06. Expanded Police Powers and Foreign Military Forces | New World Order / Deep State | Sovereign’s Handbook

By Johnny Liberty

End of National Sovereignty of the United States

Former U.S. Senator Prescott Bush, father to the Bush Dynasty of George H.W. Bush and George W. Bush, helped pass a law in 1961, signed by U.S. President John F. Kennedy, to eliminate the U.S. military and to use foreign troops to police the united states of America.

This was the start of a gradual erosion of the national sovereignty of the U.S. government corporation toward that of a New World Order. The destruction of national sovereignty of the united states of America was almost achieved at the turn of the 21st century by relegating the command of our U.S. military to the United Nations (UN). 

Foreign Military and U.S.Police Powers

Supposedly, U.S. President George W. Bush transferred the command of the U.S. military forces to the United Nations (UN) under their direction and control.

The Global Power structure did not hesitate to use the increasing new “police powers” to enforce their plan for a New World Order. For example, in Bosnia, the largest multinational world army since World War II  was assembled with sixty-thousand (60,000) troops.

In 2004, the “United States” has dozens of distinct federal police organizations with over 105,000 troops including the Federal Bureau of Investigation (FBI), Bureau of Alcohol, Tobacco & Firearms (BATF) and the U.S. Marshals.

In 2020, there are 697,195 local and state police forces, many of which have been organized “within the United States” under the Multi-Jurisdictional Counter-Drug Task Force (MJCTF) under the jurisdiction of the U.S. Department of Homeland Security. They have long been equipped with military-style weapons, tanks and drones. 

MJCTF was the velvet glove on an iron fist, comprised of not only military and law enforcement personnel, but also of gangsters from the inner city. MJCTF’s avowed purpose was to perform house-to-house search and seizure operations to seize weapons, guns, food reserves and people when ordered. 

The Financial Crime Enforcement Network (FinCEN) were foreign military and secret police brought into the “United States” for deployment against “U.S. citizens” under the authority of an Executive Order (EO) of the U.S. President, Interpol, and the United Nations (UN). 

United Nations (UN) troops have been trained in old military bases in the United States for future actions against We the People, or elsewhere in the world. Since November 11, 1990, UN troops have performed joint military exercises with U.S. troops on U.S. Forest Service land in Arizona, Idaho and Montana. 

Other United Nations (UN) battle groups are in Ft. Drum, NY, Ft. Dix, NJ, NC next to VA, TX panhandle near OK, south of Los Angeles, CA. There are United Nations Naval forces throughout MI, MT and Sacramento, CA.

Along with the National Guard and the U.S. Military, you would imagine this would be enough firepower to wage a war against a now, mostly compliant, agreeable people. 

Except that the U.S. military may not be reliable enough to enforce tyrannical laws or assaults against their neighbors, friends and families unless the soldiers have swallowed the “blue” pill or completed their “woke” training seminars. 

Any soldiers who understand their “oath of allegiance” to the U.S. constitution might offer some resistance to the New World Order plans. There are patriotic U.S. military forces, including the Officer Corp and the Delta Force, that may resist the takeover of our nation by domestic or foreign adversaries.

But soldiers from other countries under the flag of the United Nations (UN) might not be as compassionate in dealing with “U.S. citizen” resistance. Therefore, foreign soldiers may be more reliable fighting forces against the people of the united states of America. 

With the Biden Administration’s “open-border” policies, thousands of fresh, foreign military recruits may be enlisted in the U.S. military, or forced into service due to their illegal status.

Rumors of black military helicopters seen in various locations within the united states of America, many associated with Drug Enforcement Agency (DEA) operations are true. They have also been engaged in the surveillance of civilians. I had seen an unmarked, black helicopter hovering over my home and office several days before the Internal Re-Venue Service (IRS) raids of February 28, 2001. As it turned out, the unmarked helicopter were taking infrared photographs to locate computers and other electronic equipment which was verified in the search warrant. 

According to eye witnesses, Russian military equipment was being unloaded at shipping docks, and imported from foreign countries to points in Mexico. There are 800 concentration camps in the “United States” that were recently refurbished. What are “concentration camps or reeducation camps” doing here in the united states of America? We had better ask the question before it is too late.

Persian Gulf War Forces Exposed to Biological and Chemical Agents  

Joyce Riley, RN was afflicted with the Gulf War Syndrome and survived to lead a campaign to help sick and dying veterans being shunned by the Veterans Administration (VA) and the U.S. Department of Defense. She said, “Only 143 American men and women died in the (first) Gulf War. Now 10,000 to 12,000 are dead.”

