Feeds

Christine Hamilton moans about ‘Mr Plod’ reading her emails

Public whinge goes into day three

  • alert
  • submit to reddit

Top three mobile application threats

Christine Hamilton, wife of disgraced former MP Neil Hamilton and one of three people being investigated over rape claims, has continued her public whinging about her and her husband's treatment by attacking "Mr Plod" for reading her emails.

She said: "I know an enormous number of people have been sending me emails... but I can't get at them because the police have, to my mind, stolen our computers and some Mr Plod is probably reading what they've sent to me. If they are not enraged by that, I am."

Mrs Hamilton's latest outburst is beginning to sound like a woman who is revelling in the public attention. Not only are her comments completely wrong but the search for emails is likely to prove the main defence plank her and her husband have against the accusations.

The woman who claims to have been raped in the Hamilton's presence and subjected to indecent activities by them while being raped claims that she received several "pornographic and threatening emails" from the pair, coming from a "britishbattleaxe" email address. The Hamiltons deny any such communication.

Hence the police impounded the computers and are searching them for any such emails. Without the emails, the case against Hamiltons would most likely collapse.

Ironically, it is Mrs Hamilton's obvious technical ignorance that will make the lack of any emails even stronger. If such emails were sent and received, neither Hamilton is likely to know how to remove it completely from their system. This is why police are currently combing the hard discs for deleted emails.

The likelihood that police are checking emails sent in recent days is extremely low. They are looking for emails sent earlier this year. It would be an abuse of police powers if they started reviewing emails sent since they impounded the computers.

Besides, Mrs Hamilton has completely failed to understand that she can easily download her emails by buying a new computer and setting up the account again.

The Hamiltons are not stupid people, leaving the possibility that they are simply seeking as much publicity for their cause as possible, which includes a threatened action for unlawful arrest which may stretch to six figures. ®

Related Story

Emails will prove vital to Hamiltons' rape denial

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.