Wednesday, June 27, 2018

Rules for Researchers Part 2 - Advice and Techniques

RULES FOR RESEARCHERS  - Part 2

For those who are serious about diving into the JFK assassination records, I have some further advice.

DOUBLE IDENTITIES

For starters, as every researcher has learned over time, beware of the duel and double identities - different individuals with the same name. This occurs again and again, and should be recognized as soon as possible to avoid future confusion.

I mean there are two Bill Kellys – the Florida immigrant investigator who concentrated on the Cubans, and Bill Kelly – the JFK assassination researcher from New Jersey.

We even found another John Judge – a rock musician who promoted a duel head guitar, and John Judge the radical researcher from Washington D.C.

In addition, there are a number of JFK assassination suspects with the same name – including Jack Martin – the first suspect in the assassination – a Dallas college student from Northern Louisiana who picketed the UN ambassador when he visited Dallas, and Jack Martin (Scruggs) who was the first witness to implicate David Ferrie and Guy Bannister as associates of Oswald in New Orleans.
There were two Maurice Bishops – the pseudo name of David Atlee Phillips in his undercover operations involving Antonio Veciana, and the Maurice Bishop who was the socialist leader of Grenada when the US invaded the Central American island nation.

Then there are multiple “Julio Fernandez”  - the former Cuban newspaper editor and defector who was investigated by the Pennsylvania State Police, his son, a Penn State art student, and the Julio Fernandez who served as a JMWAVE commando team leader whose maritime cover t actions were financially supported by Clare Booth Luce. When the CIA was asked for their file on Julio Fernandez, they came up with over a dozen individuals with the same name, but neither the newspaper editor or the commando team leader was included. And for good reason.

BASIC ASSUMPTIONS

There are a number of basic assumptions that we must make before beginning research.

1)      We can assume that since the assassination was not the spontaneous act of a mad man, it was a very well planned and crafted operation – a covert intelligence operation.

2)      As a covert intelligence operation, standard covert intelligence operational techniques were utilized, techniques that are well known and easily identified.

3)      Just as linguist David Maurer had to learn the unique slang used in the criminal underworld before he could learn and understand the basic factors of the Big Con confidence games, we must learn the unique lexicon of the intelligence world. For instance there is a difference between Agents, Operatives and Assets, and subcategories of each – such as Witting Assets and Unwitting Assets, and five different types of Agents – Inside, Native, Living, Double and Expendable.

4)      One of the first basic standard operational procedures begins with giving a code name to each operation – and the assassination of President Kennedy had a covert operational code name that we will someday learn – some say it was ZIPPER, but for now we will refer to it as the Dealey Plaza Operation – or DPO.

5)      Other assumptions ?

OTHER ASSUMPTIONS

Some of the assumptions we make after an analysis of the basic evidence and facts of the case inc
Include

a)      The assassination of the President was not the work of one man alone, but a covert intelligence operation that utilized standard covert intelligence operational crafts and techniques that are well known and easily identified.

b)      If the assassination was a covert intelligence operation it was not a “rogue” operation or one committed by an independent or out of control agency or network, but was “officially” sanctioned, and a coup de’etat, so those who killed the President also took over the reigns of power and changed policy, so that narrows down the suspects consiserably.

c)      If the assassination was a covert action coup and standard covert operational coup techniques were utilized, then according to Edward Lutwak, author of Coup d’etat – A Practical Handbook, those who conducted the operation on the ground in Dallas controlled the scenes of the crime – Dealey Plaza and the Texas School Book Depository (TSBD) and it was planned and carried out to the minute, if not seconds.

d)      If the Practical Handbook for a coup was used, as it must have been, then those overseeing the assassination operation controlled the communications, not only the communications among those involved on the ground, but the major communications to news outlets and the media.

e)      The assassination was committed by an intelligence network that was affiliated with CIA operations involved in Cuban operations – limiting the scope of research to the Cuban arena.

f)       The assassination was originally devised as a plan to kill Fidel Castro, and redirected to JFK at Dealey Plaza,

g)      The assassination plan as originally devised included a security cover story to blame the assassination on Castro Cuban Communists, a part of the plan that was rejected and can be shown not only to be false, but a covert black propaganda disinformation psychological warfare program.

h)      Tracing the origins of the CCC cover story will lead directly to those responsible for the Dealey Plaza Operation and its sponsors;



RESEARCH TECHNIQUES

There are a number of research techniques that can be used to assist us in narrowing down the information to what is needed and necessary.

WALT WHITMAN’S LETTERS

Over a hundred years after the death of America’s poet laureient Walt Whitman, when every Whitman scholar believed we had every poem and article penned by Whitman in the public domain, and there was nothing new under the sun, along comes a Whitman scholar who came up with a new idea and discovered thousands of never before known Whitman letters that were just sitting there among the shelves of the National Archives.