One of a few allies, former U.S. Senator Donald W. Riegle Jr., Chairman of the U.S. Senate Committee on Banking Housing and Urban Affairs, released a report in September 1993 revealing that U.S. troops were exposed to chemical and biological warfare agents during the Iraq war. Concerned for the health of U.S. veterans and their families, who were also getting sick, he held a U.S. Senate hearing on February 9, 1994 which revealed Gulf War troops were indeed subjected to experimental vaccinations, irradiated foods, radioactive munitions and a toxic soup of substances released by the Iraq bombings. This was localized nuclear warfare which was never fully disclosed to the soldiers on the battlefield.

His committee requested records from the U.S. Department of Commerce to show the U.S. government approved the sale of biological materials to the Iraq Atomic Energy Commission, the Iraq Ministry of Higher Education, the State Company for Drug Industries and the Ministry of Trade before the war again. These were used as weapons which harmed U.S. troops in the Iraq war.

In 1992, a U.S. Department of Defense report called Conduct of the Persian Gulf War said: “(Iraq’s) advanced and aggressive biological warfare program was the most advanced in the Arab world…(The) program…concentrated on the development of two agents, botulinum toxin and anthrax bacteria… Delivery means for biological agents ranged from simple aerial bombs and artillery rockets to surface-to-surface missiles.”

Riley showed twenty (20) different biological weapons loaded into the warheads along with cyanide which was used to make the gas mask filters ineffective. “When the U.S. patriot missiles knocked Short-Range Ballistic Missiles, or SCUDS out at 200 feet over the heads of the American troops, they were rained on with biologicals.”

The following biological materials, all of which have potential weapons applications, were sold to the Iraqis by American companies — Bacillus Anthracis, Clostridium Botulinu, Histoplasma Capsalatum, Bruccella Melitensis, and Clostridium Perfringens.

Orders for E. Coli, genetic materials and human bacterial DNA were shipped directly to the Iraq Atomic Energy Commission. The U.S. military was an accomplice in these 10,000 – 12,000 deaths by approving the sale of materials which violated the Geneva Convention. The U.S. military may be doing exactly the same in Ukraine during the Russia-Ukraine police action.

Ms. Riley also said, “The US government and Iraq violated the Geneva Convention of 1972. There are tremendous criminal and political implications in this.”

The symptoms suffered by Persian Gulf War veterans spread to family members and pets, and an inordinate number of the Veteran’s children are born dead or deformed. Ms. Riley revealed that U.S. troops returning from other wars and engagements are exhibited similar symptoms. “Men returning from Somalia were sick, people returning from Bosnia had rashes and a strange viral illness, and troops on a three-month rotation in Kuwait came back sick with a rash.” 

U.S. Companies Profited from Biological Warfare Ingredients in the Persian Gulf War

Despite U.S. Senate hearings and evidence to the contrary, the U.S. Department of Defense and the Veterans Administration (VA) continued to issue reports concluding that they could find no single cause of the health problems of Persian Gulf War veterans. They were of course, lying as usual.

Peter Kawaja, a security specialist who provided security to Product Ingredient Technology (PIT) in Florida and Ishan Barbouf International (IBI), said germ warfare was indeed used in the Persian Gulf War and that the United States sent soldiers into the war knowing biologicals would likely be used. In addition, the hydrogen cyanide used to render gas mask filters ineffective was tested at Product Ingredient Technology (PIT) for over a year prior to the war.

In 1989, Kawaja was asked to install a hydrogen cyanide detection system for the company. He became suspicious of the company’s motives and reported their activities to the CIA, FBI and U.S. Customs.
The U.S. government told him Ishan Barbouf International (IBI) were “international terrorists” and that the government was going to prosecute them. That never happened. 

In 1990, he sent a secret message to the National Security Agency (NSA) warning that Iraqi intelligence was operating in the US close to a classified military facility. He had obtained audio and video recordings, fax transmissions and paper documentation of federal agents, politicians and the “terrorists” regarding connections to Commodity Credit Corporation-Banca Nazionale del Lavorro (CCC-BNL).
To cover up his discoveries, eight federal agents subsequently burst into his office at the International Security Group (ISG) and confiscated videos and other documentation without presenting a search warrant. This evidence was subsequently sealed for “national security” purposes. Four years later, Mr. Kawaja had it unsealed. 

The documents proved that U.S. government agents knew that Barbouti, who had previously built the Pharma-150 Chemical/Biological Complex at Rabta, Libya, had established a chemical warfare production facility at the PIT plant in Florida. The documents showed that the government was familiar with Barbouti’s ownership of CROSS LINK in Belgium which is connected to CCC-BNL.

 Brent Sowcroft of the National Security Council, was a consultant to BNL. Attorney General Janet Reno appointed John Hogan II to investigate BNL, an attorney from Miami, FL who represented Ishan Barouf International. The only major portion of his BNL Task Force Report that was blacked out is on Ishan Barbouti. 

Apparently, U.S. President George Bush, James Baker III, and John Deutch all had financial interests in some of the corporations that developed, sold and transferred the biological and chemical weapons to Iraq before the war, according to Peter Kawaja and doctors, Garth and Nancy Nicholson.

