not ...
Terms matched: 1  -  Score: 5  -  01 Dec 1996  -  URL: http://www.lobster-magazine.co.uk/online/issue32/lob32-09.htm
Result Pages: << Previous 1 2 3 4 5 6 7 8 9 Next >>

Search powered by Zoom Search Engine



Search took 0.040 seconds