Coup at Dealey Plaza
Dr. Cyril Wecht, chairman of
Citizens Against Political Assassinations (CAPA), has branded the assassination
of President Kennedy as a coup d’état - the violent seizure of the powers of
government.
If so then instead of being the act
of a deranged loner it was a deep level political conspiracy, an inside job
involving all of the security agencies.
If so then the Modus Operandi - MO
was that of a covert intelligence operation designed to shield and protect
its actual sponsors.
Against that concealment, the
suspects are limited to those who seized power, they utilized known and
recognizable techniques, and left a paper trail, even though they have tried to
conceal it.
The very concealment, destruction of
evidence, withholding of records and acts of deception are clues that lead
directly to the perpetrators.
History shows that they used the
covert operational techniques before 11/22/63 and continue to do so.
The intelligence network responsible
for the Dealey Plaza operation continuess to function today, though manned by
different people, they still hold the reins of power.
Once I recognized these facts I came
to the regrettable conclusion that the assassination can only be solved by a
counter-intelligence operation conducted by an intelligence network that is
more powerful and coordinated than the one who killed the president and got
away with it.
If a coup and not just a conspiracy,
then all of the intelligence agencies of government were compromised, and as
with the assassination of the North Korean in Malaysia, the murder of the
president at Dealey Plaza set the clear and distinct message that even the
president of the United State can be murdered on the street in public without
retribution
If a coup and not the act of rogue
agents or mafia goons, then all of the official investigations were penetrated,
infiltrated, compromised and neutralized, including the FBI, Warren Commission,
HSCA and ARRB.
If a coup by a powerful intelligence
network then that network still functions today, and will take "active
measures," in their words, against anyone or any opposition network that
threatens to expose it.
And they will do it as they dealt
with WC, HSCA and ARRB by penetrating, compromising and neutralizing it.
As WC attorney Sam Stern explained
it to the HSCA attorney, “at the outset we realized that there was no possible
way to penetrate any official involvement in a cover-up or conspiracy if there
was such complicity.” Stern stated that he and several of his Commission
colleagues discussed what they regarded as “the fact that the agencies – the
FBI and CIA – could formulate and maintain a cover-up which no one would ever
penetrate. We of course did not believe that was so. And I still don’t. But we
realized what we were dealing with, in the power of these agencies.
Fortunately, we believed they were on our side.”
If that is the case then any attempt
to identify and them by a responsible CI - counter-intelligence investigation
will be met by their anticipated response of penetration, compromise and
neutralize.
There are two basic types of
investigations - Criminal and CI - Counter-intelligence, both having different
intentions and purpose.
The purpose of a Criminal
investigation by the police, crime scene investigators and official detectives
is to identify and secure evidence in a crime that can be introduced in a court
of law.
Such evidence can be used to get a
grand jury to indict a suspect in a crime and bring them to trial.
On the other hand the purpose of a
CI - Counter-Intelligence investigation is to determine the truth or the true
facts of a person, group, situation or event.
In regards to the Kennedy
assassination the Dallas police, FBI, New Orleans District
Attorney and the first chairman of the HSCA conducted Criminal investigations,
while the Warren Commission, the USMC, ONI, French Intelligence service, the
Hunt Oil company and the HSCA under its second chairman conducted
Counter-Intelligence investigations of the assassination.
While the Criminal investigation
intends to go to court, the CI investigation avoids court, keeps its
information to itself, and sometimes uses extra legal means to obtain its
information, including unauthorized wire taps, breaking and entering (black bag
job), paid informants, blackmail, entrapment and even torture.
There are some basic procedures used
by all investigators, such as creating a chronology of key events, a name
file of persons, subjects and a map of locations of addresses and events.
Traditionally the name and subject files are kept on index cards, like the old
library book filing system, and that is what the FBI and CIA used at their headquarters
and field offices, though computers and the internet have made the digital
system much more effective.
Among the legal techniques used by
CI investigators is the compilation of all open source information on targeted
individuals and subjects, much like the ABLE DANGER CI investigation identified
the 9/11 terrorist cell before 9/11, and similar computerized matrix models
based on all intelligence gathered. Such a system, applied to the Kennedy
Assassination, should be easier to identify the intelligence networks involved.
Intelligence networks utilize
compartmented cells, so if one part of the network is exposed the rest of it
can still function and be kept intact. The mafia calls such cells “crews,” and
each cell-crew is run by a case officer and from among each cell a team leader,
much like the JMWAVE commando teams operated.
The Covert Operational policies,
practices and procedures are utilized, and require compartmentation, a code
name for the operation and each participant, and total control over the
participants and the site of the operation, in this case Dealey Plaza, the
Texas School Book Depository (TSBD), the Grassy Knoll and the motorcade itself.
If what happened at Dealey Plaza was a coup then it utilized standard coup techniques - as outlined by Edward Lutwak in "Coup d etat - A Practical Handbook," and their policies, procedures and even deceptions provide us clues that lead us to them if you just connect the dots in the network grid.
MTC - More to Come
No comments:
Post a Comment