Electromagnetic Warfare by U.S. Military

Potential uses for the Electromagnetic (EMF) spectrum in warfare was described in an Air Force Document called, Low Intensity Conflict and Modern Technology in 1986. In the forward, Newt Gingrich touted the United State’s ability to successfully cope with low-intensity threats, intimating that electronic weapons are the ideal tools to accomplish that goal. They have been used overtly and subtly.

The Pentagon’s energy weapons development program includes high power lasers that disorient the enemy, strobe lights that nauseate uncooperative crowds, and high-powered microwaves that disable electronic components. The U.S. Air Force already deploys flying transmitters that intercept radio transmissions and replace the content to the controller’s liking.

Operation Sleeping Beauty during the Reagan Administration explored ways to disrupt the human nervous system through electro-magnetics. The program sought to manipulate the reason, emotions and physical sensations of subjects and to “unhinge a human’s mind”

Theoretically, practical uses for such electro-magnetic capabilities included the quieting of mobs by triggering mass vomiting, electronically disorienting hostage-takers minds, and the disabling of terrorists holed up in compounds with explosives. In 1990, the U.S. Department of Defense said the Soviets had the ability to produce radio frequency weapons that could disorient people at a distance of a half mile. Apparently, the Soviet’s capacities at mind control were much more sophisticated than those of the United States.

According to Newsweek, Moscow conferred with the Federal Bureau of Investigation (FBI) during the Waco siege about their technique of beaming inaudible transmissions into a subjects brain. This method would have caused the Branch Davidian’s leader David Koresh to think he was hearing the voice of God in his head. During Waco, the U.S. Air Force offered the FBI one of its top-secret non-lethal weapons which “would have given [the FBI] the ability to make a surprise attack with a large number of agents.”  After Waco, Former U.S. Attorney General Janet Reno asked the Pentagon and the CIA to join her in further exploration of the use of these “non-lethal technologies” for both U.S. military and civilian law enforcement purposes.

Even though these weapons were billed as “non-lethal”, an article written as early as 1980 in Military Review, said, “…There are weapons systems that operate on the power of mind whose lethal capacity has already been demonstrated.”

In 1994, a U.S. Air Force publication, Defense News projected that it was possible to locate anyone on the planet (through their cell phones) and then target them for disruption through thought implantation techniques delivered by future 5G wireless networks. Similar technologies have been developed to pump millions of watts of electricity deep into the Earth and far into the upper atmosphere such as HAARP.

The High Frequency Active Auroral Research Program (HAARP) 

The High Frequency Active Auroral Research Program (HAARP) is a geophysical weapon so powerful, it is still considered today by many to be a weapon of mass destruction.

The U.S. Air Force site near Gakona, AK is home to HAARP, which is only one among many similar installations across the globe’s “superDARN Highway”, an array of High Frequency (HF) radar now covering most of the northern and southern hemispheres.

Drone Warfare

An unmanned combat aerial vehicle (UCAV), also known as a combat drone is an Unmanned Aerial Vehicle (UAV) that is used for intelligence, surveillance, target acquisition, and reconnaissance. It carries aircraft weapons such as missiles and/or bombs in hard points for drone strikes. 

These drones are usually under real-time human control, with varying levels of autonomy.Unlike unmanned surveillance and reconnaissance aerial vehicles, UCAVs are used for both drone strikes and battlefield intelligence.

References:

