Harold Weisberg III 6.6

Similar documents
AUDIO TECHNICIAN ANTICIPATED TIME COMMITMENTS RESPONSIBILITIES/DUTIES

The Mysterious Deletions of the Warren Commission s TOP SECRET Transcript of January 22, 1964

Digital Georgia Law

BOBBY BROWN AND "OSWALD'S GHOST(S)"

BUILDER LEVY. The veteran photojournalist still believes in the power of protest to effect social change.

Unfit for the Future

ARKANSAS COURT OF APPEALS

The Formula of Life-Giving Worship Experiences Leader s Notes

How Should Leaders Deal With Heresy Outside The Church?

Former Warren Commission assistant counsel Burt Griffin, who investigated Jack Ruby's activities.

Critical Healing I: Bias & Irrational Assumptions

Surveying Prof. Bharat Lohani Department of Civil Engineering Indian Institute of Technology, Kanpur. Module - 7 Lecture - 3 Levelling and Contouring

75 CENTS JUNE 2,1975 ASSASSINATION. Behind Moves to Reopen JFK Case THE UNITED STATES NEWSS UNITED KINGDOM

It is the branch which specializes in audio engineering and recording

For as the body apart from the spirit is dead, so also faith apart from the works is dead (James 2:26).

Identity Standards. Canada and Bermuda Territory SalvationArmy.ca

The Oswaid. Lone Killer' Theory. Film No One. JFK Assassination. 3 Never-Before-Seen Movie Clips That Shatter. Wanted. To See

GREGORY DOUGLAS and REGICIDE: Both Fascinating and Frustrating

SxSW 2018 Interview: RUBEN BLADES IS NOT MY NAME director Abner Benaim

JFK Killer Not Alone, UGA Professor Says

Checking your understanding or checking their understanding card game

Diocese of Orlando. Guidelines for the Use of Video Projection in Liturgical Celebrations. Introduction

Make sure you are properly registered Course web page : or through Class Notes link from University Page Assignment #1 is due

Guidelines. for the Use of Video Technology in Churches

Contradictory Information Can Be Better than Nothing The Example of the Two Firemen

Introduction 5. What Must I Do to Be Saved? 9. Saved by Grace... Isn t That Too Good to Be True? 17

A Healthy Church. Romans 12:3-8

Cash Register Exercise

My First Half-Century in the Iron Game

We call it visual communication.

Teachings on Justice

Teachings on Justice

Sent via U.S. Mail and Facsimile ( )

19 Tactics To Avoid Change

The Kennedy Assassination. November 17 th, 2014 American Conspiracies

The Rationality of Religious Beliefs

FORGIVE MY GRIEF VOL. II

Interview with Cathy O Neil, author, Weapons of Math Destruction. For podcast release Monday, November 14, 2016

RICKY DON WHITE, 29, a native of Paris, Texas, has for 12 years. lived with the knowledge that his late father, ROSCOE ANTHONY

DEPOSITION INSTRUCTIONS

CONTACT PROFILE -s Liz

Linda Ciotola: Mindful Witness

YAN, ZIHAN TEAM 4A CAR KINGDOM RESCUE AUTOMOBILES. Car Kingdom Rescue. By YAN, ZIHAN 1 / 10

STEP TWO. Came to believe that a Power greater than ourselves could restore us to sanity.

Study Guide for Job - Ecclesiastes

SESSION 14 TEACH US TO PRAY: SACRAMENTS

Ely, DeLillo, and the Distrusted Moments of Our Democracy

LESSON OVERVIEW/SCHEDULE

With Works. Session 10 JAMES 2: True faith produces visible change.

Essay on how to spend winter holidays. Task 8211; to choose the writers are current with major academic journals..

Hey everybody. Please feel free to sit at the table, if you want. We have lots of seats. And we ll get started in just a few minutes.

ACKNOWLEDGEMENTS. xii

The Themes of Discovering the Heart of Buddhism

Be Genuine, Show Grace, Be Humble. Further Instructions on Genuine Discipleship. Matthew 23:1 12. Matthew 23:1 36

what makes reasons sufficient?

