
By Johnny Liberty
Establishing the National/Global Security State
The Central Intelligence Agency (CIA) was legislated into existence via the National Security Act (1947) with limited statutory authority. It originally required that any covert action taken by the CIA must be authorized by the National Security Council. Countless times since its inception, the CIA has exceeded its congressional and constitutional authority.
After World War II, many former Nazi intelligence officers were brought to the United States and placed into various intelligence agencies, including the Office of Naval Intelligence and the CIA. Having infiltrated many key positions in government agencies and private enterprises with people loyal to various CIA hierarchies, the CIA is a central hub of the actual United States Power structure.
Wiretapping & Due Process of Law
Originally, the National Security Agency (NSA) provided for checks and balances that have become meaningless today. The CIA has taken on functions never intended by the NSA, and has too often breeched its congressional mandate and authority.
Though authorized only to operate outside of the “United States”, the CIA has been, and is today, involved in domestic affairs within the “United States”, and orchestrating media propaganda campaigns both domestically and abroad through the propaganda, mainstream media which they control.
The National Security Agency (NSA) monitors phone calls between the United States and foreign nations. With revelations from Edward Snowden in 2013, we discovered that the NSA is prying and spying into every phone conversation on every smart phone in the united states of America. Snowden disclosed to the mainstream media and made public blatant violations of the law by the NSA. His punishment was to become an international scapegoat presently in exile in the country of Russia.
National Security Directives (NSD) issued by the NSA do not have to be reported, reviewed, made available to anyone or even acknowledged that they exist. These NSDs are further evidence of the existence of Power structures operating behind the scenes of de facto government.
The Computer Matching and Privacy Act gives the U.S. government absolute authority and discretion to wiretap phones and plant bugs in homes and businesses without the knowledge or consent of those being monitored.
The Digital Telephony Bill (HR 4922)(i.e. CALEA), passed by the House (Oct. 5, 1994), created and funded a national system for the interception of digital and other communications. It allows the easy isolation of individual communications for government wiretapping purposes, pursuant to a court order or other lawful authorization.
Telephone corporations that do not comply or assist the government have been shut down. Computer chips are installed in all electronic devices including computers and cell phones so that the government can ceaselessly monitor each Citizens communications remotely.
“A revolutionary change, permits law enforcement agencies to pass around investigative information, much of it rumor and gossip, over a national computer system run by Big Brother.”
~ Representative Don Edwards (D-CA)
Undaunted by the public outcry against its maligned Clipper Chip, the NSA has developed the Fortezza Card. This technology encrypts data under the cloak of privacy, but retains a “back door” for government agents who believe they have the right to snoop into your private affairs.
The NSA remains persistent in its efforts at cyber-spying and tightening its grip on the free enterprise, free expression of the Internet despite initial opposition by Silicon Valley executives. Today, Big Tech and social media companies are step-by-step in alignment with the government’s snooping, spying and censorship agenda.
The Federal Register contained a lengthy, detailed “notice of the maximum capacity required to accommodate all of the communication interceptions, pen registers, and trap and trace devices that the Attorney General estimates the government agencies authorized to conduct electronic surveillance may conduct and use simultaneously by 1998.”
Former FBI Director, Louis Freeh revealed that “Each telecommunications carrier must ensure that it can expeditiously increase its capacity to meet the assistance capability requirements [for] interceptions equal to 1% of the engineered capacity of the equipment, facilities or services that provide a [wired or wireless telecommunications] customer or subscriber with the ability to originate, terminate, or direct communications.”
More and more efforts to legislate and institutionalize welfare IDs, driver license and passport IDs, national IDs, digital banking IDs, travel IDs, vaccination IDs, forced implantation of biochips, contact tracing, and other forms of tracking and surveillance systems are rapidly becoming integrated into every aspect of modern life especially since the COVID-19 “plandemic”.
Executive Orders and CIA
Executive Orders (EOs) can be invoked in secret by the U.S. President. Secret government legislating in secret are evidence of the existence of United States Power structures operating behind the scenes of the de facto government.
After U.S. President Jimmy Carter ordered the disbanding of the CIA’s covert operations in the 1970s, the CIA went deeper underground until U.S. President Ronald Reagan restored its covert operations. Covert operations and black budgets are evidence of the existence of Power structures operating behind the scenes of de facto government.
Three factions in the CIA are competing with each other. Faction One is controlled by the Department of Justice (DOJ) and the White House. Faction Two is controlled by the Office of Naval Intelligence (ONI), and is often at odds with Faction One. Faction Three is a small number of former Office of Strategic Services (OSS) personnel who answer to no one.
Today, the CIA has become so powerful that it can destroy any politician who seriously questions its activities. The CIA meddles in elections both abroad and domestically. The CIA conspires with underworld figures and organizations including the Mafia to carry out all sorts of criminal activities both abroad and in the united states of America. The CIA creates wars to serve the agencies interests, creates enemies such as ISIS, and even fights wars against the United States military, such as in Syria. The United States military machine has killed more than 20 million people in 37 nations since World War II.