  1. Cato Institute: www.cato.org; Cato Report on Paramilitary Raid.
  2. Liberty International and YouTube | JFK To 911: Everything is a Rich Man’s Trick (film) by Francis Conolly reveals U.S. Senator Prescott Bush’s involvement in the assassination of JFK; Crossing the Rubicon – The Decline of the American Empire at the End of the Age of Oil by Michael Ruppert: Amazon
  3. Public Law 87-297 (1961), Vol #9, USC, p.554 and State Department Paper 7277 (eliminate American armed forces, total disarmament and UN troops would police USA); EO#12148 by President Jimmy Carter (FEMA would command all military forces as deputy U.S. Marshals);  U.S. Marshals have sworn an oath to uphold the United Nations and President George Bush transferred command of the American military forces on September, 11, 2001 (confirmed in Pandora’s Box, p.489.) including the FBI, ATF and U.S. Marshals;  Can the President as Commander in Chief of the United States Military Delegate Power over to the U.N. Secretary General?, The Higher Truth (Vol 1, Issue 1, p.17).
  4. Wikipedia | Federal Police Organization and Troops number 105,000 (2004); Statista | 697,195 local and state police forces; Wikipedia | Multi-Jurisdictional Counterdrug Task Force (MJCTF).
  5. Perceptions Magazine, May/June 1995, p.84; Seeks to create a “rapid strike force” of 2,500 federal law enforcement officers; Silent Weapons for Quiet Wars by Hardford Van Dyke; Amazon; Top secret document that is proof positive of a secret declaration of war against the American people; Sourced from Government’s Liberty…Brings Death To Freedom, p.114; William Cooper, Behold A Pale Horse; The World Economy for the Year 2000, Scientific American, Sep. 1980; U.N. troops are in the U.S. to enforce FEMA and confiscate firearms and support the MJTF search and seizure operations confirmed in Alexander Christopher, Pandora’s Box, p.483; Preposterous legislation has passed the U.S. Congress giving police the authority to behead people; Public Law 102-14; Railroad cars have been spotted in the U.S. with shackles built into the sides, handcuffs and guillotines; Towards The New World Order:  America’s Secret Police Force, Nexus (Feb/March 1994, p.11); Insiders view of FEMA, MJTF and FinCEN.
  6. Wikipedia | Amended Posse Comitatus Act of 1981; Mark Koernke, Former CIA Intelligence Analyst and reputed founder of the Michigan Militia; Alexander Christopher, Pandora’s Box, pp.489-506; There have been many independent sightings of U.N. equipment and soldiers training on American soil;  What are they doing here and why are we not permitted to ask?
  7. Combat Arms Survey which was administered to United States Marines at the Twenty-nine Palms, California, Marin base on May 10, 1994 under the guise of a research project. It asks soldiers if they would obey U.N. officers, and if they would confiscate firearms from American citizens and shoot those who resist; The Higher Truth  (Vol. 1, Issue 1, p.18) and supplied by a young Marine who had answered the survey.
  8. Exotic Research Reports: The Patriot News; Liberty International Archives. 
  9. Exotic Research Reports (Winter 1996); Reviewed by Estar Holmes, North American News Service, Summer ‘96, p.26; Liberty International Archives. 
  10. Exotic Research Reports; Newsweek, (Feb. 7, 1994); Reviewed by Estar Holmes, North American News Service, Summer ‘96, p.38; Liberty International Archives. 
  11. Wikipedia | HAARP (High Frequency Active Auroral Research Program); Geoengineering Watch | What is HAARP?
  12. Wikipedia | Unmanned combat aerial vehicle.

Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.229 – 234

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK

04. National/Global Security State, NSA and CIA | Global Power Structure | Sovereign’s Handbook

By Johnny Liberty

Establishing the National/Global Security State

The Central Intelligence Agency (CIA) was legislated into existence via the National Security Act (1947) with limited statutory authority.  It originally required that any covert action taken by the CIA must be authorized by the National Security Council. Countless times since its inception, the CIA has exceeded its congressional and constitutional authority.

After World War II, many former Nazi intelligence officers were brought to the United States and placed into various intelligence agencies, including the Office of Naval Intelligence and the CIA.  Having infiltrated many key positions in government agencies and private enterprises with people loyal to various CIA hierarchies, the CIA is a central hub of the actual United States Power structure.

Wiretapping & Due Process of Law

Originally, the National Security Agency (NSA) provided for checks and balances that have become meaningless today. The CIA has taken on functions never intended by the NSA, and has too often breeched its congressional mandate and authority. 

Though authorized only to operate outside of the “United States”, the CIA has been, and is today, involved in domestic affairs within the “United States”, and orchestrating media propaganda campaigns both domestically and abroad through the propaganda, mainstream media which they control. 

The National Security Agency (NSA) monitors phone calls between the United States and foreign nations. With revelations from Edward Snowden in 2013, we discovered that the NSA is prying and spying into every phone conversation on every smart phone in the united states of America. Snowden disclosed to the mainstream media and made public blatant violations of the law by the NSA. His punishment was to become an international scapegoat presently in exile in the country of Russia.

National Security Directives (NSD) issued by the NSA do not have to be reported, reviewed, made available to anyone or even acknowledged that they exist. These NSDs are further evidence of the existence of Power structures operating behind the scenes of de facto government.

The Computer Matching and Privacy Act gives the U.S. government absolute authority and discretion to wiretap phones and plant bugs in homes and businesses without the knowledge or consent of those being monitored.

The Digital Telephony Bill (HR 4922)(i.e. CALEA), passed by the House (Oct. 5, 1994), created and funded a national system for the interception of digital and other communications. It allows the easy isolation of individual communications for government wiretapping purposes, pursuant to a court order or other lawful authorization. 

Telephone corporations that do not comply or assist the government have been shut down. Computer chips are installed in all electronic devices including computers and cell phones so that the government can ceaselessly monitor each Citizens communications remotely.

“A revolutionary change, permits law enforcement agencies to pass around investigative information, much of it rumor and gossip, over a national computer system run by Big Brother.”
~ Representative Don Edwards (D-CA)

Undaunted by the public outcry against its maligned Clipper Chip, the NSA has developed the Fortezza Card. This technology encrypts data under the cloak of privacy, but retains a “back door” for government agents who believe they have the right to snoop into your private affairs. 

