The Murder of JFK

For some time now, I have been analyzing American history in the light of what I have called structural deep events: events, like the JFK assassination, the Watergate break-in, Iran-Contra, or 9/11, which repeatedly involve law-breaking or violence, are mysterious to begin with, are embedded in ongoing covert processes, have political consequences that enlarge covert government, and are subsequently covered up by systematic falsifications in the mainstream media and internal government records. [1]

The more I study these deep events, the more I see suggestive similarities between them, increasing the possibility that they are not unrelated external intrusions on American history, but parts of an endemic process, sharing to some degree or other a common source. [2]

For example, one factor linking Dallas, Watergate, Iran-Contra, and 9/11, has been the involvement in all four deep events of personnel involved in America’s highest-level emergency planning, known since the 1950s as Continuity of Government (COG) planning, or more colloquially inside the Pentagon as “the Doomsday Project.” A few of these actors may have been located at the top, as overseers of the secret COG system. Others — including some I shall talk about today — were located further down in its secret communications network.

I see this planning group as one among many in what I have chosen to call the American deep state, along with agencies like the CIA and NSA, the private groups like Booz Allen Hamilton to which more than half of the US intelligence budget is outsourced, [3] and finally the powerful banks and corporations whose views are well represented in the CIA and NSA. But if only one group among many, the COG planning group is also special, because of its control of and access to a communications channel, not under government control, that can reach deeply into the US social structure. I discuss these matters at some length in my next book, The American Deep State, due out in November.

COG planning was originally authorized by Truman and Eisenhower as planning for a response to a crippling atomic attack that had decapitated government. In consequence its planning group contemplated extreme measures, including what Alfonso Chardy in 1987 called “suspension of the Constitution.” [4] And yet in Iran-Contra its asset of a secret communications network, developed for the catastrophe of decapitation, was used instead to evade an official embargo on arms sales to Iran that dated back to 1979. My question today is whether the network could have been similarly misused in November 1963.

The Iran-contra misuse has been well-documented. Oliver North supervised the sale of arms to Iran by using his resources as the National Security Council action officer for COG planning, under cover of a “National Program Office” that was overseen by then Vice-President George H. W. Bush. [5] North and his superiors could thus use the COG emergency network, known then as Flashboard, for the arms sales to Iran that had to be concealed from other parts of the Washington bureaucracy as well as the public. So when North had to send emergency instructions for arms delivery to the US Embassy in Lisbon, instructions that directly contravened the embargo prohibiting such sales, he used the Flashboard network to avoid alerting the Ambassador and other unwitting personnel.

The documented example of Iran-Contra allows me to explain what I am saying about the users of the COG network, and also what I am not saying. To begin with, I am not saying that a single “Secret Team” has for decades been using the COG network to manipulate the US Government from outside it. There is no evidence to suggest that North’s actions in Iran-Contra were known to any of his superiors other than CIA chief William Casey and probably George Bush. The point is that a very small group had access to a high-level secret network outside government review, in order to implement a program in opposition to government policy. They succumbed to the temptation to use this secure network that had been designed for other purposes. I have argued elsewhere that this secure network was used again on 9/11, to implement key orders for which the 9/11 Commission could find no records. [6] Whether it was also used for illicit purposes is not known.

 

 

 

 

 

 

Read more