In 1953, U.S. President Dwight Eisenhower warned the American people of the dangers imposed by the military-industrial complex, which included the CIA.
“The National Security State uses Fascism to protect capitalism
while they say they’re protecting democracy from Communism.”
~ Michael Parenti
Mind Control and the Global Manipulators
A notorious center of “mind control” and time travel research on the eastern end of Long Island, New York is The Montauk Project. Preston Nichols discovered a blocking frequency that was jamming the minds of psychics he was working with.
A blocking frequency was installed around the Earth to disconnect humanity from other dimensions, similar to being an astronaut on the moon being cut off from Mission Control. “Like radio or television waves broadcasted from a transmitter and decoded by a radio or television set, the human mind decodes thought-waves broadcast by the universe. Some people have their sets tuned for other frequencies and dimensions and are considered talented psychics or clairvoyants. These are talents once common to the entire human species that have been blocked, jammed or programmed out of us by the global manipulators.”
The CIA, and other intelligence communities, have long engaged in “mind control”experiments – LSD and psychedelic experiments in the 1960s; HAARP engaged in weather control and blasting human population centers with Electromagnetic Radiation (EMFs); and training assassins for their political dirty work.
“For some time I have been disturbed
by the way the CIA has been diverted
from its original assignment.
The CIA has become an operational
and at times a policy-making
arm of the government…”
~ President Harry Truman (1963)
Facebook as CIA Data Mining Operation
Meta, originally called Facebook, was established by the Central Intelligence Agency (CIA) under the leadership of Mark Zuckerberg, who is coincidentally, a Rockefeller.
Facebook was founded to operate as a “data mining” organization so as to collect as much information on as many people as possible to control human populations and selectively direct the flow of information. Facebook has very close ties to the Defense Advanced Research Projects Agency (DARPA).
From a national security standpoint, DARPA’s purpose is to find out lots of things about lots of people. Where they are going? What they are doing? What airlines are they using? Who do they associate with? Which types of online books and films do they read or watch? How do they think and feel politically? The list goes on. If you simply follow the money, it is quite easy to see what is happening behind the scenes of this sinister social media network.
Facebook, the identifying book of faces, is a perfect technological partner to the CIA’s playbook of surveillance, propaganda and media manipulation.
Secret Directives Behind Airport I.D. Checks
Reporters or attorneys who follow federal FOIA requests may be interested in recent efforts by privacy advocates to get the government to release a secret directive that the airlines rely on as the basis for demanding that passengers show an official photo ID before boarding their flight.
Some privacy advocates consider the photo ID requirement on domestic flights an unnecessary intrusion into the passenger’s privacy, since the metal detectors and luggage screening equipment that is already in place is sufficient to ensure the security of air travel without violating privacy rights.
While airline officials blame the Federal Aviation Administration (FAA) for the photo ID requirement, the FAA refuses to make public the secret directive the airlines say they are implementing. This, of course, raises questions as to why the directive itself is a secret. From the passenger’s perspective, the airlines are saying “the FAA makes us do it”, but the FAA says “no” when asked to produce the document that the airlines claim requires them to ask for photo ID.
“Privacy attorneys Robert Ellis Smith and Lee Tien have filed separate FOIA requests to obtain the FAA directive. Both FOIA requests were rejected, and Smith and Tien are doing more legal research to determine if there is sufficient grounds for a lawsuit. Meanwhile, passengers who refuse to show a photo ID, have in a few cases been prevented from boarding, subjected to abuse by airline officials, or treated with suspicion for exercising their Constitutional right to privacy. Even more confusing, some passengers are not being asked for ID prior to boarding.”
Department of Homeland Security (DHS) and Transportation Security Administration (TSA)
Customs agents routinely search passengers leaving the country for smuggled items, including excess cash. Foreign mail is opened. Bank tellers are being ordered by their employers to report suspicious transactions. The U.S. government can use your household or office garbage to incriminate you, including medical records, psychiatrist’s records, personal journals, or your attorney’s private notes?
In the wake of events of September 11, or September 11, 2001 (911), the “national security” system was reorganized, integrated and expanded. In October 2001, the Department of Homeland Security (DHS) was established within the Executive Office of the U.S. President. Due to pressure from the U.S. Congress, however, the original office became a cabinet department in 2003.
The Department of Homeland Security (DHS) integrated 22 federal agencies, including the Federal Emergency Management Agency (FEMA), U.S. Coast Guard, U.S. Customs Service, and U.S. Secret Service under one department. Agencies created specifically in response to 911 were transferred to another new department; the Transportation Security Administration (TSA) is but one example.
References:
- Wikipedia | National Security Act.