The NSA remains persistent in its efforts at cyber-spying and tightening its grip on the free enterprise, free expression of the Internet despite initial opposition by Silicon Valley executives. Today, Big Tech and social media companies are step-by-step in alignment with the government’s snooping, spying and censorship agenda.

The Federal Register contained a lengthy, detailed “notice of the maximum capacity required to accommodate all of the communication interceptions, pen registers, and trap and trace devices that the Attorney General estimates the government agencies authorized to conduct electronic surveillance may conduct and use simultaneously by 1998.”

Former FBI Director, Louis Freeh revealed that “Each telecommunications carrier must ensure that it can expeditiously increase its capacity to meet the assistance capability requirements [for] interceptions equal to 1% of the engineered capacity of the equipment, facilities or services that provide a [wired or wireless telecommunications] customer or subscriber with the ability to originate, terminate, or direct communications.”

More and more efforts to legislate and institutionalize welfare IDs, driver license and passport IDs, national IDs, digital banking IDs, travel IDs, vaccination IDs, forced implantation of biochips, contact tracing, and other forms of tracking and surveillance systems are rapidly becoming integrated into every aspect of modern life especially since the COVID-19 “plandemic”.

Executive Orders and CIA

Executive Orders (EOs) can be invoked in secret by the U.S. President. Secret government legislating in secret are evidence of the existence of United States Power structures operating behind the scenes of the de facto government. 

After U.S. President Jimmy Carter ordered the disbanding of the CIA’s covert operations in the 1970s, the CIA went deeper underground until U.S. President Ronald Reagan restored its covert operations. Covert operations and black budgets are evidence of the existence of Power structures operating behind the scenes of de facto government.

Three factions in the CIA are competing with each other. Faction One is controlled by the Department of Justice (DOJ) and the White House. Faction Two is controlled by the Office of Naval Intelligence (ONI), and is often at odds with Faction One. Faction Three is a small number of former Office of Strategic Services (OSS) personnel who answer to no one.

Today, the CIA has become so powerful that it can destroy any politician who seriously questions its activities. The CIA meddles in elections both abroad and domestically. The CIA conspires with underworld figures and organizations including the Mafia to carry out all sorts of criminal activities both abroad and in the united states of America. The CIA creates wars to serve the agencies interests, creates enemies such as ISIS, and even fights wars against the United States military, such as in Syria. The  United States military machine has killed more than 20 million people in 37 nations since World War II.

In 1953, U.S. President Dwight Eisenhower warned the American people of the dangers imposed by the military-industrial complex, which included the CIA.

“The National Security State uses Fascism to protect capitalism
while they say they’re protecting democracy from Communism.”
~ Michael Parenti

Mind Control and the Global Manipulators 

A notorious center of “mind control” and time travel research on the eastern end of Long Island, New York is The Montauk Project. Preston Nichols discovered a blocking frequency that was jamming the minds of psychics he was working with.

A blocking frequency was installed around the Earth to disconnect humanity from other dimensions, similar to being an astronaut on the moon being cut off from Mission Control. “Like radio or television waves broadcasted from a transmitter and decoded by a radio or television set, the human mind decodes thought-waves broadcast by the universe. Some people have their sets tuned for other frequencies and dimensions and are considered talented psychics or clairvoyants. These are talents once common to the entire human species that have been blocked, jammed or programmed out of us by the global manipulators.”

The CIA, and other intelligence communities, have long engaged in mind control”experiments – LSD and psychedelic experiments in the 1960s; HAARP engaged in weather control and blasting human population centers with Electromagnetic Radiation (EMFs); and training assassins for their political dirty work.

“For some time I have been disturbed 
by the way the CIA has been diverted 
from its original assignment.

The CIA has become an operational
and at times a policy-making
arm of the government…”

~ President Harry Truman (1963)

Facebook as CIA Data Mining Operation

Meta, originally called Facebook, was established by the Central Intelligence Agency (CIA) under the leadership of Mark Zuckerberg, who is coincidentally, a Rockefeller.  

Facebook was founded to operate as a “data mining” organization so as to collect as much information on as many people as possible to control human populations and selectively direct the flow of information. Facebook has very close ties to the Defense Advanced Research Projects Agency (DARPA).

From a national security standpoint, DARPA’s purpose is to find out lots of things about lots of people. Where they are going? What they are doing? What airlines are they using? Who do they associate with? Which types of online books and films do they read or watch? How do they think and feel politically? The list goes on. If you simply follow the money, it is quite easy to see what is happening behind the scenes of this sinister social media network. 

Facebook, the identifying book of faces, is a perfect technological partner to the CIA’s playbook of surveillance, propaganda and media manipulation.

