RULES
FOR RESEARCHERS - Part 2
For
those who are serious about diving into the JFK assassination records, I have
some further advice.
DOUBLE
IDENTITIES
For
starters, as every researcher has learned over time, beware of the duel and
double identities - different individuals with the same name. This occurs again
and again, and should be recognized as soon as possible to avoid future
confusion.
I mean
there are two Bill Kellys – the Florida immigrant investigator who concentrated
on the Cubans, and Bill Kelly – the JFK assassination researcher from New
Jersey.
We even
found another John Judge – a rock musician who promoted a duel head guitar, and
John Judge the radical researcher from Washington D.C.
In
addition, there are a number of JFK assassination suspects with the same name –
including Jack Martin – the first suspect in the assassination – a Dallas
college student from Northern Louisiana who picketed the UN ambassador when he
visited Dallas, and Jack Martin (Scruggs) who was the first witness to
implicate David Ferrie and Guy Bannister as associates of Oswald in New
Orleans.
There
were two Maurice Bishops – the pseudo name of David Atlee Phillips in his
undercover operations involving Antonio Veciana, and the Maurice Bishop who was
the socialist leader of Grenada when the US invaded the Central American island
nation.
Then
there are multiple “Julio Fernandez” -
the former Cuban newspaper editor and defector who was investigated by the
Pennsylvania State Police, his son, a Penn State art student, and the Julio
Fernandez who served as a JMWAVE commando team leader whose maritime cover t
actions were financially supported by Clare Booth Luce. When the CIA was asked
for their file on Julio Fernandez, they came up with over a dozen individuals
with the same name, but neither the newspaper editor or the commando team
leader was included. And for good reason.
BASIC
ASSUMPTIONS
There
are a number of basic assumptions that we must make before beginning research.
1)
We
can assume that since the assassination was not the spontaneous act of a mad
man, it was a very well planned and crafted operation – a covert intelligence
operation.
2)
As
a covert intelligence operation, standard covert intelligence operational
techniques were utilized, techniques that are well known and easily identified.
3)
Just
as linguist David Maurer had to learn the unique slang used in the criminal
underworld before he could learn and understand the basic factors of the Big
Con confidence games, we must learn the unique lexicon of the intelligence
world. For instance there is a difference between Agents, Operatives and
Assets, and subcategories of each – such as Witting Assets and Unwitting Assets,
and five different types of Agents – Inside, Native, Living, Double and
Expendable.
4)
One
of the first basic standard operational procedures begins with giving a code
name to each operation – and the assassination of President Kennedy had a
covert operational code name that we will someday learn – some say it was
ZIPPER, but for now we will refer to it as the Dealey Plaza Operation – or DPO.
5)
Other
assumptions ?
OTHER
ASSUMPTIONS
Some of
the assumptions we make after an analysis of the basic evidence and facts of
the case inc
Include
a)
The
assassination of the President was not the work of one man alone, but a covert
intelligence operation that utilized standard covert intelligence operational
crafts and techniques that are well known and easily identified.
b)
If
the assassination was a covert intelligence operation it was not a “rogue”
operation or one committed by an independent or out of control agency or
network, but was “officially” sanctioned, and a coup de’etat, so those who
killed the President also took over the reigns of power and changed policy, so
that narrows down the suspects consiserably.
c)
If
the assassination was a covert action coup and standard covert operational coup
techniques were utilized, then according to Edward Lutwak, author of Coup d’etat
– A Practical Handbook, those who conducted the operation on the ground in
Dallas controlled the scenes of the crime – Dealey Plaza and the Texas School
Book Depository (TSBD) and it was planned and carried out to the minute, if not
seconds.
d)
If
the Practical Handbook for a coup was used, as it must have been, then those
overseeing the assassination operation controlled the communications, not only
the communications among those involved on the ground, but the major
communications to news outlets and the media.
e)
The
assassination was committed by an intelligence network that was affiliated with
CIA operations involved in Cuban operations – limiting the scope of research to
the Cuban arena.
f)
The
assassination was originally devised as a plan to kill Fidel Castro, and
redirected to JFK at Dealey Plaza,
g)
The
assassination plan as originally devised included a security cover story to
blame the assassination on Castro Cuban Communists, a part of the plan that was
rejected and can be shown not only to be false, but a covert black propaganda
disinformation psychological warfare program.
h)
Tracing
the origins of the CCC cover story will lead directly to those responsible for
the Dealey Plaza Operation and its sponsors;
RESEARCH
TECHNIQUES
There
are a number of research techniques that can be used to assist us in narrowing
down the information to what is needed and necessary.
WALT
WHITMAN’S LETTERS
Over a
hundred years after the death of America’s poet laureient Walt Whitman, when
every Whitman scholar believed we had every poem and article penned by Whitman
in the public domain, and there was nothing new under the sun, along comes a
Whitman scholar who came up with a new idea and discovered thousands of never
before known Whitman letters that were just sitting there among the shelves of
the National Archives.