- Connie Chung, Eye to Eye (television program) June 17, 1993 (drug trafficking into the US in military aircraft); 60 Minutes, November 21, 1993 (filmed several DEA officials and agents describing smuggling of large quantities of cocaine by the CIA into the US); Associated Press, May 3, 1993 (reported cooperation by U.S. Customs agents in drug trafficking); Clinton Chronicles (video portraying Clintons political machine and the financial involvement in drug money laundering and a blind eye turned to Mena, Arkansas); Spider’s Web by Alan Friedman; Compromised by Terry Reed and John Cummings; The Mafia and the CIA and George Bush by Pete Brewton; Deep Politics by Peter Dale Scott; Defrauding America by Rodney Stitch (1994), pp.199, 293, 327.
- Liberty International and The Guardian | With the latest WikiLeaks revelations about the CIA, is privacy really dead?
- Computer Matching and Privacy Act of 1988.
- Wikipedia | Communications Assistance for Law Enforcement Act; Digital Telephony Bill (H.R. 4922) (aka CALEA) passed on Oct. 5, 1994 sourced from Perceptions Magazine, May/June 1995, p.80; See also Technology and Liberty: Police State Plans by Clark Matthews, The Spotlight, February 28, 1994, p.6.
- Quote by Don Edwards on “big brother”.
- Wikipedia | Fortezza; Everyone will have a Fortezza card to encrypt or de-encrypt DMS messages. Each command will have a number of Fortezza cards to be placed at the entrance to the command for organizational DMS messages.
- Federal Register, Doc. 95-25562, October 13, 1995.
- Wikipedia | Quote by Louis Freech.
- Wikipedia | National Security Directive (NSD); Behold A Pale Horse by William Cooper.
- National Security Directives are not published anywhere; Defrauding Americaby Rodney Stitch (1994), p.346 (full text of a standard CIA secrecy agreement) and p.346 (portions of the National Security Act); What Uncle Sam Really Wants by Noam Chomsky, Odonian Press, pp.8-10 (National Security Council Memorandum 68 (1950) written by Dean Acheson, Paul Nitze and Policy Planning Study 23 written by George Kennan were the implementing policies for Soviet-American foreign policy which perpetuated the arms race and the eventual bankruptcy of both countries); The National Security State by Gore Vidal, Organica, Autumn 1993, p.4 (on the American empire).
- Liberty International and Sputnik News | Former NSA Officer William Binney: CIA Lying About Russians Hacking the Democratic National Committee.
- Liberty International | Putin: Who Created ISIS?; Liberty International and AWD News | Assange released 500,000 diplomatic cables which reveals how the CIA created ISIS; If you ever wondered why Western governments hate Julian Assange so much and are willing to torture him to death in prison without trial, it’s because he has exposed the deep cover game; Liberty International | CIA Must Stop Illegal, Counterproductive War to Overthrow Assad; Liberty International and ZeroHedge | Pentagon At War With CIA In Syria; Liberty International and Global Research | US Has Killed More Than 20 Million People in 37 “Victim Nations” Since World War II; Liberty International and Newsweek | U.S. has spent six trillion dollars on wars that killed half a million people since 9/11.
- National Security Agency (NSA), Central Intelligence Agency (CIA) and Computer Matching and Privacy Act. Sourced from L. Fletcher Prouty who is supposedly the deep cover CIA operative that was portrayed in Oliver Stones movie JFK.
- Wikipedia | Michael Parenti; Wikiquotes | Quote sourced from Michael Parenti.
- Wikipedia | The Montauk Project; Regarding CIA experimentation and using the public as guinea pigs, see also the article Microwave Harassment and Mine-Control Experimentation by Julianne McKinney, Electronic Surveillance Project, Association of National Security Alumni.
- Quote by U.S. President Harry Truman; Washington Post, Dec. 21, 1963.
- Wikipedia | Defense Advanced Research Projects Agency.
- The Real News | Facebook and its Connections to the CIA and DAARPA by Brian S. Staveley.
- New York Sun | Legality of Airport ID Checks Probed
- Wikipedia | Department of Homeland Security (2001) www.dhs.gov
Source: Sovereign’s Handbook by Johnny Liberty (30th Anniversary Edition), Volume 1 of 3, p.159 – 164
ORDER YOUR LIBERTY BOOKS TODAY!
Sovereign’s Handbook by Johnny Liberty
(30th Anniversary Edition)
(3-Volume Printed, Bound Book or PDF)
A three-volume, 750+ page tome with an extensive update of the renowned underground classic ~ the Global Sovereign’s Handbook. Still after all these years, this is the most comprehensive book on sovereignty, economics, law, power structures and history ever written. Served as the primary research behind the best-selling Global One Audio Course.Available Now!
$99.95 ~ THREE-VOLUME PRINT SERIES
$33.33 ~ THREE-VOLUME EBOOK
Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom
(3rd Edition)
(Printed, Bound Book or PDF)
This comprehensive book, goes far beyond the immediate impact of the “pandemic”, but, along with the reader, imagines how our human world may be altered, both positively and negatively, long into an uncertain future. Available Now!
$25.00 ~ PRINT BOOK
$10.00 ~ EBOOK