Secret Directives Behind Airport I.D. Checks

Reporters or attorneys who follow federal FOIA requests may be interested in recent efforts by privacy advocates to get the government to release a secret directive that the airlines rely on as the basis for demanding that passengers show an official photo ID before boarding their flight. 

Some privacy advocates consider the photo ID requirement on domestic flights an unnecessary intrusion into the passenger’s privacy, since the metal detectors and luggage screening equipment that is already in place is sufficient to ensure the security of air travel without violating privacy rights.

While airline officials blame the Federal Aviation Administration (FAA) for the photo ID requirement, the FAA refuses to make public the secret directive the airlines say they are implementing. This, of course, raises questions as to why the directive itself is a secret. From the passenger’s perspective, the airlines are saying “the FAA makes us do it”, but the FAA says “no” when asked to produce the document that the airlines claim requires them to ask for photo ID.

“Privacy attorneys Robert Ellis Smith and Lee Tien have filed separate FOIA requests to obtain the FAA directive. Both FOIA requests were rejected, and Smith and Tien are doing more legal research to determine if there is sufficient grounds for a lawsuit. Meanwhile, passengers who refuse to show a photo ID, have in a few cases been prevented from boarding, subjected to abuse by airline officials, or treated with suspicion for exercising their Constitutional right to privacy.  Even more confusing, some passengers are not being asked for ID prior to boarding.”

Department of Homeland Security (DHS) and Transportation Security Administration (TSA)

Customs agents routinely search passengers leaving the country for smuggled items, including excess cash. Foreign mail is opened. Bank tellers are being ordered by their employers to report suspicious transactions. The U.S. government can use your household or office garbage to incriminate you, including medical records,  psychiatrist’s records, personal journals, or your attorney’s private notes?

In the wake of events of September 11, or September 11, 2001 (911), the “national security” system was reorganized, integrated and expanded. In October 2001, the Department of Homeland Security (DHS) was established within the Executive Office of the U.S. President. Due to pressure from the U.S. Congress, however, the original office became a cabinet department in 2003. 

The Department of Homeland Security (DHS) integrated 22 federal agencies, including the Federal Emergency Management Agency (FEMA), U.S. Coast Guard, U.S. Customs Service, and U.S. Secret Service under one department. Agencies created specifically in response to 911 were transferred to another new department; the Transportation Security Administration (TSA) is but one example.

References:

  1. Wikipedia | National Security Act.
  2. Connie Chung, Eye to Eye (television program) June 17, 1993 (drug trafficking into the US in military aircraft); 60 Minutes, November 21, 1993 (filmed several DEA officials and agents describing smuggling of large quantities of cocaine by the CIA into the US); Associated Press, May 3, 1993 (reported cooperation by U.S. Customs agents in drug trafficking); Clinton Chronicles (video portraying Clintons political machine and the financial involvement in drug money laundering and a blind eye turned to Mena, Arkansas); Spider’s Web by Alan Friedman; Compromised by Terry Reed and John Cummings; The Mafia and the CIA and George Bush  by Pete Brewton;  Deep Politics by  Peter Dale Scott; Defrauding America by Rodney Stitch (1994),  pp.199, 293, 327.
  3. Liberty International and The Guardian | With the latest WikiLeaks revelations about the CIA, is privacy really dead?
  4. Computer Matching and Privacy Act of 1988.
  5. Wikipedia | Communications Assistance for Law Enforcement Act; Digital Telephony Bill (H.R. 4922) (aka CALEA) passed on Oct. 5, 1994 sourced from Perceptions Magazine, May/June 1995, p.80;  See also Technology and Liberty: Police State Plans by Clark Matthews, The Spotlight, February 28, 1994, p.6.
  6. Quote by Don Edwards on “big brother”.
  7. Wikipedia | Fortezza; Everyone will have a Fortezza card to encrypt or de-encrypt DMS messages. Each command will have a number of Fortezza cards to be placed at the entrance to the command for organizational DMS messages.
  8. Federal Register, Doc. 95-25562, October 13, 1995.
  9. Wikipedia | Quote by Louis Freech.
  10. Wikipedia | National Security Directive (NSD); Behold A Pale Horse by William Cooper.
  11. National Security Directives are not published anywhere; Defrauding Americaby Rodney Stitch (1994), p.346 (full text of a standard CIA secrecy agreement) and p.346 (portions of the National Security Act);  What Uncle Sam Really Wants by Noam Chomsky, Odonian Press, pp.8-10 (National Security Council Memorandum 68 (1950) written by Dean Acheson, Paul Nitze and Policy Planning Study 23 written by George Kennan were the implementing policies for Soviet-American foreign policy which perpetuated the arms race and the eventual bankruptcy of both countries); The National Security State by Gore Vidal, Organica, Autumn 1993, p.4 (on the American empire).
  12. Liberty International and Sputnik News | Former NSA Officer William Binney: CIA Lying About Russians Hacking the Democratic National Committee.
  13. Liberty International | Putin: Who Created ISIS?; Liberty International and AWD News | Assange released 500,000 diplomatic cables which reveals how the CIA created ISIS; If you ever wondered why Western governments hate Julian Assange so much and are willing to torture him to death in prison without trial, it’s because he has exposed the deep cover game; Liberty International | CIA Must Stop Illegal, Counterproductive War to Overthrow Assad; Liberty International and ZeroHedge | Pentagon At War With CIA In Syria; Liberty International and Global Research | US Has Killed More Than 20 Million People in 37 “Victim Nations” Since World War II; Liberty International and Newsweek | U.S. has spent six trillion dollars on wars that killed half a million people since 9/11.
  14. National Security Agency (NSA), Central Intelligence Agency (CIA) and Computer Matching and Privacy Act. Sourced from L. Fletcher Prouty who is supposedly the deep cover CIA operative that was portrayed in Oliver Stones movie JFK.
  15. Wikipedia | Michael Parenti; Wikiquotes | Quote sourced from Michael Parenti.
  16. Wikipedia | The Montauk Project; Regarding CIA experimentation and using the public as guinea pigs, see also the article Microwave Harassment and Mine-Control Experimentation by Julianne McKinney, Electronic Surveillance Project, Association of National Security Alumni.
  17. Quote by U.S. President Harry Truman; Washington Post, Dec. 21, 1963.
  18. Wikipedia | Defense Advanced Research Projects Agency.
  19. The Real News | Facebook and its Connections to the CIA and DAARPA by Brian S. Staveley. 
  20. New York Sun | Legality of Airport ID Checks Probed
  21. Wikipedia | Department of Homeland Security (2001) www.dhs.gov

Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.159 – 164

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK

04. United States Power Structure | Global Power Structure | Sovereign’s Handbook

By Johnny Liberty

The United States Power structure is visible through an alphabet soup conglomerate of a private joint-stock trust – the Federal Reserve Bank (FRB); a territorial collection agency – the Internal Re-Venue Service (IRS); a global network of intelligence agencies coordinating media propaganda and regime change – the Central Intelligence Agency (CIA); three branches of de facto federal  U.S. government (Executive, Legislative and Judicial), plus numerous U.S. government agencies, private transnational corporations and non-profit organizations. 

Short Chart of United States Power Structure  

  • Federal Reserve Bank (FRB)
  • Federal Deposit Insurance Corporation (FDIC)
  • Internal Re-Venue Service (IRS)
  • Central Intelligence Agency (CIA) and Office of Naval Intelligence and Office of Strategic Services
  • National Security Agency (NSA)
  • National Security Council (NSC)
  • Defense Intelligence Agency (DIA)
  • U.S. President Executive Branch
  • U.S. President as Commander-in-Chief of U.S. Military and U.S. Defense Department
  • Department of Justice (DOJ)
  • Federal Bureau of Investigation (FBI) 
  • Bureau of Prisons (BOP)
  • U.S. Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) and Transportation Security Administration (TSA)
  • Multi-Jurisdictional Task Force (MJTF)
  • U.S. State Department
  • U.S. Department of the Treasury (DOT)
  • General Accounting Office (GAO)
  • U.S. Department of Commerce (DOC)
  • Securities and Exchange Commission (SEC)
  • Wall Street Law Firms and Attorneys
  • U.S. Federal Executive Departments (27)
  • Food and Drug Administration (FDA) 
  • Drug Enforcement Agency (DEA)   
  • Bureau of Alcohol, Tobacco and Firearms (BATF)
  • Immigration and Naturalization Service (INS)
  • U.S. Congress Legislative Branch
  • U.S. House of Representatives (435)
  • Congressional Research Service
  • U.S. Senate (100)
  • U.S. Supreme Court Judicial Branch
  • U.S. Appeals Courts
  • U.S. Federal District Courts
  • U.S. State Governors (50)
  • U.S. Attorney General
  • National Guard
  • State Attorney Generals (50)
  • Attorneys-At-Law and State Bar Associations
  • Certified Public Accountants (CPAs) 
  • State, County and municipal governments.
  • State, County and Municipal courts
  • State, County and municipal police forces,  multi-jurisdictional task forces (MJTF)
  • State and County prison systems

“In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex.
The potential for the disastrous rise of misplaced power exists and will persist. We must never let the weight of this combination endanger our liberties or democratic processes.”

~ Dwight D. Eisenhower

Military Industrial Complex

The defense industry is an extremely lucrative sector that is thriving as countries ramp up their military spending amid the changing geopolitical scenarios. The United States tops the list of the world’s biggest military spenders with an annual military budget of $782 billion in 2022. China, India and Russia are some of the other notable countries that spend a fortune on defense.

