{"id":153382,"date":"2015-05-22T15:35:39","date_gmt":"2015-05-22T15:35:39","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=153382"},"modified":"2015-05-22T15:35:39","modified_gmt":"2015-05-22T15:35:39","slug":"murder-jfk","status":"publish","type":"post","link":"https:\/\/rinf.com\/alt-news\/politics\/murder-jfk\/","title":{"rendered":"The Murder of JFK"},"content":{"rendered":"<div>\n<p class=\"lettrine\">For some time now, I have been analyzing American history in the light of what I have called structural deep events: events, like the JFK assassination, the Watergate break-in, Iran-Contra, or 9\/11, which repeatedly involve law-breaking or violence, are mysterious to begin with, are embedded in ongoing covert processes, have political consequences that enlarge covert government, and are subsequently covered up by systematic falsifications in the mainstream media and internal government records.\u00a0[<a id=\"nh1\" class=\"spip_note\" title=\"Peter Dale Scott, The American Deep State: Wall Street, Big Oil, and the\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb1\" rel=\"footnote\">1<\/a>]<\/p>\n<p>The more I study these deep events, the more I see suggestive similarities between them, increasing the possibility that they are not unrelated external intrusions on American history, but parts of an endemic process, sharing to some degree or other a common source.\u00a0[<a id=\"nh2\" class=\"spip_note\" title=\"For a partial list of anomalies between the JFK assassination and 9\/11, see\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb2\" rel=\"footnote\">2<\/a>]<\/p>\n<p>For example, one factor linking Dallas, Watergate, Iran-Contra, and 9\/11, has been the involvement in all four deep events of personnel involved in America\u2019s highest-level emergency planning, known since the 1950s as Continuity of Government (COG) planning, or more colloquially inside the Pentagon as \u201cthe Doomsday Project.\u201d A few of these actors may have been located at the top, as overseers of the secret COG system. Others \u2014 including some I shall talk about today \u2014 were located further down in its secret communications network.<\/p>\n<p>I see this planning group as one among many in what I have chosen to call the American deep state, along with agencies like the CIA and NSA, the private groups like Booz Allen Hamilton to which more than half of the US intelligence budget is outsourced,\u00a0[<a id=\"nh3\" class=\"spip_note\" title=\"Tim Shorrock, Spies for Hire (New York: Simon &amp; Schuster, 2008),\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb3\" rel=\"footnote\">3<\/a>] and finally the powerful banks and corporations whose views are well represented in the CIA and NSA. But if only one group among many, the COG planning group is also special, because of its control of and access to a communications channel, not under government control, that can reach deeply into the US social structure. I discuss these matters at some length in my next book, The American Deep State, due out in November.<\/p>\n<p>COG planning was originally authorized by Truman and Eisenhower as planning for a response to a crippling atomic attack that had decapitated government. In consequence its planning group contemplated extreme measures, including what Alfonso Chardy in 1987 called \u201csuspension of the Constitution.\u201d\u00a0[<a id=\"nh4\" class=\"spip_note\" title=\"Alfonso Chardy, \u201cReagan Aides and the Secret Government,\u201d Miami Herald, July\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb4\" rel=\"footnote\">4<\/a>] And yet in Iran-Contra its asset of a secret communications network, developed for the catastrophe of decapitation, was used instead to evade an official embargo on arms sales to Iran that dated back to 1979. My question today is whether the network could have been similarly misused in November 1963.<\/p>\n<p>The Iran-contra misuse has been well-documented. Oliver North supervised the sale of arms to Iran by using his resources as the National Security Council action officer for COG planning, under cover of a \u201cNational Program Office\u201d that was overseen by then Vice-President George H. W. Bush.\u00a0[<a id=\"nh5\" class=\"spip_note\" title=\"James Bamford, A Pretext for War: 9\/11, Iraq, and the abuse of America\u2019s\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb5\" rel=\"footnote\">5<\/a>] North and his superiors could thus use the COG emergency network, known then as Flashboard, for the arms sales to Iran that had to be concealed from other parts of the Washington bureaucracy as well as the public. So when North had to send emergency instructions for arms delivery to the US Embassy in Lisbon, instructions that directly contravened the embargo prohibiting such sales, he used the Flashboard network to avoid alerting the Ambassador and other unwitting personnel.<\/p>\n<p>The documented example of Iran-Contra allows me to explain what I am saying about the users of the COG network, and also what I am not saying. To begin with, I am not saying that a single \u201cSecret Team\u201d has for decades been using the COG network to manipulate the US Government from outside it. There is no evidence to suggest that North\u2019s actions in Iran-Contra were known to any of his superiors other than CIA chief William Casey and probably George Bush. The point is that a very small group had access to a high-level secret network outside government review, in order to implement a program in opposition to government policy. They succumbed to the temptation to use this secure network that had been designed for other purposes. I have argued elsewhere that this secure network was used again on 9\/11, to implement key orders for which the 9\/11 Commission could find no records.\u00a0[<a id=\"nh6\" class=\"spip_note\" title=\"Peter Dale Scott, The Road to 9\/11: Wealth, Empire, and the Future of\u00a0(...)\" href=\"http:\/\/www.voltairenet.org\/article187504.html#nb6\" rel=\"footnote\">6<\/a>] Whether it was also used for illicit purposes is not known.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><a href=\"https:\/\/www.lewrockwell.com\/2015\/05\/no_author\/the-murder-of-jfk-2\/\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For some time now, I have been analyzing American history in the light of what I have called structural deep events: events, like the JFK assassination, the Watergate break-in, Iran-Contra, or 9\/11, which repeatedly involve law-breaking or violence, are mysterious to begin with, are embedded in ongoing covert processes, have political consequences that enlarge covert [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":139339,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,18,1616],"tags":[],"class_list":{"0":"post-153382","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-politics","8":"category-latest-news","9":"category-usa-news"},"_links":{"self":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/153382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=153382"}],"version-history":[{"count":0,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/153382\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/139339"}],"wp:attachment":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=153382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=153382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=153382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}