FILED: NEW YORK COUNTY CLERK 05/01/ :24 AM INDEX NO /2015 NYSCEF DOC. NO. 431 RECEIVED NYSCEF: 05/01/2018

The Vatican and the Jews

THERE IS NO MAGIC BULLET

Distinguished Guests, Members of the Faculty, Members of. I want to express my sincere thanks and appreciation to you, President

A Sermon on Sermons September 1, 2013 Roger Fritts Unitarian Universalist Church of Sarasota

Actuaries Institute Podcast Transcript Ethics Beyond Human Behaviour

The Hebrews Initiative: A Great Challenge from a Challenging Text Hebrews 5:11-6:20. October 11, Dr. Steve Horn

Report for Gospel for Asia Board Concerning Accusations

Myths of Career Choice

A romp through the foothills of logic Session 3

3. WHERE PEOPLE STAND

Post-truth John 18:33-40; John 8:31-37; John 14:6

CHAPTER JAN GAIL RUDNICKI

A theory of adjudication is a theory primarily about what judges do when they decide cases in courts of law.

Why I Believe Lee. Was A CIA. Agent. Oswald's Mother Tells MIDNIGHT Reporter

1 2 THE STATE EDUCATION DEPARTMENT THE UNIVERSITY OF THE STATE OF NEW YORK 3

[ROBERT E.] STRIPLING [CHIEF INVESTIGATOR]: Mr. Disney, will you state your full name and present address, please?

K s h a r i m Written by Rabbi Dr. Marc Rosenstein

My name is Roger Mordhorst. The date is November 21, 2010, and my address 6778 Olde Stage Road [?].

An Interview with Jaakko Hintikka

Prentice Hall United States History Survey Edition 2013

Lesson 2. Systematic Theology Pastor Tim Goad. Part Two Theology Proper - Beginning at the Beginning I. Introduction to the One True God

SPECIAL OLYMPIC SCIENTIFIC SYMPOSIUM REPORT

Escaping the Bunny Trap: Lesson 1

House photographer. The Warren Commission, have never seen the pictures. story of a secret motion. the FBI and the CIA. on these pages nor

Comments on Scott Soames, Philosophical Analysis in the Twentieth Century, volume I

SID: At nine, you really had a heartfelt prayer to God. You were at a camp, a Christian camp. What did you pray?

Protect and Serve GENESIS 1:27; 9:1-7; MATTHEW 5: How is life a gift? How is life a responsibility? What makes life valuable?

Report of the Committee's Decision Regarding A Study in Scarlet by Sir Arthur Conan Doyle

I. There are False Prophets Beware of false prophets

The Diocesan Badge and Logo. A Manual for Proper Use

Video: How does understanding whether or not an argument is inductive or deductive help me?

Are we alone in the universe?

Shabbat Tzedek Tikkun Olam Day 1: 30 minutes; Day 2: 30 minutes

Houghton Mifflin Harcourt Collections 2015 Grade 8. Indiana Academic Standards English/Language Arts Grade 8

A Posteriori Necessities by Saul Kripke (excerpted from Naming and Necessity, 1980)

Resolved: The United States should adopt a no first strike policy for cyber warfare.

Pearson myworld Geography Western Hemisphere 2011

The philosophy of ecological restoration: Reconnecting nature and ourselves

The Roman empire ended, the Mongol empire ended, the Persian empire ended, the British empire ended, all empires end, and none lasts forever.

14.6 Speaking Ethically and Avoiding Fallacies L E A R N I N G O B JE C T I V E S

LESSON 1: ESTABLISHING CLASSROOM RULES, RIGHTS, AND RESPONSIBILITIES

TEACHING APOLOGETICS TO THE NEXT GENERATION

Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S)

"Prophecies, Tongues and other Gifts" (Gifts of the Spirit; Holy Spirit, Fellowship) I Corinthians 14 4/9/95 Dr. Jerry Nelson

Transcription:

Jack White 8/13/93 501 W. Vickery Fort Worth, TX 76104 Dear Jack, lath all there is in today's mail and all else I had to do I responded to Evica without reading your letter to me and to Evica of 4/29. Lou can judg9 how useful it has been to write Evica from my today's response and my 8/4 to him, of 01411 I'Vi tilinl; copies to iiarrs, although he has not responded in an:flay. It is possible!tat with all the crap Evica was feeding me I did misundei4gtand I16 and it is not his fault that somehow the one letter got mislaid, but it is obvious ts404.--if he had even just once been responsive nothing else would have folmwed. And as I think is natural, the more he evades and refuges to respond the more suspicious he makes the whole thing, I see nothing wrong with Your 4/29 letter to him or in your 1. in it. But I now wonder if he twisted that to evolve the question I quote directly: "Ue would like to have yo;respond to the!aiming question: 1. Has Ik ld Weisberg been a significant source of disinformation in the JFK investigation? 2. Why?" Ito- /that he not only puts this in the affirmative but by using "significant" he in ffect says that then: is no question but that I have been a disanformation agent, the only question being III 6.6 was it"significant". His claim that h+nised this so I would be defended has no =edibility at all, particularly not as phrased. Raising the questioht at all is both infamous and a measure of the common sense such people have-none. Plus their own arrogance of mind and spirit. I made no objection to any such paper and I waitcd two nmeks,".4ntil that long after tho conference ended, tate him. I had to write him again to get any response. I have no way of knowing what all the nuts with a high opiniom:of themselves may think o21-e Eay but as I told Evica, the only one I ever heard suggest anything like that is Livingstone- and he has a bo#oming out defaming all who do not bow to him as disinformation agents, worse in some of his lott -rs to me and to others. I want to be prdpared for that infamy from a certifiable man. Thanks and I'm sorry about this taste of time for all of us, ere is the only return address on his %/121 sincerely, 4),..nAjoettl Wet t t Harold Weisberg

JACK WHITE GRAPHIC ARTS 301 WEST VICKERY FORT WORTH, TEXAS 76104 PHONE 817-332-3913 August 9, 1993 Dear Harold......a followup letter to the one mailed earlier today regarding an alleged derogatory statement of Geroge Michael Evica. Enclosed is a copy of a letter I sent him in response to a list of questions he sent. He wanted answers to use as part of his presentation at the Third Decade Conference. This has been my only correspondence with him as far as I can remember. As you can see, you are not mentioned. I hope this will help clarify your concern. I suggest you contact George Michael personally or by phone to find out who is behind this smear tactic. If you find out what is going on, please let me hear from you! Cordially,

JACK WHITE GRAPHIC ARTS 301 WEST VICKERY FORT WORTH, TEXAS 76104 PHONE 817-332-3913 April 29, 1993 To: George Michael Evica Re: Third Decade Conference Dear George Michael, Thank you for the information on the conference and the invitation to participate. For economic reasons (certainly not lack of interest) I will be unable to travel to Providence for the event. However, I will by this letter attempt to answer the questions you pose, though not in the form of a formal research paper. First, though, I'd like to respond to several points in your letter: 1. You say you intend to "initiate an in-depth self-examination within the +MK assassination community." I'm not sure what you have in mind, but I hope it is to address a distressing trend I have observed among researchers. I am told that others have noticed it also, and that it was discussed at the Chicago symposium as "the new agnostics." Quite a few well-respected critics, as well as some newer ones, seem to have cane under the influence of some mysterious outside force and are defecting in whole or in part to the "other side." Some of them may have been made privy to certain "sensitive information." Others have come under the influence of persons who have somehow "brainwashed" them. Others may have been somehow threatened or blackmailed. And some merely seem to be protecting their long-established turf. Some latch onto, without question, obviously spurious "new evidence" and other disinformation. Some renounce good research they themselves have done in the past. Sane even say the single bullet theory is probably true and that Oswald probably was a shooter. It is all very disruptive to effective research. The current fall-back position of the conspirators seems to be "Divide (researchers) and conquer! 2. You say the focus will be on three questions (How, Who, and Why?). I thought there was a general broad consensus among most researchers: Haw: Military/intelligence scenario with tacit or actual approval of political/governmental/civilian power structure. Who: Tactical...military/intelligence. Operational...assorted paid or ideological "hit men" (mafia assassins, foreign assassins, CIA assassins, etc.) with designated patsy and coverup. Why: Various groups' hatred of JFK and his policies (military and CIA... Cuba and Vietnam and anti-communism; professional war machine...profits; mafia...revenge; Cubans...revenge; LBJ and JEH...power; etc.) 3. You say you "hope to reveal the identities of the conspirators." Does this mean someone at the conference is prepared to "name names"?