Major countries hire defense contractors for military equipment, services and maintenance of their defense systems. The U.S. Department of Defense has contracts worth billions of dollars with organizations from around the world. The top prime contractors of the U.S. Department of Defense are Lockhead Martin (LMT), Raytheon (RTX), Boeing (BA), and Northrop Grumman (NOC).

The military-industrial complex so prevalent during the Cold War and Vietnam years has since transformed into a “military-industrial-medical-police-attorney-prison” complex re-sharpening its focus from the Cold War into an assault against the civil liberties of U.S. citizens, or sovereign “state” Citizens, and an imminent “hot” World War III against Russia, China and Iran.

MILITARY • INDUSTRIAL • POLICE • ATTORNEY • PRISON

The Pentagon is involved in 5G Electromagnetic (EMF) warfare development and mind control experiments on civilian populations. Nanotechnological biochip implants are already bedbug used in human subjects with the capability of tracking through either the satellite-based Global Positioning System (GPS) and/or 5G and 6G wireless networks. The introduction of mRNA vaccines is also playing into this sinister scheme to track and control all of humanity.

The Law Enforcement Satellite System (LESS) has been developed to cut the communications costs incurred by law enforcement agencies which currently maintain separate systems. An entirely new unified police communications infrastructure directly links all government agencies and their enforcement units to the National Crime Information Center which combines all law enforcement data from various agencies.

“Those who make peaceful revolution impossible, make violent
revolution inevitable.”
~ Robert F. Kennedy (U.S. Senator, 1967)

The so-called “war against terror” supports government at all levels by expanding its military and police capacity. If “domestic terrorism” escalates in spite of tougher laws, then government power mushrooms even more. Today anyone can be labeled a “domestic terrorist” if they hold political views contrary to those in power. And, the Federal Bureau of Investigation (FBI) will come after them.

“Please let it be known that all of the contents of this book are solely the opinion of the author. Under anti-terrorist legislation now in effect this book could be construed as a veiled threat, anti-government sentiment, even domestic terrorism. Anyone can be blacklisted as a terrorist organization, and have its office raided and property seized without a warrant. You could be arrested, taken from family and friends without due process, a formal accusation or a trial by jury and sent to prison indefinitely.”

You might say, “This could not happen in the united states of  America.” Dearest friends, look at the writing on the wall. Criticizing the government used to be an American pastime, to organize rallies in opposition to government policies or corruption, and to lobby against draconian, dystopian laws. Today, such activism is a dangerous proposition regardless of which side of the political spectrum you may stand.

The U.S. Congressional Select Committee investigating the January 6th “insurrection”, and the “inquisition” that followed, is a perfect example of how far those in power will go to protect their turf and retain their power.

“Instead of Viewing…their enemy as external, operating from Moscow, Hanoi or Beijing,..millions of Americans…are awakening…to the fact that America’s primary enemy is internal, operating from New York and Washington D.C.”

“Communism is not [and never was] a creation of the masses to overthrow the Banking establishment, but rather a creation of the Banking establishment to overthrow and enslave the people.”
~ Anthony J. Hilder

References:

  1. Wikipedia | Federal Reserve Bank www.federalreserve.gov
  2. Wikipedia | Federal Deposit Insurance Corporation (FDIC) www.fdic.gov
  3. Wikipedia | Internal Re-Venue Service www.irs.gov 
  4. Wikipedia | Central Intelligence Agency www.cia.gov 
  5. Wikipedia | National Security Agency www.nsa.gov
  6. Wikipedia | National Security Council www.whitehouse.gov/nsc
  7. Wikipedia | Defense Intelligence Agency/ www.dia.mil 
  8. Wikipedia | Executive Branch of the U.S. President: www.whitehouse.gov/our-government/executive-branch; White House Administration: www.whitehouse.gov/administration/eop
  9. Wikipedia | U.S. Federal Executive Departments.
  10. Wikipedia | U.S. Congress www.congress.gov
  11. Wikipedia | U.S. Supreme Court www.supremecourt.gov 
  12. Wikipedia | 50 U.S. State Governors.
  13. Wikipedia | U.S. Attorney General www.justice.gov 
  14. Wikipedia | 50 U.S. State Attorney Generals.
  15. Wikipedia | Quote by Dwight D. Eisenhower.
  16. Yahoo Finance | Top U.S. and Global Defense Contractors.
  17. National Crime Information Center www.ojp.gov 
  18. Wikipedia | Quote by Robert F. Kennedy.
  19. Note: Warning written by the author about publishing this controversial book.
  20. Quote by Anthony J. Hilder.

Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.147 – 150

ORDER YOUR LIBERTY BOOKS TODAY!

Sovereign’s Handbook by Johnny Liberty 
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)

A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!

$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK

Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom 
(3rd Edition)
(Printed, Bound Book or PDF)

This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!

$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK