Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Detecting Photgraphic Fakes In The Time of Computers
#13
Charles Drago Wrote:Thank you, Jack.

I'm aware of Wilson's claim that he was given access by EMK to what we might term the "Smoking Gun Collection" of the JFK assassination -- or at least to one of them. Since all I have is his word on this, I remain highly skeptical.

Perhaps you were in the breakout room at the Dallas conference (ASC? Lancer?) where Wilson gave what I believe was an impromptu presentation and I tried my best to press him into going public with everything he had.

The man seemed consumed by some sort of inner conflict. His discomfort might easily have been interpreted as a manifestation of disingenuousness or frustration. Wilson resisted my best efforts -- no big deal, I guess -- at getting him to show and tell all.

And then he died.

Of course we attended Wilson's major presentation at an ASC conference a few years before the Lancer appearance. The images he shared that night have never left my consciousness. I believe there's a bootleg video extant of that evening's program.

And there's the MWKK installment in which Wilson shows us just a tiny sampling of what he had.

Here is what for me is the bottom line: The process either works or it doesn't. Wilson's results either can be replicated under controlled conditions, or they can't.

It seems to me that the first step is to estabish the validity of the process by scientific testing on non-controversial photographic materials.

Then, if I've got this right, even a second- or third-generation copy of an original JFK photo would give up its secrets to a validated Wilson-esque examination.

Has this been done?

If not, why not?

Please do not be skeptical of Tom's major discovery in the Archives.
He spoke to me privately about it for more than an hour, but swore me
to secrecy about it. He went into elaborate detail about how he contacted
Teddy K and Teddy wrote him a letter of access to Burke Marshall, who
wrote him a letter addressed to the head of the National Archives to
be shown the "secret collection" which Teddy knew existed. He said
these letters and his discovery would be part of his "lawsuit against the
government". He described to me in great detail what he found and his
study of it....how he was searched before and after entering the archives
room where he was handed an envelope containing the original unretouched
autopsy photos, and all the in-betweens and paperwork for doing the
retouching, and how he had recorded his recollections immediately
afterward for his evidence collection, and distributed three copies to safe
places, one of which presumably was Cyril Wecht. Though Tom was a
very secretive person, I am 100% convinced of his veracity on this
matter.

His computer methods were perfectly logical to me and can be replicated
by anyone, he told me, using only off-the-shelf software. Presumably his
files, now controlled by his widow and son, describe his process in detail.

I believe that his Dallas attorney may be one of the other persons who
has copies of all his files, but is powerless to act without permission of
the heirs.

Jack
























6
Reply


Messages In This Thread
Detecting Photgraphic Fakes In The Time of Computers - by Jack White - 18-11-2008, 04:36 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Google [and other search engines] Loose Big-Time In EU Court! Peter Lemkin 5 7,001 16-05-2014, 03:05 PM
Last Post: Drew Phipps
  Researchers crack the worlds toughest encryption by listening to your computers CPU David Guyatt 1 4,878 06-01-2014, 11:16 AM
Last Post: Peter Lemkin
  Scientist scanned internet for traces of time travellers David Guyatt 0 3,627 04-01-2014, 10:54 AM
Last Post: David Guyatt
  New Thought On Structure of Space-Time and Everything.... Peter Lemkin 0 5,168 25-09-2013, 05:27 PM
Last Post: Peter Lemkin
  DARPA Spy Satellite To Track Objects In Real Time Ed Jewett 0 3,193 04-01-2012, 05:24 AM
Last Post: Ed Jewett
  ... German Security Agencies Caught Planting Spyware on Private Computers Ed Jewett 0 3,981 16-10-2011, 10:32 PM
Last Post: Ed Jewett

Forum Jump:


Users browsing this thread: 1 Guest(s)