Being familiar with Whitman’s handwriting and signature, Professor Ken Price thought that if he went through the early Civil War records of the Department of Justice, where Whitman worked as a secretary for a year, he would discover a few new official letters that Whitman wrote in the course of his work there. And Alas! He didn’t find a few, he found thousands of them! Which will take Whitman scholars years to wade through and weight their significance.

This story was told by the Archivist of the United States (AOTUS) David Ferriaro in his AOTUS blog.


Ferriero is also responsible for overseeing the JFK Act is carried out, and despite being an advocate of transparency and open records, advised the President to continue withholding JFK assassination records for years past the October 2017 release date set by Congress and the JFK Act.

But the Whitman story is worth knowing as it shows how a little ingenuity can bring major results.

THREE TIME HITS

As Max Holland’s historian wife has advised him, we should look for patterns, and I have devised what I call Three Time Hits. Whenever a person or place or subject comes up twice in unrelated areas, take notice and when it happens three times – begin a file on it. As Ian Fleming of 007 fame said, one time is happenstance, twice is coincidence, and three times is enemy action.

Collins Radio was the first time I utilized the Three Time Hits technique, as I first took notice of them in the pre-assassination November 1, 1963 front page story and photo of the CIA raider ship REX, docked at Palm Beach, Florida near the President’s family home. The Rex had delivered teams of commandos who had high powered rifles with scope. According to the official record the Rex was owned by Belcher Oil company of Miami and leased to the Collins Radio Corporation for research purposes.

Then I read that J.D. Tippit’s good friend Carl Mather worked for Collins Radio and being there was his alibi at the time of Tippit’s murder. Then I learned that the Air Force One radios were manufactured by Collins and their Cedar Rapids, Iowa relay station – known as “Liberty” station, coordinated not only the radio traffic for Air Force One and other Executive air planes, but also the Strategic Air Command (SAC) bombers.

And now I have a very thick file on Collins Radio and its role in strategic communications.
After Collins Radio, my Three Time Hits (TTH) technique came into play again as I read about how Jack Ruby flew to Miami from Havana with a suitcase of cash that he obtained from the casino owning Fox brothers, and deposited it for them in the Pan Am – Pan American Bank of Miami, which he dutifully did.

Then I read in the HSCA reports that Robert Ray M cKeown  the pro-Castro gun runner who Castro visited when he came to America, had also been visited by Jack Ruby, who was interested in using his influence with Castro to get  Santo Traficante out of an Havana retention facility. As McKeown had flew guns to Castro in the mountains before his revolution, he said he was paid in cash wrapped in Pan Am Bank wrappers.

That’s two ostensibly unrelated associations with the Pan Am Bank of Miami.

Then there is the clincher.Anti-Castro Cuban terrorists Antonio Veciana told Congressional investigator Gaeton Fonzi, that his spy master and case officer “Maurice Bishop,” after recruiting him, had Veciana take psychological warfare lessons and sign a security agreement in an office in the Pan Am Bank in Miami, Florida.

I wasn’t surprised when I obtained (through Malcolm Blunt) – Fonzi’s notes from his tape recorded interview with former CIA gunsmith Mitch Werbell, who Fonzi recorded in his notes, told him that the Pan Am Bank in Miami was a CIA asset and used in the course of operations.

Unfortunately, Fonzi’s tape recorded interview has been erased, or otherwise destroyed, and many – and that’s probably most of the Church Committee recorded interviews are missing.

 Which brings us to Peter Dale Scott’s “Negative-Template” thesis, which maintains that the most significant Deep Political records are the ones that are missing or have been destroyed, a thesis that we have found to be correct.

NEGATIVE TEMPLATE

Peter Dale Scott’s NEGATIVE-TEMPLATE – The Missing and Destroyed Records

As Peter Dale Scott’s Deep Political thesis contemplates, the Deep Political state runs on secrecy and the absences of official records, so of all the extant documents and records, the ones that are destroyed or missing are the most significant. And while we may not have them, we do have references to them, we know what people who wrote them or read them say is in them, and in some cases, as with the Tampa SS advance report, we can locate copies at remote locations. We also have the names of those who wrote them, or the subject matter, so we can surmise what is in them.
After my conversation with Judge John Tunheim, at the National Press Club in Washington DC last March (2017), I composed a list of records we knew at one time existed but are now missing.





And Bill Simpich has composed a list of records know to have been destroyed.



All of these extensive lists give us a good idea of what pieces of the puzzle are missing and allows us to try to fill them in with the proper information.

In the end, we can prove one unfounded assumption wrong - that we will never know the truth about the assassination. That we are discovering. 

And remember, share what you can, especially if you don't have a book contract, and treat other researchers as you want to be treated - with honor and respect. 




No comments:

Post a Comment