Now to respond to your specific questions for me in relation to the conference: 1. "Why are the Oswald (backyard? ID? I'm assuming you are referring to the backyard pica) photos so obviously faked?" This question is based on the erroneous assumption that the faking of the various Oswald photos is obvious. Actually, for 1963 technology, the faked photos were quite well done, almost state-of-the-art. I think the reason they were not perfect fakes was that the conspirators never dreamed that they would be examined in such great detail for 30 years. They thought they could control the investigation and evidence, and that the photos would only be used for propaganda, certainly not subject to 30 years of study by curious people like me. The fact is, the photos were good enough to fool many people for many years, and in fact, even today some serious respected researchers still believe they are genuine. Paul Hoch, for example, has expressed the opinion that degreed academics on the ESCA photo panel are by definition more respected experts than an amateur like Jack White, so he thinks the backyard photos have to be genuine. This is more of an intellectual bias than an objective analysis based on indisputable facts that prove beyond doubt that the backyard photos are fakes. My video documentary FAKE covers all the obvious reasons supporting fabrication, but here is a quick summary: a. All backyard photos (CE133A, 133B, and so-called 133C) can be shown to have backgrounds that are absolutely identical, yet the photos were allegedly taken by Marina with a cheap hand-held camera. It is absolutely impossible to achieve such a feat unless the camera is on a tripod. It could be achieved, however, by starting with a single photo of the empty backyard, and through matte insertion (or maybe cut-andpaste) insert another photo of a person "standing" in the scene., If the conspirators had only faked one photo instead of three, we could never have proved this, The EISCA "experts" claimed they could prove through "photogrammetry" (taking measurements within a photo) that the backgrounds were different. But I can prove that these academicians were not expert at all because they failed to consider "keystoning". Keystoning occurs when a projected picture image being printed is not precisely parallel to the negative. In fact, the backgrounds only can be shown to be identical by keystoning, thereby reversing the procedure which the conspirators used to make the "B" photo appear to have a perspective different than the "A" picture. When keystoning is used, photogrammetry is useless because it distorts measurements and stretches the picture in the direction of the easel tilt. By "un-keystoning" I was able to remove the false perspective and make the backgrounds absolutely identical except for places where retouching was done. This procedure also proves that the "B" background was the one keystoned. b. A single photo of "Oswald's" face was superimposed on someone else's body, and this was ccmposited into the background, not by an amateur, but by a very sophisticated graphic arts process called matte insertion. Looking at visuals in my slide presentation or videotape anybody can easily see that the faces in "A" and "B" are absolutely identical except far retouching in the area of the lips. Again, it is totally impossible for a person to appear in consecutive photos made with a hand-held camera and have the face be identical in pose, lighting and perspective. To say this can be done is the photographic equivalent of the single bullet theory. Like Cyril Wecht on that theory, I challenge anyone in the world, using a cheap hand-held box camera at with a waist-level reversed-image viewfinder to duplicate such a feat with both the background and the person's face. Any photographer will tell you it is impossible. c. Much other evidence of fakery is evident, as can be seen in my slide presentation or video...such things as wrong proportions, lack of proper sizing and balance in inserting the person in the background, improper lighting and shadows, missing fingertips on the right hand, much too much to outline completely in a brief summary like this.

Now to your second question about the backyard photos: 2. "Since they are not sophisticated work, what does that tell us about the disinformation people behind the photo frauds? Again this question assumes that the fake photos were not sophisticated. Quite the contrary is the case. I think they were produced by the graphics process called matte insertion. This is a sophisticated process requiring expert technicians, artists and photographers using equipment not available to the general public and using techniques and processes known to few outside of certain specialized industries, such as publishing, platemaking, photography and movie production. Such work is most commonly used in print advertising to seamlessly insert one photo into another. It uses a technique of reciprocal masking when combining pictures to hold back an image by means of a reverse mask and then using a positive mask of the same shape to print in another image in the area shielded by the previous mask, at the same time protecting the first image during the exposure of the second. Properly registered, a seamless image insertion is accomplished. This method has been widely used since the 30s, and I'm sure would have been available to experts in various government agencies since that time. Nowadays, such work is done by computer and traditional matte insertion is now little used. But in the GOs, it would have been the favored method of faking a photo. But I must emphasize it cannot be done by an amateur because it is a sophisticated process requiring technical know-how and elaborate commercial equipment. I do not know how to answer the second part of this question, because it presumes the introductory phrase is true. In a sense, I have already answered this, because think the disinformation people behind the fake photos underestimated the persistence and intelligence of us buffs. Allen Dulles himself said that the American people would never bother to read the report. (He was almost right; fewer than 1% did.) But those of us who did read it and have studied the evidence have found things out in 30 years that they thought they could keep secret. Had they known they could not totally control the evidence, they would have kept more of it secret. And had they guessed at the determined persistence of some of us Sherlock Holmes fans, they would have done fake photos that would have gone undetected forever instead of just 10 years. I hope this answers your questions. If you have further questions or if I can help with anything else, let me know. Cordially, Jack white