Being
familiar with Whitman’s handwriting and signature, Professor Ken Price thought that if he went
through the early Civil War records of the Department of Justice, where Whitman
worked as a secretary for a year, he would discover a few new official letters
that Whitman wrote in the course of his work there. And Alas! He didn’t find a
few, he found thousands of them! Which will take Whitman scholars years to wade
through and weight their significance.
This story
was told by the Archivist of the United States (AOTUS) David Ferriaro in his
AOTUS blog.
Ferriero
is also responsible for overseeing the JFK Act is carried out, and despite
being an advocate of transparency and open records, advised the President to
continue withholding JFK assassination records for years past the October 2017
release date set by Congress and the JFK Act.
But the
Whitman story is worth knowing as it shows how a little ingenuity can bring
major results.
THREE
TIME HITS
As Max
Holland’s historian wife has advised him, we should look for patterns, and I
have devised what I call Three Time Hits. Whenever a person or place or subject
comes up twice in unrelated areas, take notice and when it happens three times
– begin a file on it. As Ian Fleming of 007 fame said, one time is
happenstance, twice is coincidence, and three times is enemy action.
Collins
Radio was the first time I utilized the Three Time Hits technique, as I first
took notice of them in the pre-assassination November 1, 1963 front page story
and photo of the CIA raider ship REX, docked at Palm Beach, Florida near the
President’s family home. The Rex had delivered teams of commandos who had high
powered rifles with scope. According to the official record the Rex was owned
by Belcher Oil company of Miami and leased to the Collins Radio Corporation for
research purposes.
Then I
read that J.D. Tippit’s good friend Carl Mather worked for Collins Radio and
being there was his alibi at the time of Tippit’s murder. Then I learned that
the Air Force One radios were manufactured by Collins and their Cedar Rapids,
Iowa relay station – known as “Liberty” station, coordinated not only the radio
traffic for Air Force One and other Executive air planes, but also the
Strategic Air Command (SAC) bombers.
And now
I have a very thick file on Collins Radio and its role in strategic
communications.
After
Collins Radio, my Three Time Hits (TTH) technique came into play again as I
read about how Jack Ruby flew to Miami from Havana with a suitcase of cash that
he obtained from the casino owning Fox brothers, and deposited it for them in
the Pan Am – Pan American Bank of Miami, which he dutifully did.
Then I
read in the HSCA reports that Robert Ray M cKeown the pro-Castro gun runner who Castro visited
when he came to America, had also been visited by Jack Ruby, who was interested
in using his influence with Castro to get
Santo Traficante out of an Havana retention facility. As McKeown had
flew guns to Castro in the mountains before his revolution, he said he was paid
in cash wrapped in Pan Am Bank wrappers.
That’s
two ostensibly unrelated associations with the Pan Am Bank of Miami.
Then
there is the clincher.Anti-Castro Cuban terrorists Antonio Veciana told
Congressional investigator Gaeton Fonzi, that his spy master and case officer
“Maurice Bishop,” after recruiting him, had Veciana take psychological warfare
lessons and sign a security agreement in an office in the Pan Am Bank in Miami,
Florida.
I wasn’t
surprised when I obtained (through Malcolm Blunt) – Fonzi’s notes from his tape
recorded interview with former CIA gunsmith Mitch Werbell, who Fonzi recorded
in his notes, told him that the Pan Am Bank in Miami was a CIA asset and used
in the course of operations.
Unfortunately,
Fonzi’s tape recorded interview has been erased, or otherwise destroyed, and
many – and that’s probably most of the Church Committee recorded interviews are
missing.
Which brings us to Peter Dale Scott’s “Negative-Template”
thesis, which maintains that the most significant Deep Political records are
the ones that are missing or have been destroyed, a thesis that we have found
to be correct.
NEGATIVE
TEMPLATE
Peter
Dale Scott’s NEGATIVE-TEMPLATE – The Missing and Destroyed Records
As Peter
Dale Scott’s Deep Political thesis contemplates, the Deep Political state runs
on secrecy and the absences of official records, so of all the extant documents
and records, the ones that are destroyed or missing are the most significant.
And while we may not have them, we do have references to them, we know what
people who wrote them or read them say is in them, and in some cases, as with
the Tampa SS advance report, we can locate copies at remote locations. We also
have the names of those who wrote them, or the subject matter, so we can
surmise what is in them.
After my
conversation with Judge John Tunheim, at the National Press Club in Washington
DC last March (2017), I composed a list of records we knew at one time existed
but are now missing.
And Bill
Simpich has composed a list of records know to have been destroyed.
All of
these extensive lists give us a good idea of what pieces of the puzzle are
missing and allows us to try to fill them in with the proper information.
In the end, we can prove one unfounded assumption wrong - that we will never know the truth about the assassination. That we are discovering.
And remember, share what you can, especially if you don't have a book contract, and treat other researchers as you want to be treated - with honor and respect.
No comments:
Post a Comment